Authorization – Granting Access in an IoT World

Customers and employees want simple, seamless, and secure access to resources, without being burdened by complex security requirements. With the explosion of the internet of things, IoT devices like switches, locks, lights, pet doors and cars, trusted authorization and access management is more critical than ever.

With the ForgeRock Identity Platform, you can establish simple and flexible access and authorization policies, from basic, simple, coarse-grained rules to rich, powerful, fine-grained entitlements with contextual understanding.

  • Flexible coarse- and fine-grained authorization – your choice.
  • Quickly add or update policies, without modifying underlying applications.
  • Authorize how IoT data is shared based on dynamic information.
  • Secure access to physical resources, like doors, buttons, or switches with fine-grained authorization
  • Empower users with delegated authorization of their data between cloud, mobile, IoT, and other devices and locations with User-Managed Access.

Continuous Authorization

Most solutions only protect at initial authentication. Apply contextual identity, fine-grained authentication, adaptive risk, multi-factor authentication, and push authorization at the time of authentication as well as at any point during a digital session. Our continuous security approach ensures authenticity of people, things, and services at all times and can mitigate risk whenever an anomaly is detected, even during existing sessions.

Contextual Authorization

Build context-based intelligence into policies to protect resources at the time of access, not just based on context during authentication.

  • Ensure authenticity of users, devices, things, and services at all times with contextual and continuous authorization that can mitigate risk whenever an anomaly is detected, even during existing sessions.
  • Deliver a way to build secure and dynamic policies to assess risk at resource-access time.
  • Call external policy information points with easy to write scripts to gain greater knowledge about who the user is and what their context is.
  • Use context to assess risk, requiring stronger authentication mechanisms only when necessary to make it easier for users while maintaining system security.

Need help planning your identity and access management project?

Secure Access for Users, Devices & Thing


Authorization in Action

Authorization policies, from basic, simple, coarse-grained rules to highly advanced, fine-grained entitlements, can secure not just applications and web resources, but also the Internet of Things (IoT) and services.

Technical Resources

Get the technical details on the ForgeRock Access Management offering:

High Performance Policy Engine & Editor

Deliver greater control over who can do what, when, and under which conditions with a modern UI that makes it easier, faster, and more efficient to implement fine-grained authorization with point and click, drag and drop operations. Sophisticated policies can be built to deliver controlled access to resources and you can also define permissions and policies that reflect the complex and dynamic relationships between people, things, devices, and services that are connected online.

Universal Authorization Beyond URLs for the IoT

Externalizing authorization enables policy updates without the lengthy time it takes to re-code applications. With Universal Authorization, you can define your own resource types (such as cars, door locks, and light bulbs) with custom actions, enabling you to build solution-specific policies. This is an ideal way to secure IoT devices, eliminating unchecked access and letting ForgeRock Access Management enforce policy decisions before allowing connections to the device.