{"id":247,"date":"2017-01-05T20:07:31","date_gmt":"2017-01-05T15:37:31","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=247"},"modified":"2019-05-21T14:04:46","modified_gmt":"2019-05-21T09:34:46","slug":"plainid-product-overview","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2017\/01\/05\/plainid-product-overview\/","title":{"rendered":"PlainID &#8211; Product Overview"},"content":{"rendered":"<p><a href=\"http:\/\/www.plainid.com\/\">PlainID<\/a> is a young Authorization Management\u00a0software company. They found\u00a0an innovative approach to simplify and optimize dynamic, fine grained access to resources and data.<\/p>\n<p>Following video demonstrates about the <a href=\"https:\/\/www.linkedin.com\/company\/plainid\">PlainID<\/a> product Overview, Architecture and practical implementation\u00a0of the product in the field of Identity &amp; Access Management.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"PlainID - An Overview\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/jyQcbFY8o1Y?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PlainID is a young Authorization Management\u00a0software company. They found\u00a0an innovative approach to simplify and optimize dynamic, fine grained access to resources and data. Following video demonstrates about the PlainID product Overview, Architecture and practical implementation\u00a0of the product in the field of Identity &amp; Access Management. &nbsp;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,61,16],"tags":[45,95],"class_list":["post-247","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-plainid","category-technology","tag-authentication","tag-plain-id"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=247"}],"version-history":[{"count":9,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/247\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/247\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}