Identity-as-a-Service (IDaaS)


IDaaS is an acronym for Identity-as-a-Service, and it refers to identity and access management services that are offered through the cloud or SaaS (software-as-a-service) on a subscription basis.

This is in contrast to traditional identify and access management (IAM) solutions that are typically completely on-premises and delivered via bundled software and/or hardware means. These systems also tend to rely heavily on Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP) for their IAM services.
Hybrid IAM Solutions and Pure IDaaS Services

Bridging the gap between traditional IAM software and native IDaaS options are hybrid IAM solutions from vendors like Microsoft and Amazon that provide cloud-based directories which link with on-premises IAM systems.

Native cloud-based IDaaS solutions from vendors like Okta and Centrify, as well as VMware with its new Identity Manager service, have started to gain traction as enterprises continue to accelerate and manage the adoption of cloud and mobile services.

These IDaaS solutions provide a range of identity and access management services such as:

Single Sign-On (SSO) functionality through the cloud
Federated Identity Management for Access Governance
Password Management

Gartner projects pure IDaaS services to comprise 25% of the total IAM market by the end of 2015, versus just four percent in 2011.

Read Also:

  • Identity and Access Management (IAM)

    An acronym for Identity and Access Management, IAM refers to a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. Also called identity management (IdM), IAM systems fall under the overarching umbrella of IT security. Identity and access management systems not only identify, […]

  • Shadow IT

    Shadow IT is a term that refers to Information Technology (IT) applications and infrastructure that are managed and utilized without the knowledge of the enterprise’s IT department. Shadow IT can include hardware, software, web services or cloud applications that employees turn to without IT authorization to accomplish their tasks and projects. Shadow IT has become […]

  • Human Capital Management (HCM)

    Human capital management (HCM) is a business philosophy that emphasizes the enhancement of employees while viewing them as a quantifiable asset whose future value can be increased through investment. Employees are perceived as assets that can be provided with clear performance expectations, against which they can be rated and rewarded based on their progress over […]

  • Infrastructure

    A marketing phrase that serves to group a variety of software-defined computing technologies into one overarching moniker. The umbrella of Software-Defined Everything (SDE) technologies includes, among other terms, software-defined networking (SDN), software-defined computing, software-defined data centers (SDDC), software-defined storage (SDS) and software-defined storage networks. With Software-Defined Everything, the computing infrastructure is virtualized and delivered as […]

  • Snappy Ubuntu

    Snappy Ubuntu is an optimized lightweight version of the Ubuntu Linux operating system developed for mobile, cloud, containers, embedded and other Internet of Things (IoT) devices. Snappy Ubuntu made its official debut with the April 2015 “Vivid Vervet” Ubuntu 15.04 release. Canonical, the developers of Ubuntu, created the Snappy Ubuntu Core Linux OS so that […]


Disclaimer: Identity-as-a-Service (IDaaS) definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.