{"id":15796,"date":"2022-06-01T08:21:52","date_gmt":"2022-06-01T06:21:52","guid":{"rendered":"https:\/\/www.transparentedge.eu\/blog\/2fa-seguridad\/"},"modified":"2024-08-23T13:43:40","modified_gmt":"2024-08-23T11:43:40","slug":"2fa-security","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/2fa-security\/","title":{"rendered":"2FA and security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Security is the top priority everyone\u2019s after when, <\/span><span style=\"font-weight: 400;\">as<\/span><a href=\"https:\/\/www.transparentedge.eu\/blog\/waf-vulnerabilidades\/\"><span style=\"font-weight: 400;\"> in our case<\/span><\/a><span style=\"font-weight: 400;\">, you are the line of defense separating your clients from potential attackers. In the world of computing,<\/span> <a href=\"https:\/\/www.transparentedge.eu\/blog\/una-cdn-aumenta-la-ciberresiliencia\/\"><span style=\"font-weight: 400;\">DDoS attacks<\/span><\/a><span style=\"font-weight: 400;\"> are very frequent, but there are other kinds, and you never know which one is coming next. So, we need to strengthen all fronts, lock all the doors and seal all the cracks where malicious individuals might try to harm us.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like many other companies, Transparent Edge gives their clients total control of the product through a control panel, to which you access with an authorized username and password. A strong password (with its proper length, letters, numbers, uppercases and special characters) is key so that you have an extra layer of security. However, there are still plenty of people using simple passwords. For these users in particular, but actually for everyone, we\u2019ve recently added the possibility of enabling two-factor authentication (2FA). We want to make sure that the user, and no one else, can access it with its credentials.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2FA, BECAUSE YOU CAN NEVER BE TOO SECURE<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The 2FA, or two-factor verification, is one of the most popular systems when it comes to reinforcing user authentication. When it&#8217;s active, besides the username and password, we have to add a six-digit code that changes over time. Surely, you\u2019ve done this once or twice. What we want you to know is how we implemented this into our authentication system.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During the design phases of this feature, something was very clear. We were dealing with a wide variety of users with different ways of thinking, so 2FA couldn\u2019t be something mandatory, at least not immediately, since our intention is to always make things easy for our clients. This is why we decided to add a new area in the user section, where each user could activate and deactivate the 2FA based on their own needs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Precisely the possibility of enabling and disabling the 2FA was another self-imposed requirement, keeping flexibility always in mind. The last important detail during the design phase was the ease of activation. After two years using QR codes thanks to the pandemic, we decided to use these now common images, which are fully compatible with third-party mobile applications such as Google Authenticator or Authy.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">GETTING DOWN TO CODING<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">With our requirements defined, we started working. The control panel uses -underneath- our own API, which is available to the public. So virtually, the users are constantly making REST requests to the API, although in a more user-friendly way. And the 2FA wouldn\u2019t be an exception.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There were three endpoints or URLs that were enabled for all scenarios. The first one is the most obvious: an endpoint to handle POST and DELETE methods, related to the service\u2019s activation. Through a POST request, there\u2019s a unique key generated for each user, that is stored securely in our database, and the DELETE is used to invalidate said key and deactivate the service.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although the key is all that\u2019s required to add it to verification apps, in our design route was to offer a QR code, which is much more manageable. So through a series of libraries, we\u2019ve converted the key into a QR code that also includes extra information about the service and the associated user. This way, we return the QR image and the key in the response to the request. And the user can store it securely in a trusted app.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">AN EXTRA VERIFICATION POINT<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This is a simple process. But, as we continued with the first few internal tests, we had a question. What if the user, for whatever reason, didn\u2019t add the key to their app? Internally, the user may have been marked as a 2FA user and the key would be requested when trying to enter the control panel, but maybe they hadn\u2019t saved it. So we decided to add two safeguards to address this issue.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first one was to implement the GET method in the same endpoint as the previous POST and DELETE, so the user could retrieve their active key at any time. And to ensure that the key was saved in their app, they would be requested to introduce the 2FA code to complete the activation of the service, so we added a new endpoint that would verify the code.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now we only need to apply the 2FA to our registration process in the control panel. With a system for user registration and an endpoint implemented for that, we had to delve into its internal workings, to interrupt the established registration with username and password, to check whether the user had a 2FA enabled or not.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In case they had it, the registration process is indicated through the use of special headers in the request, that must display and collect a box for the introduction of the code. Once received by the API, it verifies the user and allows access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As you can see, it\u2019s a very simple process, but it adds a security layer. Like everything in Transparent Edge Services, we are already considering some improvements for this, the 2FA. For example, company administrators should be allowed to see which of their users have an active 2FA, having this way more control over the security that their employees and co-workers apply.<\/span><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/ramadorp\/\"><span style=\"font-weight: 400;\">Ricardo Amador<\/span><\/a><span style=\"font-weight: 400;\"> is the Head of Development at Transparent Edge.<\/span><\/p>\n<blockquote><p><em><span style=\"font-weight: 400;\">If Richi hadn\u2019t been a telecommunications engineer, he would\u2019ve been a voice-over actor. The question is, would he have been as good at it as he is with Python and Django?. Graduated from the Polytechnic University of Madrid, he also went to Sweden to specialize in intelligent embedded systems. Today, there\u2019s no match for him programming APIs and designing software for the only Spanish CDN. An excellent handball player who\u2019s plagued by injuries, he\u2019s also one of those bikers that feel the road without showing off about it.\u00a0<\/span><\/em><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Security is the top priority everyone\u2019s after when, as in our case, you are the line of defense separating your [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":19669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[137],"tags":[138,139,140,141,142,143,144,145],"class_list":["post-15796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-optimizacion-en","tag-alto-rendimiento-en","tag-cdn-en","tag-distribucion-de-contenidos-en","tag-edgecomputing-en","tag-aceleracion-web-en","tag-cache-en","tag-web-en","tag-seguridad-web-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2FA and security - Transparent Edge<\/title>\n<meta name=\"description\" content=\"Security is our top priority. Discover how we increase the protection of our customers after implementing 2FA in our dashboard.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2FA and security - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"Security is our top priority. Discover how we increase the protection of our customers after implementing 2FA in our dashboard.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-01T06:21:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-23T11:43:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/07\/EN-_-Blog-_-Invisibles-1024x684.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ricardo Amador\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"El 2FA y la seguridad\" \/>\n<meta name=\"twitter:description\" content=\"Contamos c\u00f3mo hemos implementado el 2FA en nuestro panel para incrementar la seguridad de nuestros clientes.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/05\/seguridad-web.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/\"},\"author\":{\"name\":\"Ricardo Amador\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/63c9eff891ed853b0306fa0856998d76\"},\"headline\":\"2FA and security\",\"datePublished\":\"2022-06-01T06:21:52+00:00\",\"dateModified\":\"2024-08-23T11:43:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/EN-_-Blog-_-Invisibles.jpg\",\"keywords\":[\"alto rendimiento\",\"CDN\",\"distribuci\u00f3n de contenidos\",\"EdgeComputing\",\"Aceleraci\u00f3n web\",\"cache\",\"web\",\"seguridad web\"],\"articleSection\":[\"optimizaci\u00f3n\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/\",\"name\":\"2FA and security - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/EN-_-Blog-_-Invisibles.jpg\",\"datePublished\":\"2022-06-01T06:21:52+00:00\",\"dateModified\":\"2024-08-23T11:43:40+00:00\",\"description\":\"Security is our top priority. Discover how we increase the protection of our customers after implementing 2FA in our dashboard.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/EN-_-Blog-_-Invisibles.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/EN-_-Blog-_-Invisibles.jpg\",\"width\":8192,\"height\":5468},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/2fa-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2FA and security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/63c9eff891ed853b0306fa0856998d76\",\"name\":\"Ricardo Amador\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/ramadorp\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2FA and security - Transparent Edge","description":"Security is our top priority. Discover how we increase the protection of our customers after implementing 2FA in our dashboard.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/","og_locale":"en_US","og_type":"article","og_title":"2FA and security - Transparent Edge","og_description":"Security is our top priority. Discover how we increase the protection of our customers after implementing 2FA in our dashboard.","og_url":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/","og_site_name":"Transparent Edge","article_published_time":"2022-06-01T06:21:52+00:00","article_modified_time":"2024-08-23T11:43:40+00:00","og_image":[{"width":1024,"height":684,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/07\/EN-_-Blog-_-Invisibles-1024x684.jpg","type":"image\/jpeg"}],"author":"Ricardo Amador","twitter_card":"summary_large_image","twitter_title":"El 2FA y la seguridad","twitter_description":"Contamos c\u00f3mo hemos implementado el 2FA en nuestro panel para incrementar la seguridad de nuestros clientes.","twitter_image":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/05\/seguridad-web.jpg","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/"},"author":{"name":"Ricardo Amador","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/63c9eff891ed853b0306fa0856998d76"},"headline":"2FA and security","datePublished":"2022-06-01T06:21:52+00:00","dateModified":"2024-08-23T11:43:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/"},"wordCount":999,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/07\/EN-_-Blog-_-Invisibles.jpg","keywords":["alto rendimiento","CDN","distribuci\u00f3n de contenidos","EdgeComputing","Aceleraci\u00f3n web","cache","web","seguridad web"],"articleSection":["optimizaci\u00f3n"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/","url":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/","name":"2FA and security - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/07\/EN-_-Blog-_-Invisibles.jpg","datePublished":"2022-06-01T06:21:52+00:00","dateModified":"2024-08-23T11:43:40+00:00","description":"Security is our top priority. Discover how we increase the protection of our customers after implementing 2FA in our dashboard.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/blog\/2fa-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/07\/EN-_-Blog-_-Invisibles.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2022\/07\/EN-_-Blog-_-Invisibles.jpg","width":8192,"height":5468},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"2FA and security"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/63c9eff891ed853b0306fa0856998d76","name":"Ricardo Amador","sameAs":["https:\/\/www.linkedin.com\/in\/ramadorp\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=15796"}],"version-history":[{"count":3,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15796\/revisions"}],"predecessor-version":[{"id":19675,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/15796\/revisions\/19675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/19669"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=15796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=15796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=15796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}