User-Managed Access

Secure Delegated Authorization that Builds Privacy, Consent and Trusted Relationships

Privacy regulations, like GDPR, impact all organizations holding personally identifiable information. Void of compliance, organizations can suffer disastrous repercussions  in the form of  enormous fines and even imprisonment of executives. Further, lax privacy practices can cost an organization reputation and ultimately consumer trust. But new regulations don’t have to bring only doom and gloom. Savvy businesses can leverage these regulations as a way to build trust with their customers.

Organizations can opt for a contextual privacy methodology which takes the burden away from the business and puts it into the hands of the consumer – ultimately building trusted relationships necessary for successful digital transformation.

User-Managed Access, UMA, gives your customers and employees a convenient way to determine who and what gets access to personal data, for how long, and under what circumstances.  Users delegate access through a simple “Share” button in your app, and can monitor and manage sharing preferences all through a central console.

Do More With User-Managed Access
Product Brief

Learn how UMA can help you protect user privacy with a simple user experience

Customer Identity

The Guide to Trusted Digital Relationships with Customer Identity and Access Management (CIAM)

Overview

IoT and other new technologies require modern solutions like UMA for privacy and consent

No More Data About You, Without You

With UMA, sharing information is simple. While there are a few consent tools out there that go beyond the post-compliance opt-in and opt-out checkboxes, they are proprietary, thus limiting sharing capabilities to within the organization. Other privacy and consent tools lack options to empower consumers, such as granular access controls to determine who can do what with their data, the ability to revoke data access at will, and the security needed to prove who is accessing data.

 
Get Started Here

Get the technical resources and documentation to get started with ForgeRock User-Managed Access

Technical Resources
User-Managed Access (UMA) 2.0 Guide

Guide to configuring and using UMA features in ForgeRock Access Management.


Customizing UMA

Guide to Extending UMA Services with custom functionality to fit your deployment


Access Management Guide

Full Access Management documentation.

Partner Integration Series: How to Secure User Login With Access Management and NoPassword

In a recent post, I introduced the ForgeRock Intelligent Authentication strategy - Authentication Trees,  authentication nodes and important features in making the ForgeRock Identity Platform so flexible for customers and partners.

Read More »

What I learned at Identity Live London

Yesterday we held the London edition of our Identity Live series, an event that is always a highlight in the calendar for all of us at ForgeRock. This year was no exception. The whole day was packed with fascinating insights from experts and thought leaders, both from within ForgeRock and across the wider world of identity and digital transformation.

Read More »

Do It Non-Intrusively With Identity Gateway

Previously, we presented an overview of Identity Gateway and how it fits into your organization’s IAM. In the second part of this demo video series, we do a deeper technical dive on how to completely secure your business applications using reverse proxy. Check it out:

 

Read More »

IAM owner? We've got your back.

Identity and Access Management (IAM) is a compelling tool and can be even more effective when used strategically.  The extent of the value depends upon how available you make identity to the business applications and services used in achieving business goals. As an IAM owner, this task is more difficult than it appears. Fortunately, organizations are increasingly understanding the value of IAM and how it is fundamental to digitally transforming business.

Read More »

Open Banking: Are You Ready, Australia?

“Future money will know where it has been, who has been using it and what they have been using it for. The use of cash is already in decline and is certain to vanish from polite society.” David Birch, acclaimed commentator on digital financial services, controversially declares this in his book Before Babylon, Beyond Bitcoin. In it, Birch talks about how technology is changing money and then explores where it might be taking us.

Read More »

The OpenID Connect Neighborhood
2 months ago
Understand OpenID Connect by analogy and learn how it relates to OAuth2. In my last article, I described the benefits of living in the OAuth2 apartment building. Something I didn’t mention is that the neighborhood my building is in is really unique, too. There are several other buildings like mine (OAuth2-enabled) in the area, which has turned out to be […]
Jake Feasel
The OAuth2 Apartment Building
2 months 1 week ago
Understand core OAuth2 concepts by analogy and learn how the various ForgeRock Identity Platform components relate to OAuth2. I live in a modern apartment building. It’s a very nice place – pet friendly, upscale furnishings, prime location. One of the best parts about my apartment building, though, is that it has electronic locks available for all the doors. This is […]
Jake Feasel
Using IG to Protect IDM For Secure and Standards-Based Integration
2 months 4 weeks ago
ForgeRock Identity Management (IDM) has a rich set of REST APIs capable of performing many actions; this is one of the great values that IDM has to offer. However, with such a broad set of APIs available out of the box, it is reasonable to want to limit which of those REST APIs are directly available to the public. The […]
Jake Feasel
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

Your Customers...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices... they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact.

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW