{"id":3037,"date":"2019-05-10T12:04:36","date_gmt":"2019-05-10T10:04:36","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=3037"},"modified":"2019-05-10T12:04:46","modified_gmt":"2019-05-10T10:04:46","slug":"azure-ad-acces-conditionnel","status":"publish","type":"post","link":"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/","title":{"rendered":"Azure AD \u2013 Acc\u00e8s conditionnel"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"250\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\" alt=\"\" class=\"wp-image-2430\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png 800w, https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft-480x150.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><\/figure>\n\n\n\n<p>Avant l\u2019av\u00e8nement des appareils mobiles, les solutions\ntraditionnelles de s\u00e9curit\u00e9 suffisaient pour prot\u00e9ger l\u2019acc\u00e8s aux donn\u00e9es de l\u2019entreprise.\nMaintenant pour prot\u00e9ger efficacement vos donn\u00e9es d\u2019entreprise, il faut adopter\nune approche de s\u00e9curit\u00e9 plus holistique et plus innovante qui permette de\nprot\u00e9ger, d\u00e9tecter et traiter les menaces de tous types, en local et dans le\ncloud. <\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Voil\u00e0 \u00e0 quoi sert l\u2019acc\u00e8s conditionnel, restreindre l\u2019acc\u00e8s aux\nressources en fonction de multiples conditions et de r\u00e8gles. Pour le mettre en\nplace Microsoft vous propose une s\u00e9rie de vid\u00e9os explicatives, \u00e0 regarder\nabsolument.<\/p>\n\n\n\n<p><strong>Qu&rsquo;est-ce que l&rsquo;acc\u00e8s conditionnel ?<\/strong><\/p>\n\n\n\n<p><em>Dans cette vid\u00e9o, d\u00e9couvrez en quoi consiste l&rsquo;acc\u00e8s conditionnel Azure Active Directory et comment il peut en s\u00e9curiser l&rsquo;acc\u00e8s au sein d&rsquo;une organisation.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What is conditional access? | Azure Active Directory\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/ffMAw2IVO7A?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Comment d\u00e9ployer les strat\u00e9gies d&rsquo;acc\u00e8s conditionnel <\/strong><\/p>\n\n\n\n<p><em>Dans cette vid\u00e9o, d\u00e9couvrez comment configurer les strat\u00e9gies d&rsquo;acc\u00e8s conditionnel Azure Active Directory dans le portail Azure.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to deploy conditional access | Azure Active Directory\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/c_izIRNJNuk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Comment d\u00e9ployer l&rsquo;acc\u00e8s conditionnel<\/strong> <\/p>\n\n\n\n<p><em>Dans cette vid\u00e9o, d\u00e9couvrez comment d\u00e9ployer des strat\u00e9gies d&rsquo;acc\u00e8s conditionnel Azure Active Directory aux utilisateurs finaux d&rsquo;une organisation.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to roll out conditional access | Azure Active Directory\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/0_Fze7Zpyvc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Comment enregistrer vos informations de s\u00e9curit\u00e9 pour Azure Active Directory<\/strong> <\/p>\n\n\n\n<p><em>Dans cette vid\u00e9o, d\u00e9couvrez comment aider les utilisateurs finaux \u00e0 enregistrer leurs informations de s\u00e9curit\u00e9 pour Azure Active Directory. Cela permettra aux utilisateurs de v\u00e9rifier facilement leur identit\u00e9 lorsqu&rsquo;ils se connectent ou r\u00e9initialisent leur mot de passe.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to register your security information for Azure Active Directory\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/gXuh0XS18wA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Avant l\u2019av\u00e8nement des appareils mobiles, les solutions traditionnelles de s\u00e9curit\u00e9 suffisaient pour prot\u00e9ger l\u2019acc\u00e8s aux donn\u00e9es de l\u2019entreprise. Maintenant pour prot\u00e9ger efficacement vos donn\u00e9es d\u2019entreprise, il faut adopter une approche de s\u00e9curit\u00e9 plus holistique et plus innovante qui permette de prot\u00e9ger, d\u00e9tecter et traiter les menaces de tous types, en local et dans le cloud.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[290],"tags":[34,268,220,216],"class_list":["post-3037","post","type-post","status-publish","format-standard","hentry","category-azure","tag-azure","tag-azure-ad","tag-securite","tag-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Azure AD \u2013 Acc\u00e8s conditionnel - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure AD \u2013 Acc\u00e8s conditionnel - Les2T\" \/>\n<meta property=\"og:description\" content=\"Avant l\u2019av\u00e8nement des appareils mobiles, les solutions traditionnelles de s\u00e9curit\u00e9 suffisaient pour prot\u00e9ger l\u2019acc\u00e8s aux donn\u00e9es de l\u2019entreprise. Maintenant pour prot\u00e9ger efficacement vos donn\u00e9es d\u2019entreprise, il faut adopter une approche de s\u00e9curit\u00e9 plus holistique et plus innovante qui permette de prot\u00e9ger, d\u00e9tecter et traiter les menaces de tous types, en local et dans le cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-10T10:04:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-10T10:04:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/\",\"url\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/\",\"name\":\"Azure AD \u2013 Acc\u00e8s conditionnel - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\",\"datePublished\":\"2019-05-10T10:04:36+00:00\",\"dateModified\":\"2019-05-10T10:04:46+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure AD \u2013 Acc\u00e8s conditionnel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure AD \u2013 Acc\u00e8s conditionnel - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/","og_locale":"fr_FR","og_type":"article","og_title":"Azure AD \u2013 Acc\u00e8s conditionnel - Les2T","og_description":"Avant l\u2019av\u00e8nement des appareils mobiles, les solutions traditionnelles de s\u00e9curit\u00e9 suffisaient pour prot\u00e9ger l\u2019acc\u00e8s aux donn\u00e9es de l\u2019entreprise. Maintenant pour prot\u00e9ger efficacement vos donn\u00e9es d\u2019entreprise, il faut adopter une approche de s\u00e9curit\u00e9 plus holistique et plus innovante qui permette de prot\u00e9ger, d\u00e9tecter et traiter les menaces de tous types, en local et dans le cloud.","og_url":"https:\/\/les2t.fr\/fr_fr\/azure-ad-acces-conditionnel\/","og_site_name":"Les2T","article_published_time":"2019-05-10T10:04:36+00:00","article_modified_time":"2019-05-10T10:04:46+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"TRARBACH Jean-Yves","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/","url":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/","name":"Azure AD \u2013 Acc\u00e8s conditionnel - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png","datePublished":"2019-05-10T10:04:36+00:00","dateModified":"2019-05-10T10:04:46+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANMicrosoft.png"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/azure-ad-acces-conditionnel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"Azure AD \u2013 Acc\u00e8s conditionnel"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/3037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/comments?post=3037"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/3037\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/media?parent=3037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/categories?post=3037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/tags?post=3037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}