{"id":29065,"date":"2019-02-21T16:09:33","date_gmt":"2019-02-21T23:09:33","guid":{"rendered":"https:\/\/jumpcloud.com\/?page_id=29065"},"modified":"2023-01-12T16:02:30","modified_gmt":"2023-01-12T21:02:30","slug":"cloud-directory-cure","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/cloud-directory-cure","title":{"rendered":"Decentralized IAM & The Cloud Directory Cure"},"content":{"rendered":"\n

Identity and access management has quietly become a crisis for IT. The proliferation of disparate resources (SaaS, IaaS, Mac\u00ae, Linux\u00ae, etc.) has decentralized core identity management operations. While the cloud has been part of the problem, we believe that it also contains the solution.<\/p>\n\n\n\n

From the crisis of decentralized IAM, the vision of JumpCloud\u00ae arose. We usually explain JumpCloud in terms of its features, be it cloud LDAP<\/a>, or cloud RADIUS<\/a>, or our System Agent<\/a>, but here, we want to look at it from a different angle. Below we\u2019ll explain how modern identity management was disrupted and our vision for unifying IAM again with cloud directory services.<\/p>\n\n\n\n

Origins of IAM<\/h2>\n\n\n\n

You may (or may not) recall the brick-and-mortar environment your network and all the connectivity your company\u2019s resources operated from back in 2000.<\/p>\n\n\n\n

Remember walking into that facility, sitting down in front of your desktop, and running Windows\u00ae XP\u00ae or Windows 2000? (And by desktop, I mean an immobile, truly-tethered-to-your-desk desktop, of course). Most of the machines were physically tethered together through Ethernet wiring and switches\/hubs and managed through a server somewhere around the corner in the same building in a closet or data center. This was called the LAN \u2013 the local area network. With the addition of remote sites and the Internet, the term WAN \u2013 wide area network \u2013 was introduced.<\/p>\n\n\n\n

The LAN of yesteryear was brought to you almost exclusively by Microsoft Windows and its associated components. Through the magic of Kerberos for authentication, Active Directory\u00ae<\/a> (AD) domain services, and Windows Server, Microsoft\u00ae was working behind the scenes and quietly running the network.<\/p>\n\n\n\n

All the machines tethered to this Active Directory domain worked together. Your one set of credentials granted you access to basically everything:<\/p>\n\n\n\n