{"id":13466,"date":"2020-09-20T20:38:39","date_gmt":"2020-09-20T20:38:39","guid":{"rendered":"https:\/\/www.sybercode.com\/?page_id=13466"},"modified":"2021-09-01T13:14:10","modified_gmt":"2021-09-01T13:14:10","slug":"iam","status":"publish","type":"page","link":"https:\/\/www.sybercode.com\/en\/iam\/","title":{"rendered":"IAM"},"content":{"rendered":"<p><strong>IAM<\/strong><\/p>\n<div class=\"service_details-desc\">\n<p class=\"paragraph\">With Access and Identity Management, you can manage the lifecycle of identities within the organization. With IAM, you can control access management in organizations and provide access control of identities on a role-based basis.<\/p>\n<p class=\"paragraph\">IAM single sign-on, multi-factor authentication etc. includes systems. IAM systems help prevent data breaches by increasing controls over identity access.<\/p>\n<p class=\"paragraph\"><img decoding=\"async\" class=\"loading\" src=\"http:\/\/mopp.website\/sybercode\/upload\/image\/67235monofor.jpg\" alt=\"\" data-was-processed=\"true\" \/><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IAM Eri\u015fim ve Kimlik Y\u00f6netimi ile kurulu\u015f i\u00e7indeki kimliklerin ya\u015fam d\u00f6ng\u00fcs\u00fcn\u00fc y\u00f6netebilirsiniz. IAM ile kurulu\u015flardaki eri\u015fim y\u00f6netimini denetleyebilir, rol tabanl\u0131 olarak kimliklerin eri\u015fim kontrol\u00fcn\u00fc sa\u011flayabilirsiniz. IAM single sign-on, multi-factor authentication vb. sistemleri i\u00e7erir. IAM sistemleri kimlik eri\u015fimleri \u00fczerindeki denetimleri artt\u0131rarak [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/13466"}],"collection":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/comments?post=13466"}],"version-history":[{"count":2,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/13466\/revisions"}],"predecessor-version":[{"id":14235,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/13466\/revisions\/14235"}],"wp:attachment":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/media?parent=13466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}