{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"John Rainis","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/jrainis\/","title":"Gestion des acc\u00e8s (Nouveau)","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TEryCiIjmZ\"><a href=\"https:\/\/www.cyberark.com\/fr\/products\/access-management\/\">Gestion des acc\u00e8s (Nouveau)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/products\/access-management\/embed\/#?secret=TEryCiIjmZ\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Gestion des acc\u00e8s (Nouveau)\u00a0\u00bb &#8212; CyberArk\" data-secret=\"TEryCiIjmZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Les solutions de gestion des acc\u00e8s de CyberArk offrent \u00e0 votre personnel et \u00e0 vos clients un acc\u00e8s facile et s\u00e9curis\u00e9 \u00e0 partir de n\u2019importe quel appareil, n\u2019importe o\u00f9 et au moment opportun.","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Assets-Page-Seesaw-Comp-CyberArk_Workforce-Identities-770x515-1.jpg"}