{"version":"1.0","provider_name":"IDZONE - Access Control System","provider_url":"https:\/\/idzone.com.sa\/arabic","title":"Streamlined Workflow and Security with Access360 - IDZONE - Access Control System","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"KYtEo0X8pw\"><a href=\"https:\/\/idzone.com.sa\/arabic\/streamlined-workflow-and-security-with-idzone\/\">Streamlined Workflow and Security with Access360<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/idzone.com.sa\/arabic\/streamlined-workflow-and-security-with-idzone\/embed\/#?secret=KYtEo0X8pw\" width=\"600\" height=\"338\" title=\"&#8220;Streamlined Workflow and Security with Access360&#8221; &#8212; IDZONE - Access Control System\" data-secret=\"KYtEo0X8pw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/08\/key-hole-760.jpg","thumbnail_width":760,"thumbnail_height":440,"description":"Access control is a method of confining right to use to sensitive information. Only those that have had their identity verified can access company data through an access control gateway. Any access control system, whether physical or logical, has five main components: 1. Authentication: validating personal identity, documents, verifying the authenticity of a website with [&hellip;]"}