{"id":2033,"date":"2022-03-28T15:35:42","date_gmt":"2022-03-28T22:35:42","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2033"},"modified":"2023-11-07T15:34:37","modified_gmt":"2023-11-07T20:34:37","slug":"securing-the-identity-lifecycle-part-2-resets-and-fail-safes","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","title":{"rendered":"S\u00e9curiser le cycle de vie de l'identit\u00e9 Partie 2 : R\u00e9initialisation et s\u00e9curit\u00e9 int\u00e9gr\u00e9e"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Les acteurs malveillants privil\u00e9gient les attaques qui exploitent les r\u00e9initialisations MFA, les \u00e9checs d'ouverture et d'autres moments o\u00f9 les changements sont importants pour obtenir un acc\u00e8s. D\u00e9couvrez les meilleures pratiques pour les pr\u00e9venir, s\u00e9curiser votre organisation et simplifier l'acc\u00e8s pour vos utilisateurs. <\/p>","protected":false},"author":2,"featured_media":3189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-2033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multi-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Identity Lifecycle Part 2: Resets and Fail-Safes - RSA<\/title>\n<meta name=\"description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\" \/>\n<meta property=\"og:description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-28T22:35:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T20:34:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\" \/>\n<meta name=\"twitter:description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\",\"datePublished\":\"2022-03-28T22:35:42+00:00\",\"dateModified\":\"2023-11-07T20:34:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"articleSection\":[\"Multi-Factor Authentication\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\",\"name\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"datePublished\":\"2022-03-28T22:35:42+00:00\",\"dateModified\":\"2023-11-07T20:34:37+00:00\",\"description\":\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"width\":1200,\"height\":675,\"caption\":\"rsa-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curiser le cycle de vie de l'identit\u00e9, partie 2 : r\u00e9initialisations et s\u00e9curit\u00e9s - RSA","description":"Les acteurs de la menace exploitent les r\u00e9initialisations MFA, les \u00e9checs d'ouverture et d'autres moments pour obtenir un acc\u00e8s. Apprenez \u00e0 les pr\u00e9venir.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","og_locale":"fr_CA","og_type":"article","og_title":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","og_description":"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","og_site_name":"RSA","article_published_time":"2022-03-28T22:35:42+00:00","article_modified_time":"2023-11-07T20:34:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","twitter_description":"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","datePublished":"2022-03-28T22:35:42+00:00","dateModified":"2023-11-07T20:34:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"},"wordCount":8,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","articleSection":["Multi-Factor Authentication"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","url":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","name":"S\u00e9curiser le cycle de vie de l'identit\u00e9, partie 2 : r\u00e9initialisations et s\u00e9curit\u00e9s - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","datePublished":"2022-03-28T22:35:42+00:00","dateModified":"2023-11-07T20:34:37+00:00","description":"Les acteurs de la menace exploitent les r\u00e9initialisations MFA, les \u00e9checs d'ouverture et d'autres moments pour obtenir un acc\u00e8s. Apprenez \u00e0 les pr\u00e9venir.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","width":1200,"height":675,"caption":"rsa-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=2033"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2033\/revisions"}],"predecessor-version":[{"id":27139,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2033\/revisions\/27139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/3189"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=2033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=2033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=2033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}