Login

Register

Login

Register

#cybersecurity | #hackerspace |

One Login to All IT Resources: The Holy Grail of IT


By Zach DeMeyer Posted January 8, 2020

With all of the disparate IT resources at play in an organization, IT admins armed with traditional identity management tools struggle to manage access to them. In an ideal world, rather than a multitude of identities, IT admins can supply their users with one comprehensive set of credentials, meaning one login to all IT resources. 

Historically, this capability appeared to be a fantastical one, a flight of fancy akin to that of the mythical quest for the Holy Grail. But thanks to innovations in the modern cloud era, the concept of one login for all IT resources is closer than you might think.

History of Identity Management

IT admins know how difficult it is to provide end users with a single, comprehensive set of credentials. With a host of web-based applications, cloud infrastructure, a variety of endpoint systems, wireless networking, and more, IT admins have a tough time keeping track of all of the username/password combinations that each require. For the end users that leverage them, the task is even more arduous, which usually results in upticks in help desk tickets.

The First Unified Identity

Things weren’t always this way. In the early days of IT, admins relied upon Microsoft® Active Directory® (AD) to manage their users’ identities, which provided a core set of credentials for virtually all IT resources (as long as they were Windows-based).

Microsoft’s Windows® operating system (OS) was the de facto standard for nearly all systems used in the workplace. The OS dominated the applications space as well, and since the network consisted of wired connections, AD managed everything with relative ease. This near monopoly of the IT space established what is now known as the Windows domain, with AD as the domain controller. Of course, the IT landscape at that time was drastically different than it is now.

Disparate Times, Disparate Measures

After the Software-as-a-Service (SaaS) boom of the mid 2000s, Active Directory started to lose its grip on the average IT environment. Although these new innovations revolutionized work as we know it, (Read more…)



Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW