{"version":"1.0","provider_name":"KYOS","provider_url":"https:\/\/staging.kyos.ch\/en\/","author_name":"tkoadmin","author_url":"https:\/\/staging.kyos.ch\/en\/author\/tkoadmin\/","title":"Identity and Access - KYOS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1EH9zR0CO1\"><a href=\"https:\/\/staging.kyos.ch\/en\/security\/identity-access\/\">Identity and Access<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/staging.kyos.ch\/en\/security\/identity-access\/embed\/#?secret=1EH9zR0CO1\" width=\"600\" height=\"338\" title=\"&#8220;Identity and Access&#8221; &#8212; KYOS\" data-secret=\"1EH9zR0CO1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Main Menu Audit and Pentests Identity and Access Perimeter and Content Endpoint Data and Encryption Training Event Management Identity and access management With the multiplication of access points and sources of information, it has become essential to manage the numerous participants in an increasingly open information system.\u00a0\u00a0 To address your identity management, traceability and access [&hellip;]"}