{"id":1693,"date":"2023-11-23T11:08:14","date_gmt":"2023-11-23T11:08:14","guid":{"rendered":"https:\/\/swawe.fr\/?p=1693"},"modified":"2026-02-24T14:01:54","modified_gmt":"2026-02-24T14:01:54","slug":"iam-identity-access-management","status":"publish","type":"post","link":"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/","title":{"rendered":"IAM (Identity Access Management)"},"content":{"rendered":"\n[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb94.5%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h1>Enjeux de la gestion des identit\u00e9s et des acc\u00e8s (IAM) pour les syst\u00e8mes critiques<\/h1>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; box_shadow_style=\u00a0\u00bbpreset4&Prime; box_shadow_horizontal=\u00a0\u00bb6px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb6px\u00a0\u00bb box_shadow_color=\u00a0\u00bb#EF7E26&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<p><strong>L&rsquo;essentiel en 3 points :<\/strong><\/p>\n<p><strong>Ma\u00eetrise du risque SoD :<\/strong> Analyse pr\u00e9ventive et simulation des conflits de s\u00e9paration des t\u00e2ches pour garantir la conformit\u00e9 SAP\/ERP.<\/p>\n<p><strong>Automatisation du cycle de vie :<\/strong> Gestion fluide des processus Joiner-Mover-Leaver via des Business Profiles pour \u00e9liminer les comptes dormants.<\/p>\n<p><strong>Audit-Ready :<\/strong> Tra\u00e7abilit\u00e9 compl\u00e8te et historisation native de chaque action pour simplifier les contr\u00f4les r\u00e9glementaires.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<p>Dans un \u00e9cosyst\u00e8me SI de plus en plus fragment\u00e9, <strong>la gestion des identit\u00e9s et des acc\u00e8s (IAM)<\/strong> n&rsquo;est plus une simple t\u00e2che administrative, c&rsquo;est le premier rempart de votre strat\u00e9gie de cybers\u00e9curit\u00e9. Pour un RSSI ou un gestionnaire d&rsquo;environnements SAP, l&rsquo;enjeu est double : garantir l&rsquo;\u00e9tanch\u00e9it\u00e9 des acc\u00e8s tout en offrant une agilit\u00e9 op\u00e9rationnelle maximale.<\/p>\n<p>L&rsquo;objectif de <a href=\"\/swawe-iam\/\" target=\"_blank\" rel=\"noopener\"><strong>SWAWE IAM<\/strong><\/a> est de centraliser et d&rsquo;orchestrer le cycle de vie des identit\u00e9s (collaborateurs, prestataires, comptes de service) pour transformer l&rsquo;acc\u00e8s en un actif s\u00e9curis\u00e9.<\/p>\n<p>Le triptyque de confiance SWAWE :<\/p>\n<ul>\n<li><strong>Authentification &amp; Int\u00e9grit\u00e9 :<\/strong> Garantir que l&rsquo;utilisateur est bien celui qu&rsquo;il pr\u00e9tend \u00eatre.<\/li>\n<li><strong>Autorisation granulaire :<\/strong> Appliquer le principe du \u00ab\u00a0Moindre Privil\u00e8ge\u00a0\u00bb (Least Privilege) au sein de vos \u00e9cosyst\u00e8mes complexes.<\/li>\n<li><strong>Gouvernance automatis\u00e9e :<\/strong> Supprimer l&rsquo;erreur humaine dans le provisionnement et le d\u00e9provisionnement des droits.<\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb94.5%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb2px|||||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h2>Architecture et fonctionnement : l&rsquo;approche \u00ab\u00a0Business Profiles\u00a0\u00bb<\/h2>\n<p>Contrairement aux solutions g\u00e9n\u00e9riques, SWAWE IAM structure les droits via des <strong>Business Profiles<\/strong>. Cette couche d&rsquo;abstraction permet de traduire des r\u00f4les m\u00e9tier complexes en autorisations techniques r\u00e9elles dans vos syst\u00e8mes distants (SAP, AD, SaaS).<\/p>\n<p><strong>L&rsquo;automatisation du cycle de vie (Joiner, Mover, Leaver) :<\/strong> SWAWE garantit qu&rsquo;un d\u00e9part de l&rsquo;entreprise ou un changement de poste entra\u00eene une r\u00e9vocation imm\u00e9diate ou une mise \u00e0 jour des droits, supprimant ainsi les \u00ab\u00a0comptes dormants\u00a0\u00bb, vecteurs privil\u00e9gi\u00e9s des cyberattaques.<\/p>[\/et_pb_text][et_pb_image src=\u00a0\u00bbhttps:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/IAM_2.png\u00a0\u00bb title_text=\u00a0\u00bbIAM_2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|0px|0px|||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb3px|||||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h2>La valeur ajout\u00e9e pour le RSSI et l&rsquo;expert SAP<\/h2>\n<p>Une solution IAM (Identity and Access Management), \u00e9galement connue sous le nom de gestion des identit\u00e9s et des acc\u00e8s, offre de nombreux avantages pour les organisations, en particulier dans un monde de plus en plus ax\u00e9 sur la s\u00e9curit\u00e9 et la gestion des donn\u00e9es. Voici quelques-uns des principaux b\u00e9n\u00e9fices d&rsquo;une solution IAM :<\/p>\n<p><strong>1\/ S\u00e9curit\u00e9 renforc\u00e9e. <\/strong>Contr\u00f4le des acc\u00e8s : SWAWE permet de d\u00e9finir de mani\u00e8re pr\u00e9cise qui a acc\u00e8s \u00e0 quelles applications\/ autorisations.<\/p>\n<p><strong>2\/ Gestion centralis\u00e9e des identit\u00e9s.<\/strong> SWAWE centralise la gestion des utilisateurs et des droits d&rsquo;acc\u00e8s, ce qui simplifie la gestion des comptes et des autorisations \u00e0 travers l&rsquo;ensemble de l&rsquo;organisation.<\/p>\n<p><strong>3\/ Conformit\u00e9 aux r\u00e9glementations.<\/strong> SWAWE aide les organisations \u00e0 se conformer aux r\u00e9glementations en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es et de confidentialit\u00e9.<\/p>\n<p><strong>4\/ R\u00e9duction des risques.<\/strong> L\u2019analyse des risques critiques ou SOD peut se faire \u00e0 tout moment dans SWAWE. En phase de projet ou maintenance, il est parfois utile de pouvoir simuler des changements d\u2019assignations de droits pour conna\u00eetre les impacts sur les risques, sans pour autant lui assigner r\u00e9ellement les droits. C\u2019est une analyse pr\u00e9ventive des risques.<\/p>\n<p><strong>5\/ Productivit\u00e9 am\u00e9lior\u00e9e.<\/strong> SWAWE simplifie la gestion des utilisateurs, ce qui permet aux \u00e9quipes informatiques de gagner du temps et de se concentrer sur des t\u00e2ches plus strat\u00e9giques.<\/p>\n<p><strong>6\/ Gestion des cycles de vie des comptes.<\/strong> SWAWE automatise la cr\u00e9ation, la modification et la d\u00e9sactivation des comptes utilisateur, ce qui facilite la gestion des comptes utilisateurs tout au long de leur cycle de vie au sein de l&rsquo;organisation.<\/p>\n<p><strong>7\/ Visibilit\u00e9 et audit.<\/strong> SWAWE permet de stocker et historiser toutes les actions li\u00e9es \u00e0 la gestion des identit\u00e9s et \u00e0 l\u2019assignation des droits applicatifs. L\u2019automatisation des diff\u00e9rents process param\u00e9tr\u00e9s dans l\u2019IAM garantit la qualit\u00e9 et la conformit\u00e9 des informations qui y sont contenues.<\/p>\n<blockquote>\n<p><em>En r\u00e9sum\u00e9, SWAWE IAM est essentielle pour renforcer la s\u00e9curit\u00e9, simplifier la gestion des identit\u00e9s et des acc\u00e8s, garantir la conformit\u00e9 aux r\u00e9glementations et am\u00e9liorer la productivit\u00e9 au sein d&rsquo;une organisation.<\/em><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h2>Fonctionnalit\u00e9s<\/h2>\n<p><strong>Automatisation de la gestion des identit\u00e9s. <\/strong>La gestion et la ma\u00eetrise du cycle de vie des utilisateurs sont souvent difficiles car la plupart du temps les processus se font \u201cmanuellement\u201d sans un outil qui centralise et automatise les processus li\u00e9s \u00e0 la s\u00e9curit\u00e9 applicative. SWAWE permet cette automatisation en garantissant le respect du processus d\u2019approbation, de tra\u00e7abilit\u00e9 et de s\u00e9paration des t\u00e2ches.<\/p>\n<p><strong>Analyses de risques pr\u00e9ventives. <\/strong>L\u2019analyse des risques critiques ou SOD peut se faire \u00e0 tout moment dans SWAWE. En phase de projet ou maintenance, il est parfois utile de pouvoir simuler des changements d\u2019assignations de droits pour conna\u00eetre les impacts sur les risques, sans pour autant lui assigner r\u00e9ellement les droits. C\u2019est une analyse pr\u00e9ventive des risques.<\/p>\n<p><strong>Workflow de validation personnalisable. <\/strong>Pour respecter les best practices, il est n\u00e9cessaire de mettre en place un process de validation lors de la cr\u00e9ation ou la mise \u00e0 jour de la fiche utilisateur. Les workflows peuvent \u00eatre d\u00e9finis \u00e0 diff\u00e9rents niveaux : lors de la validation de la demande par un manager (en lien avec le rattachement du b\u00e9n\u00e9ficiaire \u00e0 une organisation), lors de la validation par un process owner risks les analyses SoD, lors d\u2019une validation par un interlocuteur suppl\u00e9mentaire pour compl\u00e9ter\/valider la demande initiale\u2026<\/p>\n<p><strong>Int\u00e9gration avec vos outils existants. <\/strong>SWAWE peut \u00eatre utilis\u00e9 de fa\u00e7on ind\u00e9pendante, mais il peut aussi s\u2019int\u00e9grer dans la cartographie des applications existantes de l\u2019entreprise. Cela \u00e9vite \u00e0 l\u2019entreprise de d\u00e9multiplier ses applications et de conserver ainsi un outil qui centralise ses identit\u00e9s et les droits applicatifs associ\u00e9s. Les interactions d\u2019un point de vue technique entre l\u2019application de l\u2019entreprise et SWAWE se font via des APIs.<\/p>\n<p><strong>Rapports et tableaux de bords sur mesure. <\/strong>SWAWE dispose par d\u00e9faut d\u2019un ensemble de tables qui permettent de cr\u00e9er des tableaux de bord ou des rapports selon les besoins de l\u2019entreprise. Dans le cadre de l\u2019IAM, on peut par exemple mettre en place des reports sur les comptes actifs\/inactifs, sur les types d\u2019utilisateurs, sur les nouveaux risques apparus lors des derni\u00e8res cr\u00e9ations, ou cr\u00e9er des listes d\u00e9taill\u00e9es avec l\u2019utilisation des transactions ou avec le d\u00e9tail des risques ou avec le nom des droits m\u00e9tier associ\u00e9s\u2026<\/p>\n<p><strong>Mat\u00e9rialisation des preuves pour les auditeurs. <\/strong>SWAWE permet de stocker et historiser toutes les actions li\u00e9es \u00e0 la gestion des identit\u00e9s et \u00e0 l\u2019assignation des droits applicatifs. De la demande de cr\u00e9ation d\u2019un utilisateur jusqu\u2019au provisionning de celui-ci dans le syst\u00e8me, toutes les informations sont trac\u00e9es et historis\u00e9es, et par cons\u00e9quent auditables.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime;]<h2>Pourquoi choisir SWAWE IAM ?<\/h2>\n<p>Pour une organisation moderne, SWAWE IAM n&rsquo;est pas qu&rsquo;un outil de gestion, c&rsquo;est un levier de r\u00e9silience. En automatisant les processus de s\u00e9curit\u00e9 applicative, vous permettez \u00e0 vos \u00e9quipes IT de passer d&rsquo;un mode \u00ab\u00a0pompier\u00a0\u00bb (gestion manuelle des tickets d&rsquo;acc\u00e8s) \u00e0 un mode \u00ab\u00a0strat\u00e8ge\u00a0\u00bb (pilotage de la gouvernance et des risques).<\/p>\n<blockquote>\n<p><em><strong>L&rsquo;avis de l&rsquo;expert :<\/strong> \u00ab\u00a0L&rsquo;int\u00e9gration de SWAWE avec les outils existants et sa capacit\u00e9 \u00e0 simuler les risques avant leur apparition en font une solution de choix pour les environnements o\u00f9 la conformit\u00e9 n&rsquo;est pas n\u00e9gociable.\u00a0\u00bb<\/em><\/p>\n<\/blockquote>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_5,2_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; box_shadow_style=\u00a0\u00bbpreset4&Prime; box_shadow_horizontal=\u00a0\u00bb5px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb5px\u00a0\u00bb box_shadow_color=\u00a0\u00bb#EF7E26&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_5&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; custom_padding=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#004899&Prime; header_2_font_size=\u00a0\u00bb28px\u00a0\u00bb header_2_line_height=\u00a0\u00bb1.4em\u00a0\u00bb header_3_font=\u00a0\u00bb|600|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#004899&Prime; background_layout=\u00a0\u00bbdark\u00a0\u00bb max_width=\u00a0\u00bb700px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|20px||20px|false|true\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h3>Une expertise d\u00e9di\u00e9e \u00e0 votre environnement SAP<\/h3>\nOptimisez votre posture de s\u00e9curit\u00e9 d\u00e8s aujourd&rsquo;hui avec SWAWE IAM.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_5&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb\/demande-de-demo\/\u00a0\u00bb button_text=\u00a0\u00bbDemander une d\u00e9monstration\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#004899&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb button_border_radius=\u00a0\u00bb4px\u00a0\u00bb button_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb button_font=\u00a0\u00bbRoboto|700||on|||||\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_margin=\u00a0\u00bb30px|20px||20px|false|true\u00a0\u00bb custom_padding=\u00a0\u00bb10px|20px|10px|20px|true|true\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset3&Prime; box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb box_shadow_blur=\u00a0\u00bb30px\u00a0\u00bb box_shadow_spread=\u00a0\u00bb-10px\u00a0\u00bb box_shadow_color=\u00a0\u00bbrgba(246,166,21,0.38)\u00a0\u00bb button_letter_spacing_hover=\u00a0\u00bb5.5px\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb button_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_text_size__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_text_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_width__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_border_radius__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_letter_spacing__hover_enabled=\u00a0\u00bbon\u00a0\u00bb button_letter_spacing__hover=\u00a0\u00bb5.5px\u00a0\u00bb button_one_letter_spacing__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_letter_spacing__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_one_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb button_two_bg_color__hover_enabled=\u00a0\u00bboff\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<h3>FAQ : Comprendre les enjeux de l&rsquo;IAM avec SWAWE<\/h3>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb closed_toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb closed_toggle_background_color=\u00a0\u00bb#f2f2fa\u00a0\u00bb icon_color=\u00a0\u00bb#EF7E26&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb toggle_text_color=\u00a0\u00bb#0B0D1D\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; border_radii=\u00a0\u00bbon|10px|10px|10px|10px\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#004899&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][et_pb_accordion_item title=\u00a0\u00bb1. Comment SWAWE IAM g\u00e8re-t-il les conflits de s\u00e9paration des t\u00e2ches (SoD) ?\u00a0\u00bb open=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]\nLa solution int\u00e8gre un moteur d&rsquo;analyse pr\u00e9ventif qui scanne chaque demande d&rsquo;acc\u00e8s en temps r\u00e9el. Avant m\u00eame que le droit ne soit accord\u00e9, le syst\u00e8me simule l&rsquo;impact et bloque ou alerte en cas de conflit avec les droits d\u00e9j\u00e0 existants de l&rsquo;utilisateur.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb2. Qu&rsquo;est-ce qu&rsquo;un Business Profile et quel est son avantage ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Un Business Profile est un regroupement logique de droits correspondant \u00e0 une fonction m\u00e9tier. L&rsquo;avantage est de masquer la complexit\u00e9 technique des syst\u00e8mes cibles (comme SAP) pour les managers, tout en garantissant que les acc\u00e8s provisionn\u00e9s sont strictement conformes au r\u00f4le de l&#8217;employ\u00e9.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb3. Est-il possible d&rsquo;int\u00e9grer SWAWE IAM avec un SIRH ou un annuaire existant ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Oui, l&rsquo;int\u00e9gration est un point fort de la solution. Via des APIs, SWAWE peut se synchroniser avec votre SIRH pour automatiser les arriv\u00e9es (Joiners) et les d\u00e9parts (Leavers), garantissant une base d&rsquo;identit\u00e9s toujours fiable et \u00e0 jour.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb4. Comment la solution aide-t-elle lors d&rsquo;un audit de s\u00e9curit\u00e9 ou financier ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]SWAWE agit comme un registre immuable. Il conserve l&rsquo;historique complet : qui a demand\u00e9 quoi, qui a valid\u00e9 l&rsquo;acc\u00e8s, et quand le provisionnement a eu lieu. Ces preuves sont exportables sous forme de rapports personnalis\u00e9s, facilitant grandement le travail des auditeurs.[\/et_pb_accordion_item][et_pb_accordion_item title=\u00a0\u00bb5. Le workflow de validation est-il fig\u00e9 ou peut-il s&rsquo;adapter \u00e0 notre organisation ?\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb toggle_level=\u00a0\u00bbh4&Prime; toggle_font_size=\u00a0\u00bb18px\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb open=\u00a0\u00bboff\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]Les workflows sont enti\u00e8rement personnalisables. Vous pouvez d\u00e9finir des circuits de validation multi-niveaux impliquant des managers m\u00e9tier, des responsables s\u00e9curit\u00e9 (RSSI) ou des propri\u00e9taires de donn\u00e9es, selon la criticit\u00e9 des acc\u00e8s demand\u00e9s.[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Enjeux de la gestion des identit\u00e9s et des acc\u00e8s (IAM) pour les syst\u00e8mes critiquesL&rsquo;essentiel en 3 points : Ma\u00eetrise du risque SoD : Analyse pr\u00e9ventive et simulation des conflits de s\u00e9paration des t\u00e2ches pour garantir la conformit\u00e9 SAP\/ERP. Automatisation du cycle de vie : Gestion fluide des processus Joiner-Mover-Leaver via des Business Profiles pour \u00e9liminer [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[12],"tags":[],"class_list":["post-1693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-des-acces-sap-iam-pam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAM (Identity Access Management) - Swawe<\/title>\n<meta name=\"description\" content=\"S\u00e9curisez vos acc\u00e8s SAP avec SWAWE IAM : automatisation du cycle de vie, analyse SoD pr\u00e9ventive et tra\u00e7abilit\u00e9 compl\u00e8te pour vos audits\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM (Identity Access Management) - Swawe\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curisez vos acc\u00e8s SAP avec SWAWE IAM : automatisation du cycle de vie, analyse SoD pr\u00e9ventive et tra\u00e7abilit\u00e9 compl\u00e8te pour vos audits\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Swawe\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-23T11:08:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T14:01:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Geoffrey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Geoffrey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\"},\"author\":{\"name\":\"Geoffrey\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a\"},\"headline\":\"IAM (Identity Access Management)\",\"datePublished\":\"2023-11-23T11:08:14+00:00\",\"dateModified\":\"2026-02-24T14:01:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\"},\"wordCount\":2601,\"image\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png\",\"articleSection\":[\"S\u00e9curit\u00e9 des Acc\u00e8s SAP (IAM &amp; PAM)\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\",\"url\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\",\"name\":\"IAM (Identity Access Management) - Swawe\",\"isPartOf\":{\"@id\":\"https:\/\/swawe.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png\",\"datePublished\":\"2023-11-23T11:08:14+00:00\",\"dateModified\":\"2026-02-24T14:01:54+00:00\",\"author\":{\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a\"},\"description\":\"S\u00e9curisez vos acc\u00e8s SAP avec SWAWE IAM : automatisation du cycle de vie, analyse SoD pr\u00e9ventive et tra\u00e7abilit\u00e9 compl\u00e8te pour vos audits\",\"breadcrumb\":{\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage\",\"url\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png\",\"contentUrl\":\"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/swawe.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAM (Identity Access Management)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swawe.fr\/#website\",\"url\":\"https:\/\/swawe.fr\/\",\"name\":\"Swawe\",\"description\":\"Your Compliance Companion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swawe.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a\",\"name\":\"Geoffrey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/swawe.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g\",\"caption\":\"Geoffrey\"},\"url\":\"https:\/\/swawe.fr\/en\/author\/geoffrey\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAM (Identity Access Management) - Swawe","description":"S\u00e9curisez vos acc\u00e8s SAP avec SWAWE IAM : automatisation du cycle de vie, analyse SoD pr\u00e9ventive et tra\u00e7abilit\u00e9 compl\u00e8te pour vos audits","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/","og_locale":"en_US","og_type":"article","og_title":"IAM (Identity Access Management) - Swawe","og_description":"S\u00e9curisez vos acc\u00e8s SAP avec SWAWE IAM : automatisation du cycle de vie, analyse SoD pr\u00e9ventive et tra\u00e7abilit\u00e9 compl\u00e8te pour vos audits","og_url":"https:\/\/swawe.fr\/en\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/","og_site_name":"Swawe","article_published_time":"2023-11-23T11:08:14+00:00","article_modified_time":"2026-02-24T14:01:54+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png","type":"image\/png"}],"author":"Geoffrey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Geoffrey","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#article","isPartOf":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/"},"author":{"name":"Geoffrey","@id":"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a"},"headline":"IAM (Identity Access Management)","datePublished":"2023-11-23T11:08:14+00:00","dateModified":"2026-02-24T14:01:54+00:00","mainEntityOfPage":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/"},"wordCount":2601,"image":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png","articleSection":["S\u00e9curit\u00e9 des Acc\u00e8s SAP (IAM &amp; PAM)"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/","url":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/","name":"IAM (Identity Access Management) - Swawe","isPartOf":{"@id":"https:\/\/swawe.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage"},"image":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png","datePublished":"2023-11-23T11:08:14+00:00","dateModified":"2026-02-24T14:01:54+00:00","author":{"@id":"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a"},"description":"S\u00e9curisez vos acc\u00e8s SAP avec SWAWE IAM : automatisation du cycle de vie, analyse SoD pr\u00e9ventive et tra\u00e7abilit\u00e9 compl\u00e8te pour vos audits","breadcrumb":{"@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#primaryimage","url":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png","contentUrl":"https:\/\/swawe.fr\/wp-content\/uploads\/2023\/11\/Maitrise-des-risques-Etape6.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/swawe.fr\/securite-des-acces-sap-iam-pam\/iam-identity-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/swawe.fr\/"},{"@type":"ListItem","position":2,"name":"IAM (Identity Access Management)"}]},{"@type":"WebSite","@id":"https:\/\/swawe.fr\/#website","url":"https:\/\/swawe.fr\/","name":"Swawe","description":"Your Compliance Companion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swawe.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/swawe.fr\/#\/schema\/person\/952252dc4280d444b93cbbff800a296a","name":"Geoffrey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/swawe.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/991790badc95025b7878c7f1bc7c0d96c824cfe0c012292dd83771d7411931d2?s=96&d=mm&r=g","caption":"Geoffrey"},"url":"https:\/\/swawe.fr\/en\/author\/geoffrey\/"}]}},"_links":{"self":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/comments?post=1693"}],"version-history":[{"count":6,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1693\/revisions"}],"predecessor-version":[{"id":2187,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/posts\/1693\/revisions\/2187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media\/1700"}],"wp:attachment":[{"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/media?parent=1693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/categories?post=1693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swawe.fr\/en\/wp-json\/wp\/v2\/tags?post=1693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}