{"id":2027,"date":"2022-04-27T15:23:57","date_gmt":"2022-04-27T22:23:57","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2027"},"modified":"2023-11-07T15:22:07","modified_gmt":"2023-11-07T20:22:07","slug":"public-sector-identity-needs","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","title":{"rendered":"Les capacit\u00e9s d'identification dont le secteur public a besoin pour s\u00e9curiser les acc\u00e8s"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Pour de nombreuses agences f\u00e9d\u00e9rales hautement s\u00e9curis\u00e9es et autres organisations sensibles en mati\u00e8re de s\u00e9curit\u00e9, les jetons physiques constituent la r\u00e9f\u00e9rence en mati\u00e8re d'authentification forte. ID Plus offre \u00e0 ces organisations la commodit\u00e9 de g\u00e9rer les jetons physiques dans le cloud, associ\u00e9e \u00e0 la s\u00e9curit\u00e9 d'une authentification multifactorielle (MFA) hautement disponible bas\u00e9e sur le basculement. <\/p>","protected":false},"author":2,"featured_media":3325,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Identity Capabilities the Public Sector Needs to Secure Access - RSA<\/title>\n<meta name=\"description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Identity Capabilities the Public Sector Needs to Secure Access\" \/>\n<meta property=\"og:description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T22:23:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T20:22:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Identity Capabilities the Public Sector Needs to Secure Access\" \/>\n<meta name=\"twitter:description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"The Identity Capabilities the Public Sector Needs to Secure Access\",\"datePublished\":\"2022-04-27T22:23:57+00:00\",\"dateModified\":\"2023-11-07T20:22:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\",\"name\":\"The Identity Capabilities the Public Sector Needs to Secure Access - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"datePublished\":\"2022-04-27T22:23:57+00:00\",\"dateModified\":\"2023-11-07T20:22:07+00:00\",\"description\":\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"width\":1200,\"height\":675,\"caption\":\"The Identity Capabilities the Public Sector Needs to Secure Access\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Identity Capabilities the Public Sector Needs to Secure Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les capacit\u00e9s d'identit\u00e9 dont le secteur public a besoin pour s\u00e9curiser l'acc\u00e8s - RSA","description":"D\u00e9couvrez les capacit\u00e9s essentielles dont les organismes du secteur public et les organisations sensibles \u00e0 la s\u00e9curit\u00e9 ont besoin pour s\u00e9curiser l'acc\u00e8s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","og_locale":"fr_FR","og_type":"article","og_title":"The Identity Capabilities the Public Sector Needs to Secure Access","og_description":"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","og_site_name":"RSA","article_published_time":"2022-04-27T22:23:57+00:00","article_modified_time":"2023-11-07T20:22:07+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"The Identity Capabilities the Public Sector Needs to Secure Access","twitter_description":"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"The Identity Capabilities the Public Sector Needs to Secure Access","datePublished":"2022-04-27T22:23:57+00:00","dateModified":"2023-11-07T20:22:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","articleSection":["Products and Solutions"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","url":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","name":"Les capacit\u00e9s d'identit\u00e9 dont le secteur public a besoin pour s\u00e9curiser l'acc\u00e8s - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","datePublished":"2022-04-27T22:23:57+00:00","dateModified":"2023-11-07T20:22:07+00:00","description":"D\u00e9couvrez les capacit\u00e9s essentielles dont les organismes du secteur public et les organisations sensibles \u00e0 la s\u00e9curit\u00e9 ont besoin pour s\u00e9curiser l'acc\u00e8s.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","width":1200,"height":675,"caption":"The Identity Capabilities the Public Sector Needs to Secure Access"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"The Identity Capabilities the Public Sector Needs to Secure Access"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/2027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=2027"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/2027\/revisions"}],"predecessor-version":[{"id":27135,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/2027\/revisions\/27135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/3325"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=2027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=2027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=2027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}