{"id":12844,"date":"2026-03-27T16:55:02","date_gmt":"2026-03-27T15:55:02","guid":{"rendered":"https:\/\/evidency.io\/?p=12844"},"modified":"2026-03-30T15:03:21","modified_gmt":"2026-03-30T13:03:21","slug":"pki-and-certificates-definitions-of-technical-terms","status":"publish","type":"post","link":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/","title":{"rendered":"PKI and certificates: definitions of technical terms"},"content":{"rendered":"<p><strong>Key takeaways on PKI and\u00a0certificates<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The PKI organises the\u00a0issuance, management and validation of\u00a0certificates\u00a0used\u00a0for\u00a0signing\u00a0or\u00a0sealing.\u00a0<\/li>\n\n\n\n<li>The certification\u00a0authority\u00a0(CA) issues\u00a0certificates\u00a0and\u00a0publishes\u00a0revocation\u00a0information.\u00a0<\/li>\n\n\n\n<li>An X.509\u00a0certificate\u00a0binds\u00a0a public key to an\u00a0identity\u00a0and to\u00a0attributes\u00a0(usage,\u00a0validity, extensions).\u00a0<\/li>\n\n\n\n<li>Revocation\u00a0is\u00a0verified\u00a0via\u00a0CRLs\u00a0(lists) or OCSP (status\u00a0response).<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a PKI?<\/h2>\n\n\n\n<p>A PKI (Public Key Infrastructure) is the set of technical and organisational components that enable the issuance, management and verification of public key certificates.<\/p>\n\n\n\n<p>It combines: roles (authorities, subscribers, operators), policies (issuance conditions, identity verification, permitted uses), and publication mechanisms (revocation, access points, policy documents).<\/p>\n\n\n\n<p>From an evidential perspective, the PKI is the \u201cbackbone\u201d linking a cryptographic act (signature, <a href=\"https:\/\/evidency.io\/en\/electronic-seal\/\">seal<\/a>) to an identity and to a set of verifiable rules. Without a PKI (or without a documented PKI), demonstrating attribution and validity becomes more difficult to sustain before a third party.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a certification authority (CA)?<\/h2>\n\n\n\n<p>A certification authority (CA) is the entity that issues certificates by attesting that a public key corresponds to an identity, in accordance with an issuance policy. It signs <a href=\"https:\/\/evidency.io\/en\/electronic-seal-electronic-signature-definitions\/\">certificates<\/a>, enabling a verifier to confirm, through cryptographic means, that the certificate has not been altered and that it forms part of a chain of trust.<\/p>\n\n\n\n<p>The CA also assumes operational obligations: securing the authority\u2019s keys, managing the lifecycle (issuance, renewal, possible suspension), publishing revocation information and documenting its practices. In a given case, the CA is not merely a name: attention is paid to what it declares (CP\/CPS), its trust anchor, and its ability to produce verifiable status information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is an X.509 certificate?<\/h2>\n\n\n\n<p>An X.509 certificate is a structured object that binds a public key to identity information and to validity and usage attributes. It includes, in particular: a subject (holder), an issuer, a validity period, a serial number, algorithms, and extensions (for example KeyUsage, ExtendedKeyUsage, BasicConstraints, Subject Alternative Name).<\/p>\n\n\n\n<p>Within the Internet ecosystem, the reference profile is RFC 5280, which defines how these fields are to be interpreted. A certificate does not, in itself, constitute proof: it becomes evidential when validated in accordance with chain, usage and status rules (non-revocation), and when these elements are preserved consistently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a qualified certificate?<\/h2>\n\n\n\n<p>A qualified certificate (within the meaning of eIDAS) is a certificate issued by a <a href=\"https:\/\/evidency.io\/en\/trust-service-provider-tsp-definition\/\">qualified trust service provider<\/a> and compliant with the requirements set out in the Regulation, in particular Annex I for qualified electronic signature certificates. Qualification refers to a framework of compliance and supervision: it is not merely a \u201cformat\u201d, but a status attached to the issuance and content of the certificate, as well as to the provider.<\/p>\n\n\n\n<p>In practice, the identification of qualified providers and qualified services is facilitated by the Trusted Lists published by Member States. For legal practitioners, the benefit lies in having a common reference in a cross-border context, without having to reconstruct entirely the reliability of a private trust chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a certification policy (CP)?<\/h2>\n\n\n\n<p>A certification policy (CP) describes what a certificate represents: level of identity verification, issuance conditions, permitted uses, security requirements, responsibilities, and assumptions of reliance for parties using the certificate. It serves as a reference for qualifying a certificate in a given context (internal <a href=\"https:\/\/evidency.io\/en\/electronic-signature-qualified-timestamping\/\">signature<\/a>, organisational seal, external use, etc.).<\/p>\n\n\n\n<p>From a documentary standpoint, RFC 3647 provides a framework for structuring a CP in a comparable manner across authorities. In an evidential context, the CP links a claim (\u201cthis certificate identifies an organisation at a given level\u201d) to a normative document published by the authority, and therefore capable of verification and challenge.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is certificate revocation?<\/h2>\n\n\n\n<p>Revocation is the decision to render a certificate invalid before its expiry date. Typical grounds include compromise of the private key, issuance error, change of attributes, or termination of the relationship with the holder.<\/p>\n\n\n\n<p>From an evidential standpoint, it is necessary to distinguish between \u201ccertificate within its validity period\u201d and \u201ccertificate not revoked\u201d. Validation must therefore include verification of revocation status, based on an explicit policy (accepted sources, tolerances, timing). This is a common point of weakness: a case may be undermined if it cannot be demonstrated, with supporting evidence, what the status was at the time the signature or <a href=\"https:\/\/evidency.io\/en\/compliant-electronic-seal\/\">seal <\/a>was applied (or at the time it is said to have taken effect).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a CRL?<\/h2>\n\n\n\n<p>A CRL (Certificate Revocation List) is a list published by a CA identifying revoked certificates (together with associated information such as date and reason). It is itself signed and must be validated.<\/p>\n\n\n\n<p>The mechanism operates on a \u201clist\u201d basis: a CRL is retrieved, and the certificate\u2019s serial number is checked against it. CRLs are governed by publication policies (frequency, distribution points, CRL validity period), which are relevant in an evidential assessment: an outdated, unavailable or inconsistent CRL weakens the demonstration. The rules governing the structure and interpretation of CRLs in Internet use are defined in RFC 5280.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Key takeaways on PKI and\u00a0certificates What is a PKI? A PKI (Public Key Infrastructure) is the set of technical and organisational components that enable the issuance, management and verification of public key certificates. It combines: roles (authorities, subscribers, operators), policies (issuance conditions, identity verification, permitted uses), and publication mechanisms (revocation, access points, policy documents). From [&hellip;]<\/p>\n","protected":false},"author":246879322,"featured_media":12845,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6410],"tags":[],"ppma_author":[6450],"class_list":["post-12844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-timestamping","author-camille-lehur"],"acf":{"profil":"","bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding PKI: CA, X.509 certificate, revocation, CRL<\/title>\n<meta name=\"description\" content=\"Technical glossary on PKI. Key references for understanding certificate validation and status.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding PKI: CA, X.509 certificate, revocation, CRL\" \/>\n<meta property=\"og:description\" content=\"Technical glossary on PKI. Key references for understanding certificate validation and status.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidency\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-27T15:55:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1900\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Camille Lehur\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camille Lehur\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\"},\"author\":{\"name\":\"Camille Lehur\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a\"},\"headline\":\"PKI and certificates: definitions of technical terms\",\"datePublished\":\"2026-03-27T15:55:02+00:00\",\"dateModified\":\"2026-03-30T13:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\"},\"wordCount\":830,\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp\",\"articleSection\":[\"Timestamping\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\",\"url\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\",\"name\":\"Understanding PKI: CA, X.509 certificate, revocation, CRL\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp\",\"datePublished\":\"2026-03-27T15:55:02+00:00\",\"dateModified\":\"2026-03-30T13:03:21+00:00\",\"description\":\"Technical glossary on PKI. Key references for understanding certificate validation and status.\",\"breadcrumb\":{\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp\",\"width\":1900,\"height\":1000,\"caption\":\"PKI et certificats definitions des termes techniques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidency\",\"item\":\"https:\/\/evidency.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PKI and certificates: definitions of technical terms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evidency.io\/en\/#website\",\"url\":\"https:\/\/evidency.io\/en\/\",\"name\":\"Evidency\",\"description\":\"Sp\u00e9cialiste de la preuve num\u00e9rique\",\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evidency.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evidency.io\/en\/#organization\",\"name\":\"Evidency\",\"url\":\"https:\/\/evidency.io\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"width\":275,\"height\":58,\"caption\":\"Evidency\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/evidency-io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a\",\"name\":\"Camille Lehur\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/0136f4c427d33956c0ce6ac1e3707f4c\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp\",\"caption\":\"Camille Lehur\"},\"description\":\"Camille est Responsable Marketing Digital chez Evidency. Forte de plus de 10 ans d'exp\u00e9rience, elle est sp\u00e9cialis\u00e9e dans la gestion de contenu et l'acquisition de trafic.\",\"sameAs\":[\"https:\/\/google.com\/\"],\"url\":\"https:\/\/evidency.io\/en\/author\/camille-lehur\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding PKI: CA, X.509 certificate, revocation, CRL","description":"Technical glossary on PKI. Key references for understanding certificate validation and status.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/","og_locale":"en_US","og_type":"article","og_title":"Understanding PKI: CA, X.509 certificate, revocation, CRL","og_description":"Technical glossary on PKI. Key references for understanding certificate validation and status.","og_url":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/","og_site_name":"Evidency","article_published_time":"2026-03-27T15:55:02+00:00","article_modified_time":"2026-03-30T13:03:21+00:00","og_image":[{"width":1900,"height":1000,"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp","type":"image\/webp"}],"author":"Camille Lehur","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camille Lehur","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#article","isPartOf":{"@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/"},"author":{"name":"Camille Lehur","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a"},"headline":"PKI and certificates: definitions of technical terms","datePublished":"2026-03-27T15:55:02+00:00","dateModified":"2026-03-30T13:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/"},"wordCount":830,"publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"image":{"@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp","articleSection":["Timestamping"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/","url":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/","name":"Understanding PKI: CA, X.509 certificate, revocation, CRL","isPartOf":{"@id":"https:\/\/evidency.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage"},"image":{"@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp","datePublished":"2026-03-27T15:55:02+00:00","dateModified":"2026-03-30T13:03:21+00:00","description":"Technical glossary on PKI. Key references for understanding certificate validation and status.","breadcrumb":{"@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#primaryimage","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/PKI-et-certificats.webp","width":1900,"height":1000,"caption":"PKI et certificats definitions des termes techniques"},{"@type":"BreadcrumbList","@id":"https:\/\/evidency.io\/en\/pki-and-certificates-definitions-of-technical-terms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidency","item":"https:\/\/evidency.io\/en\/"},{"@type":"ListItem","position":2,"name":"PKI and certificates: definitions of technical terms"}]},{"@type":"WebSite","@id":"https:\/\/evidency.io\/en\/#website","url":"https:\/\/evidency.io\/en\/","name":"Evidency","description":"Sp\u00e9cialiste de la preuve num\u00e9rique","publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evidency.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evidency.io\/en\/#organization","name":"Evidency","url":"https:\/\/evidency.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","width":275,"height":58,"caption":"Evidency"},"image":{"@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evidency-io\/"]},{"@type":"Person","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a","name":"Camille Lehur","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/0136f4c427d33956c0ce6ac1e3707f4c","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp","caption":"Camille Lehur"},"description":"Camille est Responsable Marketing Digital chez Evidency. Forte de plus de 10 ans d'exp\u00e9rience, elle est sp\u00e9cialis\u00e9e dans la gestion de contenu et l'acquisition de trafic.","sameAs":["https:\/\/google.com\/"],"url":"https:\/\/evidency.io\/en\/author\/camille-lehur\/"}]}},"modified_by":"Cl\u00e9a Guinaudeau","authors":[{"term_id":6450,"user_id":246879322,"is_guest":0,"slug":"camille-lehur","display_name":"Camille Lehur","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille-1.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille-1.webp"},"author_category":"1","first_name":"Camille","description_complete":"Camille is the Digital Marketing Manager at Evidency. With over 10 years of experience, she specialises in content management and traffic acquisition.","domaine_dexpertise":"<ul>\r\n \t<li>Digital marketing<\/li>\r\n<\/ul>","last_name":"Lehur","user_url":"","job_title":"Digital Marketing Manager","linkedin":"https:\/\/www.linkedin.com\/in\/camille-lehur\/","description":"Camille is the Digital Marketing Manager at Evidency. With over 10 years of experience, she specialises in content management and traffic acquisition."}],"_links":{"self":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/users\/246879322"}],"replies":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/comments?post=12844"}],"version-history":[{"count":8,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12844\/revisions"}],"predecessor-version":[{"id":12883,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12844\/revisions\/12883"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media\/12845"}],"wp:attachment":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media?parent=12844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/categories?post=12844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/tags?post=12844"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/ppma_author?post=12844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}