{"id":29065,"date":"2019-02-21T16:09:33","date_gmt":"2019-02-21T23:09:33","guid":{"rendered":"https:\/\/jumpcloud.com\/?page_id=29065"},"modified":"2023-01-12T16:02:30","modified_gmt":"2023-01-12T21:02:30","slug":"cloud-directory-cure","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/cloud-directory-cure","title":{"rendered":"Decentralized IAM & The Cloud Directory Cure"},"content":{"rendered":"\n
Identity and access management has quietly become a crisis for IT. The proliferation of disparate resources (SaaS, IaaS, Mac\u00ae, Linux\u00ae, etc.) has decentralized core identity management operations. While the cloud has been part of the problem, we believe that it also contains the solution.<\/p>\n\n\n\n
From the crisis of decentralized IAM, the vision of JumpCloud\u00ae arose. We usually explain JumpCloud in terms of its features, be it cloud LDAP<\/a>, or cloud RADIUS<\/a>, or our System Agent<\/a>, but here, we want to look at it from a different angle. Below we\u2019ll explain how modern identity management was disrupted and our vision for unifying IAM again with cloud directory services.<\/p>\n\n\n\n You may (or may not) recall the brick-and-mortar environment your network and all the connectivity your company\u2019s resources operated from back in 2000.<\/p>\n\n\n\n Remember walking into that facility, sitting down in front of your desktop, and running Windows\u00ae XP\u00ae or Windows 2000? (And by desktop, I mean an immobile, truly-tethered-to-your-desk desktop, of course). Most of the machines were physically tethered together through Ethernet wiring and switches\/hubs and managed through a server somewhere around the corner in the same building in a closet or data center. This was called the LAN \u2013 the local area network. With the addition of remote sites and the Internet, the term WAN \u2013 wide area network \u2013 was introduced.<\/p>\n\n\n\n The LAN of yesteryear was brought to you almost exclusively by Microsoft Windows and its associated components. Through the magic of Kerberos for authentication, Active Directory\u00ae<\/a> (AD) domain services, and Windows Server, Microsoft\u00ae was working behind the scenes and quietly running the network.<\/p>\n\n\n\n All the machines tethered to this Active Directory domain worked together. Your one set of credentials granted you access to basically everything:<\/p>\n\n\n\n But this couldn\u2019t last forever.<\/p>\n\n\n\n Microsoft was beginning to establish a vision for managing a more mobile, operative workforce, but they still kept one foot firmly rooted in the on-prem world of the past. Laptops loaded with Virtual Private Network (VPN) software enabled you to be authenticated to Active Directory, and connect to the corporate network outside of the office, but the technological climate began changing faster than Microsoft could keep up with. Their pristine model of a domain-bound network was being stretched thin by new devices and progressive applications. The sunlight of the infrastructure Active Directory had been providing was beginning to cast a shadow around something called the cloud. But, where was the cloud coming from?<\/p>\n\n\n\n Companies like Salesforce\u00ae <\/sup>were among the first to take advantage of the benefits of cloud computing. Founded in 1999, Salesforce introduced a cloud-based Customer Relationship Marketing (CRM) system that flew in the face of traditional business software \u2013 and traditional IT management.<\/p>\n\n\n\n For IT admins, this came as a bit of a shock. Suddenly, their complete control over user data and IT systems \u2013 their \u201cdomain\u201d \u2013 was being disrupted by independent solutions outside of their control (and walls). New user accounts and credentials were flowing in from rogue sales and\/or marketing teams who were subscribing to services with credit cards. In the process, users were completely bypassing normal IT purchasing models and methods.<\/p>\n\n\n\n This problem got a name (\u201cShadow IT\u201d) and a host of new solutions sprung up to try to solve it. We started to see the first tethers of Active Directory branching up towards the cloud through web application single sign-on solutions, using protocols like SAML. These SSO solutions allowed IT administrators to return to management as usual (albeit managing multiple IT management systems), but only for the time being. The dam of Active Directory had sprung a leak.<\/p>\n\n\n\n The central question only became more pressing: \u201cHow can IT securely manage and authenticate<\/a> all of these various identity streams?\u201d<\/strong><\/p>\n<\/div>\n\n\n\n By the late 2000s, the pattern of tethering cloud-based utilities to Active Directory had spread to solutions like G Suite\u2122 (formerly known as Google Apps), which had in many cases replaced Exchange as an email mechanism and productivity platform. But this required still more utilities, like Google Apps Directory Sync\u00ae<\/a> (GADS), now called Google Cloud Directory Sync (GCDS), in order to do so. The spectre of Shadow IT continued to spread as new cloud-based mechanisms and devices emerged with one-off utilities to tether them back down to Active Directory.<\/p>\n\n\n\n Then, Apple pulled a Steve Jobs and changed their whole image with the iPhone\u00ae and iMac\u00ae, reinventing the consumer wheel in the process. Suddenly, admins saw people walking into the office with these sleek devices, totally unmanaged, but nevertheless accessing corporate networks and data. One recent survey on the matter<\/a> found that 75% of users today prefer Mac over Windows. Simultaneously, Linux increased in popularity, especially among developers and engineers as Linux now runs 90%<\/a> of the public cloud workload.<\/p>\n\n\n\n So, the massive ecosystem of vendors expanded rapidly, yet again, and system admins were reaching a breaking point. Bring your own device (BYOD) programs emerged as the influx of employees\u2019 personal devices became too much of a security risk too ignore. But these BYOD programs required IT organizations to manage all types of disparate systems, and made environments difficult to secure. Some system admins opted instead for policies requiring their users to stick with Windows and Microsoft exclusively. Others migrated to Mac, while many embraced Linux.<\/p>\n\n\n\n What they all had in common is a need to securely tether all pathways to a centralized identity store<\/a>. But they didn\u2019t have that. Instead, they had a convoluted knot of siloed identity management systems.<\/p>\n\n\n\n As a key aspect of these IAM silos, protocols were flying in from all sides to support specific devices and specific applications and specific networks, causing IT admins to lose sleep and probably lose hair as well. Updating and adapting IAM solutions to this multi-protocol environment<\/a> was a nightmare:<\/p>\n\n\n\nOrigins of IAM<\/h2>\n\n\n\n
\n
Directory Services, Disrupted<\/h2>\n\n\n\n
Software-as-a-Service (SaaS) Takes Hold<\/h3>\n\n\n\n
Macs, Linux, and the Heterogeneous System Environment<\/h3>\n\n\n\n
IAM in Disarray<\/h3>\n\n\n\n
\n
Ramifications for Active Directory<\/h3>\n\n\n\n