{"id":1036,"date":"2020-06-17T15:50:21","date_gmt":"2020-06-17T10:20:21","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=1036"},"modified":"2023-02-01T11:04:24","modified_gmt":"2023-02-01T05:34:24","slug":"how-to-use-the-ldap-over-ssl-in-active-directory","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/","title":{"rendered":"How To Use The LDAP Over SSL In Active Directory"},"content":{"rendered":"<p>In addition to the option of working with signatures for access in Active Directory to achieve a higher level of security, data traffic in the network can also be secured via SSL. This prevents attackers from gaining administrator privileges in Active Directory.<\/p>\n<p>There are various ways to secure the data traffic in Active Directory. By default, network traffic between clients and domain controllers is hardly protected by LDAP and is also not encrypted. This is because conventional LDAP connections to port 389 are not encrypted. This can result in attackers using man-in-the-middle attacks being able to eavesdrop on the data traffic and thereby hijack permissions in Active Directory.<\/p>\n<p>This can initially be prevented by activating the LDAP signature and LDAP channel binding. If you want to ensure even more security reliably, you also activate LDAP over SSL (LDAPS) for domain controllers to encrypt the data traffic between clients and domain controllers. This protects data traffic in Active Directory in a similar way to HTTPS on websites. By default, LDAP uses port 389 for communication. After switching to data traffic over SSL, port 636 is used.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655df228d9a31\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655df228d9a31\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#Test_LDAPS_Connections\" title=\"Test LDAPS Connections\">Test LDAPS Connections<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#Use_Certificates_In_Active_Directory\" title=\"Use Certificates In Active Directory\">Use Certificates In Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#Use_LDAPS_Together_With_LDAP_Signature_And_LDAP_Channel\" title=\"Use LDAPS Together With LDAP Signature And LDAP Channel\">Use LDAPS Together With LDAP Signature And LDAP Channel<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#LDAPS_With_Windows_And_Linux\" title=\"LDAPS With Windows And Linux\">LDAPS With Windows And Linux<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Test_LDAPS_Connections\"><\/span>Test LDAPS Connections<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before installing and setting up LDAPS, the &#8220;ldp.exe&#8221; tool can be used on domain controllers to check which type of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Lightweight_Directory_Access_Protocol\"><span style=\"color: #0000ff;\"><strong>LDAP<\/strong> <\/span><\/a>connections are activated. In &#8220;Connection\\Connect&#8221;, first enter the name of the domain controller, select port 389, and then click on Connection. This shows whether the domain controller also accepts unsecured connections.<\/p>\n<p>To test SSL connections, port 636 is used and the &#8220;SSL&#8221; option is activated. Here you can see whether SSL connections are allowed. These should be used actively for the connection in the future. When activating LDAPS, i.e. LDAP over SSL, the port for the global catalog in Active Directory is also activated on 3269. Without SSL, port 3268 is used.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Use_Certificates_In_Active_Directory\"><\/span>Use Certificates In Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To secure Active Directory with LDAPS, certificates are first required for the domain controllers and computers in the network. Access to Active Directory is then secured using SSL certificates. The configuration of SSL for LDAP takes place on the command line and the PowerShell. There is no graphical user interface available.<\/p>\n<p>The certificates can come from a certification authority that is installed in Active Directory, or a SSL Certificate from outside is used. Self-signed certificates, without a certification authority, should not be used in productive networks, since the data traffic does not always work stably here, because the authentication of the certificates can cause problems. Active Directory Certificate Services are certainly the most suitable, but if possible they should not be installed directly on a domain controller, but on a member server.<\/p>\n<p>By installing the Active directory certificate services, all computers in the Active Directory automatically receive a certificate via group policy. This may take several minutes. With the command &#8220;gpupdate\/force&#8221; on the domain controller or a restart, the process can be accelerated. You can check whether the server has received a certificate in the administration of the certificates. The quickest way to do this is with the &#8220;certlm.msc&#8221; tool. The issued certificates can be seen under &#8220;Own certificates\\Certificates&#8221;.<\/p>\n<p>As soon as the domain controller has received its certificate, access via SSL should already work as described above. If the connection is not yet working, the server must be restarted. After that, the connection with SSL should work. For such a connection, each domain controller needs its certificate, which it automatically receives when using the Active directory certificate services. If another certificate provider is used, the certificate must be suitable for LDAPS.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Use_LDAPS_Together_With_LDAP_Signature_And_LDAP_Channel\"><\/span>Use LDAPS Together With LDAP Signature And LDAP Channel<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ideally, LDAPS should be used together with the LDAP signature and the LDAP channel binding. We describe this configuration in separate posts (see links at the end of this post). By activating the LDAP signature, requests to the domain controllers can no longer be falsified. This prevents man-in-the-middle attacks. If SSL is set for access in parallel, the data can no longer be read by unauthorized persons.<\/p>\n<p>If connections are signed consistently and encrypted at the same time, you can achieve maximum security. Activating the signature is an important basis for preventing man-in-the-middle attacks. Devices that establish an LDAP connection to domain controllers should at least use this function, it is better to use LDAPS in parallel.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"LDAPS_With_Windows_And_Linux\"><\/span>LDAPS With Windows And Linux<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If devices use LDAP, the connection to LDAPS should be activated on them. Most Linux distributions that connect to a domain controller using LDAP also support LDAPS. In this case, the certification authority must be configured as trustworthy in Linux. On Windows computers that are members of the same Active Directory forest, the certificate of the certification authority from the Active Directory certificate services is automatically integrated with group policies.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <a href=\"https:\/\/www.trendstechblog.com\/devops-should-focus-more-on-security\/\"><span style=\"color: #0000ff;\">DevOps Should Focus More On Securit<\/span>y<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In addition to the option of working with signatures for access in Active Directory to achieve a higher level of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1037,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[170],"tags":[193,194],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Use The LDAP Over SSL In Active Directory<\/title>\n<meta name=\"description\" content=\"In addition to the LDAP Over SSL In Active Directory option of working with signatures for access in Active Directory to achieve a higher level of security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Use The LDAP Over SSL In Active Directory\" \/>\n<meta property=\"og:description\" content=\"In addition to the LDAP Over SSL In Active Directory option of working with signatures for access in Active Directory to achieve a higher level of security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-17T10:20:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-01T05:34:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/How-To-Use-The-LDAP-Over-SSL-In-Active-Directory-Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"How To Use The LDAP Over SSL In Active Directory\",\"datePublished\":\"2020-06-17T10:20:21+00:00\",\"dateModified\":\"2023-02-01T05:34:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\"},\"wordCount\":806,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"LDAP\",\"SSL\"],\"articleSection\":[\"INTERNET\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\",\"url\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\",\"name\":\"How To Use The LDAP Over SSL In Active Directory\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-06-17T10:20:21+00:00\",\"dateModified\":\"2023-02-01T05:34:24+00:00\",\"description\":\"In addition to the LDAP Over SSL In Active Directory option of working with signatures for access in Active Directory to achieve a higher level of security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"INTERNET\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/internet\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How To Use The LDAP Over SSL In Active Directory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Use The LDAP Over SSL In Active Directory","description":"In addition to the LDAP Over SSL In Active Directory option of working with signatures for access in Active Directory to achieve a higher level of security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/","og_locale":"en_US","og_type":"article","og_title":"How To Use The LDAP Over SSL In Active Directory","og_description":"In addition to the LDAP Over SSL In Active Directory option of working with signatures for access in Active Directory to achieve a higher level of security.","og_url":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-06-17T10:20:21+00:00","article_modified_time":"2023-02-01T05:34:24+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/How-To-Use-The-LDAP-Over-SSL-In-Active-Directory-Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"How To Use The LDAP Over SSL In Active Directory","datePublished":"2020-06-17T10:20:21+00:00","dateModified":"2023-02-01T05:34:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/"},"wordCount":806,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["LDAP","SSL"],"articleSection":["INTERNET"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/","url":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/","name":"How To Use The LDAP Over SSL In Active Directory","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-06-17T10:20:21+00:00","dateModified":"2023-02-01T05:34:24+00:00","description":"In addition to the LDAP Over SSL In Active Directory option of working with signatures for access in Active Directory to achieve a higher level of security.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/how-to-use-the-ldap-over-ssl-in-active-directory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"INTERNET","item":"https:\/\/www.trendstechblog.com\/category\/internet\/"},{"@type":"ListItem","position":3,"name":"How To Use The LDAP Over SSL In Active Directory"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1036"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=1036"}],"version-history":[{"count":9,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1036\/revisions"}],"predecessor-version":[{"id":3748,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1036\/revisions\/3748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/1037"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=1036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=1036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=1036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}