{"id":4131,"date":"2016-03-28T13:03:53","date_gmt":"2016-03-28T19:03:53","guid":{"rendered":"https:\/\/www.jumpcloud.com\/blog\/?p=4131"},"modified":"2024-08-14T17:39:26","modified_gmt":"2024-08-14T21:39:26","slug":"identity-server","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/identity-server","title":{"rendered":"What is an Identity Server? – Cloud-Based IT – JumpCloud"},"content":{"rendered":"\n
As the identity management space heats up and increases in complexity, it is prudent to step back and define its various components. An identity server is a core part of any identity and access control infrastructure. It is the central database that stores user credentials. The identity server is the server that all IT resources check with to authenticate user access. At least that\u2019s what should be occurring. The identity server is arguably the most critical part of the <\/span>identity management infrastructure<\/span><\/a>.<\/span><\/p>\n\n\n\n An identity management infrastructure starts with the <\/span>core user identities<\/span><\/a> which are stored within a secure database. Those identities are then given privileges based on levels of access. Sometimes <\/span>user access privileges<\/span><\/a> are handled through a grouping mechanism within the user database, while other times they are granted individually on each IT resource. Privileges may also be granted through a combination of those techniques. When users attempt to access an IT resource, their logins are checked against the core identity server to determine whether or not they should gain access.The number of IT resources that an individual needs to access has grown dramatically in recent times. Consequently, there are portions of the identity management stack that focus on enabling users to securely access those IT resources without having to memorize numerous complex passwords. All of this is accomplished while still maintaining strong security thanks to the identity server.<\/span><\/p>\n\n\n\n Identity servers have been an important part of an IT infrastructure for the past two decades. As computers moved from individual use solutions to network interconnectivity, the identity server became an even more crucial part of the equation. IT organizations required a solution to manage this growing database of connections between users and the IT resources they needed to access. <\/span><\/p>\n\n\n\n OpenLDAP<\/span><\/a> emerged in the mid-1990s as an open source identity server solution. Microsoft introduced their commercial version called <\/span>Active Directory<\/span><\/a> (AD) in 1999. AD became the de facto standard over the next fifteen years. As the market diversified, networks shifted from being solely Windows based to being more heterogeneous, and these legacy on-premises solutions struggled. They simply couldn\u2019t make the leap to the cloud era.<\/span><\/p>\n\n\n\n A <\/span>next generation identity server<\/span><\/a> is emerging. This platform is connecting users with the IT resources they need \u2013 devices, applications, and networks \u2013 regardless of where those resources are located, what platform they are on, or what protocol they leverage. Unlike in the past, this new generation of <\/span>cloud-based identity provider<\/span><\/a> permits organizations to use whatever types of IT resources they choose.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" A next generation identity server called Directory-as-a-Service is emerging. This platform is connecting users with the IT resources they need<\/p>\n","protected":false},"author":30,"featured_media":4908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781],"tags":[],"collection":[2779],"platform":[],"funnel_stage":[3016],"coauthors":[2516],"acf":[],"yoast_head":"\nGetting to the Core of an Identity Server <\/span><\/h2>\n\n\n\n
Early Solutions Failed to Identify with the Cloud <\/span><\/h2>\n\n\n\n
The Distinctive Cloud-Based Identity Provider <\/span><\/h2>\n\n\n\n