{"id":4308,"date":"2021-11-18T10:00:00","date_gmt":"2021-11-18T15:00:00","guid":{"rendered":"https:\/\/www.jumpcloud.com\/blog\/?p=4308"},"modified":"2023-01-06T15:55:43","modified_gmt":"2023-01-06T20:55:43","slug":"single-sign-on-actually-works","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works","title":{"rendered":"How Single Sign-On (SSO) Authentication Works"},"content":{"rendered":"\n

Modern single sign-on (SSO)<\/a> is an authentication method that enables users to securely and efficiently authenticate to a variety of IT resources such as networks, devices, servers, applications, and services using a single set of credentials. At JumpCloud\u00ae<\/sup>, we refer to modern SSO as True Single Sign-OnTM<\/sup> compared to the traditional and outdated version of web application SSO. <\/p>\n\n\n\n

The difference here is that web app SSO only connects users to web apps, while True SSO<\/a>TM <\/sup>allows users to connect to virtually any IT resource via SSO by a variety of open protocols. This allows IT admins to manage identities and access no matter what resources live within their IT ecosystem. Modern SSO also serves other purposes \u2014 it improves security along with user and IT productivity, reduces password fatigue<\/a> and management, streamlines the user experience, prevents Shadow IT<\/a>, and more.<\/p>\n\n\n\n

In this article, we\u2019ll dive into an overview of how single sign-on works, protocols you need to be aware of, how to choose the protocols you need, and how JumpCloud\u2019s SSO solution works.<\/p>\n\n\n\n

How Does SSO Work?<\/h2>\n\n\n\n

Single sign-on allows users to authenticate to various IT resources with one username and password combination based on a trusted relationship between each resource and an identity provider (IdP). Typically, this relationship\u2019s foundation stems from a certificate that is exchanged between the resource (or service provider (SP)) and the IdP when configuring SSO. <\/p>\n\n\n\n

The certificate’s purpose is to create a trust relationship between the SP and the IdP to verify the integrity of the information being exchanged. During the single sign-on process, the identity data being pushed from the IdP to the SP takes the form of tokens which contain identifying bits of information about the user. These tokens can be signed with the certificate used when creating the trust relationship.<\/p>\n\n\n\n

When a user signs into an SSO provider\u2019s portal, the IdP tracks that the user is already authenticated, usually via a session cookie. From there, any resource connected via SSO will check with the SSO provider<\/a> when a user attempts to access that resource. If the IdP verifies the user based on their initial login through the portal, a token will be passed to the resource, and the federated identity<\/a> is used to complete the sign-in process. However, if the user has not signed in to the main SSO portal or their session has expired, they will be prompted to log in before being granted access to any SSO connected resources.<\/p>\n\n\n\n

Different SSO Authentication Protocols<\/h2>\n\n\n\n

Authentication tokens are a crucial part of the single sign-on process \u2014 they enable identity verification to take place separately from other cloud services. These authentication tokens can take different forms while following varying communication standards to ensure validity. One extremely common authentication token standard (also referred to as an authentication protocol) is called Security Assertion Markup Language (SAML)<\/a>, which is used for web app authentication. <\/p>\n\n\n\n

A couple other common authentication and\/or authorization protocols are the Lightweight Directory Access Protocol (LDAP) and Open Authentication (OAuth2).<\/p>\n\n\n\n

How Does LDAP Work Within SSO?<\/h3>\n\n\n\n

The LDAP protocol<\/a> was originally designed for facilitating on-prem authentication and other on-prem server processes, and continues to be used to authenticate user access to legacy systems and applications.<\/p>\n\n\n\n

When LDAP and SSO<\/a> are used together, a user enters their credentials and the details of the user\u2019s identity are sent to a security server for authentication. After that, the security server sends the info to the LDAP server which then utilizes the given credentials to attempt to authenticate the user. Essentially, LDAP is an authentication protocol used to cross-check information on the server end.<\/p>\n\n\n\n

LDAP is considered a legacy protocol but still has a variety of common use cases including authenticating Linux-based applications, OpenVPN, Jenkins, Kubernetes, Docker, Atlassian Jira and Confluence, and commercially distributed NAS appliances like Synology or QNAP. <\/p>\n\n\n\n

How Does OAuth2 Work Within SSO?<\/h3>\n\n\n\n

Before we can answer this question, it\u2019s important to call out the difference between authentication and authorization. Authentication<\/em> has to do with user identity, whereas authorization<\/em> has to do with user privileges. This is an important distinction to make when discussing OAuth2\u2019s role in web app single sign-on.<\/p>\n\n\n\n

While SAML is an authentication<\/em> protocol that extends user credentials to the cloud and other web applications using the Extensible Markup Language (XML) format, OAuth2<\/a> is an authorization<\/em> protocol that\u2019s more tailored toward access scoping, which is the practice of allowing only the bare minimum of access within the resource\/app that an identity requires once verified. OAuth2 is specifically ideal for web and mobile apps and is generally used by the apps themselves in conjunction with an IdP. OAuth2 also allows for sign-in mechanisms like \u201cSign in with Google,\u201d streamlining the login process even further. <\/p>\n\n\n

\n
\"\"
OAuth2 Authorization Process<\/figcaption><\/figure><\/div>\n\n\n

Which SSO Protocol Is Best For Me?<\/h2>\n\n\n\n

If you\u2019re interested in implementing modern SSO within your organization, you will likely need a variety of protocols depending on the resources that you want to connect via SSO. SAML is a staple protocol across virtually all IT environments, and if you want to connect users to web apps, it will be necessary. OAuth2, used on its own for authentication purposes, can be considered \u201cpseudo authentication,\u201d but is not the most ideal scenario. <\/p>\n\n\n\n

However, by using the SAML and OAuth2 protocols in conjunction within a single sign-on framework, you cover all of your bases and allow for more secure authentication and authorization across different apps. If you also need to provide users with efficient access to legacy apps and systems, LDAP needs to be supported by your modern SSO provider as well.<\/p>\n\n\n\n

Using a wide range of protocols for SSO is the modern solution to the existing problem of \u201cI want to give my users access to as many IT resources as I can with as little manual work as possible.\u201d This means implementing a combined directory and SSO solution<\/a> that supports a wide variety of protocols so you have the ability to make use of LDAP, SAML, OAuth, and others such as RADIUS, from one pane of glass.<\/p>\n\n\n\n

How JumpCloud\u2019s SSO Authentication Works<\/h2>\n\n\n\n

JumpCloud built its cloud directory to function as a core cloud identity provider that streamlines IAM and SSO by providing everything under a single platform, including Cloud LDAP; Cloud RADIUS; SAML, SCIM, and JIT capabilities; and more! JumpCloud also has a library of hundreds of pre-configured SAML connectors<\/a> to make setup easier.<\/p>\n\n\n\n

Looking at it from a high level, JumpCloud allows your organization to leverage the major IAM protocols<\/a> (LDAP, SAML, OAuth2, RADIUS, and more) to authenticate users to virtually any IT resource they need using SSO. Utilizing JumpCloud as your core IdP and SSO solution also limits the amount of work that you have to do with configuration and maintenance. After the initial SSO setup<\/a> is complete, you can provision individual or groups of users access to the resources they need to get work done, including apps, networks, and more.<\/p>\n\n\n\n

How Does SSO Authentication Work with Different Operating Systems?<\/h3>\n\n\n\n

Using the JumpCloud Directory Platform<\/a>, SSO can be configured across Windows, Mac, and Linux devices with little to no extra effort. Without a comprehensive IAM and SSO solution in place, cross-OS single sign-on can be difficult to put together and maintain. However, JumpCloud allows you to set up SSO across each OS which facilitates user authentication to virtually any IT resource they need. Our goal is to connect users to their IT resources regardless of operating system, provider, protocol, or location.<\/p>\n\n\n\n

Try JumpCloud\u2019s SSO Solution Free<\/h3>\n\n\n\n

Test out JumpCloud\u2019s modern, simplified IAM solution with True SSO, and see if it\u2019s right for your organization! Create a JumpCloud Free<\/a> account to access the entirety of the platform for free, up to 10 users and 10 devices. Along with that, enjoy 24\u00d77 in-app support \u2014 free for the first 10 days!<\/p>\n\n\n\n

\n
\n \"JumpCloud\"\n <\/div>\n
\n

\n <\/p>\n

\n JumpCloud\u2019s Identity and Access Management Solution With SSO <\/p>\n <\/div>\n

\n Get Started<\/a>\n <\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"

Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.<\/p>\n","protected":false},"author":143,"featured_media":4856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781,2337],"tags":[],"collection":[2778,2779,2780],"platform":[],"funnel_stage":[3015],"coauthors":[2533],"acf":[],"yoast_head":"\nHow Single Sign-On (SSO) Authentication Works - JumpCloud<\/title>\n<meta name=\"description\" content=\"Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Single Sign-On (SSO) Authentication Works\" \/>\n<meta property=\"og:description\" content=\"Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:author\" content=\"matt.renstrom\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-18T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-06T20:55:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brenna Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brenna Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\"},\"author\":{\"name\":\"Brenna Lee\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7\"},\"headline\":\"How Single Sign-On (SSO) Authentication Works\",\"datePublished\":\"2021-11-18T15:00:00+00:00\",\"dateModified\":\"2023-01-06T20:55:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\"},\"wordCount\":1328,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg\",\"articleSection\":[\"Best Practices\",\"How-To\",\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\",\"url\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\",\"name\":\"How Single Sign-On (SSO) Authentication Works - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg\",\"datePublished\":\"2021-11-18T15:00:00+00:00\",\"dateModified\":\"2023-01-06T20:55:43+00:00\",\"description\":\"Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Single Sign-On (SSO) Authentication Works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7\",\"name\":\"Brenna Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/a512f44ee3cc1a59010e879f81d8b53c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/967dd7256974fbbeb3db3f2549c2da47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/967dd7256974fbbeb3db3f2549c2da47?s=96&d=mm&r=g\",\"caption\":\"Brenna Lee\"},\"description\":\"Brenna is a Content Writer at JumpCloud that loves learning about and immersing herself in new technologies. Outside of the [remote] office, she loves traveling and exploring the outdoors!\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\",\"matt.renstrom\",\"stefano.tomasello@jumpcloud.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Single Sign-On (SSO) Authentication Works - JumpCloud","description":"Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works","og_locale":"en_US","og_type":"article","og_title":"How Single Sign-On (SSO) Authentication Works","og_description":"Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.","og_url":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works","og_site_name":"JumpCloud","article_author":"matt.renstrom","article_published_time":"2021-11-18T15:00:00+00:00","article_modified_time":"2023-01-06T20:55:43+00:00","og_image":[{"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg","width":1,"height":1,"type":"image\/jpeg"}],"author":"Brenna Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brenna Lee","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works"},"author":{"name":"Brenna Lee","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7"},"headline":"How Single Sign-On (SSO) Authentication Works","datePublished":"2021-11-18T15:00:00+00:00","dateModified":"2023-01-06T20:55:43+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works"},"wordCount":1328,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg","articleSection":["Best Practices","How-To","Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works","url":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works","name":"How Single Sign-On (SSO) Authentication Works - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg","datePublished":"2021-11-18T15:00:00+00:00","dateModified":"2023-01-06T20:55:43+00:00","description":"Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/05\/sso-that-works.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/single-sign-on-actually-works#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"How Single Sign-On (SSO) Authentication Works"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7","name":"Brenna Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/a512f44ee3cc1a59010e879f81d8b53c","url":"https:\/\/secure.gravatar.com\/avatar\/967dd7256974fbbeb3db3f2549c2da47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/967dd7256974fbbeb3db3f2549c2da47?s=96&d=mm&r=g","caption":"Brenna Lee"},"description":"Brenna is a Content Writer at JumpCloud that loves learning about and immersing herself in new technologies. Outside of the [remote] office, she loves traveling and exploring the outdoors!","sameAs":["https:\/\/jumpcloud.com\/blog","matt.renstrom","stefano.tomasello@jumpcloud.com"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/4308"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=4308"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/4308\/revisions"}],"predecessor-version":[{"id":73588,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/4308\/revisions\/73588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/4856"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=4308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=4308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=4308"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=4308"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=4308"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=4308"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=4308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}