{"id":2064,"date":"2021-11-01T15:58:51","date_gmt":"2021-11-01T22:58:51","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2064"},"modified":"2023-11-07T16:31:02","modified_gmt":"2023-11-07T21:31:02","slug":"managing-tokens-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","title":{"rendered":"Gestion des jetons d'authentification mat\u00e9riels dans l'informatique d\u00e9mat\u00e9rialis\u00e9e"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>M\u00eame si les jetons logiciels sont faciles \u00e0 utiliser, les jetons mat\u00e9riels sont parfois le meilleur moyen d'authentifier les utilisateurs pour les entreprises sensibles \u00e0 la s\u00e9curit\u00e9. D\u00e9couvrez les facteurs que les entreprises doivent prendre en compte lorsqu'elles choisissent entre le mat\u00e9riel et le logiciel, ainsi que la mani\u00e8re dont les administrateurs peuvent configurer, attribuer et g\u00e9rer les jetons mat\u00e9riels SecurID \u00e0 partir du cloud.<\/p>","protected":false},"author":2,"featured_media":2065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Hardware Authentication Tokens in the Cloud - RSA<\/title>\n<meta name=\"description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta property=\"og:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T22:58:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:31:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Managing Hardware Authentication Tokens in the Cloud\" \/>\n<meta name=\"twitter:description\" content=\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Managing Hardware Authentication Tokens in the Cloud\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\",\"name\":\"Managing Hardware Authentication Tokens in the Cloud - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"datePublished\":\"2021-11-01T22:58:51+00:00\",\"dateModified\":\"2023-11-07T21:31:02+00:00\",\"description\":\"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Tokens-In-Cloud.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/managing-tokens-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Hardware Authentication Tokens in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestion des jetons d'authentification mat\u00e9riels dans le nuage - RSA","description":"M\u00eame si les jetons logiciels sont faciles \u00e0 utiliser, les jetons mat\u00e9riels sont parfois le meilleur moyen d'authentifier les utilisateurs pour les entreprises sensibles \u00e0 la s\u00e9curit\u00e9. D\u00e9couvrez les facteurs que les entreprises doivent prendre en compte lorsqu'elles choisissent entre le mat\u00e9riel et le logiciel, ainsi que la mani\u00e8re dont les administrateurs peuvent configurer, attribuer et g\u00e9rer les jetons mat\u00e9riels SecurID \u00e0 partir du cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_locale":"fr_CA","og_type":"article","og_title":"Managing Hardware Authentication Tokens in the Cloud","og_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","og_site_name":"RSA","article_published_time":"2021-11-01T22:58:51+00:00","article_modified_time":"2023-11-07T21:31:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Managing Hardware Authentication Tokens in the Cloud","twitter_description":"As easy as soft tokens are to use, sometimes hardware tokens are the best way for security-sensitive organizations to authenticate users. Learn what factors businesses should consider when deciding between hardware and software and the ways that admins can configure, assign and manage SecurID hard tokens from the cloud.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Managing Hardware Authentication Tokens in the Cloud","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","articleSection":["Products and Solutions"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","url":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/","name":"Gestion des jetons d'authentification mat\u00e9riels dans le nuage - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","datePublished":"2021-11-01T22:58:51+00:00","dateModified":"2023-11-07T21:31:02+00:00","description":"M\u00eame si les jetons logiciels sont faciles \u00e0 utiliser, les jetons mat\u00e9riels sont parfois le meilleur moyen d'authentifier les utilisateurs pour les entreprises sensibles \u00e0 la s\u00e9curit\u00e9. D\u00e9couvrez les facteurs que les entreprises doivent prendre en compte lorsqu'elles choisissent entre le mat\u00e9riel et le logiciel, ainsi que la mani\u00e8re dont les administrateurs peuvent configurer, attribuer et g\u00e9rer les jetons mat\u00e9riels SecurID \u00e0 partir du cloud.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Tokens-In-Cloud.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/managing-tokens-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Managing Hardware Authentication Tokens in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":27155,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2064\/revisions\/27155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/2065"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}