{"id":3026,"date":"2024-08-28T18:18:36","date_gmt":"2024-08-28T18:18:36","guid":{"rendered":"https:\/\/www.intellisecsolutions.com\/2024\/08\/28\/acces-securise-aux-machines-virtuelles-avec-azure-bastion\/"},"modified":"2024-08-28T18:18:36","modified_gmt":"2024-08-28T18:18:36","slug":"acces-securise-aux-machines-virtuelles-avec-azure-bastion","status":"publish","type":"post","link":"https:\/\/www.intellisecsolutions.com\/fr\/2024\/08\/28\/acces-securise-aux-machines-virtuelles-avec-azure-bastion\/","title":{"rendered":"Acc\u00e8s s\u00e9curis\u00e9 aux machines virtuelles avec Azure Bastion"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3026\" class=\"elementor elementor-3026\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2cb2d08a e-con-full-nospace e-flex e-con e-parent\" data-id=\"2cb2d08a\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full-nospace&quot;}\" data-sticky-container=\"\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-4e95b0ed cms-eptitle-overlay-1 elementor-widget elementor-widget-cms_page_title\" data-id=\"4e95b0ed\" data-element_type=\"widget\" data-widget_type=\"cms_page_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"cms-eptitle-overlay cms-overlay cms-bg-parallax cms-lazy\" style=\"--cms-bg-lazyload:url(https:\/\/www.intellisecsolutions.com\/wp-content\/uploads\/2024\/08\/digital-8280787_1280.jpg);background-image:var(--cms-bg-lazyload-loaded);background-position:top center;\"><div class=\"cms-eptitle-overlay-shadow cms-overlay rtl-flip\"><\/div><\/div>\n<div class=\"cms-eptitle cms-eptitle-1 relative z-top text-start\">\n\t<div class=\"cms-content container text-start d-flex justify-content-start\">\n\t\t<div class=\"cms--content d-flex justify-content-start\">\n\t\t\t<div class=\"cms-small-title pb-10 w-100 text-15 text-uppercase pt-5 text-white ls-06 empty-none\"><\/div>\n\t\t\t<h1 class=\"cms-title lh-11538 text-65 text-tablet-50 text-mobile-30 text-white w-100 empty-none\"> <\/h1>\n\t\t\t<div class=\"cms-desc pt-20 w-100 text-17 text-white empty-none\"><\/div>\n\t\t\t<div class=\"d-flex align-items-center gap empty-none w-100 pt-35 justify-content-start\" style=\"--cms-gap:30px;--cms-gap-tablet:30px;--cms-gap-mobile:20px;\"><\/div>\n\t\t\t<ul class=\"cms-breadcrumb unstyled text-white text-hover-white justify-content-start\"><li><span class=\"breadcrumb-entry\" >Accueil<\/span><\/li><\/ul>\t\t<\/div>\n\t<\/div>\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-665c566c e-flex e-con-boxed e-con e-parent\" data-id=\"665c566c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-sticky-container=\"\">\r\n\t\t\t\t\t<div class=\"e-con-inner\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-22d76cfd elementor-widget elementor-widget-spacer\" data-id=\"22d76cfd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46b163a0 elementor-widget elementor-widget-cms_breadcrumb\" data-id=\"46b163a0\" data-element_type=\"widget\" data-widget_type=\"cms_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"cms-ebreadcrumb cms-breadcrumb cms-breadcrumb-1 d-flex\">\n    <ul class=\"cms-breadcrumb unstyled\"><li><span class=\"breadcrumb-entry\" >Accueil<\/span><\/li><\/ul><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56529e3c elementor-widget elementor-widget-cms_heading\" data-id=\"56529e3c\" data-element_type=\"widget\" data-widget_type=\"cms_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"cms-eheading cms-eheading-1 text-start\">\n\t<div class=\"cms-smallheading text-accent pb-10 text-16 font-600 empty-none\">S\u00e9curit\u00e9 du Cloud<\/div>\n\t<h2 class=\"cms-heading empty-none text-heading lh-1375\">Acc\u00e8s s\u00e9curis\u00e9 aux machines virtuelles \u00e0 l'aide d'Azure Bastion<\/h2>\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-3b94f7da e-flex e-con-boxed e-con e-parent\" data-id=\"3b94f7da\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-sticky-container=\"\">\r\n\t\t\t\t\t<div class=\"e-con-inner\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-6e2e8318 elementor-widget elementor-widget-cms_heading\" data-id=\"6e2e8318\" data-element_type=\"widget\" data-widget_type=\"cms_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"cms-eheading cms-eheading-13 text-start empty-none\">\n\t<div class=\"cms-title empty-none text-heading text-26 text-mobile-20 lh-1375 font-600 empty-none pb-15\"><\/div>\n\t<div class=\"cms-desc-bold font-700 empty-none text-heading pb-25 empty-none\"><\/div>\n\t<div class=\"cms-desc empty-none text-body empty-none\">Microsoft Entra Privileged Identity Management (PIM) is a feature of Microsoft Entra ID that enables organizations to manage, control, and monitor access to critical resources. By implementing PIM, organizations can significantly reduce the risk of unauthorized access and ensure that users have the necessary permissions only when required. A key aspect of PIM is its Just-In-Time (JIT) access capability, which allows users to activate their roles temporarily, thus enhancing security while maintaining operational efficiency.<\/div>\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c14f448 elementor-widget elementor-widget-text-editor\" data-id=\"1c14f448\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h4 class=\"wp-block-heading\">What is Just-In-Time Access?<\/h4><p>\u00a0<\/p><p><strong>Just-In-Time access<\/strong>\u00a0is a security mechanism that grants users temporary permissions to perform specific tasks. This approach reduces the risk of excessive permissions and potential misuse, as users can only access sensitive resources when absolutely necessary. JIT access is particularly important for administrative roles, where the potential for misuse can have significant consequences.<\/p><h4 class=\"wp-block-heading\"><span id=\"Key_Features_of_Azure_PIM\" class=\"ez-toc-section\"><\/span>Key Features of Azure PIM<\/h4><p>\u00a0<\/p><ul><li><strong>Time-Based Role Activation<\/strong>: Users can activate roles for a limited time, ensuring that permissions are not permanently granted.<\/li><li><strong>Approval Workflow<\/strong>: Activation requests can require approval from designated approvers, adding an extra layer of security.<\/li><li><strong>Multi-Factor Authentication<\/strong>: To activate any role, users must complete multi-factor authentication, further securing access.<\/li><li><strong>Justification for Activation<\/strong>: Users must provide a reason for activating their roles, which helps organizations understand access patterns.<\/li><li><strong>Notifications and Audit Trails<\/strong>: PIM sends notifications when roles are activated and maintains an audit history for compliance and review purposes.<\/li><\/ul><h4 class=\"wp-block-heading\"><span id=\"Licensing_Requirements\" class=\"ez-toc-section\"><\/span>Licensing Requirements<\/h4><p>\u00a0<\/p><p>To utilize PIM, your organization must have one of the following licenses:<\/p><ul><li><strong>Microsoft Entra ID Governance License<\/strong><\/li><li><strong>Microsoft Entra ID P2 License<\/strong><\/li><\/ul><h4 class=\"wp-block-heading\"><span id=\"Best_Practices_for_Using_Just-In-Time_Access\" class=\"ez-toc-section\"><\/span>Best Practices for Using Just-In-Time Access\u00a0<\/h4><p>\u00a0<\/p><ul><li><strong>Implement Least Privilege<\/strong>: Always adhere to the principle of least privilege, granting users only the permissions necessary for their tasks.<\/li><li><strong>Conduct Regular Access Reviews<\/strong>: Periodically review role assignments and access to ensure they are still appropriate.<\/li><li><strong>Utilize Multifactor Authentication<\/strong>: Enforce MFA for all role activations to enhance security.<\/li><\/ul><h4 class=\"wp-block-heading\"><span id=\"Demo_Activating_Just-In-Time_Access\" class=\"ez-toc-section\"><\/span>Demo: Activating Just-In-Time Access<\/h4><p>\u00a0<\/p><p>In this demo, we will introduce a security engineer named Grady Archie, who holds a Security Reader role that is permanently assigned to him. Occasionally, Grady needs to configure Microsoft Defender for Cloud Apps. To adhere to the principle of least privilege, we will assign him the role of Cloud App Security Administrator but he will be only eligible for that role. This assignment will allow him to activate it only when necessary, ensuring that he has the appropriate permissions without compromising security.<\/p><figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-349 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/PIM-1024x322.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/PIM-1024x322.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/PIM-300x94.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/PIM-768x242.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/PIM-1536x483.png 1536w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/PIM.png 1695w\" alt=\"\" width=\"1024\" height=\"322\" \/><\/figure><p>\u00a0<\/p><ol><li><strong>Assigning the Role<\/strong>:<\/li><\/ol><p>\u00a0<\/p><p>Access the\u00a0<strong>Microsoft Entra ID<\/strong>\u00a0portal by navigating to\u00a0<a href=\"https:\/\/entra.microsoft.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">entra.microsoft.com<\/a>.<\/p><p>Once logged in, we go to the\u00a0<strong>Identity Governance<\/strong>\u00a0section.<\/p><p>Click on\u00a0<strong>Privileged Identity Management<\/strong>\u00a0(PIM).<\/p><figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-345 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1024x761.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1024x761.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-300x223.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-768x571.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image.png 1044w\" alt=\"\" width=\"1024\" height=\"761\" \/><\/figure><p>\u00a0<\/p><p>In the PIM interface, select Roles from the sidebar, then click on Add Assignments.<\/p><p>\u00a0<\/p><figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-346 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1-1024x574.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1-1024x574.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1-300x168.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1-768x430.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-1.png 1074w\" alt=\"\" width=\"1024\" height=\"574\" \/><\/figure><p>\u00a0<\/p><p>We will assign the Cloud App Security Administrator role to the user Grady Archie.<\/p><p>\u00a0<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-347 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-2.png\" sizes=\"(max-width: 595px) 100vw, 595px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-2.png 595w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-2-278x300.png 278w\" alt=\"\" width=\"595\" height=\"643\" \/><\/figure><p>\u00a0<\/p><p>Grady will be eligible to activate this role for a duration of four days, starting from 08\/04\/2024 to 08\/08\/2024.<\/p><p>\u00a0<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-348 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-3.png\" sizes=\"(max-width: 550px) 100vw, 550px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-3.png 550w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-3-300x236.png 300w\" alt=\"\" width=\"550\" height=\"432\" \/><\/figure><p>\u00a0<\/p><p><strong>2 . Activating the Role<\/strong>:<\/p><p>We will log in as \u201cGrady Archie\u201d First, verify the roles assigned to\u00a0<strong>Grady Archie<\/strong>. He is permanently assigned the\u00a0<strong>Security Reader<\/strong>\u00a0role and is eligible for the\u00a0<strong>Cloud App Security Administrator<\/strong>\u00a0role.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-352 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-5-1024x356.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-5-1024x356.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-5-300x104.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-5-768x267.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-5.png 1057w\" alt=\"\" width=\"1024\" height=\"356\" \/><\/figure><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-353 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-6-1024x238.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-6-1024x238.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-6-300x70.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-6-768x178.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-6-1536x357.png 1536w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-6.png 1610w\" alt=\"\" width=\"1024\" height=\"238\" \/><\/figure><p>Grady will navigate to\u00a0<strong>PIM<\/strong>, then select\u00a0<strong>My Roles<\/strong>\u00a0and click on\u00a0<strong>Activate<\/strong>\u00a0for the\u00a0<strong>Cloud App Security Administrator<\/strong>\u00a0role.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-354 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-7-1024x427.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-7-1024x427.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-7-300x125.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-7-768x320.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-7-1536x640.png 1536w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-7.png 1897w\" alt=\"\" width=\"1024\" height=\"427\" \/><\/figure><p>During the activation process, Grady will need to provide a justification for the role elevation.<\/p><p>He must also specify the duration for which he requires the role activation.<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-355 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-8.png\" sizes=\"(max-width: 574px) 100vw, 574px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-8.png 574w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-8-300x203.png 300w\" alt=\"\" width=\"574\" height=\"388\" \/><\/figure><p>Once all information is entered, the activation process will begin. If everything is correct, Grady will be temporarily assigned the\u00a0<strong>Cloud App Security Administrator<\/strong>\u00a0role.<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-356 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-9.png\" sizes=\"(max-width: 585px) 100vw, 585px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-9.png 585w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-9-300x227.png 300w\" alt=\"\" width=\"585\" height=\"443\" \/><\/figure><p>After the verification process is completed, Grady will now be actively assigned the Cloud App Security Administrator role for a duration of 8 hours.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-357 aligncenter\" src=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-10-1024x165.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-10-1024x165.png 1024w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-10-300x48.png 300w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-10-768x124.png 768w, https:\/\/laythchebbi.com\/wp-content\/uploads\/2024\/08\/image-10.png 1337w\" alt=\"\" width=\"1024\" height=\"165\" \/><\/figure><h4 class=\"wp-block-heading\"><span id=\"Conclusion\" class=\"ez-toc-section\"><\/span>Conclusion<\/h4><p>\u00a0<\/p><p>Azure PIM and its Just-In-Time access feature are essential for organizations looking to enhance their security posture. By allowing temporary access to sensitive resources, organizations can minimize the risk of unauthorized access while ensuring that users have the permissions they need to perform their tasks effectively.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f9c9d3 elementor-widget elementor-widget-spacer\" data-id=\"3f9c9d3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Microsoft Entra Privileged Identity Management (PIM) est une fonctionnalit\u00e9 de Microsoft Entra ID qui permet aux entreprises de g\u00e9rer, contr\u00f4ler et surveiller l&#8217;acc\u00e8s aux ressources critiques.<br \/>\nEn mettant en \u0153uvre PIM, les organisations peuvent r\u00e9duire de mani\u00e8re significative le risque d&#8217;acc\u00e8s non autoris\u00e9 et s&#8217;assurer que les utilisateurs disposent des permissions n\u00e9cessaires uniquement lorsque cela est requis.<br \/>\nUn aspect cl\u00e9 de PIM est sa capacit\u00e9 d&#8217;acc\u00e8s juste \u00e0 temps (JIT), qui permet aux utilisateurs d&#8217;activer leurs r\u00f4les temporairement, renfor\u00e7ant ainsi la s\u00e9curit\u00e9 tout en maintenant l&#8217;efficacit\u00e9 op\u00e9rationnelle.  <\/p>","protected":false},"author":1,"featured_media":3008,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[32],"tags":[],"class_list":["post-3026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-de-linformatique-en-nuage"],"_links":{"self":[{"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/posts\/3026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/comments?post=3026"}],"version-history":[{"count":0,"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/posts\/3026\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/media\/3008"}],"wp:attachment":[{"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/media?parent=3026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/categories?post=3026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intellisecsolutions.com\/fr\/wp-json\/wp\/v2\/tags?post=3026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}