{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Fernanda Walker","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/fwalker\/","title":"Multi-Factor Authentication","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AoiyvaJRYp\"><a href=\"https:\/\/www.cyberark.com\/fr\/products\/multi-factor-authentication\/\">Multi-Factor Authentication<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/products\/multi-factor-authentication\/embed\/#?secret=AoiyvaJRYp\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Multi-Factor Authentication\u00a0\u00bb &#8212; CyberArk\" data-secret=\"AoiyvaJRYp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Utilisez l\u2019authentification \u00e0 plusieurs facteurs (MFA) pour accorder aux clients un acc\u00e8s s\u00e9curis\u00e9 aux applications et aux sites Web et attribuer et ajuster les risques en fonction de leur comportement d\u2019utilisateur.","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-Hero-770x530-1.jpg","thumbnail_width":770,"thumbnail_height":530}