Partner Integration Series: How to Secure User Login With Access Management and NoPassword

In a recent post, I introduced the ForgeRock Intelligent Authentication strategy - Authentication Trees,  authentication nodes and important features in making the ForgeRock Identity Platform so flexible for customers and partners.

Read More »

What I learned at Identity Live London

Yesterday we held the London edition of our Identity Live series, an event that is always a highlight in the calendar for all of us at ForgeRock. This year was no exception. The whole day was packed with fascinating insights from experts and thought leaders, both from within ForgeRock and across the wider world of identity and digital transformation.

Read More »

Do It Non-Intrusively With Identity Gateway

Previously, we presented an overview of Identity Gateway and how it fits into your organization’s IAM. In the second part of this demo video series, we do a deeper technical dive on how to completely secure your business applications using reverse proxy. Check it out:

 

Read More »

IAM owner? We've got your back.

Identity and Access Management (IAM) is a compelling tool and can be even more effective when used strategically.  The extent of the value depends upon how available you make identity to the business applications and services used in achieving business goals. As an IAM owner, this task is more difficult than it appears. Fortunately, organizations are increasingly understanding the value of IAM and how it is fundamental to digitally transforming business.

Read More »

Open Banking: Are You Ready, Australia?

“Future money will know where it has been, who has been using it and what they have been using it for. The use of cash is already in decline and is certain to vanish from polite society.” David Birch, acclaimed commentator on digital financial services, controversially declares this in his book Before Babylon, Beyond Bitcoin. In it, Birch talks about how technology is changing money and then explores where it might be taking us.

Read More »

User Login Analytics & Metrics: The Deeper Dive

As login journeys become more complex, the need to effectively monitor their performance becomes more important. In our last Intelligent Authentication blog post and video (include link), we covered how User Login Analytics (ULA) provide the necessary tools to deliver metrics and insight that improve login experiences. Using that as a jumping off point, we now do a deep dive into ULA and monitoring the performance of those login journeys. Understanding patterns in how users and devices  access services is critical.

Read More »

Open Banking Hackathon 2018: The Journey Continues

The ForgeRock Open Banking Hackathon was a success! The event featured coders from all over, building applications against a fully working reference implementation of a PSD2 Open Banking standard. Chris Michael, Hackathon Judge and Chief Technology Officer at Open Banking, pointed out that this was the first hackathon to run using the full Open Banking Implementation Entity (OBIE) model bank, calling it 'a world first'.

Read More »

The Science and Art of Designing the Login Journey

Goldilocks may well have ended up an expert in Intelligent Authentication because she was onto something about that bowl of porridge: not too hot, not too cold, but rather just right. The Goldilocks principle, when applied to customer experience, helps determine the acceptable amount, type and detail of friction in a user login journey.

In the latest video in our Intelligent Authentication series, we cover how access to that data helps provide that “just right” experience for your customers.

 

Read More »

What is OAuth2? A Real World Example.

 

What is OAuth2? It can seem quite complicated, but it doesn’t have to be. Before OAuth2, when you needed to give software services access to your account, you had to give that service your username and password. This meant there was no way to tell whether it was you or the agent accessing your data as a third party doing so on your behalf. That agent had access to everything in that account and you’d have to change the account password when you decided to cancel that service.

Read More »

Striving for a New High Water Mark in U.S. Data Privacy Policy: Part 2

In a continuation of my first post around privacy and the rising tide of global data regulation, I explore why “leaning in to consent” is the best way for U.S. companies to ensure smooth sailing with their customers amid the murky waters of data policy innovation.

Read More »

Upcoming Events:

Digital Identity 2018

Brussels, Belgium

IAM is often seen as a technical topic that just costs organizations money. This is simply not the case, as it should be seen as a key enabler for businesses.

Consent & Privacy as the Foundation for a Healthy Digital Ecosystem

Melbourne, Australia

We look forward to seeing you at the next Melbourne Identity Tech Talk, where we will discuss the impact of Consumer data rights (CDR) effecting the Australian ecosystem across various industries. It has never been more important to give consumers the ability to manage and control how their data is shared and used.

Identity Management in Retail

London, England

With more and more shoppers going online, ensuring a first-rate online customer experience is vital. How retailers identify and steer customers through their individual online journeys is key.