{"id":22741,"date":"2025-05-06T14:59:46","date_gmt":"2025-05-06T12:59:46","guid":{"rendered":"https:\/\/de.nexis-secure.com\/nexis-4-autorisierungskonzept\/"},"modified":"2025-07-04T00:34:43","modified_gmt":"2025-07-03T22:34:43","slug":"nexis-4-berechtigungskonzept","status":"publish","type":"page","link":"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/","title":{"rendered":"NEXIS 4 Berechtigungskonzept"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22741\" class=\"elementor elementor-22741\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b960f3a e-con-full e-flex e-con e-parent\" data-id=\"b960f3a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0519f2d e-con-full e-flex e-con e-child\" data-id=\"0519f2d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2d3baff e-con-full e-flex e-con e-child\" data-id=\"2d3baff\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3e6bf22 e-con-full e-flex e-con e-child\" data-id=\"3e6bf22\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6044b4 elementor-widget elementor-widget-heading\" data-id=\"b6044b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Verwaltung von Berechtigungskonzepten mit  NEXIS 4<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1ecf2 elementor-widget elementor-widget-heading\" data-id=\"1f1ecf2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benutzerfreundlich, automatisiert und vollst\u00e4ndig auditiert <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-043967d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"043967d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept-von-der-pflicht-zur-smarten-integration\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Vollst\u00e4ndigen Artikel lesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd7086e elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"bd7086e\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b71a770\" data-id=\"b71a770\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e65911d elementor-widget elementor-widget-heading\" data-id=\"e65911d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Von der blo\u00dfen Compliance-Verpflichtung zur gesch\u00e4ftsf\u00e4higen Access Governance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-899148b elementor-widget elementor-widget-text-editor\" data-id=\"899148b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Berechtigungskonzepte werden oft in unzusammenh\u00e4ngenden Word- oder Excel-Dateien verwaltet. Sie sind schwer zu pflegen, nicht integriert und spiegeln selten den tats\u00e4chlichen Systemzugriff wider.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dc0d70 elementor-widget elementor-widget-text-editor\" data-id=\"7dc0d70\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die Verwaltung Ihrer Berechtigungskonzepte mit NEXIS 4 verwandelt das, was bisher eine statische, manuelle Aufgabe war, in einen dynamischen, integrierten und auditf\u00e4higen Prozess. Es ist auf regulatorische Vorgaben wie DORA, BAIT und VAIT abgestimmt und wurde f\u00fcr Unternehmen entwickelt, die die Einhaltung von Vorschriften ernst nehmen &#8211; und daraus einen gesch\u00e4ftlichen Nutzen ziehen wollen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f179ff e-grid e-con-boxed e-con e-parent\" data-id=\"2f179ff\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b3637e9 e-con-full e-flex e-con e-child\" data-id=\"b3637e9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06e8733 elementor-widget elementor-widget-heading\" data-id=\"06e8733\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Strukturierte Onboarding-Prozesse und einfache erste Bef\u00fcllung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6cb09bb e-con-full e-flex e-con e-child\" data-id=\"6cb09bb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4383725 elementor-widget elementor-widget-heading\" data-id=\"4383725\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Benutzerdefinierte, dynamische Vorlagen ohne Customizing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcb3692 e-con-full e-flex e-con e-child\" data-id=\"bcb3692\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fbf81a elementor-widget elementor-widget-heading\" data-id=\"2fbf81a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">End-to-End-Integration mit Ihrem IGA-System und Ihren IAM-Daten<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e4921f e-con-full e-flex e-con e-child\" data-id=\"6e4921f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2e86fc elementor-widget elementor-widget-heading\" data-id=\"a2e86fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Revisionssichere Validierung und Versionierung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47ba9b1 e-con-full e-flex e-con e-child\" data-id=\"47ba9b1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-636d530 elementor-widget elementor-widget-heading\" data-id=\"636d530\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dynamisch angepasst je nach Risikoprofil der Anwendung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4cf9536 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"4cf9536\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f0cac23\" data-id=\"f0cac23\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3975930 e-grid e-con-boxed e-con e-parent\" data-id=\"3975930\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-204533d e-con-full e-flex e-con e-child\" data-id=\"204533d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept-von-der-pflicht-zur-smarten-integration\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-079c823 elementor-widget elementor-widget-heading\" data-id=\"079c823\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\ud83d\udcf0 M\u00f6chten Sie mehr erfahren?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57b5dae elementor-widget elementor-widget-text-editor\" data-id=\"57b5dae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lesen Sie den vollst\u00e4ndigen Artikel dar\u00fcber, wie das NEXIS 4 Autorisierungskonzept in der Praxis funktioniert: Klicken Sie, um den vollst\u00e4ndigen Artikel zu lesen \u2192<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-b246718 e-flex e-con-boxed e-con e-parent\" data-id=\"b246718\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f94152b e-con-full e-flex e-con e-child\" data-id=\"f94152b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9239e7b elementor-widget elementor-widget-heading\" data-id=\"9239e7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Eingebaute Flexibilit\u00e4t, genau f\u00fcr Ihre Anforderungen<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d63042 elementor-widget elementor-widget-text-editor\" data-id=\"7d63042\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\">Jedes Unternehmen ist anders: Einige Firmen konzentrieren sich auf die Einhaltung von Standards wie DORA, andere auf das Sicherheitsdesign, Architekturmodelle oder die Prozessdokumentation. Je nach Anwendungsfall ben\u00f6tigen Sie unterschiedliche Vorlagen zur Verwaltung und binden verschiedene End-Anwender in die Dokumentation mit ein.<\/p><p style=\"text-align: center\">NEXIS 4 unterst\u00fctzt alle Ihre Anwendungsf\u00e4lle. Vorlagen k\u00f6nnen in NEXIS 4 vom Unternehmen eigenst\u00e4ndig definiert und frei angepasst werden &#8211; zentral verwaltet ohne Programmieraufwand. Der Umfang und die Struktur der Dokumentationen passen sich je nach Anwendungsklassifizierung oder Risikostufe automatisch an. Ganz gleich, ob es sich um eine gesch\u00e4ftskritische Plattform oder ein Standard-SaaS-Tool handelt &#8211; das Autorisierungskonzept in NEXIS 4 entspricht Ihren Governance-Anforderungen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1491a3 elementor-align-center hs-cta-trigger-button hs-cta-trigger-button-230904443072 elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"f1491a3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/de.nexis-secure.com\/kontakt\/\" id=\"JetztWhitepaperHerunterladen\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">KONTAKT AUFNEHMEN<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e32a26 section--padding e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"8e32a26\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ba7634f e-con-full e-flex e-con e-child\" data-id=\"ba7634f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4ff7de elementor-widget elementor-widget-heading\" data-id=\"c4ff7de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vollst\u00e4ndige IGA-Integration<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b675799 elementor-widget elementor-widget-heading\" data-id=\"b675799\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Clever. Intuitiv. Agil.  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-27932aa e-con-full e-flex e-con e-child\" data-id=\"27932aa\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dac4969 tablet-fullwidth e-con-full e-flex e-con e-child\" data-id=\"dac4969\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-92e422d gradient gradient--one gradient--text elementor-widget elementor-widget-text-editor\" data-id=\"92e422d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die Daten f\u00fcr Berechtigungskonzepte werden direkt aus Ihrem IGA-System abgerufen und angereichert &#8211; Rollen, Berechtigungen, SoD-Klassifikationen, Metadaten. Berechtigungskonzepte werden endlich nicht mehr l\u00e4nger isoliert verwaltet, sondern anhand echter, verifizierter Daten erstellt und gepflegt.<\/p><p>Nach einer Freigabe k\u00f6nnen wichtige Informationen auf dem gleichen Weg auch wieder in das IGA zur\u00fcckgef\u00fchrt werden &#8211; so schlie\u00dft sich der Kreis zwischen Spezifikation von Berechtigungskonzepten und ihrer eigentlichen Durchsetzung in den produktiven Systemen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75d1e67 e-con-full e-flex e-con e-child\" data-id=\"75d1e67\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b520a94 elementor-widget elementor-widget-html\" data-id=\"b520a94\" data-element_type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;2.5&quot;,&quot;sizes&quot;:[]},&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:&quot;60&quot;,&quot;end&quot;:&quot;90&quot;}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n\n<div class=\"sl-embed\" style=\"position:relative;padding-bottom:calc(50.16% + 25px);width:100%;height:0\">\n\n<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1393cbc e-con-full e-flex e-con e-parent\" data-id=\"1393cbc\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0fa4f54 gradient gradient--one section--padding e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0fa4f54\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-18edc60 e-con-full e-flex e-con e-child\" data-id=\"18edc60\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de784b4 elementor-widget elementor-widget-heading\" data-id=\"de784b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die wichtigsten Funktionen <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03d1478 e-con-full e-flex e-con e-child\" data-id=\"03d1478\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ec07186 e-con-full e-flex e-con e-child\" data-id=\"ec07186\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5ab7284 e-flex e-con-boxed e-con e-child\" data-id=\"5ab7284\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb38977 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"eb38977\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-file-alt\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e9ca65 elementor-widget elementor-widget-heading\" data-id=\"0e9ca65\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vorlagenbasiert, Zentral, Verwaltet<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6f0d07 elementor-widget elementor-widget-text-editor\" data-id=\"b6f0d07\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\">Einfach anpassbare kundendefinierte Vorlagen geben Ihnen die volle Kontrolle \u00fcber Dokumentations-Struktur und Datenfeldern.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef0dd3d e-flex e-con-boxed e-con e-child\" data-id=\"ef0dd3d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc63a8 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4cc63a8\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-sync\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f9e1c9 elementor-widget elementor-widget-heading\" data-id=\"7f9e1c9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span>Umfassende Freigabe- &amp; Lebenszyklus-Workflows<\/span><span><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd68bbd elementor-widget elementor-widget-text-editor\" data-id=\"dd68bbd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\">Volle Kontrolle vom Entwurf bis zum gepflegten Berechtigungskonzept &#8211; mit nachvollziehbaren Aktualisierungen auf dem Weg dorthin.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1096e5b e-flex e-con-boxed e-con e-child\" data-id=\"1096e5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bddd3a8 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"bddd3a8\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-plug\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b41f9c elementor-widget elementor-widget-heading\" data-id=\"4b41f9c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span>Vollst\u00e4ndige Integration mit Ihrem IGA-System<\/span><span><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab2030b elementor-widget elementor-widget-text-editor\" data-id=\"ab2030b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\">Vorbef\u00fcllung der Berechtigungskonzepte auf Basis Ihrer echten Systemdaten. Push-Back-Metadaten f\u00fcr die Durchsetzung des Soll-Zustands. \u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-243c63c e-con-full e-flex e-con e-child\" data-id=\"243c63c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30dd306 e-con-full e-flex e-con e-child\" data-id=\"30dd306\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f3d9a0a e-flex e-con-boxed e-con e-child\" data-id=\"f3d9a0a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08911b6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"08911b6\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-exchange\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02c63df elementor-widget elementor-widget-heading\" data-id=\"02c63df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span>Automatische Drift-Erkennung<\/span><span><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08b98e0 elementor-widget elementor-widget-text-editor\" data-id=\"08b98e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\">Automatischer Soll-Ist-Vergleich zwischen dem dokumentierten Konzept und der aktuellen Systemkonfiguration.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79e29c4 e-flex e-con-boxed e-con e-child\" data-id=\"79e29c4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d67edf elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0d67edf\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fal fa-sliders-h\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c55ea9 elementor-widget elementor-widget-heading\" data-id=\"3c55ea9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span>Leichte Erstellung und Erweiterbarkeit<\/span><span><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d63029 elementor-widget elementor-widget-text-editor\" data-id=\"7d63029\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\">Von der DORA-konformen Erf\u00fcllung der Minimalanforderungen zur unternehmensweiten Governance-Dokumentation.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e6ec525 e-flex e-con-boxed e-con e-parent\" data-id=\"e6ec525\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75d77c1 elementor-widget elementor-widget-template\" data-id=\"75d77c1\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"24205\" class=\"elementor elementor-24205\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b39eee5 e-flex e-con-boxed e-con e-parent\" data-id=\"b39eee5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-45cdcfd e-con-full e-flex e-con e-child\" data-id=\"45cdcfd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31f5a38 elementor-widget elementor-widget-heading\" data-id=\"31f5a38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ihre pers\u00f6nliche Webdemo<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b2186f e-con-full e-flex e-con e-child\" data-id=\"0b2186f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a8ada72 e-con-full e-flex e-con e-child\" data-id=\"a8ada72\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2cc46e elementor-widget elementor-widget-heading\" data-id=\"d2cc46e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\ud83d\udca1 Lernen Sie NEXIS 4 in Aktion kennen!<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c41fcd7 container--small e-con-full e-flex e-con e-child\" data-id=\"c41fcd7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c07aafa elementor-widget elementor-widget-text-editor\" data-id=\"c07aafa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lassen Sie sich in einer unverbindlichen Sitzung durch die Software f\u00fchren und entdecken Sie ihr volles Potenzial f\u00fcr Ihr Unternehmen.<\/p><p><strong>Das erwartet Sie bei Ihrer pers\u00f6nlichen NEXIS 4-Webdemo:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dba3f3 elementor-widget elementor-widget-image\" data-id=\"9dba3f3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Demo_Element_DEU.svg\" title=\"Demo_Element_DEU\" alt=\"Demo_Element_DEU\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc165f4 e-con-full e-flex e-con e-child\" data-id=\"fc165f4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54968c3 elementor-widget elementor-widget-html\" data-id=\"54968c3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Start of Meetings Embed Script -->\n<div class=\"meetings-iframe-container\" data-src=\"https:\/\/meetings-eu1.hubspot.com\/pascal-weinzierl-galasso\/15-minuten-qualifizierungscall-de?embed=true\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/static.hsappstatic.net\/MeetingsEmbed\/ex\/MeetingsEmbedCode.js\"><\/script>\n<!-- End of Meetings Embed Script -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Verwaltung von Berechtigungskonzepten mit NEXIS 4 Benutzerfreundlich, automatisiert und vollst\u00e4ndig auditiert Vollst\u00e4ndigen Artikel lesen Von der blo\u00dfen Compliance-Verpflichtung zur gesch\u00e4ftsf\u00e4higen Access Governance Berechtigungskonzepte werden oft in unzusammenh\u00e4ngenden Word- oder Excel-Dateien [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-22741","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NEXIS 4 Berechtigungskonzept - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/nexis-4-berechtigungskonzept\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NEXIS 4 Berechtigungskonzept - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"Verwaltung von Berechtigungskonzepten mit NEXIS 4 Benutzerfreundlich, automatisiert und vollst\u00e4ndig auditiert Vollst\u00e4ndigen Artikel lesen Von der blo\u00dfen Compliance-Verpflichtung zur gesch\u00e4ftsf\u00e4higen Access Governance Berechtigungskonzepte werden oft in unzusammenh\u00e4ngenden Word- oder Excel-Dateien [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T22:34:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/\",\"url\":\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/\",\"name\":\"NEXIS 4 Berechtigungskonzept - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"datePublished\":\"2025-05-06T12:59:46+00:00\",\"dateModified\":\"2025-07-03T22:34:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEXIS 4 Berechtigungskonzept\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NEXIS 4 Berechtigungskonzept - NEXIS - Enter a new level of Enterprise Authorization Governance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/nexis-4-berechtigungskonzept\/","og_locale":"en_US","og_type":"article","og_title":"NEXIS 4 Berechtigungskonzept - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"Verwaltung von Berechtigungskonzepten mit NEXIS 4 Benutzerfreundlich, automatisiert und vollst\u00e4ndig auditiert Vollst\u00e4ndigen Artikel lesen Von der blo\u00dfen Compliance-Verpflichtung zur gesch\u00e4ftsf\u00e4higen Access Governance Berechtigungskonzepte werden oft in unzusammenh\u00e4ngenden Word- oder Excel-Dateien [&hellip;]","og_url":"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_modified_time":"2025-07-03T22:34:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/","url":"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/","name":"NEXIS 4 Berechtigungskonzept - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"datePublished":"2025-05-06T12:59:46+00:00","dateModified":"2025-07-03T22:34:43+00:00","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/nexis-4-berechtigungskonzept\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"NEXIS 4 Berechtigungskonzept"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/pages\/22741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=22741"}],"version-history":[{"count":10,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/pages\/22741\/revisions"}],"predecessor-version":[{"id":25693,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/pages\/22741\/revisions\/25693"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=22741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}