{"id":10010,"date":"2018-11-07T10:58:22","date_gmt":"2018-11-07T09:58:22","guid":{"rendered":"https:\/\/www.tranquil.it\/authenticate-and-control-access-cybersecmonth\/"},"modified":"2025-07-18T11:02:54","modified_gmt":"2025-07-18T09:02:54","slug":"authenticate-and-control-access-cybersecmonth","status":"publish","type":"post","link":"https:\/\/www.tranquil.it\/en\/authenticate-and-control-access-cybersecmonth\/","title":{"rendered":"Authenticate and control access #CyberSecMonth"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; background_color=&#8221;#009EBD&#8221; custom_margin=&#8221;0px||&#8221; custom_padding=&#8221;19px||19px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; background_enable_image=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|40px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title featured_image=&#8221;off&#8221; text_color=&#8221;light&#8221; _builder_version=&#8221;4.27.4&#8243; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; meta=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;40px||0px|&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]As the second thematic week of CyberSecMonth gradually ends, we continue to provide you with our CyberAdvice. We conclude this week, focused on the discovery of digital professions, with a computer graphics on the importance of authenticating and controlling access to your system. This is an opportunity to highlight the position of Chief Information Security Officer (CISO), as you will see below![\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0|0px|0|0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Authenticating and controlling access, a natural reflex?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]Access control has become a real challenge for organizations, <strong>each vulnerability can turn into a breach<\/strong> and <strong>be a source of a cyber attack<\/strong>. Authenticating and controlling digital access must therefore become as natural as closing the door of your home before going to sleep.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.tranquil.it\/wp-content\/uploads\/cybersecmonth_infographie_3_HD-1.jpg&#8221; alt=&#8221;Authenticate and control access graphics&#8221; title_text=&#8221;Authenticate and control access graphics&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]Despite the importance of such actions, authenticating and controlling access is not necessarily easy. However, it is possible to act effectively on two levels. First of all, it is important to<strong> set up tools to control the different accesses<\/strong>. It is then necessary to <a href=\"https:\/\/www.tranquil.it\/en\/raising-awarness-and-training-cybersecmonth\/\">make employees aware of the protection of their data<\/a> (such as passwords) in order to effectively convey good practices internally.<\/p>\n<h3>Good practices:<\/h3>\n<h4>Account management:<\/h4>\n<p><strong>Authentication elements must be modified as soon as they are installed<\/strong>. Indeed, default passwords are easy to obtain. Strong authentication is one more step towards a secure system. It is therefore wise to <strong>use two-factor authentication<\/strong> to prevent intrusions. So, you&#8217;ve just changed the lock on your door and you&#8217;re the only one with a key!<\/p>\n<p><strong>Accounts<\/strong> accessing the information system must be <strong>nominative<\/strong> to facilitate the identification of the origin of incidents or potential vulnerabilities. The use of <strong>generic accounts<\/strong> should therefore be <strong>prohibited<\/strong>. These accounts must be subject to an even stricter <strong>data protection policy<\/strong>. <strong>Logins, passwords and connection traces<\/strong> must remain <strong>secret<\/strong>. Would you give a copy of your keys to a stranger you can&#8217;t fully trust? Do you want to answer &#8220;No&#8221; instinctively? Well, it&#8217;s the same for passwords.<\/p>\n<h4>Password management:<\/h4>\n<p>Items such as <strong>directories<\/strong>, <strong>databases<\/strong> or <strong>mailboxes<\/strong> can be a<strong> source of valuable information<\/strong> and therefore subject to<strong> cyber attack<\/strong>. These elements require the utmost vigilance on the part of the Chief Iinformation Security Officier (CISO). The listing of sensitive elements is not sufficiently effective, it is necessary to <strong>define, authenticate and control access to the system<\/strong>. <strong>Duplication and dispersion of these elements must also be avoided<\/strong> to ensure the security of the information system. Without too much effort, you&#8217;ve just added a lock to your precious door! But what&#8217;s the point of having a locked door if the window was left open?<\/p>\n<p>The first front door for a hacker is the user&#8217;s workstation. So, even if on the admin side you have locked everything, you also need to control your users and especially their passwords. Poor password management is a huge risk for organizations, so it is important to educate your users so that their session is protected. <strong>Recycled passwords or passwords that are too easy to guess should be banned<\/strong>. In addition to awareness-raising actions, it is possible to take restrictive measures such as <strong>blocking accounts after several connection failures<\/strong> or carrying out an <strong>audit concerning password robustness<\/strong>. The <strong>storage of these passwords<\/strong> must be done through <strong>secure solutions<\/strong> including <strong>encryption mechanisms.<\/strong><\/p>\n<h3>What means to authenticate and control access?<\/h3>\n<p>The CISO is the <strong>expert who guarantees the security and integrity of the information system<\/strong>. Often also in charge of <strong>data protection<\/strong> for the organisation (when there is no DPO), he is often the person to turn to when questions arise about access management.<\/p>\n<p><a href=\"https:\/\/keepass.info\/\">Keepass<\/a> allows you to<strong> manage passwords efficiently and securely<\/strong>. The little extra is that it is <strong>free and Open Source<\/strong>. Although optimized for Windows, Keepass also supports macOS and Linux operating systems. Encrypted files can contain user names, passwords, notes or even attachments.<\/p>\n<p>Your Active Directory <strong>manages the authentications and rights on your network<\/strong> since it lists all the information on the network, users, machines, groups and your system in general. You can use Microsoft Active Directory or its Open Source equivalent, Samba-AD. These two Active Directory are manageable via the same tools, namely the MMC console and RSATs. RSATs make it possible to <strong>control users&#8217; rights<\/strong> but also <strong>their inputs and outputs<\/strong>. It is therefore easier to <strong>identify sources of vulnerability<\/strong> and act locally before a tragedy occurs.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Why Choose an Open Source Active Directory?<\/h2>\n<p>In France, Tranquil IT is the leading integrator of <a href=\"https:\/\/www.tranquil.it\/securiser-acces\/samba-active-directory\/\">Samba Active Directory<\/a>, the Open Source equivalent of Microsoft Active Directory. With over 13 years of expertise in Samba, we efficiently conduct <a href=\"\/audit-de-parc-informatique\/\">IT fleet audits<\/a>, <a href=\"https:\/\/www.tranquil.it\/en\/migration-active-directory-2\/\">Active Directory migrations<\/a>, domain mergers, and even <a href=\"\/transfert-competences-samba-active-directory\/\">knowledge transfers on Samba Active Directory<\/a>. Our close collaboration with the SambaTeam has enabled us to successfully complete over 270 projects throughout the years. Choosing Open Source means saving on license fees and trusting our experts!<\/p>\n<p>At Tranquil IT, we prioritize Open Source tools for their reliability, maintainability, and the freedom they provide. Why get locked into lengthy contracts with exorbitant licensing costs from Microsoft? Invest your money wisely in direct improvements by supporting the development of an Open Source solution.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_button button_url=&#8221;https:\/\/www.tranquil.it\/en\/securing-accesses\/discover-samba-active-directory\/&#8221; button_text=&#8221;I&#8217;m migrating for Samba-AD !&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#009EBD&#8221; button_border_width=&#8221;0px&#8221; background_layout=&#8221;dark&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_bg_enable_color=&#8221;on&#8221; button_border_color=&#8221;#009EBD&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;||&#8221; custom_padding=&#8221;0px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_divider _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0|0|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>France takes up the ECSC challenge!<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]Before getting to the heart of the matter, we would first of all like to support the French team, which is participating for the first time in the ECSC challenge. Indeed, the <a href=\"https:\/\/www.europeancybersecuritychallenge.eu\/#home1\">European CyberSecurity Challenge<\/a> takes place <strong>from 14 to 17 October<\/strong> and pits<strong> 17 national teams<\/strong> of <strong>young ethical hackers and professional trainers<\/strong>. Teams must overcome several challenges such as <strong>cryptography<\/strong>, <strong>reverse engineering<\/strong> or even <strong>vulnerability research<\/strong> to hope to win the competition. You can show your support for our national team on the networks (<a href=\"https:\/\/twitter.com\/search?src=typd&amp;q=%23ECSC2018\">#ECSC2018<\/a>; <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23TeamFR&amp;src=typd\">#TeamFR<\/a>) or by downloading the <a href=\"https:\/\/www.ssi.gouv.fr\/agence\/cybersecurite\/mois-de-la-cybersecurite-2018\/rejoignez-lequipe-qui-representera-la-france-lors-du-challenge-europeen\/\">ECSC kit<\/a> made available by ANSSI, which funds the event in association with HackerZvoice.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What You Shouldn&#8217;t Miss:<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]Articles not to be missed:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.stormshield.com\/fr\/chiffrement-des-donnees-en-entreprise-mode-demploi\/\"> Data encryption: Instructions for use &#8211; Stormshield<\/a><\/li>\n<li><a href=\"https:\/\/www.lesechos.fr\/tech-medias\/hightech\/0302374459526-google-ferme-son-reseau-social-apres-une-faille-de-securite-2211867.php\">Google closes its social network after a security breach &#8211; Les \u00e9chos\u00a0<\/a><\/li>\n<\/ul>\n<p>Find all our recommendations on <a href=\"https:\/\/twitter.com\/TRANQUIL_IT?lang=fr\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/tranquil-it\/\">LinkedIn<\/a> and on hashtag: <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23TousSecNum&amp;src=typd\">#TousSecNum,<\/a> <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23CyberSecMonth&amp;src=typd\">#CyberSecMonth,<\/a> <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23ECSM2018&amp;src=typd\">#ECSM2018 <\/a>et\u00a0<a href=\"https:\/\/twitter.com\/search?q=%23ECSM&amp;src=typd\">#ECSM<\/a>. Also follow our hashtag <a href=\"https:\/\/twitter.com\/search?f=tweets&amp;q=%23CyberConseil&amp;src=typd\">#CyberConseil <\/a> to follow Tranquil IT&#8217;s advice and discover the following graphics[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0|0px|0px|0px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;40px||0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_divider _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; module_class=&#8221;CasClient&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;73%&#8221; max_width=&#8221;1381px&#8221; min_height=&#8221;838px&#8221; max_height=&#8221;1000px&#8221; custom_margin=&#8221;-19px||-260px||false|false&#8221; custom_padding=&#8221;84px||46px||false|false&#8221; hover_enabled=&#8221;0&#8243; make_fullwidth=&#8221;off&#8221; use_custom_width=&#8221;off&#8221; width_unit=&#8221;on&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;all&#8221; use_manual_excerpt=&#8221;off&#8221; excerpt_length=&#8221;80&#8243; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_excerpt=&#8221;off&#8221; show_pagination=&#8221;off&#8221; module_class=&#8221;Blog&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221; min_height__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authenticating and controlling access helps identify vulnerabilities in a park. Learn how to eliminate the security breaches that threaten your park!<\/p>\n","protected":false},"author":1,"featured_media":28324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[53,44],"tags":[56,270,48,55,54],"class_list":["post-10010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecmonth-en","category-news-events","tag-cyberadvice","tag-cyberconseil-en","tag-cyberconseil","tag-cybersecmonth-en","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Authenticate and control access #CyberSecMonth - Blog Tranquil IT<\/title>\n<meta name=\"description\" content=\"Authenticating and controlling access allows you to identify vulnerabilities in a park. Learn how to eliminate security breaches that threaten your park!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authenticate and control access #CyberSecMonth - Blog Tranquil IT\" \/>\n<meta property=\"og:description\" content=\"Authenticating and controlling access allows you to identify vulnerabilities in a park. Learn how to eliminate security breaches that threaten your park!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/\" \/>\n<meta property=\"og:site_name\" content=\"Tranquil IT\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-07T09:58:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T09:02:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png\" \/>\n\t<meta property=\"og:image:width\" content=\"423\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin-site\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TRANQUIL_IT\" \/>\n<meta name=\"twitter:site\" content=\"@TRANQUIL_IT\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/\"},\"author\":{\"name\":\"admin-site\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/person\\\/ca2d8c4fc6339e7946b5d62845bb0d70\"},\"headline\":\"Authenticate and control access #CyberSecMonth\",\"datePublished\":\"2018-11-07T09:58:22+00:00\",\"dateModified\":\"2025-07-18T09:02:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/\"},\"wordCount\":1932,\"publisher\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"keywords\":[\"CyberAdvice\",\"CyberConseil\",\"CyberConseil\",\"CyberSecMonth\",\"CyberSecurity\"],\"articleSection\":[\"CyberSecMonth\",\"News &amp; Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/\",\"name\":\"Authenticate and control access #CyberSecMonth - Blog Tranquil IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"datePublished\":\"2018-11-07T09:58:22+00:00\",\"dateModified\":\"2025-07-18T09:02:54+00:00\",\"description\":\"Authenticating and controlling access allows you to identify vulnerabilities in a park. Learn how to eliminate security breaches that threaten your park!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"contentUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/Mockup17.png\",\"width\":423,\"height\":260,\"caption\":\"cadenas s\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/authentifier-et-controler-les-acces-cybersecmonth\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.tranquil.it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authenticate and control access #CyberSecMonth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#website\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/\",\"name\":\"Tranquil IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tranquil.it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\",\"name\":\"Tranquil IT\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/logo-Tranquil-IT-couleurs-RVB.png\",\"contentUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/logo-Tranquil-IT-couleurs-RVB.png\",\"width\":600,\"height\":180,\"caption\":\"Tranquil IT\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/TRANQUIL_IT\",\"http:\\\/\\\/linkedin.com\\\/company\\\/tranquil-it\",\"http:\\\/\\\/www.youtube.com\\\/c\\\/TranquilITSystems\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/person\\\/ca2d8c4fc6339e7946b5d62845bb0d70\",\"name\":\"admin-site\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Authenticate and control access #CyberSecMonth - Blog Tranquil IT","description":"Authenticating and controlling access allows you to identify vulnerabilities in a park. Learn how to eliminate security breaches that threaten your park!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/","og_locale":"en_US","og_type":"article","og_title":"Authenticate and control access #CyberSecMonth - Blog Tranquil IT","og_description":"Authenticating and controlling access allows you to identify vulnerabilities in a park. Learn how to eliminate security breaches that threaten your park!","og_url":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/","og_site_name":"Tranquil IT","article_published_time":"2018-11-07T09:58:22+00:00","article_modified_time":"2025-07-18T09:02:54+00:00","og_image":[{"width":423,"height":260,"url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","type":"image\/png"}],"author":"admin-site","twitter_card":"summary_large_image","twitter_creator":"@TRANQUIL_IT","twitter_site":"@TRANQUIL_IT","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#article","isPartOf":{"@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/"},"author":{"name":"admin-site","@id":"https:\/\/www.tranquil.it\/#\/schema\/person\/ca2d8c4fc6339e7946b5d62845bb0d70"},"headline":"Authenticate and control access #CyberSecMonth","datePublished":"2018-11-07T09:58:22+00:00","dateModified":"2025-07-18T09:02:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/"},"wordCount":1932,"publisher":{"@id":"https:\/\/www.tranquil.it\/#organization"},"image":{"@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","keywords":["CyberAdvice","CyberConseil","CyberConseil","CyberSecMonth","CyberSecurity"],"articleSection":["CyberSecMonth","News &amp; Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/","url":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/","name":"Authenticate and control access #CyberSecMonth - Blog Tranquil IT","isPartOf":{"@id":"https:\/\/www.tranquil.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#primaryimage"},"image":{"@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","datePublished":"2018-11-07T09:58:22+00:00","dateModified":"2025-07-18T09:02:54+00:00","description":"Authenticating and controlling access allows you to identify vulnerabilities in a park. Learn how to eliminate security breaches that threaten your park!","breadcrumb":{"@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#primaryimage","url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","contentUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/Mockup17.png","width":423,"height":260,"caption":"cadenas s\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tranquil.it\/authentifier-et-controler-les-acces-cybersecmonth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.tranquil.it\/"},{"@type":"ListItem","position":2,"name":"Authenticate and control access #CyberSecMonth"}]},{"@type":"WebSite","@id":"https:\/\/www.tranquil.it\/#website","url":"https:\/\/www.tranquil.it\/","name":"Tranquil IT","description":"","publisher":{"@id":"https:\/\/www.tranquil.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tranquil.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tranquil.it\/#organization","name":"Tranquil IT","url":"https:\/\/www.tranquil.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tranquil.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/logo-Tranquil-IT-couleurs-RVB.png","contentUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/logo-Tranquil-IT-couleurs-RVB.png","width":600,"height":180,"caption":"Tranquil IT"},"image":{"@id":"https:\/\/www.tranquil.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/TRANQUIL_IT","http:\/\/linkedin.com\/company\/tranquil-it","http:\/\/www.youtube.com\/c\/TranquilITSystems"]},{"@type":"Person","@id":"https:\/\/www.tranquil.it\/#\/schema\/person\/ca2d8c4fc6339e7946b5d62845bb0d70","name":"admin-site"}]}},"_links":{"self":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts\/10010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/comments?post=10010"}],"version-history":[{"count":30,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts\/10010\/revisions"}],"predecessor-version":[{"id":39481,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/posts\/10010\/revisions\/39481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/media\/28324"}],"wp:attachment":[{"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/media?parent=10010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/categories?post=10010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tranquil.it\/en\/wp-json\/wp\/v2\/tags?post=10010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}