
{"id":760,"date":"2021-01-17T19:25:36","date_gmt":"2021-01-17T18:25:36","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=760"},"modified":"2021-01-17T19:25:37","modified_gmt":"2021-01-17T18:25:37","slug":"le-sso-pour-renforcer-la-securite-des-identites","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/","title":{"rendered":"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB190Hvw.img?h=204&amp;w=270&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Zoom 2FA double authentification\"\/><\/figure>\n\n\n\n<p style=\"font-size:28px\"><strong>L\u2019authentification par signature unique (SSO) r\u00e9sout le probl\u00e8me end\u00e9mique des mots de passe et r\u00e9duit la surface d\u2019attaque.<\/strong><\/p>\n\n\n\n<p>La crise sanitaire, le recours massif au t\u00e9l\u00e9travail et l\u2019augmentation constante des attaques ont contraint de nombreuses entreprises \u00e0 faire \u00e9voluer leur approche de la s\u00e9curit\u00e9 ces derniers mois.<\/p>\n\n\n\n<p>En effet, les mod\u00e8les traditionnels, bas\u00e9s sur les pare-feux et les VPN, n\u2019ont pas \u00e9t\u00e9 con\u00e7us pour prot\u00e9ger les environnements IT hautement distribu\u00e9s ; c\u2019est-\u00e0-dire avec beaucoup d\u2019employ\u00e9s travaillant de chez eux. Or, lorsque les organisations adoptent une infrastructure cloud hybride et se tournent vers un nombre croissant d\u2019applications SaaS, l\u2019identit\u00e9 devient le seul p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 pour les t\u00e9l\u00e9travailleurs.<\/p>\n\n\n\n<p>Avec cette nouvelle normalit\u00e9, une cybers\u00e9curit\u00e9 efficace repose sur la capacit\u00e9 \u00e0 g\u00e9rer et \u00e0 authentifier de mani\u00e8re s\u00fbre les identit\u00e9s, ainsi qu\u2019\u00e0 contr\u00f4ler l\u2019acc\u00e8s de chaque personne, application et machine ; qu\u2019elle se trouve \u00e0 l\u2019int\u00e9rieur ou \u00e0 l\u2019ext\u00e9rieur du p\u00e9rim\u00e8tre du r\u00e9seau. D\u00e9sormais, l\u2019ensemble des identit\u00e9s peuvent\u00a0devenir \u00e0 privil\u00e8ges\u00a0\u2013 autrement dit avec des droits d\u2019acc\u00e8s \u00e9lev\u00e9s \u2013 sous certaines conditions, en fonction des syst\u00e8mes, des environnements, des applications ou des donn\u00e9es auxquels elles acc\u00e8dent, ou des types d\u2019op\u00e9rations qu\u2019elles effectuent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le probl\u00e8me des mots de passe\u2026<\/h2>\n\n\n\n<p>Dans ce contexte, il n\u2019est pas surprenant que les cybercriminels ciblent avant tout les identifiants \u00e0 privil\u00e8ges \u2013 du fait de leur niveau d\u2019acc\u00e8s aux donn\u00e9es et infrastructures les plus critiques d\u2019une organisation. Selon le rapport Verizon DBIR 2020, plus de 80 % des violations de donn\u00e9es li\u00e9es au piratage informatique impliquent l\u2019utilisation d\u2019identifiants perdus ou vol\u00e9s, ou \u00ab la force brute \u00bb qui consiste \u00e0 essayer diff\u00e9rentes combinaisons d\u2019identifiants jusqu\u2019\u00e0 ce qu\u2019un fonctionne.<\/p>\n\n\n\n<p>En compromettant des identifiants \u00e0 privil\u00e8ges, les attaquants peuvent acc\u00e9der \u00e0 des ressources internes, obtenir des donn\u00e9es confidentielles et perturber l\u2019activit\u00e9. Pourtant, de nombreuses entreprises continuent \u00e0 recourir \u00e0 des mots de passe pour s\u00e9curiser les acc\u00e8s \u00e0 privil\u00e8ges des utilisateurs. Cette approche est probl\u00e9matique \u00e0 de nombreux \u00e9gards.<\/p>\n\n\n\n<p>Microsoft Services fait l\u2019objet de plus de 300 millions de tentatives de connexion frauduleuses chaque jour, et pourtant, 53 % des utilisateurs n\u2019ont pas modifi\u00e9 leur mot de passe au cours des 12 derniers mois. Et m\u00eame chang\u00e9, il est fort probable que le nouveau mot de passe soit faible ou utilis\u00e9 pour plusieurs comptes, ce qui le rend vuln\u00e9rable.<\/p>\n\n\n\n<p>Bien entendu, de nombreuses organisations ont pris des mesures pour s\u00e9curiser les identit\u00e9s, telles que l\u2019obligation d\u2019utiliser des mots de passe uniques et forts, et de les changer fr\u00e9quemment. Toutefois, ces contr\u00f4les peuvent en r\u00e9alit\u00e9 causer plus de mal que de bien, en incitant les utilisateurs finaux \u00e0 adopter des pratiques risqu\u00e9es en mati\u00e8re de mots de passe, comme les \u00e9crire sur papier, et en imposant une charge inutile aux \u00e9quipes IT responsables de la gestion manuelle des acc\u00e8s.<\/p>\n\n\n\n<p>La m\u00e9morisation, l\u2019oubli, la saisie et la r\u00e9initialisation des mots de passe repr\u00e9sentent donc une difficult\u00e9 significative et une perte de productivit\u00e9 ; en particulier \u00e0 l\u2019\u00e8re du travail \u00e0 distance, o\u00f9 les employ\u00e9s et les fournisseurs tiers d\u00e9pendent fortement des applications pour collaborer et acc\u00e9der aux ressources de l\u2019entreprise.<\/p>\n\n\n\n<p>Les employ\u00e9s perdent ainsi environ 12,6 minutes par semaine \u00e0 saisir et \u00e0 r\u00e9initialiser ses\u00a0mots de passe. D\u2019apr\u00e8s une \u00e9tude de PwC, environ 30 % de tous les appels au support IT sont li\u00e9s \u00e0 des mots de passe, ce qui d\u00e9tourne de pr\u00e9cieuses ressources IT de missions \u00e0 caract\u00e8re plus strat\u00e9gique.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u2026 peut \u00eatre r\u00e9solu avec le SSO<\/h2>\n\n\n\n<p>L\u2019authentification par signature unique (SSO) r\u00e9sout ce probl\u00e8me end\u00e9mique des mots de passe et r\u00e9duit la surface d\u2019attaque. Les entreprises sont ainsi \u00e0 m\u00eame d\u2019appliquer syst\u00e9matiquement des politiques de mots de passe plus strictes et de r\u00e9duire le risque de mauvaises pratiques en \u00e9liminant compl\u00e8tement le recours aux mots de passe individuels.<\/p>\n\n\n\n<p>Gr\u00e2ce au SSO, les organisations peuvent utiliser une seule identit\u00e9 s\u00e9curis\u00e9e pour l\u2019ensemble des applications, des terminaux et des ressources.<\/p>\n\n\n\n<p>En outre, l\u2019exp\u00e9rience de l\u2019utilisateur final est am\u00e9lior\u00e9e : il peut acc\u00e9der en un seul clic aux applications dans le cloud et sur site. Sans compter que pour aider les employ\u00e9s \u00e0 maintenir leur productivit\u00e9 et \u00e0 \u00e9voluer au rythme de l\u2019entreprise, certaines solutions SSO ne n\u00e9cessitent des contr\u00f4les de s\u00e9curit\u00e9 suppl\u00e9mentaires que pour les demandes d\u2019acc\u00e8s \u00e0 privil\u00e8ges \u00e0 haut risque.<\/p>\n\n\n\n<p>Pour les \u00e9quipes IT, le SSO a l\u2019avantage de rompre les silos et de simplifier la gestion des utilisateurs et des comptes, gr\u00e2ce \u00e0 une int\u00e9gration homog\u00e8ne des r\u00e9pertoires ; et de b\u00e9n\u00e9ficier d\u2019une visibilit\u00e9 compl\u00e8te de l\u2019activit\u00e9 des utilisateurs en mati\u00e8re d\u2019acc\u00e8s, ce qui permet de satisfaire aux exigences de conformit\u00e9 relatives \u00e0 l\u2019acc\u00e8s, de faciliter la production de rapports et d\u2019am\u00e9liorer la s\u00e9curit\u00e9 globale.<\/p>\n\n\n\n<p>Les organisations peuvent tirer de nombreux autres avantages \u00e0 long terme en mettant en \u0153uvre des solutions SSO. Par exemple, avec des outils en libre-service correctement configur\u00e9s, les entreprises seront en mesure de r\u00e9duire consid\u00e9rablement leurs co\u00fbts IT en diminuant le nombre de tickets et d\u2019appels au service d\u2019assistance li\u00e9s aux mots de passe. En outre, le SSO permet d\u2019\u00e9liminer tout risque de comptes restant actifs lorsque les employ\u00e9s changent de r\u00f4le ou quittent l\u2019entreprise.<\/p>\n\n\n\n<p>Certaines solutions SSO peuvent m\u00eame \u00e9tendre les capacit\u00e9s de s\u00e9curit\u00e9 au-del\u00e0 des mots de passe, pour int\u00e9grer l\u2019authentification \u00e0 plusieurs facteurs (MFA) et les m\u00e9thodes d\u2019authentification sans mot de passe.<\/p>\n\n\n\n<p>Silicon<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019authentification par signature unique (SSO) r\u00e9sout le probl\u00e8me end\u00e9mique des mots de passe et r\u00e9duit la surface d\u2019attaque. La crise sanitaire, le recours massif au t\u00e9l\u00e9travail et l\u2019augmentation constante des [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[],"class_list":["post-760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"L\u2019authentification par signature unique (SSO) r\u00e9sout le probl\u00e8me end\u00e9mique des mots de passe et r\u00e9duit la surface d\u2019attaque. La crise sanitaire, le recours massif au t\u00e9l\u00e9travail et l\u2019augmentation constante des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-17T18:25:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-17T18:25:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-53.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s\",\"datePublished\":\"2021-01-17T18:25:36+00:00\",\"dateModified\":\"2021-01-17T18:25:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/\"},\"wordCount\":1012,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-53.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/\",\"name\":\"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-53.jpg\",\"datePublished\":\"2021-01-17T18:25:36+00:00\",\"dateModified\":\"2021-01-17T18:25:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-53.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-53.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/17\\\/le-sso-pour-renforcer-la-securite-des-identites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/","og_locale":"fr_FR","og_type":"article","og_title":"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s - Parlons Techs - Store","og_description":"L\u2019authentification par signature unique (SSO) r\u00e9sout le probl\u00e8me end\u00e9mique des mots de passe et r\u00e9duit la surface d\u2019attaque. La crise sanitaire, le recours massif au t\u00e9l\u00e9travail et l\u2019augmentation constante des [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-01-17T18:25:36+00:00","article_modified_time":"2021-01-17T18:25:37+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-53.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s","datePublished":"2021-01-17T18:25:36+00:00","dateModified":"2021-01-17T18:25:37+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/"},"wordCount":1012,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-53.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/","url":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/","name":"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-53.jpg","datePublished":"2021-01-17T18:25:36+00:00","dateModified":"2021-01-17T18:25:37+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-53.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-53.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/17\/le-sso-pour-renforcer-la-securite-des-identites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Le SSO pour renforcer la s\u00e9curit\u00e9 des identit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=760"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/760\/revisions"}],"predecessor-version":[{"id":762,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/760\/revisions\/762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/761"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}