{"id":104154,"date":"2020-11-02T15:18:55","date_gmt":"2020-11-02T20:18:55","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/idaptive\/bereitstellung-und-lifecycle-management\/"},"modified":"2020-11-02T15:18:57","modified_gmt":"2020-11-02T20:18:57","slug":"provisioning-and-lifecycle-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/provisioning-and-lifecycle-management\/","title":{"rendered":"Bereitstellung und Lifecycle-Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-pad-btm&#8220; css=&#8220;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8220;]<\/p>\n<h1>BEREITSTELLUNG UND<br \/>\nLIFECYCLE-MANAGEMENT<\/h1>\n<h3 class=\"regular\">Automatisieren Sie Access Provisioning, Genehmigungs-Workflows und Access Governance.<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8220;DEMO ANFORDERN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:%23demo|&#8220; el_class=&#8220;cyb-button solid-blue cyb-center-btn mgn-bottom&#8220; css=&#8220;.vc_custom_1601600864772{margin-right: 5px !important;}&#8220;][vc_btn title=&#8220;KOSTENLOSE TESTVERSION&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.idaptive.com%2Ffree-trial|target:_blank|&#8220; el_class=&#8220;cyb-button solid-green cyb-center-btn mgn-bottom&#8220; css=&#8220;.vc_custom_1601600855593{margin-left: 5px !important;}&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1601069261156{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero cyb-mobile&#8220;][vc_column el_class=&#8220;cyb-center cyb-pad-btm&#8220; css=&#8220;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8220;]<\/p>\n<h1>BEREITSTELLUNG UND<br \/>\nLIFECYCLE-MANAGEMENT<\/h1>\n<h3 class=\"regular\">Automatisieren Sie Access Provisioning, Genehmigungs-Workflows und Access Governance.<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8220;DEMO ANFORDERN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:%23demo|&#8220; el_class=&#8220;cyb-button solid-blue cyb-center-btn mgn-bottom&#8220; css=&#8220;.vc_custom_1601600996156{margin-bottom: 1.25rem !important;}&#8220;][vc_btn title=&#8220;KOSTENLOSE TESTVERSION&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.idaptive.com%2Ffree-trial|target:_blank|&#8220; el_class=&#8220;cyb-button solid-green cyb-center-btn mgn-bottom&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cyb-background-lb cyb-cta-card&#8220; css=&#8220;.vc_custom_1600132057790{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #ffffff !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-md-offset-2&#8243;][vc_column_text css=&#8220;.vc_custom_1600134638945{padding-bottom: 1.875rem !important;}&#8220;]<\/p>\n<h2>VORTEILE<\/h2>\n<p>Die Idaptive Bereitstellungs- und Lifecycle-Management-L\u00f6sung bietet eine einfache M\u00f6glichkeit, Zugriffsanfragen f\u00fcr Anwendung zu routen, Anwendungskonten zu erstellen, Berechtigungen f\u00fcr diese Konten zu verwalten und den Zugriff bei Bedarf zu widerrufen. Mit Bereitstellungs- und Lifecycle-Management k\u00f6nnen Sie Benutzern erm\u00f6glichen, den Zugriff auf Anwendungen aus dem Idaptive App-Katalog anzufragen, bestimmten Benutzern die M\u00f6glichkeit zu geben, diese Zugriffsanfragen zu genehmigen oder abzulehnen und automatisch Konten basierend auf Benutzerrollen zu erstellen, zu aktualisieren und zu deaktivieren.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][vc_column_text el_class=&#8220;cyb-icon-bottom&#8220;]<img decoding=\"async\" class=\"alignnone wp-image-99698\" style=\"width: 92px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\" alt=\"\" height=\"75\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;cyb-cta-match&#8220;]<\/p>\n<h3>ONBOARDING UND OFFBOARDING AUTOMATISIEREN<\/h3>\n<p>Automatisches Bereitstellen und Entzug des Zugriffs auf vorintegrierte Cloud-Anwendungen aus dem Idaptive App-Katalog in jeder Phase der Laufbahn von Mitarbeitern.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cyb-min-hgt-230&#8243;][vc_column_text el_class=&#8220;cyb-icon-bottom&#8220;]<img decoding=\"async\" class=\"alignnone wp-image-99706\" style=\"width: 64px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/self-service-icon.svg\" alt=\"\" height=\"76\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;cyb-cta-match&#8220;]<\/p>\n<h3>SELF-SERVICE AKTIVIEREN<\/h3>\n<p>Benutzern erlauben, Zugriff auf Anwendungen aus dem Idaptive App-Katalog anzufragen und Workflows zu definieren, um bestimmten Benutzern oder Mitgliedern bestimmter Rollen die M\u00f6glichkeit zu geben, diese Anfragen zu genehmigen oder abzulehnen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cyb-min-hgt-230&#8243;][vc_column_text el_class=&#8220;cyb-icon-bottom&#8220;]<img decoding=\"async\" class=\"alignnone wp-image-99714\" style=\"width: 87px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/accelerate-approvals-icon.svg\" alt=\"\" height=\"75\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1600196644224{padding-bottom: 1.875rem !important;}&#8220; el_class=&#8220;cyb-cta-match&#8220;]<\/p>\n<h3>BESCHLEUNIGEN VON GENEHMIGUNGEN<\/h3>\n<p>Automatisieren Sie mehrstufige Genehmigungs-Workflows, um die Bereitstellung von Konten zu beschleunigen und sicherzustellen, dass Mitarbeiter schneller Zugriff auf die ben\u00f6tigten Apps erhalten und produktiv sind.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][vc_column_text el_class=&#8220;cyb-icon-bottom&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99722\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/simplify-governance-icon.svg\" alt=\"\" width=\"76\" height=\"76\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1600196687809{padding-bottom: 1.875rem !important;}&#8220; el_class=&#8220;cyb-cta-match&#8220;]<\/p>\n<h3>GOVERNANCE VEREINFACHEN<\/h3>\n<p>Zentrale \u00dcberwachung des Benutzerzugriffs \u00fcber alle Ihre Apps hinweg und Aufschl\u00fcsselung auf Benutzer-, Rollen- oder Anwendungsebene, um Konten, Berechtigungen, Anmeldeorte, verwendete Ger\u00e4te, fehlgeschlagene Anmeldungen und mehr zu \u00fcberpr\u00fcfen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][vc_column_text el_class=&#8220;cyb-icon-bottom&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99730\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/hr-it-icon.svg\" alt=\"\" width=\"184\" height=\"76\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1600196759766{padding-bottom: 1.875rem !important;}&#8220; el_class=&#8220;cyb-cta-match&#8220;]<\/p>\n<h3>HR MIT IT VERBINDEN<\/h3>\n<p>Einrichtung bidirektionaler Integrationen mit Human Capital Management (HCM) -Systemen, um HR-Daten zu nutzen, um neue Benutzer in Active Directory und anderen Anwendungen bereitzustellen und kundenspezifische Bereitstellungs- und Abwanderungsabl\u00e4ufe zu erstellen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][vc_column_text el_class=&#8220;cyb-icon-bottom&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/sync-user-icon.svg\" alt=\"\" width=\"77\" height=\"77\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1600196848629{padding-bottom: 1.875rem !important;}&#8220; el_class=&#8220;cyb-cta-match&#8220;]<\/p>\n<h3>BENUTZERVERZEICHNISSE SYNCHRONISIEREN<\/h3>\n<p>Halten Sie Benutzerinformationen immer auf dem neuesten Stand, wenn Sie \u00c4nderungen an einer Rolle oder<br \/>\n an anwendbaren Quellverzeichnis-Objekten in Active Directory, Azure AD, LDAP, Google Cloud Directory oder Idaptive Cloud Directory vornehmen.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1586872028792{background-color: #f1f2f2 !important;}&#8220;][vc_column offset=&#8220;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8220;cyb-pad-top cyb-cta-card&#8220;][vc_column_text el_class=&#8220;cyb-ltr-spc&#8220;]<\/p>\n<h2>WICHTIGSTE FUNKTIONEN<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;99936&#8243; img_size=&#8220;full&#8220; el_class=&#8220;cyb-ken-img&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-md-offset-1&#8243; el_class=&#8220;cyb-submargin-top&#8220;][vc_column_text css=&#8220;.vc_custom_1600179370452{padding-bottom: 1.875rem !important;}&#8220;]<\/p>\n<h3>VORKONFIGURIERTE BEREITSTELLUNG UND WIDERRUFEN DES ZUGANGS<\/h3>\n<p>Idaptive erm\u00f6glicht Ihnen die automatische Gew\u00e4hrung und den Widerruf des Zugriffs auf Hunderte vorintegrierter Cloud-Anwendungen aus dem Idaptive App-Katalog. Mit Idaptive Lifecycle-Management k\u00f6nnen Sie sicherstellen, dass Mitarbeiter in jeder Phase des Employee Lifecycles Zugang zu den richtigen Anwendungen haben. So k\u00f6nnen Sie beispielsweise den Zugriff auf anwendungsbasierte Mitarbeiterrollen am ersten Tag gew\u00e4hren, den Zugriff automatisch aktualisieren, wenn Mitarbeiter Stellungen, Abteilungen oder Standorte wechseln, und den Zugriff entziehen, wenn Mitarbeiter gehen.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1537541711623{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220; el_class=&#8220;cyb-reverse&#8220;][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-md-offset-1&#8243; el_class=&#8220;cyb-submargin-top&#8220;][vc_column_text css=&#8220;.vc_custom_1600179440009{padding-bottom: 1.875rem !important;}&#8220;]<\/p>\n<h3>ZENTRALE BERECHTIGUNGSVERWALTUNG<\/h3>\n<p>Das Idaptive Lifecycle-Management erm\u00f6glicht die granulare Kontrolle der Benutzerzugriffsrechte innerhalb Ihrer Apps, indem Sie Idaptive Rollen den entsprechenden Benutzergruppen in Ihren Apps zuordnen. W\u00e4hrend der Bereitstellung des Zugriffs auf Ihr CRM-System k\u00f6nnen Sie beispielsweise Benutzer automatisch entsprechenden CRM-Gruppen wie Admin, Marketing oder Vertriebsgruppe zuweisen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-md-offset-1&#8243;][vc_single_image image=&#8220;99886&#8243; img_size=&#8220;full&#8220; el_class=&#8220;cyb-ken-img&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;99944&#8243; img_size=&#8220;full&#8220; el_class=&#8220;cyb-ken-img&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-md-offset-1&#8243; el_class=&#8220;cyb-submargin-top&#8220;][vc_column_text css=&#8220;.vc_custom_1600179487902{padding-bottom: 1.875rem !important;}&#8220;]<\/p>\n<h3>HCM-SYSTEMINTEGRATION<\/h3>\n<p>Mit Idaptive k\u00f6nnen Sie Identit\u00e4ten aus Ihrem bevorzugten HR-System oder Ihrer bevorzugten Anwendung, einschlie\u00dflich Workday, UltiPro, BambooHR oder SuccessFactors, nahtlos importieren und in Active Directory bereitstellen. Dadurch k\u00f6nnen Sie Ihre Bereitstellungs- und HR-Workflows vereinheitlichen und verf\u00fcgen \u00fcber ein HR-gesteuertes prim\u00e4res Aufzeichnungssystem f\u00fcr Benutzerdaten in Ihren Anwendungen.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1537541711623{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220; el_class=&#8220;cyb-reverse&#8220;][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-md-offset-1&#8243; el_class=&#8220;cyb-submargin-top&#8220;][vc_column_text css=&#8220;.vc_custom_1600179542557{padding-bottom: 1.875rem !important;}&#8220;]<\/p>\n<h3>INDIVIDUELLE APP-INTEGRATION<\/h3>\n<p>Mit Idaptive ist es m\u00f6glich, Ihre Bereitstellungsworkflows mithilfe des SCIM-Protokolls auf Ihre individuellen Anwendungen auszuweiten. Mit SCIM Scripting k\u00f6nnen Sie Apps (Cloud und On-Premise) bereitstellen, die die SCIM APIs implementiert haben und die keinen Out-of-the-box Provisioning Connector im Idaptive App-Katalog haben. Sie k\u00f6nnen den Idaptive SCIM-Server auch zur Verwaltung wichtiger Ressourcen in Ihren Apps wie Benutzern und Gruppen oder zur Bereitstellung von Benutzern in der Idaptive Cloud einsetzen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-md-offset-1&#8243;][vc_single_image image=&#8220;99902&#8243; img_size=&#8220;full&#8220; el_class=&#8220;cyb-ken-img&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;99952&#8243; img_size=&#8220;full&#8220; el_class=&#8220;cyb-ken-img&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-md-offset-1&#8243; el_class=&#8220;cyb-submargin-top&#8220;][vc_column_text css=&#8220;.vc_custom_1600958815060{padding-bottom: 1.875rem !important;}&#8220;]<\/p>\n<h3>NAHTLOSE OFFICE-365-INTEGRATION<\/h3>\n<p>Mit Active Directory (AD) Synchronisation f\u00fcr Microsoft Office 365-Funktionalit\u00e4t k\u00f6nnen Sie Ihre AD-Konten und Office 365-Konten synchronisieren und Benutzerkonten, Gruppen und Gruppenmitgliedschaften automatisch bereitstellen und widerrufen, um die Verwaltung von Office 365-Lizenzen zu vereinfachen.[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1601312627497{padding-bottom: 1.875rem !important;}&#8220;]<strong><a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/idaptive-for-office-365\">WEITERE INFORMATIONEN<\/a><\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column offset=&#8220;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8220;cyb-pad-top cyb-cta-card&#8220;][vc_column_text el_class=&#8220;cyb-ltr-spc&#8220;]<\/p>\n<h2>RESSOURCEN<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1600179622853{padding-top: 2rem !important;background-color: #f1f2f2 !important;}&#8220; el_class=&#8220;cyb-center&#8220;][vc_column css=&#8220;.vc_custom_1593651419004{padding-bottom: 1.25rem !important;}&#8220;][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZGVtbyI+PC9hPg==[\/vc_raw_html][vc_column_text]<\/p>\n<h2>DEMO ANFORDERN<\/h2>\n<p>[\/vc_column_text][vc_column_text]    <script type=\"text\/javascript\" src=\"https:\/\/lp.cyberark.com\/js\/forms2\/js\/forms2.min.js\" id=\"marketo-script-js\"><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/google-libphonenumber\/3.2.38\/libphonenumber.min.js\" integrity=\"sha512-2EBfDCqBiVPlov9vAT9w6xMEIFcg24K3arAldIIgHh1EGrNob66Mc1gGXa5J7LTG3W5sk\/liGFbJUkODW5A8NQ==\" crossorigin=\"anonymous\" referrerpolicy=\"no-referrer\"><\/script>\n    <form id=\"mktoForm_4669\"><\/form>\n    <script>\n        MktoForms2.loadForm(\"\/\/lp.cyberark.com\", \"316-CZP-275\", 4669, function (form) {\n            \n            var match_found;                            \n            \n                        \n            \/\/ Add hidden value with asset info\n            var ecid = decodeURIComponent(document.cookie).match(\/AMCV_.*?=.*?\\|MCMID\\|(.*?)\\|\/)[1];\n                        var utm_source = getParameterByName('utm_source') == undefined ? (jQuery.cookie('utm_source') == undefined ? '' : jQuery.cookie('utm_source')) : getParameterByName('utm_source');\n            var utm_campaign = getParameterByName('utm_campaign') == undefined ? (jQuery.cookie('utm_campaign') == undefined ? '' : jQuery.cookie('utm_campaign')) : getParameterByName('utm_campaign');\n            var utm_medium = getParameterByName('utm_medium') == undefined ? (jQuery.cookie('utm_medium') == undefined ? '' : jQuery.cookie('utm_medium')) : getParameterByName('utm_medium');\n            var utm_term = getParameterByName('utm_term') == undefined ? (jQuery.cookie('utm_term') == undefined ? '' : jQuery.cookie('utm_term')) : getParameterByName('utm_term');\n            var utm_content = getParameterByName('utm_content') == undefined ? (jQuery.cookie('utm_content') == undefined ? '' : jQuery.cookie('utm_content')) : getParameterByName('utm_content');\n            form.addHiddenFields({\n                'marketoAnalyticsID': \"\",\n                'adobecloudid': ecid,\n                'asset_name': \"\",\n                'program_name': \"\",\n                'Lead_Request__c': \"\",\n                'additional_email_content': \"\",\n                'Notes_Restrictions__c': \"\",\n                'utm_source': utm_source,\n                'utm_campaign': utm_campaign,\n                'utm_medium': utm_medium,\n                'utm_term': utm_term,\n                'utm_contact': utm_content,\n                'utmsource': utm_source,\n                'utmcampaign': utm_campaign,\n                'utmmedium': utm_medium,\n                'utmterm': utm_term,\n                'utmcontent': utm_content,\n                'showNotes': ''\n            });\n                            form.addHiddenFields({\n                    'MktoPersonNotes': \"\"\n                });\n                \n            \/***************************\n            Start event assigning for AA\n            ***************************\/\n                            var formType = \"Demo\";\n                var formName = \"Personalized Demo\";\n                            \n            \/*************************\n            End event assigning for AA\n            *************************\/\n\n            \/***********************************************\n            Start event dispatching and email hashing for AA\n            ***********************************************\/\n\n            if( typeof formType !== 'undefined' ) { \/\/following AA dispatching will not run if formType has not been defined above\n\n                \n                \/\/Custom AT event for form view\n                let formViewEvent = new CustomEvent('launch-formView',{\n                    'detail':{\n                    'form_type': formType,\n                    'form_name': formName,\n                    'form_id': '4669'\n                    }\n                })\n                document.querySelector('body').dispatchEvent(formViewEvent);\n                console.log(formViewEvent);\n\n                form.onValidate(function() {\n                    if (jQuery(\"form.mktoForm .mktoInvalid\")[0]){\/\/only fire events if no error class is found\n                        \n                        \/\/Custom AT event for form validate\n                        let formErrorEvent = new CustomEvent('launch-formError',{\n                            'detail':{\n                                'form_type': formType,\n                                'form_name': formName,\n                                'form_id': '4669'\n                            }\n                        })\n                        document.querySelector('body').dispatchEvent(formErrorEvent);\n                        console.log(formErrorEvent);\n                        \n                                              \n                    }\n                    \/\/hash the email\n                    var eInput = jQuery('input[type=\"email\"]').val();\n                    var eHash = sha256(eInput);\n                    console.log(eHash);\n                    \/\/assign the cookie\n                    form.vals({\"marketoAnalyticsID\":eHash});\n                    _satellite.cookie.set('marketoAnalyticsID', eHash, {expires: 365});\n                });\n\n                form.onSuccess(function () {\n\n                    \/\/Custom AT event for form submit\n                    let formSubmitEvent = new CustomEvent('launch-formSubmit',{\n                        'detail':{\n                            'form_type': formType,\n                            'form_name': formName,\n                            'form_id': '4669'\n                        }\n                    })\n                    document.querySelector('body').dispatchEvent(formSubmitEvent);\n                    console.log(formSubmitEvent);\n                });               \n            }\n            \/*********************************************\n            End event dispatching and email hashing for AA\n            *********************************************\/\n            \n            \/\/ TY Message\n            form.onSuccess(function () {\n                dataLayer.push({\n                                            'event': 'demo',\n                        'form_submit': 'Demo',\n                                        });\n                                    jQuery(\"#mktoForm_4669\").hide();\n                    jQuery(\".ty_message\").show();\n                    var iframe = jQuery(\"<iframe><\/iframe>\",{\n                        src: \"https:\/\/www.cyberark.com\/?reset_mkto=1\",\n                        style: 'position:absolute;top:-9999px;left:-999px;',\n                        width: '10',\n                        height: '10'\n                    });\n                    iframe.appendTo('body');\n                    jQuery.cookie('utm_source', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_medium', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_campaign', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_term', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_content', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    return false;\n                                });\n        });\n    <\/script>\n    <script>\n    \/\/ custom errorMessage + instruction text for embedded Marketo Forms\nMktoForms2.whenReady(function(form) {\n    \/\/ when a field is focused\n    jQuery(document).on('focus', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').addClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is blurred\n    jQuery(document).on('blur', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').removeClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is edited (keyup)\n    jQuery(document).on('keyup', 'input, select, textarea', function(e){\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n                    if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n            \/\/ determine which key(s) \n            var code = e.keyCode || e.which;\n            \/\/ if this is 'tab' or 'shift + tab'\n            if (code == '9' || '16') {\n                \/\/ do nothing\n            }\n            \/\/ else this is not the tab or shift + tab key(s)\n            else{}\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n\n    });\n\n    \/\/ when a select field is changed, validate it\n    jQuery(document).on('change', 'select', function(e){\n        jQuery(this).blur().focus();    \n\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n            if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    form.onValidate(function() {\n     jQuery('form.mktoForm').addClass('validated');\n     jQuery('.mktoInvalid').each(function(){\n        jQuery(this).parents('.mktoFieldWrap').addClass('fieldInvalid');   \n        if(jQuery(this).is('.mktoTelField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Phone number is required in numerical values only.<\/span>');\n        }\n        else if(jQuery(this).is('.mktoEmailField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Email address is required in this format: yourname@email.com.<\/span>');\n        }\n        else{ \n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">This field is required.<\/span>'); \n        }\n     });\n    });\n});\n    <\/script>\n    <script src=\"https:\/\/www.google.com\/recaptcha\/api.js\" async defer><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/js-sha256\/0.9.0\/sha256.min.js\"><\/script>\n    <div class=\"ty_message\" style=\"display:none\"><h4>Danke f\u00fcr dein Interesse.<\/h4><p>Wir werden uns in K\u00fcrze mit Ihnen in Verbindung setzen.<\/p><\/div>\n    [\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-pad-btm&#8220; css=&#8220;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8220;] BEREITSTELLUNG UND LIFECYCLE-MANAGEMENT Automatisieren Sie Access Provisioning, Genehmigungs-Workflows und Access Governance. [\/vc_column_text][vc_btn&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-104154","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Bereitstellung und Lifecycle-Management | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bereitstellung und Lifecycle-Management\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-pad-btm&#8220; css=&#8220;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8220;] BEREITSTELLUNG UND LIFECYCLE-MANAGEMENT Automatisieren Sie Access Provisioning, Genehmigungs-Workflows und Access Governance. [\/vc_column_text][vc_btn...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-02T20:18:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\",\"name\":\"Bereitstellung und Lifecycle-Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\",\"datePublished\":\"2020-11-02T20:18:55+00:00\",\"dateModified\":\"2020-11-02T20:18:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bereitstellung und Lifecycle-Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bereitstellung und Lifecycle-Management | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","og_locale":"de_DE","og_type":"article","og_title":"Bereitstellung und Lifecycle-Management","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-pad-btm&#8220; css=&#8220;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8220;] BEREITSTELLUNG UND LIFECYCLE-MANAGEMENT Automatisieren Sie Access Provisioning, Genehmigungs-Workflows und Access Governance. [\/vc_column_text][vc_btn...","og_url":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-11-02T20:18:57+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"9 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","url":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","name":"Bereitstellung und Lifecycle-Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","datePublished":"2020-11-02T20:18:55+00:00","dateModified":"2020-11-02T20:18:57+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Bereitstellung und Lifecycle-Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/104154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=104154"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/104154\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=104154"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=104154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}