{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/fr\/","author_name":"Naveen Alapati","author_url":"https:\/\/www.cyberark.com\/fr\/blog\/author\/nalapati\/","title":"Demande de d\u00e9monstration des solutions modernes de gouvernance et d\u2019administration des identit\u00e9s","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GsCgKN4q7R\"><a href=\"https:\/\/www.cyberark.com\/fr\/try-buy\/modern-iga-demo\/\">Demande de d\u00e9monstration des solutions modernes de gouvernance et d\u2019administration des identit\u00e9s<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/fr\/try-buy\/modern-iga-demo\/embed\/#?secret=GsCgKN4q7R\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Demande de d\u00e9monstration des solutions modernes de gouvernance et d\u2019administration des identit\u00e9s\u00a0\u00bb &#8212; CyberArk\" data-secret=\"GsCgKN4q7R\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Demandez une d\u00e9monstration personnalis\u00e9e pour d\u00e9couvrir comment les solutions modernes de gouvernance et d\u2019administration des identit\u00e9s (IGA) de CyberArk automatise les v\u00e9rifications des acc\u00e8s et simplifie la validation des autorisations pour votre organisation."}