{"id":134357,"date":"2022-09-15T14:38:15","date_gmt":"2022-09-15T18:38:15","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/acces-a-privileges-dynamique\/"},"modified":"2023-12-08T06:58:34","modified_gmt":"2023-12-08T11:58:34","slug":"dynamic-privileged-access","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/dynamic-privileged-access\/","title":{"rendered":"Dynamic Privileged Access"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-access\/\">Retour \u00e0 Privileged Access<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Dynamic Privileged Access<\/h1>\n<h2>Fournissez un acc\u00e8s \u00e0 privil\u00e8ges juste \u00e0 temps (JIT). R\u00e9duisez le risque des acc\u00e8s op\u00e9rationnels aux infrastructures hybrides et multiclouds.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:%23demo|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110308\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\" alt=\"Dynamic Privilege Access\" width=\"730\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg 730w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero-300x218.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero-150x109.jpg 150w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611617874123{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Compl\u00e8te privileged access management:<\/h3>\n<p>Am\u00e9liorez l\u2019efficacit\u00e9 op\u00e9rationnelle gr\u00e2ce \u00e0 une gestion unifi\u00e9e des acc\u00e8s \u00e0 privil\u00e8ges pour les acc\u00e8s permanents et <a href=\"https:\/\/www.cyberark.com\/fr\/what-is\/just-in-time-access\/\">juste \u00e0 temps<\/a>.<\/p>\n<p>S\u00e9curisez les comptes syst\u00e8me et les comptes d\u2019acc\u00e8s d\u2019urgence avec <a href=\"https:\/\/www.cyberark.com\/fr\/products\/privileged-access-manager\/\">le gestionnaire des acc\u00e8s \u00e0 privil\u00e8ges<\/a>. Tirez parti de l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique* pour les acc\u00e8s op\u00e9rationnels. Mettez en \u0153uvre des initiatives <a href=\"https:\/\/www.cyberark.com\/fr\/what-is\/least-privilege\/\">d\u2019acc\u00e8s \u00e0 moindre privil\u00e8ge<\/a> et <a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/zero-trust\/\">Zero Trust<\/a>.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109006\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Cloud-and-Speed.svg\" alt=\"Enforce Least Privilege Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb<\/h4>\n<p>R\u00e9duisez les risques de mani\u00e8re mesurable et minimisez les privil\u00e8ges permanents gr\u00e2ce au provisionnement JIT[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109014\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Secure-DevOps-Cloud.svg\" alt=\"Credential Exposure Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Connexions natives et s\u00e9curis\u00e9es<\/h4>\n<p>Exp\u00e9rience utilisateur transparente avec les clients RDP ou SSH pr\u00e9f\u00e9r\u00e9s des administrateurs[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111528\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Demonstrate-Compliance.svg\" alt=\"Enable PAM Efficiencies\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Gains d\u2019efficacit\u00e9 avec la PAM<\/h4>\n<p>D\u00e9ploiement et int\u00e9gration rapides avec la <a href=\"https:\/\/www.cyberark.com\/fr\/products\/\">plateforme CyberArk Identity Security<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad cybv2 cybv2-background-oval tour\u00a0\u00bb][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbleft-mobile\u00a0\u00bb]<\/p>\n<h3>R\u00e9duction du risque des acc\u00e8s \u00e0 privil\u00e8ges permanents<\/h3>\n<p>Renforcez votre programme de PAM gr\u00e2ce aux acc\u00e8s op\u00e9rationnels \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbProvisionnement JIT\u00a0\u00bb tab_id=\u00a0\u00bbjit\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Provisionnement JIT<\/h4>\n<p>Les administrateurs initient des connexions s\u00e9par\u00e9es via leurs clients RDP et SSH pr\u00e9f\u00e9r\u00e9s. Une fois l\u2019utilisateur authentifi\u00e9, l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique v\u00e9rifie que l\u2019utilisateur est autoris\u00e9 avant de cr\u00e9er un acc\u00e8s \u00e9ph\u00e9m\u00e8re sur la machine virtuelle ou le serveur cible.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110248\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png\" alt=\"Just-in-Time Provisioning\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbContr\u00f4le des acc\u00e8s bas\u00e9 sur les attributs\u00a0\u00bb tab_id=\u00a0\u00bbbased-access-control\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Contr\u00f4le des acc\u00e8s bas\u00e9 sur les attributs<\/h4>\n<p>Gr\u00e2ce \u00e0 des politiques de contr\u00f4le des acc\u00e8s bas\u00e9 sur les attributs (ABAC), les acc\u00e8s op\u00e9rationnels ne sont autoris\u00e9s qu\u2019\u00e0 des heures sp\u00e9cifiques et pour une dur\u00e9e d\u00e9termin\u00e9e. Les entreprises peuvent fournir des acc\u00e8s JIT de mani\u00e8re s\u00e9curis\u00e9e, intelligente et adapt\u00e9e \u00e0 leur contexte.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119491\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1.png\" alt=\"Secures More, Costs Less\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-Vendor-Consolidation-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbPas d\u2019agent ni de VPN\u00a0\u00bb tab_id=\u00a0\u00bbzero-agents\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Pas d\u2019agent ni de VPN<\/h4>\n<p>L\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique est une solution non intrusive et sans agent pour accorder des acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb. Le service ouvre des connexions s\u00e9curis\u00e9es \u00e9ph\u00e9m\u00e8res sur les r\u00e9seaux priv\u00e9s sur site et dans le cloud, sans avoir besoin de VPN.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110848\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-RemoteWorkforceAccess-2.png\" alt=\"Products Tour Remote Workforce Access\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-RemoteWorkforceAccess-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-RemoteWorkforceAccess-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-RemoteWorkforceAccess-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbSolution MFA forte et sensible au risque\u00a0\u00bb tab_id=\u00a0\u00bbmfa\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Solution MFA forte et sensible au risque<\/h4>\n<p>Appliquez l\u2019authentification \u00e0 plusieurs facteurs (MFA) adaptative pour valider les tentatives d\u2019acc\u00e8s pour chaque identit\u00e9 sp\u00e9cifique. Tirez parti de l\u2019analyse comportementale pour \u00e9tendre la s\u00e9curit\u00e9 des identit\u00e9s et faire progresser les initiatives Zero\u00a0Trust.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119626\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png\" alt=\"Enable Strong Authentication\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-up\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbR\u00e9duction de l\u2019encombrement op\u00e9rationnel\u00a0\u00bb tab_id=\u00a0\u00bbfootprint\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>R\u00e9duction de l\u2019encombrement op\u00e9rationnel<\/h4>\n<p>L\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique all\u00e8ge la charge sur les serveurs de gestion des acc\u00e8s \u00e0 privil\u00e8ges en assurant une gestion dynamique des sessions, ce qui am\u00e9liore les performances globales et r\u00e9duit les frais g\u00e9n\u00e9raux.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119642\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5.png\" alt=\"Integrate with Compliance Tools\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkub24lMjglMjJjbGljayUyMiUyQ2Z1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTA5JTBBJTA5aWYlMjhqUXVlcnklMjh0aGlzJTI5Lmhhc0NsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTI5JTdCJTBBJTA5JTA5JTBBJTA5JTA5c2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTA5alF1ZXJ5JTI4JTIyLnRvdXIlMjAudmNfdHRhLXBhbmVsJTIyJTI5LnJlbW92ZUNsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTNCJTIwJTBBJTA5JTA5JTdEJTJDMTAwJTI5JTBBJTA5JTA5JTBBJTA5JTA5cmV0dXJuJTIwZmFsc2UlM0IlMEElMDklN0QlMEElN0QlMjklM0IlMEElN0QlMEElMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjAud3BiX3RleHRfY29sdW1uJTIwYSUyMiUyOS5jbGljayUyOGZ1bmN0aW9uJTI4ZSUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyRiUyRiUyMERvJTIwc29tZXRoaW5nJTBBJTIwJTIwJTIwZS5zdG9wUHJvcGFnYXRpb24lMjglMjklM0IlMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad info-graphic\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb]<\/p>\n<h3>Protection compl\u00e8te des acc\u00e8s \u00e0 privil\u00e8ges<\/h3>\n<p>Mettez en \u0153uvre le principe <a href=\"https:\/\/www.cyberark.com\/fr\/solutions\/zero-trust\/\">Zero Trust<\/a> avec des contr\u00f4les des privil\u00e8ges intelligents pour les acc\u00e8s \u00e0 privil\u00e8ges permanents et juste \u00e0 temps.[\/vc_column_text][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-131843 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dpa-infographic.png\" alt=\"DPA infographic\" width=\"1300\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dpa-infographic.png 1300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dpa-infographic-300x119.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dpa-infographic-1024x406.png 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dpa-infographic-768x304.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dpa-infographic-150x59.png 150w\" sizes=\"auto, (max-width: 1300px) 100vw, 1300px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1611959082037{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cyber-security-section5-bckgrd.jpg?id=105424) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_full_width_resource\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section5_title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: center;\">R\u00e9duction du risque<br \/>\ndes acc\u00e8s permanents<\/h5>\n<p>[\/vc_column_text][vc_row_inner el_class=\u00a0\u00bbnew_hpstyle_section5_container\u00a0\u00bb][vc_column_inner][vc_single_image image=\u00a0\u00bb132052&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb el_class=\u00a0\u00bbnew_hpstyle_section5_gart_img\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section5_text1&Prime;]<\/p>\n<h4>Acc\u00e8s juste \u00e0 temps pour la s\u00e9curit\u00e9 des identit\u00e9s dans le cloud public<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section5_text2&Prime;]<\/p>\n<p style=\"text-align: left;\">R\u00e9duisez les risques et am\u00e9liorez l\u2019efficacit\u00e9 op\u00e9rationnelle gr\u00e2ce aux acc\u00e8s \u00e0 privil\u00e8ges JIT pour AWS et Azure.<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9chargez l\u2019eBook\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2F3-reasons-to-adopt-just-in-time-access-for-identity-security-in-the-public-cloud|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid cyb-button-hpstyle_section5&Prime;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorez<br \/>\nles acc\u00e8s<br \/>\nJIT<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section8_text2&Prime;]D\u00e9couvrez le principe des acc\u00e8s \u00e0 privil\u00e8ges \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb.[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/resources\/\">Voir toutes les ressources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=\u00a0\u00bbnew_hpstyle_section8_uberflip\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1655821197555{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZGVtbyI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1609868130755{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]<\/p>\n<h1>D\u00e9monstration Dynamic Privileged Access<\/h1>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Minimiser les privil\u00e8ges permanents et r\u00e9duire les cyberrisques[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Fournir des acc\u00e8s \u00e0 privil\u00e8ges juste \u00e0 temps[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Mettre en \u0153uvre le moindre privil\u00e8ge pour les initiatives Zero\u00a0Trust[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]\u00c9tendre la s\u00e9curit\u00e9 des identit\u00e9s au cloud public[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb106859&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Inscrivez-vous ici pour une d\u00e9monstration personnalis\u00e9e<br \/>\n<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODk2MyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9mci90cnktYnV5L3RoYW5rLXlvdS1keW5hbWljLXByaXZpbGVnZWQtYWNjZXNzLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]Retour \u00e0 Privileged Access[\/vc_column_text][vc_column_text] Dynamic Privileged Access Fournissez un acc\u00e8s \u00e0 privil\u00e8ges juste \u00e0 temps (JIT). R\u00e9duisez le risque des acc\u00e8s op\u00e9rationnels aux infrastructures hybrides et multiclouds. [\/vc_column_text][vc_btn title=\u00a0\u00bbDemander une&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-134357","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Dynamic Privileged Access | CyberArk<\/title>\n<meta name=\"description\" content=\"Mettez en \u0153uvre l\u2019acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb avec l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique de CyberArk. R\u00e9duisez consid\u00e9rablement les acc\u00e8s permanents aux machines virtuelles AWS, Azure, Linux et aux serveurs Windows sur site.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/?page_id=131842\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dynamic Privileged Access\" \/>\n<meta property=\"og:description\" content=\"Mettez en \u0153uvre l\u2019acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb avec l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique de CyberArk. R\u00e9duisez consid\u00e9rablement les acc\u00e8s permanents aux machines virtuelles AWS, Azure, Linux et aux serveurs Windows sur site.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/?page_id=131842\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T11:58:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/?page_id=131842\",\"url\":\"https:\/\/www.cyberark.com\/?page_id=131842\",\"name\":\"Dynamic Privileged Access | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/?page_id=131842#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/?page_id=131842#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\",\"datePublished\":\"2022-09-15T18:38:15+00:00\",\"dateModified\":\"2023-12-08T11:58:34+00:00\",\"description\":\"Mettez en \u0153uvre l\u2019acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb avec l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique de CyberArk. R\u00e9duisez consid\u00e9rablement les acc\u00e8s permanents aux machines virtuelles AWS, Azure, Linux et aux serveurs Windows sur site.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/?page_id=131842#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/?page_id=131842\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/?page_id=131842#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/?page_id=131842#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dynamic Privileged Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dynamic Privileged Access | CyberArk","description":"Mettez en \u0153uvre l\u2019acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb avec l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique de CyberArk. R\u00e9duisez consid\u00e9rablement les acc\u00e8s permanents aux machines virtuelles AWS, Azure, Linux et aux serveurs Windows sur site.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/?page_id=131842","og_locale":"fr_FR","og_type":"article","og_title":"Dynamic Privileged Access","og_description":"Mettez en \u0153uvre l\u2019acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb avec l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique de CyberArk. R\u00e9duisez consid\u00e9rablement les acc\u00e8s permanents aux machines virtuelles AWS, Azure, Linux et aux serveurs Windows sur site.","og_url":"https:\/\/www.cyberark.com\/?page_id=131842","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-12-08T11:58:34+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/?page_id=131842","url":"https:\/\/www.cyberark.com\/?page_id=131842","name":"Dynamic Privileged Access | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/?page_id=131842#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/?page_id=131842#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","datePublished":"2022-09-15T18:38:15+00:00","dateModified":"2023-12-08T11:58:34+00:00","description":"Mettez en \u0153uvre l\u2019acc\u00e8s \u00ab\u00a0juste \u00e0 temps\u00a0\u00bb avec l\u2019acc\u00e8s \u00e0 privil\u00e8ges dynamique de CyberArk. R\u00e9duisez consid\u00e9rablement les acc\u00e8s permanents aux machines virtuelles AWS, Azure, Linux et aux serveurs Windows sur site.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/?page_id=131842#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/?page_id=131842"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/?page_id=131842#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/?page_id=131842#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Dynamic Privileged Access"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/134357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=134357"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/134357\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=134357"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=134357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}