{"id":8619,"date":"2024-01-04T10:42:47","date_gmt":"2024-01-04T10:42:47","guid":{"rendered":"https:\/\/ciit-training.com\/?p=8619"},"modified":"2024-01-04T19:16:53","modified_gmt":"2024-01-04T19:16:53","slug":"keacloak-integration-in-spring-anwendungen","status":"publish","type":"post","link":"https:\/\/ciit-training.com\/en\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/","title":{"rendered":"Keycloak Integration in Spring Applications"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"8619\" class=\"elementor elementor-8619\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28d38cc e-con-full e-flex e-con e-parent\" data-id=\"28d38cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0222579 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"0222579\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Keycloak is an open-source identity and access management tool widely used by Java developers to integrate security features into applications. It&#039;s especially useful for Spring Boot-based applications. In this short blog post, we&#039;ll explore Keycloak&#039;s uses, its configuration options, and how to integrate it into a Spring application.<\/p><h3>\u00a0<\/h3><h3>Use of Keycloak<\/h3><p>Keycloak is primarily used for authentication and authorization in modern web and mobile applications. It supports standard protocols such as OpenID Connect, OAuth 2.0, and SAML 2.0. This allows developers to secure their applications without having to worry about the details of the implementation.<\/p><h3>\u00a0<\/h3><h3>Configuration options<\/h3><p>Keycloak offers a wide variety of configuration options, making it very flexible:<\/p><ul><li><strong>User management<\/strong>You can manage users directly in Keycloak or integrate it with existing user databases such as LDAP or Active Directory.<\/li><li><strong>Fine-grained access control<\/strong>Keycloak allows the definition of detailed access rules and roles to control access to resources.<\/li><li><strong>Adjusting the registration process<\/strong>You can customize the login process by adding two-factor authentication, social login, and other login options.<\/li><li><strong>Token Management<\/strong>Keycloak simplifies the management of JWT tokens, session tokens, and other security tokens.<\/li><\/ul><h3>\u00a0<\/h3><h3>Integration into a Spring application<\/h3><p>Integrating Keycloak into a Spring application can be done in just a few steps:<\/p><ol><li><strong>Add dependencies<\/strong>Add the Keycloak Spring Boot Starter dependency to your <code>pom.xml<\/code> or <code>build.gradle<\/code> Add file.<\/li><li><strong>Configuration settings<\/strong>Define Keycloak-specific configuration settings in your <code>application.properties<\/code> or <code>application.yml<\/code> File. This includes the Keycloak server details, realm configuration, and client details.<\/li><li><strong>Security configuration<\/strong>Create a security configuration class that is used by <code>KeycloakWebSecurityConfigurerAdapter<\/code> inherits to establish the security rules.<\/li><li><strong>Protecting resources<\/strong>Use Spring Security annotations to control access to your resources based on the roles and permissions defined in Keycloak.<\/li><\/ol><h3>\u00a0<\/h3><h3>Conclusion<\/h3><p>Keycloak is a powerful tool for Java developers to integrate robust security mechanisms into their applications. With its support for standard protocols and numerous configuration options, it is an ideal solution for modern application development. Integration into a Spring application is relatively simple and straightforward thanks to the provided adapters and configuration options.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c211705 exad-sticky-section-no exad-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"c211705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2.avif\" class=\"attachment-large size-large wp-image-8675\" alt=\"\" srcset=\"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2.avif 1024w, https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2-300x300.avif 300w, https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2-150x150.avif 150w, https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2-768x768.avif 768w, https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2-12x12.avif 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Keycloak ist ein Open-Source-Identit\u00e4ts- und Zugriffsmanagementtool, das von Java-Entwicklern h\u00e4ufig genutzt wird, um Sicherheitsfunktionen in Anwendungen zu integrieren. Es ist besonders n\u00fctzlich f\u00fcr Anwendungen, die auf Spring Boot basieren. In diesem kurzen Blog werfen wir einen Blick darauf, wozu Keycloak genutzt wird, welche Konfigurationsm\u00f6glichkeiten es bietet und wie man es in eine Spring-Anwendung integrieren kann. [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":8675,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[45],"tags":[50,51],"class_list":["post-8619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wikipedia","tag-keycloak","tag-software-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keycloak Integration in Spring Anwendungen - CIIT Training<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ciit-training.com\/en\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keycloak Integration in Spring Anwendungen - CIIT Training\" \/>\n<meta property=\"og:description\" content=\"Keycloak ist ein Open-Source-Identit\u00e4ts- und Zugriffsmanagementtool, das von Java-Entwicklern h\u00e4ufig genutzt wird, um Sicherheitsfunktionen in Anwendungen zu integrieren. Es ist besonders n\u00fctzlich f\u00fcr Anwendungen, die auf Spring Boot basieren. In diesem kurzen Blog werfen wir einen Blick darauf, wozu Keycloak genutzt wird, welche Konfigurationsm\u00f6glichkeiten es bietet und wie man es in eine Spring-Anwendung integrieren kann. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ciit-training.com\/en\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/\" \/>\n<meta property=\"og:site_name\" content=\"CIIT Training\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/javatraining.at\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-04T10:42:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T19:16:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2023\/11\/CIIT_Logo_BrightBackground_Blau_ohne_at.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"wiki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@JavaTrainingAT\" \/>\n<meta name=\"twitter:site\" content=\"@JavaTrainingAT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wiki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/\"},\"author\":{\"name\":\"wiki\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#\\\/schema\\\/person\\\/da3b2b472673dcc7f0933808391c9ccf\"},\"headline\":\"Keycloak Integration in Spring Anwendungen\",\"datePublished\":\"2024-01-04T10:42:47+00:00\",\"dateModified\":\"2024-01-04T19:16:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/\"},\"wordCount\":345,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ciit-training.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/01\\\/keycloak2.avif\",\"keywords\":[\"keycloak\",\"software development\"],\"articleSection\":[\"Wikipedia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/\",\"url\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/\",\"name\":\"Keycloak Integration in Spring Anwendungen - CIIT Training\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ciit-training.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/01\\\/keycloak2.avif\",\"datePublished\":\"2024-01-04T10:42:47+00:00\",\"dateModified\":\"2024-01-04T19:16:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ciit-training.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/01\\\/keycloak2.avif\",\"contentUrl\":\"https:\\\/\\\/ciit-training.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/01\\\/keycloak2.avif\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/2024\\\/01\\\/04\\\/keacloak-integration-in-spring-anwendungen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ciit-training.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keycloak Integration in Spring Anwendungen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#website\",\"url\":\"https:\\\/\\\/ciit-training.com\\\/\",\"name\":\"CIIT Training\",\"description\":\"Javatraing\",\"publisher\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#organization\"},\"alternateName\":\"Javatraining\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ciit-training.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#organization\",\"name\":\"CIIT GmbH\",\"alternateName\":\"Schaffler & Gl\u00f6\u00dfl GmbH\",\"url\":\"https:\\\/\\\/ciit-training.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ciit-training.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/CIIT_Logo_BrightBackground_Blau_ohne_at.png\",\"contentUrl\":\"https:\\\/\\\/ciit-training.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/CIIT_Logo_BrightBackground_Blau_ohne_at.png\",\"width\":512,\"height\":512,\"caption\":\"CIIT GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/javatraining.at\",\"https:\\\/\\\/x.com\\\/JavaTrainingAT\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/javatraining.at\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ciit-training.com\\\/#\\\/schema\\\/person\\\/da3b2b472673dcc7f0933808391c9ccf\",\"name\":\"wiki\",\"url\":\"https:\\\/\\\/ciit-training.com\\\/en\\\/author\\\/wiki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keycloak Integration in Spring Anwendungen - CIIT Training","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ciit-training.com\/en\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/","og_locale":"en_US","og_type":"article","og_title":"Keycloak Integration in Spring Anwendungen - CIIT Training","og_description":"Keycloak ist ein Open-Source-Identit\u00e4ts- und Zugriffsmanagementtool, das von Java-Entwicklern h\u00e4ufig genutzt wird, um Sicherheitsfunktionen in Anwendungen zu integrieren. Es ist besonders n\u00fctzlich f\u00fcr Anwendungen, die auf Spring Boot basieren. In diesem kurzen Blog werfen wir einen Blick darauf, wozu Keycloak genutzt wird, welche Konfigurationsm\u00f6glichkeiten es bietet und wie man es in eine Spring-Anwendung integrieren kann. [&hellip;]","og_url":"https:\/\/ciit-training.com\/en\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/","og_site_name":"CIIT Training","article_publisher":"https:\/\/www.facebook.com\/javatraining.at","article_published_time":"2024-01-04T10:42:47+00:00","article_modified_time":"2024-01-04T19:16:53+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2023\/11\/CIIT_Logo_BrightBackground_Blau_ohne_at.png","type":"image\/png"}],"author":"wiki","twitter_card":"summary_large_image","twitter_creator":"@JavaTrainingAT","twitter_site":"@JavaTrainingAT","twitter_misc":{"Written by":"wiki","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#article","isPartOf":{"@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/"},"author":{"name":"wiki","@id":"https:\/\/ciit-training.com\/#\/schema\/person\/da3b2b472673dcc7f0933808391c9ccf"},"headline":"Keycloak Integration in Spring Anwendungen","datePublished":"2024-01-04T10:42:47+00:00","dateModified":"2024-01-04T19:16:53+00:00","mainEntityOfPage":{"@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/"},"wordCount":345,"commentCount":0,"publisher":{"@id":"https:\/\/ciit-training.com\/#organization"},"image":{"@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#primaryimage"},"thumbnailUrl":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2.avif","keywords":["keycloak","software development"],"articleSection":["Wikipedia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/","url":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/","name":"Keycloak Integration in Spring Anwendungen - CIIT Training","isPartOf":{"@id":"https:\/\/ciit-training.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#primaryimage"},"image":{"@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#primaryimage"},"thumbnailUrl":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2.avif","datePublished":"2024-01-04T10:42:47+00:00","dateModified":"2024-01-04T19:16:53+00:00","breadcrumb":{"@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#primaryimage","url":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2.avif","contentUrl":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2024\/01\/keycloak2.avif","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/ciit-training.com\/2024\/01\/04\/keacloak-integration-in-spring-anwendungen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ciit-training.com\/"},{"@type":"ListItem","position":2,"name":"Keycloak Integration in Spring Anwendungen"}]},{"@type":"WebSite","@id":"https:\/\/ciit-training.com\/#website","url":"https:\/\/ciit-training.com\/","name":"CIIT Training","description":"Java training","publisher":{"@id":"https:\/\/ciit-training.com\/#organization"},"alternateName":"Javatraining","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ciit-training.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ciit-training.com\/#organization","name":"CIIT GmbH","alternateName":"Schaffler & Gl\u00f6\u00dfl GmbH","url":"https:\/\/ciit-training.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ciit-training.com\/#\/schema\/logo\/image\/","url":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2023\/11\/CIIT_Logo_BrightBackground_Blau_ohne_at.png","contentUrl":"https:\/\/ciit-training.com\/wp-content\/uploads\/sites\/2\/2023\/11\/CIIT_Logo_BrightBackground_Blau_ohne_at.png","width":512,"height":512,"caption":"CIIT GmbH"},"image":{"@id":"https:\/\/ciit-training.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/javatraining.at","https:\/\/x.com\/JavaTrainingAT","https:\/\/www.linkedin.com\/showcase\/javatraining.at\/"]},{"@type":"Person","@id":"https:\/\/ciit-training.com\/#\/schema\/person\/da3b2b472673dcc7f0933808391c9ccf","name":"wiki","url":"https:\/\/ciit-training.com\/en\/author\/wiki\/"}]}},"_links":{"self":[{"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/posts\/8619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/comments?post=8619"}],"version-history":[{"count":0,"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/posts\/8619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/media\/8675"}],"wp:attachment":[{"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/media?parent=8619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/categories?post=8619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ciit-training.com\/en\/wp-json\/wp\/v2\/tags?post=8619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}