{"id":26297,"date":"2022-04-19T15:07:00","date_gmt":"2022-04-19T13:07:00","guid":{"rendered":"https:\/\/perseus.de\/identification-authentification-et-autorisation\/"},"modified":"2026-03-27T16:17:55","modified_gmt":"2026-03-27T15:17:55","slug":"identification-authentification-et-autorisation","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/","title":{"rendered":"Identification, authentification et autorisation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26297\" class=\"elementor elementor-26297 elementor-22108\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-955f33a e-con-full e-flex e-con e-child\" data-id=\"955f33a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Identification, authentification et autorisation\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-510b06c6 e-flex e-con-boxed e-con e-parent\" data-id=\"510b06c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8a45e7a e-con-full e-flex e-con e-child\" data-id=\"8a45e7a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><h4>Que signifient exactement les termes \u00ab identification\u00bb, \u00ab authentification \u00bb et \u00ab autorisation \u00bb ?<\/h4><p><strong> <\/strong><\/p><p><strong>Identification \u2013 la v\u00e9rification d&rsquo;une identit\u00e9<\/strong><br>Lors d&rsquo;une authentification, une personne apporte la preuve qu&rsquo;elle est bien celle qu&rsquo;elle pr\u00e9tend \u00eatre. Dans la vie quotidienne, cela se fait par exemple en pr\u00e9sentant sa carte d&rsquo;identit\u00e9. En informatique, on utilise souvent un mot de passe associ\u00e9 \u00e0 un nom d&rsquo;utilisateur.  <\/p><p><strong> <\/strong><\/p><p><strong>Authentification \u2013 v\u00e9rification de l&rsquo;authenticit\u00e9 du justificatif d&rsquo;identit\u00e9 susmentionn\u00e9<\/strong><br>Dans la vie quotidienne, cela se fait par exemple en v\u00e9rifiant que la carte d&rsquo;identit\u00e9 n&rsquo;est pas falsifi\u00e9e et en comparant les informations avec la personne concern\u00e9e. En informatique, on v\u00e9rifie par exemple si la combinaison nom d&rsquo;utilisateur\/mot de passe existe dans le syst\u00e8me. <\/p><p><strong> <\/strong><\/p><p><strong>Autorisation \u2013 l&rsquo;octroi de l&rsquo;acc\u00e8s aux privil\u00e8ges auxquels a droit une personne dont l&rsquo;identit\u00e9 a \u00e9t\u00e9 v\u00e9rifi\u00e9e avec succ\u00e8s<\/strong><br>Au quotidien, cela peut se traduire, apr\u00e8s pr\u00e9sentation de la carte d&rsquo;identit\u00e9, par l&rsquo;acc\u00e8s \u00e0 une entreprise o\u00f9 l&rsquo;on a \u00e9t\u00e9 enregistr\u00e9 en tant qu&rsquo;invit\u00e9. Mais : en tant qu&rsquo;invit\u00e9, on peut n&rsquo;avoir acc\u00e8s qu&rsquo;\u00e0 la salle de r\u00e9union, et non au hall de montage. En informatique, l&rsquo;autorisation permet par exemple de travailler sur un compte utilisateur. Mais si ce compte ne dispose pas de droits d&rsquo;administrateur, il n&rsquo;est par exemple pas possible d&rsquo;installer de nouveaux programmes.   <\/p><h4> <\/h4><h4>O\u00f9 est-ce que je rencontre ce th\u00e8me dans mon travail quotidien ?<\/h4><p>Vous y \u00eates confront\u00e9 tr\u00e8s souvent. \u00c0 chaque connexion \u00e0 votre ordinateur de travail, \u00e0 chaque consultation de vos e-mails, voire \u00e0 chaque visite d&rsquo;un site web. Lors de toutes ces op\u00e9rations, vous ou votre ordinateur prouvez votre identit\u00e9, celle-ci est v\u00e9rifi\u00e9e, puis les privil\u00e8ges correspondants vous sont accord\u00e9s \u2013 ou refus\u00e9s. Si vous vous \u00eates tromp\u00e9 en saisissant votre mot de passe, vous n&rsquo;avez pas acc\u00e8s \u00e0 votre compte utilisateur. L&rsquo;authentification n&rsquo;a pas abouti, vous n&rsquo;obtenez donc pas d&rsquo;autorisation.    <\/p><h3> <\/h3><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><p><strong> <\/strong><\/p><p><strong>Authentification<\/strong><br>Utilisez des m\u00e9thodes d&rsquo;authentification aussi s\u00fbres que possible, par exemple via des connexions crypt\u00e9es.<br>Veillez \u00e0 ce que les mots de passe que vous utilisez pour vous authentifier soient aussi s\u00fbrs que possible, c&rsquo;est-\u00e0-dire aussi complexes que possible.<br>Dans la mesure du possible, emp\u00eachez que vos informations d&rsquo;authentification puissent \u00eatre intercept\u00e9es et utilis\u00e9es \u00e0 mauvais escient par des tiers, par exemple \u00e0 l&rsquo;aide de keyloggers.<\/p><p><strong> <\/strong><\/p><p><strong>Authentification<\/strong><br>Utilisez l&rsquo;authentification \u00e0 deux facteurs d\u00e8s que vous en avez la possibilit\u00e9. M\u00eame si des cybercriminels parviennent \u00e0 se procurer vos identifiants, ceux-ci leur seront inutiles gr\u00e2ce \u00e0 l&rsquo;authentification \u00e0 deux facteurs. <\/p><p><strong> <\/strong><\/p><p>Autorisation<br>Veillez \u00e0 ne disposer, dans tous les programmes et syst\u00e8mes, que des privil\u00e8ges dont vous avez r\u00e9ellement besoin. Travaillez par exemple avec un compte utilisateur qui ne dispose pas de droits d&rsquo;administrateur. Cela ne limitera en rien votre productivit\u00e9, mais emp\u00eachera les programmes malveillants d&rsquo;effectuer certaines op\u00e9rations, ou rendra celles-ci plus difficiles.  <\/p><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb1187d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cb1187d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Identification, authentification et autorisation Que signifient exactement les termes \u00ab identification\u00bb, \u00ab authentification \u00bb et \u00ab autorisation \u00bb ? Identification \u2013 la v\u00e9rification d&rsquo;une identit\u00e9Lors d&rsquo;une authentification, une personne apporte la preuve qu&rsquo;elle est bien celle qu&rsquo;elle pr\u00e9tend \u00eatre. Dans la vie quotidienne, cela se fait par exemple en pr\u00e9sentant sa carte d&rsquo;identit\u00e9. En informatique, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26297","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identification, authentification et autorisation - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identification, authentification et autorisation - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Identification, authentification et autorisation Que signifient exactement les termes \u00ab identification\u00bb, \u00ab authentification \u00bb et \u00ab autorisation \u00bb ? Identification \u2013 la v\u00e9rification d&rsquo;une identit\u00e9Lors d&rsquo;une authentification, une personne apporte la preuve qu&rsquo;elle est bien celle qu&rsquo;elle pr\u00e9tend \u00eatre. Dans la vie quotidienne, cela se fait par exemple en pr\u00e9sentant sa carte d&rsquo;identit\u00e9. En informatique, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T15:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Identification, authentification et autorisation\",\"datePublished\":\"2022-04-19T13:07:00+00:00\",\"dateModified\":\"2026-03-27T15:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/\"},\"wordCount\":529,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/\",\"name\":\"Identification, authentification et autorisation - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:07:00+00:00\",\"dateModified\":\"2026-03-27T15:17:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/identification-authentification-et-autorisation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identification, authentification et autorisation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identification, authentification et autorisation - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/","og_locale":"fr_FR","og_type":"article","og_title":"Identification, authentification et autorisation - Perseus Technologies","og_description":"Identification, authentification et autorisation Que signifient exactement les termes \u00ab identification\u00bb, \u00ab authentification \u00bb et \u00ab autorisation \u00bb ? Identification \u2013 la v\u00e9rification d&rsquo;une identit\u00e9Lors d&rsquo;une authentification, une personne apporte la preuve qu&rsquo;elle est bien celle qu&rsquo;elle pr\u00e9tend \u00eatre. Dans la vie quotidienne, cela se fait par exemple en pr\u00e9sentant sa carte d&rsquo;identit\u00e9. En informatique, [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:07:00+00:00","article_modified_time":"2026-03-27T15:17:55+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Identification, authentification et autorisation","datePublished":"2022-04-19T13:07:00+00:00","dateModified":"2026-03-27T15:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/","url":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/","name":"Identification, authentification et autorisation - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:07:00+00:00","dateModified":"2026-03-27T15:17:55+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/identification-authentification-et-autorisation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Identification, authentification et autorisation"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26297"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26297\/revisions"}],"predecessor-version":[{"id":26298,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26297\/revisions\/26298"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}