{"version":"1.0","provider_name":"Les2T","provider_url":"https:\/\/les2t.fr\/fr_fr","author_name":"TRARBACH Jean-Yves","author_url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/","title":"Azure AD \u2013 Acc\u00e8s conditionnel - Les2T","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Fm5FjF5B7x\"><a href=\"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/\">Azure AD \u2013 Acc\u00e8s conditionnel<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/embed\/#?secret=Fm5FjF5B7x\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Azure AD \u2013 Acc\u00e8s conditionnel\u00a0\u00bb &#8212; Les2T\" data-secret=\"Fm5FjF5B7x\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Avant l\u2019av\u00e8nement des appareils mobiles, les solutions traditionnelles de s\u00e9curit\u00e9 suffisaient pour prot\u00e9ger l\u2019acc\u00e8s aux donn\u00e9es de l\u2019entreprise. Maintenant pour prot\u00e9ger efficacement vos donn\u00e9es d\u2019entreprise, il faut adopter une approche de s\u00e9curit\u00e9 plus holistique et plus innovante qui permette de prot\u00e9ger, d\u00e9tecter et traiter les menaces de tous types, en local et dans le cloud.","thumbnail_url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png"}