{"id":6974,"date":"2014-09-07T10:46:02","date_gmt":"2014-09-07T08:46:02","guid":{"rendered":"https:\/\/www.oodrive.fr\/?p=6974"},"modified":"2023-08-01T12:56:00","modified_gmt":"2023-08-01T12:56:00","slug":"la-cryptographie-a-cle-publique","status":"publish","type":"post","link":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/","title":{"rendered":"La cryptographie \u00e0 cl\u00e9 publique\u00a0"},"content":{"rendered":"\n<p>Pour faire face aux \u00e9ventuels probl\u00e8mes d\u2019authentification, d\u2019identification ainsi que de confidentialit\u00e9 au niveau des syst\u00e8mes informatiques, Martin Hellman et Whitfield Diffie ont publi\u00e9 en 1976 un ouvrage qui d\u00e9voile une m\u00e9thode d\u2019\u00e9change qui ne n\u00e9cessite plus l\u2019utilisation de cl\u00e9s secr\u00e8tes mais plut\u00f4t une paire de cl\u00e9 de cryptage et de d\u00e9cryptage qui devient la base de la cryptographie \u00e0 cl\u00e9 publique. Il s\u2019agit d\u2019une v\u00e9ritable r\u00e9volution qui continue encore \u00e0 \u00eatre utilis\u00e9e jusqu\u2019\u00e0 nos jours.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le principe de la cryptographique \u00e0 cl\u00e9 publique<\/h2>\n\n\n\n<p>Autrefois r\u00e9serv\u00e9s \u00e0 des usages militaires, les outils cryptographiques ne cessent de conna\u00eetre de grandes \u00e9volutions. Ayant pour principal objectif d\u2019apporter une meilleure <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/infographie-la-securite-des-donnees-personnelles-un-defi-pour-les-entreprises\/\">s\u00e9curit\u00e9 des donn\u00e9es<\/a>, la cryptographie chiffre les donn\u00e9es afin de les rendre incompr\u00e9hensibles.<\/p>\n\n\n\n<p>Pour les rendre lisibles, l\u2019utilisation d\u2019une autre cl\u00e9 similaire \u00e9tait n\u00e9cessaire. Et pourtant, face au d\u00e9ploiement d\u2019un nombre important de cl\u00e9s, des probl\u00e8mes logistiques ont \u00e9t\u00e9 constat\u00e9s et entrainaient le ralentissement de la rapidit\u00e9 des \u00e9changes.<\/p>\n\n\n\n<p>Aujourd\u2019hui, gr\u00e2ce \u00e0 l\u2019utilisation de l\u2019Internet dans de nombreux secteurs de la vie quotidienne mais aussi au d\u00e9veloppement des \u00e9changes \u00e9lectroniques, le principe des deux math\u00e9maticiens am\u00e9ricains Diffie et Hellman conna\u00eet encore un r\u00e9el succ\u00e8s.<\/p>\n\n\n\n<p>Egalement appel\u00e9 cryptographie asym\u00e9trique, ce proc\u00e9d\u00e9 utilise en r\u00e9alit\u00e9 deux cl\u00e9s dont une cl\u00e9 publique qui peut \u00eatre distribu\u00e9e librement ainsi qu\u2019une cl\u00e9 secr\u00e8te qui n\u2019est connue que par le seul receveur.<\/p>\n\n\n\n<p>D\u2019une mani\u00e8re g\u00e9n\u00e9rale, la cryptographie \u00e0 cl\u00e9 publique utilise un annuaire public o\u00f9 seule la cl\u00e9 publique y est d\u00e9voil\u00e9e tandis que la cl\u00e9 priv\u00e9e pour le d\u00e9chiffrement est maintenue secr\u00e8te. Pour \u00e9viter qu\u2019une personne non autoris\u00e9e ne vienne utiliser sa propre cl\u00e9, chaque cl\u00e9 du r\u00e9pertoire est accompagn\u00e9e d\u2019un certificat d\u2019authentification qui ne peut \u00eatre d\u00e9livr\u00e9 que par une autorit\u00e9 ind\u00e9pendante.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les avantages de la cryptographie \u00e0 cl\u00e9 publique<\/h2>\n\n\n\n<p>L\u2019utilisation de la cryptographie \u00e0 cl\u00e9 publique procure de nombreux atouts dont le plus important est la facilit\u00e9 de gestion du parc des cl\u00e9s qu\u2019elle propose. En effet, m\u00eame si de nombreux utilisateurs souhaitent utiliser le syst\u00e8me, aucune modification particuli\u00e8re ne sera r\u00e9alis\u00e9e sur les param\u00e8tres.<\/p>\n\n\n\n<p>Pour chaque groupe d\u2019utilisateurs, il leur sera tout simplement demand\u00e9 de choisir un administrateur qui aura pour mission de g\u00e9rer les cl\u00e9s. Ensuite, chaque personne concern\u00e9e devra s\u2019inscrire aupr\u00e8s de cet administrateur qui administrera \u00e0 chacune une paire de cl\u00e9s dont une priv\u00e9e et une publique. L\u2019administrateur se chargera par la suite d\u2019informer secr\u00e8tement le code de la cl\u00e9 priv\u00e9e \u00e0 chaque utilisateur. Enfin, il ne lui reste plus qu\u2019\u00e0 publier dans un annuaire l\u2019ensemble des cl\u00e9s publiques.<\/p>\n\n\n\n<p>Permettant alors de s\u2019\u00e9changer des messages de mani\u00e8re s\u00e9curis\u00e9e et sans la n\u00e9cessit\u00e9 de faire appel \u00e0 des dispositifs de s\u00e9curit\u00e9, la cryptographie \u00e0 cl\u00e9 publique r\u00e9sout donc les probl\u00e8mes de distribution des cl\u00e9s.<\/p>\n\n\n\n<p>Pour l\u2019exp\u00e9diteur d\u2019un message et le destinataire, la n\u00e9cessit\u00e9 de partager des cl\u00e9s secr\u00e8tes \u00e0 partir d\u2019un canal s\u00fbr n\u2019est plus de rigueur \u00e9tant donn\u00e9 que toutes les communications exigent uniquement l\u2019utilisation de cl\u00e9s publiques tandis que les cl\u00e9s priv\u00e9es sont gard\u00e9es de mani\u00e8re confidentielle.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour faire face aux \u00e9ventuels probl\u00e8mes d\u2019authentification, d\u2019identification ainsi que de confidentialit\u00e9 au niveau des syst\u00e8mes informatiques, Martin Hellman et Whitfield Diffie ont publi\u00e9 en 1976 un ouvrage qui d\u00e9voile une m\u00e9thode d\u2019\u00e9change qui ne n\u00e9cessite plus l\u2019utilisation de cl\u00e9s secr\u00e8tes mais plut\u00f4t une paire de cl\u00e9 de cryptage et de d\u00e9cryptage qui devient la [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6977,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1227],"class_list":["post-6974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Principe et avantages cryptographie \u00e0 cl\u00e9 publique\u00a0| Oodrive<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment Diffie et Hellman ont r\u00e9volutionn\u00e9 la s\u00e9curit\u00e9 num\u00e9rique en inventant la cryptographie \u00e0 cl\u00e9 publique !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principe et avantages cryptographie \u00e0 cl\u00e9 publique\u00a0| Oodrive\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment Diffie et Hellman ont r\u00e9volutionn\u00e9 la s\u00e9curit\u00e9 num\u00e9rique en inventant la cryptographie \u00e0 cl\u00e9 publique !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-07T08:46:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T12:56:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chakib Kissane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chakib Kissane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/\"},\"author\":{\"name\":\"Chakib Kissane\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/dc06dad880836a5be19b6c5e9d31034b\"},\"headline\":\"La cryptographie \u00e0 cl\u00e9 publique\u00a0\",\"datePublished\":\"2014-09-07T08:46:02+00:00\",\"dateModified\":\"2023-08-01T12:56:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/\",\"url\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/\",\"name\":\"Principe et avantages cryptographie \u00e0 cl\u00e9 publique\u00a0| Oodrive\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg\",\"datePublished\":\"2014-09-07T08:46:02+00:00\",\"dateModified\":\"2023-08-01T12:56:00+00:00\",\"description\":\"D\u00e9couvrez comment Diffie et Hellman ont r\u00e9volutionn\u00e9 la s\u00e9curit\u00e9 num\u00e9rique en inventant la cryptographie \u00e0 cl\u00e9 publique !\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg\",\"width\":750,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.oodrive.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"La cryptographie \u00e0 cl\u00e9 publique\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oodrive.com\/#website\",\"url\":\"https:\/\/www.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.\",\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/www.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/dc06dad880836a5be19b6c5e9d31034b\",\"name\":\"Chakib Kissane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/chakib-profile.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/chakib-profile.jpg\",\"caption\":\"Chakib Kissane\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Principe et avantages cryptographie \u00e0 cl\u00e9 publique\u00a0| Oodrive","description":"D\u00e9couvrez comment Diffie et Hellman ont r\u00e9volutionn\u00e9 la s\u00e9curit\u00e9 num\u00e9rique en inventant la cryptographie \u00e0 cl\u00e9 publique !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Principe et avantages cryptographie \u00e0 cl\u00e9 publique\u00a0| Oodrive","og_description":"D\u00e9couvrez comment Diffie et Hellman ont r\u00e9volutionn\u00e9 la s\u00e9curit\u00e9 num\u00e9rique en inventant la cryptographie \u00e0 cl\u00e9 publique !","og_url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/","og_site_name":"Oodrive","article_published_time":"2014-09-07T08:46:02+00:00","article_modified_time":"2023-08-01T12:56:00+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg","type":"image\/jpeg"}],"author":"Chakib Kissane","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Chakib Kissane","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#article","isPartOf":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/"},"author":{"name":"Chakib Kissane","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/dc06dad880836a5be19b6c5e9d31034b"},"headline":"La cryptographie \u00e0 cl\u00e9 publique\u00a0","datePublished":"2014-09-07T08:46:02+00:00","dateModified":"2023-08-01T12:56:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/"},"wordCount":602,"publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg","articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/","url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/","name":"Principe et avantages cryptographie \u00e0 cl\u00e9 publique\u00a0| Oodrive","isPartOf":{"@id":"https:\/\/www.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg","datePublished":"2014-09-07T08:46:02+00:00","dateModified":"2023-08-01T12:56:00+00:00","description":"D\u00e9couvrez comment Diffie et Hellman ont r\u00e9volutionn\u00e9 la s\u00e9curit\u00e9 num\u00e9rique en inventant la cryptographie \u00e0 cl\u00e9 publique !","breadcrumb":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#primaryimage","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2018\/01\/cryptographie.jpg","width":750,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/la-cryptographie-a-cle-publique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.oodrive.com\/es\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/cybersecurite\/"},{"@type":"ListItem","position":4,"name":"La cryptographie \u00e0 cl\u00e9 publique\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.oodrive.com\/#website","url":"https:\/\/www.oodrive.com\/","name":"Oodrive","description":"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.","publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/www.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/dc06dad880836a5be19b6c5e9d31034b","name":"Chakib Kissane","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/chakib-profile.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/chakib-profile.jpg","caption":"Chakib Kissane"}}]}},"_links":{"self":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/6974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=6974"}],"version-history":[{"count":0,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/6974\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/6977"}],"wp:attachment":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=6974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=6974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}