{"id":2209,"date":"2021-04-13T12:06:58","date_gmt":"2021-04-13T19:06:58","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2209"},"modified":"2023-11-07T17:28:40","modified_gmt":"2023-11-07T22:28:40","slug":"identity-the-bedrock-for-all-security","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","title":{"rendered":"L'identit\u00e9 - le fondement de toute s\u00e9curit\u00e9"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>L'identit\u00e9 est le plan de contr\u00f4le qui permet de connecter les utilisateurs et les donn\u00e9es en toute s\u00e9curit\u00e9. Mais il est plus difficile que jamais de trouver la bonne identit\u00e9. Rejoignez le webinaire de SecurID le 15 avril 2021 pour \u00e9couter des experts de l'identit\u00e9 et apprendre comment l'identit\u00e9 peut am\u00e9liorer la s\u00e9curit\u00e9 et la r\u00e9silience de vos op\u00e9rations.<\/p>","protected":false},"author":2,"featured_media":2210,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-2209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multi-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity \u2013 the Bedrock for All Security - RSA<\/title>\n<meta name=\"description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity \u2013 the Bedrock for All Security\" \/>\n<meta property=\"og:description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T19:06:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T22:28:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Identity \u2013 the Bedrock for All Security\" \/>\n<meta name=\"twitter:description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Identity \u2013 the Bedrock for All Security\",\"datePublished\":\"2021-04-13T19:06:58+00:00\",\"dateModified\":\"2023-11-07T22:28:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"},\"wordCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"articleSection\":[\"Multi-Factor Authentication\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\",\"name\":\"Identity \u2013 the Bedrock for All Security - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"datePublished\":\"2021-04-13T19:06:58+00:00\",\"dateModified\":\"2023-11-07T22:28:40+00:00\",\"description\":\"Learn why identity is the ideal control plane for securing users and data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"width\":946,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity \u2013 the Bedrock for All Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'identit\u00e9 - le fondement de toute s\u00e9curit\u00e9 - RSA","description":"D\u00e9couvrez pourquoi l'identit\u00e9 est le plan de contr\u00f4le id\u00e9al pour s\u00e9curiser les utilisateurs et les donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","og_locale":"fr_CA","og_type":"article","og_title":"Identity \u2013 the Bedrock for All Security","og_description":"Learn why identity is the ideal control plane for securing users and data.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","og_site_name":"RSA","article_published_time":"2021-04-13T19:06:58+00:00","article_modified_time":"2023-11-07T22:28:40+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Identity \u2013 the Bedrock for All Security","twitter_description":"Learn why identity is the ideal control plane for securing users and data.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Identity \u2013 the Bedrock for All Security","datePublished":"2021-04-13T19:06:58+00:00","dateModified":"2023-11-07T22:28:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"},"wordCount":6,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","articleSection":["Multi-Factor Authentication"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","url":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","name":"L'identit\u00e9 - le fondement de toute s\u00e9curit\u00e9 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","datePublished":"2021-04-13T19:06:58+00:00","dateModified":"2023-11-07T22:28:40+00:00","description":"D\u00e9couvrez pourquoi l'identit\u00e9 est le plan de contr\u00f4le id\u00e9al pour s\u00e9curiser les utilisateurs et les donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","width":946,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Identity \u2013 the Bedrock for All Security"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=2209"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2209\/revisions"}],"predecessor-version":[{"id":27167,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2209\/revisions\/27167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/2210"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=2209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=2209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=2209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}