{"id":6423,"date":"2025-02-25T10:36:54","date_gmt":"2025-02-25T10:36:54","guid":{"rendered":"https:\/\/itopdev.wpenginepowered.com\/security-itop-mfa-webhook-oauth-2025\/"},"modified":"2026-01-14T09:29:10","modified_gmt":"2026-01-14T09:29:10","slug":"securite-avec-itop-au-coeur-de-notre-strategie-de-developpement","status":"publish","type":"post","link":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/","title":{"rendered":"S\u00e9curit\u00e9 avec iTop : au c\u0153ur de notre strat\u00e9gie de d\u00e9veloppement"},"content":{"rendered":"<p>En ce d\u00e9but d\u2019ann\u00e9e, et en tant qu\u2019\u00e9diteur d\u2019<a href=\"https:\/\/www.combodo.com\/ITOP\">iTop<\/a>, nous renfor\u00e7ons notre d\u00e9marche de s\u00e9curit\u00e9 en publiant des versions correctives incluant de nombreux fix de s\u00e9curit\u00e9 pour les versions Long Term Support (LTS) et Short Term Support (STS), ainsi que des modules cl\u00e9s de s\u00e9curisation des environnements telles que l\u2019authentification multi-facteur (MFA) et un nouveau standard d\u2019authentification bas\u00e9 sur OAuth. Ces \u00e9volutions illustrent notre engagement continu \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 d\u2019iTop.<\/p>\n<h2 class=\"wp-block-heading\">Une d\u00e9marche s\u00e9curit\u00e9 d\u00e9j\u00e0 structur\u00e9e et proactive<\/h2>\n<p>La s\u00e9curit\u00e9 est depuis toujours une notion primordiale dans le d\u00e9veloppement d\u2019iTop. Elle repose aujourd\u2019hui sur trois piliers fondamentaux :<\/p>\n<h3 class=\"wp-block-heading\"><strong>Les fonctionnalit\u00e9s de s\u00e9curit\u00e9 int\u00e9gr\u00e9es<\/strong><\/h3>\n<ul class=\"wp-block-list\">\n<li><strong>L\u2019authentification s\u00e9curis\u00e9e :<\/strong>\u00a0iTop propose d\u00e9j\u00e0 des m\u00e9canismes d\u2019authentification avanc\u00e9s tels que le SSO (Single Sign-On), la protection contre les attaques par force brute et d\u00e9sormais le MFA.<\/li>\n<li><strong>L\u2019historisation et la tra\u00e7abilit\u00e9 :\u00a0<\/strong>Dans iTop, chaque interaction est historis\u00e9e, favorisant un suivi pr\u00e9cis des op\u00e9rations.<\/li>\n<li><strong>Une communication s\u00e9curis\u00e9e :<\/strong>\u00a0iTop permet les \u00e9changes directement via la solution plut\u00f4t que les courriels, r\u00e9duisant les risques de fuite d\u2019informations et prot\u00e9geant ainsi les donn\u00e9es de ses utilisateurs.<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\"><strong>Les tests de s\u00e9curit\u00e9<\/strong><\/h3>\n<ul class=\"wp-block-list\">\n<li><strong>Des audits r\u00e9guliers :<\/strong>\u00a0Afin de garantir le plus haut niveau de s\u00e9curit\u00e9, des entreprises ind\u00e9pendantes et sp\u00e9cialis\u00e9es m\u00e8nent des tests de s\u00e9curit\u00e9 p\u00e9riodiques de la solution et de son environnement.<\/li>\n<li><strong>Le traitement des failles :<\/strong>\u00a0Pour donner suite aux audits, nous assurons le traitement des failles de s\u00e9curit\u00e9 rep\u00e9r\u00e9es via processus public et document\u00e9 (Lien : https:\/\/github.com\/Combodo\/iTop\/blob\/develop\/SECURITY.md) garantissant la correction rapide des vuln\u00e9rabilit\u00e9s identifi\u00e9es.<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\"><strong>Conformit\u00e9 aux standards de s\u00e9curit\u00e9<\/strong><\/h3>\n<ul class=\"wp-block-list\">\n<li><strong>Les standards du march\u00e9, l\u2019approche NIS2 et la d\u00e9marche SecNumCloud<\/strong>\u00a0: m\u00eame si Combodo n\u2019est pas \u00e9ligible \u00e0 la certification europ\u00e9enne NIS2 ou \u00e0 m\u00eame \u00e0 la d\u00e9marche SecNumCloud, cette derni\u00e8re \u00e9tant surtout accessible aux grandes entreprises, des actions ont \u00e9t\u00e9 men\u00e9es pour qu\u2019iTop satisfasse un maximum de crit\u00e8res de ces deux certifications et nous permette ainsi de renforcer consid\u00e9rablement notre politique de s\u00e9curit\u00e9 selon les meilleures pratiques existantes.<\/li>\n<li><strong>Un processus d\u2019am\u00e9lioration continu<\/strong>\u00a0: Toujours dans un souci d\u2019\u00e9volution proactive de la politique de s\u00e9curit\u00e9 d\u2019iTop, nous avons mis en place l\u2019adoption des r\u00e8gles de s\u00e9curit\u00e9 de l\u2019ANSSI, nous avons choisi de favoriser les collaborations avec des prestataires certifi\u00e9s, et enfin, nous avons investi dans les fonctions de RSSI et DPO.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Focus sur les nouveaut\u00e9s s\u00e9curit\u00e9 d\u2019iTop<\/h2>\n<p>Cette nouvelle ann\u00e9e ne fait pas exception ! Combodo a m\u00eame souhait\u00e9 renforcer l\u2019axe de la s\u00e9curit\u00e9 dans la strat\u00e9gie de d\u00e9veloppement d\u2019iTop en introduisant de nouveaux modules de s\u00e9curisation de son environnement.<\/p>\n<h3 class=\"wp-block-heading\">L\u2019authentification multi-facteur (MFA)<\/h3>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3612\" src=\"https:\/\/blog.combodo.com\/wp-content\/uploads\/2025\/02\/mfa_userprefportal.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 700px, 100vw\" srcset=\"https:\/\/blog.combodo.com\/wp-content\/uploads\/2025\/02\/mfa_userprefportal.png 700w, https:\/\/blog.combodo.com\/wp-content\/uploads\/2025\/02\/mfa_userprefportal-480x225.png 480w\" alt=\"iTop s\u00e9curit\u00e9\" width=\"700\" height=\"328\" \/><\/figure>\n<p>Le MFA est aujourd\u2019hui un standard incontournable du march\u00e9 permettant de renforcer la s\u00e9curit\u00e9 des acc\u00e8s. Il se traduit dans iTop par la mise en place de :<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>L\u2019authentification renforc\u00e9e via une application mobile ou un code par e-mail :<br \/>\n<\/strong>Principe de base du MFA, elle r\u00e9duit drastiquement les risques d\u2019acc\u00e8s non autoris\u00e9 en ajoutant une couche de s\u00e9curit\u00e9 suppl\u00e9mentaire, m\u00eame en cas de vol ou de fuite de mot de passe.<br \/>\nUn administrateur IT utilisant iTop depuis plusieurs appareils peut par exemple s\u00e9curiser chaque connexion gr\u00e2ce \u00e0 un code unique envoy\u00e9 \u00e0 son smartphone.<\/li>\n<li><strong>Codes de r\u00e9cup\u00e9ration :<br \/>\n<\/strong>L\u2019utilisateur conserve un acc\u00e8s s\u00e9curis\u00e9 \u00e0 son compte m\u00eame en cas d\u2019impr\u00e9vu (perte du mot de passe par exemple), garantissant la continuit\u00e9 de ses activit\u00e9s sans interruption. Pour ce faire, le module MFA proposera notamment une s\u00e9rie de codes uniques pour r\u00e9cup\u00e9rer ses identifiants.<br \/>\nUn consultant externe travaillant sur un projet peut par exemple r\u00e9cup\u00e9rer l\u2019acc\u00e8s \u00e0 son compte m\u00eame apr\u00e8s la perte ou le vol de son t\u00e9l\u00e9phone.<\/li>\n<li><strong>Compatibilit\u00e9 avec des solutions professionnelles (Windows Hello, U2F, FIDO2) :<br \/>\n<\/strong>Les entreprises peuvent int\u00e9grer des dispositifs d\u2019authentification avanc\u00e9s, comme les empreintes digitales ou la reconnaissance faciale, alignant iTop sur les meilleures pratiques de s\u00e9curit\u00e9 tout en simplifiant l\u2019exp\u00e9rience utilisateur.<\/li>\n<li><strong>Configuration flexible adapt\u00e9e aux besoins sp\u00e9cifiques :<br \/>\n<\/strong>Les administrateurs peuvent d\u00e9finir des r\u00e8gles globales par organisation et par profil, tandis que chaque utilisateur personnalise ses param\u00e8tres de s\u00e9curit\u00e9 selon ses pr\u00e9f\u00e9rences. Cette approche garantit une exp\u00e9rience sur mesure et s\u00e9curis\u00e9e.<br \/>\nUne \u00e9quipe de support technique pourra alors d\u00e9finir des politiques de s\u00e9curit\u00e9 strictes pour ses membres tout en offrant plus de souplesse aux gestionnaires de projets.<\/li>\n<\/ul>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>MFA sera bient\u00f4t disponible sur iTop Hub, stay tuned !<\/strong><\/p><\/blockquote>\n<h3 class=\"wp-block-heading\">Webhook OAuth : un nouveau standard d\u2019authentification<\/h3>\n<p>Le webhook OAuth simplifie et s\u00e9curise les syst\u00e8mes classiques de login\/mot de passe, devenant une exigence courante pour de nombreux gestionnaires d\u2019identit\u00e9 :<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>S\u00e9curit\u00e9 accrue gr\u00e2ce \u00e0 un protocole standardis\u00e9<br \/>\n<\/strong>La protection des donn\u00e9es sensibles est renforc\u00e9e gr\u00e2ce \u00e0 un protocole s\u00e9curis\u00e9 reconnu par l\u2019industrie, r\u00e9duisant les risques de compromission des comptes.<br \/>\nUne entreprise utilisant Power Automate peut alors se connecter \u00e0 iTop sans partager de mot de passe, limitant les risques li\u00e9s aux fuites de donn\u00e9es.<\/li>\n<li><strong>Anticipation des \u00e9volutions technologiques<br \/>\n<\/strong>Les utilisateurs restent en conformit\u00e9 avec les standards du march\u00e9, \u00e9vitant ainsi des probl\u00e8mes de compatibilit\u00e9 \u00e0 l\u2019avenir.<br \/>\nPar exemple, un fournisseur SaaS souhaitant int\u00e9grer iTop dans son \u00e9cosyst\u00e8me garantit la p\u00e9rennit\u00e9 de ses int\u00e9grations en adoptant OAuth d\u00e8s aujourd\u2019hui.<\/li>\n<li><strong>Compatibilit\u00e9 avec des solutions tierces comme Power Automate, Teams, Slack, Googlechat ou encore RocketChat.<br \/>\n<\/strong>Les entreprises peuvent int\u00e9grer iTop dans des \u00e9cosyst\u00e8mes IT complexes sans effort suppl\u00e9mentaire, maximisant ainsi l\u2019interop\u00e9rabilit\u00e9 et la productivit\u00e9.<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Releases correctives : passez d\u00e8s maintenant \u00e0 iTop 3.2.1<\/h3>\n<p>Trois nouvelles releases sont disponibles ! Elles mettent \u00e0 jour les versions actives d\u2019iTop et s\u2019inscrivent dans notre processus de maintenance corrective, connu et planifi\u00e9, permettant aux utilisateurs d\u2019anticiper leur mont\u00e9e de version.<\/p>\n<p>La toute derni\u00e8re vague de releases concerne deux versions LTS (Long Term Support) avec iTop 3.2.1 et iTop 2.7.12 ainsi qu\u2019une STS (Short Term Support) avec iTop 3.1.3. Elles int\u00e8grent toutes des r\u00e9solutions de bugs ainsi que des am\u00e9liorations de s\u00e9curit\u00e9.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.itophub.io\/wiki\/page?id=3_2_0:release:change_log=\">Changelog iTop 3.2.1<\/a><\/div>\n<\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Rappel sur les versions en cours<\/strong>\u00a0:<\/p>\n<ul class=\"wp-block-list\">\n<li>La LTS iTop 2.7 sera maintenue jusqu\u2019au troisi\u00e8me trimestre 2025<\/li>\n<li>La 3.1.3 est la derni\u00e8re release de maintenance de la STS 3.1<\/li>\n<li>La 3.0 n\u2019est plus maintenue<\/li>\n<li>Seules les derni\u00e8res versions de chaque extension sont maintenues<\/li>\n<\/ul>\n<p>Retrouvez le<a href=\"https:\/\/www.itophub.io\/wiki\/page?id=3_2_0:release:start\">\u00a0calendrier complet<\/a>\u00a0des versions, des releases et des fins de maintenance.<\/p><\/blockquote>\n<h3 class=\"wp-block-heading\">Une s\u00e9curit\u00e9 orient\u00e9e vers l\u2019avenir<\/h3>\n<p>En int\u00e9grant ces standards de s\u00e9curit\u00e9, iTop d\u00e9montre sa capacit\u00e9 \u00e0 anticiper les tendances du march\u00e9 et \u00e0 proposer des\u00a0<a href=\"https:\/\/blog.combodo.com\/fr\/hebergement-cloud-5-bonnes-raisons-de-faire-confiance-a-itop-saas\/\">solutions robustes et configurables.<\/a>\u00a0Sans pr\u00e9tendre innover sur des standards \u00e9tablis, nous d\u00e9veloppons en mettant l\u2019accent sur la flexibilit\u00e9 et l\u2019extensibilit\u00e9 de ces fonctionnalit\u00e9s et assurons l\u2019am\u00e9lioration continue de notre strat\u00e9gie de s\u00e9curit\u00e9.<\/p>\n<p>Avec ces mises \u00e0 jour, les utilisateurs d\u2019iTop peuvent aborder les enjeux de s\u00e9curit\u00e9 avec s\u00e9r\u00e9nit\u00e9, b\u00e9n\u00e9ficiant d\u2019une solution adapt\u00e9e aux normes actuelles et pr\u00eate pour les d\u00e9fis futurs. La s\u00e9curit\u00e9 n\u2019est pas qu\u2019une obligation, c\u2019est un engagement durable pour Combodo et notre communaut\u00e9 d\u2019utilisateurs.<\/p>\n<div class=\"rp4wp-related-posts\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>En ce d\u00e9but d\u2019ann\u00e9e, et en tant qu\u2019\u00e9diteur d\u2019iTop, nous renfor\u00e7ons notre d\u00e9marche de s\u00e9curit\u00e9 en publiant des versions correctives incluant de nombreux fix de s\u00e9curit\u00e9 pour les versions Long Term Support (LTS) et Short Term Support (STS), ainsi que des modules cl\u00e9s de s\u00e9curisation des environnements telles que l\u2019authentification multi-facteur (MFA) et un nouveau [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":6424,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[130],"tags":[172,154],"class_list":["post-6423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-itop-fr","tag-developpement","tag-securite-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security with iTop : at the heart of our development strategy<\/title>\n<meta name=\"description\" content=\"Security with iTop: Strengthening security features in 2025, MFA, Webhook OAuth, iTop 3.2.1\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security with iTop : at the heart of our development strategy\" \/>\n<meta property=\"og:description\" content=\"Security with iTop: Strengthening security features in 2025, MFA, Webhook OAuth, iTop 3.2.1\" \/>\n<meta property=\"og:url\" content=\"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/\" \/>\n<meta property=\"og:site_name\" content=\"iTop\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T10:36:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T09:29:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/combodo.com\/wp-content\/uploads\/2025\/02\/Security.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"L\u00e9onie Uchiyama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"L\u00e9onie Uchiyama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/\"},\"author\":{\"name\":\"L\u00e9onie Uchiyama\",\"@id\":\"https:\\\/\\\/combodo.com\\\/#\\\/schema\\\/person\\\/c44ca487ab1820e64607f9d046719ac8\"},\"headline\":\"S\u00e9curit\u00e9 avec iTop : au c\u0153ur de notre strat\u00e9gie de d\u00e9veloppement\",\"datePublished\":\"2025-02-25T10:36:54+00:00\",\"dateModified\":\"2026-01-14T09:29:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/\"},\"wordCount\":1305,\"publisher\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/combodo.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Security.webp\",\"keywords\":[\"D\u00e9veloppement\",\"S\u00e9curit\u00e9\"],\"articleSection\":[\"iTop\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/\",\"url\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/\",\"name\":\"Security with iTop : at the heart of our development strategy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/combodo.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Security.webp\",\"datePublished\":\"2025-02-25T10:36:54+00:00\",\"dateModified\":\"2026-01-14T09:29:10+00:00\",\"description\":\"Security with iTop: Strengthening security features in 2025, MFA, Webhook OAuth, iTop 3.2.1\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#primaryimage\",\"url\":\"https:\\\/\\\/combodo.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Security.webp\",\"contentUrl\":\"https:\\\/\\\/combodo.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Security.webp\",\"width\":800,\"height\":533,\"caption\":\"Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/combodo.com\\\/fr\\\/itop-fr\\\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/combodo.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 avec iTop : au c\u0153ur de notre strat\u00e9gie de d\u00e9veloppement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/combodo.com\\\/#website\",\"url\":\"https:\\\/\\\/combodo.com\\\/\",\"name\":\"iTop, easy service management\",\"description\":\"Easy service management\",\"publisher\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/combodo.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/combodo.com\\\/#organization\",\"name\":\"iTop\",\"url\":\"https:\\\/\\\/combodo.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/combodo.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/combodo.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/yoast-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/combodo.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/yoast-logo.jpg\",\"width\":696,\"height\":696,\"caption\":\"iTop\"},\"image\":{\"@id\":\"https:\\\/\\\/combodo.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/iTopByCombodo\",\"https:\\\/\\\/www.youtube.com\\\/@itopbycombodo1800\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/combodo.com\\\/#\\\/schema\\\/person\\\/c44ca487ab1820e64607f9d046719ac8\",\"name\":\"L\u00e9onie Uchiyama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/95ae8acce76b922ff907bf7c040fa2b8d4dfab07fd58b9065b13a81d3f980d5c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/95ae8acce76b922ff907bf7c040fa2b8d4dfab07fd58b9065b13a81d3f980d5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/95ae8acce76b922ff907bf7c040fa2b8d4dfab07fd58b9065b13a81d3f980d5c?s=96&d=mm&r=g\",\"caption\":\"L\u00e9onie Uchiyama\"},\"url\":\"https:\\\/\\\/combodo.com\\\/fr\\\/author\\\/leonie-uchiyama\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security with iTop : at the heart of our development strategy","description":"Security with iTop: Strengthening security features in 2025, MFA, Webhook OAuth, iTop 3.2.1","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/","og_locale":"fr_FR","og_type":"article","og_title":"Security with iTop : at the heart of our development strategy","og_description":"Security with iTop: Strengthening security features in 2025, MFA, Webhook OAuth, iTop 3.2.1","og_url":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/","og_site_name":"iTop","article_published_time":"2025-02-25T10:36:54+00:00","article_modified_time":"2026-01-14T09:29:10+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/02\/Security.webp","type":"image\/webp"}],"author":"L\u00e9onie Uchiyama","twitter_card":"summary_large_image","twitter_misc":{"Written by":"L\u00e9onie Uchiyama","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#article","isPartOf":{"@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/"},"author":{"name":"L\u00e9onie Uchiyama","@id":"https:\/\/combodo.com\/#\/schema\/person\/c44ca487ab1820e64607f9d046719ac8"},"headline":"S\u00e9curit\u00e9 avec iTop : au c\u0153ur de notre strat\u00e9gie de d\u00e9veloppement","datePublished":"2025-02-25T10:36:54+00:00","dateModified":"2026-01-14T09:29:10+00:00","mainEntityOfPage":{"@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/"},"wordCount":1305,"publisher":{"@id":"https:\/\/combodo.com\/#organization"},"image":{"@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#primaryimage"},"thumbnailUrl":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/02\/Security.webp","keywords":["D\u00e9veloppement","S\u00e9curit\u00e9"],"articleSection":["iTop"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/","url":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/","name":"Security with iTop : at the heart of our development strategy","isPartOf":{"@id":"https:\/\/combodo.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#primaryimage"},"image":{"@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#primaryimage"},"thumbnailUrl":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/02\/Security.webp","datePublished":"2025-02-25T10:36:54+00:00","dateModified":"2026-01-14T09:29:10+00:00","description":"Security with iTop: Strengthening security features in 2025, MFA, Webhook OAuth, iTop 3.2.1","breadcrumb":{"@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#primaryimage","url":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/02\/Security.webp","contentUrl":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/02\/Security.webp","width":800,"height":533,"caption":"Security"},{"@type":"BreadcrumbList","@id":"https:\/\/combodo.com\/fr\/itop-fr\/securite-avec-itop-au-coeur-de-notre-strategie-de-developpement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/combodo.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 avec iTop : au c\u0153ur de notre strat\u00e9gie de d\u00e9veloppement"}]},{"@type":"WebSite","@id":"https:\/\/combodo.com\/#website","url":"https:\/\/combodo.com\/","name":"iTop, easy service management","description":"Easy service management","publisher":{"@id":"https:\/\/combodo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/combodo.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/combodo.com\/#organization","name":"iTop","url":"https:\/\/combodo.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/combodo.com\/#\/schema\/logo\/image\/","url":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/06\/yoast-logo.jpg","contentUrl":"https:\/\/combodo.com\/wp-content\/uploads\/2025\/06\/yoast-logo.jpg","width":696,"height":696,"caption":"iTop"},"image":{"@id":"https:\/\/combodo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/iTopByCombodo","https:\/\/www.youtube.com\/@itopbycombodo1800"]},{"@type":"Person","@id":"https:\/\/combodo.com\/#\/schema\/person\/c44ca487ab1820e64607f9d046719ac8","name":"L\u00e9onie Uchiyama","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/95ae8acce76b922ff907bf7c040fa2b8d4dfab07fd58b9065b13a81d3f980d5c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/95ae8acce76b922ff907bf7c040fa2b8d4dfab07fd58b9065b13a81d3f980d5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/95ae8acce76b922ff907bf7c040fa2b8d4dfab07fd58b9065b13a81d3f980d5c?s=96&d=mm&r=g","caption":"L\u00e9onie Uchiyama"},"url":"https:\/\/combodo.com\/fr\/author\/leonie-uchiyama\/"}]}},"_links":{"self":[{"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/posts\/6423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/comments?post=6423"}],"version-history":[{"count":0,"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/posts\/6423\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/media\/6424"}],"wp:attachment":[{"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/media?parent=6423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/categories?post=6423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/combodo.com\/fr\/wp-json\/wp\/v2\/tags?post=6423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}