Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/15/2014
07:00 AM
Thomas Pedersen
Thomas Pedersen
Commentary
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Active Directory Is Dead: 3 Reasons

These days, Active Directory smells gangrenous to innovative companies born in the cloud and connecting customers, employees, and partners across devices at light speed.

Ninety-five percent of Fortune 500 companies use Active Directory, a 1990s technology, because their infrastructures are based on a 90s network architecture of on-premises PCs, applications, servers, and tools. But look around. Today’s hottest startups –- companies like Dropbox, Uber, Pinterest, and Tumblr -- just snort, and say, “The 90s called, and they want their infrastructure back.”

Full disclosure: I am the CEO and Founder of OneLogin, a cloud-based identity and access management company. Active Directory integration is one of our focus areas.  And though I have other fond memories of the 90s -- Nirvana, X-Files, Hale-Bopp -- Active Directory isn’t one of them. These days, Active Directory smells gangrenous to innovative companies that were born in the cloud and operate at light speed interconnecting customers, employees, and partners across an array of devices and time zones.

Before laughing off the death of Active Directory, remember we also never imagined that Apple would one day have a bigger market capitalization than IBM, or Google would be nine times more valuable than General Motors. Today’s 30-person company is positioning itself to be tomorrow’s 1,500-person company.

Why am I predicting the death of Active Directory?

Fact 1: Active Directory’s complexity slows IT’s ability to respond to business needs.  Originally crafted when IT owned and dictated everything, including the look, feel, and operation of user applications, Active Directory has failed to keep up. Have you tried to implement Single-Sign-On for your legacy, cloud, and mobile apps with Active Directory? If so, this custom integration likely took you months to complete, and probably lacked advanced functionality like multi-factor authentication and rapid deprovisioning (a must when employees or contractors leave an organization). Rinse and repeat the next time you need to add new apps. In an era where business runs on Red Bull, Active Directory is old and bloated.

Fact 2: Active Directory increases the daily IT workload. IT managers tell me they spend too much time integrating new apps into their aging Active Directory infrastructures. This is especially true because most new apps come from the cloud. Furthermore, different user communities require different security policies, and creating a new Active Directory group for every use case is time consuming. Active Directory’s provisioning complexity, coupled with different authentication procedures and decentralized administration, leads to higher identity management costs and frustrated, overworked IT teams. Getting a short-term contractor access to the right apps with the right entitlements should take minutes, not hours or days. Business is constantly being asked to "do more with less," but with Active Directory we get "less with more."

Fact 3: Active Directory encourages bad behavior and increases security risks. Facts 1 and 2 give rise to Shadow IT. Users have figured out they can easily bypass traditional IT to get the services and capabilities they need.  But this has resulted in raising security risk-levels inside the enterprise. For example, poor password hygiene in Shadow IT is rampant. Our own survey of 200 IT leaders showed that 71 percent admit to using unsanctioned apps like Dropbox and Google Apps to get work done, and 44 percent said employees manage passwords on sticky notes and spreadsheets. It’s an IT security nightmare.   

What has been your experience getting Active Directory into the 21st Century? Have you successfully integrated it with your cloud apps? Was that seamless or seemingly endless? What have been your biggest challenges, and what have been the biggest gaps? Share your success stories as well!

Thomas Pedersen is the CEO and founder of OneLogin, where he is now laser-focused on making OneLogin the most widely deployed identity management solution in the cloud. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Page 1 / 3   >   >>
Lorna Garey
100%
0%
Lorna Garey,
User Rank: Ninja
4/15/2014 | 9:28:32 AM
What's the alternative
This is all well and good, but do you really thing there's a better choice right now? Everyone knows how to use AD. Maybe it takes time to integrate new services, but it's doable. Yes, "different user communities require different security policies, and creating a new Active Directory group for every use case is time consuming." But IT has to manage roles, not individuals. The other way leads to anarchy. 

What would you suggest for a company that doesn't have 30 employees, lives on Red Bull and is all cloud all the time?

 
snake oil antedote
67%
33%
snake oil antedote,
User Rank: Apprentice
4/15/2014 | 10:19:55 AM
Horrible AD Assessment
This is truly a sensationalistic piece at best. To headline AD is dead then to fall back and say its a predictive analysis, shows the true intent of a marketing veiled security article with bad analysis.  Any RBAC, MAC, DAC based model has overhead, in fact good security will require it. It's important to temper the cloud-fare with a balanced approach. As long as there are brick-mortar establishments, its not sound security to have a multi-tenant auth solution authenticate your every app. Even for apps interfacing with AD, you have ADFS as a recourse which the author excludes. An article that only critiques a technology w/o proposing viable solutions should be received w/ caution.
orinthomas
67%
33%
orinthomas,
User Rank: Apprentice
4/15/2014 | 10:26:21 AM
Marketing rather than technical argument
"Why am I predicting the death of Active Directory?"

Because you're running a company that's trying to compete with it and you are trying to look relevant?
Thomas B. Pedersen
0%
100%
Thomas B. Pedersen,
User Rank: Author
4/15/2014 | 10:39:58 AM
Re: What's the alternative
The first application a startup needs is email. But when you start a company today, your first inclination is probably not to drive down to your local computer store and purchase Microsoft Exchange and Office. More likely, you will sign up your team for Google Apps and get email and productivity suite all-in-one.

And then you work your way from there. You'll quickly be adding more applications so you can build, market and sell your product or service. Soon you will realize that the number of passwords your company is managing is out of control and that you need some way to control access and relieve your busy employees of their password fatigue. At this stage of your company, Active Directory will do nothing to propell your company forward. It will only limit your agility and make things more complicated for everyone.

Your company will be best served by deploying a cloud-based identity provider, such as OneLogin. The advantage of this approach is that it becomes very easy to onboard new employees and applications. You centralize user management and access control and have a much better view of your identity footprint. And it was just as easy to get in place as that Google Apps account your company started out with.

 

 

 
MauriceB786
67%
33%
MauriceB786,
User Rank: Apprentice
4/15/2014 | 10:48:40 AM
Re: What's the alternative
I came to point out that this is a thinly veiled ad for a service that's targeted at people who have no business touching a domain controller. Instead I will point out that everything this product does and I do mean EVERYTHING you can already do with Windows.  You just have to find an admin who's willing to step away from the GUI and get their hands dirty with a small bit of PowerShell.  That's just for the sync'ing everything with the same password stuff.

Delegated rights have been in AD from day one.

When properly configured (read: AD Sites and Services setup along with proper connectors) replication isn't an issue.

What's irritating is that this is being peddled like it's real news and I fear some poor IT Manager is going to be forced to sit in a three hour meeting justifying some headcount.

Incidenally I'm putting as an open challenge Mr.Pederson, that your product doesn't do anything that a decently resourced IT team can't. 

In fact I'd go as far to argue that your product hurts IT departments by giving a false sense of security , hiding people from the complexity of their decisions.
MauriceB786
50%
50%
MauriceB786,
User Rank: Apprentice
4/15/2014 | 11:15:42 AM
Re: What's the alternative
If we go with your assertion of what a startup needs, then Google would be the dead last place I'd go as they usually need secrecy and Google doesn't go in for that very much.  It's also a lot of fun migrating off as well. 

Most orgs when they're mature enough to need something like AD are ready to hire an EXPERT to do it for them.  You're neglecting to mention the fact that you're freqently going to run into systems where the password complexity requirements are incompatable.


This isn't taking into consideration audit and compliance issues.


One last thing, while you don't say it, I'd be willing to bet your service is largely open source.  What do you use fo your login services?
Thomas B. Pedersen
50%
50%
Thomas B. Pedersen,
User Rank: Author
4/15/2014 | 11:28:58 AM
Re: What's the alternative
Maurice,

While our stack (Rails, Postgres, Ubuntu) is open-source, OneLogin has been written from the ground up by us. We don't use any larger open-source components for our identity functionality.

Thomas
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/15/2014 | 11:50:31 AM
Re: What's the alternative
Incidenally I'm putting as an open challenge Mr.Pederson, that your product doesn't do anything that a decently resourced IT team can't. 

@MauriceB786 
What are the specific things that you believe a cloud-based identity management solution can't do that Active Directory does.
Thomas B. Pedersen
50%
50%
Thomas B. Pedersen,
User Rank: Author
4/15/2014 | 11:58:27 AM
Re: What's the alternative
Maurice,

You hit the nail on the head right there. A decently resourced IT team can accomplish anything, but do you really want to throw resources at all problems or would you rather leverage commercially available solutions that can automate and streamline your processes?

We talk to a ton of companies about their identity management challenges and a common theme is that they don't want to invest more resources in configuring ADFS (Active Directory Federation Services). Not only is ADFS unreasonably complex, but it also does not solve problems most of the problems they are strugging with, such as:
  • User provisioning
  • Multi-factor authentication
  • Password reset
  • Apps that don't support federation
  • Easy-to-use SSO portals that increase productivity

The conversation is just as much about business agility and focusing on your core competences. It's a hyper competitive business environment and you can't be an identity laggard and stay competitive.

Thomas

 
MauriceB786
100%
0%
MauriceB786,
User Rank: Apprentice
4/15/2014 | 12:07:20 PM
Re: What's the alternative
I may have worded that poorly.

I meant what value-add is it?

What can it do that I can't?

This is speaking as someone well-versed in automation, AD, and generally making people say "I didn't know it could do that."



I'm generally leery when someone asserts that any one product can solve all problems.

So of course there will be edge cases that aren't within a reasonable scope for spending developer cycles on, but are those cases in that catagory because there wasn't sufficent documentation out there saying, "Hey ADFS can do _____ ".

 

Or the admin didn't know to look for it?
Page 1 / 3   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6342
PUBLISHED: 2020-05-28
An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.
CVE-2020-11082
PUBLISHED: 2020-05-28
In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
CVE-2020-5357
PUBLISHED: 2020-05-28
Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time wi...
CVE-2020-13660
PUBLISHED: 2020-05-28
CMS Made Simple through 2.2.14 allows XSS via a crafted File Picker profile name.
CVE-2020-11079
PUBLISHED: 2020-05-28
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.