{"id":166,"count":17,"description":"","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/identity-governance-and-administration\/","name":"Gouvernance et administration des identit\u00e9s","slug":"identity-governance-and-administration","taxonomy":"category","parent":0,"meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity Governance &amp; Administration Archives - RSA<\/title>\n<meta name=\"description\" content=\"RSA global leaders share identity governance and administration (IGA) insights and best practices that can help secure access and enable compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/identity-governance-and-administration\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Governance &amp; Administration Archives - RSA\" \/>\n<meta property=\"og:description\" content=\"RSA global leaders share identity governance and administration (IGA) insights and best practices that can help secure access and enable compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/identity-governance-and-administration\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/it\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/it\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/\",\"name\":\"Identity Governance &amp; Administration Archives - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"description\":\"RSA global leaders share identity governance and administration (IGA) insights and best practices that can help secure access and enable compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/it\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/it\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Governance &amp; Administration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity Governance &amp; Administration Archives - RSA","description":"Les leaders mondiaux de RSA partagent les id\u00e9es et les meilleures pratiques en mati\u00e8re de gouvernance et d'administration des identit\u00e9s (IGA) qui peuvent aider \u00e0 s\u00e9curiser l'acc\u00e8s et \u00e0 permettre la conformit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/identity-governance-and-administration\/","og_locale":"fr_CA","og_type":"article","og_title":"Identity Governance &amp; Administration Archives - RSA","og_description":"RSA global leaders share identity governance and administration (IGA) insights and best practices that can help secure access and enable compliance.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/identity-governance-and-administration\/","og_site_name":"RSA","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":"https:\/\/www.rsa.com\/it\/resources\/blog\/identity-governance-and-administration\/","url":"https:\/\/www.rsa.com\/it\/resources\/blog\/identity-governance-and-administration\/","name":"Gouvernance et administration des identit\u00e9s Archives - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"description":"Les leaders mondiaux de RSA partagent les id\u00e9es et les meilleures pratiques en mati\u00e8re de gouvernance et d'administration des identit\u00e9s (IGA) qui peuvent aider \u00e0 s\u00e9curiser l'acc\u00e8s et \u00e0 permettre la conformit\u00e9.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/it\/resources\/blog\/identity-governance-and-administration\/#breadcrumb"},"inLanguage":"fr-CA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/it\/resources\/blog\/identity-governance-and-administration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Identity Governance &amp; Administration"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories\/166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts?categories=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}