{"version":"1.0","provider_name":"permSECURE GmbH - development","provider_url":"https:\/\/permsecure.com\/en\/","author_name":"Bartosz Grodzicki","author_url":"https:\/\/permsecure.com\/en\/author\/bartosz\/","title":"Whitepaper - Identity &amp; Acce&shy;\u00ad\u00adss Management \u2013 With Milesstones to Success - permSECURE GmbH - development","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qXALQIZjPf\"><a href=\"https:\/\/permsecure.com\/en\/whitepaper-with-milesstones-to-success-iam-implementation\/\">Whitepaper &#8211; Identity &amp; Acce&shy;\u00ad\u00adss Management \u2013 With Milesstones to Success<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/permsecure.com\/en\/whitepaper-with-milesstones-to-success-iam-implementation\/embed\/#?secret=qXALQIZjPf\" width=\"600\" height=\"338\" title=\"&#8220;Whitepaper &#8211; Identity &amp; Acce&shy;\u00ad\u00adss Management \u2013 With Milesstones to Success&#8221; &#8212; permSECURE GmbH - development\" data-secret=\"qXALQIZjPf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/permsecure.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/permsecure.com\/wp-content\/uploads\/0202\/09\/Group-184.png","thumbnail_width":1501,"thumbnail_height":1001,"description":"This whitepaper explains the introduction of identity &amp; access management systems. In particular, the various topics relating to people, resources and their interaction are examined and explained in more detail. The individual phases in the implementation of an IAM system are described and the various&hellip;"}