ForgeRock Production Deployment Checklist
47 battle-tested checkpoints from 100+ enterprise deployments
Pro tip: Check items as you complete them, then print/save as PDF for your records
Phase 1: Planning & Architecture (Pre-Deployment)
PLANNING
Map all authentication scenarios: standard login, MFA, social login, passwordless, account recovery
β Authentication Journey Design Guide
Calculate TPS requirements, concurrent sessions, storage needs. Plan for 3x peak load capacity.
Define custom attributes, object classes, indexes, and data retention policies
β LDIF Attribute Mapping Guide
Map source systems, define connectors, reconciliation schedules, and error handling
β IDM Sync Strategies
List all applications, grant types, redirect URIs, scopes, and token lifetimes
β Custom OAuth2 Flows
Identify all IdP and SP integrations, certificate management, attribute mapping
β SAML SSO Implementation
Phase 2: Infrastructure Setup
INFRASTRUCTURE
Minimum 2 DS instances per datacenter. Configure replication, backup, monitoring.
Active Directory, LDAP, database connectors. Test read/write operations.
Production-grade database with failover, connection pooling, and performance tuning
β MySQL Performance Tuning
Multi-node cluster with persistent storage, ingress, secrets management
β ForgeOps on OpenShift Guide
AM requires session affinity. Configure health checks on /json/health endpoint.
Ship logs from AM, IDM, DS, IG to central logging platform
β Audit Logging Best Practices
Phase 3: ForgeRock AM Configuration
ACCESS MANAGEMENT
Create realms for each tenant/environment. Design modular authentication trees.
β Custom Callbacks Guide
Develop, test, and deploy custom nodes. Version control in Git.
β AM Script Customization
Token lifetimes, supported grant types, PKCE enforcement, refresh token rotation
β OAuth2 Deep Dive
Create clients for all applications with appropriate scopes and redirect URIs
Import metadata, configure circles of trust, attribute mapping
β SAML IDP/SP Configuration
Session timeouts, max concurrent sessions, SSO cookie domain and security flags
Define sensitive operations requiring re-authentication or MFA
Strong passwords, restrict access, enable MFA for privileged accounts
Configure debug.log for troubleshooting. Plan to reduce verbosity post-launch.
β Debug Logging Techniques
Phase 4: ForgeRock IDM Configuration
IDENTITY MANAGEMENT
HR systems, Active Directory, databases. Test connectivity and error handling.
Bidirectional sync rules, attribute transformations, conflict resolution
β Resolving Mapping Errors
Full and incremental recon schedules. Monitor for blocked reconciliations.
β Troubleshooting Blocked Recon
Enable LiveSync on critical connectors for immediate propagation
onUpdate, onCreate scripts for complex business rules
β IDM Scripting Guide
Sync passwords to downstream systems securely
β Password Sync Workflow
JsonAuditEventHandler for compliance logging, retention policies
Manager approval for sensitive role assignments, provisioning requests
Phase 5: ForgeRock Identity Gateway (IG)
API GATEWAY
Position IG in front of APIs and legacy apps requiring authentication
β IG API Security Best Practices
OAuth2ResourceServerFilter, throttling, CORS, header injection
Validate JWT/opaque tokens, transform claims for downstream apps
Prevent abuse, DDoS protection, anomaly detection
Phase 6: Security Hardening
SECURITY
Use trusted CA, wildcard or SAN certs, plan rotation schedule
Never hardcode passwords. Use GenericSecret or external secret managers.
β Managing Kubernetes Secrets
Disable HTTP. Enforce HSTS headers, secure cookies.
DMZ for external-facing components, internal network for data stores
Whitelist only required ports and IP ranges
X-Frame-Options, X-Content-Type-Options, CSP, X-XSS-Protection
Restrict allowed origins, methods, headers for browser-based apps
Phase 7: Testing & Validation
TESTING
Standard login, MFA, social, passwordless, error scenarios
Authorization code, client credentials, refresh token, token introspection
IdP-initiated, SP-initiated, SLO, attribute assertions
Simulate 3x peak expected load. Monitor CPU, memory, response times.
Create/update/delete users. Confirm propagation to all target systems.
OWASP Top 10, token security, session management, injection attacks
Phase 8: Go-Live & Operations
PRODUCTION
Document common issues, troubleshooting steps, on-call rotation