Listing Thumbnail

    PingOne for Workforce

     Info
    Deployed on AWS
    Free Trial
    AWS Free Tier
    PingOne for Workforce enhances employee productivity and security with intelligent centralized authentication across any user, application, cloud and directory.
    4.1

    Overview

    PingOne for Workforce is a cloud identity solution for helping organizations secure employees' access to resources so they can get work done-anytime, anywhere. Available in three solution packages to meet a variety of common business requirements, PingOne for Workforce can help increase productivity with no-code orchestration, single sign-on, multi-factor authentication and centralized risk-aware access to the right resources.

    Select the PingOne for Workforce solution package that helps you to meet business goals:

    Essential: Single sign-on and MFA with lightweight, flexible directory that can be orchestrated with no code workflows, providing your workforce single click access to all of your standards-based applications

    Plus: All Essential capabilities + extra security with risk based adaptive MFA and integrations to your Microsoft environments (AD, Windows, O365)

    Premium: All Plus capabilities + extensible authentication, including single sign-on (SSO) into home-grown, non-standards-based apps and support for enterprises with the most demanding security, scale, and resiliency requirements

    Ping Identity offers additional capabilities to enable your organization to secure your workforce access without adding friction, including identity verification, risk management, dynamic authorization, and API intelligence. Contact us at https://www.pingidentity.com/en/lp/ni/aws-marketplace.html  for a private offer to include these alongside volume pricing and Premium package pricing.

    Highlights

    • Deliver Seamless Experiences - Seamless Digital Interactions - Reduce friction with identity orchestration to weave together the Ping, AWS, and other authentication vendor services your employees need to be secure.
    • Rapid Deployment - We support over 1,700 out-of-the box integrations to popular apps, providing rapid time to value for your workforce.
    • Deploy Rapidly with AWS Integrations - The PingOne Cloud Platform works seamlessly alongside AWS IAM, AWS Organizations, AWS SSO, AWS Session Tags, and Amazon Control Tower.

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    PingOne for Workforce

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (2)

     Info
    Dimension
    Description
    Cost/month
    Essential
    1,000 users - PingOne for Workforce Essential (AuthN, SSO & Basic MFA)
    $4,500.00
    Plus
    1,000 users - PingOne for Workforce Plus (AuthN, SSO & Adaptive MFA)
    $9,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    At Ping, we know that without our customers, we wouldn't exist. This is why we put our customers at the heart of everything we do. We provide global support, 24/7. So even if your employees, partners and customers are all in separate time zones, we're on call and ready to get you back up and running. Access our Support Portal to get help, read documentation, engage in our online product communities and more.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Ping Identity
    By Okta, Inc

    Accolades

     Info
    Top
    100
    In Security
    Top
    10
    In Infrastructure as Code, Application Development, Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    6 reviews
    Insufficient data
    Insufficient data
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Single Sign-On (SSO)
    Centralized authentication enabling single click access to standards-based applications and support for non-standards-based applications through extensible authentication mechanisms.
    Multi-Factor Authentication (MFA)
    Multi-factor authentication capabilities with risk-based adaptive MFA that adjusts authentication requirements based on detected risk factors.
    Identity Orchestration
    No-code workflow orchestration enabling seamless integration of multiple authentication vendors and services without requiring custom code development.
    Pre-built Application Integrations
    Support for over 1,700 out-of-the-box integrations to popular applications and cloud services.
    Cloud Directory Management
    Lightweight and flexible directory service with centralized management capabilities for user access control across multiple environments and cloud platforms.
    Centralized Cloud Identity Store
    Unified cloud directory that centrally manages identities across the environment with capability to capture profile data and synchronize user information from external directories.
    Multi-Factor Authentication
    MFA implementation with risk-based, context-aware authentication using SmartFactor to protect against account takeover threats across all devices and touchpoints.
    Social Authentication Integration
    Support for social login via Google, Facebook, LinkedIn and other providers, along with SAML and OIDC protocols to reduce friction in registration and authentication processes.
    Automated Identity Lifecycle Management
    Automated user provisioning and identity lifecycle management capabilities integrated with external directory synchronization.
    API and SDK Customization
    Developer-friendly APIs and SDKs for customizing login pages, email domains, and other customer journey touchpoints to deliver personalized identity experiences.
    Multi-Factor Authentication
    Adaptive Multi-Factor Authentication (MFA) capabilities with support for multiple authentication methods including Passkeys
    Bot Detection and Attack Protection
    Bot Detection and Attack Protection features to defend against scripted login attacks while maintaining user experience
    Single Sign-On and Federation
    Single Sign-On (SSO) and B2B Enterprise Federation capabilities for centralized authentication across applications
    Customizable Authentication Flows
    Customizable authentication flows using Actions framework for branded sign-up, sign-in, and social login integration
    API Access Management
    API Access Management functionality for securing and controlling programmatic access to applications and services

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.1
    16 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    38%
    63%
    0%
    0%
    0%
    2 AWS reviews
    |
    14 external reviews
    External reviews are from G2  and PeerSpot .
    SumitGupta5

    User journeys have streamlined migrations and self-service grows while scripting still needs simplification

    Reviewed on Feb 16, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for ForgeRock  is designing user journeys, specifically customer user journeys, and how they interact with the system.

    A specific example of a user journey I designed using ForgeRock  is when we migrated from an older IAM  system, Okta, to ForgeRock. We designed a journey to log into one of the partner portals, where the password was still authenticated via Okta for the first-time migration users. We configured pass-through authentication, and once the user's login is completed, we mark it as a migrated user, synchronizing their password with ForgeRock Directory Server. In that journey, we implemented various configurations such as step-up control and orchestration, where based on the risk level populated via PingProtect service, either a step-up is required via email or via a one-time text message before granting access.

    In addition to my main use case, we have multiple use cases, with over 30 journeys live for the different systems that the company uses, including various flows such as forgot password, reset password, and forgot username, which utilize utility journeys that are repetitive in nature.

    What is most valuable?

    The best features ForgeRock offers, in my experience, include their directory services, access management, and identity management, along with the Journeys feature that lets you orchestrate and design your user path in various easy ways. They are very configurable using JavaScript, which I find to be the most useful part.

    The Journey feature has made my work easier and more effective because, unlike other tools, from the input we receive from the user, such as the username, we can decide whether to prompt them for a password, send a one-time password link, or a one-time passcode. Many actions can be performed at runtime based on the inputs received, which I find quite useful, and for anything that cannot be achieved out of the box, a simple JavaScript can be written to transform data or perform additions for passing to the next node. There are many out-of-the-box nodes available for integrating with other Ping components or calling out to other SaaS services.

    The other features are pretty much the same as other components such as Oracle or Ping, but the Journeys in ForgeRock are something that I really appreciate, while the rest of the features are fairly standard across other IAM  components.

    ForgeRock has positively impacted my organization by allowing us to migrate from the older system to the newer ForgeRock component, enabling us to go live with many products across geographies, enhancing security as it is all cloud-based, and with the company taking care of availability, it has reduced costs for the company.

    In terms of specific outcomes, previously, single sign-on was not implemented, requiring users to remember their passwords across various systems. Now, those issues have been resolved, and users have appreciated this initiative. We centralized all systems from Okta and Microsoft on-premise AD to ForgeRock, which is quite beneficial, and there is also a self-service functionality available for tasks such as resetting passwords or retrieving usernames, leading to a significant reduction in customer service calls.

    What needs improvement?

    I wish the JavaScript part could be improved, as not everyone is proficient in JavaScript, so automating that or reducing the reliance on it could be beneficial. Additionally, having only one realm in the cloud version, the alpha realm, feels limiting, and I would prefer having more than one realm as we had in the on-premise version of ForgeRock.

    I do not have any other improvements needed for ForgeRock that I have not mentioned.

    For how long have I used the solution?

    I have been using ForgeRock for three years.

    What do I think about the stability of the solution?

    There seem to be no issues so far with ForgeRock in terms of stability.

    What do I think about the scalability of the solution?

    Regarding scalability, since ForgeRock is in the cloud, it is pretty scalable.

    How are customer service and support?

    The customer support is fine; we typically have to go through an online ticketing system on their website. I would rate the customer support eight out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used Ping Identity before transitioning to ForgeRock.

    What was our ROI?

    I do not have the precise price point on the return on investment, but I have heard in management calls that we have reduced the number of employees needed, and money has definitely been saved.

    Which other solutions did I evaluate?

    Before choosing ForgeRock, my organization evaluated other options, including Okta, which was previously implemented.

    What other advice do I have?

    My advice for others looking into using ForgeRock is that it is really good, particularly the Journeys functionality, which allows you to configure user journeys in a more efficient way. I do not have any additional thoughts about ForgeRock. I would rate this review seven out of ten.

    reviewer2802936

    Centralized access control has improved secure onboarding and supports strict compliance

    Reviewed on Feb 14, 2026
    Review from a verified AWS customer

    What is our primary use case?

    At Bank of America, our main use case for ForgeRock  is to manage secure user authentication and authorization for our enterprise platform. For example, we use ForgeRock  to implement OAuth 2.0 authentication flows and ensure that only authorized users can access sensitive onboarding workflows and data. A specific scenario would be when a new user is onboarded. ForgeRock handles the authentication process, enforces multi-factor authentication, and manages user roles and permissions to control access to different stages of the onboarding lifecycle, such as draft, submission, approval, and finalization. This integration helps us maintain regulatory compliance as well as auditability and security with multiple user roles, while also streamlining user experience and reducing the risk of unauthorized access.

    Integrating ForgeRock with our onboarding workflows has been a valuable learning experience because there are both smooth and challenging aspects. The smoothest part is ForgeRock's standards-based support for Auth and SAML, which makes it straightforward to set up secure authentication and single sign-on for our onboarding module. ForgeRock's comprehensive documentation and RESTful APIs also help accelerate the integration. One challenge is mapping our complex multi-stage onboarding workflows, where users transition between draft, submission, and approval stages to ForgeRock's role-based access controls and policy configurations. We had to carefully design custom policies and attribute mappings to ensure that only the right users could perform specific actions at each stage, which required close collaboration between our development and security teams. Another tricky aspect is handling legacy user data and ensuring seamless migration to ForgeRock without disrupting existing user access or compliance requirements. Overall, the integration is successful, and the flexibility of ForgeRock's platform allows us to tailor the solution to our specific needs.

    One thing that stands out about our main use case and the integration process is how ForgeRock's centralized policy management makes it much easier to enforce consistent security and compliance rules across all stages of the onboarding process. We are able to implement fine-grained access control, so permissions can dynamically adjust based on user roles and the current status of the onboarding request. ForgeRock's auditing and versioning features are particularly valuable for our compliance needs, allowing us to track every access and every modification event. Additionally, the flexibility to integrate with our existing tech stack including Java, Spring Boot , and Apache Kafka  helps us avoid major architectural changes and keeps the project timeline on track. ForgeRock's extensibility and strong support for enterprise standards are key factors in the success of our implementation.

    How has it helped my organization?

    Initially, the primary improvement was security. By implementing standards-based authentication and access controls, we reduced unauthorized access incidents and strengthened our overall security posture. Next would be compliance. Centralized policy management and comprehensive auditing features made it much easier to meet regulatory requirements and pass company compliance audits. Efficiency was another major improvement. Automating user provisioning and access management streamlined onboarding processes, cutting manual administrative work and reducing onboarding cycle time. User experience also improved. The self-service features like password resets and account recovery improved user satisfaction. Another important positive impact was operational stability. The integration with our backend systems and the ability to manage policy centrally led us to fewer configuration errors. ForgeRock enabled us to deliver a more secure and compliant onboarding experience while also improving efficiency.

    After implementing ForgeRock, we saw a reduction in onboarding cycle time by roughly twenty-five percent as automated workflows and centralized access management eliminated many manual steps. Security incidents related to unauthorized access or misconfigured permissions dropped by forty percent, and audit preparation time decreased by approximately thirty percent because of ForgeRock's comprehensive logging and reporting features. We also noticed a twenty percent reduction in user support tickets, especially regarding password resets and account recovery due to the self-serving capabilities. While these are rough estimates, they reflect the tangible improvements we experienced in efficiency, security, and user satisfaction.

    What is most valuable?

    The most valuable features ForgeRock offers are its support for standards-based authentication and authorization protocols including OAuth 2.0 and SAML, which make it a secure integration. The fine-grained role-based access control has been essential for managing complex user permissions across different onboarding workflow stages. Centralized policy and configuration management allows us to enforce consistent security and compliance. The platform's extensibility, along with RESTful APIs, makes it easier for us to integrate with our existing Spring Boot  backend and other enterprise systems. Multi-factor authentication support and risk-based authentication have added significant value by enhancing security without compromising user experience.

    Centralized management makes the biggest difference because it allows us to define, update, and enforce security and compliance rules from a single location, which is crucial given the complexity of our onboarding workflows and the need for strict compliance. This feature reduces manual configuration errors, improves consistency across different modules, and makes it much easier to audit and demonstrate compliance to internal and external stakeholders. It also streamlines collaboration between development, security, and compliance teams since everyone can work from a unified set of policies. Overall, policy management not only improves our security but also accelerates our development.

    What needs improvement?

    I wish we had used ForgeRock's adaptive risk-based authentication, which allows dynamic adjustment of authentication requirements based on user behavior. This could have helped us further strengthen our security. Another hidden gem is the built-in support for custom authentication modules and scripting, which gives a great deal of flexibility to tailor authentication flows. The self-service capabilities for password resets and account recovery have been very helpful in reducing support overhead and improving user experience. Discovering and utilizing these features would have definitely made our integration even smoother and would have provided additional value for both our users and our security team.

    One area of improvement would be the user interface for policy and workflow configuration, which can become complex and sometimes unintuitive, especially for new administrators. A more streamlined and user-friendly UI would help reduce the learning curve. Enhanced out-of-the-box analytics and reporting would also be valuable, as our current options often require custom development or integration with external tools. While extensibility is a strength, documentation for advanced customizations and integrations could be more comprehensive and easier to follow. Improved support for seamless upgrades and backward compatibility would also help minimize downtime.

    In terms of performance, optimizing the platform for high concurrency environments would be beneficial, especially for organizations with large user bases or peak usage periods. Enhanced scalability features such as more granular or horizontal scaling options would provide better support for distributed deployments. For integrations, having more pre-built connectors and easy integration with modern cloud-native services would accelerate adoption. Improved monitoring and real-time health dashboards would help proactively identify and resolve performance bottlenecks.

    For how long have I used the solution?

    I have been working in my current field for seven years.

    What do I think about the stability of the solution?

    ForgeRock supports integration with legacy systems in our organization by offering a wide range of connectors and APIs. We utilize the identity gateway and REST APIs to bridge modern identity service with legacy platforms. These platforms support standard protocols including LDAP, SAML, and OAuth, which helps us connect with older systems. Custom connectors and scripting capabilities also allow us to tailor integrations with unique applications. This approach enables us to modernize our IAM  infrastructure while still leveraging critical legacy systems.

    With scalability in mind, ForgeRock supports both horizontal and vertical scaling to accommodate our growing user bases with increased transitions. We leverage containerization and orchestration tools to deploy ForgeRock components, which allows us to scale services up and down. Load balancing and clustering features ensure high availability and distribute traffic efficiently. Caching mechanisms, such as Redis  cache or Ehcache, are used to reduce database load. One challenge we face is tuning the system for peak loads, especially during onboarding spikes or regulatory deadlines, but by optimizing our infrastructure and monitoring, we are able to address these bottlenecks.

    What do I think about the scalability of the solution?

    ForgeRock supports multi-factor authentication and risk-based authentication in our organization by allowing us to enforce additional authentication steps, such as OTPs, push notifications, or biometrics. The platform provides flexible authentication trees, enabling us to design custom MFA flows tailored for different user groups and risk profiles.

    How are customer service and support?

    ForgeRock's customer support team has been responsive and knowledgeable, assisting us during our technical challenges and when we needed guidance on best practices. The support team provides timely assistance. The support portals offer comprehensive documentation, troubleshooting guides, and community forums that have been helpful for resolving common issues independently. Overall, my experience with customer support has been positive, contributing to smoother deployments and ongoing maintenance.

    How would you rate customer service and support?

    Positive

    What other advice do I have?

    I believe it is important to clearly define and thoroughly assess your organization's identity and access management needs upfront. ForgeRock's flexibility can be both a strength and a challenge if requirements are not clear. It is crucial to pay close attention to initial architecture and design, especially around authentication flows, user journeys, and integration. Additionally, investing in training for your technical team is essential because ForgeRock's platform is powerful but can have a steep learning curve for those new to it. Be cautious about potential complexity in customizations. While ForgeRock is highly extensible, over-customizing can complicate upgrades and maintenance. Ensure you have a solid plan for monitoring, logging, and compliance from the start.

    I appreciate ForgeRock for its strong focus on security, which is critical for organizations handling sensitive data. My overall review rating for this solution is an eight.

    Ie Ogbonnaya

    Flexible policies and automation have improved our support, troubleshooting, and cloud deployments

    Reviewed on Feb 14, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I am using ForgeRock  for standard support, policy configurations, and documentation clarity.

    The pricing, setup cost, and licensing are very straightforward, which is a good success. I appreciate that it is very straightforward and helpful.

    The customer support is very flexible and supportive, particularly in the area of automation and customer deployments. It is very helpful and supportive to our customers.

    What is most valuable?

    I appreciate ForgeRock  for its flexibility and standard support. It helps significantly in policy configuration, authentication, and troubleshooting.

    The policy configuration feature helps my team considerably because it aligns our business objectives to all policies. It makes it easier and more flexible to assign roles based on access control. It helps us in policy configuration, assigning roles, and onboarding and offboarding of users.

    ForgeRock helps me in debugging token flows and automation support in deployments of software to the cloud. It has assisted me in solving debugging issues.

    ForgeRock has made a huge impact on our company because it helps us with DevOps automation support and policy configuration. It has helped us tremendously, even in troubleshooting, making it easier to navigate and understand. It provides a better and proper view of how to approach troubleshooting.

    An example of how ForgeRock improved our DevOps automation is that it saves us considerable time. Throughout the automation process, it helps us analyze our source code and automation processes. It made the process flexible enough that in less than thirty minutes or forty-eight hours, we complete the automation process.

    What needs improvement?

    There are some areas I want ForgeRock to improve. These areas include policy configuration, documentation clarity, UI complexity, and debugging token flow.

    I want ForgeRock to improve in documentation clarity, UI complexity, debugging token flow, policy configuration, and DevOps automation support.

    For how long have I used the solution?

    I have been using ForgeRock for over three years.

    What do I think about the stability of the solution?

    ForgeRock is very stable.

    What do I think about the scalability of the solution?

    I would rate ForgeRock's scalability an eight out of ten. The scalability is very fine and acceptable to me, and I would recommend it to someone else.

    How are customer service and support?

    The customer support is very flexible and supportive, particularly in the area of automation and customer deployments. It is very helpful and supportive to our customers.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I used CyberArk before, but I discovered the flexibility of ForgeRock and its powerful tools and features in keeping standard structures simple and understandable.

    How was the initial setup?

    The pricing, setup cost, and licensing are very straightforward, which is a good success. I appreciate that it is very straightforward and helpful.

    What about the implementation team?

    Over the past two to three years, we have had great metrics of success, saving costs, and ensuring that the process runs smoothly.

    What was our ROI?

    Over the past two to three years, we have had great metrics of success, saving costs, and ensuring that the process runs smoothly.

    What's my experience with pricing, setup cost, and licensing?

    The pricing, setup cost, and licensing are very straightforward, which is a good success. I appreciate that it is very straightforward and helpful.

    Which other solutions did I evaluate?

    I was recommended to ForgeRock, and it was worth it.

    What other advice do I have?

    I would like ForgeRock to improve in the area of debugging token flow and DevOps automation support for cloud deployment. I give this product a rating of eight out of ten.

    Snidam Snidam

    Centralized identity has unified SSO, adaptive MFA, and risk-based access for web applications

    Reviewed on Feb 13, 2026
    Review from a verified AWS customer

    What is our primary use case?

    I integrated ForgeRock  SSO  with a web application that had React for the front end and a Spring Boot  back-end API, where ForgeRock  AM was acting as an authorization server and an identity provider. Users were stored in ForgeRock and LDAP through ForgeRock Directory Studio. Our goal was to enable SSO  using OpenID Connect, issue JWT access tokens, and enforce MFA for sensitive actions.

    We created an OIDC client and set up the client ID, redirect URI, and grant type as an authorization code. We checked all the token endpoints, defined the scopes, token lifetime, and signing algorithms. We implemented the login flow where the user goes to the app and is redirected directly to ForgeRock when the app sees no session. When ForgeRock executed the authentication tree, it handled username, password, device check, risk calculation, and optional MFA. After successful authentication, ForgeRock redirects back with the authorization code.

    We also used a Spring Boot  API which validates API protection and validates the JWT signature using the ForgeRock public key, checks expiration, issuer, audience, and scopes. This is how we implemented MFA and SSO.

    What is most valuable?

    ForgeRock offers several features that stand out, especially compared to other IAM  platforms. The first is flexible authentication flows. The ability to visually design adaptive authentication flows with nodes such as password, username, risk decisions, device checks, OTP, and push setups gives tremendous control without hardcoding logic, which makes complex authentication very easy to implement.

    The second feature is strong support for modern protocols. ForgeRock has first-class support for OIDC, OAuth, SAML, and JWT, which is valuable for SAML and SSO scenarios. I can integrate nearly any web or mobile application and enforce any centralized security controls consistently. The third is risk-based authentication. Being able to evaluate risk signals such as IP reputation, device context, location, and adaptive rules, and then trigger MFA when needed is a huge advantage.

    ForgeRock also has very good API security features and its own directory and user management services, which include ForgeRock DS or OpenDJ  for PingDS. The policy engine and centralized authorization are very strong. Finally, the enterprise operational features such as token lifetime tuning, session management, monitoring, audit logs, certification, and keystore management are excellent. These do not sound flashy, but they make a very good IAM  platform. Running IAM  at scale is more manageable for a very large organization. ForgeRock has had a very positive impact on my organization, especially in terms of standardization, security posture, and operational efficiency.

    What needs improvement?

    ForgeRock is very powerful, but there are areas where it could be improved. The main area is complexity. ForgeRock is extremely flexible, but the learning curve can be steep. Authentication trees, policy configurations, and integration settings can become very complex quickly, especially for those new to the platform or in a very large organization. More simplified onboarding templates or guided configuration options could help new users significantly.

    Another area is the UI and administrative experience. While the platform is functionally strong, some parts of the admin console feel less refined. For example, debugging authentication flows or troubleshooting tokens sometimes requires digging into logs rather than having more visual tools built in.

    The deployment and operational setup could also be streamlined further. In larger-scale or cloud-native environments, containerization and CI/CD integration are very important. While ForgeRock supports this, the configuration and upgrade process can sometimes feel heavier compared to more SaaS-native identity providers.

    For how long have I used the solution?

    I have more than three years of experience in the field of identity and access management. I was first introduced to ForgeRock during a two-year contract, and this is the product I am reviewing.

    What do I think about the stability of the solution?

    ForgeRock is very stable in my experience.

    What do I think about the scalability of the solution?

    ForgeRock scales very well if the architecture is designed properly. The access management layer is stateless, so I can scale horizontally by adding more nodes behind a load balancer as traffic increases. DS replication also helps maintain performance and availability as the user base grows. When application integrations increase, token validation and authentication traffic go up, but the platform handles it very quickly.

    How are customer service and support?

    I have interacted with ForgeRock support a few times, mainly for configuration clarifications and complex authentication flows. My experience was positive overall. For standard support tickets, response times were very decent, and the support team was helpful in identifying configuration issues, especially with authentication trees, token settings, and directory replications. I found their documentation fairly comprehensive, which helped reduce the need to open tickets for common configuration questions. The support quality was solid, and response times were very fast.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We tried many different SaaS applications before ForgeRock. We used an on-premises application, and later we thought ForgeRock would be a better option. We evaluated different options in the market and determined that ForgeRock would be the better choice, so we migrated everything to ForgeRock.

    What was our ROI?

    I can definitely see that fewer employees are needed compared to using different SaaS applications. We have seen this as a return on investment using ForgeRock.

    What other advice do I have?

    The advice I would give to people looking into using ForgeRock is that it is very powerful, and that flexibility can become complexity if you do not define standards early, especially around token policies, naming conventions, and role models. I suggest investing in skilled IAM  engineers. ForgeRock is not a plug-and-play SaaS tool; it is an enterprise platform. Having team members who understand OAuth, OIDC, SAML, LDAP, and security architecture will make a significant difference in a successful implementation. I would rate this product an 8 out of 10 overall.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Senthil Kandhasamy

    Offers good multi-factor authentication and single sign-on capabilities to users

    Reviewed on Jul 17, 2024
    Review provided by PeerSpot

    What is our primary use case?

    One of my company's customers has already integrated ForgeRock and set up Splunk. We just did some simple configuration, but not much since our customer did it.

    I use the tool for its single sign-on capabilities. With ForgeRock, we can enable single sign-on and multi-factor authentication features, as well as single-layer or two-layer multi-factor authentication and password-less authentication.

    What is most valuable?

    Basically, we enable multi-factor authentication when logging in to ForgeRock. With ForgeRock Access Management, we can access Splunk using single sign-on capabilities. If you need one more multi-factor authentication for Splunk, we can enable it for that particular application. We already enabled multi-factor authentication for ForgeRock Access Management. Users are authenticated through multi-factor authentication, so Splunk does not require one more such tool. If you want the improvements and prefer one more multi-factor authentication tool, then it is okay.

    What needs improvement?

    In the past, I saw that Splunk was integrated with a testing portal, and then it was integrated with Slack. I don't think ForgeRock directly supports integrations with Slack, making it an area where improvements are required.

    For how long have I used the solution?

    I have been using ForgeRock for a year and a half. One of my company's customers uses the tool. My company implements and offers support for the tool.

    How are customer service and support?

    I provide full support in the application integration for our customers.

    Which solution did I use previously and why did I switch?

    I have used Splunk for CybeArk for one of my company's customers. I don't know of particular advantages in ForgeRock as such, but it helps reduce manpower and improve security, and then we can keep the environment stable.

    How was the initial setup?

    The product's implementation phase is very easy, but a lot of customizations are required.

    What other advice do I have?

    ForgeRock uses Splunk. ForgeRock's integration with Splunk is very easy and straightforward.

    In terms of the tool's adaptive risk and intelligence features, I can say that it is an area that is time-based. In different regions, the working hours are different. We can configure the tool based on the timing and the work location.

    In terms of the tool's operational efficiency, ForgeRock Access Management is used in a lot of environments, different regions, and in different stages of production environments. Manual monitoring is not possible, especially monitoring everything with the system memory and CPU memory, along with the user behaviors. Splunk easily monitors everything. From a business perspective, it will reduce risk and then reduce manpower. Splunk provides exact results and monitoring results to track a particular issue so we can easily identify the issue.

    We usually receive alerts regarding high CPU utilization because of the high traffic we receive.

    I can't comment on whether the tool helps in the area of predictive analytics or automated threat detection.

    I recommend the product to others. I can also recommend products like CyberArk and Okta. Wherever we need to monitor the environment, specifically the cloud environment or on-prem one, I can suggest all the above-mentioned tools.

    I rate the tool a nine out of ten.

    View all reviews