{"version":"1.0","provider_name":"permSECURE GmbH - development","provider_url":"https:\/\/permsecure.com\/en\/","author_name":"Bartosz Grodzicki","author_url":"https:\/\/permsecure.com\/en\/author\/bartosz\/","title":"Roles\/Profiles \u2013 How to build them efficiently? - permSECURE GmbH - development","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3Dzzh564pE\"><a href=\"https:\/\/permsecure.com\/en\/rollen-profile-wie-baut-man-sie-effizient-auf\/\">Roles\/Profiles \u2013 How to build them efficiently?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/permsecure.com\/en\/rollen-profile-wie-baut-man-sie-effizient-auf\/embed\/#?secret=3Dzzh564pE\" width=\"600\" height=\"338\" title=\"&#8220;Roles\/Profiles \u2013 How to build them efficiently?&#8221; &#8212; permSECURE GmbH - development\" data-secret=\"3Dzzh564pE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/permsecure.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/permsecure.com\/wp-content\/uploads\/2024\/11\/Rolle_Profile.jpg.webp","thumbnail_width":750,"thumbnail_height":500,"description":"The goal of modern identity and access management systems (IAM systems for short) is not only to manage user management and its processes, but also to distribute and also remove the resources and permissions managed therein efficiently and in line with requirements. This is&hellip;"}