User-Managed Access

Secure Delegated Authorization that Builds Privacy, Consent and Trusted Relationships

Privacy regulations, like GDPR, impact all organizations holding personally identifiable information. Void of compliance, organizations can suffer disastrous repercussions  in the form of  enormous fines and even imprisonment of executives. Further, lax privacy practices can cost an organization reputation and ultimately consumer trust. But new regulations don’t have to bring only doom and gloom. Savvy businesses can leverage these regulations as a way to build trust with their customers.

Organizations can opt for a contextual privacy methodology which takes the burden away from the business and puts it into the hands of the consumer – ultimately building trusted relationships necessary for successful digital transformation.

User-Managed Access, UMA, gives your customers and employees a convenient way to determine who and what gets access to personal data, for how long, and under what circumstances.  Users delegate access through a simple “Share” button in your app, and can monitor and manage sharing preferences all through a central console.

Do More With User-Managed Access
Product Brief

Learn how UMA can help you protect user privacy with a simple user experience

Customer Identity

The Guide to Trusted Digital Relationships with Customer Identity and Access Management (CIAM)

Overview

IoT and other new technologies require modern solutions like UMA for privacy and consent

No More Data About You, Without You

With UMA, sharing information is simple. While there are a few consent tools out there that go beyond the post-compliance opt-in and opt-out checkboxes, they are proprietary, thus limiting sharing capabilities to within the organization. Other privacy and consent tools lack options to empower consumers, such as granular access controls to determine who can do what with their data, the ability to revoke data access at will, and the security needed to prove who is accessing data.

 
Get Started Here

Get the technical resources and documentation to get started with ForgeRock User-Managed Access

Technical Resources
User-Managed Access (UMA) 2.0 Guide

Guide to configuring and using UMA features in ForgeRock Access Management.


Customizing UMA

Guide to Extending UMA Services with custom functionality to fit your deployment


Access Management Guide

Full Access Management documentation.

Key Retailer Takeaways from Recent ForgeRock Research, Part 1

A retailer’s ability to make vital decisions about digital identity issues requires information and insight, of course.

Read More »

ForgeRock Identity Platform 6.0

Intelligent Authentication Ushers in a New Era in Digital Identity

With the RSA Conference kicking off in San Francisco this week, we’re taking the opportunity to unveil the ForgeRock Identity Platform 6.0. A significant advancement in digital identity technology, our new flagship offering will deliver real, measurable business value to ForgeRock customers in fresh new ways. More than ever before, ForgeRock is the key technology provider helping you to build trusted digital relationships across people, services and things.

Read More »

Why Digital Identity is the Strategic Opportunity of Our Time

Are you making the most of your customers’ identities? There is no doubt: nowadays, customers are demanding more. Having learned what’s possible from global tech giants and online retailers, they expect the same level of real-time, frictionless service from their traditional providers, like telcos and utilities. But while the immediacy of the online experience has changed consumer attitudes, at the same time no one wants to give up the option to go into a store or a branch or contact a call centre 24x7 either.

Read More »

Your Gateway to a Simple, Modern and Adaptable CIAM Architecture

Customer identity and access management (CIAM) is essential for digital transformation. But finding the right CIAM solution for your unique business needs can be an arduous journey. Creating value through your CIAM architecture means bridging the gaps between the growing number of business applications, APIs, and microservices.

Read More »

Open Banking Week is Coming

At ForgeRock, we take Open Banking seriously. That’s why we’re proud to announce our inaugural Open Banking Week starting on April 23! It will be filled with excellent content and events around this revolutionary regulation. Here’s how it goes:

Read More »

Token Exchange and Delegation using the ForgeRock Identity Microservices
2 weeks 4 days ago
In 2017 ForgeRock introduced an Early Access program (aka beta) for the ForgeRock Identity Microservices. In summary the capabilities offered include token issuance using the OAuth2 client credentials grant, token validations of OAuth2/OIDC tokens (and even ssotokens) and token exchange based on the draft OAuth2 token exchange spec. I wrote a press release here and an introductory community blog post here. […]
Javed Shah
The OAuth2 ForgeRock Identity Microservices
2 weeks 5 days ago
ForgeRock Identity Microservices ForgeRock released in Q4 2017, an Early Access (aka beta) program for three key Identity Microservices within a compact, single-purpose code set for consumer-scale deployments. For companies who are deploying stateless Microservices architectures, these microservices offer a micro-gateway enabled solution that enables service trust, policy-enforced identity propagation and even OAuth2-based delegation. The stateless architecture of FR Identity Microservices […]
Javed Shah
Implementing Delegated Administration with the ForgeRock 5.5 Platform
2 months 1 week ago
Out of the box in 5.5, IDM (ForgeRock Identity Management) has two types of users – basic end-users and all-powerful administrators. You often need a class of users that fall between these extremes – users which can trigger a password reset action but cannot redefine connector configuration, for example. Another common need is for users to only be allowed to […]
Jake Feasel
Enhancing User Privacy with OpenID Connect Pairwise Identifiers
2 months 2 weeks ago
This is a quick post to describe how to set up Pairwise subject hashing, when issuing OpenID Connect id_tokens that require the users sub= claim to be pseudonymous.  The main use case for this approach, is to prevent clients or resource servers, from being able to track user activity and correlate the same subject’s activity across different applications. OpenID Connect […]
Simon Moffatt
8 years old !
2 months 3 weeks ago
Happy anniversary ForgeRock! It’s been 8 years since you first shout at the world What an amazing journey since then… And it’s only the beginning This blog post was first published @ ludopoitou.com, included here with permission.
Ludo
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

Your Customers...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices... they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact.

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW