{"version":"1.0","provider_name":"SAST BLOG","provider_url":"https:\/\/sast-solutions.com\/blog-en","author_name":"securityblog","author_url":"https:\/\/sast-solutions.com\/blog-en\/author\/secruityblog\/","title":"SAST implementation at s.Oliver","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"b38bJpbGIo\"><a href=\"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/\">SAST implementation at s.Oliver<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/embed\/#?secret=b38bJpbGIo\" width=\"600\" height=\"338\" title=\"&#8220;SAST implementation at s.Oliver&#8221; &#8212; SAST BLOG\" data-secret=\"b38bJpbGIo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/sast-solutions.com\/blog-en\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Professional authorization management in real time for 50 SAP systems in 14 countries \u2013 in less than one month? It is possible \u2013 with SAST!  Read in the success story how s.Oliver has expanded its SAP IdM with an integrated access control and governance solution.","thumbnail_url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg"}