{"id":9250,"date":"2016-10-28T09:23:33","date_gmt":"2016-10-28T08:23:33","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=9250"},"modified":"2019-12-31T10:16:31","modified_gmt":"2019-12-31T09:16:31","slug":"eidas-route-vers-europe-de-confiance-numerique","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/","title":{"rendered":"Nouveau r\u00e8glement eIDAS :  en route vers une Europe de la confiance num\u00e9rique"},"content":{"rendered":"<p>Le\u00a0r\u00e8glement eIDAS (Electronic IDentification And trust Services) est entr\u00e9 en vigueur le 1<sup>er<\/sup> juillet 2016. Comme rappel\u00e9 dans notre premier article sur ce sujet, l\u2019objectif de ce r\u00e8glement est <em><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\">\u00ab d\u2019instaurer un climat de confiance dans l\u2019environnement en ligne \u00bb<\/a><\/em> en fournissant<strong> un cadre europ\u00e9en intersectoriel<\/strong> complet pour des transactions \u00e9lectroniques s\u00fbres, fiables et simplifi\u00e9es entre citoyens et entreprises.<\/p>\n<p>&nbsp;<\/p>\n<h2>VERS UN CADRE COMMUN<\/h2>\n<p>Bien qu\u2019aujourd\u2019hui le r\u00e8glement reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il y apporte cependant quelques modifications, et de nouvelles dispositions, renfor\u00e7ant ainsi cette reconnaissance europ\u00e9enne des services de confiance. Le r\u00e8glement d\u00e9termine notamment :<\/p>\n<ul>\n<li>Les conditions dans lesquelles un \u00c9tat membre reconna\u00eet les moyens d\u2019identification \u00e9lectronique des personnes physiques et morales qui rel\u00e8vent d\u2019un sch\u00e9ma d\u2019identification \u00e9lectronique notifi\u00e9 d\u2019un autre \u00c9tat membre\u00a0;<\/li>\n<li>Les r\u00e8gles applicables aux services de confiance, en particulier pour les transactions \u00e9lectroniques\u00a0;<\/li>\n<li>Le cadre juridique pour les services de signatures \u00e9lectroniques, de cachets \u00e9lectroniques, d\u2019horodatages \u00e9lectroniques, de documents \u00e9lectroniques, d\u2019envoi recommand\u00e9 \u00e9lectronique et les services de certificats pour l\u2019authentification de site internet.<\/li>\n<\/ul>\n<p>Contrairement \u00e0 la directive 1999\/93\/CE, eIDAS est un r\u00e8glement, <strong>il n\u2019y a donc pas de transposition nationale<\/strong>, le texte est applicable pour l\u2019ensemble des \u00c9tats membres.<\/p>\n<p>&nbsp;<\/p>\n<h2>VERS UNE HARMONISATION EUROP\u00c9ENNE\u00a0: LES POINTS CL\u00c9S<\/h2>\n<p>Le r\u00e8glement introduit un certain nombre de nouvelles notions, parmi lesquelles on peut noter\u00a0:<\/p>\n<ul>\n<li><strong>L\u2019acceptation<\/strong> <strong>du document \u00e9lectronique en tant que preuve devant la justice<\/strong>;<\/li>\n<li><strong>La cr\u00e9ation d\u2019un label de confiance<\/strong> pour un march\u00e9 plus transparent\u00a0;<\/li>\n<li>L\u2019encadrement des m\u00e9thodes de validation de signatures qualifi\u00e9es par le biais de prestataires de services de confiance\u00a0;<\/li>\n<li>Le service de conservation qualifi\u00e9 des signatures \u00e9lectroniques qualifi\u00e9es pour garantir la fiabilit\u00e9 des signatures et donc leur valeur dans le temps\u00a0;<\/li>\n<li>L\u2019horodatage au niveau europ\u00e9en permettant une reconnaissance de la datation et de l\u2019int\u00e9grit\u00e9 de donn\u00e9es num\u00e9rique et donc de la validit\u00e9 juridique du document dans toute l\u2019UE\u00a0;<\/li>\n<li>L\u2019obligation pour les \u00c9tats membres de maintenir des listes de confiance des services et prestataires qualifi\u00e9s et lab\u00e9lis\u00e9s \u00e0 disposition du grand public\u00a0;<\/li>\n<li>L\u2019assouplissement de la signature s\u00e9curis\u00e9e : reconnaissance de la signature cr\u00e9\u00e9e \u00e0 distance par un tiers de confiance au nom du signataire pour faciliter les usages en mobilit\u00e9.<\/li>\n<\/ul>\n<p>Parmi les autres points remarquables, nous pouvons citer l\u2019apparition d\u2019un <strong>nouveau principe juridique<\/strong>\u00a0: <strong>la signature \u00e9lectronique de personne morale<\/strong>. Le cachet \u00e9lectronique permettra donc aux entreprises et administrations de signer \u00e9lectroniquement en leur nom des documents afin de certifier leur provenance. Concr\u00e8tement, un juge fran\u00e7ais ne pourra pas refuser un cachet ou une signature \u00e9lectronique appos\u00e9 par un italien avec une solution allemande. Enfin, nous pouvons \u00e9galement souligner <strong>l\u2019introduction de la notion de signature qualifi\u00e9e c\u00f4t\u00e9 serveur<\/strong>, ce qui permettra otamment le d\u00e9veloppement de nouvelles offres (en SaaS), objectif clairement affich\u00e9 de ce nouveau r\u00e8glement.<\/p>\n<p>eIDAS <strong>d\u00e9finit ainsi une graduation en 3 niveaux de signature de personne physique<\/strong>, synth\u00e9tis\u00e9 dans le tableau ci-dessous,<strong> contre 2 niveaux anciennement<\/strong> pour la directive.<\/p>\n<p style=\"text-align: center;\"><em>3 niveaux de signature physique<\/em><\/p>\n<figure id=\"post-9253 media-9253\" class=\"align-none\">\n<figure id=\"post-9289 media-9289\" class=\"align-none\">\n<figure id=\"post-9314 media-9314\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9314 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/Capture.png\" alt=\"3 niveau de signature eidas\" width=\"1226\" height=\"540\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/Capture.png 1226w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/Capture-434x191.png 434w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/Capture-768x338.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/Capture-71x31.png 71w\" sizes=\"auto, (max-width: 1226px) 100vw, 1226px\" \/><\/figure>\n<\/figure>\n<\/figure>\n<h2>L\u2019Europe s\u2019int\u00e9resse \u00e0 l\u2019adoption de ces technologies dans les pays membres<\/h2>\n<p>Les autorit\u00e9s europ\u00e9ennes, en particulier la direction g\u00e9n\u00e9rale de l\u2019informatique (DG DIGIT) en charge des 4 piliers fondamentaux que sont l\u2019eInvoicing, l\u2019eDelivery, l\u2019eSignature et l\u2019eID, ont souhait\u00e9 \u00e9valuer concr\u00e8tement les forces en pr\u00e9sence dans chaque pays. \u00c0 ce titre, ils ont fait r\u00e9aliser par Wavestone Luxembourg un sondage et organis\u00e9 des groupes de travail \u00e0 l\u2019\u00e9chelle europ\u00e9enne pour identifier les acteurs pr\u00e9sents sur le march\u00e9 et leurs besoins. Les diff\u00e9rentes solutions pour stimuler l\u2019adoption de chacun de ces piliers fondamentaux ont \u00e9t\u00e9 analys\u00e9es et discut\u00e9es avec l\u2019ensemble des acteurs. R\u00e9sultats \u00e0 venir\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le\u00a0r\u00e8glement eIDAS (Electronic IDentification And trust Services) est entr\u00e9 en vigueur le 1er juillet 2016. Comme rappel\u00e9 dans notre premier article sur ce sujet, l\u2019objectif de ce r\u00e8glement est \u00ab d\u2019instaurer un climat de confiance dans l\u2019environnement en ligne \u00bb&#8230;<\/p>\n","protected":false},"author":251,"featured_media":9284,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[2626,2960,144,78,3314],"coauthors":[1561,1719],"class_list":["post-9250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-eidas","tag-eu","tag-identite","tag-reglementation","tag-trusted-services-eidas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique - RiskInsight<\/title>\n<meta name=\"description\" content=\"Bien que le r\u00e8glement eIDAS reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il apporte cependant quelques modifications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Bien que le r\u00e8glement eIDAS reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il apporte cependant quelques modifications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-28T08:23:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:16:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"5000\" \/>\n\t<meta property=\"og:image:height\" content=\"5000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Florian Feuillard, Matthieu Guillaume\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian Feuillard, Matthieu Guillaume\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\"},\"author\":{\"name\":\"Florian Feuillard\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34\"},\"headline\":\"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique\",\"datePublished\":\"2016-10-28T08:23:33+00:00\",\"dateModified\":\"2019-12-31T09:16:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg\",\"keywords\":[\"eIDAS\",\"EU\",\"identit\u00e9\",\"R\u00e8glementation\",\"trusted services &amp; eIDAS\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\",\"name\":\"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg\",\"datePublished\":\"2016-10-28T08:23:33+00:00\",\"dateModified\":\"2019-12-31T09:16:31+00:00\",\"description\":\"Bien que le r\u00e8glement eIDAS reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il apporte cependant quelques modifications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg\",\"width\":5000,\"height\":5000,\"caption\":\"Rocket Icon in Flat Style. Vector illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34\",\"name\":\"Florian Feuillard\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florian-feuillard\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique - RiskInsight","description":"Bien que le r\u00e8glement eIDAS reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il apporte cependant quelques modifications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/","og_locale":"en_US","og_type":"article","og_title":"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique - RiskInsight","og_description":"Bien que le r\u00e8glement eIDAS reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il apporte cependant quelques modifications.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/","og_site_name":"RiskInsight","article_published_time":"2016-10-28T08:23:33+00:00","article_modified_time":"2019-12-31T09:16:31+00:00","og_image":[{"width":5000,"height":5000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg","type":"image\/jpeg"}],"author":"Florian Feuillard, Matthieu Guillaume","twitter_misc":{"Written by":"Florian Feuillard, Matthieu Guillaume","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/"},"author":{"name":"Florian Feuillard","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34"},"headline":"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique","datePublished":"2016-10-28T08:23:33+00:00","dateModified":"2019-12-31T09:16:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/"},"wordCount":679,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg","keywords":["eIDAS","EU","identit\u00e9","R\u00e8glementation","trusted services &amp; eIDAS"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/","name":"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg","datePublished":"2016-10-28T08:23:33+00:00","dateModified":"2019-12-31T09:16:31+00:00","description":"Bien que le r\u00e8glement eIDAS reprenne la majeure partie des dispositions de la directive qu\u2019il abroge, il apporte cependant quelques modifications.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/10\/0_VklfQnVzXzAwMl9DX0Y.jpg","width":5000,"height":5000,"caption":"Rocket Icon in Flat Style. Vector illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/10\/eidas-route-vers-europe-de-confiance-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Nouveau r\u00e8glement eIDAS : en route vers une Europe de la confiance num\u00e9rique"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34","name":"Florian Feuillard","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florian-feuillard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/251"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=9250"}],"version-history":[{"count":17,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9250\/revisions"}],"predecessor-version":[{"id":12509,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9250\/revisions\/12509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9284"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=9250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=9250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=9250"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=9250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}