{"id":2064,"date":"2021-11-01T15:58:51","date_gmt":"2021-11-01T22:58:51","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2064"},"modified":"2023-11-07T16:31:02","modified_gmt":"2023-11-07T21:31:02","slug":"managing-tokens-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","title":{"rendered":"\u0625\u062f\u0627\u0631\u0629 \u0631\u0645\u0648\u0632 \u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0627\u0644\u0644\u064a\u0646\u0629 \u0625\u0644\u0627 \u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0644\u0644\u0623\u062c\u0647\u0632\u0629 \u062a\u0643\u0648\u0646 \u0623\u062d\u064a\u0627\u0646\u0627\u064b \u0623\u0641\u0636\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646. \u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0627\u0644\u062a\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0623\u062e\u0630\u0647\u0627 \u0641\u064a \u0627\u0644\u0627\u0639\u062a\u0628\u0627\u0631 \u0639\u0646\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0628\u064a\u0646 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0648\u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0645\u0646 \u062e\u0644\u0627\u0644\u0647\u0627 \u062a\u0643\u0648\u064a\u0646 \u0631\u0645\u0648\u0632 SecurID \u0627\u0644\u062b\u0627\u0628\u062a\u0629 \u0648\u062a\u0639\u064a\u064a\u0646\u0647\u0627 \u0648\u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.<\/p>","protected":false},"author":6,"featured_media":2065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Hardware Authentication Tokens in the Cloud - RSA<\/title>\n<meta name=\"description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta property=\"og:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T22:58:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:31:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta name=\"twitter:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"Managing Hardware Authentication Tokens in the Cloud\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"name\":\"Managing Hardware Authentication Tokens in the Cloud - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"description\":\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Hardware Authentication Tokens in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"knowsAbout\":[\"multi-factor authentication\",\"passwordless authentication\",\"identity and access management\",\"identity governance and administration\",\"zero trust\",\"threat detection and response\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0625\u062f\u0627\u0631\u0629 \u0631\u0645\u0648\u0632 \u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629 - RSA","description":"\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0627\u0644\u0644\u064a\u0646\u0629 \u0625\u0644\u0627 \u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0644\u0644\u0623\u062c\u0647\u0632\u0629 \u062a\u0643\u0648\u0646 \u0623\u062d\u064a\u0627\u0646\u0627\u064b \u0623\u0641\u0636\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646. \u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0627\u0644\u062a\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0623\u062e\u0630\u0647\u0627 \u0641\u064a \u0627\u0644\u0627\u0639\u062a\u0628\u0627\u0631 \u0639\u0646\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0628\u064a\u0646 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0648\u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0645\u0646 \u062e\u0644\u0627\u0644\u0647\u0627 \u062a\u0643\u0648\u064a\u0646 \u0631\u0645\u0648\u0632 SecurID \u0627\u0644\u062b\u0627\u0628\u062a\u0629 \u0648\u062a\u0639\u064a\u064a\u0646\u0647\u0627 \u0648\u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_locale":"ar_AR","og_type":"article","og_title":"Managing Hardware Authentication Tokens in the Cloud","og_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","og_url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_site_name":"RSA","article_published_time":"2021-11-01T22:58:51+00:00","article_modified_time":"2023-11-07T21:31:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"Managing Hardware Authentication Tokens in the Cloud","twitter_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"Managing Hardware Authentication Tokens in the Cloud","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","articleSection":["Products and Solutions"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","name":"\u0625\u062f\u0627\u0631\u0629 \u0631\u0645\u0648\u0632 \u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","description":"\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0633\u0647\u0648\u0644\u0629 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0627\u0644\u0644\u064a\u0646\u0629 \u0625\u0644\u0627 \u0623\u0646 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0645\u0645\u064a\u0632\u0629 \u0644\u0644\u0623\u062c\u0647\u0632\u0629 \u062a\u0643\u0648\u0646 \u0623\u062d\u064a\u0627\u0646\u0627\u064b \u0623\u0641\u0636\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646. \u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0627\u0644\u062a\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0623\u062e\u0630\u0647\u0627 \u0641\u064a \u0627\u0644\u0627\u0639\u062a\u0628\u0627\u0631 \u0639\u0646\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0628\u064a\u0646 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0648\u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0645\u0646 \u062e\u0644\u0627\u0644\u0647\u0627 \u062a\u0643\u0648\u064a\u0646 \u0631\u0645\u0648\u0632 SecurID \u0627\u0644\u062b\u0627\u0628\u062a\u0629 \u0648\u062a\u0639\u064a\u064a\u0646\u0647\u0627 \u0648\u0625\u062f\u0627\u0631\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/ar\/"},{"@type":"ListItem","position":2,"name":"Managing Hardware Authentication Tokens in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\u062d\u0644\u0648\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0631\u0642\u0645\u064a\u0629","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"},"knowsAbout":["multi-factor authentication","passwordless authentication","identity and access management","identity governance and administration","zero trust","threat detection and response"]},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"\u0628\u0646 \u0644\u064a\u0628\u0648","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":27155,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2064\/revisions\/27155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media\/2065"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"\u062f\u0628\u0644\u064a\u0648 \u0628\u064a","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}