{"id":6582,"date":"2014-12-02T15:02:43","date_gmt":"2014-12-02T14:02:43","guid":{"rendered":"http:\/\/www.solucom-insight.fr\/?p=6582"},"modified":"2019-12-31T11:07:23","modified_gmt":"2019-12-31T10:07:23","slug":"iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/","title":{"rendered":"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ?"},"content":{"rendered":"<p><em>\u00c0 n\u2019en pas douter, un projet de gestion des identit\u00e9s est un projet de transformation : processus op\u00e9rationnels, organisations et moyens informatiques sont amen\u00e9s \u00e0 \u00eatre analys\u00e9s, \u00e9valu\u00e9s et enfin am\u00e9lior\u00e9s. Et si ce domaine peut se pr\u00e9valoir de tr\u00e8s belles r\u00e9ussites, il est \u00e9galement entach\u00e9 d\u2019\u00e9checs, a minima partiels. L\u2019IAG d\u00e9tient-elle une partie des cl\u00e9s du succ\u00e8s de ses projets ?<\/em><\/p>\n<h2>D\u2019o\u00f9 proviennent les \u00e9checs en mati\u00e8re d\u2019IAM ? Pourquoi parler d\u2019IAG ?<\/h2>\n<p>L\u2019analyse de ces \u00e9checs r\u00e9v\u00e8le deux causes majeures. La premi\u00e8re : l\u2019inad\u00e9quation entre les ambitions vis\u00e9es et les moyens allou\u00e9s. Elle se traduit concr\u00e8tement par l\u2019absence de gouvernance et de sponsoring transverse, de vision strat\u00e9gique moyen terme reflet des enjeux m\u00e9tier ou encore de dynamique de construction et d\u2019am\u00e9lioration dans la dur\u00e9e.<\/p>\n<p>La seconde : l\u2019absence de m\u00e9trique et d\u2019outillage simple permettant de d\u00e9montrer et de communiquer sur la situation r\u00e9elle des habilitations, les apports ou encore le bien-fond\u00e9 des choix retenus. C\u2019est \u00e0 ce second \u00e9cueil que doit r\u00e9pondre l\u2019IAG (Identity and Acces Governance.\u00a0Par effet de rebond, elle doit \u00e9galement fournir les indicateurs op\u00e9rationnels pour mieux mobiliser les bons relais dans le management et dans les m\u00e9tiers.<\/p>\n<h2>Qu\u2019est-ce que l\u2019IAG ? Quelles fonctionnalit\u00e9s en attendre ?<\/h2>\n<p>De mani\u00e8re simplifi\u00e9e, l\u2019IAG (parfois \u00e9galement appel\u00e9e Identity &amp; Access Intelligence ou encore Identity Analytics &amp; Intelligence voire Governance Risk &amp; Compliance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.<\/p>\n<p>Pour ce faire, elle se positionne comme une \u00ab tour de contr\u00f4le transverse \u00bb, aliment\u00e9e autant par les r\u00e9f\u00e9rentiels Qualit\u00e9 et les r\u00e8gles du contr\u00f4le interne que les donn\u00e9es de l\u2019IAM et des applications. Au-del\u00e0 du contr\u00f4le, l\u2019IAG doit \u00e9galement offrir des moyens de rem\u00e9diation.<\/p>\n<p>Concr\u00e8tement, une solution d\u2019IAG va importer l\u2019ensemble des comptes et habilitations pour les comparer avec les r\u00e8gles m\u00e9tiers; et en les croisant avec les sch\u00e9mas d\u2019organisation, elle proposera des bilans structur\u00e9s des \u00e9carts et des risques.<\/p>\n<p>Elle doit ainsi permettre de prendre en compte l\u2019ensemble des r\u00e8gles et contr\u00f4les m\u00e9tiers de l\u2019entreprise (combinaisons toxiques de pouvoirs, acc\u00e8s limit\u00e9s \u00e0 certaines populations, certaines plages horaires&#8230;). Mais aussi de corr\u00e9ler et de pr\u00e9senter les donn\u00e9es op\u00e9rationnelles de l\u2019IAM, et de chaque application, \u00e0 l\u2019aune de ces r\u00e8gles. Enfin d\u2019organiser et suivre les actions de rem\u00e9diation n\u00e9cessaires \u00e0 la correction des \u00e9ventuels \u00e9carts.<\/p>\n<p>C\u2019est donc un service essentiel pour s\u2019assurer du bon fonctionnement et du bon usage du syst\u00e8me IAM, corriger les biais de donn\u00e9es et, in fine, am\u00e9liorer la qualit\u00e9 per\u00e7ue du service rendu. C\u2019est \u00e9galement une cl\u00e9 pour r\u00e9aliser rapidement un diagnostic de l\u2019existant et ainsi d\u00e9clencher une prise de conscience des efforts \u00e0 r\u00e9aliser.<\/p>\n<h2>Dans quels contextes l\u2019IAG est-elle pertinente ?<\/h2>\n<p>Une approche IAG se r\u00e9v\u00e8le int\u00e9ressante autant pour les organisations n\u2019ayant pas engag\u00e9 de d\u00e9marche IAM, que pour celles ayant d\u00e9j\u00e0 conduit certains chantiers.<\/p>\n<p>Pour les premi\u00e8res, le recours \u00e0 l\u2019IAG permet de conduire des d\u00e9marches plus op\u00e9rationnelles, en prise directe et imm\u00e9diate avec l\u2019existant en mati\u00e8re de comptes et de droits sur les applicatifs.<\/p>\n<p>Ainsi, cette approche bottom-up permet de r\u00e9aliser un diagnostic concret, argument\u00e9 d\u2019exemples parlants. La prise de conscience est donc simplifi\u00e9e pour les M\u00e9tiers. L\u2019ensemble des ingr\u00e9dients est alors r\u00e9uni pour engager une d\u00e9marche d\u2019am\u00e9lioration plus structurante.<\/p>\n<p>Pour les secondes, nombre d\u2019initiatives p\u00e2tissent d\u2019un manque d\u2019indicateurs de suivi d\u2019usage et de qualit\u00e9. Ce manque est nuisible \u00e0 la \u00ab qualit\u00e9 per\u00e7ue \u00bb du syst\u00e8me IAM. Il se r\u00e9v\u00e8le \u00e9galement des plus handicapants en cas de suspicion de dysfonctionnement et lors des phases d\u2019investigations associ\u00e9es. Ainsi, l\u2019IAG se pose comme une r\u00e9ponse \u00e0 ce manque de visibilit\u00e9.<\/p>\n<h2>Alors, l\u2019IAG, \u00abpotion magique\u00bb pour r\u00e9ussir son projet de gestion des identit\u00e9s ?<\/h2>\n<p>En informatique, rien n\u2019est magique\u00a0! Toutefois, avec ses fonctionnalit\u00e9s avanc\u00e9es d\u2019analyse et de restitution, l\u2019IAG offre enfin les moyens de mesurer l\u2019efficacit\u00e9 de sa gestion des identit\u00e9s.Et, au prix d\u2019une d\u00e9marche adapt\u00e9e, elle permet une prise de conscience parlante par les M\u00e9tiers et le management.<\/p>\n<p>Les Directions en charge des processus internes, de la qualit\u00e9 ou encore le contr\u00f4le interne ont alors un r\u00f4le cl\u00e9 de sponsoring \u00e0 jouer. Elles doivent supporter les initiatives IAG et garantir leur p\u00e9rennit\u00e9 dans le temps.<\/p>\n<p>En effet, quelques semaines suffisent pour mettre en lumi\u00e8re les menaces et les incoh\u00e9rences majeures port\u00e9s par les habilitations. Et quelques mois permettent de corriger ces \u00e9carts. Mais c\u2019est dans la dur\u00e9e que doit se conduire une strat\u00e9gie IAG, pour inscrire sa gestion des identit\u00e9s dans une d\u00e9marche vertueuse d\u2019am\u00e9lioration durable.<\/p>\n<p>&nbsp;<\/p>\n<p><em>D\u00e9couvrez bient\u00f4t, sur Solucom Insight, comment adapter sa d\u00e9marche projet pour en tirer le meilleur parti.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c0 n\u2019en pas douter, un projet de gestion des identit\u00e9s est un projet de transformation : processus op\u00e9rationnels, organisations et moyens informatiques sont amen\u00e9s \u00e0 \u00eatre analys\u00e9s, \u00e9valu\u00e9s et enfin am\u00e9lior\u00e9s. Et si ce domaine peut se pr\u00e9valoir de tr\u00e8s&#8230;<\/p>\n","protected":false},"author":82,"featured_media":5026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[789,1727,145,3305],"coauthors":[906],"class_list":["post-6582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-gestion-des-identites","tag-iag","tag-iam","tag-identity-access-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"L\u2019IAG (Identity &amp; Access Governance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"L\u2019IAG (Identity &amp; Access Governance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-02T14:02:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:07:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Marache\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Marache\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\"},\"author\":{\"name\":\"Patrick Marache\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16592c3b3a2068ec86df3a1e0816c903\"},\"headline\":\"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ?\",\"datePublished\":\"2014-12-02T14:02:43+00:00\",\"dateModified\":\"2019-12-31T10:07:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\"},\"wordCount\":915,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"keywords\":[\"gestion des identit\u00e9s\",\"IAG\",\"IAM\",\"identity &amp; access management\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\",\"name\":\"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"datePublished\":\"2014-12-02T14:02:43+00:00\",\"dateModified\":\"2019-12-31T10:07:23+00:00\",\"description\":\"L\u2019IAG (Identity & Access Governance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"width\":1800,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16592c3b3a2068ec86df3a1e0816c903\",\"name\":\"Patrick Marache\",\"description\":\"Manager au sein de la pratice Risk Management et S\u00e9curit\u00e9, Patrick poss\u00e8de pr\u00e8s de 15 ans d\u2019exp\u00e9rience. Il conseille nos clients fran\u00e7ais et internationaux dans leurs programmes de gestion des identit\u00e9s et de transformation de la relation digitale. @pkmarache\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/patrick-marache\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ? - RiskInsight","description":"L\u2019IAG (Identity & Access Governance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/","og_locale":"en_US","og_type":"article","og_title":"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ? - RiskInsight","og_description":"L\u2019IAG (Identity & Access Governance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/","og_site_name":"RiskInsight","article_published_time":"2014-12-02T14:02:43+00:00","article_modified_time":"2019-12-31T10:07:23+00:00","og_image":[{"width":1800,"height":1350,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","type":"image\/jpeg"}],"author":"Patrick Marache","twitter_misc":{"Written by":"Patrick Marache","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/"},"author":{"name":"Patrick Marache","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16592c3b3a2068ec86df3a1e0816c903"},"headline":"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ?","datePublished":"2014-12-02T14:02:43+00:00","dateModified":"2019-12-31T10:07:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/"},"wordCount":915,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","keywords":["gestion des identit\u00e9s","IAG","IAM","identity &amp; access management"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/","name":"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","datePublished":"2014-12-02T14:02:43+00:00","dateModified":"2019-12-31T10:07:23+00:00","description":"L\u2019IAG (Identity & Access Governance) vise \u00e0 fournir les moyens n\u00e9cessaires au pilotage des donn\u00e9es et des usages de l\u2019IAM.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","width":1800,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/12\/iag-la-gestion-des-identites-t-elle-enfin-des-yeux-et-des-oreilles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"IAG: la gestion des identit\u00e9s a-t-elle enfin des yeux et des oreilles ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16592c3b3a2068ec86df3a1e0816c903","name":"Patrick Marache","description":"Manager au sein de la pratice Risk Management et S\u00e9curit\u00e9, Patrick poss\u00e8de pr\u00e8s de 15 ans d\u2019exp\u00e9rience. Il conseille nos clients fran\u00e7ais et internationaux dans leurs programmes de gestion des identit\u00e9s et de transformation de la relation digitale. @pkmarache","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/patrick-marache\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/6582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=6582"}],"version-history":[{"count":1,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/6582\/revisions"}],"predecessor-version":[{"id":6583,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/6582\/revisions\/6583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/5026"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=6582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=6582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=6582"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=6582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}