Control Access for People, Services, and Things

Our approach to access management? One system to rule them all. One thing to download and deploy, providing comprehensive access management capabilities to control access to all the things in your world–digital and physical.

Be the lord of the things, with a platform that helps you easily create innovative products and services, with identity at the center of everything. Leave behind the typical legacy troll offering a grab bag of disparate products to integrate.

ForgeRock Access Management bridges the gap. You deploy once, use what you want, and incrementally extend your capability as needed–without jumping through procurement and deployment hoops every time.

Analyst Report

ForgeRock named a Visionary

See why ForgeRock was named a Visionary in the Gartner Magic Quadrant for Access Management, Worldwide (August 2019).

Product Brief

Access Management in Short

Download our datasheet, which provides an overview of our access management solution.

Analyst Report

Leader in Adaptive Authentication

See why ForgeRock was identified as a leader by KuppingerCole in the adaptive authentication space.

Overview

Get the details

Learn more about how you can secure access for customers, applications and IoT

 

Deliver Dynamic Personalization

Irrelevant content can frustrate consumers. Intelligent Authentication helps you deliver dynamic content by using context to drive personalization. Digital signals like user device, location, and time can be leveraged in real-time to build dynamic web personalization content. This informs downstream applications, and ultimately helps you to develop offers aligned with customer expectations.

LEARN MORE

Get Started Here

Get the technical resources and documentation to get started with ForgeRock Access Management

Technical Resources
Deployment Planning Guide

Guide to planning ForgeRock Access Management deployments.


Development Guide

Guide to developing REST clients and scripts.


Intelligent Authentication Development Guide

Guide to developing authentication nodes for use in ForgeRock Access Management authentication trees.


Full Documentation

Complete Documentation for Access Management

Prevent Data Breaches: How to Build Your AI/ML Data Pipeline

Identity platforms like ForgeRock are the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This also makes them perfectly positioned to gather rich log identity data to use for preventing data breaches.

Read More »

Zero Trust and Identity: Evolving from Castles to Cities

The common analogy for protecting computer networks has typically been that of the castle, complete with big walls and surrounding moat. Though this is a good one, the growth and innovation in security technology, including the Zero Trust Model, add complexities. Let’s take a look and see if the analogy still stands.  

 

Read More »

Augment Your Legacy IAM

Have you ever run into a situation where you know exactly what you have to do to solve the problem but can’t do it? No, I’m not talking about fixing the last season of Game of Thrones. For those running legacy identity and access management (IAM) systems, the decision to modernize isn't so much about whether there is a problem but rather how to go about solving it.

Read More »

Modernize IAM for Government: A Real World Example

I recently had the chance to do a podcast with my friend and colleague Tommy Cathey, ForgeRock RVP of Public Sector. Tommy and I have worked together for years, and I am thrilled that he is bringing his deep public sector knowledge to ForgeRock (and this podcast). In this podcast with Statescoop, we discussed how the State of Utah and other government agencies are cutting operating costs while improving citizen services & security through a consolidated IAM project.

Read More »

How to Compare Digital Identity Providers for CIAM

Comparing and selecting digital identity providers for CIAM (customer identity and access management) is a daunting task. With the fast-paced nature of business and technology today, you need to ensure that you’re not only able to meet all your current requirements, but those to come. So, where to begin?

Read More »

IDM Deployment Patterns — Centralized Repo- Based vs. Immutable File-Based
3 days 8 hours ago
Introduction I recently blogged about how customers can architect ForgeRock Access Management to support an immutable, DevOps style deployment pattern — see link. In this post, we’ll take a look at how to do this for ForgeRock Identity Management (IDM). IDM is a modern OSGi-based application, with its configuration stored as a set of JSON files. This lends itself well to […]
Darinder Singh Shokar
Push Protocol – Challenge/Response & Registration Redux
3 weeks 2 days ago
Overview Push authentication depends on the secure verification of information sent from the server to the client, and from the client to the server. This lets the server verify that the notification was received by the original device, and for the device to verify that only the server sent the original request.This approach is achieved by a combination of communication […]
David Luna
Leveraging AD Nested Groups With AM
2 months ago
This article comes from an issue raised by multiple customers, where ForgeRock Access Management (AM) was not able to retrieve a user’s group memberships when using Active Directory (AD) as a datastore with nested groups. I’ve read in different docs about the “embedded groups” expression, as well as the “transitive groups” or “recursive groups” or “indirect groups”, and finally, the “parent […]
Cyril Grosjean
Proof of Concept
2 months ago
This article is an overview of a proof of concept (PoC) we recently completed with one of our partners. The purpose was to demonstrate the ability to use the ForgeRock Identity platform to quickly provide rich authentication (such as biometric authentication by face recognition), and authorization capabilities to a custom mobile application, written from scratch. Indeed, it took about two […]
Cyril Grosjean
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

Your Customers...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices...they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact. 

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started With the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW