{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Shivani Tapase","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/stapase\/","title":"Gouvernance des identit\u00e9s","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"PQxGsFKlNF\"><a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/identity-governance\/\">Gouvernance des identit\u00e9s<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/solutions\/identity-governance\/embed\/#?secret=PQxGsFKlNF\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Gouvernance des identit\u00e9s\u00a0\u00bb &#8212; CyberArk\" data-secret=\"PQxGsFKlNF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Modernisez la gouvernance des identit\u00e9s gr\u00e2ce \u00e0 l'automatisation des contr\u00f4les d'acc\u00e8s, \u00e0 la gestion du cycle de vie et \u00e0 une visibilit\u00e9 continue sur toutes les identit\u00e9s avec CyberArk Modern IGA.","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/govern-indentities-OG-img-1200x630-1.jpg","thumbnail_width":1200,"thumbnail_height":630}