{"version":"1.0","provider_name":"Boundless","provider_url":"https:\/\/www.boundlessdigital.com\/fr\/","author_name":"The Boundless Crew","author_url":"https:\/\/www.boundlessdigital.com\/fr\/library\/author\/carlota\/","title":"Un contr\u00f4le d'acc\u00e8s granulaire bas\u00e9 sur les r\u00f4les pour Meraki | Boundless","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4uUcSgO8Rm\"><a href=\"https:\/\/www.boundlessdigital.com\/fr\/library\/blog\/tutorial-boundless-access-control-for-meraki\/\">Un contr\u00f4le d&rsquo;acc\u00e8s granulaire bas\u00e9 sur les r\u00f4les pour Meraki<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.boundlessdigital.com\/fr\/library\/blog\/tutorial-boundless-access-control-for-meraki\/embed\/#?secret=4uUcSgO8Rm\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Un contr\u00f4le d&rsquo;acc\u00e8s granulaire bas\u00e9 sur les r\u00f4les pour Meraki\u00a0\u00bb &#8212; Boundless\" data-secret=\"4uUcSgO8Rm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.boundlessdigital.com\/wp-content\/uploads\/2021\/08\/Thumbnail_Boundless_Access_Control_Tutorial.jpg","thumbnail_width":1200,"thumbnail_height":1140,"description":"Keeping things simple often requires limiting options. This is the case for Meraki's role-based access levels, whose limited granularity could eventually result in configuration error, or even sensitive data exposure.  With Boundless Access Control you can mitigate these risks by choosing the exact menus a user is authorized to view and modify, and restricting access everywhere else."}