{"version":"1.0","provider_name":"STID","provider_url":"https:\/\/stid-security.com\/fr\/","author_name":"Alexandre Durand","author_url":"https:\/\/stid-security.com\/fr\/author\/alexandre-durand\/","title":"Contr\u00f4le d\u2019acc\u00e8s en environnements ATEX\/IECEx - STID","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZuTRzaMpYZ\"><a href=\"https:\/\/stid-security.com\/fr\/challenges\/controle-dacces-en-environnements-atex-iecex\/\">Contr\u00f4le d\u2019acc\u00e8s en environnements ATEX\/IECEx<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/stid-security.com\/fr\/challenges\/controle-dacces-en-environnements-atex-iecex\/embed\/#?secret=ZuTRzaMpYZ\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Contr\u00f4le d\u2019acc\u00e8s en environnements ATEX\/IECEx\u00a0\u00bb &#8212; STID\" data-secret=\"ZuTRzaMpYZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/stid-security.com\/app\/uploads\/2025\/06\/atex-1.png","thumbnail_width":630,"thumbnail_height":515,"description":"Dans les environnements explosifs, o\u00f9 l\u2019air peut contenir des substances inflammables telles que des gaz, des vapeurs ou des poussi\u00e8res, les syst\u00e8mes de contr\u00f4le d\u2019acc\u00e8s doivent non seulement s\u00e9curiser les acc\u00e8s, mais surtout pr\u00e9venir activement tout risque d\u2019incident majeur. Des normes internationales strictes, telles que la certification ATEX (EN 60079) et le r\u00e9f\u00e9rentiel IECEx, imposent l\u2019utilisation de lecteurs et de solutions de contr\u00f4le d\u2019acc\u00e8s sp\u00e9cifiquement con\u00e7us pour ces environnements sensibles et \u00e0 haut risque."}