{"id":104152,"date":"2020-11-02T10:33:09","date_gmt":"2020-11-02T15:33:09","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/idaptive\/multi-factor-authentication\/facteurs-dauthentification\/"},"modified":"2020-11-02T10:33:11","modified_gmt":"2020-11-02T15:33:11","slug":"authentication-factors","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/authentication-factors\/","title":{"rendered":"Facteurs d\u2019authentification"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884341333{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero cyb-desktop\u00a0\u00bb][vc_column el_class=\u00a0\u00bbcyb-center cyb-white cyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600711713693{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h1>FACTEURS D\u2019AUTHENTIFICATION<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884402608{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero cyb-mobile\u00a0\u00bb][vc_column el_class=\u00a0\u00bbcyb-center cyb-white cyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600711713693{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h1>FACTEURS D\u2019AUTHENTIFICATION<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcyb-card-no-hover\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; css=\u00a0\u00bb.vc_custom_1600800672764{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb100194&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>E-mail OTP<\/h3>\n<p>E-mail OTP vous permet de recevoir un code \u00e0 usage unique (OTP) par e-mail pour terminer un processus d\u2019authentification secondaire.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100202&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Cl\u00e9s physiques FIDO bas\u00e9es sur U2F<\/h3>\n<p>Les cl\u00e9s d\u2019authentification universelle \u00e0 2e\u00a0facteur (U2F) de FIDO vous permettent d\u2019utiliser des dispositifs de s\u00e9curit\u00e9 physiques qui se branchent sur un port USB pour l\u2019authentification.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100210&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Jetons OTP mat\u00e9riels<\/h3>\n<p>Les dispositifs de s\u00e9curit\u00e9 physiques capables de produire un mot de passe \u00e0 usage unique ou un code PIN peuvent \u00eatre utilis\u00e9s pour terminer un processus d\u2019authentification secondaire.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100218&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Cl\u00e9s\u00a0FIDO2<\/h3>\n<p>Les authentificateurs FIDO2 sur p\u00e9riph\u00e9rique, tels que Windows Hello, Mac OS TouchID et Yubico YubiKeys, peuvent \u00eatre utilis\u00e9s pour s\u2019authentifier sur la plateforme Idaptive sur les navigateurs Firefox, Microsoft Edge, Google Chrome et Apple Safari.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100226&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>KBA (questions de s\u00e9curit\u00e9)<\/h3>\n<p>Le facteur d\u2019authentification bas\u00e9e sur la connaissance (KBA) vous permet de r\u00e9ussir le d\u00e9fi de l\u2019authentification secondaire en fournissant une r\u00e9ponse \u00e0 une question de s\u00e9curit\u00e9 pr\u00e9d\u00e9termin\u00e9e.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100234&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Applications d\u2019authentification mobile bas\u00e9es sur OATH<\/h3>\n<p>Les authentificateurs mobiles bas\u00e9s sur OATH sont des applications pour smartphones, telles que l\u2019application Idaptive Mobile ou l\u2019application Google Authenticator, qui g\u00e9n\u00e8rent des codes d\u2019acc\u00e8s uniques requis pour la v\u00e9rification d\u2019identit\u00e9.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100242&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Notifications push mobiles<\/h3>\n<p>Idaptive Mobile App peut \u00eatre utilis\u00e9e pour recevoir et approuver des demandes d\u2019authentification secondaire sur votre smartphone.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100250&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Identifiants d\u00e9riv\u00e9s<\/h3>\n<p>Les identifiants d\u00e9riv\u00e9s (identifiants cryptographiques d\u00e9riv\u00e9s de ceux d\u2019une carte de v\u00e9rification d\u2019identit\u00e9 personnelle [PIV] ou d\u2019une carte d\u2019acc\u00e8s commune [CAC] et stock\u00e9s sur des appareils mobiles) peuvent \u00eatre utilis\u00e9s pour satisfaire \u00e0 des exigences strictes d\u2019authentification \u00e0 deux facteurs.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100258&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>OTP hors ligne<\/h3>\n<p>Les codes d\u2019acc\u00e8s \u00e0 usage unique hors ligne (OTP) peuvent \u00eatre utilis\u00e9s pour se connecter \u00e0 des appareils Windows et Mac prot\u00e9g\u00e9s par une authentification \u00e0 plusieurs facteurs adaptative, m\u00eame s\u2019ils ne sont pas connect\u00e9s \u00e0 Internet.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100266&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>OTP par SMS<\/h3>\n<p>Vous pouvez recevoir des SMS avec des codes \u00e0 usage unique (OTP) ou des liens d\u2019approbation d\u2019acc\u00e8s sur votre num\u00e9ro de t\u00e9l\u00e9phone portable enregistr\u00e9 pour acc\u00e9der \u00e0 des applications prot\u00e9g\u00e9es par la MFA.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100274&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Appel t\u00e9l\u00e9phonique<\/h3>\n<p>Les utilisateurs peuvent recevoir des instructions par appel t\u00e9l\u00e9phonique pour terminer le processus d\u2019authentification secondaire.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_single_image image=\u00a0\u00bb100282&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Portable comme jeton<\/h3>\n<p>L\u2019iWatch d\u2019Apple peut \u00eatre utilis\u00e9e pour recevoir des notifications avec des codes \u00e0 usage unique ou des liens URL d\u2019approbation pour terminer le processus d\u2019authentification secondaire.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884341333{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero cyb-desktop\u00a0\u00bb][vc_column el_class=\u00a0\u00bbcyb-center cyb-white cyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600711713693{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00a0\u00bb] FACTEURS D\u2019AUTHENTIFICATION [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884402608{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size:&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-104152","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Facteurs d\u2019authentification | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/authentication-factors\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Facteurs d\u2019authentification\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884341333{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero cyb-desktop\u00a0\u00bb][vc_column el_class=\u00a0\u00bbcyb-center cyb-white cyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600711713693{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00a0\u00bb] FACTEURS D\u2019AUTHENTIFICATION [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884402608{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size:...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/authentication-factors\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-02T15:33:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/authentication-factors\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/authentication-factors\/\",\"name\":\"Facteurs d\u2019authentification | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2020-11-02T15:33:09+00:00\",\"dateModified\":\"2020-11-02T15:33:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/authentication-factors\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/authentication-factors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/authentication-factors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Facteurs d\u2019authentification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Facteurs d\u2019authentification | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/authentication-factors\/","og_locale":"fr_FR","og_type":"article","og_title":"Facteurs d\u2019authentification","og_description":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884341333{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcyb-hero cyb-desktop\u00a0\u00bb][vc_column el_class=\u00a0\u00bbcyb-center cyb-white cyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbcyb-white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600711713693{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00a0\u00bb] FACTEURS D\u2019AUTHENTIFICATION [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1600884402608{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size:...","og_url":"https:\/\/www.cyberark.com\/products\/authentication-factors\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-11-02T15:33:11+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/authentication-factors\/","url":"https:\/\/www.cyberark.com\/products\/authentication-factors\/","name":"Facteurs d\u2019authentification | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2020-11-02T15:33:09+00:00","dateModified":"2020-11-02T15:33:11+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/authentication-factors\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/authentication-factors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/authentication-factors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Facteurs d\u2019authentification"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/104152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=104152"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/104152\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=104152"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=104152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}