{"id":52660,"date":"2021-08-17T10:00:00","date_gmt":"2021-08-17T14:00:00","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=52660"},"modified":"2021-09-15T18:10:31","modified_gmt":"2021-09-15T22:10:31","slug":"the-fall-of-ad-and-rise-of-the-domainless-enterprise","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/the-fall-of-ad-and-rise-of-the-domainless-enterprise","title":{"rendered":"The Fall of AD and Rise of the Domainless Enterprise"},"content":{"rendered":"\n

The preferred tools for building, maintaining, and improving a modern IT environment have changed dramatically over the years. At first, it made sense to house on-prem technical infrastructure like a domain controller within an office that employees would visit every day to accomplish their tasks \u2014 plus, it was the only option. Along the same lines, it was logical to use Microsoft Active Directory (AD) through the early 2000s as the primary source of truth across IT environments that consisted largely of Windows devices and applications. <\/p>\n\n\n\n

However, as time progressed, web apps became more popular, IT environments evolved to include Windows, Mac, and Linux devices, remote and hybrid work became the new norm for many people, and cloud infrastructure technologies (e.g. AWS) became front and center. All of this led to on-prem infrastructure and AD falling behind which opened up an opportunity for a new vision to enter the marketplace: the domainless enterprise. This term refers to the removal and replacement of the on-prem domain by a non-physical, cloud-hosted \u201cvirtual domain\u201d (or what we call the domainless enterprise) that provides the flexibility and security needed to support remote and modern workforces.<\/p>\n\n\n\n

In other words, IT admins still get to enjoy the core competencies of traditional directory services using a modern, cloud-based approach. No longer do you need to rely on an internal network or physical infrastructure for security \u2014 using this domainless enterprise approach, security is tailored to each user or group of users, device, network, and role-based authorization.<\/p>\n\n\n\n

The elements that make up the domainless model:<\/strong><\/p>\n\n\n\n