{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"Utilisation des m\u00e9tadonn\u00e9es de r\u00e9plication, quand les journaux font d\u00e9faut - RiskInsight","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0r6zEQKnnr\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/02\/utilisation-des-metadonnees-de\/\">Utilisation des m\u00e9tadonn\u00e9es de r\u00e9plication, quand les journaux font d\u00e9faut<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/02\/utilisation-des-metadonnees-de\/embed\/#?secret=0r6zEQKnnr\" width=\"600\" height=\"338\" title=\"&#8220;Utilisation des m\u00e9tadonn\u00e9es de r\u00e9plication, quand les journaux font d\u00e9faut&#8221; &#8212; RiskInsight\" data-secret=\"0r6zEQKnnr\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_78673393_Subscription_Monthly_M.jpg","thumbnail_width":1378,"thumbnail_height":1378,"description":"Au sein d\u2019un domaine Active Directory se trouvent g\u00e9n\u00e9ralement plusieurs contr\u00f4leurs de domaine qui n\u00e9cessitent de disposer des m\u00eames informations. Pour parvenir \u00e0 cela, l\u2019Active Directory dispose d\u2019un m\u00e9canisme de r\u00e9plication qui permet, entre autres, de propager un changement depuis un contr\u00f4leur de domaine vers les autres. Dans son processus de r\u00e9plication, l\u2019Active Directory utilise des USN (Update Sequence Number) pour d\u00e9terminer l\u2019\u00e9tat des contr\u00f4leurs de domaines. Ces USN repr\u00e9sentent un compteur stock\u00e9 dans la base de donn\u00e9es de l\u2019Active Directory, qui est incr\u00e9ment\u00e9 \u00e0 chaque changement de cette base au niveau d\u2019un contr\u00f4leur de domaine. Chaque contr\u00f4leur de domaine dispose alors d\u2019un USN qui lui est propre.Lorsqu\u2019un changement d\u2019une information de l\u2019Active Directory intervient sur un contr\u00f4leur de domaine, deux cas peuvent se pr\u00e9senter :"}