{"id":1674,"date":"2023-09-21T10:42:37","date_gmt":"2023-09-21T10:42:37","guid":{"rendered":"https:\/\/swawe.fr\/?p=1674"},"modified":"2026-02-24T14:02:07","modified_gmt":"2026-02-24T14:02:07","slug":"gestion-des-pam","status":"publish","type":"post","link":"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/","title":{"rendered":"Gestion des PAM (Privilege Access Management)"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb width=\u00a0\u00bb94.5%\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<\/p>\n<p>Dans un environnement SAP, diff\u00e9rents utilisateurs ont besoin d&rsquo;acc\u00e9der \u00e0 des fonctions sp\u00e9cifiques en fonction de leurs responsabilit\u00e9s et de leurs t\u00e2ches.<\/p>\n<p>La gestion des droits \u00e0 privil\u00e8ge permet de contr\u00f4ler quelles transactions, quelles donn\u00e9es et quelles fonctionnalit\u00e9s un utilisateur ou un groupe d\u2019utilisateurs peut utiliser dans le syst\u00e8me.<\/p>\n<p>C\u2019est un processus important pour garantir la s\u00e9curit\u00e9 et l&rsquo;int\u00e9grit\u00e9 des donn\u00e9es dans le syst\u00e8me<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/pam.png\u00a0\u00bb title_text=\u00a0\u00bbpam\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb width=\u00a0\u00bb94.5%\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<\/p>\n<p>&nbsp;<\/p>\n<p>La r\u00e9duction des droits des intervenants de la DSI est une priorit\u00e9 souvent point\u00e9e par les auditeurs !<br \/>Mais leurs activit\u00e9s n\u00e9cessitent la mise en \u0153uvre d\u2019une proc\u00e9dure d\u2019intervention d\u2019urgence avec des droits \u00e9tendus sur les syst\u00e8mes SAP.<\/p>\n<p>Le module de gestion des utilisateurs d\u2019urgence dans SWAWE (PAM) permet de personnaliser et de mettre sous contr\u00f4le ce processus de fa\u00e7on s\u00e9curis\u00e9e et surtout de fournir des capacit\u00e9s de rapports exhaustifs de ces interventions pour un contr\u00f4le optimum.<\/p>\n<p>&nbsp;<\/p>\n<p>Avec ou sans la mise en \u0153uvre d\u2019un workflow de validation, SWAWE permet de r\u00e9pondre aux besoins des utilisateurs de la DSI ou des m\u00e9tiers ex\u00e9cutant des transactions sensibles.<\/p>\n<p>[\/et_pb_text][et_pb_image src=\u00a0\u00bbhttps:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/swawe_pam.png\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb theme_builder_area=\u00a0\u00bbet_body_layout\u00a0\u00bb title_text=\u00a0\u00bbswawe_pam\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime; min_height=\u00a0\u00bb553.9px\u00a0\u00bb custom_padding=\u00a0\u00bb|0px||||\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb]<\/p>\n<p><span style=\"color: #000000;\">Toutes les t\u00e2ches li\u00e9es \u00e0 l\u2019utilisation du super-user sont stock\u00e9es dans SWAWE.<\/span><\/p>\n<p><span style=\"color: #000000;\">Celles-ci sont donc auditables et on peut y retrouver le nom de l\u2019intervenant, l\u2019objectif de sa demande, le nom du valideur, les transactions r\u00e9ellement ex\u00e9cut\u00e9es et les pi\u00e8ces modifi\u00e9es.<\/span><\/p>\n<p><span style=\"color: #000000;\">Les reports et tableaux de bord donnent une vision synth\u00e9tique sur le nombre de demandes, sur qui les utilisent, sur les transactions ex\u00e9cut\u00e9es\u2026<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un environnement SAP, diff\u00e9rents utilisateurs ont besoin d&rsquo;acc\u00e9der \u00e0 des fonctions sp\u00e9cifiques en fonction de leurs responsabilit\u00e9s et de leurs t\u00e2ches. La gestion des droits \u00e0 privil\u00e8ge permet de contr\u00f4ler quelles transactions, quelles donn\u00e9es et quelles fonctionnalit\u00e9s un utilisateur ou un groupe d\u2019utilisateurs peut utiliser dans le syst\u00e8me. C\u2019est un processus important pour garantir [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1684,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[12],"tags":[],"class_list":["post-1674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-des-acces-sap-iam-pam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gestion des PAM (Privilege Access Management) - Swawe<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestion des PAM (Privilege Access Management) - Swawe\" \/>\n<meta property=\"og:description\" content=\"Dans un environnement SAP, diff\u00e9rents utilisateurs ont besoin d&#039;acc\u00e9der \u00e0 des fonctions sp\u00e9cifiques en fonction de leurs responsabilit\u00e9s et de leurs t\u00e2ches. La gestion des droits \u00e0 privil\u00e8ge permet de contr\u00f4ler quelles transactions, quelles donn\u00e9es et quelles fonctionnalit\u00e9s un utilisateur ou un groupe d\u2019utilisateurs peut utiliser dans le syst\u00e8me. C\u2019est un processus important pour garantir [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"Swawe\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-21T10:42:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T14:02:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Geoffrey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Geoffrey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\"},\"author\":{\"name\":\"Geoffrey\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a\"},\"headline\":\"Gestion des PAM (Privilege Access Management)\",\"datePublished\":\"2023-09-21T10:42:37+00:00\",\"dateModified\":\"2026-02-24T14:02:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\"},\"wordCount\":555,\"image\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png\",\"articleSection\":[\"S\u00e9curit\u00e9 des Acc\u00e8s SAP (IAM &amp; PAM)\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\",\"url\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\",\"name\":\"Gestion des PAM (Privilege Access Management) - Swawe\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png\",\"datePublished\":\"2023-09-21T10:42:37+00:00\",\"dateModified\":\"2026-02-24T14:02:07+00:00\",\"author\":{\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a\"},\"breadcrumb\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage\",\"url\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png\",\"contentUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/swawe.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestion des PAM (Privilege Access Management)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swawe.fr\/#website\",\"url\":\"https:\/\/swawe.fr\/\",\"name\":\"Swawe\",\"description\":\"Your Compliance Companion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swawe.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a\",\"name\":\"Geoffrey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g\",\"caption\":\"Geoffrey\"},\"url\":\"https:\/\/swawe.fr\/en\/author\/geoffrey\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestion des PAM (Privilege Access Management) - Swawe","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/","og_locale":"en_US","og_type":"article","og_title":"Gestion des PAM (Privilege Access Management) - Swawe","og_description":"Dans un environnement SAP, diff\u00e9rents utilisateurs ont besoin d'acc\u00e9der \u00e0 des fonctions sp\u00e9cifiques en fonction de leurs responsabilit\u00e9s et de leurs t\u00e2ches. La gestion des droits \u00e0 privil\u00e8ge permet de contr\u00f4ler quelles transactions, quelles donn\u00e9es et quelles fonctionnalit\u00e9s un utilisateur ou un groupe d\u2019utilisateurs peut utiliser dans le syst\u00e8me. C\u2019est un processus important pour garantir [&hellip;]","og_url":"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/","og_site_name":"Swawe","article_published_time":"2023-09-21T10:42:37+00:00","article_modified_time":"2026-02-24T14:02:07+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png","type":"image\/png"}],"author":"Geoffrey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Geoffrey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#article","isPartOf":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/"},"author":{"name":"Geoffrey","@id":"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a"},"headline":"Gestion des PAM (Privilege Access Management)","datePublished":"2023-09-21T10:42:37+00:00","dateModified":"2026-02-24T14:02:07+00:00","mainEntityOfPage":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/"},"wordCount":555,"image":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png","articleSection":["S\u00e9curit\u00e9 des Acc\u00e8s SAP (IAM &amp; PAM)"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/","url":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/","name":"Gestion des PAM (Privilege Access Management) - Swawe","isPartOf":{"@id":"https:\/\/swawe.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage"},"image":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png","datePublished":"2023-09-21T10:42:37+00:00","dateModified":"2026-02-24T14:02:07+00:00","author":{"@id":"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a"},"breadcrumb":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#primaryimage","url":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png","contentUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/09\/Maitrise-des-risques-Etape5.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/gestion-des-pam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/swawe.fr\/"},{"@type":"ListItem","position":2,"name":"Gestion des PAM (Privilege Access Management)"}]},{"@type":"WebSite","@id":"https:\/\/swawe.fr\/#website","url":"https:\/\/swawe.fr\/","name":"Swawe","description":"Your Compliance Companion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swawe.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a","name":"Geoffrey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g","caption":"Geoffrey"},"url":"https:\/\/swawe.fr\/en\/author\/geoffrey\/"}]}},"_links":{"self":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/comments?post=1674"}],"version-history":[{"count":7,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1674\/revisions"}],"predecessor-version":[{"id":2276,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1674\/revisions\/2276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media\/1684"}],"wp:attachment":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media?parent=1674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/categories?post=1674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/tags?post=1674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}