{"id":4396,"date":"2020-08-06T07:00:00","date_gmt":"2020-08-06T13:00:00","guid":{"rendered":"https:\/\/www.jumpcloud.com\/blog\/?p=4396"},"modified":"2024-02-08T11:11:16","modified_gmt":"2024-02-08T16:11:16","slug":"protocols-using-identity-management","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management","title":{"rendered":"Which Protocols Should Be Used for IAM?"},"content":{"rendered":"\n

A core, foundational element to understand with identity and access management (IAM) solutions<\/a> is protocols.<\/p>\n\n\n\n

Identity solutions often depend on industry-standard authentication protocols. Unfortunately, different types of IT resources generally support different authentication protocols. <\/p>\n\n\n\n

Different Authentication Protocols Make Things Complicated<\/h2>\n\n\n\n

Organizations have a mixture of all of these types of resources, but their identity and access management solutions may only support only one or a couple of these authentication protocols. That causes IT organizations to build a collection of solutions that ultimately comprise their entire IAM infrastructure.<\/p>\n\n\n\n

Generally, this type of cobbled together infrastructure gets the job done. But rarely does this work efficiently and securely, and in a way that requires minimal maintenance. And, that should be your goal with an identity management architecture.<\/p>\n\n\n\n

The best approach is to determine which authentication protocols are in use (or should be), find an identity management solution that supports those protocols, and then employ one single IAM solution that doesn\u2019t have to be modified just to reach bare minimum functionality.<\/p>\n\n\n\n

So What Authentication Protocols Are You Using?<\/h2>\n\n\n\n

Below, we provide an overview of the major identity protocols in use today.<\/p>\n\n\n\n

Native Authentication<\/h3>\n\n\n\n

Okay, so native authentication isn\u2019t exactly a protocol. In fact, it\u2019s just the opposite.<\/p>\n\n\n\n

We include it on this list to emphasize the point that most devices have their own authentication mechanisms. While some devices can access LDAP, for example, the challenges to connect those devices to LDAP are significant.<\/p>\n\n\n\n

Specifically, Windows and macOS devices are challenging to manage with third party protocols. As a result, while there may not be a specific protocol, the APIs to create and manage users on Windows, Mac, and Linux\u00ae<\/sup> devices are critical for any identity management solution.<\/p>\n\n\n\n

LDAP<\/h3>\n\n\n\n

One of the oldest and most durable authentication protocols, LDAP <\/a>has been an industry standard since the mid-1990s. Lightweight Directory Access Protocol is often used for connecting to Linux devices, NAS devices \/ file servers, and more technical applications, as in DevOps environments. Many on-premises applications and storage devices still authenticate to the LDAP protocol.<\/p>\n\n\n\n

LDAP is flexible and customizable, which is powerful, but it is notoriously difficult to configure and administer. In recent years, cloud-based and managed LDAP<\/a> solutions emerged to streamline LDAP\u2019s capabilities for organizations.<\/p>\n\n\n\n

Use LDAP for:<\/strong>  Linux devices, NAS devices\/file servers, technical applications, on-prem applications.<\/p>\n\n\n\n

Kerberos<\/h3>\n\n\n\n

Invented at MIT, Kerberos<\/a> is used extensively under the hood by Microsoft as the authentication protocol for Windows and Windows-related systems.<\/p>\n\n\n\n

The primary benefit in Windows networks is the ability to automatically sign-in users to any resources connected to the domain. With the steady move to SaaS-based applications, Kerberos has become a less important authentication protocol, but it is still used widely by Microsoft for their on-prem domain controller. <\/p>\n\n\n\n

Also, it\u2019s important to note that, with the changing IT landscape, many organizations have shifted away from an on-prem domain<\/a> to the domainless enterprise architecture, relegating Kerberos to be somewhat less relevant than it was a decade or so ago.<\/p>\n\n\n\n

Use Kerberos for:<\/strong>  Windows systems, on-prem Microsoft applications \/ server infrastructure<\/p>\n\n\n\n

RADIUS<\/h3>\n\n\n\n

Remote Authentication Dial-In User Service (RADIUS)<\/a> is an authentication protocol primarily used by networking solutions such as wireless networks, VPNs, and network infrastructure equipment. RADIUS servers generally connect back to a central directory service which contains user credentials. RADIUS was primarily used by ISPs and the like early on, but has since been repurposed to control WiFi networks and VPNs.<\/p>\n\n\n\n

As with LDAP, there are options for companies that would rather not deal with their own RADIUS servers. RADIUS-as-a-Service (RaaS)<\/a> provides you with pre-built, pre-configured, scalable, redundant, and fully managed and maintained RADIUS servers.<\/p>\n\n\n\n

Use RADIUS for: <\/strong> wireless networks, VPNs, network infrastructure equipment.<\/p>\n\n\n\n

SAML<\/h3>\n\n\n\n

Security Assertion Markup Language (SAML<\/a>) is the authentication protocol most often associated with single sign-on solutions<\/a> for web applications. The open standard is employed widely by service providers (web application providers) and identity providers (web application SSO solutions).<\/p>\n\n\n\n

SAML implementations are defined by an identity provider and a service provider. A service provider is, for example, a web application that a user wants to access. The service provider will request authentication from an identity provider, which is ultimately backed by a directory service. Historically, identity providers were merely proxies for the core directory service, but with platforms such as Directory-as-a-Service, those functions (IdP & SSO) are merging.<\/p>\n\n\n\n

SAML has made great inroads into the web application sector, but is generally not relevant for devices and generally not used by internal applications due to the overhead to adopt it.<\/p>\n\n\n\n

Use SAML for:<\/strong> web applications.<\/p>\n\n\n\n

OpenID<\/h3>\n\n\n\n

Another authentication mechanism for web applications, OpenID has gained some adoption due to support from significant consumer facing web applications such as Google\u00ae<\/sup> and Yahoo!. OpenID works similar to SAML<\/a> but is less complex to implement. Using OpenID, a third party web application could allow users to log in to their services via a Google, Microsoft, Facebook, Twitter, or Yahoo ID, for example.<\/p>\n\n\n\n

This authentication mechanism is used for consumer facing web applications, although it is starting to gain some traction in business scenarios due to the popularity of G Suite\u2122 (formerly Google Apps for Work<\/a>).<\/p>\n\n\n\n

Use OpenID for:<\/strong> web applications.<\/p>\n\n\n\n\n

\n
\n \"JumpCloud\"\n <\/div>\n
\n

\n <\/p>\n

\n Securely connect to any resource using Google Workspace and JumpCloud. <\/p>\n <\/div>\n

\n Learn More<\/a>\n <\/div>\n<\/div>\n\n\n\n\n

OAuth<\/h3>\n\n\n\n

A similar protocol to OpenID, OAuth<\/a> is used by major consumer Internet sites such as Google, Facebook, and Twitter to federate their identities to third party sites.<\/p>\n\n\n\n

Use OAuth for:<\/strong>  web applications.<\/p>\n\n\n\n

TACACS<\/h3>\n\n\n\n

Adopted extensively in the network infrastructure market, TACACS is a relatively simple authentication protocol. TACACS was first developed in the mid-1980s to manage authentication for the U.S. Department of Defense unclassified network.<\/p>\n\n\n\n

The need behind this protocol was to allow users to jump between machines or network infrastructure without having to re-login.<\/p>\n\n\n\n

Use TACACS for:<\/strong>  network infrastructure.<\/p>\n\n\n\n

The Right Authentication Protocols for Your Identity Management Solution<\/h2>\n\n\n\n

As you can see, there are a variety of authentication protocols on the market (and many more that we didn\u2019t list). While it seems that they may be consolidating, ultimately, new innovations in the IT sector end up creating new authentication standards (e.g. while not authentication protocols necessarily, Just-in-Time (JIT) and SCIM have emerged as methods for support provisioning \/ deprovisioning of users within web applications). A multiprotocol environment is likely a reality for most, if not all organizations.<\/p>\n\n\n\n

Your identity management strategy needs to account for the fact that your diverse set of IT resources will involve a diverse set of authentication protocols. Your goal is to limit that from having many different components within your identity infrastructure to account for all of those different protocols.<\/p>\n\n\n\n

So how do you accomplish that feat? Check out our newly released IT Guide to Identity Management<\/a>. It\u2019s an info-packed document completely available to you right now, one click away, and it offers an overview of the current IAM market, along with the biggest challenges and most effective solutions available today.<\/p>\n\n\n\n

Interested in SaaS-Based Identity Management?<\/h2>\n\n\n\n

More and more companies are realizing that they don\u2019t really want to master the mix of protocols in use today and would rather outsource identity management to a company that specializes in it. That\u2019s exactly what we do at JumpCloud.<\/p>\n\n\n\n

Get started today with a free 30 Day Trial<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.<\/p>\n","protected":false},"author":70,"featured_media":47074,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781],"tags":[],"collection":[2779],"platform":[],"funnel_stage":[3016],"coauthors":[2515],"acf":[],"yoast_head":"\nWhich Protocols Should Be Used for IAM? - JumpCloud<\/title>\n<meta name=\"description\" content=\"Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which Protocols Should Be Used for IAM?\" \/>\n<meta property=\"og:description\" content=\"Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-06T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-08T16:11:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zach DeMeyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zach DeMeyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\"},\"author\":{\"name\":\"Zach DeMeyer\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d\"},\"headline\":\"Which Protocols Should Be Used for IAM?\",\"datePublished\":\"2020-08-06T13:00:00+00:00\",\"dateModified\":\"2024-02-08T16:11:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\"},\"wordCount\":1218,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg\",\"articleSection\":[\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\",\"url\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\",\"name\":\"Which Protocols Should Be Used for IAM? - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg\",\"datePublished\":\"2020-08-06T13:00:00+00:00\",\"dateModified\":\"2024-02-08T16:11:16+00:00\",\"description\":\"Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg\",\"width\":780,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Which Protocols Should Be Used for IAM?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d\",\"name\":\"Zach DeMeyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d1d6602d927eb5a16b1dfd4ba6b4c219\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g\",\"caption\":\"Zach DeMeyer\"},\"description\":\"Zach is a Product Marketing Specialist at JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, music, and soccer.\",\"sameAs\":[\"http:\/\/www.jumpcloud.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which Protocols Should Be Used for IAM? - JumpCloud","description":"Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management","og_locale":"en_US","og_type":"article","og_title":"Which Protocols Should Be Used for IAM?","og_description":"Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.","og_url":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management","og_site_name":"JumpCloud","article_published_time":"2020-08-06T13:00:00+00:00","article_modified_time":"2024-02-08T16:11:16+00:00","og_image":[{"width":780,"height":521,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg","type":"image\/jpeg"}],"author":"Zach DeMeyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Zach DeMeyer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management"},"author":{"name":"Zach DeMeyer","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d"},"headline":"Which Protocols Should Be Used for IAM?","datePublished":"2020-08-06T13:00:00+00:00","dateModified":"2024-02-08T16:11:16+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management"},"wordCount":1218,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg","articleSection":["How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management","url":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management","name":"Which Protocols Should Be Used for IAM? - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg","datePublished":"2020-08-06T13:00:00+00:00","dateModified":"2024-02-08T16:11:16+00:00","description":"Find a single identity and access management solution that supports all the authentication protocols you need. Start a free 30 Day Trial today.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2016\/06\/protocols-using-identity-management.jpg","width":780,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/protocols-using-identity-management#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Which Protocols Should Be Used for IAM?"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d","name":"Zach DeMeyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d1d6602d927eb5a16b1dfd4ba6b4c219","url":"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g","caption":"Zach DeMeyer"},"description":"Zach is a Product Marketing Specialist at JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, music, and soccer.","sameAs":["http:\/\/www.jumpcloud.com"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/4396"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=4396"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/4396\/revisions"}],"predecessor-version":[{"id":105557,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/4396\/revisions\/105557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/47074"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=4396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=4396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=4396"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=4396"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=4396"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=4396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=4396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}