Common Services

One Platform to Rule Them All

We believe in a developer-friendly fellowship underpinning everything we do. Our identity services are shared across the entire platform to eliminate typical inefficiencies: no more hours spent reconciling multiple APIs, UIs, files, documentation, elves and squirrels, what have you.

The platform was designed from the ground up for realistic, human-grade scale. You have billions of identities? We have massive scale, session-failover, and high availability to match. All that’s left to consider is what to do with the time that is given to you.

Product Overview

Identity Platform in Short

Get the basics on our identity and access management solution

Analyst Report

Leader in Adaptive Authentication

KuppingerCole named ForgeRock a leader in the adaptive authentication space

Overview

Get the Details

Learn more about how you can secure access for, customers, applications and IoT

Get Started Here

 

Get the technical resources and documentation to get started with ForgeRock Common Services

Get Started here
REST Framework

Access web resources and collections of resources using the Common REST API.


Platform Guide

Overview of the ForgeRock Identity Platform

The Evolving Identity Cloud

At ForgeRock, we’ve been providing identity solutions since before it was cool. Founded on open source identity tools originally built by Sun Microsystems nearly a decade ago, ForgeRock continues to lead the market in comprehensive and innovative identity solutions. We've long participated in Internet Engineering Task Force (IETF).

Read More

What Our Identity Cloud Platform Milestone Means

It’s a very exciting day for the entire ForgeRock team. The release of the ForgeRock Identity Cloud is a big step forward in our company’s transformation and our ambition to lead the next era of digital identity. 

Read More

Prevent Data Breaches: How to Build Your AI/ML Data Pipeline

Identity platforms like ForgeRock are the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This also makes them perfectly positioned to gather rich log identity data to use for preventing data breaches.

Read More

Zero Trust and Identity: Evolving from Castles to Cities

The common analogy for protecting computer networks has typically been that of the castle, complete with big walls and surrounding moat. Though this is a good one, the growth and innovation in security technology, including the Zero Trust Model, add complexities. Let’s take a look and see if the analogy still stands.  

 

Read More

Augment Your Legacy IAM

Have you ever run into a situation where you know exactly what you have to do to solve the problem but can’t do it? No, I’m not talking about fixing the last season of Game of Thrones. For those running legacy identity and access management (IAM) systems, the decision to modernize isn't so much about whether there is a problem but rather how to go about solving it.

Read More

Configuring ForgeRock AM Active/Active Deployment Routing Using IG
19 hours 32 minutes ago
Introduction The standard deployment pattern for ForgeRock Identity Platform is to deploy the entire platform in multiple data centers/cloud regions. This is ensures the availability of services in case of an outage in one data center. This approach also provides performance benefits, as the load can be distributed among multiple data centers. Below is the example diagram for Active/Active deployment: […]
Charan Mann
IDM Deployment Patterns — Centralized Repo- Based vs. Immutable File-Based
6 days 18 hours ago
Introduction I recently blogged about how customers can architect ForgeRock Access Management to support an immutable, DevOps style deployment pattern — see link. In this post, we’ll take a look at how to do this for ForgeRock Identity Management (IDM). IDM is a modern OSGi-based application, with its configuration stored as a set of JSON files. This lends itself well to […]
Darinder Singh Shokar
Push Protocol – Challenge/Response & Registration Redux
3 weeks 5 days ago
Overview Push authentication depends on the secure verification of information sent from the server to the client, and from the client to the server. This lets the server verify that the notification was received by the original device, and for the device to verify that only the server sent the original request.This approach is achieved by a combination of communication […]
David Luna
Leveraging AD Nested Groups With AM
2 months ago
This article comes from an issue raised by multiple customers, where ForgeRock Access Management (AM) was not able to retrieve a user’s group memberships when using Active Directory (AD) as a datastore with nested groups. I’ve read in different docs about the “embedded groups” expression, as well as the “transitive groups” or “recursive groups” or “indirect groups”, and finally, the “parent […]
Cyril Grosjean
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

YOUR CUSTOMERS...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices...they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact. 

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW