{"version":"1.0","provider_name":"IRI","provider_url":"https:\/\/beta.iri.com\/blog","author_name":"Allison Aguirre","author_url":"https:\/\/beta.iri.com\/blog\/author\/allisona\/","title":"Metadata Management: Asset Security in Git (Part 4 of 4) - IRI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"WGpN40JZrN\"><a href=\"https:\/\/beta.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\">Metadata Management: Asset Security in Git (Part 4 of 4)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/beta.iri.com\/blog\/iri\/iri-workbench\/security-egit\/embed\/#?secret=WGpN40JZrN\" width=\"600\" height=\"338\" title=\"&#8220;Metadata Management: Asset Security in Git (Part 4 of 4)&#8221; &#8212; IRI\" data-secret=\"WGpN40JZrN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","thumbnail_width":399,"thumbnail_height":228,"description":"This article is fourth in a 4-part series on managing metadata assets in\u00a0IRI Workbench\u00a0using Git. It\u00a0focuses on the security of your metadata. Other articles in the series cover the use of Git as a\u00a0metadata asset hub, for\u00a0version control, and for\u00a0tracking\u00a0metadata lineage. Implementing metadata security protocols is essential for protecting both confidential job and data assetsRead More"}