Simply Connect Applications, Devices and Services – From Yesterday to the Internet of Things

In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things.

A perfect complement to our access management system or as a stand-alone gateway, our Identity Gateway, part of the ForgeRock Identity Platform, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes.

Product Brief

Identity Gateway In Short

Download our datasheet, which provides an overview of our identity gateway solution

Customer Story

Powering digital transformation at the BBC with scalable, flexible identity management

Overview

Get the details

With Identity Gateway you can connect legacy systems and the IoT

Blog

IAM owner? We've got your back.

Identity and Access Management (IAM) is a compelling tool and can be even more effective when used strategically. 

Get Started Here

Get the technical resources and documentation to get started with ForgeRock Identity Gateway

Get Started Here
Gateway Guide

Instructions for installing and configuring ForgeRock Identity Gateway.


Deployment Guide

Tutorials for deploying ForgeRock Identity Gateway with Docker, with best practices for containerized deployment in production environments.


Full Documentation

Complete Identity Gateway documentation.

Zero Trust and Identity: Evolving from Castles to Cities

The common analogy for protecting computer networks has typically been that of the castle, complete with big walls and surrounding moat. Though this is a good one, the growth and innovation in security technology, including the Zero Trust Model, add complexities. Let’s take a look and see if the analogy still stands.  

 

Read More »

Augment Your Legacy IAM

Have you ever run into a situation where you know exactly what you have to do to solve the problem but can’t do it? No, I’m not talking about fixing the last season of Game of Thrones. For those running legacy identity and access management (IAM) systems, the decision to modernize isn't so much about whether there is a problem but rather how to go about solving it.

Read More »

Modernize IAM for Government: A Real World Example

I recently had the chance to do a podcast with my friend and colleague Tommy Cathey, ForgeRock RVP of Public Sector. Tommy and I have worked together for years, and I am thrilled that he is bringing his deep public sector knowledge to ForgeRock (and this podcast). In this podcast with Statescoop, we discussed how the State of Utah and other government agencies are cutting operating costs while improving citizen services & security through a consolidated IAM project.

Read More »

How to Compare Digital Identity Providers for CIAM

Comparing and selecting digital identity providers for CIAM (customer identity and access management) is a daunting task. With the fast-paced nature of business and technology today, you need to ensure that you’re not only able to meet all your current requirements, but those to come. So, where to begin?

Read More »

Disrupt or Be Disrupted: The Power of the Disruptive Economy

As one of the leading and most comprehensive digital identity providers on the market, we keep a finger on the pulse of trends necessitating better identity.  As part of this ongoing practice, we have identified six important trends that are actively and interdependently shaping business and society — adding complexity to the landscape that organizations must navigate. To survive and thrive, organizations must be equipped to address each trend.

Read More »

Leveraging AD Nested Groups With AM
1 month 1 week ago
This article comes from an issue raised by multiple customers, where ForgeRock Access Management (AM) was not able to retrieve a user’s group memberships when using Active Directory (AD) as a datastore with nested groups. I’ve read in different docs about the “embedded groups” expression, as well as the “transitive groups” or “recursive groups” or “indirect groups”, and finally, the “parent […]
Cyril Grosjean
Proof of Concept
1 month 1 week ago
This article is an overview of a proof of concept (PoC) we recently completed with one of our partners. The purpose was to demonstrate the ability to use the ForgeRock Identity platform to quickly provide rich authentication (such as biometric authentication by face recognition), and authorization capabilities to a custom mobile application, written from scratch. Indeed, it took about two […]
Cyril Grosjean
Overview of Options of Authentication By Face Recognition in ForgeRock Identity Platform
1 month 1 week ago
The following table provides solution designers and architects with a comparative overview of the different options available as of today to for authentication by face recognition to a ForgeRock Identity platform deployment. The different columns represent some important criteria to consider when one searches for such a solution, some criteria is self-explanatory while the others are detailed below: The Device […]
Cyril Grosjean
An All Active Persistent Data Layer? No Way! Yes Way!
1 month 1 week ago
Problem statement Most database technologies (Cloud DB as a Service offerings, traditional DBs, LDAP services, etc.) typically run in a single primary mode, with multiple secondary nodes to ensure high availability. The main rationale is it’s the only surefire way to ensure data consistency, and integrity is maintained. If an active topology was enabled, replication delay (the amount of time […]
Darinder Singh Shokar
Immutable Deployment Pattern for ForgeRock Access Management (AM) Configuration without File Based…
1 month 2 weeks ago
Immutable Deployment Pattern for ForgeRock Access Management (AM) Configuration without File Based Configuration (FBC) Introduction The standard Production Grade deployment pattern for ForgeRock AM is to use replicated sets of Configuration Directory Server instances to store all of AM’s configuration. The deployment pattern has worked well in the past, but is less suited to the immutable, DevOps enabled environments of today. […]
Darinder Singh Shokar
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

Your Customers...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices...they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact. 

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW