{"id":16289,"date":"2018-07-02T16:21:29","date_gmt":"2018-07-02T22:21:29","guid":{"rendered":"https:\/\/www.jumpcloud.com\/?page_id=16289"},"modified":"2022-09-09T16:26:39","modified_gmt":"2022-09-09T20:26:39","slug":"why-it-should-always-start-with-the-identity-provider","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider","title":{"rendered":"Why IT Should Always Start with the Identity Provider"},"content":{"rendered":"

As IT organizations have been grappling with a rapidly changing landscape, we see a wide variety of approaches to\u00a0identity management<\/a>\u00a0within an organization.<\/p>\n

One of the most common approaches is to address whatever the most acute problem is with the most immediate tool at hand.<\/p>\n\n

\n
\"Unified<\/figure><\/div>\n\n\n

Unfortunately, that approach can often back IT organizations into a corner when it comes to identity and access management (IAM<\/a>). That\u2019s why IT should always start with the identity provider when strategizing how to centralize identity management in a modern IT environment.<\/p>\n\n\n\n

Let\u2019s take a look at some of the identity management categories IT admins are employing to solve some of their most acute problems. In doing so, the reasons why IT should always start with the identity provider will be revealed.<\/p>\n\n\n\n

Solving IAM Problems with Web App SSO and MFA<\/h2>\n\n\n\n

Web applications can be one of the most glaring identity management issues for cloud forward organizations. Companies tend to use 50+ web-based applications<\/a>. So, it is easy to see why the issue of enabling end users to quickly and easily access applications can be top of mind. Web application single sign-on<\/a> (SSO) is one of the most common solutions IT admins utilize to provide users with easy access to this abundant resource.<\/p>\n\n\n\n

In addition to web applications,\u00a0multi-factor authentication\u00a0(MFA<\/a>) is an identity management category IT admins employ to solve a specific problem. In this day and age, a user\u2019s credentials are the keys to a company\u2019s digital kingdom, so securing user identities with and MFA IdP<\/a> has never been more important. MFA (also known as 2FA<\/a>) is one of the most powerful mechanisms to thwart security breaches related to compromised identities.<\/p>\n\n\n\n

These are just two examples of some of the IAM problems IT organizations are facing and a couple of the methods IT organizations are employing to address them. Web app SSO, MFA, and many other identity management sub-categories are incredibly valuable. In fact, these solutions should be in virtually every organization. Problems arise though when IT admins focus their problem solving on just these aspects of identity management.<\/p>\n\n\n

\n
\"\"<\/figure><\/div>\n\n\n

An IAM Strategy Needs More<\/strong><\/h2>\n\n\n\n

While specific problems may be resolved by purchasing a web application SSO tool or MFA solution, the overarching IAM strategy can be left disjointed. This is because, more often than not, web applications and identity security are just some of the problems IT is experiencing. For example, many companies also have to contend with cloud servers, non-Windows systems, and a new variety of file storage solutions. Identity security is also more critical than ever and requires a foundational approach.<\/p>\n\n\n\n

How will a web app SSO<\/a> platform connect to AWS<\/a>\u00ae cloud servers<\/a>, or manage Mac\u00ae, Linux\u00ae, or Windows\u00ae system access? How will a MFA solution support user access to file storage solutions like Box and NAS appliances<\/a>? Obviously, it\u2019s not possible to solve these user access problems with just SSO or MFA.<\/p>\n\n\n\n

IT organizations end up solving these new problems, like access to Mac systems<\/a>, with point solutions. These individual, tactical solutions end up creating silos of identities without a central, authoritative source of identity across the organization. This approach ultimately increases security risks, creates significant extra work and cost, and decreases productivity for end users.<\/p>\n\n\n\n

This is why IT should always start with the core identity provider<\/a> when it comes to addressing identity management challenges.<\/p>\n\n\n

\n
\"Lightbulb<\/figure><\/div>\n\n\n

Benefits of Starting with the Identity Provider<\/strong><\/h2>\n\n\n\n

Taking an identity management approach that starts with the identity provider solves a number of critical issues.<\/p>\n\n\n\n

Creates a Single Source of Truth<\/h3>\n\n\n\n

First, there is always a central, authoritative source of truth for a user\u2019s identity across the entire enterprise. There aren\u2019t multiple directories or identities that end users and IT admins are managing; there\u2019s just One Identity to Rule Them All<\/a>\u00ae<\/sup>.<\/p>\n\n\n\n

Centralizes Identity Security<\/h3>\n\n\n\n

Second, IT admins can enforce strong security standards at the core, such as password complexity settings<\/a>, MFA<\/a>, and SSH keys<\/a>. This allows for one central security policy that can be enforced across the whole organization, instead of having to create separate security standards for each identity silo.<\/p>\n\n\n\n

Optimizes User Management<\/h3>\n\n\n\n

Third, with a modern cloud identity provider<\/a>, IT admins can build in the process to control access to virtually all IT resources, enabling more than just one category like web applications. An end user may need to access servers, their various systems, on-prem applications, data in the cloud or on-prem, and of course, the network itself. An IT environment can be managed a lot more efficiently when all of those IT resources are controlled in one place. Also, security is strengthened because each employee has unique access to those resources. For example, with the right solution each user can have access to WiFi with their own username<\/a> and password, instead of a shared passphrase. This makes it much easier to ensure only the right people are accessing the network.<\/p>\n\n\n\n

Ensures IT Resources Can Talk to Each Other<\/h3>\n\n\n\n

When IT organizations solve their challenges by rethinking the identity provider at the core of the network, they can build an overarching strategy around identity management that\u2019s suitable for the specific needs of their environment. The right core IdP solution<\/a> can integrate with virtually all of the other IAM categories, eliminating the risk of finding various solutions that don\u2019t talk to each other. With this approach, you can be sure that just about all of the identity management solutions will communicate with a directory service.<\/p>\n\n\n\n

Start with the Identity Provider to Centralize a Modern IT Environment<\/strong><\/h2>\n\n\n\n

As organizations deal with the complexity of the modern IT landscape<\/a>, identity management is no doubt near the top of the list of issues to solve. The best strategy starts with reevaluating the identity provider at the core and refining your strategy from there. You\u2019ll be happy you started with a solid, stable foundation.<\/p>\n\n\n\n

If we can answer any more questions about why IT should always start with the identity provider to address challenges, drop us a note<\/a>. If you\u2019re curious about how an identity provider that centralizes access to all of your IT resources works, sign up for a free account<\/a>. You\u2019ll be able to explore all of our features, and your first ten users are free forever.<\/p>\n\n\n\n

\n

<\/p>\n<\/div>\n\n\n\n

\nLearn More About JumpCloud<\/a>\n\n\n\n

<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.<\/p>\n","protected":false},"author":55,"featured_media":16616,"template":"","categories":[],"collection":[],"wheel_hubs":[],"platform":[2360],"resource_type":[2311],"funnel_stage":[],"coauthors":[2513],"acf":[],"yoast_head":"\nWhy IT Should Always Start with the Identity Provider - JumpCloud<\/title>\n<meta name=\"description\" content=\"Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why IT Should Always Start with the Identity Provider\" \/>\n<meta property=\"og:description\" content=\"Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-09T20:26:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3000\" \/>\n\t<meta property=\"og:image:height\" content=\"1467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Natalie Bluhm\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider\",\"url\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider\",\"name\":\"Why IT Should Always Start with the Identity Provider - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg\",\"datePublished\":\"2018-07-02T22:21:29+00:00\",\"dateModified\":\"2022-09-09T20:26:39+00:00\",\"description\":\"Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg\",\"width\":3000,\"height\":1467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/jumpcloud.com\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why IT Should Always Start with the Identity Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why IT Should Always Start with the Identity Provider - JumpCloud","description":"Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider","og_locale":"en_US","og_type":"article","og_title":"Why IT Should Always Start with the Identity Provider","og_description":"Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.","og_url":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider","og_site_name":"JumpCloud","article_modified_time":"2022-09-09T20:26:39+00:00","og_image":[{"width":3000,"height":1467,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes","Written by":"Natalie Bluhm"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider","url":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider","name":"Why IT Should Always Start with the Identity Provider - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg","datePublished":"2018-07-02T22:21:29+00:00","dateModified":"2022-09-09T20:26:39+00:00","description":"Modern IT security has become a race against the efforts of bad actors, which is why IT should always start with the identity provider.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/07\/storyblocks-back-view-of-a-young-male-athlete-at-starting-block-on-running-track_r0ffsv2p5zcompressed.jpg","width":3000,"height":1467},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/resources\/why-it-should-always-start-with-the-identity-provider#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/jumpcloud.com\/resources"},{"@type":"ListItem","position":3,"name":"Why IT Should Always Start with the Identity Provider"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource\/16289"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/55"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/16616"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=16289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=16289"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=16289"},{"taxonomy":"wheel_hubs","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/wheel_hubs?post=16289"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=16289"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource_type?post=16289"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=16289"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=16289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}