Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

PingOne for Workforce

Ping Identity

Reviews from AWS customer

3 AWS reviews
  • 5 star
    0
  • 3
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

17 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Anderson-Moura

Training has improved authentication workflows and now supports flexible access management

  • February 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

The main use case for ForgeRock is to work with IAM for authentication and authorization trainings, using the environments during the training sessions and providing samples for ForgeRock customers. I have trained both enterprise organizations and smaller companies. Enterprise organizations are checking if they really need to upgrade to the new version or release, while smaller companies are trying to determine if they need to start using ForgeRock.

What is most valuable?

ForgeRock is very easy to use, and the UI is very simple to navigate. The platform includes a lot of use cases that can be utilized during training. ForgeRock provides a complete solution for authentication and authorization, which is excellent. There is no need to buy additional products to complete the solution, as it can be used with many business cases to improve authentication and authorization for websites.

The installation process is very easy and fast to start using ForgeRock technology. After installation, you can immediately start using the solution to manage your websites.

Considering the impact on the organization and trainees, we received very positive feedback after the trainings. Trainees agreed to upgrade to the new version after using older releases, and they noticed they could connect with apps or different websites and create workflows to access and share the data they want. This feedback is very positive.

ForgeRock, being based on Linux, has very good documentation about the files generated by the application. However, if everything works fine, it is easy to use, but if there are errors, you need to know where the log files are and what to check. The documentation regarding integration capabilities is very comprehensive because ForgeRock is an agnostic solution. We can use a Linux image from ForgeRock with different systems, applications, websites, and mobile apps to create various types of access for users.

The main purpose of ForgeRock is security because you can create internal groups and users or connect with on-premises or cloud security tools like Active Directory. You can use both, and during trainings, we performed tests that showed its effectiveness.

What needs improvement?

ForgeRock, being based on Linux, has very good documentation about the files generated by the application. However, if everything works fine, it is easy to use, but if there are errors, you need to know where the log files are and what to check. A point for improvement would be to bring more of these errors to the UI for administrators to help them understand what happened and how to fix it.

I chose a rating of nine out of ten because of the problem regarding the logs. To identify and fix issues, users need to search through different log files. If ForgeRock could enhance this feature in the UI to aid users, I believe that would be perfect, and it would receive a ten.

For how long have I used the solution?

I worked as an instructor for ForgeRock, and I am not using this technology in my current work, but I used it for three years. I started working with ForgeRock in 2019.

What do I think about the stability of the solution?

ForgeRock is very stable because it manages access, authentication, and authorization effectively. It supports connection with internal or external Active Directory and provides a stable experience.

What do I think about the scalability of the solution?

ForgeRock has excellent scalability. You can start small with internal user management and increase the number of groups and users or switch to external user management easily, and apply load balancing for your systems as needed.

Which solution did I use previously and why did I switch?

Before using ForgeRock, I had to use a homemade solution to execute all the features that ForgeRock provides, which was very difficult. I find ForgeRock very good because it provides everything needed to develop and check for security while connecting with different technologies.

How was the initial setup?

The installation process is very easy and fast to start using ForgeRock technology. Installation is straightforward and quick, and after this, you can start using the solution to manage your websites.

What about the implementation team?

Considering the impact on the organization and trainees, we received very positive feedback after the trainings. Trainees agreed to upgrade to the new version after using older releases, and they noticed they could connect with apps or different websites and create workflows to access and share the data they want.

What was our ROI?

ForgeRock's integration capabilities are very easy to use because it is an agnostic solution. We can use a Linux image from ForgeRock with different systems, applications, websites, and mobile apps to create various types of access for users.

Which other solutions did I evaluate?

Before using ForgeRock, I had to use a homemade solution to execute all the features that ForgeRock provides, which was very difficult. I find ForgeRock very good because it provides everything needed to develop and check for security while connecting with different technologies.

What other advice do I have?

Others should check if they have a draft idea of how they want to use ForgeRock's authentication and authorization solution before starting. They can then use samples and documentation to understand how to implement the solution and plan for growth. They should also discuss possibilities with ForgeRock's sales and support areas. My overall rating for ForgeRock is nine out of ten.


    reviewer2803803

Fine-grained access and MFA have improved customer login journeys but support still needs work

  • February 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for ForgeRock is mostly access management related fine-grained access management for customer identities.

For fine-grained access management, I use ForgeRock based on the customer base, whether they belong to a particular company or a particular third party. I consider what their use cases are and how they want to integrate or access the applications. Accordingly, I expose ForgeRock Access Management integration either via OAuth 2 or SAML 2 integration, allowing them to access the application in a secure way.

My customers also want to include the multi-factor authentication component, using mobile verification or email verification. They want to store their profile details so that every time they log in, they won't be prompted for MFA. It will be remembered for at least the next 30 days, and they won't be prompted for any second factor, allowing them to log in seamlessly.

What is most valuable?

The best features ForgeRock offers depend on the use case or requirement of the customer. ForgeRock has a variety of access management and identity management tools, and they have new offerings as well, especially the Advanced Identity Cloud. Everything is in ForgeRock Cloud, and I don't need to manage my infrastructure at all. I will be configuring it to my company requirement and can access it. I can integrate ForgeRock Identity Management and access management for employee lifecycle management, covering joiner, leaver, and mover related workflows. From a customer point of view, there are many other functionalities available depending on what kind of use case they are interested in and how they want to integrate, authenticate, or authorize the applications. I can use the tool in various ways, either through authentication tree-based workflows, WebAuthn, or many other options, integrating and using it according to my needs.

The cloud offerings through Advanced Identity Cloud mean I don't need to set up infrastructure and I don't need to worry about application requirements for infrastructure. It's seamless and available almost immediately. I just need to configure ForgeRock Identity Cloud, connect to my company name and standards, and it's ready to be usable. I just need to customize my flow for custom business workflows. For POC and for very basic testing purposes, it's straightforward. I just need to do fine-tuning so I can use it immediately to test the use cases or basic scenarios.

Since ForgeRock is an authentication tool, it gives more use cases and more revenue for companies. This is useful for everyone, creating a win-win situation for the customers and the implementers. It is very useful for revenue generation as well as day-to-day work for employees.

What needs improvement?

ForgeRock can be improved by integrating the latest AI-based models and latest trends in the identity industry with the existing product. That way, they can offer more features to customers and secure customer identities and access.

From a usability point of view, it's almost good. Support depends on different models, particularly a severity model. Accordingly, they will respond. It would be better if they were available for support whenever the customer needs it, especially during migration or go-live time periods. If they were available on standby during those times, that would be more useful.

For how long have I used the solution?

I have been using ForgeRock for more than ten years.

What other advice do I have?

Since I am implementing this for the third party and managing the infrastructure for the actual customers, I am managing the infrastructure and the product on top of it. Whenever a new work order comes in, I work on it and based on the work I do, I will be billed and paid. This results in revenue generation.

I would ask others looking into using ForgeRock to try the product and conduct a POC to see the look and feel of it, how it works, and how it can satisfy the main use case or the use cases for the organization. That way, you can determine whether it is for you. You can decide whether you want a traditional infrastructure-based model or the Advanced Identity Cloud.

I have a different offering, such as the reverse proxy related offering from ForgeRock Identity. There are new offerings in the current or existing latest model. They have already moved away from the old infrastructure model to the cloud-based model and are adding AI integration as well, providing a more secure and intuitive interactive way for customers to interact with the product and get the details they want.


    Atowheed Tahid

Unified identities have improved customer journeys and enabled secure in-car service access

  • February 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

In 2014, we had two use cases with ForgeRock. One was for consumers, with 60 million consumers of the TomTom navigation system. The other was approximately half a million use cases for B2B purposes for implementing ForgeRock in cars, with the first batch of cars being Korean vehicles.

For the consumer use case, we launched a program called One TomTom ID where a single user ID could be used to log into the web, app, and navigation device with ForgeRock. Previously, there were three different user IDs because of how the company had grown with different platforms. This was a main use case for better customer experience and improved security. For the B2B use case, different car companies wanted to get traffic information into their dashboards, and the best way to authenticate was to embed custom code into their dashboard. Whenever the car started up, the car's VIN number would be authorized if it was on the list to receive traffic information from TomTom, and they would receive it.

When authenticating a car to determine whether it was authorized to receive traffic information with ForgeRock, it was not straightforward because anyone could drive a car, so it could not be user-based. Authentication had to be based on the car's navigation ID, the dashboard ID, and the VIN number, which are directly related to the car and apply to whoever is driving it. To accomplish this, we had to issue a token. Every time a car started up for the first time and connected with the back-end system, it was issued a token that would authorize it to receive traffic information, which was a very efficient and neutral solution.

What is most valuable?

When we started using ForgeRock, it was the only premium platform that could provide this kind of security for different platforms. Its platform was built in a way where it could be applied to consumer-based use cases, but also to B2B in different capacities with token and tokenized systems, giving all kinds of options for both consumer-based and B2B scenarios.

In the B2C space, ForgeRock gave our consumers a very strong and good customer experience. We were able to manage security for B2C devices, which totaled 60 million at one location. We always took feedback from customers through surveys after implementing ForgeRock, and they gave very positive feedback. The customers of TomTom were very loyal and had been using TomTom services for a very long time, even using their personal navigation devices. Because of a single user ID being used across platforms, we had a lower amount of abandoned baskets since previously, customers would be confused about which user ID and password to use, whether it was for the web, mobile app, or device. This created very good synergy and a better experience for our customers.

On a B2B level, it opened up the market for TomTom to sell its services in a more efficient way to car companies. In the past, it used to be very complicated to set up separate servers for traffic flow and different information. Now we did not have to do that. Although it is difficult for me to give a specific percentage, it opened up the market for TomTom, and I believe they made several millions from it.

What needs improvement?

ForgeRock can be improved by making it easier to understand the licensing and upgrade protocols. The licensing was very complicated, and it required considerable time to understand which components required what kind of licensing. The upgrade process was also complicated and required significant effort to upgrade the platforms, which created a resource constraint but was necessary.

Documentation and support from ForgeRock's support desk were available, but the upgrade process remained complicated and took considerable effort, which diverted resources away from main projects.

For how long have I used the solution?

I have used ForgeRock since 2014.

What do I think about the stability of the solution?

ForgeRock is stable, and I have never experienced any problems.

What do I think about the scalability of the solution?

We scaled up with ForgeRock. My team received an award for implementing it for a 60 million customer base, which was the largest implementation at that time. Also, for the B2B use case, it was very easy to deploy the solution for different car manufacturers. From that perspective, the ease of deployment and scalability is very good.

How are customer service and support?

ForgeRock's customer support is very good. Generally, the team is very responsive and takes a sense of ownership and accountability.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

I previously used a different solution before ForgeRock, which was custom-built and homegrown. It was stitched together across platforms; the web had a different solution, the mobile app was different, and the navigation device had different setups. All solutions were homegrown and home-brewed.

I inherited the project when we were evaluating ForgeRock as the final solution. I do not remember the other company because it was in 2015.

How was the initial setup?

On the pricing side, it was reasonable. As a customer, one always prefers lower costs or pricing. On the setup and implementation side, since we were doing it for the first time and the impact would have been substantial, it took considerable time and money to implement. There was a setup cost at that moment. However, we knew that later versions would have been much easier, but we were early adopters.

What about the implementation team?

We purchased the software through a company called Everett in the Netherlands. That company also provided implementation services, which we utilized effectively. That company was later acquired by PwC, and we continued to work with them until 2018 and 2019, whenever we needed assistance. In the initial couple of years, they were very involved in the implementation side and on-site support, which was very good.

What was our ROI?

The most significant benefit is from the security perspective. We were able to assure that there were no challenges with security. We never experienced any user ID, user password, or personal information being leaked because it was a very secure system that we implemented properly.

On a B2B level, it opened up the market for TomTom to sell its services in a more efficient way to car companies. In the past, it was very complicated to set up separate servers for traffic flow and different information. Now we did not have to do that. Although it is difficult for me to give a specific percentage, it opened up the market for TomTom, and I believe they made several millions from it.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing was somewhat complicated. One has to spend considerable time trying to understand the different modules and different needs for those modules on the licensing front.

What other advice do I have?

The advice I would give to others looking into using ForgeRock is that ForgeRock as an IAM platform is not the problem. The problem always lies with whether the customer is very clear on what they want to do and has made up their mind before acquiring the platform. Generally, the challenges occur on the implementation side when the customer is not ready to implement or does not have all the use cases figured out. That is why they get a very minimal return on investment. At our end, before we signed the deal, we were very strong on how we were going to implement, and we already had enough design documents in place to understand the different requirements. That is why implementing and executing was a key focus. Any future customer should know what they are going to do with the platform before acquisition; it is like learning to drive before buying a car. I gave this review a rating of eight.


    SumitGupta5

User journeys have streamlined migrations and self-service grows while scripting still needs simplification

  • February 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for ForgeRock is designing user journeys, specifically customer user journeys, and how they interact with the system.

A specific example of a user journey I designed using ForgeRock is when we migrated from an older IAM system, Okta, to ForgeRock. We designed a journey to log into one of the partner portals, where the password was still authenticated via Okta for the first-time migration users. We configured pass-through authentication, and once the user's login is completed, we mark it as a migrated user, synchronizing their password with ForgeRock Directory Server. In that journey, we implemented various configurations such as step-up control and orchestration, where based on the risk level populated via PingProtect service, either a step-up is required via email or via a one-time text message before granting access.

In addition to my main use case, we have multiple use cases, with over 30 journeys live for the different systems that the company uses, including various flows such as forgot password, reset password, and forgot username, which utilize utility journeys that are repetitive in nature.

What is most valuable?

The best features ForgeRock offers, in my experience, include their directory services, access management, and identity management, along with the Journeys feature that lets you orchestrate and design your user path in various easy ways. They are very configurable using JavaScript, which I find to be the most useful part.

The Journey feature has made my work easier and more effective because, unlike other tools, from the input we receive from the user, such as the username, we can decide whether to prompt them for a password, send a one-time password link, or a one-time passcode. Many actions can be performed at runtime based on the inputs received, which I find quite useful, and for anything that cannot be achieved out of the box, a simple JavaScript can be written to transform data or perform additions for passing to the next node. There are many out-of-the-box nodes available for integrating with other Ping components or calling out to other SaaS services.

The other features are pretty much the same as other components such as Oracle or Ping, but the Journeys in ForgeRock are something that I really appreciate, while the rest of the features are fairly standard across other IAM components.

ForgeRock has positively impacted my organization by allowing us to migrate from the older system to the newer ForgeRock component, enabling us to go live with many products across geographies, enhancing security as it is all cloud-based, and with the company taking care of availability, it has reduced costs for the company.

In terms of specific outcomes, previously, single sign-on was not implemented, requiring users to remember their passwords across various systems. Now, those issues have been resolved, and users have appreciated this initiative. We centralized all systems from Okta and Microsoft on-premise AD to ForgeRock, which is quite beneficial, and there is also a self-service functionality available for tasks such as resetting passwords or retrieving usernames, leading to a significant reduction in customer service calls.

What needs improvement?

I wish the JavaScript part could be improved, as not everyone is proficient in JavaScript, so automating that or reducing the reliance on it could be beneficial. Additionally, having only one realm in the cloud version, the alpha realm, feels limiting, and I would prefer having more than one realm as we had in the on-premise version of ForgeRock.

I do not have any other improvements needed for ForgeRock that I have not mentioned.

For how long have I used the solution?

I have been using ForgeRock for three years.

What do I think about the stability of the solution?

There seem to be no issues so far with ForgeRock in terms of stability.

What do I think about the scalability of the solution?

Regarding scalability, since ForgeRock is in the cloud, it is pretty scalable.

How are customer service and support?

The customer support is fine; we typically have to go through an online ticketing system on their website. I would rate the customer support eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously used Ping Identity before transitioning to ForgeRock.

What was our ROI?

I do not have the precise price point on the return on investment, but I have heard in management calls that we have reduced the number of employees needed, and money has definitely been saved.

Which other solutions did I evaluate?

Before choosing ForgeRock, my organization evaluated other options, including Okta, which was previously implemented.

What other advice do I have?

My advice for others looking into using ForgeRock is that it is really good, particularly the Journeys functionality, which allows you to configure user journeys in a more efficient way. I do not have any additional thoughts about ForgeRock. I would rate this review seven out of ten.


    reviewer2803032

Robust IAM has managed large user bases and has streamlined complex provisioning workflows

  • February 16, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for ForgeRock includes user provisioning, deprovisioning, reconciliation, workflows, cross-federated SSO, integrating applications, third-party applications into ForgeRock, managing users and entities, and handling password resets, among other functionalities.

I onboard applications into IDM for user provisioning and SSO, managing user identities effectively. We also integrate and onboard those applications into ForgeRock Access Management, allowing users to log in to their applications, get their identities authenticated against ForgeRock, and access their applications seamlessly. This approach is especially pertinent as we focus on customer IAM, utilizing CIAM profiles.

What is most valuable?

ForgeRock offers a very scalable solution, which is one of its best features. You can have a lot of functional components operating simultaneously, and it is very developer-friendly. The solution is highly scalable, allowing us to define our own managed objects. Additionally, ForgeRock provides excellent features for workflows, which we use for account claiming and linking, highlighting the solution's scalability and flexibility.

ForgeRock positively impacts our organization as we manage a large number of users with ease, providing a standard IAM solution that simplifies our processes.

What needs improvement?

ForgeRock can improve by offering a unified development IDE for workflows, as we currently maintain BPMN, XML, JSON, and JavaScript separately. Presently, I use Flowable UI to create a BPMN and onboard it to ForgeRock, which is not efficient. Additionally, the front-end development should be more user-friendly for IAM developers, who may not be well-versed in Vue.js. ForgeRock needs to focus on low-code, no-code solutions that allow for drag-and-drop functionality with good orchestration. ForgeRock and Ping should consider providing free vouchers for certification and training to developers to boost market presence, as there is currently a significant gap between good ForgeRock developers and companies looking to implement ForgeRock solutions.

What other advice do I have?

My advice for others considering ForgeRock is that it completely depends on your use cases. ForgeRock is a very potent product that can fit well into a variety of solutions. If you manage a large user base, particularly planning for RBAC and multiple applications, it is easily manageable with ForgeRock. The product's stability and cost-effectiveness are significant advantages.

Having worked with multiple tools such as CyberArk, Delinea, IBM IGI, IBM ISIM, and SailPoint, I find myself very inclined towards ForgeRock due to its capabilities, especially in CIAM, which stands for Customer Identity and Access Management. As an IAM developer and architect, I favor this tool over others due to its extensive functionalities.


    Shreya Reddy

Centralized access control has improved secure onboarding and supports strict compliance

  • February 14, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our main use case for ForgeRock is to manage secure user authentication and authorization for our enterprise platform. For example, we use ForgeRock to implement OAuth 2.0 authentication flows and ensure that only authorized users can access sensitive onboarding workflows and data. A specific scenario would be when a new user is onboarded. ForgeRock handles the authentication process, enforces multi-factor authentication, and manages user roles and permissions to control access to different stages of the onboarding lifecycle, such as draft, submission, approval, and finalization. This integration helps us maintain regulatory compliance as well as auditability and security with multiple user roles, while also streamlining user experience and reducing the risk of unauthorized access.

Integrating ForgeRock with our onboarding workflows has been a valuable learning experience because there are both smooth and challenging aspects. The smoothest part is ForgeRock's standards-based support for Auth and SAML, which makes it straightforward to set up secure authentication and single sign-on for our onboarding module. ForgeRock's comprehensive documentation and RESTful APIs also help accelerate the integration. One challenge is mapping our complex multi-stage onboarding workflows, where users transition between draft, submission, and approval stages to ForgeRock's role-based access controls and policy configurations. We had to carefully design custom policies and attribute mappings to ensure that only the right users could perform specific actions at each stage, which required close collaboration between our development and security teams. Another tricky aspect is handling legacy user data and ensuring seamless migration to ForgeRock without disrupting existing user access or compliance requirements. Overall, the integration is successful, and the flexibility of ForgeRock's platform allows us to tailor the solution to our specific needs.

One thing that stands out about our main use case and the integration process is how ForgeRock's centralized policy management makes it much easier to enforce consistent security and compliance rules across all stages of the onboarding process. We are able to implement fine-grained access control, so permissions can dynamically adjust based on user roles and the current status of the onboarding request. ForgeRock's auditing and versioning features are particularly valuable for our compliance needs, allowing us to track every access and every modification event. Additionally, the flexibility to integrate with our existing tech stack including Java, Spring Boot, and Apache Kafka helps us avoid major architectural changes and keeps the project timeline on track. ForgeRock's extensibility and strong support for enterprise standards are key factors in the success of our implementation.

How has it helped my organization?

Initially, the primary improvement was security. By implementing standards-based authentication and access controls, we reduced unauthorized access incidents and strengthened our overall security posture. Next would be compliance. Centralized policy management and comprehensive auditing features made it much easier to meet regulatory requirements and pass company compliance audits. Efficiency was another major improvement. Automating user provisioning and access management streamlined onboarding processes, cutting manual administrative work and reducing onboarding cycle time. User experience also improved. The self-service features like password resets and account recovery improved user satisfaction. Another important positive impact was operational stability. The integration with our backend systems and the ability to manage policy centrally led us to fewer configuration errors. ForgeRock enabled us to deliver a more secure and compliant onboarding experience while also improving efficiency.

After implementing ForgeRock, we saw a reduction in onboarding cycle time by roughly twenty-five percent as automated workflows and centralized access management eliminated many manual steps. Security incidents related to unauthorized access or misconfigured permissions dropped by forty percent, and audit preparation time decreased by approximately thirty percent because of ForgeRock's comprehensive logging and reporting features. We also noticed a twenty percent reduction in user support tickets, especially regarding password resets and account recovery due to the self-serving capabilities. While these are rough estimates, they reflect the tangible improvements we experienced in efficiency, security, and user satisfaction.

What is most valuable?

The most valuable features ForgeRock offers are its support for standards-based authentication and authorization protocols including OAuth 2.0 and SAML, which make it a secure integration. The fine-grained role-based access control has been essential for managing complex user permissions across different onboarding workflow stages. Centralized policy and configuration management allows us to enforce consistent security and compliance. The platform's extensibility, along with RESTful APIs, makes it easier for us to integrate with our existing Spring Boot backend and other enterprise systems. Multi-factor authentication support and risk-based authentication have added significant value by enhancing security without compromising user experience.

Centralized management makes the biggest difference because it allows us to define, update, and enforce security and compliance rules from a single location, which is crucial given the complexity of our onboarding workflows and the need for strict compliance. This feature reduces manual configuration errors, improves consistency across different modules, and makes it much easier to audit and demonstrate compliance to internal and external stakeholders. It also streamlines collaboration between development, security, and compliance teams since everyone can work from a unified set of policies. Overall, policy management not only improves our security but also accelerates our development.

What needs improvement?

I wish we had used ForgeRock's adaptive risk-based authentication, which allows dynamic adjustment of authentication requirements based on user behavior. This could have helped us further strengthen our security. Another hidden gem is the built-in support for custom authentication modules and scripting, which gives a great deal of flexibility to tailor authentication flows. The self-service capabilities for password resets and account recovery have been very helpful in reducing support overhead and improving user experience. Discovering and utilizing these features would have definitely made our integration even smoother and would have provided additional value for both our users and our security team.

One area of improvement would be the user interface for policy and workflow configuration, which can become complex and sometimes unintuitive, especially for new administrators. A more streamlined and user-friendly UI would help reduce the learning curve. Enhanced out-of-the-box analytics and reporting would also be valuable, as our current options often require custom development or integration with external tools. While extensibility is a strength, documentation for advanced customizations and integrations could be more comprehensive and easier to follow. Improved support for seamless upgrades and backward compatibility would also help minimize downtime.

In terms of performance, optimizing the platform for high concurrency environments would be beneficial, especially for organizations with large user bases or peak usage periods. Enhanced scalability features such as more granular or horizontal scaling options would provide better support for distributed deployments. For integrations, having more pre-built connectors and easy integration with modern cloud-native services would accelerate adoption. Improved monitoring and real-time health dashboards would help proactively identify and resolve performance bottlenecks.

For how long have I used the solution?

I have been working in my current field for seven years.

What do I think about the stability of the solution?

ForgeRock supports integration with legacy systems in our organization by offering a wide range of connectors and APIs. We utilize the identity gateway and REST APIs to bridge modern identity service with legacy platforms. These platforms support standard protocols including LDAP, SAML, and OAuth, which helps us connect with older systems. Custom connectors and scripting capabilities also allow us to tailor integrations with unique applications. This approach enables us to modernize our IAM infrastructure while still leveraging critical legacy systems.

With scalability in mind, ForgeRock supports both horizontal and vertical scaling to accommodate our growing user bases with increased transitions. We leverage containerization and orchestration tools to deploy ForgeRock components, which allows us to scale services up and down. Load balancing and clustering features ensure high availability and distribute traffic efficiently. Caching mechanisms, such as Redis cache or Ehcache, are used to reduce database load. One challenge we face is tuning the system for peak loads, especially during onboarding spikes or regulatory deadlines, but by optimizing our infrastructure and monitoring, we are able to address these bottlenecks.

What do I think about the scalability of the solution?

ForgeRock supports multi-factor authentication and risk-based authentication in our organization by allowing us to enforce additional authentication steps, such as OTPs, push notifications, or biometrics. The platform provides flexible authentication trees, enabling us to design custom MFA flows tailored for different user groups and risk profiles.

How are customer service and support?

ForgeRock's customer support team has been responsive and knowledgeable, assisting us during our technical challenges and when we needed guidance on best practices. The support team provides timely assistance. The support portals offer comprehensive documentation, troubleshooting guides, and community forums that have been helpful for resolving common issues independently. Overall, my experience with customer support has been positive, contributing to smoother deployments and ongoing maintenance.

How would you rate customer service and support?

Positive

What other advice do I have?

I believe it is important to clearly define and thoroughly assess your organization's identity and access management needs upfront. ForgeRock's flexibility can be both a strength and a challenge if requirements are not clear. It is crucial to pay close attention to initial architecture and design, especially around authentication flows, user journeys, and integration. Additionally, investing in training for your technical team is essential because ForgeRock's platform is powerful but can have a steep learning curve for those new to it. Be cautious about potential complexity in customizations. While ForgeRock is highly extensible, over-customizing can complicate upgrades and maintenance. Ensure you have a solid plan for monitoring, logging, and compliance from the start.

I appreciate ForgeRock for its strong focus on security, which is critical for organizations handling sensitive data. My overall review rating for this solution is an eight.


    Ie Ogbonnaya

Flexible policies and automation have improved our support, troubleshooting, and cloud deployments

  • February 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

I am using ForgeRock for standard support, policy configurations, and documentation clarity.

The pricing, setup cost, and licensing are very straightforward, which is a good success. I appreciate that it is very straightforward and helpful.

The customer support is very flexible and supportive, particularly in the area of automation and customer deployments. It is very helpful and supportive to our customers.

What is most valuable?

I appreciate ForgeRock for its flexibility and standard support. It helps significantly in policy configuration, authentication, and troubleshooting.

The policy configuration feature helps my team considerably because it aligns our business objectives to all policies. It makes it easier and more flexible to assign roles based on access control. It helps us in policy configuration, assigning roles, and onboarding and offboarding of users.

ForgeRock helps me in debugging token flows and automation support in deployments of software to the cloud. It has assisted me in solving debugging issues.

ForgeRock has made a huge impact on our company because it helps us with DevOps automation support and policy configuration. It has helped us tremendously, even in troubleshooting, making it easier to navigate and understand. It provides a better and proper view of how to approach troubleshooting.

An example of how ForgeRock improved our DevOps automation is that it saves us considerable time. Throughout the automation process, it helps us analyze our source code and automation processes. It made the process flexible enough that in less than thirty minutes or forty-eight hours, we complete the automation process.

What needs improvement?

There are some areas I want ForgeRock to improve. These areas include policy configuration, documentation clarity, UI complexity, and debugging token flow.

I want ForgeRock to improve in documentation clarity, UI complexity, debugging token flow, policy configuration, and DevOps automation support.

For how long have I used the solution?

I have been using ForgeRock for over three years.

What do I think about the stability of the solution?

ForgeRock is very stable.

What do I think about the scalability of the solution?

I would rate ForgeRock's scalability an eight out of ten. The scalability is very fine and acceptable to me, and I would recommend it to someone else.

How are customer service and support?

The customer support is very flexible and supportive, particularly in the area of automation and customer deployments. It is very helpful and supportive to our customers.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used CyberArk before, but I discovered the flexibility of ForgeRock and its powerful tools and features in keeping standard structures simple and understandable.

How was the initial setup?

The pricing, setup cost, and licensing are very straightforward, which is a good success. I appreciate that it is very straightforward and helpful.

What about the implementation team?

Over the past two to three years, we have had great metrics of success, saving costs, and ensuring that the process runs smoothly.

What was our ROI?

Over the past two to three years, we have had great metrics of success, saving costs, and ensuring that the process runs smoothly.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing are very straightforward, which is a good success. I appreciate that it is very straightforward and helpful.

Which other solutions did I evaluate?

I was recommended to ForgeRock, and it was worth it.

What other advice do I have?

I would like ForgeRock to improve in the area of debugging token flow and DevOps automation support for cloud deployment. I give this product a rating of eight out of ten.


    Snidam Snidam

Centralized identity has unified SSO, adaptive MFA, and risk-based access for web applications

  • February 13, 2026
  • Review from a verified AWS customer

What is our primary use case?

I integrated ForgeRock SSO with a web application that had React for the front end and a Spring Boot back-end API, where ForgeRock AM was acting as an authorization server and an identity provider. Users were stored in ForgeRock and LDAP through ForgeRock Directory Studio. Our goal was to enable SSO using OpenID Connect, issue JWT access tokens, and enforce MFA for sensitive actions.

We created an OIDC client and set up the client ID, redirect URI, and grant type as an authorization code. We checked all the token endpoints, defined the scopes, token lifetime, and signing algorithms. We implemented the login flow where the user goes to the app and is redirected directly to ForgeRock when the app sees no session. When ForgeRock executed the authentication tree, it handled username, password, device check, risk calculation, and optional MFA. After successful authentication, ForgeRock redirects back with the authorization code.

We also used a Spring Boot API which validates API protection and validates the JWT signature using the ForgeRock public key, checks expiration, issuer, audience, and scopes. This is how we implemented MFA and SSO.

What is most valuable?

ForgeRock offers several features that stand out, especially compared to other IAM platforms. The first is flexible authentication flows. The ability to visually design adaptive authentication flows with nodes such as password, username, risk decisions, device checks, OTP, and push setups gives tremendous control without hardcoding logic, which makes complex authentication very easy to implement.

The second feature is strong support for modern protocols. ForgeRock has first-class support for OIDC, OAuth, SAML, and JWT, which is valuable for SAML and SSO scenarios. I can integrate nearly any web or mobile application and enforce any centralized security controls consistently. The third is risk-based authentication. Being able to evaluate risk signals such as IP reputation, device context, location, and adaptive rules, and then trigger MFA when needed is a huge advantage.

ForgeRock also has very good API security features and its own directory and user management services, which include ForgeRock DS or OpenDJ for PingDS. The policy engine and centralized authorization are very strong. Finally, the enterprise operational features such as token lifetime tuning, session management, monitoring, audit logs, certification, and keystore management are excellent. These do not sound flashy, but they make a very good IAM platform. Running IAM at scale is more manageable for a very large organization. ForgeRock has had a very positive impact on my organization, especially in terms of standardization, security posture, and operational efficiency.

What needs improvement?

ForgeRock is very powerful, but there are areas where it could be improved. The main area is complexity. ForgeRock is extremely flexible, but the learning curve can be steep. Authentication trees, policy configurations, and integration settings can become very complex quickly, especially for those new to the platform or in a very large organization. More simplified onboarding templates or guided configuration options could help new users significantly.

Another area is the UI and administrative experience. While the platform is functionally strong, some parts of the admin console feel less refined. For example, debugging authentication flows or troubleshooting tokens sometimes requires digging into logs rather than having more visual tools built in.

The deployment and operational setup could also be streamlined further. In larger-scale or cloud-native environments, containerization and CI/CD integration are very important. While ForgeRock supports this, the configuration and upgrade process can sometimes feel heavier compared to more SaaS-native identity providers.

For how long have I used the solution?

I have more than three years of experience in the field of identity and access management. I was first introduced to ForgeRock during a two-year contract, and this is the product I am reviewing.

What do I think about the stability of the solution?

ForgeRock is very stable in my experience.

What do I think about the scalability of the solution?

ForgeRock scales very well if the architecture is designed properly. The access management layer is stateless, so I can scale horizontally by adding more nodes behind a load balancer as traffic increases. DS replication also helps maintain performance and availability as the user base grows. When application integrations increase, token validation and authentication traffic go up, but the platform handles it very quickly.

How are customer service and support?

I have interacted with ForgeRock support a few times, mainly for configuration clarifications and complex authentication flows. My experience was positive overall. For standard support tickets, response times were very decent, and the support team was helpful in identifying configuration issues, especially with authentication trees, token settings, and directory replications. I found their documentation fairly comprehensive, which helped reduce the need to open tickets for common configuration questions. The support quality was solid, and response times were very fast.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We tried many different SaaS applications before ForgeRock. We used an on-premises application, and later we thought ForgeRock would be a better option. We evaluated different options in the market and determined that ForgeRock would be the better choice, so we migrated everything to ForgeRock.

What was our ROI?

I can definitely see that fewer employees are needed compared to using different SaaS applications. We have seen this as a return on investment using ForgeRock.

What other advice do I have?

The advice I would give to people looking into using ForgeRock is that it is very powerful, and that flexibility can become complexity if you do not define standards early, especially around token policies, naming conventions, and role models. I suggest investing in skilled IAM engineers. ForgeRock is not a plug-and-play SaaS tool; it is an enterprise platform. Having team members who understand OAuth, OIDC, SAML, LDAP, and security architecture will make a significant difference in a successful implementation. I would rate this product an 8 out of 10 overall.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Senthil Kandhasamy

Offers good multi-factor authentication and single sign-on capabilities to users

  • July 17, 2024
  • Review provided by PeerSpot

What is our primary use case?

One of my company's customers has already integrated ForgeRock and set up Splunk. We just did some simple configuration, but not much since our customer did it.

I use the tool for its single sign-on capabilities. With ForgeRock, we can enable single sign-on and multi-factor authentication features, as well as single-layer or two-layer multi-factor authentication and password-less authentication.

What is most valuable?

Basically, we enable multi-factor authentication when logging in to ForgeRock. With ForgeRock Access Management, we can access Splunk using single sign-on capabilities. If you need one more multi-factor authentication for Splunk, we can enable it for that particular application. We already enabled multi-factor authentication for ForgeRock Access Management. Users are authenticated through multi-factor authentication, so Splunk does not require one more such tool. If you want the improvements and prefer one more multi-factor authentication tool, then it is okay.

What needs improvement?

In the past, I saw that Splunk was integrated with a testing portal, and then it was integrated with Slack. I don't think ForgeRock directly supports integrations with Slack, making it an area where improvements are required.

For how long have I used the solution?

I have been using ForgeRock for a year and a half. One of my company's customers uses the tool. My company implements and offers support for the tool.

How are customer service and support?

I provide full support in the application integration for our customers.

Which solution did I use previously and why did I switch?

I have used Splunk for CybeArk for one of my company's customers. I don't know of particular advantages in ForgeRock as such, but it helps reduce manpower and improve security, and then we can keep the environment stable.

How was the initial setup?

The product's implementation phase is very easy, but a lot of customizations are required.

What other advice do I have?

ForgeRock uses Splunk. ForgeRock's integration with Splunk is very easy and straightforward.

In terms of the tool's adaptive risk and intelligence features, I can say that it is an area that is time-based. In different regions, the working hours are different. We can configure the tool based on the timing and the work location.

In terms of the tool's operational efficiency, ForgeRock Access Management is used in a lot of environments, different regions, and in different stages of production environments. Manual monitoring is not possible, especially monitoring everything with the system memory and CPU memory, along with the user behaviors. Splunk easily monitors everything. From a business perspective, it will reduce risk and then reduce manpower. Splunk provides exact results and monitoring results to track a particular issue so we can easily identify the issue.

We usually receive alerts regarding high CPU utilization because of the high traffic we receive.

I can't comment on whether the tool helps in the area of predictive analytics or automated threat detection.

I recommend the product to others. I can also recommend products like CyberArk and Okta. Wherever we need to monitor the environment, specifically the cloud environment or on-prem one, I can suggest all the above-mentioned tools.

I rate the tool a nine out of ten.


    Tavernt Muchenje

Solution has some AI features and works well for the users

  • June 25, 2024
  • Review provided by PeerSpot

What is our primary use case?

We are consultants who have deployed versions of the ForgeRock solution.

What is most valuable?

From a functionality point of view, it's a solid product. Of course, the customers always complain about the price.

The solution has some AI features. It works very well, especially in Identity and Access Management. It helps detect anomalies in user behavior patterns. It also suggests security roles and other ways of doing things based on industry best practices.

What needs improvement?

The price could be better.

It looks like it's well funded, but the joining process with Ping Identity is a concern. It could take priority from a product point of view, which is a concern for customers.

In future releases, I would like to see easier integration with other solutions, like facial recognition and KYC solutions with de-dupe functionality and biometric onboarding. This would help complete the entire use case, especially from a customer identity management perspective.

For how long have I used the solution?

I have been using this product for ten years or so.

What about the implementation team?

We are an implementer and supporter.

What other advice do I have?

Overall, I would rate it an eight out of ten.

We are like a big reference site in Africa, and they've already made a lot of deployments there. So, I would recommend it to everyone.