{"id":18032,"date":"2022-04-07T16:42:13","date_gmt":"2022-04-07T11:12:13","guid":{"rendered":"http:\/\/onlineappsdba.com\/?p=18032"},"modified":"2022-04-09T18:48:13","modified_gmt":"2022-04-09T13:18:13","slug":"understanding-authentication-authorization-in-openshift","status":"publish","type":"post","link":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/","title":{"rendered":"\ud835\udc14\ud835\udc27\ud835\udc1d\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc22\ud835\udc27\ud835\udc20 \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 &#038; \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 \ud835\udc22\ud835\udc27 \ud835\udc0e\ud835\udc29\ud835\udc1e\ud835\udc27\ud835\udc12\ud835\udc21\ud835\udc22\ud835\udc1f\ud835\udc2d"},"content":{"rendered":"<p>\ud83d\udccc In OpenShift or K8s, \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 &amp; \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 are very crucial. These are required for cluster security. One must be authenticated (logged in) before your request can be authorized (granted permission to access)<\/p>\n<p>\ud83d\udccc A cluster administrator can enable user \ud835\udc1a\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 to guarantee only allowed users have access to an OpenShift Container Platform cluster. Users must first authenticate to the OpenShift Container Platform API in some way before they can interact with an OpenShift Container Platform cluster.<\/p>\n<p>\ud83d\udccc \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 entails verifying whether the identified user has the necessary permissions to carry out the requested activity. Using RBAC components like rules, roles, and bindings, administrators may specify and grant rights to users.<\/p>\n<p>\ud83d\udccc Users can then be allocated roles that grant access to resources inside a project or throughout the cluster. \ud835\udc11\ud835\udc01\ud835\udc00\ud835\udc02 is used to do this. A user\u2019s ability to do an activity within a project is determined by role-based access control.<\/p>\n<p>\ud83e\udd13 So, want to know more about Authentication &amp; Authorization in Openshift ?<\/p>\n<p>Check out this blog: <a href=\"https:\/\/k21academy.com\/openshift\/understanding-authentication-authorization-in-openshift\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=openshift22_april2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/k21academy.com\/openshift22<\/a> \u2013 that covers:<\/p>\n<p>\ud83c\udf40 Overview of authentication and authorization<br \/>\n\ud83c\udf40 Internal OAuth Server<br \/>\n\ud83c\udf40 Identity Providers<br \/>\n\ud83c\udf40 RBAC<br \/>\n\ud83c\udf40 Users<br \/>\n\ud83c\udf40 Groups<br \/>\n\ud83c\udf40 Service Accounts<\/p>\n<p>\ud83d\udcab Want more in-depth training? Register for the \ud835\udc05\ud835\udc11\ud835\udc04\ud835\udc04 \ud835\udc02\ud835\udc0b\ud835\udc00\ud835\udc12\ud835\udc12 now at <a href=\"https:\/\/k21academy.com\/containers-kubernetes-certification-free-class\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=openshift02_april2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/k21academy.com\/openshift02<\/a><\/p>\n<p><a href=\"https:\/\/k21academy.com\/containers-kubernetes-certification-free-class\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=openshift02_april2022\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/k21academy.com\/wp-content\/uploads\/2021\/09\/OpenShift-1.gif\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udccc In OpenShift or K8s, \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 &amp; \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 are very crucial. These are required for cluster security. One must be [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":18033,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[548],"tags":[],"class_list":["post-18032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-openshift"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Authentication &amp; Authorization in OpenShift | K21Academy<\/title>\n<meta name=\"description\" content=\"In OpenShift or K8s, Authentication &amp; Authorization are very crucial. You\u00a0must be\u00a0authenticated before your request can be\u00a0authorized.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Authentication &amp; Authorization in OpenShift | K21Academy\" \/>\n<meta property=\"og:description\" content=\"In OpenShift or K8s, Authentication &amp; Authorization are very crucial. You\u00a0must be\u00a0authenticated before your request can be\u00a0authorized.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-07T11:12:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-09T13:18:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1119\" \/>\n\t<meta property=\"og:image:height\" content=\"622\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masroof Ahmad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masroof Ahmad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/\",\"url\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/\",\"name\":\"Understanding Authentication & Authorization in OpenShift | K21Academy\",\"isPartOf\":{\"@id\":\"https:\/\/onlineappsdba.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg\",\"datePublished\":\"2022-04-07T11:12:13+00:00\",\"dateModified\":\"2022-04-09T13:18:13+00:00\",\"author\":{\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\"},\"description\":\"In OpenShift or K8s, Authentication & Authorization are very crucial. You\u00a0must be\u00a0authenticated before your request can be\u00a0authorized.\",\"breadcrumb\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#primaryimage\",\"url\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg\",\"contentUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg\",\"width\":1119,\"height\":622},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineappsdba.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\ud835\udc14\ud835\udc27\ud835\udc1d\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc22\ud835\udc27\ud835\udc20 \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 &#038; \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 \ud835\udc22\ud835\udc27 \ud835\udc0e\ud835\udc29\ud835\udc1e\ud835\udc27\ud835\udc12\ud835\udc21\ud835\udc22\ud835\udc1f\ud835\udc2d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineappsdba.com\/#website\",\"url\":\"https:\/\/onlineappsdba.com\/\",\"name\":\"\",\"description\":\"Oracle Implementation &amp; Training Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineappsdba.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\",\"name\":\"Masroof Ahmad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"caption\":\"Masroof Ahmad\"},\"url\":\"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Authentication & Authorization in OpenShift | K21Academy","description":"In OpenShift or K8s, Authentication & Authorization are very crucial. You\u00a0must be\u00a0authenticated before your request can be\u00a0authorized.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Authentication & Authorization in OpenShift | K21Academy","og_description":"In OpenShift or K8s, Authentication & Authorization are very crucial. You\u00a0must be\u00a0authenticated before your request can be\u00a0authorized.","og_url":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/","article_published_time":"2022-04-07T11:12:13+00:00","article_modified_time":"2022-04-09T13:18:13+00:00","og_image":[{"width":1119,"height":622,"url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg","type":"image\/jpeg"}],"author":"Masroof Ahmad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Masroof Ahmad","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/","url":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/","name":"Understanding Authentication & Authorization in OpenShift | K21Academy","isPartOf":{"@id":"https:\/\/onlineappsdba.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#primaryimage"},"image":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#primaryimage"},"thumbnailUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg","datePublished":"2022-04-07T11:12:13+00:00","dateModified":"2022-04-09T13:18:13+00:00","author":{"@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb"},"description":"In OpenShift or K8s, Authentication & Authorization are very crucial. You\u00a0must be\u00a0authenticated before your request can be\u00a0authorized.","breadcrumb":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#primaryimage","url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg","contentUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/OS-Authentication-Image.jpeg","width":1119,"height":622},{"@type":"BreadcrumbList","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/07\/understanding-authentication-authorization-in-openshift\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineappsdba.com\/"},{"@type":"ListItem","position":2,"name":"\ud835\udc14\ud835\udc27\ud835\udc1d\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc22\ud835\udc27\ud835\udc20 \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 &#038; \ud835\udc00\ud835\udc2e\ud835\udc2d\ud835\udc21\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc2d\ud835\udc22\ud835\udc28\ud835\udc27 \ud835\udc22\ud835\udc27 \ud835\udc0e\ud835\udc29\ud835\udc1e\ud835\udc27\ud835\udc12\ud835\udc21\ud835\udc22\ud835\udc1f\ud835\udc2d"}]},{"@type":"WebSite","@id":"https:\/\/onlineappsdba.com\/#website","url":"https:\/\/onlineappsdba.com\/","name":"","description":"Oracle Implementation &amp; Training Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineappsdba.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb","name":"Masroof Ahmad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","caption":"Masroof Ahmad"},"url":"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/18032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/comments?post=18032"}],"version-history":[{"count":0,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/18032\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media\/18033"}],"wp:attachment":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media?parent=18032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/categories?post=18032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/tags?post=18032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}