{"id":34151,"date":"2025-06-24T15:01:02","date_gmt":"2025-06-24T19:01:02","guid":{"rendered":"https:\/\/www.rsa.com\/?p=34151"},"modified":"2025-11-18T13:08:44","modified_gmt":"2025-11-18T18:08:44","slug":"phishing-resistant-passwordless-best-practices-read-the-gartner-report","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/","title":{"rendered":"Meilleures pratiques de r\u00e9sistance au phishing sans mot de passe : Lire le rapport Gartner"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":34153,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-34151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-passwordless"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report - RSA<\/title>\n<meta name=\"description\" content=\"Read the Gartner\u00ae report to learn the best practices identity and access management (IAM) need to implement passwordless solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report\" \/>\n<meta property=\"og:description\" content=\"Read the Gartner\u00ae report to learn the best practices identity and access management (IAM) need to implement passwordless solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T19:01:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T18:08:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-social-opengraph.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report\" \/>\n<meta name=\"twitter:description\" content=\"Read the Gartner\u00ae report to learn the best practices identity and access management (IAM) need to implement passwordless solutions.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-social-opengraph.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report\",\"datePublished\":\"2025-06-24T19:01:02+00:00\",\"dateModified\":\"2025-11-18T18:08:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp\",\"articleSection\":[\"Passwordless\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/\",\"name\":\"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp\",\"datePublished\":\"2025-06-24T19:01:02+00:00\",\"dateModified\":\"2025-11-18T18:08:44+00:00\",\"description\":\"Read the Gartner\u00ae report to learn the best practices identity and access management (IAM) need to implement passwordless solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp\",\"width\":1200,\"height\":630,\"caption\":\"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/pt_br\\\/resources\\\/blog\\\/passwordless\\\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pratiques d'excellence sans mot de passe r\u00e9sistantes au phishing : Lire le rapport Gartner\u00ae - RSA","description":"Lisez le rapport Gartner\u00ae pour conna\u00eetre les meilleures pratiques en mati\u00e8re de gestion des identit\u00e9s et des acc\u00e8s (IAM) n\u00e9cessaires \u00e0 la mise en \u0153uvre de solutions sans mot de passe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/","og_locale":"fr_FR","og_type":"article","og_title":"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report","og_description":"Read the Gartner\u00ae report to learn the best practices identity and access management (IAM) need to implement passwordless solutions.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/","og_site_name":"RSA","article_published_time":"2025-06-24T19:01:02+00:00","article_modified_time":"2025-11-18T18:08:44+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-social-opengraph.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report","twitter_description":"Read the Gartner\u00ae report to learn the best practices identity and access management (IAM) need to implement passwordless solutions.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-social-opengraph.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report","datePublished":"2025-06-24T19:01:02+00:00","dateModified":"2025-11-18T18:08:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/"},"wordCount":8,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp","articleSection":["Passwordless"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/","url":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/","name":"Pratiques d'excellence sans mot de passe r\u00e9sistantes au phishing : Lire le rapport Gartner\u00ae - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp","datePublished":"2025-06-24T19:01:02+00:00","dateModified":"2025-11-18T18:08:44+00:00","description":"Lisez le rapport Gartner\u00ae pour conna\u00eetre les meilleures pratiques en mati\u00e8re de gestion des identit\u00e9s et des acc\u00e8s (IAM) n\u00e9cessaires \u00e0 la mise en \u0153uvre de solutions sans mot de passe.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/phishing-resistant-passwordless-best-practices-read-the-gartner-report-rsa-blog.webp","width":1200,"height":630,"caption":"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/passwordless\/phishing-resistant-passwordless-best-practices-read-the-gartner-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Phishing-Resistant Passwordless Best Practices: Read the Gartner\u00ae Report"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/34151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=34151"}],"version-history":[{"count":10,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/34151\/revisions"}],"predecessor-version":[{"id":35765,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/34151\/revisions\/35765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/34153"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=34151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=34151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=34151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}