{"id":5309,"date":"2022-10-04T22:13:44","date_gmt":"2022-10-05T05:13:44","guid":{"rendered":"https:\/\/www.strata.io\/?p=5309"},"modified":"2024-04-09T11:30:19","modified_gmt":"2024-04-09T18:30:19","slug":"how-adaptive-authorization-helps-achieve-zero-trust","status":"publish","type":"post","link":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/","title":{"rendered":"What is adaptive authentication & how does it enable zero trust?"},"content":{"rendered":"

[vc_row][vc_column][vc_single_image image=”5355″ img_size=”full”][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]The number zero is everywhere these days. You\u2019ve got zero-code, zero-day, Coke Zero, and of course \u2014 everyone\u2019s favorite \u2014 zero trust. What\u2019s the deal? These \u201czero\u201d terms all convey a baseline that is considered the ideal state. In the case of <\/span>zero trust<\/span><\/a>, zero means \u201ctrust no one and verify everything.\u201d\u00a0<\/span><\/p>\n

In theory, zero trust makes a lot of sense, but how realistic is it to achieve? It requires all apps and identities to adhere to modern authentication tools. How can an organization possibly verify everything when they have thousands of distributed apps and users, all of which require verifying?\u00a0<\/span><\/p>\n

Apps that are decades old and living on-premises don\u2019t understand modern authorization systems. We need a way to authenticate that bridges the gap between old and new. That\u2019s where adaptive authentication comes in.\u00a0<\/span><\/p>\n

Let\u2019s dive a bit deeper to understand the concept of \u201czero,\u201d what it means to cybersecurity, and how<\/span> adaptive authentication<\/span> through Identity Orchestration can help you achieve zero trust<\/a>.\u00a0<\/span><\/p>\n

The meaning of \u201czero\u201d<\/span><\/h2>\n

The concept of zero is relatively new to human thinking because you can\u2019t experience nothing (double negative intended). Rather, to understand zero requires that we recognize the lack of something. It\u2019s an abstract construct that exists only in our minds. Early humans couldn\u2019t grasp this, but as our brains got smarter over time, we began to comprehend complex thinking.\u00a0<\/span><\/p>\n

So how do you measure something that doesn’t exist? For Zero Trust, the success metric is when you have an iron-clad security environment that even the hackiest hacker can’t break into and destroy. That’s not likely to happen while passwords are being used to authenticate users. But passwords aren’t going to disappear anytime soon. So we adapt.<\/span><\/p>\n

What is adaptive authentication?<\/span><\/h2>\n

Adaptive authentication (also known as risk-based authentication) is a method of access to data that matches user credentials to the risk of the authorizations requested. The point of adaptive authentication is to fortify security while not making the process of logging in and authenticating more difficult than it has to be for the users.\u00a0<\/span><\/p>\n

This Dark Reading article<\/a> by Strata Identity’s CEO, Eric Olden explains that the friction caused by trying to implement zero trust practices ironically causes greater risk. With adaptive authentication, the identity management system can tell the location of the user, along with which network and device they are login on from, as well as if that device is misconfigured. Policy checks from the established content can be made to verify the user.<\/p>\n

Getting to zero trust with hybrid & multi-cloud<\/span><\/h2>\n

Adaptive authentication is similar to how our brains adapted to understanding new complex thinking. It takes a situation and puts context behind it to simplify processes while still understanding that change is gradual. Adaptive authentication is a context-based approach that can help organizations achieve a zero trust security architecture when implemented.\u00a0<\/span><\/p>\n

When someone within an organization tries to access a resource, adaptive authentication doesn\u2019t require them to re-authenticate themselves when there is no need. This reduces the irritation end-users often experience with multi-factor authentication when they have to use an authenticator app or prove in some other way that they are who they say they are.\u00a0\u00a0<\/span><\/p>\n

Yet, adaptive authentication can have implementation challenges. Any company that\u2019s been around for a while will have loads of older applications that can only authenticate with usernames and passwords. You could rewrite\/recode each app to understand new technology\u2026 if you had unlimited time and money\u2026<\/span><\/p>\n

Identity Orchestration is the key to making authentication work<\/span><\/h2>\n

A better way to enable adaptive \u2014 or risk-based \u2014 authentication than rewriting code is through <\/span>Identity Orchestration<\/span><\/a> software that makes modern and legacy apps and IDPs work together seamlessly. Identity Orchestration decouples applications from their identity systems to allow adaptive authentication to work throughout your infrastructure without having to touch your apps.\u00a0<\/span><\/p>\n

An Identity Orchestration platform uses an abstraction layer that integrates heterogeneous identity management systems to make many policies, APIs, and sessions work seamlessly together.\u00a0 Authentication is possible since it doesn\u2019t matter where your apps and identities are \u2014 on-prem or in the cloud, or both.\u00a0<\/span><\/p>\n

Adaptive authentication removes the extra step used in MFA, meaning that there\u2019s less chance of a user finding a way to bypass the extra security layer.\u00a0 Adaptive authentication through Identity Orchestration helps to make verifying users easier to for the protected information to be more secure. You may not have zero headaches, but you will be closer.\u00a0<\/span><\/p>\n

Learn how<\/span> Maverics Identity Orchestration<\/a> software <\/span>can help you have your legacy apps protected with modern authentication without changing the code.<\/span><\/p>\n

\n\t\t\t
\n\t\t\t\t

Modernize any app with any IDP in minutes. Join the 'Orchestration Kitchen' workshops.<\/strong><\/h3>\n\t\t\t\t

<\/p>\n\t\t\t<\/div>\n\t\t\t

\n\t\t\t\tDiscover sessions<\/a>\n\t\t\t<\/div>\n<\/div>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"[vc_row][vc_column][vc_single_image image=”5355″ img_size=”full”][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]The number zero is everywhere these days. You\u2019ve got zero-code, zero-day, Coke Zero, and of course \u2014 everyone\u2019s favorite \u2014 zero trust. What\u2019s the deal? These \u201czero\u201d terms all convey a baseline that is considered the ideal state. In the case of zero trust, zero means \u201ctrust no one and verify everything.\u201d\u00a0 In…","protected":false},"author":9,"featured_media":5355,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[93],"tags":[],"hashtags":[],"acf":[],"yoast_head":"\nWhat is Adaptive Authentication? | Help Achieve Zero Trust | Strata.io<\/title>\n<meta name=\"description\" content=\"Adaptive authentication is a context-based approach that can help organizations achieve a Zero Trust security architecture | Strata Blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is adaptive authentication & how does it enable zero trust?\" \/>\n<meta property=\"og:description\" content=\"Adaptive authentication is a context-based approach that can help organizations achieve a Zero Trust security architecture | Strata Blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Strata.io\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T05:13:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-09T18:30:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png\" \/>\n\t<meta property=\"og:image:width\" content=\"665\" \/>\n\t<meta property=\"og:image:height\" content=\"308\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Heidi King\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\"},\"author\":{\"name\":\"Heidi King\",\"@id\":\"https:\/\/www.strata.io\/#\/schema\/person\/49fd745b8135ac9ad7f046e93664574a\"},\"headline\":\"What is adaptive authentication & how does it enable zero trust?\",\"datePublished\":\"2022-10-05T05:13:44+00:00\",\"dateModified\":\"2024-04-09T18:30:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\"},\"wordCount\":812,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.strata.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png\",\"articleSection\":[\"App Identity Modernization\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\",\"url\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\",\"name\":\"What is Adaptive Authentication? | Help Achieve Zero Trust | Strata.io\",\"isPartOf\":{\"@id\":\"https:\/\/www.strata.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png\",\"datePublished\":\"2022-10-05T05:13:44+00:00\",\"dateModified\":\"2024-04-09T18:30:19+00:00\",\"description\":\"Adaptive authentication is a context-based approach that can help organizations achieve a Zero Trust security architecture | Strata Blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png\",\"contentUrl\":\"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png\",\"width\":665,\"height\":308,\"caption\":\"artistic zero on a blue wall\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.strata.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"App Identity Modernization\",\"item\":\"https:\/\/www.strata.io\/blog\/app-identity-modernization\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is adaptive authentication & how does it enable zero trust?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.strata.io\/#website\",\"url\":\"https:\/\/www.strata.io\/\",\"name\":\"Strata.io\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.strata.io\/#organization\"},\"alternateName\":\"Strata Identity\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.strata.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.strata.io\/#organization\",\"name\":\"Strata.io\",\"alternateName\":\"Strata Identity\",\"url\":\"https:\/\/www.strata.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.strata.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.strata.io\/wp-content\/uploads\/2024\/02\/Strata-Logo-1200x1200-1.png\",\"contentUrl\":\"https:\/\/www.strata.io\/wp-content\/uploads\/2024\/02\/Strata-Logo-1200x1200-1.png\",\"width\":1200,\"height\":1200,\"caption\":\"Strata.io\"},\"image\":{\"@id\":\"https:\/\/www.strata.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/strata-identity\/\",\"https:\/\/www.youtube.com\/channel\/UCgW8ZmUzknjF6chjFWgwMAg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.strata.io\/#\/schema\/person\/49fd745b8135ac9ad7f046e93664574a\",\"name\":\"Heidi King\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.strata.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ee9a4da2fd637871555bbe57a9c4f409?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ee9a4da2fd637871555bbe57a9c4f409?s=96&d=mm&r=g\",\"caption\":\"Heidi King\"},\"sameAs\":[\"http:\/\/strata.io\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Adaptive Authentication? | Help Achieve Zero Trust | Strata.io","description":"Adaptive authentication is a context-based approach that can help organizations achieve a Zero Trust security architecture | Strata Blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"What is adaptive authentication & how does it enable zero trust?","og_description":"Adaptive authentication is a context-based approach that can help organizations achieve a Zero Trust security architecture | Strata Blog.","og_url":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/","og_site_name":"Strata.io","article_published_time":"2022-10-05T05:13:44+00:00","article_modified_time":"2024-04-09T18:30:19+00:00","og_image":[{"width":665,"height":308,"url":"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png","type":"image\/png"}],"author":"Heidi King","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/"},"author":{"name":"Heidi King","@id":"https:\/\/www.strata.io\/#\/schema\/person\/49fd745b8135ac9ad7f046e93664574a"},"headline":"What is adaptive authentication & how does it enable zero trust?","datePublished":"2022-10-05T05:13:44+00:00","dateModified":"2024-04-09T18:30:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/"},"wordCount":812,"commentCount":0,"publisher":{"@id":"https:\/\/www.strata.io\/#organization"},"image":{"@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png","articleSection":["App Identity Modernization"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/","url":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/","name":"What is Adaptive Authentication? | Help Achieve Zero Trust | Strata.io","isPartOf":{"@id":"https:\/\/www.strata.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png","datePublished":"2022-10-05T05:13:44+00:00","dateModified":"2024-04-09T18:30:19+00:00","description":"Adaptive authentication is a context-based approach that can help organizations achieve a Zero Trust security architecture | Strata Blog.","breadcrumb":{"@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#primaryimage","url":"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png","contentUrl":"https:\/\/www.strata.io\/wp-content\/uploads\/2021\/11\/How-Adaptive-Auth-Zero-Trust-e1638223962433.png","width":665,"height":308,"caption":"artistic zero on a blue wall"},{"@type":"BreadcrumbList","@id":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/how-adaptive-authorization-helps-achieve-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.strata.io\/blog\/"},{"@type":"ListItem","position":2,"name":"App Identity Modernization","item":"https:\/\/www.strata.io\/blog\/app-identity-modernization\/"},{"@type":"ListItem","position":3,"name":"What is adaptive authentication & how does it enable zero trust?"}]},{"@type":"WebSite","@id":"https:\/\/www.strata.io\/#website","url":"https:\/\/www.strata.io\/","name":"Strata.io","description":"","publisher":{"@id":"https:\/\/www.strata.io\/#organization"},"alternateName":"Strata Identity","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.strata.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.strata.io\/#organization","name":"Strata.io","alternateName":"Strata Identity","url":"https:\/\/www.strata.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.strata.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.strata.io\/wp-content\/uploads\/2024\/02\/Strata-Logo-1200x1200-1.png","contentUrl":"https:\/\/www.strata.io\/wp-content\/uploads\/2024\/02\/Strata-Logo-1200x1200-1.png","width":1200,"height":1200,"caption":"Strata.io"},"image":{"@id":"https:\/\/www.strata.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/strata-identity\/","https:\/\/www.youtube.com\/channel\/UCgW8ZmUzknjF6chjFWgwMAg"]},{"@type":"Person","@id":"https:\/\/www.strata.io\/#\/schema\/person\/49fd745b8135ac9ad7f046e93664574a","name":"Heidi King","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.strata.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ee9a4da2fd637871555bbe57a9c4f409?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ee9a4da2fd637871555bbe57a9c4f409?s=96&d=mm&r=g","caption":"Heidi King"},"sameAs":["http:\/\/strata.io"]}]}},"_links":{"self":[{"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/posts\/5309"}],"collection":[{"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/comments?post=5309"}],"version-history":[{"count":11,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/posts\/5309\/revisions"}],"predecessor-version":[{"id":8226,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/posts\/5309\/revisions\/8226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/media\/5355"}],"wp:attachment":[{"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/media?parent=5309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/categories?post=5309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/tags?post=5309"},{"taxonomy":"hashtags","embeddable":true,"href":"https:\/\/www.strata.io\/wp-json\/wp\/v2\/hashtags?post=5309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}