{"id":5000,"date":"2014-02-05T08:12:55","date_gmt":"2014-02-05T07:12:55","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5000"},"modified":"2019-12-31T11:19:58","modified_gmt":"2019-12-31T10:19:58","slug":"identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/","title":{"rendered":"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?"},"content":{"rendered":"<p><em>H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.<\/em><\/p>\n<p><em>Microsoft fait partie de ces acteurs de l\u2019IAM pour le cloud. En raison de son r\u00f4le d\u00e9terminant dans le SI \u00ab\u00a0On-Premises\u00a0\u00bb des entreprises, nous allons nous pencher de plus pr\u00e8s sur sa solution\u00a0: Windows Azure Active Directory (WAAD).<\/em><\/p>\n<h2>WAAD\u00a0: une solution IAM-as-a-Service pour le <em>cloud<\/em><\/h2>\n<p>Contrairement \u00e0 ce que pourrait indiquer son nom, la solution Windows Azure Active Directory n\u2019est pas un Active Directory h\u00e9berg\u00e9 dans Azure, la plate-forme <em>cloud<\/em> de Microsoft.<\/p>\n<p>Officiellement lanc\u00e9e le 8 avril 2013, WAAD est d\u00e9crit par Microsoft comme \u00ab\u00a0<em>une solution compl\u00e8te et s\u00e9curis\u00e9e pour la gestion des identit\u00e9s et des acc\u00e8s dans le cloud. Elle combine des services d&#8217;annuaires principaux, une gouvernance des identit\u00e9s avanc\u00e9e, une gestion et une s\u00e9curisation des acc\u00e8s aux applications <\/em>\u00bb.<\/p>\n<p>Microsoft propose donc WAAD comme solution d\u2019IAM-as-a-Service permettant, entre autres, de couvrir les applications h\u00e9berg\u00e9es dans le <em>cloud<\/em>. Contrairement \u00e0 son approche \u00ab\u00a0brique \u00e0 brique\u00a0\u00bb traditionnelle pour les services IAM <em>On-Premises, <\/em>dans laquelle chaque service est fourni par un produit sp\u00e9cifique, Microsoft adopte l\u00e0 une approche plus globale comme le d\u00e9montre le tableau suivant\u00a0:<\/p>\n<figure id=\"attachment_5001\" aria-describedby=\"caption-attachment-5001\" style=\"width: 404px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5001\" title=\"Comparaison des offres On-Premises Vs cloud de Microsoft\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2014\/02\/tableau-Waad-404x191.jpg\" alt=\"\" width=\"404\" height=\"191\" \/><figcaption id=\"caption-attachment-5001\" class=\"wp-caption-text\">Comparaison des offres On-Premises Vs cloud de Microsoft<\/figcaption><\/figure>\n<p>Windows Azure Active Directory permet ainsi aux entreprises de\u00a0:<\/p>\n<ul>\n<li>\u00c9tendre au <em>cloud<\/em> les identit\u00e9s g\u00e9r\u00e9es localement au sein d\u2019un Active Directory <em>On-Premises<\/em>\u00a0;<\/li>\n<li>G\u00e9rer les identit\u00e9s et acc\u00e8s depuis le <em>cloud,<\/em> \u00e0 la fois pour les applications <em>cloud<\/em> de Microsoft\u00a0(Office 365, Dynamics CRM Online, Windows Intune), pour un nombre important d\u2019applications SaaS du march\u00e9, mais \u00e9galement pour toute application que l\u2019entreprise raccorde \u00e0 WAAD\u00a0;<\/li>\n<li>Apporter une connexion unique (SSO) aux applications h\u00e9berg\u00e9es dans le <em>cloud, <\/em>voire aussi, dans certains cas, aux applications <em>On-Premises\u00a0;<\/em><\/li>\n<li>Prot\u00e9ger les applications les plus critiques avec une solution d\u2019authentification forte.<\/li>\n<\/ul>\n<p>Notons que certains services propos\u00e9s sont ant\u00e9rieurs \u00e0 la date de lancement officielle puisqu\u2019ils ont \u00e9t\u00e9 introduits d\u00e8s 2010 pour offrir les fonctionnalit\u00e9s de gestions des identit\u00e9s et des acc\u00e8s \u00e0 Office\u00a0365. C\u2019est ainsi que Microsoft a pu afficher les chiffres de 265 milliards d\u2019authentifications r\u00e9alis\u00e9es et de 2,9 millions d\u2019organisations clientes \u00e0 la date de lancement de la solution.<\/p>\n<h2>Comment mettre en \u0153uvre WAAD\u00a0?<\/h2>\n<p>Deux modes d\u2019impl\u00e9mentation sont envisageables en fonction des usages que l\u2019entreprise souhaite couvrir.<\/p>\n<p>La premi\u00e8re possibilit\u00e9 est<strong> une impl\u00e9mentation en <em>stand alone<\/em><\/strong>, sans aucun lien avec les annuaires ou briques d\u2019identit\u00e9s pr\u00e9sentes dans le SI de l\u2019entreprise. Cette absence de lien avec les infrastructures de l\u2019entreprise permet de b\u00e9n\u00e9ficier rapidement d\u2019une solution IAM pour le <em>cloud. <\/em>N\u00e9anmoins, cela impose de g\u00e9rer sp\u00e9cifiquement le cycle de vie des identit\u00e9s (cr\u00e9ations, modifications, suppressions), des mots de passe (initialisations, r\u00e9initialisations) et des habilitations (affectations de groupes).<\/p>\n<p>La seconde possibilit\u00e9 consiste \u00e0 <strong>\u00ab\u00a0\u00e9tendre les identit\u00e9s locales vers le <em>cloud\u00a0\u00bb. <\/em><\/strong>Ce type d\u2019impl\u00e9mentation permet de d\u00e9ployer simplement des applications <em>cloud<\/em> et ce de fa\u00e7on transparente pour les utilisateurs. Pour cela, une synchronisation unidirectionnelle entre un Active Directory g\u00e9r\u00e9 localement et WAAD est mise en place (via l\u2019outil DirSync). D\u00e8s lors, les processus de gestion du cycle de vie des identit\u00e9s d\u00e9j\u00e0 en place au sein de l\u2019entreprise se retrouvent \u00e9tendus au <em>cloud.<\/em><\/p>\n<p>Et afin de permettre un acc\u00e8s sans couture aux utilisateurs \u00e0 la fois aux applications cloud et aux applications h\u00e9berg\u00e9es dans le SI de l&#8217;entreprise, il est n\u00e9cessaire de disposer d&#8217;une infrastructure de f\u00e9d\u00e9ration des identit\u00e9s <em>On-Premises<\/em>.<\/p>\n<p>Par ailleurs, il est possible d\u2019utiliser un module d\u2019authentification forte. Un t\u00e9l\u00e9phone est alors indispensable quel que soit le mode d\u2019authentification choisi\u00a0: One-Time Password par <em>SMS<\/em>, OTP par appel t\u00e9l\u00e9phonique ou encore notifications sur <em>smartphone<\/em>. Notons que ces fonctionnalit\u00e9s reposent sur la solution de l\u2019\u00e9diteur PhoneFactor, rachet\u00e9 par Microsoft en octobre 2012.<\/p>\n<p>Rappelons que Windows Azure Active Directory reste une solution d\u2019IAM pour le cloud parmi d\u2019autres. Dans un march\u00e9 o\u00f9 des mouvements sont \u00e0 pr\u00e9voir dans les mois qui viennent, on peut se demander quels sont les v\u00e9ritables b\u00e9n\u00e9fices de ces solutions, et ce qui les distingue les unes des autres. Des questions qui seront abord\u00e9es dans un prochain article\u2026<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management&#8230;<\/p>\n","protected":false},"author":236,"featured_media":2461,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36,3224],"tags":[80,3119,145,3311],"coauthors":[2725],"class_list":["post-5000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","category-digital-identity","tag-cloud","tag-cloud-security","tag-iam","tag-identity-access-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?<\/title>\n<meta name=\"description\" content=\"H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?\" \/>\n<meta property=\"og:description\" content=\"H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-05T07:12:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:19:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1722\" \/>\n\t<meta property=\"og:image:height\" content=\"1103\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hamza KHARBACHI\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hamza KHARBACHI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\"},\"author\":{\"name\":\"Hamza KHARBACHI\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f8973255a6a608512a172f3316317933\"},\"headline\":\"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?\",\"datePublished\":\"2014-02-05T07:12:55+00:00\",\"dateModified\":\"2019-12-31T10:19:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\"},\"wordCount\":837,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg\",\"keywords\":[\"Cloud\",\"Cloud security\",\"IAM\",\"identity &amp; access governance\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\",\"name\":\"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg\",\"datePublished\":\"2014-02-05T07:12:55+00:00\",\"dateModified\":\"2019-12-31T10:19:58+00:00\",\"description\":\"H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg\",\"width\":1722,\"height\":1103},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f8973255a6a608512a172f3316317933\",\"name\":\"Hamza KHARBACHI\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/hamza-kharbachi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?","description":"H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/","og_locale":"en_US","og_type":"article","og_title":"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?","og_description":"H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/","og_site_name":"RiskInsight","article_published_time":"2014-02-05T07:12:55+00:00","article_modified_time":"2019-12-31T10:19:58+00:00","og_image":[{"width":1722,"height":1103,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg","type":"image\/jpeg"}],"author":"Hamza KHARBACHI","twitter_misc":{"Written by":"Hamza KHARBACHI","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/"},"author":{"name":"Hamza KHARBACHI","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f8973255a6a608512a172f3316317933"},"headline":"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?","datePublished":"2014-02-05T07:12:55+00:00","dateModified":"2019-12-31T10:19:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/"},"wordCount":837,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg","keywords":["Cloud","Cloud security","IAM","identity &amp; access governance"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/","name":"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg","datePublished":"2014-02-05T07:12:55+00:00","dateModified":"2019-12-31T10:19:58+00:00","description":"H\u00e9berger ses applications dans le cloud ou recourir \u00e0 des applications cloud en mode SaaS est devenu une pratique courante pour les DSI et les directions m\u00e9tier. De l\u00e0 est n\u00e9 un nouveau besoin, celui de l\u2019Identity and Access Management pour le cloud. Plusieurs acteurs, se sont d\u2019ores et d\u00e9j\u00e0 positionn\u00e9s sur ce march\u00e9, certains venant du monde traditionnel de l\u2019IAM (Ping Identity, CA, SailPoint\u2026), d\u2019autres \u00e9tant des pure players du cloud tels qu\u2019Okta ou OneLogin.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Fotolia_28329734_M-illsutation-construction-Solucom-2015.jpg","width":1722,"height":1103},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/identite-dans-le-cloud-le-marche-se-structure-quid-de-lapproche-de-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Identit\u00e9 dans le cloud : le march\u00e9 se structure, quid de l\u2019approche de Microsoft ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f8973255a6a608512a172f3316317933","name":"Hamza KHARBACHI","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/hamza-kharbachi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/236"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5000"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5000\/revisions"}],"predecessor-version":[{"id":9242,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5000\/revisions\/9242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/2461"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5000"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}