{"id":8694,"date":"2016-01-13T10:29:20","date_gmt":"2016-01-13T09:29:20","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8694"},"modified":"2019-12-31T10:27:32","modified_gmt":"2019-12-31T09:27:32","slug":"iam-dans-le-cloud-est-ce-le-moment-de-se-lancer","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/","title":{"rendered":"IAM dans le Cloud : est-ce le moment de se lancer ?"},"content":{"rendered":"<p><em>La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).<\/em><\/p>\n<p><em>Le principal frein rencontr\u00e9 jusqu\u2019ici \u00e9tait de voir toutes ses donn\u00e9es externalis\u00e9es. Ce frein est petit \u00e0 petit en train de dispara\u00eetre lorsque l\u2019on se rend compte qu\u2019elles le sont d\u00e9j\u00e0. En effet, le syst\u00e8me RH comme le CRM sont, pour bon nombre d\u2019entreprises, d\u00e9j\u00e0 dans le cloud\u00a0! Les donn\u00e9es critiques li\u00e9es au m\u00e9tier de l\u2019entreprise sont elles-m\u00eames d\u00e9j\u00e0 externalis\u00e9es \u00e0 travers les solutions de messagerie et autres suites collaboratives en mode SaaS. Pour quelles raisons l\u2019IAM \u00e9chapperait-il \u00e0 cette r\u00e9volution\u00a0?<\/em><\/p>\n<h2>Identity Access Management As A Service (IAMaaS)\u00a0: qu\u2019est-ce que cela repr\u00e9sente r\u00e9ellement\u00a0?<\/h2>\n<p>Les offres d\u2019IAM en cloud permettent de g\u00e9rer et f\u00e9d\u00e9rer diff\u00e9rentes ressources. Si elles sont bien utilis\u00e9es, elles peuvent \u00eatre un vrai acc\u00e9l\u00e9rateur pour les m\u00e9tiers de l\u2019entreprise. Mais comme tout service dans le cloud, il y a des avantages (co\u00fbts, mises \u00e0 jour r\u00e9guli\u00e8res, etc.) et des inconv\u00e9nients (contr\u00f4le des donn\u00e9es, protocoles et formats parfois non standards, etc.).<\/p>\n<p>Les clients et les partenaires, tout comme les employ\u00e9s ou prestataires, peuvent b\u00e9n\u00e9ficier de la f\u00e9d\u00e9ration d&#8217;identit\u00e9s. De m\u00eame, des connecteurs sp\u00e9cifiques sont mis en \u0153uvre pour les applications SaaS ou <em>on-premises<\/em>, utilis\u00e9es par l&#8217;entreprise. Les utilisateurs peuvent se connecter via n&#8217;importe quel type de terminal. Il reste quelques incontournables pour profiter pleinement d\u2019un IAMaaS et en garder la ma\u00eetrise\u00a0: la capacit\u00e9 de faire des revues de comptes, la disponibilit\u00e9 des connecteurs de <em>provisioning<\/em> vers les applications et la ma\u00eetrise de l\u2019envoi dans le cloud de donn\u00e9es \u00e0 caract\u00e8re personnel.<\/p>\n<h2>Externalisation de l\u2019IAM\u00a0: penser avant tout \u00e0 la maturit\u00e9 du SI<\/h2>\n<p>La capacit\u00e9 du SI \u00e0 adopter des standards et des protocoles ouverts est un sujet cl\u00e9 pour r\u00e9ussir un d\u00e9ploiement d\u2019IAM dans le cloud.<\/p>\n<p>Il faut donc, apr\u00e8s avoir choisi un premier p\u00e9rim\u00e8tre d&#8217;application, s&#8217;assurer que ce dernier respecte les normes et bonnes pratiques en vigueur concernant l&#8217;authentification et la gestion des identit\u00e9s. De m\u00eame l\u2019existence d&#8217;un r\u00e9f\u00e9rentiel interne centralis\u00e9, afin de communiquer avec la solution d&#8217;IAM, sera n\u00e9cessaire dans la majorit\u00e9 des cas.<\/p>\n<p>Enfin, en prenant la probl\u00e9matique dans l\u2019autre sens, c\u2019est aussi une opportunit\u00e9 de fournir tr\u00e8s rapidement aux nouveaux projets une plate-forme m\u00e2ture supportant les derniers standards\u00a0: f\u00e9d\u00e9ration, authentification mobile, <em>provisioning<\/em>, etc.<\/p>\n<h2>Anticiper les risques\u00a0: plus qu\u2019un besoin, une n\u00e9cessit\u00e9<\/h2>\n<p>En comparaison avec des solutions <em>on-premises<\/em>, certains risques seront couverts de la m\u00eame mani\u00e8re voire potentiellement mieux par une solution cloud\u00a0: la disponibilit\u00e9 du syst\u00e8me et la compromission des donn\u00e9es. Les fournisseurs sont souvent plus m\u00e2tures que l\u2019entreprise sur le sujet de la r\u00e9silience des infrastructures et ont anticip\u00e9 le cloisonnement vis-\u00e0-vis des administrateurs d\u00e8s la conception du service.<\/p>\n<p>D\u2019autres risques doivent en revanche \u00eatre sp\u00e9cifiquement adress\u00e9s comme\u00a0:<\/p>\n<ul>\n<li>Lar\u00e9versibilit\u00e9: il faut s\u2019assurer qu\u2019il est possible \u00e0 tout moment de r\u00e9cup\u00e9rer ses donn\u00e9es dans un format exploitable et il ne faut faire aucun compromis sur l\u2019utilisation de standards.<\/li>\n<li>L\u2019isolation des donn\u00e9es: cette derni\u00e8re est parfois tr\u00e8s difficile, voire impossible \u00e0 contr\u00f4ler\u00a0; n\u00e9anmoins il est possible de s\u2019assurer de mani\u00e8re contractuelle de l\u2019isolation de ses donn\u00e9es par rapport aux autres clients du fournisseur.<\/li>\n<li>La conformit\u00e9: dans le cadre de certaines obligations (CNIL notamment) il est n\u00e9cessaire de s\u2019assurer que les donn\u00e9es externalis\u00e9es seront h\u00e9berg\u00e9es dans le respect de la norme (en Europe pour la CNIL). Une approche face \u00e0 cela est de recourir au chiffrement des donn\u00e9es avant envoi mais ce n\u2019est pas forc\u00e9ment simple \u00e0 exploiter dans une solution IAM.<\/li>\n<\/ul>\n<h2>Une opportunit\u00e9 pour moderniser son IAM<\/h2>\n<p>L\u2019IAMaaS est une r\u00e9elle opportunit\u00e9 qui permet d\u2019offrir un service stable, standard et moderne aux diff\u00e9rents m\u00e9tiers de l\u2019entreprise.<\/p>\n<p>De m\u00eame, les utilisateurs \u00e9tant habitu\u00e9s aux applications en cloud (accessibles partout, tout le temps et depuis tout terminal), la mise en place d&#8217;une f\u00e9d\u00e9ration g\u00e9r\u00e9e par l&#8217;IAM en cloud et d&#8217;un portail IAM de ce type ne perturbera pas, ou tr\u00e8s peu, leurs habitudes.<\/p>\n<p>Enfin, en plus de des interfaces simples et efficaces propos\u00e9es aux utilisateurs, les solutions d\u2019IAMaaS mettent \u00e0 disposition des API REST modernes, adapt\u00e9s aux applications web (HTML5\/Angular.js) ou aux applications mobiles, permettant \u00e0 celles-ci d\u2019interagir directement dans la gestion des identit\u00e9s. De quoi accompagner la transformation num\u00e9rique que toute entreprise aborde aujourd\u2019hui.<\/p>\n<p>De nombreux acteurs sont aujourd\u2019hui sur ce march\u00e9 actif et l\u2019offre fonctionnelle est tr\u00e8s riche\u00a0: Okta, Salesorce, Microsoft, Ping Identity, Memority, RSA, Cap Gemini, etc.<\/p>\n<p>L\u2019option cloud est aujourd\u2019hui incontournable \u2013 ne serait-ce qu\u2019en phase de cadrage IAM \u2013 et il faut d\u00e9sormais justifier la pertinence et le besoin de rester sur des infrastructures <em>on-premises<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM). Le principal&#8230;<\/p>\n","protected":false},"author":81,"featured_media":8698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[80,3318,145,2554],"coauthors":[905,2555],"class_list":["post-8694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-cloud","tag-digital-identity-tomorrow","tag-iam","tag-iamaas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAM dans le Cloud : est-ce le moment de se lancer ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM dans le Cloud : est-ce le moment de se lancer ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-13T09:29:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4288\" \/>\n\t<meta property=\"og:image:height\" content=\"3498\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bertrand Carlier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bertrand Carlier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\"},\"author\":{\"name\":\"Bertrand Carlier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\"},\"headline\":\"IAM dans le Cloud : est-ce le moment de se lancer ?\",\"datePublished\":\"2016-01-13T09:29:20+00:00\",\"dateModified\":\"2019-12-31T09:27:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\"},\"wordCount\":924,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg\",\"keywords\":[\"Cloud\",\"digital identity tomorrow\",\"IAM\",\"IAMaaS\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\",\"name\":\"IAM dans le Cloud : est-ce le moment de se lancer ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg\",\"datePublished\":\"2016-01-13T09:29:20+00:00\",\"dateModified\":\"2019-12-31T09:27:32+00:00\",\"description\":\"La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg\",\"width\":4288,\"height\":3498},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAM dans le Cloud : est-ce le moment de se lancer ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\",\"name\":\"Bertrand Carlier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAM dans le Cloud : est-ce le moment de se lancer ? - RiskInsight","description":"La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/","og_locale":"en_US","og_type":"article","og_title":"IAM dans le Cloud : est-ce le moment de se lancer ? - RiskInsight","og_description":"La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/","og_site_name":"RiskInsight","article_published_time":"2016-01-13T09:29:20+00:00","article_modified_time":"2019-12-31T09:27:32+00:00","og_image":[{"width":4288,"height":3498,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg","type":"image\/jpeg"}],"author":"Bertrand Carlier","twitter_misc":{"Written by":"Bertrand Carlier","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/"},"author":{"name":"Bertrand Carlier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de"},"headline":"IAM dans le Cloud : est-ce le moment de se lancer ?","datePublished":"2016-01-13T09:29:20+00:00","dateModified":"2019-12-31T09:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/"},"wordCount":924,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg","keywords":["Cloud","digital identity tomorrow","IAM","IAMaaS"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/","name":"IAM dans le Cloud : est-ce le moment de se lancer ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg","datePublished":"2016-01-13T09:29:20+00:00","dateModified":"2019-12-31T09:27:32+00:00","description":"La demande croissante de r\u00e9duction des co\u00fbts d\u2019une part et la maturit\u00e9 de l\u2019offre d\u2019autre part poussent de plus en plus les entreprises au choix des solutions cloud, y compris dans le domaine de l\u2019Identity Access Management (IAM).","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/01\/Fotolia_69211673_Subscription_Monthly_XXL-Business-laptop-with-cloud-computing-flat-design-vector\u00a9-leszekglasne.jpg","width":4288,"height":3498},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/01\/iam-dans-le-cloud-est-ce-le-moment-de-se-lancer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"IAM dans le Cloud : est-ce le moment de se lancer ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de","name":"Bertrand Carlier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8694"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8694\/revisions"}],"predecessor-version":[{"id":8702,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8694\/revisions\/8702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8698"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8694"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}