11. March 2014 23:40
Azure Active Directory
In recent years, a number of companies have spent massive amounts of money developing on-prem identity and access management solutions without actually solving the SSO problem. Every help center and IT department on earth can confirm this. The result is a lot of unhappy end users and a lot of over-worked IT teams – and all of that means huge pressures placed on IT Pros to find a simpler solution. The solution needs to understand what apps are being used within an infrastructure, how they are being used, and how to manage them.
One possible solution is a federation with each and every one of those cloud-based applications. The challenge with that approach is that not all apps use the same protocols or standards when it comes to identity management. This can make federation really difficult.
What organizations really need is a hub that can do four key things:
- Sync with their on-prem Active Directory.
- Seamlessly connect with a variety of cloud applications.
- Integrate with various web protocols.
- Scale around the globe to authenticate users in any location, from any device, in a way that integrates simply with their existing identities.
With more than 95% of Fortune 1000 organizations using Windows Server Active Directory on-prem, the industry would likely prefer not to reinvent the wheel or recreate all of their identities. The good news is that they don’t have to because this is exactly what AAD provides in a secure and comprehensive way. AAD combines directory services, advanced identity governance, application access management, and a developer’s identity management platform.
Let’s look at 4 key scenarios for AAD that organizations of all sizes will likely face as they manage identities in the public cloud:
- Many applications, one identity repository.
- Managing identities and access to cloud applications.
- Monitoring and protecting access to enterprise applications.
- Personalizing access and self-service capabilities.
Continue at source…