{"id":75821,"date":"2018-03-13T14:47:04","date_gmt":"2018-03-13T14:47:04","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/blockchain-digital-identity-good-fit\/"},"modified":"2025-11-05T11:37:47","modified_gmt":"2025-11-05T11:37:47","slug":"blockchain-digital-identity-good-fit","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/blockchain-digital-identity-good-fit\/","title":{"rendered":"Blockchain et l&rsquo;identit\u00e9 num\u00e9rique &#8211; une bonne combinaison ?"},"content":{"rendered":"<p>Chaque fois que vous voyez \u00ab\u00a0Se connecter avec Facebook\u00a0\u00bb ou \u00ab\u00a0Se connecter avec Twitter\u00a0\u00bb etc. sur un site Web ou vous utilisez les informations de connexion \u00e9mises par votre employeur ou \u00e9cole, vous utilisez les technologies IAM (Identity and Access Management). IAM est devenu central \u00e0 nos interactions en ligne, mais comme beaucoup d&rsquo;infrastructures, il est largement invisible pour les utilisateurs (du moins quand il est bien con\u00e7u et mis en \u0153uvre). IAM \u00e9volue rapidement, les enjeux sont \u00e9lev\u00e9s et les entreprises font face \u00e0 un paysage d&rsquo;identit\u00e9 num\u00e9rique de plus en plus complexe et d\u00e9routant. On craint \u00e9galement de plus en plus que les entreprises en sachent trop \u00e0 notre sujet et que les utilisateurs finaux doivent donc reprendre le contr\u00f4le de leur propre identit\u00e9. IAM est un sujet br\u00fblant dans le monde de la technologie, avec de nouvelles architectures, mod\u00e8les commerciaux et philosophies.<\/p>\n<p>La technologie Blockchain (parfois appel\u00e9e technologie de registre distribu\u00e9 &#8211; DLT) attire \u00e9galement de plus en plus de l&rsquo;attention.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/blockchain-digital-identity-good-fit\/\">Savoir plus (en anglais)<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chaque fois que vous voyez \u00ab\u00a0Se connecter avec Facebook\u00a0\u00bb ou \u00ab\u00a0Se connecter avec Twitter\u00a0\u00bb etc. sur un site Web ou vous utilisez les informations de connexion \u00e9mises par votre employeur ou \u00e9cole, vous utilisez les technologies IAM (Identity and Access Management). IAM est devenu central \u00e0 nos interactions en ligne, mais comme beaucoup d&rsquo;infrastructures, il [&hellip;]<\/p>\n","protected":false},"author":868,"featured_media":75490,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[3308,6187,170,166,4898],"tags":[6185,6223,6182],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4196,4368],"class_list":["post-75821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain-fr","category-comment-fonctionne-internet","category-confidentialite","category-identite","category-strong-internet","tag-blockchain","tag-identite","tag-tendances-internet","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity-300x129.jpg",300,129,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg",600,258,false]},"uagb_author_info":{"display_name":"Steve Olshansky","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/olshansky\/"},"uagb_comment_info":0,"uagb_excerpt":"Chaque fois que vous voyez \u00ab\u00a0Se connecter avec Facebook\u00a0\u00bb ou \u00ab\u00a0Se connecter avec Twitter\u00a0\u00bb etc. sur un site Web ou vous utilisez les informations de connexion \u00e9mises par votre employeur ou \u00e9cole, vous utilisez les technologies IAM (Identity and Access Management). IAM est devenu central \u00e0 nos interactions en ligne, mais comme beaucoup d&rsquo;infrastructures, il\u2026","authors":[{"term_id":4196,"user_id":868,"is_guest":0,"slug":"olshansky","display_name":"Steve Olshansky","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Steve_Olshansky-e1660124470124.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Steve_Olshansky-e1660124470124.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""},{"term_id":4368,"user_id":1336,"is_guest":0,"slug":"swilson","display_name":"Steve Wilson","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/1cee996ef74c72fdca1c7f6526a4f1eee237b50e4ffe5de4611b3ef6e8f4f5d4?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/868"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=75821"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75821\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/75490"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=75821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=75821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=75821"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=75821"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=75821"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=75821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}