{"version":"1.0","provider_name":"Inprosec","provider_url":"https:\/\/www.inprosec.com\/en\/","author_name":"Fernando Mosquera","author_url":"https:\/\/www.inprosec.com\/en\/author\/fernando-mosquera\/","title":"How to Configure IAG Access Analysis Service","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"sEpOp4CJ71\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-configure-iag-access-analysis-service\/\">How to Configure IAG Access Analysis Service<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.inprosec.com\/en\/how-to-configure-iag-access-analysis-service\/embed\/#?secret=sEpOp4CJ71\" width=\"600\" height=\"338\" title=\"&#8220;How to Configure IAG Access Analysis Service&#8221; &#8212; Inprosec\" data-secret=\"sEpOp4CJ71\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.inprosec.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/05\/Como-Configurar-Access-Analysis-Service-IAG.jpg","thumbnail_width":1200,"thumbnail_height":630,"description":"Discover the importance of Access Analysis in SAP IAG, an essential tool for centralized identity and access management in both SAP environments and the cloud. Learn how to optimize security and efficiency in our detailed article."}