{"id":3750,"date":"2015-12-15T08:00:06","date_gmt":"2015-12-15T15:00:06","guid":{"rendered":"http:\/\/www.jumpcloud.com\/blog\/?p=3750"},"modified":"2020-04-09T15:56:25","modified_gmt":"2020-04-09T21:56:25","slug":"cloud-based-user-authentication","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication","title":{"rendered":"Cloud-based User Authentication"},"content":{"rendered":"

Historically, most IT assets were on-premises and protected behind a firewall. As such, the authentication server \u2013 usually Microsoft <\/span>Active Directory or OpenLDAP<\/span><\/a> \u2013 lived next to the server, endpoints, and applications that it served. When somebody logged in, the credentials were passed locally to the AD or LDAP server to be processed. In a world where IT assets are now located everywhere, how does authentication work?<\/span><\/p>\n

The Shift to Web-based Infrastructure <\/span><\/h2>\n

Authentication servers are considered by any organization to be core infrastructure services. Without authentication, IT organizations have no control over who has access to what IT resources. Over the last decade, there has been a fundamental shift to the cloud, resulting in some dramatic changes for key IT infrastructure components. Servers now live at Infrastructure-as-a-Service providers such as AWS or Google Compute Engine. Endpoints are tied to their users, who are now more mobile than ever, working from virtually any location around the world. And, with the advent of SaaS-based applications, an organization\u2019s core application infrastructure may now be web-based.<\/span><\/p>\n

For security purposes, authentication servers have been housed internally and rarely opened to the public Internet. Any remote devices or users were required to authenticate through the VPN. Now, when virtually all resources are in the cloud, VPNs pose a significant headache for IT. <\/span>On-premises user authentication system  are out of place in a cloud-based world<\/span><\/a>.<\/span><\/p>\n

How Cloud-based User Authentication is Delivered<\/span><\/h2>\n

Recently, a new generation of technology has emerged to <\/span>enable cloud-based user authentication<\/span><\/a>. The platform is called Directory-as-a-Service (DaaS), and it\u2019s delivered as a SaaS-based solution from the cloud. The central user directory securely authenticates users, devices, and applications, whether it be in the cloud or on-premises. The <\/span>cloud-based directory service<\/span><\/a> securely communicates to devices over a mutual TLS tunnel, ensuring high security and eliminating the need for VPNs, thus saving IT staff time and money. IT organizations can enable their employees to work from anywhere with virtually any provider, ensuring that their core corporate mission comes first.<\/span><\/p>\n

Cloud-based user authentication removes the necessity of keeping your IT infrastructure on-premises while still maintaining control over user access. If you would like to learn more about how you can leverage cloud-based user authentication to make your workforce more productive and secure, <\/span>drop us a note<\/span><\/a>. We\u2019d be happy to discuss <\/span>Directory-as-a-Service<\/span><\/a> and other approaches to solving core security and productivity problems. If you\u2019d like to play with a cloud-based directory yourself, <\/span>feel free to give JumpCloud a try<\/span><\/a> \u2013 your first 10 users are free forever.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

In a world where IT assets are now located everywhere, how does authentication work?<\/p>\n","protected":false},"author":30,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781],"tags":[],"collection":[2779,2777,2776,2775,2780],"platform":[],"funnel_stage":[3016],"coauthors":[],"acf":[],"yoast_head":"\nCloud-based User Authentication - JumpCloud<\/title>\n<meta name=\"description\" content=\"In a world where IT assets are now located everywhere, how does authentication work?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud-based User Authentication\" \/>\n<meta property=\"og:description\" content=\"In a world where IT assets are now located everywhere, how does authentication work?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-15T15:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-09T21:56:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/01\/jumpcloud-logo-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Greg Keller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Greg Keller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\"},\"author\":{\"name\":\"Greg Keller\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/33bf05bce1792138e1fac8878933c1f6\"},\"headline\":\"Cloud-based User Authentication\",\"datePublished\":\"2015-12-15T15:00:06+00:00\",\"dateModified\":\"2020-04-09T21:56:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"articleSection\":[\"Best Practices\",\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\",\"url\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\",\"name\":\"Cloud-based User Authentication - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"datePublished\":\"2015-12-15T15:00:06+00:00\",\"dateModified\":\"2020-04-09T21:56:25+00:00\",\"description\":\"In a world where IT assets are now located everywhere, how does authentication work?\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud-based User Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/33bf05bce1792138e1fac8878933c1f6\",\"name\":\"Greg Keller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/bb829f9c68b309c7d66b61d4436f8afa\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1329dd1fe0f66c8a37039a19f3169d11?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1329dd1fe0f66c8a37039a19f3169d11?s=96&d=mm&r=g\",\"caption\":\"Greg Keller\"},\"description\":\"JumpCloud CTO, Greg Keller is a career product visionary and executive management leader. With over two decades of product management, product marketing, and operations experience ranging from startups to global organizations, Greg excels in successful go-to-market execution.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud-based User Authentication - JumpCloud","description":"In a world where IT assets are now located everywhere, how does authentication work?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication","og_locale":"en_US","og_type":"article","og_title":"Cloud-based User Authentication","og_description":"In a world where IT assets are now located everywhere, how does authentication work?","og_url":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication","og_site_name":"JumpCloud","article_published_time":"2015-12-15T15:00:06+00:00","article_modified_time":"2020-04-09T21:56:25+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/01\/jumpcloud-logo-2023.png","type":"image\/png"}],"author":"Greg Keller","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Greg Keller","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication"},"author":{"name":"Greg Keller","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/33bf05bce1792138e1fac8878933c1f6"},"headline":"Cloud-based User Authentication","datePublished":"2015-12-15T15:00:06+00:00","dateModified":"2020-04-09T21:56:25+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication"},"wordCount":423,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"articleSection":["Best Practices","How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication","url":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication","name":"Cloud-based User Authentication - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"datePublished":"2015-12-15T15:00:06+00:00","dateModified":"2020-04-09T21:56:25+00:00","description":"In a world where IT assets are now located everywhere, how does authentication work?","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/cloud-based-user-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Cloud-based User Authentication"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/33bf05bce1792138e1fac8878933c1f6","name":"Greg Keller","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/bb829f9c68b309c7d66b61d4436f8afa","url":"https:\/\/secure.gravatar.com\/avatar\/1329dd1fe0f66c8a37039a19f3169d11?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1329dd1fe0f66c8a37039a19f3169d11?s=96&d=mm&r=g","caption":"Greg Keller"},"description":"JumpCloud CTO, Greg Keller is a career product visionary and executive management leader. With over two decades of product management, product marketing, and operations experience ranging from startups to global organizations, Greg excels in successful go-to-market execution."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3750"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=3750"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3750\/revisions"}],"predecessor-version":[{"id":37365,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3750\/revisions\/37365"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=3750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=3750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=3750"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=3750"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=3750"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=3750"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=3750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}