ForgeRock announces new products that put connected identity at the heart of everything online


Our opensource IAM solutions partner, ForgeRock, has just announced new versions of its OpenIDM 3.1, OpenAM 12.0 and OpenIG 3.1 solutions.

New versions

ForgeRock® Inc. announces the update of ForgeRock® Identity Platform, the first 100% commercial and massively scalable open source solution for access and identity management (IAM), with new versions of OpenAM 12.0, OpenIDM 3.1 and OpenIG 3.1. OpenAM manages access to digital customer services anytime, anywhere; OpenIDM seamlessly manages identities across all distribution channels, on-premise and in the cloud, with comprehensive identity administration functions; and OpenIG protects access to API resources and cloud, mobile and business applications with a next-generation gateway. With these new product releases, the ForgeRock Identity Platform adds new features and tools to accelerate IT service delivery and help organizations better understand and manage the relationships between people, devices, services and objects, a requirement in the age of the digital industrial economy, where everyone and everything is connected online.

In order to connect end-users to relevant products efficiently and effectively in the digital age, organizations are refocusing the objectives of their technology investments from reducing operating expenses to improving revenue and customer value. This transformation has driven IAM investments from employee-oriented to customer-oriented solutions. Recent Gartner research concluded that CEOs have ranked growth in their top three corporate priorities, and are investing heavily in their digital businesses to achieve this goal. And according to a recent study by Capgemini Consulting and MIT, organizations investing in digital activities are winning: the study found that "digital masters are on average 26% more profitable than their industry counterparts, and enjoy 9% higher revenues from their physical assets."

ForgeRock Identity Platform accelerates digital transformation with the following enhancements:

  • In less than a minute, it allows you to configure access to social IDs such as Google, Facebook and Microsoft. This added convenience for the end-user leads to higher adoption rates. However, for the administrator and developer, adding a social login to an application involves more work: custom coding, testing, etc. With OpenAM, social login support can be configured in less than a minute using a configuration wizard.
  • The new UI-based rule editor makes it easier and faster to implement more precise authorizations. This new rule-editing tool in OpenAM lets you define permissions and rules that reflect the dynamic and complex relationships between people, services and connected objects online.
  • Customers want more control over their online identity experience, and expect self-service features. Although administrators already offer self-service to users, this often requires coding and customization. With OpenAM, it's possible to configure self-service functionalities.
  • New cloud connectors in OpenIDM extend the trust between on-premises IAM frameworks and the cloud, supporting enterprise-wide SaaS services such as Google,, Office365 and Azure. Thanks to OpenIDM cloud connectors, end-users can use the same login credentials to access applications and services wherever they are, on-premises or in the cloud.
  • Enhanced risk adaptation: OpenAM's contextual scripted authentication service enables administrators to dynamically integrate third-party services such as LexisNexis and Equifax to profile identities. This means that, with simple coding and without the need for complicated integration, the registration process for a new user can include, for example, verification of that user's credit score with Equifax.
  • Monitor and audit performance with OpenIG. Monitor and audit your application's transactional performance with OpenIG. The latest versions add monitoring and auditing capabilities, giving customers a global view of the activity of their applications and APIs.

Sources & Resources:


Security Consultant

  • Post published:December 5, 2014
  • Author of the publication :

Yann CAM

Security Consultant