Common Services

One Platform to Rule Them All

We believe in a developer-friendly fellowship underpinning everything we do. Our identity services are shared across the entire platform to eliminate typical inefficiencies: no more hours spent reconciling multiple APIs, UIs, files, documentation, elves and squirrels, what have you.

The platform was designed from the ground up for realistic, human-grade scale. You have billions of identities? We have massive scale, session-failover, and high availability to match. All that’s left to consider is what to do with the time that is given to you.

Product Overview

Identity Platform in Short

Get the basics on our identity and access management solution

Analyst Report

Leader in Adaptive Authentication

KuppingerCole named ForgeRock a leader in the adaptive authentication space

Overview

Get the Details

Learn more about how you can secure access for, customers, applications and IoT

Get Started Here

 

Get the technical resources and documentation to get started with ForgeRock Common Services

Get Started here
REST Framework

Access web resources and collections of resources using the Common REST API.


DevOps Guide

Guide to ForgeRock Identity Platform™ deployment using DevOps techniques


Full Documentation

Complete ForgeRock Platform documentation

Retailers are Lagging Badly at Omnichannel Commerce

As we’ve previously explored, the future of retail will involve advanced online services and secure digital identity tools. But in the here-and-now, many retailers are struggling to bridge physical and digital commerce. At least, that’s the conclusion that comes courtesy of the Mobile Retail Report - Omnichannel Edition from Newstore.

Read More »

Thoughts on the Strava Heat Map and How to Secure the IoT

The topic du jour in the privacy and security space this week has been the recent news that a heat map published by the fitness tracking app provider Strava disclosed the location of secret military bases around the world. This Wired piece has all the unpleasant details. Having spent a stretch of my career working in the military cybersecurity community, I have a strong sense of how a disclosure of this nature will be concerning to many national security officials.

Read More »

Zero Trust – The Importance of an Identity-centered Security Program

This is the first follow-up to my blog post from December 11th, The CSO’s 4 Key Takeaways from Gartner IAM 2017. In this post I drill into my perspectives on why an effective security program must be identity-centered. Let’s start with a little bit of background on my perspectives about security so readers have a sense of where I’m coming from. One key thing that underpins my thinking is a belief that the zero trust model is the only real valid way to approach security for a modern enterprise.

Read More »

Digital Identity, the Key to Successful Financial Services

Financial services customers are demanding. They expect tech-savvy, efficient, and proactive products and services that fits conveniently into their digital lives, just like those created by Apple, Facebook, or Google.  To meet this high bar, financial institutions are undergoing digital transformations to differentiated, customer-centric services that are accessible from any device and tailored to individual preferences.

Read More »

Powering the Reference Bank Application for Open Banking

Open Banking is changing the way banks do business in the United Kingdom forever and as with any good regulation, there’s plenty of testing and requirements involved as well. Banks and fintechs haven’t just been left to their own devices when it comes to preparing to open up precious customer data to third parties.

Read More »

Implementing Delegated Administration with the ForgeRock 5.5 Platform
3 days 13 hours ago
Out of the box in 5.5, IDM (ForgeRock Identity Management) has two types of users – basic end-users and all-powerful administrators. You often need a class of users that fall between these extremes – users which can trigger a password reset action but cannot redefine connector configuration, for example. Another common need is for users to only be allowed to […]
Jake Feasel
Enhancing User Privacy with OpenID Connect Pairwise Identifiers
1 week 4 days ago
This is a quick post to describe how to set up Pairwise subject hashing, when issuing OpenID Connect id_tokens that require the users sub= claim to be pseudonymous.  The main use case for this approach, is to prevent clients or resource servers, from being able to track user activity and correlate the same subject’s activity across different applications. OpenID Connect […]
Simon Moffatt
8 years old !
2 weeks 4 days ago
Happy anniversary ForgeRock! It’s been 8 years since you first shout at the world What an amazing journey since then… And it’s only the beginning This blog post was first published @ ludopoitou.com, included here with permission.
Ludo
Enhancing OAuth2 introspection with a Policy Decision Point
1 month ago
OAuth2 protection of resource server content, is typically either done via a call to the authorization service (AS) and the ../introspect endpoint for stateful access_tokens, or, in deployments where stateless access_tokens are deployed, the resource server (RS) could perform “local” introspection, if they have access to the necessary AS signing material.  All good.  The RS would valid scope values, token […]
Simon Moffatt
How Information Security Can Drive Innovation
1 month ago
Information Security and Innovation: often at two different ends of an executive team’s business strategy. The non-CIO ‘C’ level folks want to discuss revenue generation, efficiency and growth. Three areas often immeasurably enhanced by having a strong and clear innovation management framework. The CIO’s objectives are often focused on technical delivery, compliance, uploading SLA’s and more recently on privacy enablement […]
Simon Moffatt
Platform

An Identity Platform Built with the IoT, CIAM, and You in Mind

Digital Identity

YOUR CUSTOMERS...

Millions of customers use your digital services--whether cloud, mobile, or IoT. Protect their digital identities and consolidate customer information, so it's easy to create and personalize the customer experience. 

IoT

Their Things...

Cars, drones, street lights, gas pumps, wearables, medical devices...they all have a digital identity. With ForgeRock, you establish who these devices belong to, and decide how and with whom (or what) they interact. 

Privacy

Their Choice.

Protect and respect privacy. With ForgeRock, you can let your customers share data selectively. Ask them what’s okay to share, how, when, and with whom. Put them in charge, and they’ll put their trust in you.

Get Started with the ForgeRock Identity Platform

Manage billions of digital identities on new cloud, mobile, and IoT services, all with one unified platform. Try it out today. 

TRY NOW