<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.pingidentity.com/fr.html</loc><lastmod>2025-10-01T00:22:59.455Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company.html</loc><lastmod>2023-04-06T19:23:40.362Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/security-at-ping-identity.html</loc><lastmod>2022-01-28T16:28:09.634Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/upcoming-events.html</loc><lastmod>2025-09-29T19:35:30.167Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/leadership.html</loc><lastmod>2025-07-03T12:53:15.418Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/about-us.html</loc><lastmod>2025-07-30T15:45:36.093Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/championing-every-identity.html</loc><lastmod>2024-12-06T18:07:45.621Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/championing-every-identity/esg.html</loc><lastmod>2024-12-06T18:14:16.307Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/company/championing-every-identity/dei.html</loc><lastmod>2024-11-05T16:20:06.323Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/customer-stories.html</loc><lastmod>2024-12-05T15:00:02.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/customer-stories/hp-3360.html</loc><lastmod>2025-06-18T22:44:11.869Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/customer-stories/3712-raiffeisen-bank-international.html</loc><lastmod>2024-08-19T14:48:04.947Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/events/art-of-the-possible.html</loc><lastmod>2023-10-19T14:30:22.688Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp.html</loc><lastmod>2022-02-08T14:59:18.497Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center.html</loc><lastmod>2022-02-08T14:59:22.727Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center-thank-you.html</loc><lastmod>2022-02-08T14:59:23.028Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center-request.html</loc><lastmod>2022-02-08T14:59:23.315Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/preference-center-request-thank-you.html</loc><lastmod>2022-02-08T14:59:23.643Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo.html</loc><lastmod>2025-06-30T15:10:13.097Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/neo.html</loc><lastmod>2023-07-24T18:11:46.353Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/credentialing.html</loc><lastmod>2023-10-23T17:35:50.167Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/verification.html</loc><lastmod>2023-07-24T18:16:25.877Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/integrations.html</loc><lastmod>2023-07-24T18:16:32.843Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pingone-neo/decentralized-identity-101.html</loc><lastmod>2025-01-16T17:14:57.873Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/ac/pinghelix.html</loc><lastmod>2024-11-07T20:06:28.222Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/customer-identity-access-management-landscape.html</loc><lastmod>2024-12-06T22:57:09.102Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/pingandforgerock.html</loc><lastmod>2025-09-26T18:26:09.72Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/p.html</loc><lastmod>2024-10-25T14:29:25.61Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/p/aws.html</loc><lastmod>2025-06-12T16:05:15.316Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4076-2024-consumer-survey-improved-digital-experiences.html</loc><lastmod>2024-11-13T17:30:10.602Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4099-how-leading-brands-stop-fraud-prevent-threats.html</loc><lastmod>2025-04-24T22:49:50.735Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4110-10-must-have-ciam-capabilities.html</loc><lastmod>2025-04-24T22:47:46.967Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4102-align-tech-business-drive-transformation.html</loc><lastmod>2025-04-24T22:52:57.211Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4103-fraud-prevention-ciam-checklist.html</loc><lastmod>2025-04-25T19:54:01.517Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4105-account-takeover-prevention.html</loc><lastmod>2025-05-02T17:02:24.278Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4098-stop-identity-fraud.html</loc><lastmod>2025-04-24T23:09:54.807Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4101-reduce-new-account-fraud-risks.html</loc><lastmod>2025-04-24T22:51:01.337Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4107-keeping-out-fraudsters.html</loc><lastmod>2025-04-24T23:07:34.105Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/4108-identity-new-account-fraud.html</loc><lastmod>2025-04-24T23:11:55.181Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/lp/trust-every-digital-moment.html</loc><lastmod>2025-09-26T18:26:09.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/legal/gdpr-compliance-faq.html</loc><lastmod>2024-11-18T17:55:40.727Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform.html</loc><lastmod>2025-09-26T18:26:09.721Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/solutions.html</loc><lastmod>2023-05-03T17:14:39.226Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/solutions/partner.html</loc><lastmod>2022-11-08T15:53:59.036Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pricing.html</loc><lastmod>2025-02-20T14:15:01.341Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/deployment-options.html</loc><lastmod>2025-05-12T22:19:43.216Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/autonomous-identity.html</loc><lastmod>2024-11-08T20:56:46.595Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/software-development-kits.html</loc><lastmod>2025-02-22T00:17:12.194Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-advanced-identity-cloud.html</loc><lastmod>2025-06-16T15:57:53.535Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-advanced-identity-cloud-architecture.html</loc><lastmod>2024-05-30T22:20:24.515Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/identity-relationship-visualization.html</loc><lastmod>2024-06-03T14:40:47.03Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-for-customers.html</loc><lastmod>2025-05-06T19:05:57.955Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-for-workforce.html</loc><lastmod>2025-05-06T19:05:58.407Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/pingone-advanced-services.html</loc><lastmod>2025-08-11T21:32:04.438Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/platform/cloud-containerization.html</loc><lastmod>2025-07-23T14:34:21.435Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources.html</loc><lastmod>2023-05-10T21:04:13.414Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog.html</loc><lastmod>2024-03-26T16:23:15.47Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts.html</loc><lastmod>2022-04-18T15:32:35.373Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2018.html</loc><lastmod>2022-04-18T15:32:35.506Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/securely-using-oidc-authorization-code-flow-public-client-single-page-apps.html</loc><lastmod>2023-01-18T20:48:46.96Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2019.html</loc><lastmod>2022-04-18T15:32:35.617Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/jwt-security-nobody-talks-about.html</loc><lastmod>2024-10-08T15:39:53.023Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/simple-open-banking-payments-decoupled-authentication.html</loc><lastmod>2023-09-22T23:31:06.878Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/understanding-token-binding.html</loc><lastmod>2023-09-25T16:56:09.322Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pingdatagovernance-securing-customer-data.html</loc><lastmod>2025-06-12T16:01:10.959Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/api-security-growing-challenge.html</loc><lastmod>2023-12-08T15:54:57.624Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/alert-anniversaire-rgpd.html</loc><lastmod>2023-12-08T15:59:26.268Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zero-trust-architecture-security-network-perimeter.html</loc><lastmod>2024-03-20T18:49:20.939Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/client-initiated-backchannel-authentication-improving-customer-experience.html</loc><lastmod>2023-12-19T18:32:21.205Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-verification-RGPD-regulation.html</loc><lastmod>2023-12-08T16:15:29.49Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ecommerce-mobile-application-security.html</loc><lastmod>2024-03-05T19:05:06.482Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/future-without-passwords.html</loc><lastmod>2024-03-20T18:45:10.337Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/security-comfort-online-payments.html</loc><lastmod>2023-12-08T16:46:18.725Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/future-secure-authentication.html</loc><lastmod>2024-03-20T19:04:24.969Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/passwordless-finishing-passwords.html</loc><lastmod>2024-01-05T20:56:33.196Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2020.html</loc><lastmod>2022-04-18T15:32:36.499Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/build-buy-strong-case-buying-ciam-solution.html</loc><lastmod>2024-03-18T18:15:20.988Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/risk-based-authentication-integrations.html</loc><lastmod>2025-06-11T19:15:29.073Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/standard-fido2-passworldess.html</loc><lastmod>2023-12-08T17:37:15.28Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/containerization-cloud-deployment.html</loc><lastmod>2024-03-20T19:11:37.72Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/security-api-for-modern-companies.html</loc><lastmod>2023-12-08T17:48:58.35Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/transparent-payments-ciba-psd2.html</loc><lastmod>2023-12-08T17:52:39.991Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/work-from-home-how-to-keep-employees-productive-secure.html</loc><lastmod>2023-12-27T15:35:33.19Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zero-trust-workforce-productivity.html</loc><lastmod>2023-12-08T20:42:56.945Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-sailpoint-cloud-iam.html</loc><lastmod>2023-12-14T16:29:37.606Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zoom-zscaler-ping-integrations-secure-work-from-home.html</loc><lastmod>2023-12-08T21:02:55.427Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/mfa-delivers-great-experiences.html</loc><lastmod>2023-12-08T21:18:19.292Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/cyber-security-apis.html</loc><lastmod>2023-12-08T21:22:38.17Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-user-content-management.html</loc><lastmod>2023-12-08T21:31:04.62Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/remote-work-zero-trust.html</loc><lastmod>2023-12-08T21:33:58.409Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/authentication-customer-buying-journey.html</loc><lastmod>2023-12-08T21:54:03.072Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/workforce-identity-can-ensure-digital-transformation-success.html</loc><lastmod>2023-12-28T16:17:11.769Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-optimize-user-experience-ecommerce.html</loc><lastmod>2024-03-20T18:47:24.205Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/5-authentication-experiences-drive-customers-away-cost-revenue.html</loc><lastmod>2023-12-27T17:05:27.241Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/evaluate-identity-integrations.html</loc><lastmod>2024-03-20T18:56:18.78Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/intelligent-workforce-authentication-decisions.html</loc><lastmod>2023-12-08T22:18:33.661Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/strong-performer-forrester-wave-ciam.html</loc><lastmod>2025-06-12T14:46:58.735Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-five-authentication-customers.html</loc><lastmod>2023-12-08T22:18:37.537Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/three-breaches-zero-trust-could-have-been-prevented.html</loc><lastmod>2024-01-22T19:53:26.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/securing-next-generation-workforce.html</loc><lastmod>2022-12-14T21:08:21.211Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/eight-benefits-mfa.html</loc><lastmod>2024-03-11T16:15:15.677Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-web-access-management-wam.html</loc><lastmod>2025-06-12T14:27:19.47Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ultimate-guide-token-based-authentication.html</loc><lastmod>2024-06-19T16:09:24.074Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/refresh-token-rotation-spa.html</loc><lastmod>2023-03-09T21:21:04.633Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-benefits-sso.html</loc><lastmod>2025-06-12T16:02:54.563Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/personal-identity-future-digital-interactions.html</loc><lastmod>2025-06-11T22:28:03.935Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/iam-security-overview.html</loc><lastmod>2025-06-12T14:13:27.194Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping4good-planting-trees.html</loc><lastmod>2023-11-01T22:35:18.887Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/account-takeover-ato-fraud.html</loc><lastmod>2024-01-22T20:28:56.371Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/one-time-password-ultimate-guide.html</loc><lastmod>2024-10-08T20:49:35.066Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-verification-kyc.html</loc><lastmod>2024-03-20T18:54:29.467Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/future-of-cloud-iam.html</loc><lastmod>2025-08-11T17:33:15.179Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-better-digital-experiences.html</loc><lastmod>2023-11-02T22:51:26.628Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/authentication-vs-authorization.html</loc><lastmod>2024-01-22T19:42:40.288Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/everything-need-know-online-fraud.html</loc><lastmod>2023-11-02T22:51:28.125Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ultimate-guide-authentication.html</loc><lastmod>2024-01-25T14:28:18.531Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/you-need-iam-mdm-in-todays-wfa-world.html</loc><lastmod>2025-06-11T19:06:42.913Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/mfa-ueba-zero-trust.html</loc><lastmod>2023-12-11T15:04:10.262Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-6-identity-industry-predictions-2021.html</loc><lastmod>2023-12-11T15:07:16.488Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/engage-customers-identity-verification.html</loc><lastmod>2025-06-12T15:45:26.259Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/authentication-authority-wf-ciam.html</loc><lastmod>2024-03-20T18:52:02.228Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/modernization-secure-id-mfa.html</loc><lastmod>2023-12-11T15:29:16.306Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/sso-vs-federated-identity-management.html</loc><lastmod>2025-06-11T18:55:08.415Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pingidentity-now-in-AWS-marketplace.html</loc><lastmod>2024-01-04T16:36:09.163Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/dynamic-authorization.html</loc><lastmod>2023-12-11T16:37:01.328Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/getting-started-with-zero-trust.html</loc><lastmod>2025-06-12T15:58:34.261Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/hybrid-cloud-identity-2021.html</loc><lastmod>2025-06-11T22:18:13.814Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/posts/2022.html</loc><lastmod>2022-04-18T15:32:45.984Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-best-of-breed-technology.html</loc><lastmod>2023-01-19T16:49:01.679Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pings-net-promoter-score.html</loc><lastmod>2023-04-05T14:49:28.759Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-online-fraud-monitoring.html</loc><lastmod>2024-02-19T23:40:56.304Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/prevent-account-takeover-ato-fraud-banking-financial-services.html</loc><lastmod>2024-01-25T14:09:41.014Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/encryption-vs-hashing-vs-salting.html</loc><lastmod>2024-01-25T15:34:23.315Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identification-vs-verification-vs-authentication.html</loc><lastmod>2024-01-25T14:00:21.566Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/how-big-is-the-cloud.html</loc><lastmod>2024-02-15T16:31:44.324Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/complete-guide-to-api-security.html</loc><lastmod>2024-10-08T15:34:50.125Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/beyond-passwords-for-passwordless-day.html</loc><lastmod>2023-01-19T17:14:42.554Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/counter-fraud-strategy.html</loc><lastmod>2023-01-17T23:03:35.051Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-privileged-account-management-pam.html</loc><lastmod>2024-01-25T16:06:11.238Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/3-ways-fin-serv-enterprise-architects-embrace-dynamic-auth.html</loc><lastmod>2024-06-18T16:43:19.554Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-knowledge-based-authentication-kba.html</loc><lastmod>2024-01-25T14:46:37.708Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-out-of-band-authentication-ooba.html</loc><lastmod>2024-01-25T16:14:44.066Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-principle-of-least-privilege-polp.html</loc><lastmod>2024-01-25T14:33:13.17Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-sms-authentication.html</loc><lastmod>2024-01-22T19:48:38.163Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/best-identity-and-access-management-iam-tools.html</loc><lastmod>2024-01-22T20:18:41.736Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/rbac-vs-abac.html</loc><lastmod>2023-12-19T21:29:20.37Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/insurance-industry-iam-solutions.html</loc><lastmod>2024-03-18T20:26:24.284Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/preventing-data-breaches-with-iam.html</loc><lastmod>2024-03-18T20:29:01.496Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/top-ciam-benefits-financial-services.html</loc><lastmod>2025-02-19T20:43:49.92Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-proofing-access-management-fraud-detection-convergence.html</loc><lastmod>2023-12-19T21:36:41.987Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-brute-force-attack.html</loc><lastmod>2023-09-25T15:37:52.162Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ransomware-detection-and-prevention.html</loc><lastmod>2024-02-19T23:42:20.547Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/detect-and-prevent-website-bots.html</loc><lastmod>2023-12-19T21:39:39.59Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-progressive-profiling.html</loc><lastmod>2023-01-18T00:10:50.057Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-profile-management-for-retail.html</loc><lastmod>2023-04-05T14:58:25.632Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/dynamic-authorization-role-fraud-prevention.html</loc><lastmod>2022-08-01T17:04:08.203Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-risk-management-importance.html</loc><lastmod>2023-01-18T00:17:12.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-account-creation-fraud.html</loc><lastmod>2022-10-17T17:40:24.005Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/how-ai-changes-cybersecurity.html</loc><lastmod>2023-01-04T19:17:57.94Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-microsoft-workday-digital-credential-verification-software.html</loc><lastmod>2024-03-20T18:36:09.401Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/2022-forrester-wave-ciam-leader.html</loc><lastmod>2023-12-19T22:21:33.233Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-orchestration-accelerates-passwordless-vision.html</loc><lastmod>2023-02-07T16:57:16.756Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/2022-leader-gartner-iam-magic-quadrant.html</loc><lastmod>2023-02-07T21:00:09.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/2022-kuppingercole-leadership-compass-ciam-platforms.html</loc><lastmod>2025-02-21T22:15:00.57Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/use-identity-to-give-customers-what-they-want.html</loc><lastmod>2023-02-22T17:42:04.437Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ultimate-guide-to-retail-customer-identity.html</loc><lastmod>2023-02-22T20:39:24.797Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/build-or-buy-customer-identity-solutions.html</loc><lastmod>2023-02-23T20:06:20.36Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-identity-business-case-build.html</loc><lastmod>2023-02-24T21:07:24.824Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-trends.html</loc><lastmod>2025-02-19T20:39:45.474Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-cloud-capital-one.html</loc><lastmod>2024-11-04T20:38:00.74Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/fraud-decisioning-orchestration.html</loc><lastmod>2023-03-01T22:56:42.464Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/how-fido-passkeys-accelerate-passwordless-future.html</loc><lastmod>2023-03-27T17:55:08.291Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/grow-your-enterprise-securely-in-the-metaverse.html</loc><lastmod>2023-11-01T19:03:19.994Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/modern-adaptive-authentication-mfa.html</loc><lastmod>2024-03-20T18:38:37.673Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ciam-survey-takeaways.html</loc><lastmod>2025-06-11T22:37:17.542Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/protect-financial-apis-manage-supply-chain-risk.html</loc><lastmod>2023-04-04T15:24:46.135Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/announcing-pingone-neo-decentralized-identity.html</loc><lastmod>2023-11-13T19:28:13.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/zero-trust-financial-services.html</loc><lastmod>2024-04-22T22:11:53.591Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/three-trends-identity-management-day.html</loc><lastmod>2023-06-16T20:53:57.142Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/passwordless-in-security-it-leader-self-help-guide.html</loc><lastmod>2023-07-06T18:55:12.778Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/balancing-cost-security-and-experience-with-identity-orchestration.html</loc><lastmod>2023-07-06T18:31:54.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/what-is-customer-identity-and-access-management-ciam.html</loc><lastmod>2023-10-24T15:23:24.204Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/financial-services-identity-verification.html</loc><lastmod>2023-07-05T22:59:44.174Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/flexible-iam-deployment-options.html</loc><lastmod>2023-08-18T14:54:42.478Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/workforce-identity-trifecta-southeast-asia.html</loc><lastmod>2023-08-18T20:03:19.799Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/introducing-pingone-for-customers-passwordless-solution.html</loc><lastmod>2023-09-29T15:23:53.683Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/identity-solutions-in-age-of-ai.html</loc><lastmod>2024-08-27T18:26:31.381Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-identity-and-access-management-ciam-evolution.html</loc><lastmod>2025-02-19T20:35:59.739Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/mfa-bombing-dismantled.html</loc><lastmod>2023-11-09T19:13:50.665Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-google-chrome-enterprise.html</loc><lastmod>2023-11-10T23:35:34.448Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-privacy-and-consent-best-practices.html</loc><lastmod>2023-10-23T18:29:03.057Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/customer-security-privacy-consent.html</loc><lastmod>2023-10-23T15:01:24.044Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/five-elements-threat-protection.html</loc><lastmod>2023-12-01T17:05:33.356Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-achieves-fapi2-certification.html</loc><lastmod>2023-10-23T23:19:27.959Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/blockchain-sidechains-decentraized-identity.html</loc><lastmod>2024-03-20T19:08:49.637Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/making-most-of-cloud-In-financial-services.html</loc><lastmod>2025-06-26T15:52:31.458Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/continuous-adaptive-trust-final-frontier.html</loc><lastmod>2023-10-30T18:32:30.484Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/introducing-voice-verification.html</loc><lastmod>2023-10-31T16:10:11.212Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ecommerce-fraud-detection.html</loc><lastmod>2025-06-30T13:03:21.164Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-cloud-acceleration-toolset.html</loc><lastmod>2024-06-14T22:49:56.021Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/shared-finance-empower-customers-identity-authorization.html</loc><lastmod>2023-12-01T20:19:52.071Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-leader-gartner-magic-quadrant-access-management.html</loc><lastmod>2023-12-14T16:14:42.657Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/five-steps-operationalize-pingcentral.html</loc><lastmod>2024-08-27T15:52:30.229Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-identity-leader-gartner-critical-capabilities-access-management-2023.html</loc><lastmod>2025-02-21T23:33:09.675Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ping-youniverse-global-2023-recap.html</loc><lastmod>2024-01-17T17:31:49.071Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/digital-identity-financial-services.html</loc><lastmod>2024-05-07T14:06:51.484Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/pekin-insurance-delivers-security.html</loc><lastmod>2024-08-29T14:26:07.165Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/financial-services-ciam-strategy.html</loc><lastmod>2025-09-26T18:26:09.72Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/post/ecommerce-holiday-rush-preparation.html</loc><lastmod>2025-07-01T21:03:28.794Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mark-dorey/page/1.html</loc><lastmod>2023-01-28T01:03:49.102Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/chris-price/page/1.html</loc><lastmod>2023-01-30T16:04:33.594Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/anthony-dombrowski/page/1.html</loc><lastmod>2023-11-15T21:48:51.15Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/craig-solberg/page/1.html</loc><lastmod>2024-06-26T16:28:16.025Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/emily-mucklow/page/1.html</loc><lastmod>2023-01-30T15:39:12.754Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/rob-greenman/page/1.html</loc><lastmod>2023-01-13T19:12:44.005Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/philip-coldrey/page/1.html</loc><lastmod>2023-01-28T00:44:26.643Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/bryan-rosensteel/page/1.html</loc><lastmod>2023-01-30T16:10:37.234Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jeremy-carrier/page/1.html</loc><lastmod>2023-01-28T01:18:49.279Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/thomas-schneider/page/1.html</loc><lastmod>2023-11-14T22:22:23.273Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/aaron-hughes/page/1.html</loc><lastmod>2023-01-24T17:39:12.435Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ido-amitay/page/1.html</loc><lastmod>2023-01-30T15:32:56.008Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/vikas-mundada-and-michael-sanchez/page/1.html</loc><lastmod>2025-09-17T21:51:23.844Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/arthur-loris/page/1.html</loc><lastmod>2023-01-30T16:16:53.211Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/matthew-mcnulty/page/1.html</loc><lastmod>2023-11-15T00:31:24.689Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/moshe-ben-noun/page/1.html</loc><lastmod>2023-01-19T22:47:26.845Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/wesley-dunnington/page/1.html</loc><lastmod>2023-02-17T23:28:15.317Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/shannon-lightfoot/page/1.html</loc><lastmod>2023-02-03T19:21:14.343Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jason-kees/page/1.html</loc><lastmod>2023-11-15T18:57:58.452Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/itai-zach/page/1.html</loc><lastmod>2023-01-28T01:30:30.964Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/pratibha-srikanta/page/1.html</loc><lastmod>2023-02-02T16:53:46.439Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ashley-diffey/page/1.html</loc><lastmod>2023-01-30T16:15:49.532Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andrew-goodman/page/1.html</loc><lastmod>2023-01-12T18:51:47.987Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andrew-morales/page/1.html</loc><lastmod>2023-01-30T16:47:03.951Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/anthony-heninger/page/1.html</loc><lastmod>2023-01-30T16:18:33.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/baber-amin/page/1.html</loc><lastmod>2023-01-12T18:44:11.789Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/bjorn-aannestad/page/1.html</loc><lastmod>2023-01-30T16:13:51.467Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/brian-campbell/page/1.html</loc><lastmod>2023-01-30T16:36:58.457Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/cayla-curtis/page/1.html</loc><lastmod>2024-08-20T15:27:51.678Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/curtis-muir/page/1.html</loc><lastmod>2023-01-30T15:51:59.086Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/cyril-patou/page/1.html</loc><lastmod>2023-01-12T18:44:43.92Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/darell-machado/page/1.html</loc><lastmod>2024-08-16T19:38:33.458Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/david-waite/page/1.html</loc><lastmod>2023-01-30T15:44:26.852Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/derick-james/page/1.html</loc><lastmod>2023-01-24T17:47:22.169Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/derick-townsend/page/1.html</loc><lastmod>2023-01-24T17:48:04.367Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/donna-shawhan/page/1.html</loc><lastmod>2023-01-24T17:51:10.749Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/dustin-maxey/page/1.html</loc><lastmod>2024-08-16T18:19:00.105Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/federico-carbone/page/1.html</loc><lastmod>2023-01-30T15:35:26.947Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/guoping-liu/page/1.html</loc><lastmod>2023-01-24T20:41:17.464Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jason-evans/page/1.html</loc><lastmod>2023-01-28T01:26:37.06Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jason-oeltjen/page/1.html</loc><lastmod>2023-01-28T01:23:16.683Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/kevin-sellers/page/1.html</loc><lastmod>2023-01-28T01:14:07.383Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/loren-russon/page/1.html</loc><lastmod>2023-01-28T01:10:42.57Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/marco-delas/page/1.html</loc><lastmod>2023-01-28T01:05:56.184Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mark-perry/page/1.html</loc><lastmod>2023-01-12T18:49:27.326Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/michael-sanchez/page/1.html</loc><lastmod>2023-01-13T19:02:37.412Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/michelle-jenkins/page/1.html</loc><lastmod>2023-11-15T00:27:29.676Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/natalie-blake/page/1.html</loc><lastmod>2023-01-13T19:08:12.381Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/natalie-woodard/page/1.html</loc><lastmod>2023-01-28T00:54:28.973Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/or-hay/page/1.html</loc><lastmod>2023-01-27T16:23:10.473Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/oren-sternheim/page/1.html</loc><lastmod>2023-01-28T00:50:37.51Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/patrick-harding/page/1.html</loc><lastmod>2023-01-28T00:49:15.689Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/paul-van-der-lee/page/1.html</loc><lastmod>2023-01-28T00:47:36.802Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/rob-otto/page/1.html</loc><lastmod>2023-01-28T00:36:16.703Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ryan-kogelheide/page/1.html</loc><lastmod>2023-01-28T00:32:19.115Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/saira-guthrie/page/1.html</loc><lastmod>2023-01-13T19:16:34.53Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jeremie-miller/page/1.html</loc><lastmod>2023-01-28T01:20:17.67Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/john-dasilva/page/1.html</loc><lastmod>2023-02-21T15:06:37.672Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/sascha-preibisch/page/1.html</loc><lastmod>2023-01-28T00:29:39.741Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/scott-tomilson/page/1.html</loc><lastmod>2023-02-03T19:16:38.299Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/tarun-madiraju/page/1.html</loc><lastmod>2023-01-28T00:18:26.213Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/yariv-levavi/page/1.html</loc><lastmod>2023-01-27T23:54:15.459Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/diana-jouard/page/1.html</loc><lastmod>2023-02-03T17:23:32.854Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/bernard-harguindeguy/page/1.html</loc><lastmod>2023-01-12T18:54:28.367Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/zain-malik/page/1.html</loc><lastmod>2023-01-13T00:33:19.601Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/nicole-alrubaiy/page/1.html</loc><lastmod>2023-01-13T00:18:20.961Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andre-durand/page/1.html</loc><lastmod>2023-01-12T18:51:20.576Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/matt-pollicove/page/1.html</loc><lastmod>2023-01-12T22:43:15.479Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/joe-malenfant/page/1.html</loc><lastmod>2023-11-15T00:45:45.044Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/maya-ogranovitch-scott/page/1.html</loc><lastmod>2024-12-13T19:08:20.669Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/andrew-hughes/page/1.html</loc><lastmod>2023-11-15T22:19:18.389Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mehmet-yaliman/page/1.html</loc><lastmod>2023-01-12T22:49:36.399Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/richard-bird/page/1.html</loc><lastmod>2023-02-03T19:44:59.606Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/emily-mckeown/page/1.html</loc><lastmod>2023-01-12T18:47:17.614Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/edward-killeen/page/1.html</loc><lastmod>2023-02-03T17:36:17.011Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jordan-griffith/page/1.html</loc><lastmod>2023-11-15T00:40:05.097Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/philippe-de-ryck/page/1.html</loc><lastmod>2023-02-03T19:38:50.433Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/yev-koup/page/1.html</loc><lastmod>2023-11-14T19:37:13.354Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/steve-dillon/page/1.html</loc><lastmod>2023-01-28T00:16:54.226Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/matt-bates/page/1.html</loc><lastmod>2023-01-12T19:21:39.025Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/alasdair-rambaud/page/1.html</loc><lastmod>2023-01-12T18:50:27.462Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/samuel-brown/page/1.html</loc><lastmod>2023-11-15T00:22:47.92Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/stacy-gardner/page/1.html</loc><lastmod>2023-11-14T22:31:25.177Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/robert-broeckelmann/page/1.html</loc><lastmod>2023-01-13T00:26:07.546Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/armin-ebrahimi/page/1.html</loc><lastmod>2023-02-17T22:16:09.501Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/aubrey-turner/page/1.html</loc><lastmod>2023-11-15T19:33:29.884Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/divya-handa/page/1.html</loc><lastmod>2023-12-01T01:45:07.115Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/adam-rusbridge/page/1.html</loc><lastmod>2024-08-20T18:50:14.812Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/laurent-szpirglas/page/1.html</loc><lastmod>2023-11-15T00:35:58.595Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/joseph-dhanapal/page/1.html</loc><lastmod>2023-01-12T19:20:44.423Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/george-lattimore/page/1.html</loc><lastmod>2023-02-03T17:40:16.243Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/mindy-servello/page/1.html</loc><lastmod>2023-01-13T00:17:19.129Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/aviad-maroodi/page/1.html</loc><lastmod>2023-11-16T15:35:44.154Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/ran-wasserman/page/1.html</loc><lastmod>2023-02-03T18:57:53.002Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/branden-williams/page/1.html</loc><lastmod>2023-02-03T17:15:41.389Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/jens-keuter/page/1.html</loc><lastmod>2023-11-15T17:59:24.362Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/arnaud-gallut/page/1.html</loc><lastmod>2023-01-13T15:00:20.589Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/alain-barbier/page/1.html</loc><lastmod>2023-01-19T16:07:27.213Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/herb-goodfellow/page/1.html</loc><lastmod>2023-03-24T21:18:23.802Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/max-fathauer-and-herb-goodfellow/page/1.html</loc><lastmod>2025-09-17T21:51:23.842Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/louise-watson/page/1.html</loc><lastmod>2024-05-23T21:08:50.113Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/christina-tubb/page/1.html</loc><lastmod>2023-08-18T20:03:18.376Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/gaurav-khot/page/1.html</loc><lastmod>2023-10-24T16:49:34.157Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/max-fathauer/page/1.html</loc><lastmod>2024-08-21T21:28:03.865Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/darrell-geusz/page/1.html</loc><lastmod>2023-11-13T19:27:18.153Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/adam-preis/page/1.html</loc><lastmod>2024-05-06T19:22:11.97Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/nicole-roseveare/page/1.html</loc><lastmod>2024-08-12T17:25:55.311Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/author/anish-srivastava/page/1.html</loc><lastmod>2024-09-20T18:50:11.191Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/downloads.html</loc><lastmod>2023-12-14T16:06:09.851Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals.html</loc><lastmod>2024-01-02T17:24:07.486Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-orchestration.html</loc><lastmod>2025-07-08T19:12:15.883Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-and-access-management.html</loc><lastmod>2025-07-08T18:36:12.328Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-and-access-management/identity-providers-service-providers.html</loc><lastmod>2023-05-03T20:30:25.54Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/identity-and-access-management/centralized-decentralized-identity-management.html</loc><lastmod>2022-09-21T18:58:40.248Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/zero-trust-security.html</loc><lastmod>2024-01-02T18:26:01.517Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication.html</loc><lastmod>2023-05-03T20:36:48.832Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/single-factor-two-factor-multi-factor-authentication.html</loc><lastmod>2023-05-03T20:39:22.161Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/passwordless-authentication.html</loc><lastmod>2023-07-17T21:42:44.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/passwordless-authentication/fido.html</loc><lastmod>2025-02-25T14:28:48.745Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/risk-based-authentication.html</loc><lastmod>2023-05-03T21:08:50.273Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/certificate-authentication.html</loc><lastmod>2022-09-28T16:41:52.979Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/token-based-authentication.html</loc><lastmod>2023-05-03T21:19:52.366Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/single-sign-on.html</loc><lastmod>2023-05-03T21:21:42.805Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/federated-identity-management.html</loc><lastmod>2023-05-03T21:25:42.629Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/chap-authentication.html</loc><lastmod>2023-03-27T17:51:35.565Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication/continuous-authentication.html</loc><lastmod>2023-05-03T21:30:29.84Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization.html</loc><lastmod>2023-05-03T21:30:28.342Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/authorization-methods.html</loc><lastmod>2023-12-19T22:38:47.669Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/user-account-provisioning.html</loc><lastmod>2022-10-04T16:12:55.985Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/sso-directory.html</loc><lastmod>2023-05-03T21:41:40.769Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authorization/dynamic-authorization.html</loc><lastmod>2023-12-19T22:37:23.343Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards.html</loc><lastmod>2022-10-04T16:12:57.2Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards/saml.html</loc><lastmod>2023-05-03T20:04:32.251Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards/oauth.html</loc><lastmod>2023-05-03T19:42:02.993Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-standards/openid-connect.html</loc><lastmod>2023-05-03T19:01:21.03Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols.html</loc><lastmod>2023-01-10T20:19:57.575Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/ldap.html</loc><lastmod>2023-05-03T17:41:30.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/scim.html</loc><lastmod>2023-05-03T16:40:03.05Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/webauthn.html</loc><lastmod>2023-05-03T15:08:11.544Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/kerberos.html</loc><lastmod>2023-05-04T17:11:21.723Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/authentication-authorization-protocols/ws-trust.html</loc><lastmod>2024-10-29T14:49:37.904Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/b2b-identity.html</loc><lastmod>2025-07-01T20:48:33.191Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/agentic-ai.html</loc><lastmod>2025-07-15T21:34:56.646Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management.html</loc><lastmod>2025-07-16T16:40:02.404Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/what-is-centralized-identity-management.html</loc><lastmod>2025-07-16T16:51:24.576Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/how-does-centralized-identity-management-work.html</loc><lastmod>2025-07-16T16:51:24.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards.html</loc><lastmod>2025-07-16T16:51:23.985Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards/oauth.html</loc><lastmod>2025-07-17T19:02:54.705Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards/saml.html</loc><lastmod>2025-07-17T19:02:55.637Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library.html</loc><lastmod>2023-06-27T18:53:48.435Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/analyst-reports/3547-critical-capabilities-access-management-ciam.html</loc><lastmod>2023-04-10T14:24:44.264Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/analyst-reports/3548-critical-capabilities-access-management-wf.html</loc><lastmod>2023-04-10T14:25:01.52Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/analyst-reports/3697-kuppingercole-leadership-compass-verified-identity.html</loc><lastmod>2023-01-18T19:19:41.281Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/analyst-reports/3710-kuppcole-reusable-verified-identity.html</loc><lastmod>2023-05-11T21:13:39.014Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/analyst-reports/3745-kuppingercole-leadership-compass-access-management.html</loc><lastmod>2023-09-20T23:14:09.912Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/analyst-reports/4003-kuppingercole-policy-based-access-management.html</loc><lastmod>2024-05-01T22:49:13.42Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/oauth.html</loc><lastmod>2022-04-18T15:32:47.481Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/openid-connect.html</loc><lastmod>2022-06-07T18:23:48.935Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/cloud-containerization.html</loc><lastmod>2023-12-19T23:01:11.391Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/saml.html</loc><lastmod>2022-06-08T19:34:26.825Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/digital-transformation.html</loc><lastmod>2024-03-21T19:10:09.126Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/articles/identity-as-a-service-idaas.html</loc><lastmod>2023-12-19T22:50:57.933Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3012-pingaccess-data-sheet.html</loc><lastmod>2023-03-29T16:05:11.637Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3013-pingfederate-fiche-produits.html</loc><lastmod>2023-03-29T16:04:47.442Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3027-pingid-technical-brief.html</loc><lastmod>2023-03-29T16:03:47.157Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3503-pingone-workforce.html</loc><lastmod>2023-03-29T15:51:52.545Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3196-pingdirectory-fiche-produits.html</loc><lastmod>2023-03-29T16:03:19.26Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3197-pingdatasync-fiche-produits.html</loc><lastmod>2023-03-29T16:02:38.537Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3427-pingone-advanced-services-datasheet.html</loc><lastmod>2023-03-29T15:59:07.476Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3455-pingcentral.html</loc><lastmod>2023-03-29T15:52:21.639Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3511-adaptive-access-security.html</loc><lastmod>2023-03-13T18:16:49.34Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3512-pingone-customers.html</loc><lastmod>2023-03-29T15:50:43.712Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3527-pingone-mfa.html</loc><lastmod>2023-03-29T15:50:16.685Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3553-pingone-verify.html</loc><lastmod>2023-12-07T18:37:04.306Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3014-pingid-datasheet.html</loc><lastmod>2023-03-29T16:04:17.156Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3608-pingone-authorize.html</loc><lastmod>2023-03-29T15:48:55.442Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3611-pingone-davinci.html</loc><lastmod>2023-04-13T16:40:08.665Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3714-pingone-credentials.html</loc><lastmod>2023-04-24T18:17:19.587Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3718-pingone-protect.html</loc><lastmod>2023-06-27T18:33:22.707Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3732-pingone-customer-passwordless.html</loc><lastmod>2023-09-13T21:52:25.95Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/data-sheets/3742-pingintelligence-apis.html</loc><lastmod>2023-11-17T19:38:35.003Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/demos.html</loc><lastmod>2022-04-18T15:32:49.999Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/demos/pingcentral-demo.html</loc><lastmod>2023-04-10T14:27:06.91Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks.html</loc><lastmod>2022-04-18T15:32:50.088Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3136-enterprise-cloud-iam.html</loc><lastmod>2023-03-29T16:47:41.171Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3377-essential-guide-single-sign-on.html</loc><lastmod>2023-04-27T17:28:23.318Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3055-security-by-design.html</loc><lastmod>2023-04-10T14:27:21.859Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3050-cios-guide-modern-identity.html</loc><lastmod>2022-04-18T15:32:50.219Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3709-passwordless-paradox.html</loc><lastmod>2023-10-04T22:30:02.283Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3727-customer-experience-key-to-success-financial-services.html</loc><lastmod>2023-09-13T21:36:26.749Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3740-state-of-identity-2023.html</loc><lastmod>2023-10-25T16:55:37.961Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/ebooks/3752-key-trends-customer-experience-2024.html</loc><lastmod>2024-01-02T15:14:47.835Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/executive-briefs.html</loc><lastmod>2022-04-18T15:32:50.95Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/executive-briefs/3162-top-3-cmo-challenges.html</loc><lastmod>2023-03-29T16:47:09.24Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/executive-briefs/3164-balance-personalization-and-privacy.html</loc><lastmod>2023-03-29T16:23:54.369Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/executive-briefs/3684-ultimate-guide-ciam-executive-summary.html</loc><lastmod>2023-04-13T16:44:57.13Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3150-ultimate-guide-to-mfa.html</loc><lastmod>2023-04-10T14:37:07.536Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3210-security-leaders-guide-to-access-security.html</loc><lastmod>2023-04-10T14:38:33.001Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3218-security-leaders-guide-to-mfa.html</loc><lastmod>2024-03-21T19:00:06.983Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3243-security-leaders-guide-zero-trust-model.html</loc><lastmod>2024-03-21T19:01:37.565Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3406-it-directors-guide-mfa.html</loc><lastmod>2023-04-10T14:39:08.264Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3413-psd2-open-banking-technical-solution-guide.html</loc><lastmod>2023-03-29T16:23:25.997Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3474-pingdatagovernance.html</loc><lastmod>2023-03-29T16:22:58.076Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/ultimate-guide-web-mobile-api-access.html</loc><lastmod>2023-04-10T14:30:57.343Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3573-speed-up-ciam-administration.html</loc><lastmod>2023-03-29T16:21:47.029Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3624-ultimate-guide-to-online-fraud-prevention.html</loc><lastmod>2022-11-02T13:59:32.636Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3555-customer-identity-buyers-guide.html</loc><lastmod>2023-07-13T15:58:29.709Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3632-ultimate-guide-to-orchestration.html</loc><lastmod>2023-03-29T16:21:19.799Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3576-cloud-identity-buyers-guide.html</loc><lastmod>2023-02-02T21:09:58.419Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3687-passwordless-journey.html</loc><lastmod>2023-04-05T15:53:09.535Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3708-improving-customer-experiences-identity-best-practices.html</loc><lastmod>2023-09-26T18:13:08.671Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/ultimate-guide-to-ciam.html</loc><lastmod>2023-06-05T14:37:33.73Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3706-customer-identity-buyers-guide-retailers.html</loc><lastmod>2023-06-14T17:31:21.554Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3725-how-identity-impacts-business.html</loc><lastmod>2023-08-04T14:42:16.604Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3209-security-leaders-guide-to-SSO.html</loc><lastmod>2023-09-19T23:22:41.156Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3737-security-leaders-guide-user-protection.html</loc><lastmod>2023-09-28T21:22:27.726Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/guides/3140-mfa-buyers-guide.html</loc><lastmod>2024-04-12T21:49:42.348Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/infographics/3567-identity-verification-whos-really-there.html</loc><lastmod>2023-03-29T16:20:41.733Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/infographics/3586-optimize-zero-trust-infrastructure.html</loc><lastmod>2023-03-29T16:19:19.624Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/infographics/3577-fight-fraud-dynamic-authorization.html</loc><lastmod>2023-03-29T16:19:46.655Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/infographics/3598-2021-consumer-survey-earn-your-brand-identity-badges.html</loc><lastmod>2023-03-29T16:18:42.565Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/infographics/3631-data-breaches-and-fraud-impact-brand-experience.html</loc><lastmod>2023-04-05T15:53:09.622Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/infographics/3634-customers-add-risk-signals-to-pingid.html</loc><lastmod>2023-04-10T19:08:03.368Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/ping-identity-corp-overview.html</loc><lastmod>2022-04-18T15:32:51.858Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/3496-pingone-advanced-services-simplifies-iam.html</loc><lastmod>2023-03-29T16:15:47.926Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/3568-survey-remote-work-fuels-zero-trust.html</loc><lastmod>2023-03-29T16:14:57.135Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/3698-2022-consumer-survey.html</loc><lastmod>2025-06-27T19:21:50.583Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/3678-ciam-solutions-evaluation-criteria.html</loc><lastmod>2023-03-29T16:14:16.518Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/3011-ping-corporate-brochure.html</loc><lastmod>2023-08-10T23:56:19.377Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/misc/3743-2023-consumer-survey-brand-loyalty-digital-economy.html</loc><lastmod>2023-11-13T17:17:57.442Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/3408-five-steps-zero-trust-access.html</loc><lastmod>2023-03-29T16:17:12.316Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/8-identity-things-c-suite-should-know-3336.html</loc><lastmod>2023-02-15T19:30:07.997Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/3391-top-12-api-security.html</loc><lastmod>2023-03-29T16:18:00.525Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/5-ways-to-boost-security.html</loc><lastmod>2022-06-06T18:54:52.742Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/5-ways-to-boost-productivity.html</loc><lastmod>2022-06-06T18:54:52.742Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/5-ways-to-boost-agility.html</loc><lastmod>2022-06-06T18:54:52.741Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/lists/5-ways-wfh-secure-productive.html</loc><lastmod>2022-07-20T19:16:57.577Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/technical-briefs/3590-pingone-customers.html</loc><lastmod>2023-08-08T20:52:39.542Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/technical-briefs/3591-pingone-workforce.html</loc><lastmod>2023-08-08T20:52:43.869Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/technical-briefs/3731-pingone-customers-passwordless.html</loc><lastmod>2023-08-23T22:41:48.618Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs.html</loc><lastmod>2022-04-18T15:32:54.009Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3023-employee-solution-brief.html</loc><lastmod>2023-03-27T16:14:26.075Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3025-partner-solution-brief.html</loc><lastmod>2023-03-29T16:52:27.963Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3026-identity-defined-security.html</loc><lastmod>2023-03-29T16:58:19.76Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3144-ciam-solution-brief.html</loc><lastmod>2023-03-29T16:58:56.812Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3256-gdpr-solutionbrief.html</loc><lastmod>2023-03-29T16:59:33.882Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3264-psd2-open-banking-compliance-competitive-edge.html</loc><lastmod>2023-03-29T17:00:44.822Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3304-iam-solutions-for-financial-services.html</loc><lastmod>2023-07-12T16:35:13.317Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3361-ping-sailpoint-comprehensive-access.html</loc><lastmod>2023-03-29T17:01:54.685Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3713-pingone-neo.html</loc><lastmod>2023-04-24T18:17:06.238Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/identity-access-management-retail-3320.html</loc><lastmod>2023-06-07T16:16:28.967Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3724-pingone-cloud-platform-deployment-options.html</loc><lastmod>2023-07-18T21:29:22.321Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3633-migrate-pingone-advanced-services.html</loc><lastmod>2023-08-04T14:45:57.061Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/solution-briefs/3622-Identity-orchestration.html</loc><lastmod>2023-08-04T22:15:09.31Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/videos/3499-deliver-great-customer-experiences.html</loc><lastmod>2022-04-18T15:32:54.312Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/videos/pingcentral.html</loc><lastmod>2022-04-18T15:32:54.346Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/videos/3221-identity-defined-security-with-the-ping-identity-platform.html</loc><lastmod>2022-04-18T15:32:54.379Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/webinars/pingone-risk-management-ai.html</loc><lastmod>2022-04-18T15:32:54.552Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/webinars/sailpoint-roi-iam.html</loc><lastmod>2022-04-18T15:32:54.773Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/webinars/ping-identity-sailpoint.html</loc><lastmod>2022-04-18T15:32:54.808Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers.html</loc><lastmod>2022-04-18T15:32:54.871Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3042-saml-101.html</loc><lastmod>2023-03-29T17:03:37.545Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3119-oauth-primer.html</loc><lastmod>2023-04-10T14:46:49.128Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3141-connect-apps-to-azure-ad-with-pingaccess.html</loc><lastmod>2023-03-29T17:05:07.097Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3200-business-drivers-of-user-managed-consent.html</loc><lastmod>2023-04-10T14:46:58.046Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3257-gdpr-opportunities-building-customer-trust-loyalty.html</loc><lastmod>2023-04-10T14:47:12.943Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3299-unified-approach-to-delivering-exceptional-customer-experiences.html</loc><lastmod>2023-04-10T14:47:21.98Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3319-iam-solutions-for-retail.html</loc><lastmod>2023-03-29T17:06:07.224Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3352-evolving-api-security-landscape.html</loc><lastmod>2023-04-10T14:47:31.112Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3379-national-identity-cybersecurity.html</loc><lastmod>2022-04-18T15:32:55.332Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3415-architects-guide-cloud-iam.html</loc><lastmod>2023-04-10T14:48:07.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3429-strengthen-your-api-security.html</loc><lastmod>2022-08-18T00:31:07.965Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3442-workforce-authentication-authority.html</loc><lastmod>2023-04-10T14:50:38.649Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3444-securing-customer-identity-data.html</loc><lastmod>2023-03-29T17:09:57.609Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3448-strengthen-financial-api-security.html</loc><lastmod>2023-04-10T14:50:46.876Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3502-adaptive-access-security.html</loc><lastmod>2023-04-10T14:51:12.975Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3571-protect-sensitive-data-dynamic-authorization.html</loc><lastmod>2023-03-29T17:13:29.888Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3601-behavioral-data-key-unlock-better-fraud-prevention.html</loc><lastmod>2023-03-29T17:14:22.658Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3127-openid-connect-101.html</loc><lastmod>2023-03-29T17:04:17.188Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3626-retail-fraud.html</loc><lastmod>2023-03-29T17:15:23.8Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3001-mfa-best-practices-for-modern-digital-enterprise.html</loc><lastmod>2023-04-10T14:46:39.796Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3481-intelligent-identity.html</loc><lastmod>2023-04-10T14:51:08.058Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3452-ramp-up-security-productivity.html</loc><lastmod>2023-04-10T14:50:53.905Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3500-pingone-workforce-integrations-guide.html</loc><lastmod>2024-03-21T18:47:51.914Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3253-multi-factor-authentication-customers.html</loc><lastmod>2022-11-23T19:25:26.813Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3621-authentication-authority-pingfederate.html</loc><lastmod>2023-01-19T20:14:22.388Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3620-api-security-and-governance.html</loc><lastmod>2023-03-08T15:16:51.829Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3680-delivering-better-user-experiences-identity-orchestration.html</loc><lastmod>2023-03-06T20:16:28.292Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3498-customer-authentication-authority.html</loc><lastmod>2023-03-07T15:59:44.613Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3480-passwordless-authentication.html</loc><lastmod>2025-02-21T19:27:11.729Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3730-kuppingercole-delivering-business-value-through-orchestration.html</loc><lastmod>2023-09-21T01:03:13.185Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/content-library/white-papers/3739-journey-to-zero-trust.html</loc><lastmod>2023-12-04T16:51:31.667Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals.html</loc><lastmod>2022-07-28T18:09:11.635Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats.html</loc><lastmod>2022-12-21T19:51:30.349Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/clickjacking.html</loc><lastmod>2022-08-03T12:11:10.729Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/cross-site-scripting.html</loc><lastmod>2023-02-06T16:15:19.173Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/internet-of-things-attack.html</loc><lastmod>2022-08-05T16:50:36.048Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/botnet-attack.html</loc><lastmod>2023-01-04T17:51:38.083Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/credential-stuffing.html</loc><lastmod>2023-01-04T19:30:58.65Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/spearphishing.html</loc><lastmod>2022-08-31T19:11:37.771Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/ransomware-as-a-service-raas.html</loc><lastmod>2024-01-17T15:44:45.221Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/buffer-overflow-attack.html</loc><lastmod>2022-10-27T14:34:03.847Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/distributed-denial-of-service-ddos-attack.html</loc><lastmod>2022-10-26T14:43:24.079Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/rootkit.html</loc><lastmod>2023-12-19T22:40:50.106Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/sql-injection.html</loc><lastmod>2024-01-17T15:48:06.291Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/keylogger.html</loc><lastmod>2024-01-17T16:14:29.686Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/man-in-the-middle-attack.html</loc><lastmod>2023-02-16T19:49:04.329Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/threats/zero-day-exploit.html</loc><lastmod>2023-02-16T19:49:04.495Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk.html</loc><lastmod>2024-01-17T15:32:03.237Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk/fraudulent-device-detection.html</loc><lastmod>2024-01-17T15:35:09.709Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/detect-risk/soar.html</loc><lastmod>2022-08-31T19:12:38.482Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/cybersecurity-fundamentals/mitigate-risk.html</loc><lastmod>2024-01-17T15:33:28.693Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM.html</loc><lastmod>2022-03-24T14:12:13.822Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM/chapter-1.html</loc><lastmod>2022-03-24T14:12:14.259Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM/chapter-2.html</loc><lastmod>2022-03-24T14:12:14.802Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM/chapter-3.html</loc><lastmod>2022-03-24T14:12:17.35Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM/chapter-4.html</loc><lastmod>2022-03-24T14:12:17.798Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM/chapter-5.html</loc><lastmod>2022-03-24T14:12:18.233Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/gestion-moderne-des-acces-et-des-identites-IAM/chapter-6.html</loc><lastmod>2022-03-24T14:12:18.655Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/ultimate-guide-mfa/benefits-of-adaptive-mfa.html</loc><lastmod>2022-05-13T21:16:43.333Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/ultimate-guide-mfa/use-cases-for-adaptive-mfa.html</loc><lastmod>2022-05-13T21:25:32.111Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/ultimate-guide-mfa/how-adaptive-mfa-works.html</loc><lastmod>2022-05-16T16:41:40.302Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ultimate-guides/ultimate-guide-mfa/conclusion.html</loc><lastmod>2022-05-18T18:09:21.178Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/search-results.html</loc><lastmod>2022-03-24T14:17:07.344Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/ty.html</loc><lastmod>2022-01-28T16:28:35.306Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability.html</loc><lastmod>2025-09-26T18:26:09.72Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/authentication-authority.html</loc><lastmod>2025-05-06T19:06:00.186Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/directory.html</loc><lastmod>2025-05-23T20:28:01.3Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-verification.html</loc><lastmod>2025-05-06T19:06:02.357Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/multi-factor-authentication.html</loc><lastmod>2025-07-18T19:42:16.739Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-orchestration.html</loc><lastmod>2025-05-06T19:06:04.133Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/personal-identity.html</loc><lastmod>2025-06-12T14:04:06.325Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/single-sign-on.html</loc><lastmod>2025-05-06T19:06:05.621Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/administration.html</loc><lastmod>2025-05-06T19:06:06.581Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-federation-hub.html</loc><lastmod>2025-05-06T19:06:07.055Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/pingone-credentials.html</loc><lastmod>2025-05-06T19:06:07.73Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/threat-protection.html</loc><lastmod>2025-06-27T18:18:57.356Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/authorization.html</loc><lastmod>2025-05-06T19:06:09.159Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-management.html</loc><lastmod>2025-05-06T19:06:10.106Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-governance.html</loc><lastmod>2025-06-25T20:18:32.606Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/identity-cloud-security.html</loc><lastmod>2025-05-06T19:06:11.092Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/ai.html</loc><lastmod>2025-06-27T18:37:20.183Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/edge-security.html</loc><lastmod>2025-05-06T19:06:12.61Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/verifiable-credentials.html</loc><lastmod>2025-05-06T19:06:12.921Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/lifecycle-management.html</loc><lastmod>2025-05-06T19:06:14.574Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/capability/jit-privileged-access.html</loc><lastmod>2025-10-01T15:43:26.847Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry.html</loc><lastmod>2025-05-06T19:06:14.844Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/financial-services.html</loc><lastmod>2025-09-15T20:44:03.288Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/healthcare.html</loc><lastmod>2025-05-06T19:06:16.323Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/manufacturing.html</loc><lastmod>2025-09-18T14:25:23.869Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/retail.html</loc><lastmod>2025-05-06T19:06:19.299Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/media-telco.html</loc><lastmod>2025-05-06T19:06:20.719Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/automotive.html</loc><lastmod>2025-05-06T19:06:21.879Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/industry/insurance.html</loc><lastmod>2025-05-06T19:06:23.29Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-authorize.html</loc><lastmod>2025-05-06T19:06:24.114Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-mfa.html</loc><lastmod>2025-05-06T19:06:25.006Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-davinci.html</loc><lastmod>2025-09-17T21:32:02.961Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-verify.html</loc><lastmod>2025-09-26T18:26:09.722Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingauthorize.html</loc><lastmod>2025-05-06T19:06:27.659Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingaccess.html</loc><lastmod>2025-05-06T19:06:28.706Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pinggateway.html</loc><lastmod>2025-05-06T19:06:29.67Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pinggateway/capability.html</loc><lastmod>2025-05-06T19:06:30.247Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingcentral.html</loc><lastmod>2025-05-06T19:06:30.493Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingfederate.html</loc><lastmod>2025-05-06T19:06:31.249Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingid.html</loc><lastmod>2025-05-06T19:06:32.076Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-protect.html</loc><lastmod>2025-05-06T19:06:32.936Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingdirectory.html</loc><lastmod>2025-05-06T19:06:33.98Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/product/pingone-credentials.html</loc><lastmod>2025-05-06T19:06:34.866Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution.html</loc><lastmod>2025-09-03T15:26:12.616Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/open-banking.html</loc><lastmod>2025-05-06T19:06:36.715Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/open-banking/psd2-open-banking.html</loc><lastmod>2025-05-06T19:06:36.962Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/mergers-acquisitions.html</loc><lastmod>2025-05-06T19:06:37.484Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/engage-your-customers.html</loc><lastmod>2025-05-06T19:06:38.111Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/prevent-online-fraud.html</loc><lastmod>2025-06-26T15:44:19.634Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/drive-compliance.html</loc><lastmod>2025-06-12T15:56:50.015Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/passwordless.html</loc><lastmod>2025-08-29T14:53:06.251Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/innovate-digital-experiences.html</loc><lastmod>2025-06-26T15:27:53.108Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/iam-modernization.html</loc><lastmod>2025-05-06T19:06:42.196Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/privacy-consent.html</loc><lastmod>2025-05-06T19:06:42.986Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/zero-trust.html</loc><lastmod>2025-06-12T15:30:34.749Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/iot.html</loc><lastmod>2025-05-06T19:06:44.841Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/workforce-identity.html</loc><lastmod>2025-08-27T23:14:49.66Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/b2b-identity.html</loc><lastmod>2025-08-27T23:21:01.827Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/cloud-identity.html</loc><lastmod>2025-06-11T22:07:53.491Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/solution/agentic-ai-identity.html</loc><lastmod>2025-09-12T15:33:20.747Z</lastmod></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/mfa/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/identity-101/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/ping-news/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/developers/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/customer-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/events/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/iam-modernization/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/passwordless/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/products-support/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/regulations-compliance/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/customer-partner/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/industry-standards/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/sso/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/api-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/identity-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/workforce-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/fr/resources/blog/search/category/zero-trust/page/1.html</loc></url></urlset>