Login

Register

Login

Register

#cybersecurity | #hackerspace |

Universal Directory Replacement – Security Boulevard


By Kayla Coco-Stotts Posted January 26, 2020

IT admins are wondering if there’s a viable Universal Directory (UD) replacement. Before thinking about a replacement, IT organizations should assess how they are using UD, or how they are intending it to be used, and whether it’s meeting a variety of critical needs. 

The Challenge with Universal Directory

The challenge around UD often derives from what admins seek to get out of it. Are they looking at a unified directory for managing user attributes, or a core directory service for its authentication and authorization services? Does the IT department want something similar to what Microsoft® Active Directory® has done for decades, but from the cloud, or perhaps just a repository for user attributes very similar to what AWS® Cloud Directory has been pioneering as a hierarchical data store?

Chances are, admins who have adopted UD are searching for the latter in both cases. But keep in mind that UD may also require a directory service to authenticate users to their IT resources. For most, this can lead to a greater reliance on Active Directory. 

Cloud-Based Directory Solutions

When you think of directory services, various characteristics come to mind. Now that modern IT solutions are shifting to the cloud, the list of requirements you should use to determine whether a directory service is the correct fit has lengthened considerably.

Modern directory services should be delivered from the cloud, for all types of users and IT resources. This includes:

  • Disparate systems (like macOS®, Linux®, and Windows®)
  • Networks (through both wired and wireless networks)
  • Applications (like Salesforce®, Office 365™, and G Suite™) 

Additionally, a domainless directory service should be secure (through multi-factor authentication, SSH keys, one-way hashed and salted passwords, and encryption at rest and in flight), manage user attributes, and act as the source of authentication and authorization for users and their resources. 

When considering a directory service, it’s important to evaluate fully the requirements needed to ensure you are getting the right type of directory service. With a lot (Read more…)



Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW