<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.pingidentity.com/fr.html</loc><lastmod>2026-02-25T19:13:22.882Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company.html</loc><lastmod>2026-04-11T16:28:20.231Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/security-at-ping-identity.html</loc><lastmod>2022-01-28T16:28:09.634Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/upcoming-events.html</loc><lastmod>2026-04-17T17:07:07.136Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/leadership.html</loc><lastmod>2025-12-30T18:15:49.724Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/about-us.html</loc><lastmod>2026-04-20T18:48:20.969Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/championing-every-identity.html</loc><lastmod>2024-12-06T18:07:45.621Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/championing-every-identity/esg.html</loc><lastmod>2024-12-06T18:14:16.307Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/championing-every-identity/dei.html</loc><lastmod>2024-11-05T16:20:06.323Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/customer-stories.html</loc><lastmod>2024-12-05T15:00:02.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/customer-stories/3712-raiffeisen-bank-international.html</loc><lastmod>2026-04-08T20:46:12.971Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/customer-stories/hp-3360.html</loc><lastmod>2026-04-17T17:20:34.357Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/events/art-of-the-possible.html</loc><lastmod>2026-02-10T22:14:44.01Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp.html</loc><lastmod>2022-02-08T14:59:18.497Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center.html</loc><lastmod>2022-02-08T14:59:22.727Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center-thank-you.html</loc><lastmod>2022-02-08T14:59:23.028Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center-request.html</loc><lastmod>2022-02-08T14:59:23.315Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center-request-thank-you.html</loc><lastmod>2022-02-08T14:59:23.643Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo.html</loc><lastmod>2026-02-02T23:49:40.881Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/neo.html</loc><lastmod>2023-07-24T18:11:46.353Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/credentialing.html</loc><lastmod>2023-10-23T17:35:50.167Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/verification.html</loc><lastmod>2023-07-24T18:16:25.877Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/integrations.html</loc><lastmod>2023-07-24T18:16:32.843Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/decentralized-identity-101.html</loc><lastmod>2025-01-16T17:14:57.873Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pinghelix.html</loc><lastmod>2026-01-07T16:38:38.292Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/customer-identity-access-management-landscape.html</loc><lastmod>2024-12-06T22:57:09.102Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/pingandforgerock.html</loc><lastmod>2026-04-08T19:47:57.252Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/p.html</loc><lastmod>2024-10-25T14:29:25.61Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/p/aws.html</loc><lastmod>2025-06-12T16:05:15.316Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4076-2024-consumer-survey-improved-digital-experiences.html</loc><lastmod>2025-11-17T20:56:17.237Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4099-how-leading-brands-stop-fraud-prevent-threats.html</loc><lastmod>2025-10-09T18:51:13.415Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4110-10-must-have-ciam-capabilities.html</loc><lastmod>2025-10-09T18:16:53.093Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4102-align-tech-business-drive-transformation.html</loc><lastmod>2025-10-09T18:26:26.28Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4103-fraud-prevention-ciam-checklist.html</loc><lastmod>2025-10-09T18:24:35.877Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4105-account-takeover-prevention.html</loc><lastmod>2025-10-09T18:23:37.578Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4098-stop-identity-fraud.html</loc><lastmod>2025-10-09T18:51:50.31Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4101-reduce-new-account-fraud-risks.html</loc><lastmod>2025-10-09T18:51:20.895Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4107-keeping-out-fraudsters.html</loc><lastmod>2025-10-09T18:16:37.171Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4108-identity-new-account-fraud.html</loc><lastmod>2025-10-09T18:16:45.781Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/trust-every-digital-moment.html</loc><lastmod>2026-01-30T20:21:32.601Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/universal-services.html</loc><lastmod>2026-03-16T15:54:03.067Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/legal/gdpr-compliance-faq.html</loc><lastmod>2024-11-18T17:55:40.727Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform.html</loc><lastmod>2026-02-06T20:59:32.271Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/solutions.html</loc><lastmod>2023-05-03T17:14:39.226Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/solutions/partner.html</loc><lastmod>2022-11-08T15:53:59.036Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pricing.html</loc><lastmod>2026-01-27T22:53:34.021Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/deployment-options.html</loc><lastmod>2026-02-10T21:06:16.475Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/autonomous-identity.html</loc><lastmod>2024-11-08T20:56:46.595Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/software-development-kits.html</loc><lastmod>2026-04-10T21:46:11.818Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-advanced-identity-cloud.html</loc><lastmod>2025-12-26T22:50:37.485Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-advanced-identity-cloud-architecture.html</loc><lastmod>2024-05-30T22:20:24.515Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/identity-relationship-visualization.html</loc><lastmod>2024-06-03T14:40:47.03Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-for-customers.html</loc><lastmod>2026-02-03T16:15:52.739Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-for-workforce.html</loc><lastmod>2025-05-06T19:05:58.407Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-advanced-services.html</loc><lastmod>2025-08-11T21:32:04.438Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/cloud-containerization.html</loc><lastmod>2025-07-23T14:34:21.435Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources.html</loc><lastmod>2023-05-10T21:04:13.414Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog.html</loc><lastmod>2024-03-26T16:23:15.47Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts.html</loc><lastmod>2022-04-18T15:32:35.373Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2018.html</loc><lastmod>2022-04-18T15:32:35.506Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/securely-using-oidc-authorization-code-flow-public-client-single-page-apps.html</loc><lastmod>2023-01-18T20:48:46.96Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2019.html</loc><lastmod>2022-04-18T15:32:35.617Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/jwt-security-nobody-talks-about.html</loc><lastmod>2024-10-08T15:39:53.023Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/simple-open-banking-payments-decoupled-authentication.html</loc><lastmod>2023-09-22T23:31:06.878Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/understanding-token-binding.html</loc><lastmod>2023-09-25T16:56:09.322Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pingdatagovernance-securing-customer-data.html</loc><lastmod>2026-04-10T22:39:14.99Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/api-security-growing-challenge.html</loc><lastmod>2023-12-08T15:54:57.624Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/alert-anniversaire-rgpd.html</loc><lastmod>2023-12-08T15:59:26.268Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zero-trust-architecture-security-network-perimeter.html</loc><lastmod>2024-03-20T18:49:20.939Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/client-initiated-backchannel-authentication-improving-customer-experience.html</loc><lastmod>2026-04-10T21:52:49.093Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-verification-RGPD-regulation.html</loc><lastmod>2023-12-08T16:15:29.49Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ecommerce-mobile-application-security.html</loc><lastmod>2024-03-05T19:05:06.482Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/future-without-passwords.html</loc><lastmod>2026-02-02T16:35:13.095Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/security-comfort-online-payments.html</loc><lastmod>2023-12-08T16:46:18.725Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/future-secure-authentication.html</loc><lastmod>2024-03-20T19:04:24.969Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/passwordless-finishing-passwords.html</loc><lastmod>2024-01-05T20:56:33.196Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2020.html</loc><lastmod>2022-04-18T15:32:36.499Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/build-buy-strong-case-buying-ciam-solution.html</loc><lastmod>2024-03-18T18:15:20.988Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/risk-based-authentication-integrations.html</loc><lastmod>2025-06-11T19:15:29.073Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/standard-fido2-passworldess.html</loc><lastmod>2023-12-08T17:37:15.28Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/containerization-cloud-deployment.html</loc><lastmod>2024-03-20T19:11:37.72Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/security-api-for-modern-companies.html</loc><lastmod>2023-12-08T17:48:58.35Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/transparent-payments-ciba-psd2.html</loc><lastmod>2023-12-08T17:52:39.991Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/work-from-home-how-to-keep-employees-productive-secure.html</loc><lastmod>2025-12-17T16:06:36.38Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zero-trust-workforce-productivity.html</loc><lastmod>2023-12-08T20:42:56.945Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-sailpoint-cloud-iam.html</loc><lastmod>2023-12-14T16:29:37.606Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zoom-zscaler-ping-integrations-secure-work-from-home.html</loc><lastmod>2023-12-08T21:02:55.427Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/mfa-delivers-great-experiences.html</loc><lastmod>2023-12-08T21:18:19.292Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/cyber-security-apis.html</loc><lastmod>2023-12-08T21:22:38.17Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-user-content-management.html</loc><lastmod>2023-12-08T21:31:04.62Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/remote-work-zero-trust.html</loc><lastmod>2023-12-08T21:33:58.409Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/authentication-customer-buying-journey.html</loc><lastmod>2023-12-08T21:54:03.072Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/workforce-identity-can-ensure-digital-transformation-success.html</loc><lastmod>2026-04-14T14:36:43.212Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-optimize-user-experience-ecommerce.html</loc><lastmod>2024-03-20T18:47:24.205Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/5-authentication-experiences-drive-customers-away-cost-revenue.html</loc><lastmod>2023-12-27T17:05:27.241Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/evaluate-identity-integrations.html</loc><lastmod>2025-12-08T21:00:06.49Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/intelligent-workforce-authentication-decisions.html</loc><lastmod>2023-12-08T22:18:33.661Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/strong-performer-forrester-wave-ciam.html</loc><lastmod>2025-06-12T14:46:58.735Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-five-authentication-customers.html</loc><lastmod>2023-12-08T22:18:37.537Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/three-breaches-zero-trust-could-have-been-prevented.html</loc><lastmod>2024-01-22T19:53:26.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/securing-next-generation-workforce.html</loc><lastmod>2022-12-14T21:08:21.211Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/eight-benefits-mfa.html</loc><lastmod>2024-03-11T16:15:15.677Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-web-access-management-wam.html</loc><lastmod>2025-06-12T14:27:19.47Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ultimate-guide-token-based-authentication.html</loc><lastmod>2024-06-19T16:09:24.074Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/refresh-token-rotation-spa.html</loc><lastmod>2023-03-09T21:21:04.633Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-benefits-sso.html</loc><lastmod>2025-06-12T16:02:54.563Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/personal-identity-future-digital-interactions.html</loc><lastmod>2025-06-11T22:28:03.935Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/iam-security-overview.html</loc><lastmod>2025-06-12T14:13:27.194Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping4good-planting-trees.html</loc><lastmod>2023-11-01T22:35:18.887Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/account-takeover-ato-fraud.html</loc><lastmod>2024-01-22T20:28:56.371Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/one-time-password-ultimate-guide.html</loc><lastmod>2024-10-08T20:49:35.066Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-verification-kyc.html</loc><lastmod>2024-03-20T18:54:29.467Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/future-of-cloud-iam.html</loc><lastmod>2025-08-11T17:33:15.179Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-better-digital-experiences.html</loc><lastmod>2023-11-02T22:51:26.628Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/authentication-vs-authorization.html</loc><lastmod>2025-12-21T11:57:54.99Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/everything-need-know-online-fraud.html</loc><lastmod>2023-11-02T22:51:28.125Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ultimate-guide-authentication.html</loc><lastmod>2024-01-25T14:28:18.531Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/you-need-iam-mdm-in-todays-wfa-world.html</loc><lastmod>2025-06-11T19:06:42.913Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/mfa-ueba-zero-trust.html</loc><lastmod>2023-12-11T15:04:10.262Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-6-identity-industry-predictions-2021.html</loc><lastmod>2023-12-11T15:07:16.488Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/engage-customers-identity-verification.html</loc><lastmod>2025-06-12T15:45:26.259Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/authentication-authority-wf-ciam.html</loc><lastmod>2024-03-20T18:52:02.228Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/modernization-secure-id-mfa.html</loc><lastmod>2023-12-11T15:29:16.306Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/sso-vs-federated-identity-management.html</loc><lastmod>2025-06-11T18:55:08.415Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pingidentity-now-in-AWS-marketplace.html</loc><lastmod>2024-01-04T16:36:09.163Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/dynamic-authorization.html</loc><lastmod>2023-12-11T16:37:01.328Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/getting-started-with-zero-trust.html</loc><lastmod>2026-02-02T15:56:33.633Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/hybrid-cloud-identity-2021.html</loc><lastmod>2026-02-02T15:55:52.47Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2022.html</loc><lastmod>2022-04-18T15:32:45.984Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-best-of-breed-technology.html</loc><lastmod>2026-03-04T22:49:52.066Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-online-fraud-monitoring.html</loc><lastmod>2024-02-19T23:40:56.304Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/prevent-account-takeover-ato-fraud-banking-financial-services.html</loc><lastmod>2024-01-25T14:09:41.014Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/encryption-vs-hashing-vs-salting.html</loc><lastmod>2026-01-30T23:46:03.597Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identification-vs-verification-vs-authentication.html</loc><lastmod>2024-01-25T14:00:21.566Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/how-big-is-the-cloud.html</loc><lastmod>2024-02-15T16:31:44.324Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/complete-guide-to-api-security.html</loc><lastmod>2026-03-04T22:55:08.933Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/beyond-passwords-for-passwordless-day.html</loc><lastmod>2026-02-02T15:17:55.403Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/counter-fraud-strategy.html</loc><lastmod>2023-01-17T23:03:35.051Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-privileged-account-management-pam.html</loc><lastmod>2024-01-25T16:06:11.238Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/3-ways-fin-serv-enterprise-architects-embrace-dynamic-auth.html</loc><lastmod>2024-06-18T16:43:19.554Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-knowledge-based-authentication-kba.html</loc><lastmod>2024-01-25T14:46:37.708Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-out-of-band-authentication-ooba.html</loc><lastmod>2024-01-25T16:14:44.066Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-principle-of-least-privilege-polp.html</loc><lastmod>2024-01-25T14:33:13.17Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-sms-authentication.html</loc><lastmod>2024-01-22T19:48:38.163Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/best-identity-and-access-management-iam-tools.html</loc><lastmod>2024-01-22T20:18:41.736Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/rbac-vs-abac.html</loc><lastmod>2023-12-19T21:29:20.37Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/insurance-industry-iam-solutions.html</loc><lastmod>2024-03-18T20:26:24.284Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/preventing-data-breaches-with-iam.html</loc><lastmod>2026-02-02T15:59:46.702Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-ciam-benefits-financial-services.html</loc><lastmod>2025-02-19T20:43:49.92Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-proofing-access-management-fraud-detection-convergence.html</loc><lastmod>2023-12-19T21:36:41.987Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-brute-force-attack.html</loc><lastmod>2026-03-10T17:11:42.206Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ransomware-detection-and-prevention.html</loc><lastmod>2024-02-19T23:42:20.547Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/detect-and-prevent-website-bots.html</loc><lastmod>2026-04-11T15:49:40.37Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-progressive-profiling.html</loc><lastmod>2023-01-18T00:10:50.057Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-profile-management-for-retail.html</loc><lastmod>2023-04-05T14:58:25.632Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/dynamic-authorization-role-fraud-prevention.html</loc><lastmod>2022-08-01T17:04:08.203Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-risk-management-importance.html</loc><lastmod>2023-01-18T00:17:12.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-account-creation-fraud.html</loc><lastmod>2022-10-17T17:40:24.005Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/how-ai-changes-cybersecurity.html</loc><lastmod>2023-01-04T19:17:57.94Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-microsoft-workday-digital-credential-verification-software.html</loc><lastmod>2024-03-20T18:36:09.401Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/2022-forrester-wave-ciam-leader.html</loc><lastmod>2023-12-19T22:21:33.233Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-orchestration-accelerates-passwordless-vision.html</loc><lastmod>2023-02-07T16:57:16.756Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/2022-leader-gartner-iam-magic-quadrant.html</loc><lastmod>2025-12-08T21:03:26.748Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/2022-kuppingercole-leadership-compass-ciam-platforms.html</loc><lastmod>2025-02-21T22:15:00.57Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/use-identity-to-give-customers-what-they-want.html</loc><lastmod>2026-02-02T16:37:44.66Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ultimate-guide-to-retail-customer-identity.html</loc><lastmod>2023-02-22T20:39:24.797Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/build-or-buy-customer-identity-solutions.html</loc><lastmod>2023-02-23T20:06:20.36Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-identity-business-case-build.html</loc><lastmod>2023-02-24T21:07:24.824Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-trends.html</loc><lastmod>2025-02-19T20:39:45.474Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-cloud-capital-one.html</loc><lastmod>2024-11-04T20:38:00.74Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/fraud-decisioning-orchestration.html</loc><lastmod>2023-03-01T22:56:42.464Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/how-fido-passkeys-accelerate-passwordless-future.html</loc><lastmod>2023-03-27T17:55:08.291Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/grow-your-enterprise-securely-in-the-metaverse.html</loc><lastmod>2023-11-01T19:03:19.994Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/modern-adaptive-authentication-mfa.html</loc><lastmod>2024-03-20T18:38:37.673Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-survey-takeaways.html</loc><lastmod>2025-06-11T22:37:17.542Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/protect-financial-apis-manage-supply-chain-risk.html</loc><lastmod>2025-12-17T15:25:46.779Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/announcing-pingone-neo-decentralized-identity.html</loc><lastmod>2023-11-13T19:28:13.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zero-trust-financial-services.html</loc><lastmod>2026-01-27T22:57:09.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/three-trends-identity-management-day.html</loc><lastmod>2023-06-16T20:53:57.142Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/passwordless-in-security-it-leader-self-help-guide.html</loc><lastmod>2026-02-02T15:21:28.831Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/balancing-cost-security-and-experience-with-identity-orchestration.html</loc><lastmod>2023-07-06T18:31:54.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-customer-identity-and-access-management-ciam.html</loc><lastmod>2023-10-24T15:23:24.204Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/financial-services-identity-verification.html</loc><lastmod>2026-04-07T22:47:43.449Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/flexible-iam-deployment-options.html</loc><lastmod>2023-08-18T14:54:42.478Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/workforce-identity-trifecta-southeast-asia.html</loc><lastmod>2023-08-18T20:03:19.799Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/introducing-pingone-for-customers-passwordless-solution.html</loc><lastmod>2023-09-29T15:23:53.683Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-solutions-in-age-of-ai.html</loc><lastmod>2024-08-27T18:26:31.381Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-identity-and-access-management-ciam-evolution.html</loc><lastmod>2025-02-19T20:35:59.739Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/mfa-bombing-dismantled.html</loc><lastmod>2023-11-09T19:13:50.665Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-google-chrome-enterprise.html</loc><lastmod>2023-11-10T23:35:34.448Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-privacy-and-consent-best-practices.html</loc><lastmod>2023-10-23T18:29:03.057Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-security-privacy-consent.html</loc><lastmod>2026-04-09T19:07:27.46Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/five-elements-threat-protection.html</loc><lastmod>2023-12-01T17:05:33.356Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-achieves-fapi2-certification.html</loc><lastmod>2023-10-23T23:19:27.959Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/blockchain-sidechains-decentraized-identity.html</loc><lastmod>2024-03-20T19:08:49.637Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/making-most-of-cloud-In-financial-services.html</loc><lastmod>2025-06-26T15:52:31.458Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/continuous-adaptive-trust-final-frontier.html</loc><lastmod>2023-10-30T18:32:30.484Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/introducing-voice-verification.html</loc><lastmod>2023-10-31T16:10:11.212Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ecommerce-fraud-detection.html</loc><lastmod>2025-06-30T13:03:21.164Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-cloud-acceleration-toolset.html</loc><lastmod>2024-06-14T22:49:56.021Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/shared-finance-empower-customers-identity-authorization.html</loc><lastmod>2023-12-01T20:19:52.071Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-leader-gartner-magic-quadrant-access-management.html</loc><lastmod>2025-12-08T20:57:01.984Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/five-steps-operationalize-pingcentral.html</loc><lastmod>2024-08-27T15:52:30.229Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-leader-gartner-critical-capabilities-access-management-2023.html</loc><lastmod>2025-02-21T23:33:09.675Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-youniverse-global-2023-recap.html</loc><lastmod>2024-01-17T17:31:49.071Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/digital-identity-financial-services.html</loc><lastmod>2024-05-07T14:06:51.484Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pekin-insurance-delivers-security.html</loc><lastmod>2024-08-29T14:26:07.165Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/financial-services-ciam-strategy.html</loc><lastmod>2026-04-01T21:12:53.409Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ecommerce-holiday-rush-preparation.html</loc><lastmod>2025-07-01T21:03:28.794Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mark-dorey/page/1.html</loc><lastmod>2023-01-28T01:03:49.102Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/chris-price/page/1.html</loc><lastmod>2023-01-30T16:04:33.594Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/anthony-dombrowski/page/1.html</loc><lastmod>2023-11-15T21:48:51.15Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/craig-solberg/page/1.html</loc><lastmod>2024-06-26T16:28:16.025Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/emily-mucklow/page/1.html</loc><lastmod>2023-01-30T15:39:12.754Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/rob-greenman/page/1.html</loc><lastmod>2023-01-13T19:12:44.005Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/philip-coldrey/page/1.html</loc><lastmod>2023-01-28T00:44:26.643Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/bryan-rosensteel/page/1.html</loc><lastmod>2023-01-30T16:10:37.234Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jeremy-carrier/page/1.html</loc><lastmod>2023-01-28T01:18:49.279Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/thomas-schneider/page/1.html</loc><lastmod>2023-11-14T22:22:23.273Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/aaron-hughes/page/1.html</loc><lastmod>2023-01-24T17:39:12.435Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ido-amitay/page/1.html</loc><lastmod>2023-01-30T15:32:56.008Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/vikas-mundada-and-michael-sanchez/page/1.html</loc><lastmod>2025-09-17T21:51:23.844Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/arthur-loris/page/1.html</loc><lastmod>2023-01-30T16:16:53.211Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/matthew-mcnulty/page/1.html</loc><lastmod>2023-11-15T00:31:24.689Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/moshe-ben-noun/page/1.html</loc><lastmod>2023-01-19T22:47:26.845Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/wesley-dunnington/page/1.html</loc><lastmod>2023-02-17T23:28:15.317Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/shannon-lightfoot/page/1.html</loc><lastmod>2023-02-03T19:21:14.343Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jason-kees/page/1.html</loc><lastmod>2023-11-15T18:57:58.452Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/itai-zach/page/1.html</loc><lastmod>2023-01-28T01:30:30.964Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/pratibha-srikanta/page/1.html</loc><lastmod>2023-02-02T16:53:46.439Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ashley-diffey/page/1.html</loc><lastmod>2023-01-30T16:15:49.532Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andrew-goodman/page/1.html</loc><lastmod>2023-01-12T18:51:47.987Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andrew-morales/page/1.html</loc><lastmod>2023-01-30T16:47:03.951Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/anthony-heninger/page/1.html</loc><lastmod>2023-01-30T16:18:33.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/baber-amin/page/1.html</loc><lastmod>2023-01-12T18:44:11.789Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/bjorn-aannestad/page/1.html</loc><lastmod>2023-01-30T16:13:51.467Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/brian-campbell/page/1.html</loc><lastmod>2023-01-30T16:36:58.457Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/cayla-curtis/page/1.html</loc><lastmod>2024-08-20T15:27:51.678Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/curtis-muir/page/1.html</loc><lastmod>2023-01-30T15:51:59.086Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/cyril-patou/page/1.html</loc><lastmod>2023-01-12T18:44:43.92Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/darell-machado/page/1.html</loc><lastmod>2024-08-16T19:38:33.458Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/david-waite/page/1.html</loc><lastmod>2023-01-30T15:44:26.852Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/derick-james/page/1.html</loc><lastmod>2023-01-24T17:47:22.169Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/derick-townsend/page/1.html</loc><lastmod>2023-01-24T17:48:04.367Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/donna-shawhan/page/1.html</loc><lastmod>2023-01-24T17:51:10.749Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/dustin-maxey/page/1.html</loc><lastmod>2024-08-16T18:19:00.105Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/federico-carbone/page/1.html</loc><lastmod>2023-01-30T15:35:26.947Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/guoping-liu/page/1.html</loc><lastmod>2023-01-24T20:41:17.464Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jason-evans/page/1.html</loc><lastmod>2023-01-28T01:26:37.06Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jason-oeltjen/page/1.html</loc><lastmod>2023-01-28T01:23:16.683Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/kevin-sellers/page/1.html</loc><lastmod>2023-01-28T01:14:07.383Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/loren-russon/page/1.html</loc><lastmod>2023-01-28T01:10:42.57Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/marco-delas/page/1.html</loc><lastmod>2023-01-28T01:05:56.184Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mark-perry/page/1.html</loc><lastmod>2023-01-12T18:49:27.326Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/michael-sanchez/page/1.html</loc><lastmod>2023-01-13T19:02:37.412Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/michelle-jenkins/page/1.html</loc><lastmod>2023-11-15T00:27:29.676Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/natalie-blake/page/1.html</loc><lastmod>2023-01-13T19:08:12.381Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/natalie-woodard/page/1.html</loc><lastmod>2023-01-28T00:54:28.973Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/or-hay/page/1.html</loc><lastmod>2023-01-27T16:23:10.473Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/oren-sternheim/page/1.html</loc><lastmod>2023-01-28T00:50:37.51Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/patrick-harding/page/1.html</loc><lastmod>2023-01-28T00:49:15.689Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/paul-van-der-lee/page/1.html</loc><lastmod>2023-01-28T00:47:36.802Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/rob-otto/page/1.html</loc><lastmod>2023-01-28T00:36:16.703Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ryan-kogelheide/page/1.html</loc><lastmod>2023-01-28T00:32:19.115Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/saira-guthrie/page/1.html</loc><lastmod>2023-01-13T19:16:34.53Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jeremie-miller/page/1.html</loc><lastmod>2023-01-28T01:20:17.67Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/john-dasilva/page/1.html</loc><lastmod>2023-02-21T15:06:37.672Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/sascha-preibisch/page/1.html</loc><lastmod>2023-01-28T00:29:39.741Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/scott-tomilson/page/1.html</loc><lastmod>2023-02-03T19:16:38.299Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/tarun-madiraju/page/1.html</loc><lastmod>2023-01-28T00:18:26.213Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/yariv-levavi/page/1.html</loc><lastmod>2023-01-27T23:54:15.459Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/diana-jouard/page/1.html</loc><lastmod>2023-02-03T17:23:32.854Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/bernard-harguindeguy/page/1.html</loc><lastmod>2023-01-12T18:54:28.367Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/zain-malik/page/1.html</loc><lastmod>2023-01-13T00:33:19.601Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/nicole-alrubaiy/page/1.html</loc><lastmod>2023-01-13T00:18:20.961Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andre-durand/page/1.html</loc><lastmod>2023-01-12T18:51:20.576Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/matt-pollicove/page/1.html</loc><lastmod>2023-01-12T22:43:15.479Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/joe-malenfant/page/1.html</loc><lastmod>2023-11-15T00:45:45.044Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/maya-ogranovitch-scott/page/1.html</loc><lastmod>2024-12-13T19:08:20.669Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andrew-hughes/page/1.html</loc><lastmod>2023-11-15T22:19:18.389Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mehmet-yaliman/page/1.html</loc><lastmod>2023-01-12T22:49:36.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/richard-bird/page/1.html</loc><lastmod>2023-02-03T19:44:59.606Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/emily-mckeown/page/1.html</loc><lastmod>2023-01-12T18:47:17.614Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/edward-killeen/page/1.html</loc><lastmod>2023-02-03T17:36:17.011Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jordan-griffith/page/1.html</loc><lastmod>2023-11-15T00:40:05.097Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/philippe-de-ryck/page/1.html</loc><lastmod>2023-02-03T19:38:50.433Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/yev-koup/page/1.html</loc><lastmod>2023-11-14T19:37:13.354Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/steve-dillon/page/1.html</loc><lastmod>2023-01-28T00:16:54.226Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/matt-bates/page/1.html</loc><lastmod>2023-01-12T19:21:39.025Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/alasdair-rambaud/page/1.html</loc><lastmod>2023-01-12T18:50:27.462Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/samuel-brown/page/1.html</loc><lastmod>2023-11-15T00:22:47.92Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/stacy-gardner/page/1.html</loc><lastmod>2023-11-14T22:31:25.177Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/robert-broeckelmann/page/1.html</loc><lastmod>2023-01-13T00:26:07.546Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/armin-ebrahimi/page/1.html</loc><lastmod>2023-02-17T22:16:09.501Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/aubrey-turner/page/1.html</loc><lastmod>2023-11-15T19:33:29.884Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/divya-handa/page/1.html</loc><lastmod>2023-12-01T01:45:07.115Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/adam-rusbridge/page/1.html</loc><lastmod>2024-08-20T18:50:14.812Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/laurent-szpirglas/page/1.html</loc><lastmod>2023-11-15T00:35:58.595Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/joseph-dhanapal/page/1.html</loc><lastmod>2023-01-12T19:20:44.423Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/george-lattimore/page/1.html</loc><lastmod>2023-02-03T17:40:16.243Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mindy-servello/page/1.html</loc><lastmod>2023-01-13T00:17:19.129Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/aviad-maroodi/page/1.html</loc><lastmod>2023-11-16T15:35:44.154Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ran-wasserman/page/1.html</loc><lastmod>2023-02-03T18:57:53.002Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/branden-williams/page/1.html</loc><lastmod>2023-02-03T17:15:41.389Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jens-keuter/page/1.html</loc><lastmod>2023-11-15T17:59:24.362Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/arnaud-gallut/page/1.html</loc><lastmod>2023-01-13T15:00:20.589Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/alain-barbier/page/1.html</loc><lastmod>2023-01-19T16:07:27.213Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/herb-goodfellow/page/1.html</loc><lastmod>2023-03-24T21:18:23.802Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/max-fathauer-and-herb-goodfellow/page/1.html</loc><lastmod>2025-09-17T21:51:23.842Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/louise-watson/page/1.html</loc><lastmod>2024-05-23T21:08:50.113Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/christina-tubb/page/1.html</loc><lastmod>2023-08-18T20:03:18.376Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/gaurav-khot/page/1.html</loc><lastmod>2023-10-24T16:49:34.157Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/max-fathauer/page/1.html</loc><lastmod>2024-08-21T21:28:03.865Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/darrell-geusz/page/1.html</loc><lastmod>2023-11-13T19:27:18.153Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/adam-preis/page/1.html</loc><lastmod>2024-05-06T19:22:11.97Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/nicole-roseveare/page/1.html</loc><lastmod>2024-08-12T17:25:55.311Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/anish-srivastava/page/1.html</loc><lastmod>2024-09-20T18:50:11.191Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/downloads.html</loc><lastmod>2023-12-14T16:06:09.851Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals.html</loc><lastmod>2026-02-02T15:51:25.562Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-orchestration.html</loc><lastmod>2026-02-02T20:07:27.352Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-and-access-management.html</loc><lastmod>2026-04-10T18:30:18.946Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-and-access-management/identity-providers-service-providers.html</loc><lastmod>2023-05-03T20:30:25.54Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-and-access-management/centralized-decentralized-identity-management.html</loc><lastmod>2022-09-21T18:58:40.248Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/zero-trust-security.html</loc><lastmod>2026-02-02T15:54:16.81Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication.html</loc><lastmod>2023-05-03T20:36:48.832Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/single-factor-two-factor-multi-factor-authentication.html</loc><lastmod>2026-02-03T16:20:27.595Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/passwordless-authentication.html</loc><lastmod>2026-02-02T15:13:54.087Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/passwordless-authentication/fido.html</loc><lastmod>2025-02-25T14:28:48.745Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/risk-based-authentication.html</loc><lastmod>2023-05-03T21:08:50.273Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/certificate-authentication.html</loc><lastmod>2022-09-28T16:41:52.979Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/token-based-authentication.html</loc><lastmod>2023-05-03T21:19:52.366Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/single-sign-on.html</loc><lastmod>2023-05-03T21:21:42.805Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/federated-identity-management.html</loc><lastmod>2023-05-03T21:25:42.629Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/chap-authentication.html</loc><lastmod>2023-03-27T17:51:35.565Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/continuous-authentication.html</loc><lastmod>2023-05-03T21:30:29.84Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization.html</loc><lastmod>2023-05-03T21:30:28.342Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/authorization-methods.html</loc><lastmod>2023-12-19T22:38:47.669Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/user-account-provisioning.html</loc><lastmod>2022-10-04T16:12:55.985Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/sso-directory.html</loc><lastmod>2023-05-03T21:41:40.769Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/dynamic-authorization.html</loc><lastmod>2026-02-18T16:00:54.09Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards.html</loc><lastmod>2022-10-04T16:12:57.2Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards/saml.html</loc><lastmod>2026-02-03T17:34:47.679Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards/oauth.html</loc><lastmod>2025-11-26T19:59:37.984Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards/openid-connect.html</loc><lastmod>2023-05-03T19:01:21.03Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols.html</loc><lastmod>2023-01-10T20:19:57.575Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/ldap.html</loc><lastmod>2023-05-03T17:41:30.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/scim.html</loc><lastmod>2023-05-03T16:40:03.05Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/webauthn.html</loc><lastmod>2023-05-03T15:08:11.544Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/kerberos.html</loc><lastmod>2023-05-04T17:11:21.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/ws-trust.html</loc><lastmod>2024-10-29T14:49:37.904Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management.html</loc><lastmod>2025-07-16T16:40:02.404Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/what-is-centralized-identity-management.html</loc><lastmod>2025-07-16T16:51:24.576Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/how-does-centralized-identity-management-work.html</loc><lastmod>2025-07-16T16:51:24.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards.html</loc><lastmod>2025-07-16T16:51:23.985Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards/oauth.html</loc><lastmod>2025-07-17T19:02:54.705Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards/saml.html</loc><lastmod>2025-07-17T19:02:55.637Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/b2b-identity.html</loc><lastmod>2025-07-01T20:48:33.191Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai.html</loc><lastmod>2026-01-07T18:55:34.589Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai/key-iam-considerations.html</loc><lastmod>2026-01-07T19:03:52.667Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai/classes-and-use-cases.html</loc><lastmod>2026-01-07T19:33:41.573Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai/iam-best-practices-ai-agents.html</loc><lastmod>2026-01-07T19:37:45.313Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai/reference-implementation-patterns.html</loc><lastmod>2026-01-07T19:47:53.939Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai/runtime-identity.html</loc><lastmod>2026-04-14T17:53:42.077Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library.html</loc><lastmod>2023-06-27T18:53:48.435Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/openid-connect.html</loc><lastmod>2022-06-07T18:23:48.935Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/digital-transformation.html</loc><lastmod>2024-03-21T19:10:09.126Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/identity-as-a-service-idaas.html</loc><lastmod>2026-02-03T22:55:11.277Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3150-ultimate-guide-to-mfa.html</loc><lastmod>2023-04-10T14:37:07.536Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3555-customer-identity-buyers-guide.html</loc><lastmod>2023-07-13T15:58:29.709Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3442-workforce-authentication-authority.html</loc><lastmod>2026-01-30T23:42:41.113Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals.html</loc><lastmod>2022-07-28T18:09:11.635Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats.html</loc><lastmod>2022-12-21T19:51:30.349Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/clickjacking.html</loc><lastmod>2026-04-07T23:29:35.922Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/cross-site-scripting.html</loc><lastmod>2023-02-06T16:15:19.173Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/internet-of-things-attack.html</loc><lastmod>2022-08-05T16:50:36.048Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/botnet-attack.html</loc><lastmod>2026-04-07T23:11:13.768Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/credential-stuffing.html</loc><lastmod>2023-01-04T19:30:58.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/spearphishing.html</loc><lastmod>2022-08-31T19:11:37.771Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/ransomware-as-a-service-raas.html</loc><lastmod>2024-01-17T15:44:45.221Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/buffer-overflow-attack.html</loc><lastmod>2022-10-27T14:34:03.847Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/distributed-denial-of-service-ddos-attack.html</loc><lastmod>2022-10-26T14:43:24.079Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/rootkit.html</loc><lastmod>2023-12-19T22:40:50.106Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/sql-injection.html</loc><lastmod>2024-01-17T15:48:06.291Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/keylogger.html</loc><lastmod>2024-01-17T16:14:29.686Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/man-in-the-middle-attack.html</loc><lastmod>2023-02-16T19:49:04.329Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/zero-day-exploit.html</loc><lastmod>2023-02-16T19:49:04.495Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk.html</loc><lastmod>2024-01-17T15:32:03.237Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk/fraudulent-device-detection.html</loc><lastmod>2024-01-17T15:35:09.709Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk/soar.html</loc><lastmod>2022-08-31T19:12:38.482Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk/impossible-travel-101.html</loc><lastmod>2025-10-23T19:50:20.158Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/mitigate-risk.html</loc><lastmod>2024-01-17T15:33:28.693Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ty.html</loc><lastmod>2022-01-28T16:28:35.306Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability.html</loc><lastmod>2026-02-10T21:32:38.395Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/authentication-authority.html</loc><lastmod>2026-04-10T22:57:00.545Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/directory.html</loc><lastmod>2026-04-14T16:06:24.331Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-verification.html</loc><lastmod>2026-04-01T16:34:54.416Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/multi-factor-authentication.html</loc><lastmod>2026-04-20T20:20:16.241Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-orchestration.html</loc><lastmod>2026-04-14T16:38:02.63Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/single-sign-on.html</loc><lastmod>2026-04-03T23:14:35.179Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/threat-protection.html</loc><lastmod>2026-04-10T22:30:32.963Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/authorization.html</loc><lastmod>2026-04-13T19:37:59.486Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-management.html</loc><lastmod>2025-05-06T19:06:10.106Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-governance.html</loc><lastmod>2026-01-22T00:31:14.086Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-cloud-security.html</loc><lastmod>2025-05-06T19:06:11.092Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/edge-security.html</loc><lastmod>2025-05-06T19:06:12.61Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/verifiable-credentials.html</loc><lastmod>2026-04-17T15:36:30.988Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/lifecycle-management.html</loc><lastmod>2025-05-06T19:06:14.574Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/jit-privileged-access.html</loc><lastmod>2026-03-26T16:03:17.246Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/zero-knowledge-biometrics.html</loc><lastmod>2026-01-21T16:23:45.526Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry.html</loc><lastmod>2026-02-26T18:51:42.434Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/healthcare.html</loc><lastmod>2026-03-05T16:46:41.733Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/manufacturing.html</loc><lastmod>2026-03-04T16:45:00.211Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/retail.html</loc><lastmod>2026-03-17T00:27:09.587Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/media-telco.html</loc><lastmod>2026-03-05T19:51:11.708Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/automotive.html</loc><lastmod>2026-04-09T18:40:55.633Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/insurance.html</loc><lastmod>2026-01-06T22:57:43.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/financial-services.html</loc><lastmod>2026-03-16T17:49:38.255Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product.html</loc><lastmod>2026-03-18T16:03:09.89Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingaccess.html</loc><lastmod>2026-04-07T23:44:01.153Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingauthorize.html</loc><lastmod>2025-05-06T19:06:27.659Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingcentral.html</loc><lastmod>2026-03-27T16:40:28.901Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingdirectory.html</loc><lastmod>2025-05-06T19:06:33.98Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingfederate.html</loc><lastmod>2026-04-07T22:31:44.129Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pinggateway.html</loc><lastmod>2026-04-10T21:32:10.931Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pinggateway/capability.html</loc><lastmod>2025-05-06T19:06:30.247Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingid.html</loc><lastmod>2026-03-02T23:33:23.404Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-authorize.html</loc><lastmod>2025-05-06T19:06:24.114Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-credentials.html</loc><lastmod>2025-12-17T15:42:58.628Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-davinci.html</loc><lastmod>2025-12-17T15:36:59.523Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-mfa.html</loc><lastmod>2026-04-10T21:41:02.483Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-protect.html</loc><lastmod>2026-03-25T16:34:41.343Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-verify.html</loc><lastmod>2026-04-10T18:16:02.188Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-recognize.html</loc><lastmod>2026-03-19T15:01:40.144Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/agent-gateway.html</loc><lastmod>2026-04-21T15:31:29.653Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/agent-iam-core.html</loc><lastmod>2026-04-20T19:04:24.234Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution.html</loc><lastmod>2026-04-08T19:25:40.906Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/open-banking.html</loc><lastmod>2026-04-16T23:57:55.456Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/open-banking/psd2-open-banking.html</loc><lastmod>2025-12-17T22:54:39.558Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/prevent-online-fraud.html</loc><lastmod>2026-04-20T17:38:30.521Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/passwordless.html</loc><lastmod>2026-04-20T17:14:58.858Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/iam-modernization.html</loc><lastmod>2025-05-06T19:06:42.196Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/privacy-consent.html</loc><lastmod>2026-04-20T17:50:30.818Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/zero-trust.html</loc><lastmod>2026-04-20T18:33:39.42Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/iot.html</loc><lastmod>2026-04-16T22:48:47.266Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/workforce-identity.html</loc><lastmod>2026-04-20T18:23:26.201Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/b2b-identity.html</loc><lastmod>2026-04-20T16:16:07.962Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/cloud-identity.html</loc><lastmod>2026-04-20T16:27:53.13Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/agentic-ai-identity.html</loc><lastmod>2026-04-21T15:38:48.849Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/decentralized-identity.html</loc><lastmod>2026-04-20T17:03:14.788Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/mfa/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/identity-101/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/ping-news/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/developers/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/customer-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/events/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/iam-modernization/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/passwordless/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/products-support/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/regulations-compliance/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/customer-partner/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/industry-standards/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/sso/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/api-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/identity-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/workforce-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/zero-trust/page/1.html</loc></url></urlset>