{"id":75985,"date":"2018-03-16T15:58:41","date_gmt":"2018-03-16T15:58:41","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/75852\/"},"modified":"2025-11-14T16:01:22","modified_gmt":"2025-11-14T16:01:22","slug":"75852","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/75852\/","title":{"rendered":"Guide de r\u00e9f\u00e9rence de l\u2018IETF 101: Confidentialit\u00e9, Identit\u00e9, Cryptage"},"content":{"rendered":"<p>Et nous revoil\u00e0 ! Dans ce post du Guide de r\u00e9f\u00e9rence ou\u00a0<a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-101\/\">Rough Guide to IETF 101<\/a>, je vais jeter un coup d&rsquo;\u0153il sur certaines des activit\u00e9s li\u00e9es \u00e0 l&rsquo;identit\u00e9, \u00e0 la confidentialit\u00e9 et au cryptage \u00e0 l&rsquo;IETF la semaine prochaine. Ci-dessous quelques-unes des nombreuses activit\u00e9s pertinentes que sont mises en \u00e9vidence, mais il y a beaucoup plus de choses alors assurez-vous de consulter <a href=\"https:\/\/datatracker.ietf.org\/meeting\/101\/agenda.html\">l&rsquo;ordre du jour complet en ligne<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/75852\/\">Pour savoir plus et d\u00e9couvrir l&rsquo;agenda cliquez ici<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Et nous revoil\u00e0 ! Dans ce post du Guide de r\u00e9f\u00e9rence ou\u00a0Rough Guide to IETF 101, je vais jeter un coup d&rsquo;\u0153il sur certaines des activit\u00e9s li\u00e9es \u00e0 l&rsquo;identit\u00e9, \u00e0 la confidentialit\u00e9 et au cryptage \u00e0 l&rsquo;IETF la semaine prochaine. Ci-dessous quelques-unes des nombreuses activit\u00e9s pertinentes que sont mises en \u00e9vidence, mais il y a [&hellip;]<\/p>\n","protected":false},"author":710,"featured_media":65483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,170,189,166,151,169,4909,4775,183,146,181],"tags":[6215,6223,6056,3376,6290],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4128],"class_list":["post-75985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-confidentialite","category-evenements","category-identite","category-ietf-fr-2","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","category-tls-fr","tag-evenements","tag-identite","tag-ietf-meetings-fr","tag-ietf-fr","tag-transport-layer-security-tls","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Karen O'Donoghue","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/odonoghue\/"},"uagb_comment_info":0,"uagb_excerpt":"Et nous revoil\u00e0 ! Dans ce post du Guide de r\u00e9f\u00e9rence ou\u00a0Rough Guide to IETF 101, je vais jeter un coup d&rsquo;\u0153il sur certaines des activit\u00e9s li\u00e9es \u00e0 l&rsquo;identit\u00e9, \u00e0 la confidentialit\u00e9 et au cryptage \u00e0 l&rsquo;IETF la semaine prochaine. Ci-dessous quelques-unes des nombreuses activit\u00e9s pertinentes que sont mises en \u00e9vidence, mais il y a\u2026","authors":[{"term_id":4128,"user_id":710,"is_guest":0,"slug":"odonoghue","display_name":"Karen O'Donoghue","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Karen-ODonoghue.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Karen-ODonoghue.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/710"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=75985"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75985\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/65483"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=75985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=75985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=75985"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=75985"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=75985"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=75985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}