{"id":104124,"date":"2020-10-30T10:55:50","date_gmt":"2020-10-30T14:55:50","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/idaptive\/provisioning-and-lifecycle-management\/"},"modified":"2020-10-30T10:55:52","modified_gmt":"2020-10-30T14:55:52","slug":"provisioning-and-lifecycle-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/provisioning-and-lifecycle-management\/","title":{"rendered":"Provisioning and Lifecycle Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-desktop\u00bb][vc_column el_class=\u00bbcyb-center cyb-pad-btm\u00bb css=\u00bb.vc_custom_1600216676506{margin-top: 5.3125rem !important;}\u00bb][vc_column_text el_class=\u00bbcyb-white\u00bb css=\u00bb.vc_custom_1600217088522{margin-bottom: 20px !important;}\u00bb]<\/p>\n<h1>PROVISIONING AND<br \/>\nLIFECYCLE MANAGEMENT<\/h1>\n<h3 class=\"regular\">Automatice el aprovisionamiento del acceso, los flujos de trabajo de aprobaci\u00f3n y la gobernanza del acceso.<\/h3>\n<p>[\/vc_column_text][vc_btn title=\u00bbSOLICITE UNA DEMO\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:%23demo|\u00bb el_class=\u00bbcyb-button solid-blue cyb-center-btn mgn-bottom\u00bb css=\u00bb.vc_custom_1601600864772{margin-right: 5px !important;}\u00bb][vc_btn title=\u00bbPRUEBA GRATUITA\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.idaptive.com%2Ffree-trial|target:_blank|\u00bb el_class=\u00bbcyb-button solid-green cyb-center-btn mgn-bottom\u00bb css=\u00bb.vc_custom_1601600855593{margin-left: 5px !important;}\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1601069261156{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-mobile\u00bb][vc_column el_class=\u00bbcyb-center cyb-pad-btm\u00bb css=\u00bb.vc_custom_1600216676506{margin-top: 5.3125rem !important;}\u00bb][vc_column_text el_class=\u00bbcyb-white\u00bb css=\u00bb.vc_custom_1600217088522{margin-bottom: 20px !important;}\u00bb]<\/p>\n<h1>PROVISIONING AND<br \/>\nLIFECYCLE MANAGEMENT<\/h1>\n<h3 class=\"regular\">Automatice el aprovisionamiento del acceso, los flujos de trabajo de aprobaci\u00f3n y la gobernanza del acceso.<\/h3>\n<p>[\/vc_column_text][vc_btn title=\u00bbSOLICITE UNA DEMO\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:%23demo|\u00bb el_class=\u00bbcyb-button solid-blue cyb-center-btn mgn-bottom\u00bb css=\u00bb.vc_custom_1601600996156{margin-bottom: 1.25rem !important;}\u00bb][vc_btn title=\u00bbPRUEBA GRATUITA\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.idaptive.com%2Ffree-trial|target:_blank|\u00bb el_class=\u00bbcyb-button solid-green cyb-center-btn mgn-bottom\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcyb-background-lb cyb-cta-card\u00bb css=\u00bb.vc_custom_1600132057790{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #ffffff !important;}\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-md-offset-2&#8243;][vc_column_text css=\u00bb.vc_custom_1600134638945{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<h2>VENTAJAS<\/h2>\n<p>La soluci\u00f3n Idaptive Provisioning and Lifecycle Management ofrece una forma sencilla de enrutar solicitudes de acceso a aplicaciones, crear cuentas de aplicaciones, gestionar los derechos de dichas cuentas y revocar el acceso en caso necesario. Con Provisioning and Lifecycle Management, puede permitir a los usuarios solicitar acceso a las aplicaciones del cat\u00e1logo de aplicaciones de Idaptive, otorgar a usuarios espec\u00edficos la capacidad para aprobar o rechazar dichas solicitudes de acceso, y crear, actualizar y desactivar autom\u00e1ticamente cuentas en funci\u00f3n de los roles de usuario.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-99698\" style=\"width: 92px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\" alt=\"\" height=\"75\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbcyb-cta-match\u00bb]<\/p>\n<h3>AUTOMATICE LA INCORPORACI\u00d3N A LA EMPRESA Y LA SALIDA DE ESTA<\/h3>\n<p>Aprovisione y revoque autom\u00e1ticamente el acceso a aplicaciones en la nube preintegradas del cat\u00e1logo de aplicaciones de Idaptive en cada fase del ciclo de vida de los empleados.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcyb-min-hgt-230&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-99706\" style=\"width: 64px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/self-service-icon.svg\" alt=\"\" height=\"76\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbcyb-cta-match\u00bb]<\/p>\n<h3>HABILITE EL AUTOSERVICIO<\/h3>\n<p>Permita a los usuarios solicitar acceso a aplicaciones del cat\u00e1logo de aplicaciones de Idaptive y defina flujos de trabajo para otorgar a usuarios concretos o miembros con funciones espec\u00edficas la capacidad para aprobar o rechazar dichas solicitudes.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcyb-min-hgt-230&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-99714\" style=\"width: 87px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/accelerate-approvals-icon.svg\" alt=\"\" height=\"75\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1600196644224{padding-bottom: 1.875rem !important;}\u00bb el_class=\u00bbcyb-cta-match\u00bb]<\/p>\n<h3>AGILICE LAS APROBACIONES<\/h3>\n<p>Automatice flujos de trabajo de aprobaci\u00f3n de varios pasos para agilizar el aprovisionamiento de cuentas y garantizar que los empleados accedan cuanto antes a las aplicaciones que necesitan a fin de acelerar su productividad.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99722\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/simplify-governance-icon.svg\" alt=\"\" width=\"76\" height=\"76\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1600196687809{padding-bottom: 1.875rem !important;}\u00bb el_class=\u00bbcyb-cta-match\u00bb]<\/p>\n<h3>SIMPLIFIQUE LA GOBERNANZA<\/h3>\n<p>Supervise de forma centralizada el acceso de los usuarios a todas sus aplicaciones y obtenga informaci\u00f3n detallada a nivel de usuario, funci\u00f3n o aplicaci\u00f3n para auditar cuentas, derechos, ubicaciones de inicio de sesi\u00f3n, dispositivos utilizados, inicios de sesi\u00f3n fallidos y mucho m\u00e1s.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99730\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/hr-it-icon.svg\" alt=\"\" width=\"184\" height=\"76\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1600196759766{padding-bottom: 1.875rem !important;}\u00bb el_class=\u00bbcyb-cta-match\u00bb]<\/p>\n<h3>INTEGRE LA INFORMACI\u00d3N DE RR. HH.<\/h3>\n<p>Configure integraciones bidireccionales con los sistemas de gesti\u00f3n del capital humano (HCM) y utilice los datos de Recursos Humanos para aprovisionar nuevos usuarios en Active Directory y otras aplicaciones, as\u00ed como para crear flujos de trabajo personalizados de aprovisionamiento y desaprovisionamiento.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/sync-user-icon.svg\" alt=\"\" width=\"77\" height=\"77\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1600196848629{padding-bottom: 1.875rem !important;}\u00bb el_class=\u00bbcyb-cta-match\u00bb]<\/p>\n<h3>SINCRONICE DIRECTORIOS DE USUARIOS<\/h3>\n<p>Mantenga actualizada la informaci\u00f3n de los usuarios cuando modifique una funci\u00f3n o<br \/>\nlos objetos de directorio de origen pertinentes en Active Directory, Azure AD, LDAP, Google Cloud Directory o Idaptive Cloud Directory.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1586872028792{background-color: #f1f2f2 !important;}\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-pad-top cyb-cta-card\u00bb][vc_column_text el_class=\u00bbcyb-ltr-spc\u00bb]<\/p>\n<h2>CARACTER\u00cdSTICAS PRINCIPALES<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb99936&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbcyb-ken-img\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-top\u00bb][vc_column_text css=\u00bb.vc_custom_1600179370452{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<h3>APROVISIONAMIENTO Y DESAPROVISIONAMIENTO DEL ACCESO A APLICACIONES PREINTEGRADAS<\/h3>\n<p>Idaptive le permite conceder y revocar autom\u00e1ticamente el acceso a cientos de aplicaciones en la nube preintegradas del cat\u00e1logo de aplicaciones de Idaptive. Con Idaptive Lifecycle Management, podr\u00e1 asegurarse de que el personal tenga acceso al conjunto adecuado de aplicaciones en cada fase de su ciclo de vida. Por ejemplo, puede conceder acceso desde el primer d\u00eda a determinadas aplicaciones seg\u00fan la funci\u00f3n de los empleados, actualizar autom\u00e1ticamente dicho acceso cuando cambien de funci\u00f3n, departamento o ubicaci\u00f3n, y revocarles el acceso cuando ya no formen parte de la empresa.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1537541711623{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}\u00bb el_class=\u00bbcyb-reverse\u00bb][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-top\u00bb][vc_column_text css=\u00bb.vc_custom_1600179440009{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<h3>GESTI\u00d3N CENTRALIZADA DE LOS DERECHOS<\/h3>\n<p>Idaptive Lifecycle Management le permite controlar de forma granular los derechos de acceso de los usuarios desde las mismas aplicaciones mediante la asignaci\u00f3n de funciones Idaptive a los grupos de usuarios pertinentes en sus aplicaciones. Por ejemplo, durante el proceso de aprovisionamiento del acceso a su sistema CRM, puede asignar autom\u00e1ticamente usuarios a los grupos de CRM correspondientes, como Administraci\u00f3n, Marketing o Ventas.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-md-offset-1&#8243;][vc_single_image image=\u00bb99886&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbcyb-ken-img\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb99944&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbcyb-ken-img\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-top\u00bb][vc_column_text css=\u00bb.vc_custom_1600179487902{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<h3>INTEGRACI\u00d3N CON EL SISTEMA DE GESTI\u00d3N DEL CAPITAL HUMAMO (HCM)<\/h3>\n<p>Con Idaptive, puede importar sin problemas identidades de su sistema o aplicaci\u00f3n de RR. HH. preferido, incluidos Workday, UltiPro, BambooHR o SuccessFactors, y aprovisionarlas en Active Directory. Esto le permitir\u00e1 unificar los flujos de trabajo de aprovisionamiento y recursos humanos, as\u00ed como disponer en todas sus aplicaciones de un sistema principal de registro de datos del usuario basado en el capital humano.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1537541711623{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}\u00bb el_class=\u00bbcyb-reverse\u00bb][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-top\u00bb][vc_column_text css=\u00bb.vc_custom_1600179542557{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<h3>INTEGRACI\u00d3N CON APLICACIONES PERSONALIZADAS<\/h3>\n<p>Idaptive le permite extender sus flujos de trabajo de aprovisionamiento a sus aplicaciones personalizadas a trav\u00e9s del protocolo SCIM. Puede utilizar secuencias de comandos SCIM para aprovisionar aplicaciones (en la nube y locales) en las que se hayan implementado APIs de SCIM y para las cuales no se disponga de un conector de aprovisionamiento listo para usar en el cat\u00e1logo de aplicaciones de Idaptive. Tambi\u00e9n puede utilizar el servidor de SCIM de Idaptive para permitir la administraci\u00f3n de recursos clave de sus aplicaciones, como usuarios y grupos, o para aprovisionar usuarios en Idaptive Cloud.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-md-offset-1&#8243;][vc_single_image image=\u00bb99902&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbcyb-ken-img\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb99952&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbcyb-ken-img\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-top\u00bb][vc_column_text css=\u00bb.vc_custom_1600958815060{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<h3>INTEGRACI\u00d3N PERFECTA CON OFFICE 365<\/h3>\n<p>Gracias a la funci\u00f3n de sincronizaci\u00f3n de Active Directory (AD) para Microsoft Office 365, puede sincronizar sus cuentas de AD y Office 365, as\u00ed como aprovisionar y desaprovisionar autom\u00e1ticamente las cuentas de usuario, los grupos y las pertenencias a grupos a fin de simplificar la administraci\u00f3n de licencias de Office 365.[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1601312627497{padding-bottom: 1.875rem !important;}\u00bb]<strong><a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/idaptive-for-office-365\">M\u00c1S INFORMACI\u00d3N &gt;<\/a><\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-pad-top cyb-cta-card\u00bb][vc_column_text el_class=\u00bbcyb-ltr-spc\u00bb]<\/p>\n<h2>RECURSOS<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1600179622853{padding-top: 2rem !important;background-color: #f1f2f2 !important;}\u00bb el_class=\u00bbcyb-center\u00bb][vc_column css=\u00bb.vc_custom_1593651419004{padding-bottom: 1.25rem !important;}\u00bb][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZGVtbyI+PC9hPg==[\/vc_raw_html][vc_column_text]<\/p>\n<h2>SOLICITE UNA DEMO<\/h2>\n<p>[\/vc_column_text][vc_column_text]    <script type=\"text\/javascript\" src=\"https:\/\/lp.cyberark.com\/js\/forms2\/js\/forms2.min.js\" id=\"marketo-script-js\"><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/google-libphonenumber\/3.2.38\/libphonenumber.min.js\" integrity=\"sha512-2EBfDCqBiVPlov9vAT9w6xMEIFcg24K3arAldIIgHh1EGrNob66Mc1gGXa5J7LTG3W5sk\/liGFbJUkODW5A8NQ==\" crossorigin=\"anonymous\" referrerpolicy=\"no-referrer\"><\/script>\n    <form id=\"mktoForm_4665\"><\/form>\n    <script>\n        MktoForms2.loadForm(\"\/\/lp.cyberark.com\", \"316-CZP-275\", 4665, function (form) {\n            \n            var match_found;                            \n            \n                        \n            \/\/ Add hidden value with asset info\n            var ecid = decodeURIComponent(document.cookie).match(\/AMCV_.*?=.*?\\|MCMID\\|(.*?)\\|\/)[1];\n                        var utm_source = getParameterByName('utm_source') == undefined ? (jQuery.cookie('utm_source') == undefined ? '' : jQuery.cookie('utm_source')) : getParameterByName('utm_source');\n            var utm_campaign = getParameterByName('utm_campaign') == undefined ? (jQuery.cookie('utm_campaign') == undefined ? '' : jQuery.cookie('utm_campaign')) : getParameterByName('utm_campaign');\n            var utm_medium = getParameterByName('utm_medium') == undefined ? (jQuery.cookie('utm_medium') == undefined ? '' : jQuery.cookie('utm_medium')) : getParameterByName('utm_medium');\n            var utm_term = getParameterByName('utm_term') == undefined ? (jQuery.cookie('utm_term') == undefined ? '' : jQuery.cookie('utm_term')) : getParameterByName('utm_term');\n            var utm_content = getParameterByName('utm_content') == undefined ? (jQuery.cookie('utm_content') == undefined ? '' : jQuery.cookie('utm_content')) : getParameterByName('utm_content');\n            form.addHiddenFields({\n                'marketoAnalyticsID': \"\",\n                'adobecloudid': ecid,\n                'asset_name': \"\",\n                'program_name': \"\",\n                'Lead_Request__c': \"\",\n                'additional_email_content': \"\",\n                'Notes_Restrictions__c': \"\",\n                'utm_source': utm_source,\n                'utm_campaign': utm_campaign,\n                'utm_medium': utm_medium,\n                'utm_term': utm_term,\n                'utm_contact': utm_content,\n                'utmsource': utm_source,\n                'utmcampaign': utm_campaign,\n                'utmmedium': utm_medium,\n                'utmterm': utm_term,\n                'utmcontent': utm_content,\n                'showNotes': ''\n            });\n                            form.addHiddenFields({\n                    'MktoPersonNotes': \"\"\n                });\n                \n            \/***************************\n            Start event assigning for AA\n            ***************************\/\n                            var formType = \"Demo\";\n                var formName = \"Personalized Demo\";\n                            \n            \/*************************\n            End event assigning for AA\n            *************************\/\n\n            \/***********************************************\n            Start event dispatching and email hashing for AA\n            ***********************************************\/\n\n            if( typeof formType !== 'undefined' ) { \/\/following AA dispatching will not run if formType has not been defined above\n\n                \n                \/\/Custom AT event for form view\n                let formViewEvent = new CustomEvent('launch-formView',{\n                    'detail':{\n                    'form_type': formType,\n                    'form_name': formName,\n                    'form_id': '4665'\n                    }\n                })\n                document.querySelector('body').dispatchEvent(formViewEvent);\n                console.log(formViewEvent);\n\n                form.onValidate(function() {\n                    if (jQuery(\"form.mktoForm .mktoInvalid\")[0]){\/\/only fire events if no error class is found\n                        \n                        \/\/Custom AT event for form validate\n                        let formErrorEvent = new CustomEvent('launch-formError',{\n                            'detail':{\n                                'form_type': formType,\n                                'form_name': formName,\n                                'form_id': '4665'\n                            }\n                        })\n                        document.querySelector('body').dispatchEvent(formErrorEvent);\n                        console.log(formErrorEvent);\n                        \n                                              \n                    }\n                    \/\/hash the email\n                    var eInput = jQuery('input[type=\"email\"]').val();\n                    var eHash = sha256(eInput);\n                    console.log(eHash);\n                    \/\/assign the cookie\n                    form.vals({\"marketoAnalyticsID\":eHash});\n                    _satellite.cookie.set('marketoAnalyticsID', eHash, {expires: 365});\n                });\n\n                form.onSuccess(function () {\n\n                    \/\/Custom AT event for form submit\n                    let formSubmitEvent = new CustomEvent('launch-formSubmit',{\n                        'detail':{\n                            'form_type': formType,\n                            'form_name': formName,\n                            'form_id': '4665'\n                        }\n                    })\n                    document.querySelector('body').dispatchEvent(formSubmitEvent);\n                    console.log(formSubmitEvent);\n                });               \n            }\n            \/*********************************************\n            End event dispatching and email hashing for AA\n            *********************************************\/\n            \n            \/\/ TY Message\n            form.onSuccess(function () {\n                dataLayer.push({\n                                            'event': 'demo',\n                        'form_submit': 'Demo',\n                                        });\n                                    jQuery(\"#mktoForm_4665\").hide();\n                    jQuery(\".ty_message\").show();\n                    var iframe = jQuery(\"<iframe><\/iframe>\",{\n                        src: \"https:\/\/www.cyberark.com\/?reset_mkto=1\",\n                        style: 'position:absolute;top:-9999px;left:-999px;',\n                        width: '10',\n                        height: '10'\n                    });\n                    iframe.appendTo('body');\n                    jQuery.cookie('utm_source', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_medium', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_campaign', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_term', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_content', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    return false;\n                                });\n        });\n    <\/script>\n    <script>\n    \/\/ custom errorMessage + instruction text for embedded Marketo Forms\nMktoForms2.whenReady(function(form) {\n    \/\/ when a field is focused\n    jQuery(document).on('focus', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').addClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is blurred\n    jQuery(document).on('blur', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').removeClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is edited (keyup)\n    jQuery(document).on('keyup', 'input, select, textarea', function(e){\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n                    if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n            \/\/ determine which key(s) \n            var code = e.keyCode || e.which;\n            \/\/ if this is 'tab' or 'shift + tab'\n            if (code == '9' || '16') {\n                \/\/ do nothing\n            }\n            \/\/ else this is not the tab or shift + tab key(s)\n            else{}\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n\n    });\n\n    \/\/ when a select field is changed, validate it\n    jQuery(document).on('change', 'select', function(e){\n        jQuery(this).blur().focus();    \n\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n            if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    form.onValidate(function() {\n     jQuery('form.mktoForm').addClass('validated');\n     jQuery('.mktoInvalid').each(function(){\n        jQuery(this).parents('.mktoFieldWrap').addClass('fieldInvalid');   \n        if(jQuery(this).is('.mktoTelField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Phone number is required in numerical values only.<\/span>');\n        }\n        else if(jQuery(this).is('.mktoEmailField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Email address is required in this format: yourname@email.com.<\/span>');\n        }\n        else{ \n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">This field is required.<\/span>'); \n        }\n     });\n    });\n});\n    <\/script>\n    <script src=\"https:\/\/www.google.com\/recaptcha\/api.js\" async defer><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/js-sha256\/0.9.0\/sha256.min.js\"><\/script>\n    <div class=\"ty_message\" style=\"display:none\"><strong>Thank you<\/strong> for your interest.<br \/>\nWe'll be in touch with you shortly.<\/div>\n    [\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-desktop\u00bb][vc_column el_class=\u00bbcyb-center cyb-pad-btm\u00bb css=\u00bb.vc_custom_1600216676506{margin-top: 5.3125rem !important;}\u00bb][vc_column_text el_class=\u00bbcyb-white\u00bb css=\u00bb.vc_custom_1600217088522{margin-bottom: 20px !important;}\u00bb] PROVISIONING AND LIFECYCLE MANAGEMENT Automatice el aprovisionamiento del acceso, los flujos de&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-104124","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Provisioning and Lifecycle Management | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Provisioning and Lifecycle Management\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-desktop\u00bb][vc_column el_class=\u00bbcyb-center cyb-pad-btm\u00bb css=\u00bb.vc_custom_1600216676506{margin-top: 5.3125rem !important;}\u00bb][vc_column_text el_class=\u00bbcyb-white\u00bb css=\u00bb.vc_custom_1600217088522{margin-bottom: 20px !important;}\u00bb] PROVISIONING AND LIFECYCLE MANAGEMENT Automatice el aprovisionamiento del acceso, los flujos de...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-30T14:55:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\",\"name\":\"Provisioning and Lifecycle Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\",\"datePublished\":\"2020-10-30T14:55:50+00:00\",\"dateModified\":\"2020-10-30T14:55:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Provisioning and Lifecycle Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Provisioning and Lifecycle Management | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","og_locale":"es_ES","og_type":"article","og_title":"Provisioning and Lifecycle Management","og_description":"[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-desktop\u00bb][vc_column el_class=\u00bbcyb-center cyb-pad-btm\u00bb css=\u00bb.vc_custom_1600216676506{margin-top: 5.3125rem !important;}\u00bb][vc_column_text el_class=\u00bbcyb-white\u00bb css=\u00bb.vc_custom_1600217088522{margin-bottom: 20px !important;}\u00bb] PROVISIONING AND LIFECYCLE MANAGEMENT Automatice el aprovisionamiento del acceso, los flujos de...","og_url":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-10-30T14:55:52+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","url":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","name":"Provisioning and Lifecycle Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","datePublished":"2020-10-30T14:55:50+00:00","dateModified":"2020-10-30T14:55:52+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Provisioning and Lifecycle Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/104124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=104124"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/104124\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=104124"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=104124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}