What is Identity Management?

Identity Management allows you to comprehensively and securely manage the complete identity lifecycle of people and services across all kinds of devices. Whether at home or work, on mobile or in the car, identity management lets you be you. 

As the combined number of people, devices, services, and things continues to grow by the billions, the need for a identity management has become a must-have tool for winning and protecting customers. From digital identity to device registration, provisioning, synchronization, reconciliation, and more, your users and customers are safe as they move between devices and services. When your customers feel safe engaging with your products and services, and your critical assets are safe from harm, everyone wins.

Product Brief

Identity Management in Short

Download our datasheet, which provides an overview of our identity management solution.

Customer Story

BBC Success Story

See how BBC creates a personalized customer experience across digital channels.

Overview

Get the details

Get the details on how we help digital businesses manage billions of relationships.

IDENTITY IN RETAIL

 

MY DIGITAL IDENTITY

 

CUSTOMER PRIVACY

 
Identity Management

Progressive Profiling

Simplify registration with automated and dynamic forms that enable you to ask customers the right questions at the right time of their journey.

Identity Management

Workflow Engine

Provide workflow-driven activities, such as requests for entitlements, roles or resources, handling approvals with escalations, and more.

Identity Management

Privacy Management

Give people the power to control their personal information, security, and privacy preferences. Put your customers first.

Get Started Here

Get the technical resources and documentation to get started with ForgeRock Identity Management

Technical Resources
Installation Guide

Guide to ForgeRock Identity Platform modules. 


Integrator's Guide

Guide to configuring and integrating ForgeRock Identity Management


Full Documentation

Complete documentation for Identity Management

How to Compare Digital Identity Providers for CIAM

Comparing and selecting digital identity providers for CIAM (customer identity and access management) is a daunting task. With the fast-paced nature of business and technology today, you need to ensure that you’re not only able to meet all your current requirements, but those to come. So, where to begin?

Read More »

Disrupt or Be Disrupted: The Power of the Disruptive Economy

As one of the leading and most comprehensive digital identity providers on the market, we keep a finger on the pulse of trends necessitating better identity.  As part of this ongoing practice, we have identified six important trends that are actively and interdependently shaping business and society — adding complexity to the landscape that organizations must navigate. To survive and thrive, organizations must be equipped to address each trend.

Read More »

Four Key Customer Journeys for Virtual Banks

Virtual Banking is here. The recent issue of new Virtual Banking licenses in Hong Kong and the upcoming licenses in Singapore have spurred the need for building new age banking systems that leverage the latest technology stack. This is a great opportunity for some of the existing banks to re-imagine and rebuild their banking architecture, while for new entrants it’s an opportunity to define and build a modern banking solution; efficient and future proof.

Read More »

Prevent Data Breaches: Making Sure The Algorithms Work

An identity platform like ForgeRock is the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This is a very nice position to gather rich log identity data to use to prevent data breaches. In my previous blog, I discussed how we detect data breaches using identity logs.

Read More »

Is Your IAM Vendor Keeping up with the Cloud?

The ForgeRock Identity and Access Management  Platform can be deployed in many different cloud services like AWSGoogle, Azure, and even in Alibaba Cloud very recently by a partner. Being able to support a cloud deployment model is one thing, but keeping up with the changes in the cloud at the pace they are happening is where ForgeRock excels.

Read More »

Leveraging AD Nested Groups With AM
1 week 2 days ago
This article comes from an issue raised by multiple customers, where ForgeRock Access Management (AM) was not able to retrieve a user’s group memberships when using Active Directory (AD) as a datastore with nested groups. I’ve read in different docs about the “embedded groups” expression, as well as the “transitive groups” or “recursive groups” or “indirect groups”, and finally, the “parent […]
Cyril Grosjean
Proof of Concept
1 week 3 days ago
This article is an overview of a proof of concept (PoC) we recently completed with one of our partners. The purpose was to demonstrate the ability to use the ForgeRock Identity platform to quickly provide rich authentication (such as biometric authentication by face recognition), and authorization capabilities to a custom mobile application, written from scratch. Indeed, it took about two […]
Cyril Grosjean
Overview of Options of Authentication By Face Recognition in ForgeRock Identity Platform
1 week 3 days ago
The following table provides solution designers and architects with a comparative overview of the different options available as of today to for authentication by face recognition to a ForgeRock Identity platform deployment. The different columns represent some important criteria to consider when one searches for such a solution, some criteria is self-explanatory while the others are detailed below: The Device […]
Cyril Grosjean
An All Active Persistent Data Layer? No Way! Yes Way!
1 week 4 days ago
Problem statement Most database technologies (Cloud DB as a Service offerings, traditional DBs, LDAP services, etc.) typically run in a single primary mode, with multiple secondary nodes to ensure high availability. The main rationale is it’s the only surefire way to ensure data consistency, and integrity is maintained. If an active topology was enabled, replication delay (the amount of time […]
Darinder Singh Shokar
Immutable Deployment Pattern for ForgeRock Access Management (AM) Configuration without File Based…
2 weeks 3 days ago
Immutable Deployment Pattern for ForgeRock Access Management (AM) Configuration without File Based Configuration (FBC) Introduction The standard Production Grade deployment pattern for ForgeRock AM is to use replicated sets of Configuration Directory Server instances to store all of AM’s configuration. The deployment pattern has worked well in the past, but is less suited to the immutable, DevOps enabled environments of today. […]
Darinder Singh Shokar
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

Your Customers...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices...they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact. 

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW