{"id":4978,"date":"2022-09-14T13:43:49","date_gmt":"2022-09-14T13:43:49","guid":{"rendered":"https:\/\/www.cloudmetrik.com\/?p=4978"},"modified":"2022-09-20T10:22:56","modified_gmt":"2022-09-20T10:22:56","slug":"iam-in-cloud-computing-security","status":"publish","type":"post","link":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/","title":{"rendered":"IAM in Cloud Computing Security"},"content":{"rendered":"<p><strong>Cloud computing<\/strong> provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. Concurrent access to shared resources has increased <strong>security loopholes<\/strong> and threats to the services running on cloud resources. Hence, identity and access management <strong>(IAM)<\/strong> is an imperative requirement in <strong>cloud computing<\/strong>. A cloud engineer should impose high application-level and network-level security compared to archaic approaches to avoid threats such as phishing attacks, denial-of service attacks, and man-in the-middle attacks. This article describes popular <strong>IAM<\/strong> patterns used in <strong>cloud computing<\/strong>.<\/p>\n<p>Cloud-based clusters are primarily categorized into public clouds, private clouds, and hybrid clouds. Public clouds are offered by third party providers over the public internet, making them available to any interested parties. Private clouds are isolated from public clouds and are operated on more secure private networks. Hybrid clouds combine private and public clouds. Furthermore, cloud-based clusters are exposed through different models, such as infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), and serverless.<\/p>\n<p>Nowadays, a wide variety of free and commercial applications use IaaS, PaaS, SaaS, and serverless models.For instance, science gateways have been devel\u2010 oped to enable research communities to easily manage and run their experiments on high-performance computing (HPC) systems. Those gateways are integrated into middleware that connects to the HPC cluster and manages experiments on behalf of gateway users. This multitenant middleware should be capable of providing seamless access to HPC resources for end users. HPC clusters are widely deployed on private clouds with high security privileges. Hence, accessing HPC resources requires specific SSH keys, certificates, and password credentials. Thus, credential management, authentication and authorization, resource sharing, and access control are trivial requirements.<\/p>\n<p>Furthermore, consider an application development platform that exposes APIs to develop retail support applications such as online shopping and data analytics apps. This platform should connect to Salesforce services, Shopify services, Google services, and Facebook services. End users create accounts on the platform and don\u2019t know of the existence of backend cloud services. Hence, the middleware should be able to successfully orchestrate cloud services, manage access credentials, and handle API authorization for cloud services.<\/p>\n<p>By considering the aforementioned use cases and widely used industry practices, we can identify the basic elements of <strong>IAM<\/strong> as identities and groups, relationships, credentials, and entitlements. User accounts, user groups, user claims, user attributes, and user roles are amalgamated as identities and groups. Relationships describe the dependencies between identities, groups, attributes, and roles. Credentials represent the access keys of users and resources. Entitlements describe the access policies for users, groups, credentials, and relationships. Role-based access control, group-based access control, attribute-based access control, and policy-based access control are widely used access control principles.<\/p>\n<p><strong>IAM<\/strong> patterns are articulated from the aforementioned <strong>IAM<\/strong> elements. Delegated identity management (DIM), federated identity management (FIM), sharing, and synchronization are the most popular <strong>IAM<\/strong> patterns. The DIM pattern employs identity brokers to connect with external identity providers(IdPs), and identity brokers are responsible for just-in-time (JIT) provisioning. FIM agrees to trust different domains to allow applications to consume services across domains via a single user identity. Identity federation is categorized into inbound identity federation and outbound identity federation. Inbound identity federation allows external users to consume internal services, while outbound identity federation allows internal users to consume external applications. Sharing enables the common use of elements of <strong>IAM<\/strong> for services and applications. However, sharing may have limitations if user stores and applications reside in different domains. Synchronization is used to replicate data stores and application stores among different services.<\/p>\n<p>Numerous technologies and protocols are used to implement the aforementioned <strong>IAM<\/strong> patterns. OAuth 2.0 is an industry-standard protocol for authorization. This simplifies client development and integration with identity servers. OAuth 2.0 is built on elements such as scopes, grant types, and client types. Scopes limit access to user identities for applications. Grant types are OAuth flows of user authentication; widely used grant types include Authorization Code, Client Credentials, Resource Owner Password, and Refresh Token. OpenID Authentication 2.0 is an authentication federation protocol that relying parties can use to obtain verified identities from IdPs.OpenID Connect is an extension of OAuth 2.0 that is used by clients to obtain users\u2019 account attributes via claims. The System for Cross-domain Identity Management (SCIM) protocol is used to synchronize user stores residing in different domains.<\/p>\n<p>Using <strong>IAM<\/strong> elements, <strong>IAM<\/strong> patterns, and integration protocols, numerous <strong>IAM<\/strong> cloud solutions are developed and consumed by a wide range of services and applications. Single sign-on (SSO), shared logins, service accounts, multifactor authentication, and identity linking are the most popular identity solutions provided by vendors in the security industry.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cloud computing provides a shared network, computing capacity, memory, and  [&#8230;]<\/p>","protected":false},"author":4,"featured_media":4983,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[121,126,132],"tags":[123,127,130,131],"class_list":["post-4978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","category-cloud-security","category-iam","tag-cloud-computing","tag-cloud-security","tag-iam","tag-iam-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Popular IAM Patterns - IAM in Cloud Computing Security<\/title>\n<meta name=\"description\" content=\"Cloud computing provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. IAM...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Popular IAM Patterns - IAM in Cloud Computing Security\" \/>\n<meta property=\"og:description\" content=\"Cloud computing provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. IAM...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudMetrik\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-14T13:43:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-20T10:22:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/09\/SL-101820-36860-11-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Munevver Sahin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Munevver Sahin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/\"},\"author\":{\"name\":\"Munevver Sahin\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#\\\/schema\\\/person\\\/61fb277fd7d0442b21be5ff8c063b80e\"},\"headline\":\"IAM in Cloud Computing Security\",\"datePublished\":\"2022-09-14T13:43:49+00:00\",\"dateModified\":\"2022-09-20T10:22:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/\"},\"wordCount\":773,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudmetrik.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/SL-101820-36860-11-scaled.jpg\",\"keywords\":[\"Cloud Computing\",\"Cloud Security\",\"IAM\",\"IAM Security\"],\"articleSection\":[\"Cloud Computing\",\"Cloud Security\",\"IAM\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/\",\"url\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/\",\"name\":\"Popular IAM Patterns - IAM in Cloud Computing Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudmetrik.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/SL-101820-36860-11-scaled.jpg\",\"datePublished\":\"2022-09-14T13:43:49+00:00\",\"dateModified\":\"2022-09-20T10:22:56+00:00\",\"description\":\"Cloud computing provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. IAM...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cloudmetrik.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/SL-101820-36860-11-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cloudmetrik.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/SL-101820-36860-11-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"cloud computing polygonal wireframe technology concept background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/iam-in-cloud-computing-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudmetrik.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAM in Cloud Computing Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudmetrik.com\\\/\",\"name\":\"CloudMetrik\",\"description\":\"modernize, optimize and transform your cloud with AWS, Huawei Cloud, GCP and Azure Consultation\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudmetrik.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#organization\",\"name\":\"CloudMetrik Cloud Consultancy and Training Services\",\"url\":\"https:\\\/\\\/www.cloudmetrik.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cloudmetrik.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/cloudmetriklogo_turuncumavi.png\",\"contentUrl\":\"https:\\\/\\\/www.cloudmetrik.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/cloudmetriklogo_turuncumavi.png\",\"width\":2480,\"height\":581,\"caption\":\"CloudMetrik Cloud Consultancy and Training Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cloudmetrik\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudmetrik.com\\\/#\\\/schema\\\/person\\\/61fb277fd7d0442b21be5ff8c063b80e\",\"name\":\"Munevver Sahin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db47daba7f7aca4952aa1b2b880b919483d8bc9b93ff70676fe5f06678df509a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db47daba7f7aca4952aa1b2b880b919483d8bc9b93ff70676fe5f06678df509a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db47daba7f7aca4952aa1b2b880b919483d8bc9b93ff70676fe5f06678df509a?s=96&d=mm&r=g\",\"caption\":\"Munevver Sahin\"},\"url\":\"https:\\\/\\\/www.cloudmetrik.com\\\/tr\\\/author\\\/msahin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Popular IAM Patterns - IAM in Cloud Computing Security","description":"Cloud computing provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. IAM...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/","og_locale":"tr_TR","og_type":"article","og_title":"Popular IAM Patterns - IAM in Cloud Computing Security","og_description":"Cloud computing provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. IAM...","og_url":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/","og_site_name":"CloudMetrik","article_published_time":"2022-09-14T13:43:49+00:00","article_modified_time":"2022-09-20T10:22:56+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/09\/SL-101820-36860-11-scaled.jpg","type":"image\/jpeg"}],"author":"Munevver Sahin","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Munevver Sahin","Tahmini okuma s\u00fcresi":"4 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#article","isPartOf":{"@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/"},"author":{"name":"Munevver Sahin","@id":"https:\/\/www.cloudmetrik.com\/#\/schema\/person\/61fb277fd7d0442b21be5ff8c063b80e"},"headline":"IAM in Cloud Computing Security","datePublished":"2022-09-14T13:43:49+00:00","dateModified":"2022-09-20T10:22:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/"},"wordCount":773,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudmetrik.com\/#organization"},"image":{"@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/09\/SL-101820-36860-11-scaled.jpg","keywords":["Cloud Computing","Cloud Security","IAM","IAM Security"],"articleSection":["Cloud Computing","Cloud Security","IAM"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/","url":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/","name":"Popular IAM Patterns - IAM in Cloud Computing Security","isPartOf":{"@id":"https:\/\/www.cloudmetrik.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/09\/SL-101820-36860-11-scaled.jpg","datePublished":"2022-09-14T13:43:49+00:00","dateModified":"2022-09-20T10:22:56+00:00","description":"Cloud computing provides a shared network, computing capacity, memory, and storage on demand for a vast set of concurrent consumers. IAM...","breadcrumb":{"@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#primaryimage","url":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/09\/SL-101820-36860-11-scaled.jpg","contentUrl":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/09\/SL-101820-36860-11-scaled.jpg","width":2560,"height":1707,"caption":"cloud computing polygonal wireframe technology concept background"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudmetrik.com\/tr\/iam-in-cloud-computing-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudmetrik.com\/"},{"@type":"ListItem","position":2,"name":"IAM in Cloud Computing Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudmetrik.com\/#website","url":"https:\/\/www.cloudmetrik.com\/","name":"CloudMetrik","description":"modernize, optimize and transform your cloud with AWS, Huawei Cloud, GCP and Azure Consultation","publisher":{"@id":"https:\/\/www.cloudmetrik.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudmetrik.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/www.cloudmetrik.com\/#organization","name":"CloudMetrik Cloud Consultancy and Training Services","url":"https:\/\/www.cloudmetrik.com\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.cloudmetrik.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/01\/cloudmetriklogo_turuncumavi.png","contentUrl":"https:\/\/www.cloudmetrik.com\/wp-content\/uploads\/2022\/01\/cloudmetriklogo_turuncumavi.png","width":2480,"height":581,"caption":"CloudMetrik Cloud Consultancy and Training Services"},"image":{"@id":"https:\/\/www.cloudmetrik.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cloudmetrik\/"]},{"@type":"Person","@id":"https:\/\/www.cloudmetrik.com\/#\/schema\/person\/61fb277fd7d0442b21be5ff8c063b80e","name":"Munevver Sahin","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/db47daba7f7aca4952aa1b2b880b919483d8bc9b93ff70676fe5f06678df509a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db47daba7f7aca4952aa1b2b880b919483d8bc9b93ff70676fe5f06678df509a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db47daba7f7aca4952aa1b2b880b919483d8bc9b93ff70676fe5f06678df509a?s=96&d=mm&r=g","caption":"Munevver Sahin"},"url":"https:\/\/www.cloudmetrik.com\/tr\/author\/msahin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/posts\/4978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/comments?post=4978"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/posts\/4978\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/media\/4983"}],"wp:attachment":[{"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/media?parent=4978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/categories?post=4978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudmetrik.com\/tr\/wp-json\/wp\/v2\/tags?post=4978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}