{"id":206797,"date":"2025-03-10T06:01:22","date_gmt":"2025-03-10T10:01:22","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/"},"modified":"2025-06-16T18:51:31","modified_gmt":"2025-06-16T22:51:31","slug":"zero-touch-pki","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/products\/zero-touch-pki\/","title":{"rendered":"Zero Touch PKI"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h1>Zero Touch PKI<\/h1>\n<p><\/p>\n<h2>S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde, adaptable \u00e0 l\u2019infini et facile \u00e0 prendre en main.\u200b<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00a0\u00bbD\u00e9couvrir Zero Touch PKI\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb css=\u00a0\u00bb\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fzero-touch-pki-consultation%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109822 border-radius\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg\" alt=\"Zero touch PKI\" width=\"770\" height=\"530\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad overview-vt\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1701205350215{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h3>Vos solutions PKI sont vieillissantes et freinent votre d\u00e9veloppement\u00a0?<\/h3>\n<p>Pour poursuivre une transformation num\u00e9rique fructueuse, les entreprises doivent s\u2019affranchir de leurs anciennes PKI priv\u00e9es, en particulier Microsoft Active Directory Certificate Service (ADCS) et EJBCA. Que ce soit en raison d\u2019une main-d\u2019\u0153uvre co\u00fbteuse, des menaces de s\u00e9curit\u00e9 croissantes ou de l\u2019incapacit\u00e9 \u00e0 r\u00e9pondre aux besoins des d\u00e9veloppeurs, elles doivent passer \u00e0 une solution PKI-as-a-Service.<\/p>\n<p>CyberArk Zero Touch PKI vous permet de remplacer facilement votre PKI existante par une solution cloud simple, transparente et s\u00e9curis\u00e9e. Cette solution all\u00e8ge votre fardeau, tout en \u00e9liminant vos contraintes li\u00e9es \u00e0 l\u2019entretien des serveurs, \u00e0 la maintenance du mat\u00e9riel et au contr\u00f4le de la s\u00e9curit\u00e9.<\/p>\n<p>En effet, Zero Touch PKI ne demande aucune intervention de votre part ou de votre \u00e9quipe.[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime;][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-196150 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/cloud-back-user-icon.svg\" alt=\"Ic\u00f4ne cloud\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Remplacement complet de Microsoft ADCS et Keyfactor EJBCA\u200b<\/h4>\n<p>Passez \u00e0 une solution PKI moderne offrant une flexibilit\u00e9 et une s\u00e9curit\u00e9 in\u00e9gal\u00e9es gr\u00e2ce \u00e0 une architecture cloud hautement disponible.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-196141 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Poste de travail s\u00e9curis\u00e9\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Sans armada de consultants, ni budget exorbitant\u200b<\/h4>\n<p>Lib\u00e9rez le personnel et all\u00e9gez le budget en abandonnant la PKI d\u00e9su\u00e8te.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-196159 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Overview-Horizontal-Enterprise-Best-Practice-icon.svg\" alt=\"Ic\u00f4ne d\u2019engrenages\" \/>[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>Int\u00e9gration directe \u00e0 CyberArk Certificate Manager\u200b\u200b<\/h4>\n<p>Automatisez et rationalisez ais\u00e9ment la gestion de chaque identit\u00e9 machine dans l&rsquo;entreprise.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Une solution PKI-as-a-Service sur mesure, simple et bas\u00e9e sur le cloud qui fait gagner du temps<\/h3>\n<p><strong>Int\u00e9gration des utilisateurs et d\u00e9ploiement de classe mondiale<\/strong> R\u00e9pond \u00e0 vos exigences et \u00e9limine l\u2019entretien des serveurs et la maintenance du mat\u00e9riel pour r\u00e9duire les co\u00fbts et acc\u00e9l\u00e9rer le retour sur investissement<\/p>\n<p><strong>Remplacement complet de Microsoft ADCS et EJBCA<\/strong> Am\u00e9liore la flexibilit\u00e9 et la s\u00e9curit\u00e9 gr\u00e2ce \u00e0 une architecture microservices modernes<\/p>\n<p><strong>Assistance individuelle par des experts<\/strong> Service personnalis\u00e9 incluant un support technique et une surveillance 24\u00a0h\/24, 7\u00a0j\/7 pour des op\u00e9rations efficaces[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb6\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1741849397170{border-top-width: 6px !important;border-right-width: 6px !important;border-bottom-width: 6px !important;border-left-width: 6px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-205444 size-full border-radius\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/man-smiling-at-computer.jpg\" alt=\"PKI cloud sur mesure et rationalis\u00e9e\" width=\"640\" height=\"457\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/man-smiling-at-computer.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/man-smiling-at-computer-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/man-smiling-at-computer-150x107.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad \u00ab\u00a0][vc_column width=\u00a0\u00bb6\/12&Prime;][vc_column_text css=\u00a0\u00bb.vc_custom_1741849407546{border-top-width: 6px !important;border-right-width: 6px !important;border-bottom-width: 6px !important;border-left-width: 6px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-205453 size-full border-radius\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/woman-looking-at-phone.jpg\" alt=\"Fluctuations de la PKI g\u00e9r\u00e9es\" width=\"640\" height=\"457\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/woman-looking-at-phone.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/woman-looking-at-phone-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/woman-looking-at-phone-150x107.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Gestion des fluctuations de la PKI gr\u00e2ce \u00e0 l\u2019architecture de certificats extensible et aux nouveaux cas d\u2019usage<\/h3>\n<p><strong>Agilit\u00e9 face \u00e0 l\u2019\u00e9volution des besoins<\/strong> R\u00e9pond \u00e0 tous les cas d\u2019usage Windows et modernes, y compris aux pics impr\u00e9vus de demandes de certificats<\/p>\n<p><strong>Inscription automatique<\/strong> Automatise un processus autrement exigeant en main-d\u2019\u0153uvre et garantit la protection de l\u2019\u00e9cosyst\u00e8me informatique par les certificats TLS\u00a0; prend en charge les interfaces SCEP, MDM, ACME, EST, REST<\/p>\n<p><strong>Disponibilit\u00e9 de 99,9\u00a0% et flexibilit\u00e9 in\u00e9gal\u00e9e<\/strong> Disponible dans le monde entier, avec une redondance assur\u00e9e dans plusieurs datacenters en Am\u00e9rique du Nord et en Europe, pour r\u00e9pondre en tout temps \u00e0 tous les besoins li\u00e9s aux certificats[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 v3 cybv2-pad cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3>Architecture et fonctionnement soutenus par des fonctionnalit\u00e9s de s\u00e9curit\u00e9 modernes<\/h3>\n<p><strong>Contr\u00f4les de s\u00e9curit\u00e9 renforc\u00e9s<\/strong> Con\u00e7u avec les m\u00eames fonctionnalit\u00e9s de s\u00e9curit\u00e9 utilis\u00e9es pour exploiter des autorit\u00e9s de certification globalement reconnues comme fiables, y compris les HSM certifi\u00e9s FIPS 140-2 niveau 3, pour garantir la conformit\u00e9 aux r\u00e9glementations<\/p>\n<p><strong>Service et surveillance physique de la s\u00e9curit\u00e9 24\u00a0h\/24, 7\u00a0j\/7<\/strong> Offre l\u2019assurance que votre entreprise est prot\u00e9g\u00e9e et que votre PKI est surveill\u00e9e en continu<\/p>\n<p><strong>Certifi\u00e9 et conforme<\/strong> Le service est certifi\u00e9 SOC 2 Type II\u00a0; la gestion des cl\u00e9s est conforme \u00e0 NIST 800-131A et aux crit\u00e8res communs EAL4+[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb6\/12&Prime; offset=\u00a0\u00bbvc_col-sm-offset-1&Prime; el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1741603338144{border-top-width: 6px !important;border-right-width: 6px !important;border-bottom-width: 6px !important;border-left-width: 6px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-204692 border-radius\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/Architected-img.jpg\" alt=\"Architected-img\" width=\"640\" height=\"457\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/Architected-img.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/Architected-img-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/Architected-img-150x107.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad quote-component white\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1741161255132{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/Screenshot-2024-04-14-at-3.48-2.jpg?id=204339) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; css=\u00a0\u00bb.vc_custom_1741161360035{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbtext-center\u00a0\u00bb offset=\u00a0\u00bbvc_col-lg-offset-1&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #d6f77a;\">Maximiser le retour sur investissement des solutions de s\u00e9curit\u00e9<\/span> avec CyberArk<\/h3>\n<p><\/p>\n<p style=\"text-align: center;\">D\u00e9couvrez ce que disent nos clients au sujet des avantages commerciaux, techniques et financiers offerts par la plateforme de s\u00e9curit\u00e9 des identit\u00e9s de CyberArk.<\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbimg-box\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1741849316992{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/woman-in-hostipal-mask_651x618.jpg?id=205462) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcontent-column\u00a0\u00bb][vc_row_inner][vc_column_inner el_class=\u00a0\u00bbhead-box\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1742374896182{padding-right: 40px !important;}\u00a0\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"guillemets\" width=\"87\" height=\"64\" \/><\/p>\n<h4>Zero Touch PKI a r\u00e9duit les co\u00fbts, les risques et la complexit\u00e9, sans modifier quoi que ce soit dans notre environnement. Il nous a fallu seulement une demi-heure pour configurer et lancer le proxy d\u2019inscription avant d\u2019\u00e9mettre des certificats avec Zero Touch PKI. C\u2019\u00e9tait un jeu d\u2019enfant. Nous avons supprim\u00e9 d\u2019\u00e9normes risques de s\u00e9curit\u00e9 et automatis\u00e9 imm\u00e9diatement tout ce qui nous posait des difficult\u00e9s auparavant.<\/h4>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; el_class=\u00a0\u00bbno-break\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bbno-break\u00a0\u00bb]<\/p>\n<h3>Explorer les<br \/>\nressources<br \/>\nconnexes<\/h3>\n<p>\n[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<a href=\"https:\/\/www.cyberark.com\/fr\/talk-with-us\/\">Parler \u00e0 un expert<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb][vc_column el_class=\u00a0\u00bbnew_hpstyle_section8_col1&Prime;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00a0\u00bb.vc_custom_1743589779867{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_resources_uberflip\u00a0\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb el_class=\u00a0\u00bbcybv2 hero dark\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; el_class=\u00a0\u00bbcolumn-1&Prime; offset=\u00a0\u00bbvc_col-md-6&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] Zero Touch PKI S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde, adaptable \u00e0 l\u2019infini&#8230;<\/p>\n","protected":false},"author":316,"featured_media":0,"parent":51589,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-206797","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Touch PKI | CyberArk<\/title>\n<meta name=\"description\" content=\"S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde et facile \u00e0 prendre en main.\u200b\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Touch PKI\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde et facile \u00e0 prendre en main.\u200b\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T22:51:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lifecycle-Mgmt-Hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/\",\"name\":\"Zero Touch PKI | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg\",\"datePublished\":\"2025-03-10T10:01:22+00:00\",\"dateModified\":\"2025-06-16T22:51:31+00:00\",\"description\":\"S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde et facile \u00e0 prendre en main.\u200b\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produits\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Touch PKI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Touch PKI | CyberArk","description":"S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde et facile \u00e0 prendre en main.\u200b","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/","og_locale":"fr_FR","og_type":"article","og_title":"Zero Touch PKI","og_description":"S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde et facile \u00e0 prendre en main.\u200b","og_url":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-06-16T22:51:31+00:00","og_image":[{"width":770,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lifecycle-Mgmt-Hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/","url":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/","name":"Zero Touch PKI | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg","datePublished":"2025-03-10T10:01:22+00:00","dateModified":"2025-06-16T22:51:31+00:00","description":"S\u00e9curisez et faites \u00e9voluer la PKI gr\u00e2ce \u00e0 une solution cloud enti\u00e8rement g\u00e9r\u00e9e, disponible partout dans le monde et facile \u00e0 prendre en main.\u200b","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/zero-touch-pki\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-glasses-laptop-770x530-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/zero-touch-pki\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produits","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Zero Touch PKI"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/206797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=206797"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/206797\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51589"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=206797"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=206797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}