{"id":115210,"date":"2021-02-03T18:25:43","date_gmt":"2021-02-03T23:25:43","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/credential-providers\/"},"modified":"2025-11-25T15:14:13","modified_gmt":"2025-11-25T20:14:13","slug":"credential-providers","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/credential-providers\/","title":{"rendered":"Fournisseurs d&rsquo;identifiants"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/products\/secrets-management\/\">Revenir \u00e0 la section Gestion des secrets<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Fournisseurs d&rsquo;identifiants<\/h1>\n<p><\/p>\n<h2>Les d\u00e9veloppeurs et les \u00e9quipes de s\u00e9curit\u00e9 peuvent \u00e9liminer facilement les identifiants cod\u00e9s en dur dans une large gamme d\u2019applications \u00e0 l\u2019aide d\u2019int\u00e9grations pr\u00eates \u00e0 l\u2019emploi.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fsecrets-manager-enterprise%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-110308 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\" alt=\"\" width=\"730\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg 730w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero-300x218.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero-150x109.jpg 150w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_sticky_nav\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Fournisseurs d&rsquo;identifiants<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_raw_html el_class=\u00a0\u00bbsticky-nav-buttons\u00a0\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMSI+QXZhbnRhZ2VzPC9saT4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMiI+SW50w6lncmF0aW9uczwvbGk+DQogCTxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTMiPkZvbmN0aW9ubmFsaXTDqXM8L2xpPg0KIAk8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi00Ij5Gb25jdGlvbm5lbWVudDwvbGk+DQo8L3VsPg==[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fsecrets-manager-enterprise%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbsubnav-dropdown\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Aller \u00e0<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt sub-1&Prime; css=\u00a0\u00bb.vc_custom_1617034769910{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Permettez aux applications d\u2019acc\u00e9der en toute s\u00e9curit\u00e9 aux secrets dont elles ont besoin.<\/h3>\n<p>G\u00e9rez, renouvelez et s\u00e9curisez les secrets utilis\u00e9s par les applications commerciales (COTS), les outils d\u2019automatisation robotis\u00e9e des processus (RPA), Java, .Net, les scripts d\u2019automatisation et autres identit\u00e9s non humaines.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/High-Performance.svg\"><img decoding=\"async\" class=\"alignnone wp-image-110316\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/High-Performance.svg\" alt=\"\" width=\"94\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Haute performance<\/h4>\n<p>R\u00e9pond aux besoins des applications les plus critiques et les plus exigeantes de l\u2019entreprise.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Strong-Authentication.svg\"><img decoding=\"async\" class=\"alignnone wp-image-110324\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Strong-Authentication.svg\" alt=\"\" width=\"94\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Authentification forte<\/h4>\n<p>V\u00e9rifie l\u2019origine de toute application demandant l\u2019identifiant.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/No-Downtime.svg\"><img decoding=\"async\" class=\"alignnone wp-image-110332\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/No-Downtime.svg\" alt=\"\" width=\"94\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Aucune interruption<\/h4>\n<p>Renouvelle les identifiants en fonction de la strat\u00e9gie pendant que les applications continuent \u00e0 fonctionner.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 customer-stories cybv2-pad\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime;][vc_column_text el_class=\u00a0\u00bbpb-4&Prime;]<\/p>\n<h3>S\u00e9curisez simplement les applications et les logiciels COTS gr\u00e2ce \u00e0 des centaines d\u2019int\u00e9grations pr\u00eates \u00e0 l\u2019emploi<\/h3>\n<p><\/p>\n<h6>Les clients de CyberArk utilisent la solution CyberArk Secrets Manager et la plateforme de s\u00e9curit\u00e9 des identit\u00e9s pour s\u00e9curiser l\u2019ensemble de leurs identit\u00e9s humaines et machines.<\/h6>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Voir plus de clients<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cyb-pad-btm featured-video-overflow\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1671212795028{background-color: #ffffff !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"border-radius alignnone wp-image-181894 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image.jpg\" alt=\"\" width=\"640\" height=\"440\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image-150x103.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text el_class=\u00a0\u00bbpb-4&Prime;]<span class=\"large-quote\">\u00ab\u00a0L\u2019extensibilit\u00e9 de CyberArk Secrets Manager s\u2019est r\u00e9v\u00e9l\u00e9e un \u00e9norme avantage pour nous. Les int\u00e9grations pr\u00eates \u00e0 l\u2019emploi aux logiciels tiers ont simplifi\u00e9 la mani\u00e8re dont nous int\u00e9grons en toute s\u00e9curit\u00e9 ces applications au reste de notre portefeuille, ce qui est fantastique.\u00a0\u00bb<\/span><\/p>\n<p><strong>Responsable de la s\u00e9curit\u00e9 de l\u2019information dans un h\u00f4pital de premier plan aux \u00c9tats-Unis<\/strong>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/top-us-hospital\/\">Lire l\u2019\u00e9tude de cas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm\u00a0\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTI4MTQyIiBwb3MzX2lkPSIxODIzNTMiIHBvczRfaWQ9IjEzNTQ3NiJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbsub-2&Prime;][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_logos vc_custom_1705518984428 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section7_carou_text extra-space link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">CyberArk Marketplace<\/h4>\n<p style=\"text-align: center; font-weight: 300; padding-bottom: 0px;\">Parcourez notre march\u00e9 en ligne pour trouver des int\u00e9grations.<br \/>\n<a style=\"display: inline-block; margin-top: 15px;\" href=\"https:\/\/cyberark-customers.force.com\/mplace\/s\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visitez Marketplace<i class=\"fas fa-external-link-alt\"><\/i><\/a><\/p>\n<p><style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719226597 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719226597 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d2719226597 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719226597 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d2719226597 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d2719226597 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d2719226597 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d2719226597 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719226597 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d2719226597.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105685{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105685{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105685 sp-logo-section-id-69d2719226597 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"lcp-preloader-105685\" class=\"sp-logo-carousel-pro-preloader\"><img decoding=\"async\" src=\" https:\/\/www.cyberark.com\/wp-content\/plugins\/logo-carousel-pro\/public\/assets\/css\/images\/bx_loader.gif \"\/><\/div><div id=\"sp-logo-carousel-pro69d2719226597\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/aws.png\" alt=\"aws logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/crowdstrike.png\" alt=\"crowdstrike logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Google.png\" alt=\"Google logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/microsoft-logo.png\" alt=\"Microsoft logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/paloalto.png\" alt=\"paloalto logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Proofpoint.png\" alt=\"Proofpoint logo\" ><\/div><\/div><\/div><\/div><\/div><br \/>\n<style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719229ff4 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719229ff4 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d2719229ff4 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719229ff4 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}\n\t\t\t\tdiv.sp-logo-section-id-69d2719229ff4 .bx-viewport{\n\t\t\t\tdirection: ltr;\n\t\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d2719229ff4 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d2719229ff4 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d2719229ff4 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d2719229ff4 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d2719229ff4 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d2719229ff4.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105741{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105741{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105741 sp-logo-section-id-69d2719229ff4 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"sp-logo-carousel-pro69d2719229ff4\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"prev\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/RedHat.png\" alt=\"RedHat Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Sailpoint.png\" alt=\"Sailpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/sap.png\" alt=\"sap logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Servicenow.png\" alt=\"Servicenow logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Tenable.png\" alt=\"Tenable\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/UIPath.png\" alt=\"UiPath\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-1.png\" alt=\"vmware logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-tanzu.png\" alt=\"vmware-tanzu logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Workday.png\" alt=\"Workday logo\" ><\/div><\/div><\/div><\/div><\/div>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1611095281474 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<style>\r\n.page-id-105338 #hero-logo-container{\r\n    display: none;\r\n}\r\n\/* General *\/\r\n.cybv2 .link-arrow-right a {\r\n\tmargin-right: 6px;\r\n}\r\n.cybv2 h4 {\r\n\tline-height: 1.3em;\r\n}\r\n.cybv2 a.big_link {\r\n\tmargin: 0;\r\n}\r\n@media only screen and (max-device-width: 767px) {\r\n.cybv2 h2 {\r\n\tfont-size: 40px;\r\n}\r\n}\r\n.page-id-105338 .vc_btn3-color-grey{\r\n    font-weight: 600 !important;\r\n}\r\n\/* End General *\/\r\n\r\n\/* Section 7 *\/\r\n.cybv2.cybv2_logos h4 {\r\n\tcolor: #ffffff !important;\r\n}\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 50px;\r\n}\r\n.cybv2_logos {\r\n    padding: 75px 100px 90px 100px;\r\n}\r\n.new_hpstyle_section7_carou_text p {\r\n    font-size: 20px;\r\n    color: #fff;\r\n    padding-bottom: 60px;\r\n}\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 500px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 500px 30px 0;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-section.sp-lcpro-id-105685{\r\n    margin-bottom: 20px;\r\n}\r\n.cybv2_logos .link-arrow-right p a,\r\n.cybv2_logos .link-arrow-right p i{\r\n    color: #D4EB33 !important;\r\n}\r\n\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover,\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover i{\r\n    color: #F3FFA0 !important;\r\n}\r\n@media only screen and (max-width: 1024px) {\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 300px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 300px 30px 0;\r\n}\r\n}\r\n@media only screen and (max-width: 767px) {\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 30px;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-area .sp-lcp-item {\r\n\tmax-width: 82px;\r\n\tmargin-right: 10px !important;\r\n}\r\n.cybv2_logos {\r\n\tpadding: 40px 100px 50px 100px;\r\n}\r\n}\r\n\/* End section 7 *\/\r\n\r\n<\/style>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad-top cybv2 cybv2-background-oval tour sub-3&Prime;][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>R\u00e9cup\u00e9rez en toute s\u00e9curit\u00e9 les identifiants pendant que l\u2019application continue de fonctionner<\/h3>\n<p>Emp\u00eachez la divulgation des identifiants cod\u00e9s en dur dans des applications statiques critiques.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbS\u00e9curisez l\u2019acc\u00e8s aux identifiants\u00a0\u00bb tab_id=\u00a0\u00bbtelescopes6a1f-7911&Prime;][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>S\u00e9curisez l\u2019acc\u00e8s aux identifiants<\/h4>\n<p>Les mots de passe stock\u00e9s dans le coffre-fort num\u00e9rique CyberArk Digital Vault peuvent \u00eatre r\u00e9cup\u00e9r\u00e9s aupr\u00e8s du fournisseur d\u2019identifiants, apr\u00e8s quoi les applications distantes autoris\u00e9es peuvent acc\u00e9der \u00e0 ces mots de passe.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109489 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1.png\" alt=\"S\u00e9curisez l\u2019acc\u00e8s aux identifiants\" width=\"665\" height=\"451\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAcc\u00e8s contr\u00f4l\u00e9\u00a0\u00bb tab_id=\u00a0\u00bb1607454710346-6cbd482c-157b6a1f-7911&Prime;][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Acc\u00e8s contr\u00f4l\u00e9<\/h4>\n<p>Le principe du <a href=\"https:\/\/www.cyberark.com\/fr\/what-is\/least-privilege\/\">moindre privil\u00e8ge<\/a> permet \u00e0 chaque application de recevoir le mot de passe sp\u00e9cifique qu\u2019elle a demand\u00e9 et aucun autre.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-111782 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2.png\" alt=\"Acc\u00e8s contr\u00f4l\u00e9\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAuthentification forte\u00a0\u00bb tab_id=\u00a0\u00bb1607454768235-0288b534-07116a1f-7911&Prime;][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Authentification forte<\/h4>\n<p>Tire profit des caract\u00e9ristiques natives des workloads de l\u2019application pour authentifier fortement les applications et \u00e9liminer le \u00ab\u00a0secret z\u00e9ro\u00a0\u00bb.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109505 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3.png\" alt=\"Authentification forte\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbHaute fiabilit\u00e9\u00a0\u00bb tab_id=\u00a0\u00bb1607454800369-5ed63486-a9726a1f-7911&Prime;][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Haute fiabilit\u00e9<\/h4>\n<p>Les identifiants mis en cache localement garantissent une disponibilit\u00e9 \u00e9lev\u00e9e, la continuit\u00e9 des activit\u00e9s et les meilleures performances pour les applications critiques de l\u2019entreprise.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109513 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4.png\" alt=\"Haute fiabilit\u00e9\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-up\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAudits complets\u00a0\u00bb tab_id=\u00a0\u00bb1607454820130-080c61a7-b88f6a1f-7911&Prime;][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Audits complets<\/h4>\n<p>Les journaux d\u2019audit consignent les acc\u00e8s aux mots de passe, permettant une surveillance et une tra\u00e7abilit\u00e9 compl\u00e8tes pour chaque mot de passe demand\u00e9 par chaque application.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109521 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5.png\" alt=\"Audits complets\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top info-graphic sub-4&Prime;][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb]<\/p>\n<h3>Gestion centralis\u00e9e des secrets dans les environnements distribu\u00e9s<\/h3>\n<p>L\u2019architecture flexible et les options de d\u00e9ploiement permettent \u00e0 un large \u00e9ventail d\u2019applications de r\u00e9cup\u00e9rer en toute s\u00e9curit\u00e9 les identifiants pour acc\u00e9der aux ressources sensibles telles que les bases de donn\u00e9es.[\/vc_column_text][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Infographic_DEVOPS_CP_CredentialProviders.svg\"><img decoding=\"async\" class=\"alignnone wp-image-109561 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Infographic_DEVOPS_CP_CredentialProviders.svg\" alt=\"Gestion centralis\u00e9e des secrets\" \/><\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cyberark-blueprint dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section3_h4&Prime;]<\/p>\n<h3>Des solutions de s\u00e9curit\u00e9 des identit\u00e9s qui s\u2019adaptent en fonction de vos besoins et ne vous ralentissent pas<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section3_text\u00a0\u00bb]<\/p>\n<h4>D\u00e9couvrez toutes les solutions CyberArk con\u00e7ues pour vous aider \u00e0 avancer en toute confiance.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbEn savoir plus\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section8_text2&Prime;]Concentrez-vous sur la r\u00e9ussite de votre entreprise, pas sur la r\u00e9ponse aux menaces[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1695144687474{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1609868130755{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]<\/p>\n<h2>Demander une d\u00e9mo<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Emp\u00eachez les applications critiques de divulguer les identifiants cod\u00e9s en dur[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]S\u00e9curisez simplement les applications gr\u00e2ce \u00e0 la plus large gamme d\u2019int\u00e9grations pr\u00eates \u00e0 l\u2019emploi[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Prenez une longueur d\u2019avance sur les audits et les exigences de conformit\u00e9[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb108954&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Inscrivez-vous ici pour obtenir une d\u00e9monstration personnalis\u00e9e<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzMCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1zZWNyZXRzLW1hbmFnZXItZW50ZXJwcmlzZS8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcyb-pad cybv2&Prime;][vc_column][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbtiny\u00a0\u00bb]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/fr\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":203,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-115210","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fournisseurs d&#039;identifiants \u2013 Gestion centralis\u00e9e des identifiants | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Credential Provider stocke, consigne et g\u00e8re de mani\u00e8re centralis\u00e9e les mots de passe sensibles afin que chaque application puisse y acc\u00e9der en toute s\u00e9curit\u00e9 en respectant le principe du moindre privil\u00e8ge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/credential-providers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fournisseurs d&#039;identifiants\" \/>\n<meta property=\"og:description\" content=\"CyberArk Credential Provider stocke, consigne et g\u00e8re de mani\u00e8re centralis\u00e9e les mots de passe sensibles afin que chaque application puisse y acc\u00e9der en toute s\u00e9curit\u00e9 en respectant le principe du moindre privil\u00e8ge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/credential-providers\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T20:14:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/\",\"name\":\"Fournisseurs d'identifiants \u2013 Gestion centralis\u00e9e des identifiants | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\",\"datePublished\":\"2021-02-03T23:25:43+00:00\",\"dateModified\":\"2025-11-25T20:14:13+00:00\",\"description\":\"CyberArk Credential Provider stocke, consigne et g\u00e8re de mani\u00e8re centralis\u00e9e les mots de passe sensibles afin que chaque application puisse y acc\u00e9der en toute s\u00e9curit\u00e9 en respectant le principe du moindre privil\u00e8ge.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/credential-providers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/credential-providers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fournisseurs d&#8217;identifiants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fournisseurs d'identifiants \u2013 Gestion centralis\u00e9e des identifiants | CyberArk","description":"CyberArk Credential Provider stocke, consigne et g\u00e8re de mani\u00e8re centralis\u00e9e les mots de passe sensibles afin que chaque application puisse y acc\u00e9der en toute s\u00e9curit\u00e9 en respectant le principe du moindre privil\u00e8ge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/credential-providers\/","og_locale":"fr_FR","og_type":"article","og_title":"Fournisseurs d'identifiants","og_description":"CyberArk Credential Provider stocke, consigne et g\u00e8re de mani\u00e8re centralis\u00e9e les mots de passe sensibles afin que chaque application puisse y acc\u00e9der en toute s\u00e9curit\u00e9 en respectant le principe du moindre privil\u00e8ge.","og_url":"https:\/\/www.cyberark.com\/products\/credential-providers\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-11-25T20:14:13+00:00","og_image":[{"width":730,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/credential-providers\/","url":"https:\/\/www.cyberark.com\/products\/credential-providers\/","name":"Fournisseurs d'identifiants \u2013 Gestion centralis\u00e9e des identifiants | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/credential-providers\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/credential-providers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","datePublished":"2021-02-03T23:25:43+00:00","dateModified":"2025-11-25T20:14:13+00:00","description":"CyberArk Credential Provider stocke, consigne et g\u00e8re de mani\u00e8re centralis\u00e9e les mots de passe sensibles afin que chaque application puisse y acc\u00e9der en toute s\u00e9curit\u00e9 en respectant le principe du moindre privil\u00e8ge.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/credential-providers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/credential-providers\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/products\/credential-providers\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/credential-providers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Fournisseurs d&#8217;identifiants"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/203"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=115210"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/115210\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=115210"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=115210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}