{"id":179362,"date":"2023-01-30T20:06:40","date_gmt":"2023-01-31T01:06:40","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/b2b-identity\/"},"modified":"2025-04-03T04:00:11","modified_gmt":"2025-04-03T08:00:11","slug":"b2b-identity","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/b2b-identity\/","title":{"rendered":"Identit\u00e9\u00a0B2B"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/products\/customer-identity\/\">Retour \u00e0 Identit\u00e9 du client<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Identit\u00e9\u00a0B2B<\/h1>\n<h2>Offrez des exp\u00e9riences s\u00e9curis\u00e9es et fluides \u00e0 vos partenaires commerciaux, fournisseurs et clients en donnant un acc\u00e8s rapide et fluide \u00e0 vos applications SaaS tout en prot\u00e9geant les syst\u00e8mes critiques de l\u2019entreprise contre les attaques et les violations de donn\u00e9es.<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/try-buy\/b2b-identity-free-trial\/\">Essai gratuit<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139638\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\" alt=\"Solutions de gestion des identit\u00e9s\u00a0B2B\" width=\"640\" height=\"430\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2-300x202.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2-150x101.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_sticky_nav\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Identit\u00e9\u00a0B2B<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_raw_html el_class=\u00a0\u00bbsticky-nav-buttons\u00a0\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+Cjx1bD4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWIxIj5BdmFudGFnZXM8L2xpPgo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1YjIiPkZvbmN0aW9ubmFsaXTDqXM8L2xpPgo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1YjMiPkZvbmN0aW9ubmVtZW50PC9saT4KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][vc_btn title=\u00a0\u00bbEssai gratuit\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Ftry-buy%2Fb2b-identity-free-trial%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbsubnav-dropdown\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbsticky-nav-title\u00a0\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Aller \u00e0<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top overview-hz sub1&Prime; css=\u00a0\u00bb.vc_custom_1673964635551{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>S\u00e9curiser l\u2019acc\u00e8s externe, att\u00e9nuer le risque commercial<\/h3>\n<p>Partagez en toute confiance l\u2019acc\u00e8s s\u00e9curis\u00e9 aux applications et services de votre entreprise tout en gardant le contr\u00f4le sur vos donn\u00e9es d\u2019entreprise.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-121090\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Secure-Authentication-icon.svg\" alt=\"Services de conception et de d\u00e9ploiement\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1731310042711{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Prot\u00e9ger votre entreprise et vos identit\u00e9s<\/h4>\n<p>S\u00e9curiser l\u2019acc\u00e8s aux applications web et mobiles B2B gr\u00e2ce \u00e0 une plateforme d\u2019authentification FIDO2[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114833\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Optimize-Investment.svg\" alt=\"Ic\u00f4ne Optimisez les investissements\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Optimiser l\u2019exp\u00e9rience utilisateur externe<\/h4>\n<p>Fournir une authentification omnicanale coh\u00e9rente de la marque sur tous les appareils[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-119142\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business-correct.svg\" alt=\"Ic\u00f4ne Favorisez l\u2019activit\u00e9 num\u00e9rique\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1695967791663{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Favoriser l\u2019activit\u00e9 num\u00e9rique<\/h4>\n<p>Centraliser les profils d\u2019identit\u00e9 des utilisateurs externes\u00a0B2B et l\u2019authentification des applications[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb width=\u00a0\u00bb5\/12&Prime;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118944\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Efficiencies2.svg\" alt=\"ic\u00f4ne Am\u00e9liorer l\u2019efficacit\u00e9 op\u00e9rationnelle\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1695967825713{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4>Am\u00e9liorer l\u2019efficacit\u00e9 op\u00e9rationnelle<\/h4>\n<p>Optimiser votre processus d\u2019int\u00e9gration et de d\u00e9part\u00a0B2B pour engager rapidement vos partenaires[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats sub2&Prime; css=\u00a0\u00bb.vc_custom_1673964665260{background-color: #ff7600 !important;}\u00a0\u00bb][vc_column el_class=\u00a0\u00bbtext-md-center head-box\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Pourquoi CyberArk B2B Identity<\/h3>\n<h5>D\u00e9veloppez votre activit\u00e9 num\u00e9rique en toute s\u00e9curit\u00e9.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1612319508305{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Access-Manager-Benefits-Stats-770&#215;550-1.jpg?id=110671) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbstat-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]\u00c9tendez votre influence sur le march\u00e9\u00a0: commercialisez vos offres par le biais d\u2019entreprises partenaires, de fournisseurs tiers et de clients pour multiplier la port\u00e9e client[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]D\u00e9velopper de nouvelles sources de revenus\u00a0: mon\u00e9tiser vos services et donn\u00e9es en les proposant en toute s\u00e9curit\u00e9 \u00e0 d\u2019autres entreprises[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bblist-box\u00a0\u00bb width=\u00a0\u00bb11\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&Prime;][vc_column_text el_class=\u00a0\u00bbbenefits-content-icon\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblist-text\u00a0\u00bb]Privil\u00e9gier la s\u00e9curit\u00e9 des identit\u00e9s\u00a0: offrir \u00e0 vos partenaires une exp\u00e9rience fluide pour acc\u00e9der aux bonnes informations au bon moment [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2-pad cybv2 cybv2-background-oval tour sub3&Prime;][vc_column][vc_row_inner el_class=\u00a0\u00bbcyb-center\u00a0\u00bb][vc_column_inner el_class=\u00a0\u00bbcyb-pad-btm\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Authentifier, autoriser et g\u00e9rer vos identit\u00e9s B2B<\/h3>\n<p>Fournir un acc\u00e8s rapide et fluide \u00e0 vos applications SaaS pour vos partenaires commerciaux, vos fournisseurs et vos clients.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00a0\u00bbsquare\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; css_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbS\u2019authentifier et s\u2019inscrire\u00a0\u00bb tab_id=\u00a0\u00bbauthenticate\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>S\u2019authentifier et s\u2019inscrire<\/h4>\n<p>Int\u00e9grer vos utilisateurs externes au moyen d\u2019une authentification solide \u00e0 vos applications web et mobiles en quelques minutes.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139514\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour.png\" alt=\"s\u2019authentifier et s\u2019inscrire\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbAccorder un acc\u00e8s s\u00e9curis\u00e9 aux applications\u00a0\u00bb tab_id=\u00a0\u00bbgrant\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>Accorder un acc\u00e8s s\u00e9curis\u00e9 aux applications<\/h4>\n<p>Ajoutez une couche de protection suppl\u00e9mentaire aux applications ou aux flux de travail acc\u00e9l\u00e9r\u00e9s en utilisant des normes telles que OAUTH, OIDC et SAML[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-128967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour.png\" alt=\"Catalogue d\u2019applications\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbD\u00e9l\u00e9guer les services d\u2019administration et de f\u00e9d\u00e9ration\u00a0\u00bb tab_id=\u00a0\u00bbdelegate\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>D\u00e9l\u00e9guer les services d\u2019administration et de f\u00e9d\u00e9ration<\/h4>\n<p>Adaptez facilement et en toute s\u00e9curit\u00e9 l\u2019administration des identit\u00e9s aux administrateurs partenaires[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139522\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour.png\" alt=\"d\u00e9l\u00e9guer les services d\u2019administration\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00a0\u00bbright\u00a0\u00bb i_icon_fontawesome=\u00a0\u00bbfas fa-chevron-circle-down\u00a0\u00bb add_icon=\u00a0\u00bbtrue\u00a0\u00bb title=\u00a0\u00bbD\u00e9velopper et int\u00e9grer la gestion des identit\u00e9s et des acc\u00e8s\u00a0\u00bb tab_id=\u00a0\u00bbdevelop\u00a0\u00bb][vc_row_inner el_class=\u00a0\u00bbcybv2&Prime;][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-4&Prime;][vc_column_text]<\/p>\n<h4>D\u00e9velopper et int\u00e9grer la gestion des identit\u00e9s et des acc\u00e8s<\/h4>\n<p>Cr\u00e9er votre propre interface utilisateur personnalis\u00e9e avec des widgets low code et des kits d\u2019outils de d\u00e9veloppement[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-md-6&Prime;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139530\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam.png\" alt=\"d\u00e9velopper et int\u00e9grer la gestion des identit\u00e9s et des acc\u00e8s\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top featured-integrations\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbbox-heading\u00a0\u00bb][vc_column_text]<\/p>\n<h3>Produits CyberArk qui s\u2019int\u00e8grent \u00e0 l\u2019identit\u00e9 B2B<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fdirectory-services%2F|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139538\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory.png\" alt=\"Cloud Directory\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory.png 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory-150x61.png 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Cloud Directory<\/h4>\n<p>Stockez de mani\u00e8re centralis\u00e9e les informations de gestion des identit\u00e9s pour toutes vos applications dans un r\u00e9f\u00e9rentiel commun[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/directory-services\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fdirectory-user-management%2F|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139546\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management.jpg\" alt=\"gestion des utilisateurs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Gestion des utilisateurs<\/h4>\n<p>Int\u00e9gration et d\u00e9part faciles de vos utilisateurs \u00e0 l\u2019aide de la console d\u2019administration [\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/directory-user-management\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fadaptive-multi-factor-authentication%2F|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139554\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa.jpg\" alt=\"MFA adaptative\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>MFA adaptative<\/h4>\n<p>Acc\u00e8s s\u00e9curis\u00e9 aux applications web et mobiles \u00e0 l\u2019aide de plusieurs facteurs de v\u00e9rification[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/adaptive-multi-factor-authentication\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fuser-behavior-analytics%2F|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139562\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics.jpg\" alt=\"analyse du comportement des utilisateurs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Analyse du comportement des utilisateurs<\/h4>\n<p>\u00c9valuer les risques avec des alertes en temps r\u00e9el pour informer les administrateurs des activit\u00e9s suspectes[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/user-behavior-analytics\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb column_link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fproducts%2Fidentity-flows%2F|\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139570\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows.jpg\" alt=\"flux\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbtiny\u00a0\u00bb]<\/p>\n<h4>Flux<\/h4>\n<p>Mettre en \u0153uvre des strat\u00e9gies pour automatiser les flux de donn\u00e9es d\u2019identit\u00e9, les r\u00e9actions et les \u00e9v\u00e8nements [\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right pt-5&Prime;]<a href=\"https:\/\/www.cyberark.com\/fr\/products\/identity-flows\/\">En savoir plus<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1616705788368{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta sub-5&Prime;][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text]<\/p>\n<h2>Demander une d\u00e9mo<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Int\u00e9grer vos clients professionnels en douceur[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Collaborer avec les fournisseurs[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Permettre aux courtiers de g\u00e9rer vos clients[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Int\u00e9grer des \u00e9l\u00e9ments dans votre cha\u00eene de valeur[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Se pr\u00e9parer \u00e0 faire des \u00e9conomies[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Activer la procuration[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]R\u00e9duire les co\u00fbts administratifs[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbhead-box-text\u00a0\u00bb]Cr\u00e9er des applications et des portails modulables[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00a0\u00bb108699&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>S&rsquo;inscrire pour obtenir une d\u00e9mo personnalis\u00e9e<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzNCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1iMmItaWRlbnRpdHkvIl0=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]Retour \u00e0 Identit\u00e9 du client[\/vc_column_text][vc_column_text] Identit\u00e9\u00a0B2B Offrez des exp\u00e9riences s\u00e9curis\u00e9es et fluides \u00e0 vos partenaires commerciaux, fournisseurs et clients en donnant un acc\u00e8s rapide et fluide \u00e0 vos applications&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-179362","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gestion des identit\u00e9s\u00a0B2B | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk\u00a0B2B\u00a0Identity s\u00e9curise l\u2019acc\u00e8s externe \u00e0 vos applications m\u00e9tier et services tout en assurant une protection contre les attaques et les violations de donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identit\u00e9\u00a0B2B\" \/>\n<meta property=\"og:description\" content=\"CyberArk\u00a0B2B\u00a0Identity s\u00e9curise l\u2019acc\u00e8s externe \u00e0 vos applications m\u00e9tier et services tout en assurant une protection contre les attaques et les violations de donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T08:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\",\"name\":\"Gestion des identit\u00e9s\u00a0B2B | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\",\"datePublished\":\"2023-01-31T01:06:40+00:00\",\"dateModified\":\"2025-04-03T08:00:11+00:00\",\"description\":\"CyberArk\u00a0B2B\u00a0Identity s\u00e9curise l\u2019acc\u00e8s externe \u00e0 vos applications m\u00e9tier et services tout en assurant une protection contre les attaques et les violations de donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identit\u00e9\u00a0B2B\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gestion des identit\u00e9s\u00a0B2B | CyberArk","description":"CyberArk\u00a0B2B\u00a0Identity s\u00e9curise l\u2019acc\u00e8s externe \u00e0 vos applications m\u00e9tier et services tout en assurant une protection contre les attaques et les violations de donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","og_locale":"fr_FR","og_type":"article","og_title":"Identit\u00e9\u00a0B2B","og_description":"CyberArk\u00a0B2B\u00a0Identity s\u00e9curise l\u2019acc\u00e8s externe \u00e0 vos applications m\u00e9tier et services tout en assurant une protection contre les attaques et les violations de donn\u00e9es.","og_url":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-03T08:00:11+00:00","og_image":[{"width":640,"height":430,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","url":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","name":"Gestion des identit\u00e9s\u00a0B2B | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg","datePublished":"2023-01-31T01:06:40+00:00","dateModified":"2025-04-03T08:00:11+00:00","description":"CyberArk\u00a0B2B\u00a0Identity s\u00e9curise l\u2019acc\u00e8s externe \u00e0 vos applications m\u00e9tier et services tout en assurant une protection contre les attaques et les violations de donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/b2b-identity\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Identit\u00e9\u00a0B2B"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/179362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=179362"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/179362\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=179362"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=179362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}