{"id":2027,"date":"2022-04-27T15:23:57","date_gmt":"2022-04-27T22:23:57","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2027"},"modified":"2023-11-07T15:22:07","modified_gmt":"2023-11-07T20:22:07","slug":"public-sector-identity-needs","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ko\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","title":{"rendered":"\uacf5\uacf5 \ubd80\ubb38\uc5d0\uc11c \uc561\uc138\uc2a4 \ubcf4\uc548\uc744 \uc704\ud574 \ud544\uc694\ud55c ID \uae30\ub2a5"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>\ubcf4\uc548 \uc218\uc900\uc774 \ub192\uc740 \ub9ce\uc740 \uc5f0\ubc29 \uae30\uad00 \ubc0f \uae30\ud0c0 \ubcf4\uc548\uc5d0 \ubbfc\uac10\ud55c \uc870\uc9c1\uc5d0\uc11c \ud558\ub4dc \ud1a0\ud070\uc740 \uac15\ub825\ud55c \uc778\uc99d\uc744 \uc704\ud55c \ud45c\uc900\uc785\ub2c8\ub2e4. ID Plus\ub294 \uc774\ub7ec\ud55c \uc870\uc9c1\uc5d0 \ud074\ub77c\uc6b0\ub4dc\uc5d0\uc11c \ud558\ub4dc \ud1a0\ud070\uc744 \uad00\ub9ac\ud558\ub294 \ud3b8\ub9ac\ud568\uacfc \uc7a5\uc560 \uc870\uce58 \uae30\ubc18 \uace0\uac00\uc6a9\uc131 MFA\uc758 \ubcf4\uc548\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. <\/p>","protected":false},"author":2,"featured_media":3325,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Identity Capabilities the Public Sector Needs to Secure Access - RSA<\/title>\n<meta name=\"description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Identity Capabilities the Public Sector Needs to Secure Access\" \/>\n<meta property=\"og:description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T22:23:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T20:22:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Identity Capabilities the Public Sector Needs to Secure Access\" \/>\n<meta name=\"twitter:description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"The Identity Capabilities the Public Sector Needs to Secure Access\",\"datePublished\":\"2022-04-27T22:23:57+00:00\",\"dateModified\":\"2023-11-07T20:22:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\",\"name\":\"The Identity Capabilities the Public Sector Needs to Secure Access - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"datePublished\":\"2022-04-27T22:23:57+00:00\",\"dateModified\":\"2023-11-07T20:22:07+00:00\",\"description\":\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"width\":1200,\"height\":675,\"caption\":\"The Identity Capabilities the Public Sector Needs to Secure Access\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Identity Capabilities the Public Sector Needs to Secure Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uacf5\uacf5 \ubd80\ubb38\uc5d0\uc11c \uc561\uc138\uc2a4 \ubcf4\uc548\uc744 \uc704\ud574 \ud544\uc694\ud55c ID \uae30\ub2a5 - RSA","description":"\uacf5\uacf5 \ubd80\ubb38 \uae30\uad00\uacfc \ubcf4\uc548\uc5d0 \ubbfc\uac10\ud55c \uc870\uc9c1\uc774 \uc561\uc138\uc2a4 \ubcf4\uc548\uc5d0 \ud544\uc694\ud55c \ud575\uc2ec \uae30\ub2a5\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ko\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","og_locale":"ko_KR","og_type":"article","og_title":"The Identity Capabilities the Public Sector Needs to Secure Access","og_description":"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.","og_url":"https:\/\/www.rsa.com\/ko\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","og_site_name":"RSA","article_published_time":"2022-04-27T22:23:57+00:00","article_modified_time":"2023-11-07T20:22:07+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"The Identity Capabilities the Public Sector Needs to Secure Access","twitter_description":"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"The Identity Capabilities the Public Sector Needs to Secure Access","datePublished":"2022-04-27T22:23:57+00:00","dateModified":"2023-11-07T20:22:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","articleSection":["Products and Solutions"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","url":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","name":"\uacf5\uacf5 \ubd80\ubb38\uc5d0\uc11c \uc561\uc138\uc2a4 \ubcf4\uc548\uc744 \uc704\ud574 \ud544\uc694\ud55c ID \uae30\ub2a5 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","datePublished":"2022-04-27T22:23:57+00:00","dateModified":"2023-11-07T20:22:07+00:00","description":"\uacf5\uacf5 \ubd80\ubb38 \uae30\uad00\uacfc \ubcf4\uc548\uc5d0 \ubbfc\uac10\ud55c \uc870\uc9c1\uc774 \uc561\uc138\uc2a4 \ubcf4\uc548\uc5d0 \ud544\uc694\ud55c \ud575\uc2ec \uae30\ub2a5\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","width":1200,"height":675,"caption":"The Identity Capabilities the Public Sector Needs to Secure Access"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"The Identity Capabilities the Public Sector Needs to Secure Access"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548 \ubc0f \ub514\uc9c0\ud138 \ub9ac\uc2a4\ud06c \uad00\ub9ac \uc194\ub8e8\uc158","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"\uba5c\ub9b0\ub2e4 \uc624\ucf54\ub108","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/comments?post=2027"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2027\/revisions"}],"predecessor-version":[{"id":27135,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2027\/revisions\/27135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media\/3325"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media?parent=2027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/categories?post=2027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/tags?post=2027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}