This repository contains short and simple routes ready to deploy for Forgerock Identity Gateway (IG)
An install of Forgerock Access Management (AM) is required to perform authentication/authorization examples.
- AWS: Deploy OpenIG with Amazon Web Services(scripts and utilities)
- Docker Secrets and IG Secrets
- OAuth2: NASCAR page - Authenticate through AM, Google, MSN or LinkedIn
- OAuth2: Discovery
- OAuth2/OpenID: Authenticate through AM, check the token and get access to your protected application!
- OAuth2/OpenID: Authenticate using private_key_jwt
- Policy Enforcement Filter(PEF): how to retrieve attributes in a policy decision
- Policy Enforcement Filter(PEF): how to set environment and retrieve advices in a policy decision
- Policy Enforcement Filter(PEF): configure AM as a PDP (groovy script only)
- UMA 1.0 (groovy script only)
- UMA 2.0 (groovy script only)
- JwtBuilderFilter(6.1): Passdown AM user information from IG into a header
- Create a simple redirect route
- User Profile: Retrieve user information from AM
- STS: transform OAuth2/OpenID to SAML assertions!
Note: that IG is now launched in PRODUCTION MODE by default
Don't forget to change it to DEVELOPMENT to access Studio or for editing routes.
Tip: You can run IG with java -jar start.jar -Dig.run.mode=development
Don't panic!
There are Groovy scripts provided for each example to help you to configure your AM quickly.
Each folder contains Groovy scripts which are configuring AM via REST: configure OAuth2Provider, Policies, Identities and so on...
- Get Forgerock Identity Gateway IG
- Get Forgerock Access Management AM
- IG JIRA
- Forgerock official website
This project is not supported by ForgeRock AS.