User-Managed Access

Secure Delegated Authorization that Builds Privacy, Consent and Trusted Relationships

Privacy regulations, like GDPR, impact all organizations holding personally identifiable information. Void of compliance, organizations can suffer disastrous repercussions  in the form of  enormous fines and even imprisonment of executives. Further, lax privacy practices can cost an organization reputation and ultimately consumer trust. But new regulations don’t have to bring only doom and gloom. Savvy businesses can leverage these regulations as a way to build trust with their customers.

Organizations can opt for a contextual privacy methodology which takes the burden away from the business and puts it into the hands of the consumer – ultimately building trusted relationships necessary for successful digital transformation.

User-Managed Access, UMA, gives your customers and employees a convenient way to determine who and what gets access to personal data, for how long, and under what circumstances.  Users delegate access through a simple “Share” button in your app, and can monitor and manage sharing preferences all through a central console.

Do More With User-Managed Access
Product Brief

Learn how UMA can help you protect user privacy with a simple user experience

Customer Identity

The Guide to Trusted Digital Relationships with Customer Identity and Access Management (CIAM)

Overview

IoT and other new technologies require modern solutions like UMA for privacy and consent

No More Data About You, Without You

With UMA, sharing information is simple. While there are a few consent tools out there that go beyond the post-compliance opt-in and opt-out checkboxes, they are proprietary, thus limiting sharing capabilities to within the organization. Other privacy and consent tools lack options to empower consumers, such as granular access controls to determine who can do what with their data, the ability to revoke data access at will, and the security needed to prove who is accessing data.

 
Get Started Here

Get the technical resources and documentation to get started with ForgeRock User-Managed Access

Technical Resources
User-Managed Access (UMA) 2.0 Guide

Guide to configuring and using UMA features in ForgeRock Access Management.


Customizing UMA

Guide to Extending UMA Services with custom functionality to fit your deployment


Access Management Guide

Full Access Management documentation.

The IoT Opportunity: Caterpillar

Tom Bucklar, Director of IoT at Caterpillar, is using IoT-enabled solutions to create more value for his customers. While an industrial organization, Caterpillar looks to partner with a variety of industries to gain more consumer insights and solve their customers’ challenges. In this interview, Tom tells Hot Topics about the biggest opportunities of today enabled by connected technologies.

Read More »

IdentityLive Austin Fireside Chat

One of the happier developments at last month's IdentityLive Austin Summit was that we were able to involve the Center for Identity from the University of Texas at Austin into a couple of our sessions in the person of Ryan Anderson, Director of Strategic Partners and Outreach.

Read More »

Driving Digital Identity Forward - Amazon's Alexa and the Connected Car

At CES this year, there were no less than five separate announcements of how Alexa was being integrated into automobiles. This was another step in Amazon’s strategy of putting Alexa, as VentureBeat explained, “everywhere: ubiquitous, omnipresent, and all-knowing, like some AI god.”

Read More »

ForgeRock Digital Badges - Signposts to Digital Identity Expertise

Want to become a ForgeRock expert?  Here’s how in five simple steps.

Becoming an expert is hard work, and finding your route there is often harder. In the world of digital transformation, expertise is central to unlocking the value in your business. So how can you make your journey to new skills easier, and earn recognition for your growing expertise along the way? The answer to that is ForgeRock digital badges.

Read More »

ForgeRock on Winning Team for TM Forum Catalyst Award

Catalyst Team Awards
ForgeRock’s team brought home a TM Forum Catalyst Award for demonstrating a working model of Smart City Digital Platform.

We’re excited to announce that ForgeRock was a member of the TM Forum Catalyst team that won the 2018 award for 

Read More »

Monitoring the ForgeRock Identity Platform 6.0 using Prometheus and Grafana
2 weeks 6 days ago
All products within the ForgeRock Identity Platform 6.0 release include native support for monitoring product metrics using Prometheus and visualising this information using Grafana.  To illustrate how these product metrics can be used, alongside each products’ binary download on Backstage, you can also find a zip file containing Monitoring Dashboard Samples.  Each download includes a README file which explains how […]
Craig McDonnell
ForgeRock Identity Platform Version 6: Integrating IDM, AM, and DS
1 month 1 week ago
For the ForgeRock Identity Platform version 6, integration between our products is easier than ever. In this blog, I’ll show you how to integrate ForgeRock Identity Management (IDM), ForgeRock Access Management (AM), and ForgeRock Directory Services (DS). With integration, you can configure aspects of privacy, consent, trusted devices, and more. This configuration sets up IDM as an OpenID Connect / […]
Mike Jang
Runtime configuration for ForgeRock Identity Microservices using Consul
1 month 3 weeks ago
The ForgeRock Identity Microservices are able to read all runtime configuration from environment variables. These could be statically provided as hard coded key-value pairs in a Kubernetes manifest or shell script, but a better solution is to manage the configuration in a centralized configuration store such as Hashicorp Consul. Managing configuration outside the code as such has been routinely adopted […]
Javed Shah
Token Exchange and Delegation using the ForgeRock Identity Microservices
2 months 2 weeks ago
In 2017 ForgeRock introduced an Early Access program (aka beta) for the ForgeRock Identity Microservices. In summary the capabilities offered include token issuance using the OAuth2 client credentials grant, token validations of OAuth2/OIDC tokens (and even ssotokens) and token exchange based on the draft OAuth2 token exchange spec. I wrote a press release here and an introductory community blog post here. […]
Javed Shah
Securing your (micro)services with ForgeRock Identity Microservices
2 months 2 weeks ago
ForgeRock Identity Microservices ForgeRock released in Q4 2017, an Early Access (aka beta) program for three key Identity Microservices within a compact, single-purpose code set for consumer-scale deployments. For companies who are deploying stateless Microservices architectures, these microservices offer a micro-gateway enabled solution that enables service trust, policy-enforced identity propagation and even OAuth2-based delegation. The stateless architecture of FR Identity Microservices […]
Javed Shah
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

Your Customers...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices... they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact.

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW