{"id":104134,"date":"2020-10-30T14:49:21","date_gmt":"2020-10-30T18:49:21","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/idaptive\/fornitura-e-gestione-del-ciclo-di-vita\/"},"modified":"2020-11-05T12:00:51","modified_gmt":"2020-11-05T17:00:51","slug":"provisioning-and-lifecycle-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/provisioning-and-lifecycle-management\/","title":{"rendered":"Fornitura e gestione del ciclo di vita"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-desktop&#8221;][vc_column el_class=&#8221;cyb-center cyb-pad-btm&#8221; css=&#8221;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-white&#8221; css=&#8221;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8221;]<\/p>\n<h1>FORNITURA E GESTIONE<br \/>\nDEL CICLO DI VITA<\/h1>\n<h3 class=\"regular\">Automatizza il provisioning degli accessi, i flussi di lavoro di approvazione e la governance degli accessi.<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8221;RICHIEDI UNA DEMO&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:%23demo|&#8221; el_class=&#8221;cyb-button solid-blue cyb-center-btn mgn-bottom&#8221; css=&#8221;.vc_custom_1601600864772{margin-right: 5px !important;}&#8221;][vc_btn title=&#8221;PROVA GRATUITA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.idaptive.com%2Ffree-trial|target:_blank|&#8221; el_class=&#8221;cyb-button solid-green cyb-center-btn mgn-bottom&#8221; css=&#8221;.vc_custom_1601600855593{margin-left: 5px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1601069261156{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-mobile&#8221;][vc_column el_class=&#8221;cyb-center cyb-pad-btm&#8221; css=&#8221;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-white&#8221; css=&#8221;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8221;]<\/p>\n<h1>FORNITURA E GESTIONE<br \/>\nDEL CICLO DI VITA<\/h1>\n<h3 class=\"regular\">Automatizza il provisioning degli accessi, i flussi di lavoro di approvazione e la governance degli accessi.<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8221;RICHIEDI UNA DEMO&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:%23demo|&#8221; el_class=&#8221;cyb-button solid-blue cyb-center-btn mgn-bottom&#8221; css=&#8221;.vc_custom_1601600996156{margin-bottom: 1.25rem !important;}&#8221;][vc_btn title=&#8221;PROVA GRATUITA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.idaptive.com%2Ffree-trial|target:_blank|&#8221; el_class=&#8221;cyb-button solid-green cyb-center-btn mgn-bottom&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-background-lb cyb-cta-card&#8221; css=&#8221;.vc_custom_1600132057790{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-md-offset-2&#8243;][vc_column_text css=&#8221;.vc_custom_1600134638945{padding-bottom: 1.875rem !important;}&#8221;]<\/p>\n<h2>VANTAGGI<\/h2>\n<p>La soluzione Idaptive Provisioning and Lifecycle Management offre un modo semplice per instradare le richieste di accesso alle applicazioni, creare account delle applicazioni, gestire i diritti di tali account e revocare l&#8217;accesso quando necessario. Con Provisioning e Lifecycle Management puoi consentire agli utenti di richiedere l&#8217;accesso alle applicazioni dal catalogo app Idaptive, fornire a utenti specifici la possibilit\u00e0 di approvare o rifiutare queste richieste di accesso e creare, aggiornare e disattivare automaticamente gli account in base ai ruoli utente.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<img decoding=\"async\" class=\"alignnone wp-image-99698\" style=\"width: 92px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\" alt=\"\" height=\"75\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;cyb-cta-match&#8221;]<\/p>\n<h3>AUTOMATIZZA L&#8217;ONBOARDING E L&#8217;OFFBOARDING<\/h3>\n<p>Fornisci e revoca automaticamente l&#8217;accesso alle applicazioni su cloud preintegrate dal catalogo app Idaptive in ogni fase del ciclo di vita dei dipendenti.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cyb-min-hgt-230&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<img decoding=\"async\" class=\"alignnone wp-image-99706\" style=\"width: 64px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/self-service-icon.svg\" alt=\"\" height=\"76\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;cyb-cta-match&#8221;]<\/p>\n<h3>ABILITA FUNZIONI SELF-SERVICE<\/h3>\n<p>Consenti agli utenti di richiedere l&#8217;accesso alle applicazioni dal catalogo app Idaptive e definisci flussi di lavoro per fornire a utenti specifici o membri di ruoli specifici la possibilit\u00e0 di approvare o rifiutare queste richieste.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cyb-min-hgt-230&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<img decoding=\"async\" class=\"alignnone wp-image-99714\" style=\"width: 87px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/accelerate-approvals-icon.svg\" alt=\"\" height=\"75\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1600196644224{padding-bottom: 1.875rem !important;}&#8221; el_class=&#8221;cyb-cta-match&#8221;]<\/p>\n<h3>ACCELERA LE AUTORIZZAZIONI<\/h3>\n<p>Automatizza i workflow di approvazione in pi\u00f9 passaggi per accelerare la fornitura degli account e garantire ai dipendenti l&#8217;accesso alle app di cui hanno bisogno, incrementando rapidamente la produttivit\u00e0.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99722\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/simplify-governance-icon.svg\" alt=\"\" width=\"76\" height=\"76\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1600196687809{padding-bottom: 1.875rem !important;}&#8221; el_class=&#8221;cyb-cta-match&#8221;]<\/p>\n<h3>SEMPLIFICA LA GOVERNANCE<\/h3>\n<p>Monitora centralmente l&#8217;accesso degli utenti su tutte le app e analizza in dettaglio l&#8217;utente, il ruolo o il livello dell&#8217;applicazione per verificare account, diritti, percorsi di accesso, dispositivi utilizzati, accessi non riusciti e altro ancora.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99730\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/hr-it-icon.svg\" alt=\"\" width=\"184\" height=\"76\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1600196759766{padding-bottom: 1.875rem !important;}&#8221; el_class=&#8221;cyb-cta-match&#8221;]<\/p>\n<h3>CONNETTI IL REPARTO HR AL REPARTO IT<\/h3>\n<p>Imposta integrazioni bidirezionali con i sistemi di gestione del capitale umano (HCM) per sfruttare i dati HR e fornire nuovi utenti ad Active Directory e altre applicazioni, oltre a creare flussi di lavoro personalizzati di provisioning e deprovisioning.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-99738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/sync-user-icon.svg\" alt=\"\" width=\"77\" height=\"77\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1600196848629{padding-bottom: 1.875rem !important;}&#8221; el_class=&#8221;cyb-cta-match&#8221;]<\/p>\n<h3>SINCRONIZZA LE DIRECTORY DEGLI UTENTI<\/h3>\n<p>Mantieni aggiornate le informazioni sugli utenti ogni volta che effettui modifiche a un ruolo o a oggetti di directory di origine applicabili su Active Directory, Azure AD, LDAP, Google Cloud Directory o Idaptive Cloud Directory.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1586872028792{background-color: #f1f2f2 !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-pad-top cyb-cta-card&#8221;][vc_column_text el_class=&#8221;cyb-ltr-spc&#8221;]<\/p>\n<h2>CARATTERISTICHE PRINCIPALI<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;99936&#8243; img_size=&#8221;full&#8221; el_class=&#8221;cyb-ken-img&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-top&#8221;][vc_column_text css=&#8221;.vc_custom_1600179370452{padding-bottom: 1.875rem !important;}&#8221;]<\/p>\n<h3>PROVISIONING E DEPROVISIONING DEGLI ACCESSI PREINTEGRATI<\/h3>\n<p>Idaptive consente di concedere e revocare automaticamente l&#8217;accesso a centinaia di applicazioni su cloud preintegrate nel catalogo delle app Idaptive. Con Idaptive Lifecycle Management puoi assicurarti che i dipendenti abbiano accesso alla giusta serie di applicazioni in ogni fase del loro ciclo di vita. Ad esempio, \u00e8 possibile concedere ai dipendenti l&#8217;accesso alle applicazioni in base al ruolo nel loro primo giorno di lavoro, aggiornare automaticamente l&#8217;accesso quando i dipendenti cambiano ruolo, reparto o sede, e revocare l&#8217;accesso quando i dipendenti lasciano il posto di lavoro.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1537541711623{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8221; el_class=&#8221;cyb-reverse&#8221;][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-top&#8221;][vc_column_text css=&#8221;.vc_custom_1600179440009{padding-bottom: 1.875rem !important;}&#8221;]<\/p>\n<h3>GESTIONE CENTRALIZZATA DEI DIRITTI<\/h3>\n<p>Idaptive Lifecycle Management consente di controllare in maniera granulare i diritti di accesso degli utenti all&#8217;interno delle app, mappando i ruoli Idaptive in base ai gruppi di utenti appropriati nelle app. Ad esempio, durante il processo di provisioning dell&#8217;accesso al sistema CRM, \u00e8 possibile assegnare automaticamente gli utenti ai gruppi CRM applicabili, come Admin, Marketing o Sales group.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-offset-1&#8243;][vc_single_image image=&#8221;99886&#8243; img_size=&#8221;full&#8221; el_class=&#8221;cyb-ken-img&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;99944&#8243; img_size=&#8221;full&#8221; el_class=&#8221;cyb-ken-img&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-top&#8221;][vc_column_text css=&#8221;.vc_custom_1600179487902{padding-bottom: 1.875rem !important;}&#8221;]<\/p>\n<h3>INTEGRAZIONE DI SISTEMI HCM<\/h3>\n<p>Con Idaptive, puoi importare in modo agevole le identit\u00e0 dal tuo sistema o applicazione HR preferito, tra cui Workday, UltiPro, BambooHR o SuccessFactors, e trasferirle in Active Directory. Ci\u00f2 consente di unificare i flussi di lavoro di provisioning e HR e di disporre di un sistema primario di registrazione basato sulle risorse umane per i dati degli utenti in tutte le applicazioni.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1537541711623{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8221; el_class=&#8221;cyb-reverse&#8221;][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-top&#8221;][vc_column_text css=&#8221;.vc_custom_1600179542557{padding-bottom: 1.875rem !important;}&#8221;]<\/p>\n<h3>INTEGRAZIONE PERSONALIZZATA DELLE APP<\/h3>\n<p>Idaptive consente di estendere i flussi di lavoro di provisioning alle applicazioni personalizzate utilizzando il protocollo SCIM. \u00c8 possibile utilizzare lo scripting SCIM per effettuare il provisioning delle app (cloud e on-premise) che hanno implementato le API SCIM e che non dispongono di un connettore di provisioning pronto per l&#8217;uso nel catalogo delle app Idaptive. \u00c8 anche possibile utilizzare il server SCIM di Idaptive per abilitare la gestione delle risorse chiave nelle app, come ad es. utenti e gruppi, oppure per effettuare il provisioning degli utenti nel cloud di Idaptive.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-offset-1&#8243;][vc_single_image image=&#8221;99902&#8243; img_size=&#8221;full&#8221; el_class=&#8221;cyb-ken-img&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1537483980479{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;99952&#8243; img_size=&#8221;full&#8221; el_class=&#8221;cyb-ken-img&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-top&#8221;][vc_column_text css=&#8221;.vc_custom_1600958815060{padding-bottom: 1.875rem !important;}&#8221;]<\/p>\n<h3>INTEGRAZIONE PERFETTA CON OFFICE 365<\/h3>\n<p>Sfruttando la sincronizzazione con Active Directory (AD) per la funzionalit\u00e0 Microsoft Office 365, \u00e8 possibile mantenere sincronizzati gli account di AD e Office 365, effettuando automaticamente il provisioning e il deprovisioning degli account utente, dei gruppi e delle appartenenze a gruppi, per semplificare la gestione delle licenze di Office 365.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1601312627497{padding-bottom: 1.875rem !important;}&#8221;]<strong><a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/idaptive-for-office-365\">PER SAPERNE DI PI\u00d9 &gt;<\/a><\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-pad-top cyb-cta-card&#8221;][vc_column_text el_class=&#8221;cyb-ltr-spc&#8221;]<\/p>\n<h2>RISORSE<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600179622853{padding-top: 2rem !important;background-color: #f1f2f2 !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_column css=&#8221;.vc_custom_1593651419004{padding-bottom: 1.25rem !important;}&#8221;][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZGVtbyI+PC9hPg==[\/vc_raw_html][vc_column_text]<\/p>\n<h2>RICHIEDI UNA DEMO<\/h2>\n<p>[\/vc_column_text][vc_column_text]    <script type=\"text\/javascript\" src=\"https:\/\/lp.cyberark.com\/js\/forms2\/js\/forms2.min.js\" id=\"marketo-script-js\"><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/google-libphonenumber\/3.2.38\/libphonenumber.min.js\" integrity=\"sha512-2EBfDCqBiVPlov9vAT9w6xMEIFcg24K3arAldIIgHh1EGrNob66Mc1gGXa5J7LTG3W5sk\/liGFbJUkODW5A8NQ==\" crossorigin=\"anonymous\" referrerpolicy=\"no-referrer\"><\/script>\n    <form id=\"mktoForm_5821\"><\/form>\n    <script>\n        MktoForms2.loadForm(\"\/\/lp.cyberark.com\", \"316-CZP-275\", 5821, function (form) {\n            \n            var match_found;                            \n            \n                        \n            \/\/ Add hidden value with asset info\n            var ecid = decodeURIComponent(document.cookie).match(\/AMCV_.*?=.*?\\|MCMID\\|(.*?)\\|\/)[1];\n                        var utm_source = getParameterByName('utm_source') == undefined ? (jQuery.cookie('utm_source') == undefined ? '' : jQuery.cookie('utm_source')) : getParameterByName('utm_source');\n            var utm_campaign = getParameterByName('utm_campaign') == undefined ? (jQuery.cookie('utm_campaign') == undefined ? '' : jQuery.cookie('utm_campaign')) : getParameterByName('utm_campaign');\n            var utm_medium = getParameterByName('utm_medium') == undefined ? (jQuery.cookie('utm_medium') == undefined ? '' : jQuery.cookie('utm_medium')) : getParameterByName('utm_medium');\n            var utm_term = getParameterByName('utm_term') == undefined ? (jQuery.cookie('utm_term') == undefined ? '' : jQuery.cookie('utm_term')) : getParameterByName('utm_term');\n            var utm_content = getParameterByName('utm_content') == undefined ? (jQuery.cookie('utm_content') == undefined ? '' : jQuery.cookie('utm_content')) : getParameterByName('utm_content');\n            form.addHiddenFields({\n                'marketoAnalyticsID': \"\",\n                'adobecloudid': ecid,\n                'asset_name': \"\",\n                'program_name': \"\",\n                'Lead_Request__c': \"\",\n                'additional_email_content': \"\",\n                'Notes_Restrictions__c': \"\",\n                'utm_source': utm_source,\n                'utm_campaign': utm_campaign,\n                'utm_medium': utm_medium,\n                'utm_term': utm_term,\n                'utm_contact': utm_content,\n                'utmsource': utm_source,\n                'utmcampaign': utm_campaign,\n                'utmmedium': utm_medium,\n                'utmterm': utm_term,\n                'utmcontent': utm_content,\n                'showNotes': ''\n            });\n                            form.addHiddenFields({\n                    'MktoPersonNotes': \"\"\n                });\n                \n            \/***************************\n            Start event assigning for AA\n            ***************************\/\n                            var formType = \"Demo\";\n                var formName = \"Personalized Demo\";\n                            \n            \/*************************\n            End event assigning for AA\n            *************************\/\n\n            \/***********************************************\n            Start event dispatching and email hashing for AA\n            ***********************************************\/\n\n            if( typeof formType !== 'undefined' ) { \/\/following AA dispatching will not run if formType has not been defined above\n\n                \n                \/\/Custom AT event for form view\n                let formViewEvent = new CustomEvent('launch-formView',{\n                    'detail':{\n                    'form_type': formType,\n                    'form_name': formName,\n                    'form_id': '5821'\n                    }\n                })\n                document.querySelector('body').dispatchEvent(formViewEvent);\n                console.log(formViewEvent);\n\n                form.onValidate(function() {\n                    if (jQuery(\"form.mktoForm .mktoInvalid\")[0]){\/\/only fire events if no error class is found\n                        \n                        \/\/Custom AT event for form validate\n                        let formErrorEvent = new CustomEvent('launch-formError',{\n                            'detail':{\n                                'form_type': formType,\n                                'form_name': formName,\n                                'form_id': '5821'\n                            }\n                        })\n                        document.querySelector('body').dispatchEvent(formErrorEvent);\n                        console.log(formErrorEvent);\n                        \n                                              \n                    }\n                    \/\/hash the email\n                    var eInput = jQuery('input[type=\"email\"]').val();\n                    var eHash = sha256(eInput);\n                    console.log(eHash);\n                    \/\/assign the cookie\n                    form.vals({\"marketoAnalyticsID\":eHash});\n                    _satellite.cookie.set('marketoAnalyticsID', eHash, {expires: 365});\n                });\n\n                form.onSuccess(function () {\n\n                    \/\/Custom AT event for form submit\n                    let formSubmitEvent = new CustomEvent('launch-formSubmit',{\n                        'detail':{\n                            'form_type': formType,\n                            'form_name': formName,\n                            'form_id': '5821'\n                        }\n                    })\n                    document.querySelector('body').dispatchEvent(formSubmitEvent);\n                    console.log(formSubmitEvent);\n                });               \n            }\n            \/*********************************************\n            End event dispatching and email hashing for AA\n            *********************************************\/\n            \n            \/\/ TY Message\n            form.onSuccess(function () {\n                dataLayer.push({\n                                            'event': 'demo',\n                        'form_submit': 'Demo',\n                                        });\n                                    jQuery(\"#mktoForm_5821\").hide();\n                    jQuery(\".ty_message\").show();\n                    var iframe = jQuery(\"<iframe><\/iframe>\",{\n                        src: \"https:\/\/www.cyberark.com\/?reset_mkto=1\",\n                        style: 'position:absolute;top:-9999px;left:-999px;',\n                        width: '10',\n                        height: '10'\n                    });\n                    iframe.appendTo('body');\n                    jQuery.cookie('utm_source', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_medium', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_campaign', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_term', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_content', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    return false;\n                                });\n        });\n    <\/script>\n    <script>\n    \/\/ custom errorMessage + instruction text for embedded Marketo Forms\nMktoForms2.whenReady(function(form) {\n    \/\/ when a field is focused\n    jQuery(document).on('focus', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').addClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is blurred\n    jQuery(document).on('blur', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').removeClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is edited (keyup)\n    jQuery(document).on('keyup', 'input, select, textarea', function(e){\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n                    if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n            \/\/ determine which key(s) \n            var code = e.keyCode || e.which;\n            \/\/ if this is 'tab' or 'shift + tab'\n            if (code == '9' || '16') {\n                \/\/ do nothing\n            }\n            \/\/ else this is not the tab or shift + tab key(s)\n            else{}\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n\n    });\n\n    \/\/ when a select field is changed, validate it\n    jQuery(document).on('change', 'select', function(e){\n        jQuery(this).blur().focus();    \n\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n            if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    form.onValidate(function() {\n     jQuery('form.mktoForm').addClass('validated');\n     jQuery('.mktoInvalid').each(function(){\n        jQuery(this).parents('.mktoFieldWrap').addClass('fieldInvalid');   \n        if(jQuery(this).is('.mktoTelField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Phone number is required in numerical values only.<\/span>');\n        }\n        else if(jQuery(this).is('.mktoEmailField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Email address is required in this format: yourname@email.com.<\/span>');\n        }\n        else{ \n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">This field is required.<\/span>'); \n        }\n     });\n    });\n});\n    <\/script>\n    <script src=\"https:\/\/www.google.com\/recaptcha\/api.js\" async defer><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/js-sha256\/0.9.0\/sha256.min.js\"><\/script>\n    <div class=\"ty_message\" style=\"display:none\"><strong>Thank you<\/strong> for your interest.<br \/>\nWe'll be in touch with you shortly.<\/div>\n    [\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-desktop&#8221;][vc_column el_class=&#8221;cyb-center cyb-pad-btm&#8221; css=&#8221;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-white&#8221; css=&#8221;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8221;] FORNITURA E GESTIONE DEL CICLO DI VITA Automatizza il provisioning degli accessi,&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-104134","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fornitura e gestione del ciclo di vita | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fornitura e gestione del ciclo di vita\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-desktop&#8221;][vc_column el_class=&#8221;cyb-center cyb-pad-btm&#8221; css=&#8221;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-white&#8221; css=&#8221;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8221;] FORNITURA E GESTIONE DEL CICLO DI VITA Automatizza il provisioning degli accessi,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-05T17:00:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\",\"name\":\"Fornitura e gestione del ciclo di vita | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\",\"datePublished\":\"2020-10-30T18:49:21+00:00\",\"dateModified\":\"2020-11-05T17:00:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fornitura e gestione del ciclo di vita\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fornitura e gestione del ciclo di vita | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","og_locale":"it_IT","og_type":"article","og_title":"Fornitura e gestione del ciclo di vita","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1601069253168{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/app-gateway-hero.jpg?id=99689) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-desktop&#8221;][vc_column el_class=&#8221;cyb-center cyb-pad-btm&#8221; css=&#8221;.vc_custom_1600216676506{margin-top: 5.3125rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-white&#8221; css=&#8221;.vc_custom_1600217088522{margin-bottom: 20px !important;}&#8221;] FORNITURA E GESTIONE DEL CICLO DI VITA Automatizza il provisioning degli accessi,...","og_url":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-11-05T17:00:51+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"9 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","url":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/","name":"Fornitura e gestione del ciclo di vita | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","datePublished":"2020-10-30T18:49:21+00:00","dateModified":"2020-11-05T17:00:51+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/onboard-offboard-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/idaptive__trashed\/provisioning-and-lifecycle-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Fornitura e gestione del ciclo di vita"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/104134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=104134"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/104134\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=104134"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=104134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}