{"id":2064,"date":"2021-11-01T15:58:51","date_gmt":"2021-11-01T22:58:51","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2064"},"modified":"2023-11-07T16:31:02","modified_gmt":"2023-11-07T21:31:02","slug":"managing-tokens-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","title":{"rendered":"\u0625\u062f\u0627\u0631\u0629 \u0631\u0645\u0648\u0632 \u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0627\u0644\u0644\u064a\u0646\u0629 \u0625\u0644\u0627 \u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0644\u0644\u0623\u062c\u0647\u0632\u0629 \u062a\u0643\u0648\u0646 \u0623\u062d\u064a\u0627\u0646\u0627\u064b \u0623\u0641\u0636\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646. \u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0627\u0644\u062a\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0623\u062e\u0630\u0647\u0627 \u0641\u064a \u0627\u0644\u0627\u0639\u062a\u0628\u0627\u0631 \u0639\u0646\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0628\u064a\u0646 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0648\u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0645\u0646 \u062e\u0644\u0627\u0644\u0647\u0627 \u062a\u0643\u0648\u064a\u0646 \u0631\u0645\u0648\u0632 SecurID \u0627\u0644\u062b\u0627\u0628\u062a\u0629 \u0648\u062a\u0639\u064a\u064a\u0646\u0647\u0627 \u0648\u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.<\/p>","protected":false},"author":2,"featured_media":2065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Hardware Authentication Tokens in the Cloud - RSA<\/title>\n<meta name=\"description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta property=\"og:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T22:58:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:31:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta name=\"twitter:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Managing Hardware Authentication Tokens in the Cloud\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"name\":\"Managing Hardware Authentication Tokens in the Cloud - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"description\":\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Hardware Authentication Tokens in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0625\u062f\u0627\u0631\u0629 \u0631\u0645\u0648\u0632 \u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629 - RSA","description":"\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0627\u0644\u0644\u064a\u0646\u0629 \u0625\u0644\u0627 \u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0644\u0644\u0623\u062c\u0647\u0632\u0629 \u062a\u0643\u0648\u0646 \u0623\u062d\u064a\u0627\u0646\u0627\u064b \u0623\u0641\u0636\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646. \u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0627\u0644\u062a\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0623\u062e\u0630\u0647\u0627 \u0641\u064a \u0627\u0644\u0627\u0639\u062a\u0628\u0627\u0631 \u0639\u0646\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0628\u064a\u0646 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0648\u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0645\u0646 \u062e\u0644\u0627\u0644\u0647\u0627 \u062a\u0643\u0648\u064a\u0646 \u0631\u0645\u0648\u0632 SecurID \u0627\u0644\u062b\u0627\u0628\u062a\u0629 \u0648\u062a\u0639\u064a\u064a\u0646\u0647\u0627 \u0648\u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_locale":"ar_AR","og_type":"article","og_title":"Managing Hardware Authentication Tokens in the Cloud","og_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","og_url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_site_name":"RSA","article_published_time":"2021-11-01T22:58:51+00:00","article_modified_time":"2023-11-07T21:31:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Managing Hardware Authentication Tokens in the Cloud","twitter_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Managing Hardware Authentication Tokens in the Cloud","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","articleSection":["Products and Solutions"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","url":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","name":"\u0625\u062f\u0627\u0631\u0629 \u0631\u0645\u0648\u0632 \u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","description":"\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0627\u0644\u0644\u064a\u0646\u0629 \u0625\u0644\u0627 \u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0644\u0644\u0623\u062c\u0647\u0632\u0629 \u062a\u0643\u0648\u0646 \u0623\u062d\u064a\u0627\u0646\u0627\u064b \u0623\u0641\u0636\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646. \u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0627\u0644\u062a\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0623\u062e\u0630\u0647\u0627 \u0641\u064a \u0627\u0644\u0627\u0639\u062a\u0628\u0627\u0631 \u0639\u0646\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0628\u064a\u0646 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0648\u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0645\u0646 \u062e\u0644\u0627\u0644\u0647\u0627 \u062a\u0643\u0648\u064a\u0646 \u0631\u0645\u0648\u0632 SecurID \u0627\u0644\u062b\u0627\u0628\u062a\u0629 \u0648\u062a\u0639\u064a\u064a\u0646\u0647\u0627 \u0648\u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Managing Hardware Authentication Tokens in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\u062d\u0644\u0648\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0631\u0642\u0645\u064a\u0629","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"\u0645\u064a\u0644\u064a\u0646\u062f\u0627 \u0623\u0648\u0643\u0648\u0646\u0648\u0631","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":27155,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2064\/revisions\/27155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media\/2065"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"\u062f\u0628\u0644\u064a\u0648 \u0628\u064a","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}