{"id":9686,"date":"2022-03-07T12:53:55","date_gmt":"2022-03-07T11:53:55","guid":{"rendered":"https:\/\/de.nexis-secure.com\/?p=9686"},"modified":"2025-08-29T12:12:02","modified_gmt":"2025-08-29T10:12:02","slug":"webinar-aufzeichnung-ic-consult-und-nexis-gmbh","status":"publish","type":"post","link":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/","title":{"rendered":"Aufzeichnung der gemeinsamen Websession mit iC Consult"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"288\" src=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-1024x288.png\" alt=\"\" class=\"wp-image-6562\" srcset=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-1024x288.png 1024w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-300x84.png 300w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-768x216.png 768w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-1536x432.png 1536w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-2048x575.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>In dieser Websession vom 10. November 2021 zeigen Andres Heckler, Gesch\u00e4ftsf\u00fchrer der <a href=\"https:\/\/iamworx.com\/de\/\" target=\"_blank\" rel=\"noreferrer noopener\">IAM Worx GmbH<\/a>, und Dr. Michael Kunz, Head of Professional Services bei der Nexis GmbH, wie typische Stolpersteine in IAM Projekten vermieden werden k\u00f6nnen. Am Beispiel von strategischem Gesch\u00e4ftsrollenmanagement wird aufgezeigt, wie mithilfe der Software <a href=\"https:\/\/de.nexis-secure.com\/nexis-4\/funktionen\/\" target=\"_blank\" rel=\"noreferrer noopener\">NEXIS 4<\/a> diese Hindernisse in der Berechtigungsvergabe fr\u00fchzeitig erkannt und adressiert werden k\u00f6nnen. Sie erhalten die Aufzeichnung des Webinars per E-mail, nachdem Sie Ihre Kontaktdaten im untenstehenden Download-Link eingegeben haben.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In dieser Websession vom 10. November 2021 zeigen Andres Heckler, Gesch\u00e4ftsf\u00fchrer der IAM Worx GmbH, und Dr. Michael Kunz, Head of Professional Services bei der Nexis GmbH, wie typische Stolpersteine [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":27110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-9686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-unkategorisiert"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Aufzeichnung der gemeinsamen Websession mit iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"description\" content=\"Aufzeichnung des Webinars vom 10.11.2021 von iC Consult und Nexis GmbH zum Thema &quot;Verborgene Stolpersteine in IAM-Projekten&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aufzeichnung der gemeinsamen Websession mit iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"Aufzeichnung des Webinars vom 10.11.2021 von iC Consult und Nexis GmbH zum Thema &quot;Verborgene Stolpersteine in IAM-Projekten&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T11:53:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T10:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Aufzeichnung der gemeinsamen Websession mit iC Consult\",\"datePublished\":\"2022-03-07T11:53:55+00:00\",\"dateModified\":\"2025-08-29T10:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\"},\"wordCount\":87,\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\",\"url\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\",\"name\":\"Aufzeichnung der gemeinsamen Websession mit iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"datePublished\":\"2022-03-07T11:53:55+00:00\",\"dateModified\":\"2025-08-29T10:12:02+00:00\",\"description\":\"Aufzeichnung des Webinars vom 10.11.2021 von iC Consult und Nexis GmbH zum Thema \\\"Verborgene Stolpersteine in IAM-Projekten\\\"\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aufzeichnung der gemeinsamen Websession mit iC Consult\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aufzeichnung der gemeinsamen Websession mit iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance","description":"Aufzeichnung des Webinars vom 10.11.2021 von iC Consult und Nexis GmbH zum Thema \"Verborgene Stolpersteine in IAM-Projekten\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/","og_locale":"en_US","og_type":"article","og_title":"Aufzeichnung der gemeinsamen Websession mit iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"Aufzeichnung des Webinars vom 10.11.2021 von iC Consult und Nexis GmbH zum Thema \"Verborgene Stolpersteine in IAM-Projekten\"","og_url":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_published_time":"2022-03-07T11:53:55+00:00","article_modified_time":"2025-08-29T10:12:02+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#article","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/"},"author":{"name":"","@id":""},"headline":"Aufzeichnung der gemeinsamen Websession mit iC Consult","datePublished":"2022-03-07T11:53:55+00:00","dateModified":"2025-08-29T10:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/"},"wordCount":87,"publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"image":{"@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","articleSection":["Unkategorisiert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/","url":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/","name":"Aufzeichnung der gemeinsamen Websession mit iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage"},"image":{"@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","datePublished":"2022-03-07T11:53:55+00:00","dateModified":"2025-08-29T10:12:02+00:00","description":"Aufzeichnung des Webinars vom 10.11.2021 von iC Consult und Nexis GmbH zum Thema \"Verborgene Stolpersteine in IAM-Projekten\"","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#primaryimage","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/webinar-aufzeichnung-ic-consult-und-nexis-gmbh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"Aufzeichnung der gemeinsamen Websession mit iC Consult"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/de.nexis-secure.com\/de\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/9686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=9686"}],"version-history":[{"count":1,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/9686\/revisions"}],"predecessor-version":[{"id":27420,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/9686\/revisions\/27420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media\/27110"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=9686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/categories?post=9686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/tags?post=9686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}