Group Policy Objects (GPOs) for Linux®

Group Policy Objects (GPOs) for Linux® would be a dream come true for IT admins. Unfortunately, GPOs are a unique feature of the Microsoft® Active Directory® (AD) platform that only…
The post Group Policy Objects (GPOs) for Linux®… Continue reading Group Policy Objects (GPOs) for Linux®

Identity Management Category Directory Services

The identity management landscape is changing rapidly. In fact, it may be one of the hottest IT markets and has been for the last few years. The confluence of cloud…
The post Identity Management Category Directory Services appeared first on JumpCloud… Continue reading Identity Management Category Directory Services

Beyond SSO

Web application single sign-on (SSO) is an important category and a useful tool for IT organizations. This is especially true since the average small to mid-sized business uses 50+ SaaS…
The post Beyond SSO appeared first on JumpCloud.
The post Beyon… Continue reading Beyond SSO

G Suite Identity Bridge – Connecting On-prem with the Cloud

As IT admins are shifting their infrastructure to the cloud with solutions such as G Suite®, the question becomes how do you bridge identities between the on-prem world and the…
The post G Suite Identity Bridge – Connecting On-prem with th… Continue reading G Suite Identity Bridge – Connecting On-prem with the Cloud

Outsourced Identity and Access Management

Identity and access management (IAM) is a trending topic within modern IT circles. IAM has historically been provided by complicated on-prem identity providers (IdPs) like Microsoft® Active Directory® (AD) or…
The post Outsourced Identity a… Continue reading Outsourced Identity and Access Management

How Can I Manage My Mac Fleet?

As Mac systems become more popular and infiltrate mainstream corporations, there are significant challenges for IT organizations. Historically, popular sets of IT management tools have been focused on Windows rather…
The post How Can I Manage My Mac … Continue reading How Can I Manage My Mac Fleet?

Centralized Identity and Access Management

Centralized identity and access management (IAM) is highly sought after in modern IT organizations. However, achieving centralized IAM is easier said than done. This is primarily because most IT organizations…
The post Centralized Identity and Access… Continue reading Centralized Identity and Access Management

The Best SSO Solution

Single sign-on (SSO) has become an important category in the identity and access management (IAM) market. Yet, with so many choices, IT admins want to know what the best SSO…
The post The Best SSO Solution appeared first on JumpCloud.
The post The Be… Continue reading The Best SSO Solution

The Best SSO Solution

Single sign-on (SSO) has become an important category in the identity and access management (IAM) market. Yet, with so many choices, IT admins want to know what the best SSO…
The post The Best SSO Solution appeared first on JumpCloud.
The post The Be… Continue reading The Best SSO Solution

Hosted IdP

The identity provider (IdP) is one of the most important pieces of an IT network. This core piece of IT infrastructure is what connects users to IT resources and gives…
The post Hosted IdP appeared first on JumpCloud.
The post Hosted IdP appeared fir… Continue reading Hosted IdP