{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/fr\/","title":"L\u2019authentification \u00e0 deux facteurs prot\u00e8ge \u2013 vraiment ?! - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5GXOFdexc5\"><a href=\"https:\/\/perseus.de\/fr\/lauthentification-a-deux-facteurs-protege-vraiment\/\">L\u2019authentification \u00e0 deux facteurs prot\u00e8ge \u2013 vraiment ?!<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/fr\/lauthentification-a-deux-facteurs-protege-vraiment\/embed\/#?secret=5GXOFdexc5\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0L\u2019authentification \u00e0 deux facteurs prot\u00e8ge \u2013 vraiment ?!\u00a0\u00bb &#8212; Perseus Technologies\" data-secret=\"5GXOFdexc5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Blog-Header-Zwei-Faktor-Authentifizierung.jpg","thumbnail_width":730,"thumbnail_height":412,"description":"L\u2019authentification \u00e0 deux ou plusieurs facteurs est la ceinture de s\u00e9curit\u00e9 de la cybers\u00e9curit\u00e9. Lorsqu\u2019ils sont utilis\u00e9s correctement, les risques cybern\u00e9tiques peuvent \u00eatre r\u00e9duits, mais ils ne prot\u00e8gent pas contre le comportement n\u00e9gligent de chacun de soi. Nous expliquons comment fonctionne l\u2019authentification \u00e0 deux facteurs, quand cela vaut la peine de l\u2019utiliser et o\u00f9 se situent ses limites."}