{"id":10588,"date":"2018-03-28T15:56:10","date_gmt":"2018-03-28T14:56:10","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=10588\/"},"modified":"2020-01-03T09:22:21","modified_gmt":"2020-01-03T08:22:21","slug":"social-login-reve-realite-12","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/03\/social-login-reve-realite-12\/","title":{"rendered":"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2)"},"content":{"rendered":"<p><em>Facebook, Google, Twitter, Instagram, Snapchat\u2026 Des noms qui, aujourd\u2019hui, r\u00e9sonnent et transforment nos m\u00e9thodes et services de communication.<\/em><\/p>\n<p><em>Depuis l\u2019arriv\u00e9e de Facebook en 2004, Internet a \u00e9t\u00e9 t\u00e9moin d\u2019une explosion du nombre de r\u00e9seaux sociaux, des plus g\u00e9n\u00e9ralistes aux plus sp\u00e9cialis\u00e9s. Leur adoption et utilisation massive les positionnent comme des v\u00e9ritables mines d\u2019or pour les entreprises, en leur offrant une porte d\u2019acc\u00e8s \u00e0 des donn\u00e9es jusqu&#8217;alors inaccessibles (pr\u00e9f\u00e9rences de leurs clients, envies, int\u00e9r\u00eats\u2026).<\/em><\/p>\n<p><em>\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login semble \u00eatre la solution r\u00eav\u00e9e\u2026 mais est-ce vraiment le cas\u00a0?<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Chapitre 1\u00a0: la promesse<\/strong><\/h2>\n<p>En 2018, nous comptons plus de 70 r\u00e9seaux sociaux, dont les plus connus et utilis\u00e9s restent Facebook, Google+, Twitter ou encore LinkedIn. Certains r\u00e9seaux peuvent \u00eatre m\u00eame rattach\u00e9s \u00e0 des plaques g\u00e9ographiques ou pays particuliers, comme l\u2019Asie avec WeChat, Weibo, Mixi ou et la Russie avec Vkontakte.<\/p>\n<figure id=\"post-10603 media-10603\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10603\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL1-1.png\" alt=\"\" width=\"1746\" height=\"896\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL1-1.png 1746w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL1-1-372x191.png 372w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL1-1-768x394.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL1-1-71x36.png 71w\" sizes=\"auto, (max-width: 1746px) 100vw, 1746px\" \/><\/figure>\n<figure id=\"post-10589 media-10589\" class=\"align-none\"><\/figure>\n<p>\u00c0 titre indicatif, l\u2019utilisation de r\u00e9seaux sociaux est pass\u00e9e de 153 millions d\u2019utilisateurs en 2011 \u00e0 837 millions en 2013, pour passer largement au-del\u00e0 du milliard en 2017.<\/p>\n<p><strong>Les r\u00e9seaux sociaux sont donc devenus de v\u00e9ritables r\u00e9f\u00e9rentiels d\u2019identit\u00e9s<\/strong>, dont certains promettent de d\u00e9tenir l\u2019Identit\u00e9 de r\u00e9f\u00e9rence sur Internet, <strong>les motivant \u00e0 se positionner naturellement comme fournisseur d\u2019identit\u00e9s pour les entreprises. C\u2019est dans ce cadre et sur la base de cette promesse que le <em>social login<\/em> est n\u00e9.<\/strong><\/p>\n<p>L\u2019objectif premier du <em>social login<\/em> est de permettre \u00e0 un utilisateur d\u2019acc\u00e9der aux services d\u2019une marque ou boutique virtuelle le plus simplement possible, \u00e0 l\u2019aide d\u2019un compte d\u2019un r\u00e9seau social.<\/p>\n<p>Il s\u2019affiche comme une r\u00e9ponse aux attentes des clients en simplifiant les processus d\u2019enregistrement et d\u2019acc\u00e8s aux services, mais \u00e9galement \u00e0 celles des entreprises en donnant des moyens d\u2019authentification rapides \u00e0 d\u00e9ployer afin d\u2019am\u00e9liorer le taux de conversion des prospects.<\/p>\n<p>&nbsp;<\/p>\n<h3>Une solution pratique et simple \u00e0 utiliser<\/h3>\n<p>Lorsque nous parlons de <em>social login<\/em>, nous distinguons deux cas d\u2019usage\u00a0:<\/p>\n<ul>\n<li><strong><em>Social registration<\/em><\/strong>: utilisation d\u2019un compte d\u2019un r\u00e9seau social (ex\u00a0: Facebook, Google, Twitter, LinkedIn\u2026) pour cr\u00e9er un compte sur une application<\/li>\n<li><strong><em>Social login<\/em><\/strong>: utilisation d\u2019un compte d\u2019un r\u00e9seau social pour s\u2019authentifier sur une application pour laquelle le compte applicatif a \u00e9t\u00e9 d\u00e9j\u00e0 cr\u00e9\u00e9 via <em>social registration<\/em><\/li>\n<\/ul>\n<p>La cin\u00e9matique d\u00e9crite ci-apr\u00e8s pr\u00e9sente les \u00e9tapes du <em>social registration<\/em>. La cin\u00e9matique du <em>social login <\/em>est similaire et repose uniquement sur les \u00e9tapes 1, 2 et 3.<\/p>\n<figure id=\"post-10599 media-10599\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10599\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL2.png\" alt=\"\" width=\"1727\" height=\"692\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL2.png 1727w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL2-437x175.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL2-768x308.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL2-71x28.png 71w\" sizes=\"auto, (max-width: 1727px) 100vw, 1727px\" \/><\/figure>\n<p><strong>\u00c9tape 1 \u2013 Acc\u00e8s initial au service<\/strong><\/p>\n<p>L\u2019utilisateur acc\u00e8de \u00e0 l\u2019application (mobile ou web) d\u2019une entreprise qui lui fournit des services et choisit de cr\u00e9er un compte depuis le r\u00e9seau social de son choix.<\/p>\n<p><strong>\u00c9tape 2 \u2013 Authentification<\/strong><\/p>\n<p>L\u2019utilisateur est alors redirig\u00e9 vers le r\u00e9seau social s\u00e9lectionn\u00e9 pour s\u2019authentifier selon le m\u00e9canisme en vigueur (ex\u00a0: identifiant \/ mot de passe, code (OTP) envoy\u00e9 par SMS\u2026).<\/p>\n<p>Dans l\u2019\u00e9ventualit\u00e9 o\u00f9 l\u2019utilisateur a d\u00e9j\u00e0 une session active sur ce r\u00e9seau social, il sera automatiquement authentifi\u00e9 (SSO \u2013 <em>Single Sign On<\/em>) et passera directement \u00e0 l\u2019\u00e9tape suivante.<\/p>\n<p><strong>\u00c9tape 3a \u2013 Recueil du consentement<\/strong><\/p>\n<p>Le r\u00e9seau social informe l\u2019utilisateur que l\u2019application souhaite acc\u00e9der \u00e0 des informations de son compte (ex\u00a0: nom, pr\u00e9nom, date de naissance, liste des amis, pr\u00e9f\u00e9rences\u2026) afin de lui cr\u00e9er un compte applicatif. L\u2019utilisateur doit alors donner son consentement explicite pour que la cin\u00e9matique se poursuive.<\/p>\n<p>\u00c0 noter que certains r\u00e9seaux sociaux comme Facebook offrent la possibilit\u00e9 \u00e0 l\u2019utilisateur de visualiser en d\u00e9tail les informations que l\u2019application souhaite recueillir afin de pouvoir g\u00e9rer plus finement son consentement (\u00e9tape 3b).<\/p>\n<p><strong>\u00c9tape 3b \u2013 Gestion fine du consentement<\/strong><\/p>\n<p>L\u2019utilisateur visualise l\u2019ensemble des informations que l\u2019application souhaite recueillir. Il peut alors d\u00e9cocher celles qu\u2019il ne souhaite pas partager. Toutefois, des informations peuvent \u00eatre obligatoires pour que l\u2019application puisse lui cr\u00e9er un compte applicatif et ne pourront \u00eatre d\u00e9coch\u00e9es par l\u2019utilisateur (g\u00e9n\u00e9ralement l\u2019adresse e-mail car souvent utilis\u00e9e comme identifiant).<\/p>\n<p><strong>\u00c9tape 3 \/ <\/strong><strong>\u00c9tape 3c<\/strong><strong> \u2013 Redirection vers le service souhait\u00e9<\/strong><\/p>\n<p>L\u2019utilisateur est alors redirig\u00e9 vers le service souhait\u00e9. \u00c9ventuellement, l\u2019affichage pourra \u00eatre personnalis\u00e9 pour montrer l\u2019int\u00e9r\u00eat de partager les informations de son compte social (affichage de la photo de profil, contenus personnalis\u00e9s sur la base des pr\u00e9f\u00e9rences de l\u2019utilisateur\u2026).<\/p>\n<h3>Un avantage concurrentiel pour les entreprises<\/h3>\n<p><strong>Simplifier le processus de cr\u00e9ation<\/strong><\/p>\n<p>La conversion des prospects en clients est l\u2019objectif principal des entreprises. L\u2019un des premiers freins \u00e0 cette conversion est le processus de cr\u00e9ation de compte. Selon une \u00e9tude de WebHostingBuzz, plus de 86% de prospects abandonnent d\u00e8s cette \u00e9tape, souvent jug\u00e9e trop longue et complexe.<\/p>\n<p>Le <em>social registration<\/em> est une alternative de plus en plus adopt\u00e9e par les entreprises\u00a0: abandonner le formulaire de cr\u00e9ation de compte traditionnel pour mettre en avant l\u2019utilisation d\u2019un compte d\u2019un r\u00e9seau social. En d\u2019autres termes, passer de plusieurs minutes \u00e0 quelques clics.<\/p>\n<p><strong>Faciliter l\u2019acc\u00e8s aux services<\/strong><\/p>\n<p>Simplifier le processus de cr\u00e9ation de compte n\u2019est pas une fin en soi. Il faut \u00e9galement donner envie aux clients de revenir et consommer les services de l\u2019entreprise, notamment en\u00a0:<\/p>\n<ul>\n<li><strong>Offrant une exp\u00e9rience utilisateur omnicanale<\/strong>: ne pas perdre le client en lui imposant des parcours diff\u00e9rents en fonction du moyen d\u2019acc\u00e8s utilis\u00e9<\/li>\n<li><strong>R\u00e9duisant le nombre de mots de passe \u00e0 retenir<\/strong>: favoriser l\u2019usage d\u2019un compte (i.e.\u00a0: couple identifiant \/ mot de passe) d\u00e9j\u00e0 connu de l\u2019utilisateur pour \u00e9viter de r\u00e9cr\u00e9er un nouveau mot de passe<\/li>\n<\/ul>\n<p>Le <em>social login<\/em> se positionne comme une solution permettant de r\u00e9pondre \u00e0 ces probl\u00e9matiques\u00a0: que ce soit depuis un ordinateur, un smartphone, une tablette, le client b\u00e9n\u00e9ficiera de la m\u00eame exp\u00e9rience utilisateur (m\u00eame cin\u00e9matique d\u2019acc\u00e8s), bas\u00e9e sur l\u2019usage d\u2019un compte social pour acc\u00e9der aux services de l\u2019entreprise, et ses partenaires.<\/p>\n<p><strong>Personnaliser l\u2019exp\u00e9rience utilisateur<\/strong><\/p>\n<p>L\u2019utilisation du <em>social login<\/em> permet d\u2019acc\u00e9der \u00e0 un nombre important de donn\u00e9es qualitatives sur les clients\u00a0: donn\u00e9es d\u2019identit\u00e9 (nom, pr\u00e9nom, date de naissance), donn\u00e9es de contact (adresse e-mail, num\u00e9ro de t\u00e9l\u00e9phone\u2026), donn\u00e9es de pr\u00e9f\u00e9rences (int\u00e9r\u00eats, partages, <em>likes<\/em>) \u2026<\/p>\n<p>Des donn\u00e9es jusqu\u2019alors inaccessibles dans une gestion des identit\u00e9s clients classique le deviennent, qui offrent la possibilit\u00e9 aux entreprises de personnaliser davantage leur relation avec leurs clients\u00a0:<\/p>\n<ul>\n<li>Affichage et communication personnalis\u00e9s<\/li>\n<li>Proposition de contenu personnalis\u00e9<\/li>\n<li>Anticipation ou adaptation de services en ligne avec les int\u00e9r\u00eats des clients<\/li>\n<\/ul>\n<p>La personnalisation de l\u2019exp\u00e9rience utilisateur permettra aux entreprises d\u2019instaurer un climat de confiance, proposer des services sur-mesure et fid\u00e9liser ses clients dans la dur\u00e9e.<\/p>\n<h3>Ils l\u2019ont adopt\u00e9\u2026 ou pas encore<\/h3>\n<p>L\u2019adoption du <em>social login<\/em> est tr\u00e8s disparate en fonction du secteur d\u2019activit\u00e9 de l\u2019entreprise et de la nature de ses relations avec ses clients. Nous distinguons deux typologies de clients\u00a0:<\/p>\n<ul>\n<li>Les <strong>consommateurs<\/strong>: b\u00e9n\u00e9ficient des services d\u2019une entreprise sans pour autant avoir de relation directe et\/ou de contrat les liant (ex\u00a0: j\u2019ach\u00e8te une bouteille de soda dans mon magasin pr\u00e9f\u00e9r\u00e9, mais l\u2019entreprise qui con\u00e7oit ce soda ne me connait pas forc\u00e9ment)<\/li>\n<li>Les <strong>clients directs<\/strong>: b\u00e9n\u00e9ficient des services d\u2019une entreprise sur la base d\u2019un lien direct (contrat, comptes bancaires\u2026), n\u00e9cessitant une relation de proximit\u00e9 entre l\u2019entreprise et le client<\/li>\n<\/ul>\n<p>Selon une \u00e9tude Wavestone r\u00e9alis\u00e9e en mars 2018 sur un \u00e9chantillon de 172 marques majeures r\u00e9parties dans tous les secteurs d\u2019activit\u00e9, 32% d\u2019entre elles ont adopt\u00e9 le <em>social login<\/em>.<\/p>\n<figure id=\"post-10595 media-10595\" class=\"align-none\">\n<figure id=\"post-10640 media-10640\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10640 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image1.png\" alt=\"\" width=\"1607\" height=\"663\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image1.png 1607w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image1-437x180.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image1-768x317.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/Image1-71x29.png 71w\" sizes=\"auto, (max-width: 1607px) 100vw, 1607px\" \/><\/figure>\n<\/figure>\n<p>Ce constat met en lumi\u00e8re une adoption forte par les entreprises ayant des clients de type \u00ab\u00a0consommateurs\u00a0\u00bb, dont l\u2019objectif est de vendre rapidement des services de consommation (VOD, mat\u00e9riels, presse\u2026).<\/p>\n<p>\u00c0 contrario, peu, voire pas du tout, d\u2019entreprises ayant des clients directs adoptent le <em>social login<\/em>, leur relation d\u00e9butant par l\u2019\u00e9tablissement d\u2019un contrat (et donc la cr\u00e9ation d\u2019un compte avec des donn\u00e9es v\u00e9rifi\u00e9es par l\u2019entreprise (carte d\u2019identit\u00e9, justificatif de domicile\u2026)). Toutefois, certaines de ces entreprises ont d\u00e9j\u00e0 commenc\u00e9 \u00e0 instruire le <em>social login<\/em> dans leur feuille de route de services num\u00e9riques, et il commence \u00e0 s\u2019imposer comme une norme au regard de l\u2019arriv\u00e9e d\u2019un nouveau type de clients\u00a0: la g\u00e9n\u00e9ration Z.<\/p>\n<p>Parmi les entreprises ayant adopt\u00e9 le <em>social login<\/em>, Facebook et Google+ sortent du lot avec un taux d\u2019adoption respectivement de 100% et 55,4%. Suivent LinkedIn (15,4%), Twitter (12,3%) et Yahoo (9,2%).<\/p>\n<figure id=\"post-10597 media-10597\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10597\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL3.png\" alt=\"\" width=\"1583\" height=\"676\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL3.png 1583w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL3-437x187.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL3-768x328.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/03\/SL3-71x30.png 71w\" sizes=\"auto, (max-width: 1583px) 100vw, 1583px\" \/><\/figure>\n<h3>Du r\u00eave \u00e0 la r\u00e9alit\u00e9<\/h3>\n<p>La transformation num\u00e9rique et l\u2019\u00e9volution de la relation client repositionne l\u2019exp\u00e9rience utilisateur au c\u0153ur des r\u00e9flexions strat\u00e9giques des entreprises.<\/p>\n<p>Simplicit\u00e9, efficacit\u00e9, fid\u00e9lit\u00e9 sont les ma\u00eetres-mots de la nouvelle relation client, trois enjeux pour lesquels le <em>social login<\/em> semble \u00eatre un acc\u00e9l\u00e9rateur \u00e0 consid\u00e9rer.<\/p>\n<p>Toutefois, son d\u00e9ploiement n\u2019est pas une \u00e9vidence, ni m\u00eame opportun pour toutes les entreprises (en fonction du secteur d\u2019activit\u00e9, des populations cibles, de la typologie de clients\u2026) et requiert le respect de certaines bonnes pratiques de s\u00e9curit\u00e9 et de protection des donn\u00e9es personnelles.<\/p>\n<p><em>Pour plus de d\u00e9tails, rendez-vous au prochain article\u00a0: \u00ab\u00a0Chapitre 2\u00a0: La r\u00e9alit\u00e9\u00a0\u00bb.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook, Google, Twitter, Instagram, Snapchat\u2026 Des noms qui, aujourd\u2019hui, r\u00e9sonnent et transforment nos m\u00e9thodes et services de communication. Depuis l\u2019arriv\u00e9e de Facebook en 2004, Internet a \u00e9t\u00e9 t\u00e9moin d\u2019une explosion du nombre de r\u00e9seaux sociaux, des plus g\u00e9n\u00e9ralistes aux plus&#8230;<\/p>\n","protected":false},"author":1266,"featured_media":9377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[164,2757,1009],"coauthors":[2755,2917],"class_list":["post-10588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-authentification","tag-ciam","tag-gestion-des-acces"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2) - RiskInsight<\/title>\n<meta name=\"description\" content=\"\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-28T14:56:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-03T08:22:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3872\" \/>\n\t<meta property=\"og:image:height\" content=\"3874\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PASCAL VIDAL\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PASCAL VIDAL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\"},\"author\":{\"name\":\"PASCAL VIDAL\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/896c46bf98205a7a6df42a9bdbad0f5d\"},\"headline\":\"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2)\",\"datePublished\":\"2018-03-28T14:56:10+00:00\",\"dateModified\":\"2020-01-03T08:22:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\"},\"wordCount\":1636,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg\",\"keywords\":[\"authentification\",\"CIAM\",\"gestion des acc\u00e8s\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\",\"name\":\"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg\",\"datePublished\":\"2018-03-28T14:56:10+00:00\",\"dateModified\":\"2020-01-03T08:22:21+00:00\",\"description\":\"\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg\",\"width\":3872,\"height\":3874,\"caption\":\"Vector man wearing glasses in flat style - smartphone addiction concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/896c46bf98205a7a6df42a9bdbad0f5d\",\"name\":\"PASCAL VIDAL\",\"sameAs\":[\"https:\/\/x.com\/pascal_vidal\"],\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/pascal-vidal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2) - RiskInsight","description":"\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/","og_locale":"en_US","og_type":"article","og_title":"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2) - RiskInsight","og_description":"\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login","og_url":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/","og_site_name":"RiskInsight","article_published_time":"2018-03-28T14:56:10+00:00","article_modified_time":"2020-01-03T08:22:21+00:00","og_image":[{"width":3872,"height":3874,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg","type":"image\/jpeg"}],"author":"PASCAL VIDAL","twitter_misc":{"Written by":"PASCAL VIDAL","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/"},"author":{"name":"PASCAL VIDAL","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/896c46bf98205a7a6df42a9bdbad0f5d"},"headline":"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2)","datePublished":"2018-03-28T14:56:10+00:00","dateModified":"2020-01-03T08:22:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/"},"wordCount":1636,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg","keywords":["authentification","CIAM","gestion des acc\u00e8s"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/","url":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/","name":"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg","datePublished":"2018-03-28T14:56:10+00:00","dateModified":"2020-01-03T08:22:21+00:00","description":"\u00c0 l\u2019heure o\u00f9 l\u2019exp\u00e9rience utilisateur et la connaissance des clients deviennent des probl\u00e9matiques incontournables pour les entreprises, le social login","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/01\/Fotolia_60161963_Subscription_Monthly_XXL-Smartphone-addiction-concept\u00a9-venim-Copie.jpg","width":3872,"height":3874,"caption":"Vector man wearing glasses in flat style - smartphone addiction concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/03\/social-login-reve-realite-12\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Social Login : faire d\u2019un r\u00eave une r\u00e9alit\u00e9 (1\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/896c46bf98205a7a6df42a9bdbad0f5d","name":"PASCAL VIDAL","sameAs":["https:\/\/x.com\/pascal_vidal"],"url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/pascal-vidal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1266"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=10588"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10588\/revisions"}],"predecessor-version":[{"id":10642,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10588\/revisions\/10642"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9377"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=10588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=10588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=10588"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=10588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}