OpenAM PDF
OpenAM PDF
OpenAM
Unique Benefits
Designed from inception to provide services for the web, cloud, mobile
devices and things, OpenAM has a highly scalable, modular, easy to deploy
architecture that includes Authentication, SSO, Authorization, Federation,
Entitlements, Adaptive Authentication, Strong Authentication, and Web
Services Security - in a single, unified product.
Modern customer facing identity solutions need to employ a light touch
when dealing with users, all while providing the highest possible security.
They need to deliver a great, easy to use service, empowering the user
wherever possible, such as through easy self-registration or password reset.
Otherwise they are very quick to go somewhere else.
Administrators need to be able to provide the delivery of a rich and
personalized experience, and need to provide modern contextual
authentication as well as fine grained authorization.
Developers expect to be able to produce services based on latest open
standards, and need to be able to build and provide those from any device.
The latest OpenAM release delivers on all of these requirements making it
great for users, administrators and developers alike.
OPENAM DATASHEET
OPENAM DATASHEET
Features
Benefits
Modular Architecture
Developer and admin friendly, with task based GUI, REST, C and Java developer tools,
and comprehensive documentation.
Service provider interfaces (SPIs) provide a framework to extend all service modules
such as adding custom authentication modules, federation plug-ins, policy conditions.
OpenDJ comes embedded as a configuration store and a highly scalable and highperformance session-persistent store.
Service is exposed over REST enabling custom or mobile front-ends to utilize it.
Makes it as easy as possible for new users to be able to access protected resources.
Draws new customers in by removing the need to complete lengthy registration forms.
Easy to write scripts, which can call external identity proofing services, ensure a greater
knowledge about who the user is and what their context is.
Scripts can be used to assess risk, calling up stronger authentication mechanisms only when
necessary, which makes life easier for users whilst maintaining the security of the system.
These custom scripts increase the level of assurance and intelligence that the service
provider has, enabling a more informed interaction with the user.
Additional factors can be employed to mitigate risk in these cases, whilst a streamlined
process can be used to make life easier for transactions from trusted devices.
These policies can ensure the right information goes to the right people under the right
conditions.
Externalizing policies with OpenAM simplifies applications, and provides postapplication deployment flexibility.
OpenAM can control who can do what, to which resources, under certain specific
conditions. OpenAM 12 extends how we specify the who to allow the use of an OpenID
Connect token.
This can be used for authorization in scenarios where there is no current user session,
for example, when an offline batch processing routine acts on behalf of a user.
Performance, Scalability,
High Availability
User Self-Service
Social Authentication
Contextual Authentication
(using new Scripting Engine)
Scripted Device
Identification Modules
Extended Authorization
Subjects
OPENAM DATASHEET
Features
Benefits
This delivers greater control over who can do what, when, and under which conditions.
Using point and click, drag and drop operations, sophisticated policies can be built to
deliver controlled access to resources.
It can also be used to track who has made changes to a given policy over time, and what
those changes were.
Widely used in mobile and web applications, OAuth 2.0 and OpenID Connect standards
are rigorously enforced ensuring greater interoperability and consistent behaviour for
developers.
The Mobile Profile is an emerging standard which extends OpenID Connect to deliver
attributes which are important in the mobile world. By including Level of Assurance and
other information as part of the token, OpenID Connect can be used in deployments
requiring high security, whilst delivering a convenient experience for the end user.
REST APIs allow developers to create device agnostic applications. The same API can be
used to access OpenAM from a Web or a native mobile application.
OATH/Soft Token Generator, MSISDN and HOTP (One Time Password) capabilities
enable multi- factor and mobile authentication.
Easily create federated SSO connections with SaaS apps via a GUI-based wizard or can
use out-of- the-box Salesforce.com, Google Apps connectors among others.
Easily setup social authentication with Google, Facebook, MSN, or any OAuth 2.0 provider.
Simple click through setup of Federation IDP and SPs using SAML, OpenID Connect and
OAuth 2.0.
Exposes functions as simple identity web services, so developers can easily invoke them
during the app development process.
Provides client application programming interfaces with REST, Java and C APIs.
RESTful APIs enable JSON or XML over HTTP, allowing users to access authentication,
authorization, and identity services from web applications using simple REST clients.
Mobile Support
Cloud Support
Developer Support
OPENAM DATASHEET
Features
Benefits
A token transformation service which makes life easier for developers to convert
between many identity token types, such as SAML assertions, OpenID Connect tokens,
X.509 certificates and Single-Signon tokens.
For example, a mobile app developer which has possession of an OpenID Connect
Token can easily generate a SAML assertion to access resources held by a federated
service provider.
Developers calling OpenAM REST APIs can be insulated from interface changes by using
a specific version of an API.
All major federation protocols: SAML 1.x, SAML 2.0 (SP, IdP, ECP, and IdP Proxy), WSFederation (asserting, relying party).
Next gen-federation standards for cloud and mobile include full implementation of
OpenID Connect and OAuth 2.0 (consumer, provider, authorization server).
All Web Services security standards- Liberty ID-WSF, WS-I Basic Security Profile, WSTrust (STS), and WS-Policy.
OATH and HOTP standards that allow a mobile phone to be used as a second factor
authentication.
Extensive Standards
Support
SAN FRANCISCO
+1-415-599-1100
VANCOUVER
+1-360-229-7105
OSLO
+47-2108-1746
BRISTOL
+44-1935-804797
GRENOBLE
+33-625-14-96-92
LONDON
+44-20-3598-4786
SINGAPORE
+65-6709-5705
About ForgeRock The ForgeRock Identity Platform transforms the way millions of customers and citizens interact with businesses and governments
online, providing better security, building relationships, and enabling new cloud, mobile, and IoT offerings from any device or connected thing. ForgeRock
serves hundreds of brands like Morningstar, Vodafone, GEICO, TomTom, and Pearson, as well as governments like Norway, Canada, and Belgium, among
many others. Headquartered in San Francisco, California, ForgeRock has offices in London, Bristol, Grenoble, Oslo, Singapore, and Vancouver, Washington.
ForgeRock is privately held, backed by leading global venture capital firms Accel Partners, Foundation Capital, and Meritech Capital. For more information
and free downloads, visit http://www.forgerock.com or follow ForgeRock on Twitter at http://www.twitter.com/forgerock.
ForgeRock is the trademark of ForgeRock Inc. or its subsidiaries in the U.S. and in other countries.
FORGEROCK.COM