{"id":104205,"date":"2022-11-19T15:13:40","date_gmt":"2022-11-19T15:13:40","guid":{"rendered":"https:\/\/websitedesigns.com.au\/elankanew\/?p=104205"},"modified":"2022-11-19T15:16:26","modified_gmt":"2022-11-19T15:16:26","slug":"changing-identity-management-methods-by-aditya-abeysinghe","status":"publish","type":"post","link":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/","title":{"rendered":"Changing identity management methods &#8211; By Aditya Abeysinghe"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span style=\"color: #000080;\"><strong>Changing identity management methods &#8211; <\/strong><span style=\"color: #666699;\"><strong>By Aditya Abeysinghe<\/strong><\/span><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-75845 alignleft\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/10\/Aditya-Abeysinghe160.jpg\" alt=\"Aditya-Abeysinghe\" width=\"160\" height=\"141\" \/><span style=\"font-size: 16px;\">Identity management<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\">Identity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access to a resource. It is a term used to describe a range of methods that identifies and authorizes people, groups, and apps using access management rights. With this method, only authorized people, groups of people, and external services can request or use a service or product which could reduce attacks to data, applications or services, and hardware. Identity management is only a defense used to minimize attacks by preventing unauthorized access and is often added using an identity service and an authorization service.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\"><strong>Traditional IAM methods<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\">Sign in with a username and password has been the typical method to authenticate users. It is still the most used method for authenticating users to products and applications. The method used to authenticate a user with a username and password differs based on whether it is used within a device, within a software, or within a remote environment. However, this method often poses a risk to a resource if the username and\/or password could be attacked. Many methods to overcome issues with this method have been used.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-104206\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg\" alt=\"Changing identity management methods\" width=\"600\" height=\"400\" \/><\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\">Using an additional method to authenticate users is one method to overcome issues with usernames and passwords. This is often called Multi-Factor Authentication (MFA) and is often used with a code that is sent in a text or email message. MFA is used as the main additional method in systems which use username and password for user identity. Many other methods for using MFA have been used with higher security.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\">Tokens are typically the method used in validating web service or external service-related calls. With access tokens, data including user permissions, roles, and policies for the user request is sent by an authentication server to the user. With access tokens, the payload (information about the user, resources, and other data used for authentication), the header (data about the token type), and signature is sent to a user. Tokens are often temporary methods used to access resources and often are invalid after a period.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\"><strong>New methods for IAM<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\">Adaptive MFA is a new method used to authenticate users. With adaptive MFA, MFA can be used to change the method used to access resources. A common use of this method is when a user uses the same resource when travelling, working with a network of an organization, and when accessing them from a remote location. Using this type of user authentication, methods addition to MFA can be used when a user is working from a location outside an organization and easier methods to sign on such as use of identification tags after the initial login can be used when inside an organization.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\">Biometric methods are also emerging as user authentication methods to access resources.\u00a0 Facial recognition, retina scans, and fingerprint mapping are some methods used to access resources. These are commonly used to reduce hassle of frequently using username and password-based logins to the same device or application. They are often used in addition to a username\/password or pattern-based method to allow users to login when scanning biometrics fail. However, they are often more secure if the scanning is accurate as it identifies the user rather than data entered to a resource.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-size: 16px;\"><strong>Image courtesy: <\/strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/www.perfecto.io\/\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/www.perfecto.io\/<\/strong><\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Changing identity management methods &#8211; By Aditya Abeysinghe Identity management Identity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access to a resource. It is a term used to describe a range of methods that identifies and authorizes people, groups, and apps using access management rights. With this [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":104206,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[33978,20],"tags":[49498,49497,49500,49499],"class_list":{"0":"post-104205","1":"post","2":"type-post","3":"status-publish","4":"format-aside","5":"has-post-thumbnail","7":"category-aditya-abeysinghe","8":"category-articles","9":"tag-access-management-rights","10":"tag-identity-and-access-management","11":"tag-identity-management","12":"tag-traditional-iam-methods","13":"post_format-post-format-aside"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Changing identity management methods - By Aditya Abeysinghe - eLanka<\/title>\n<meta name=\"description\" content=\"Identity managementIdentity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Changing identity management methods - By Aditya Abeysinghe\" \/>\n<meta property=\"og:description\" content=\"Identity managementIdentity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access\" \/>\n<meta property=\"og:url\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/\" \/>\n<meta property=\"og:site_name\" content=\"eLanka\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eLanka.com.au\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-19T15:13:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-19T15:16:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eLanka admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eLanka admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/\"},\"author\":{\"name\":\"eLanka admin\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\"},\"headline\":\"Changing identity management methods &#8211; By Aditya Abeysinghe\",\"datePublished\":\"2022-11-19T15:13:40+00:00\",\"dateModified\":\"2022-11-19T15:16:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/\"},\"wordCount\":568,\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg\",\"keywords\":[\"access management rights\",\"Identity and Access Management\",\"Identity management\",\"Traditional IAM methods\"],\"articleSection\":[\"Aditya Abeysinghe\",\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/\",\"name\":\"Changing identity management methods - By Aditya Abeysinghe - eLanka\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg\",\"datePublished\":\"2022-11-19T15:13:40+00:00\",\"dateModified\":\"2022-11-19T15:16:26+00:00\",\"description\":\"Identity managementIdentity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access\",\"breadcrumb\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg\",\"width\":600,\"height\":400,\"caption\":\"Changing identity management methods\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Changing identity management methods &#8211; By Aditya Abeysinghe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"name\":\"eLanka\",\"description\":\"eLanka - Sri lanka events in Australia\",\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\",\"name\":\"eLanka\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"width\":192,\"height\":82,\"caption\":\"eLanka\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/eLanka.com.au\/\",\"https:\/\/www.linkedin.com\/in\/elanka\/\",\"https:\/\/www.youtube.com\/user\/SriLankanDownUnder\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\",\"name\":\"eLanka admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"caption\":\"eLanka admin\"},\"sameAs\":[\"https:\/\/websitedesigns.com.au\/elankanew\"],\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Changing identity management methods - By Aditya Abeysinghe - eLanka","description":"Identity managementIdentity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Changing identity management methods - By Aditya Abeysinghe","og_description":"Identity managementIdentity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access","og_url":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/","og_site_name":"eLanka","article_publisher":"https:\/\/www.facebook.com\/eLanka.com.au\/","article_published_time":"2022-11-19T15:13:40+00:00","article_modified_time":"2022-11-19T15:16:26+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg","type":"image\/jpeg"}],"author":"eLanka admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eLanka admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#article","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/"},"author":{"name":"eLanka admin","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd"},"headline":"Changing identity management methods &#8211; By Aditya Abeysinghe","datePublished":"2022-11-19T15:13:40+00:00","dateModified":"2022-11-19T15:16:26+00:00","mainEntityOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/"},"wordCount":568,"publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg","keywords":["access management rights","Identity and Access Management","Identity management","Traditional IAM methods"],"articleSection":["Aditya Abeysinghe","Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/","name":"Changing identity management methods - By Aditya Abeysinghe - eLanka","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg","datePublished":"2022-11-19T15:13:40+00:00","dateModified":"2022-11-19T15:16:26+00:00","description":"Identity managementIdentity management, also called Identity and Access Management (IAM), is a method used to prevent unauthorized access","breadcrumb":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#primaryimage","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2022\/11\/Changing-identity-and-access-management-methods.jpg","width":600,"height":400,"caption":"Changing identity management methods"},{"@type":"BreadcrumbList","@id":"https:\/\/websitedesigns.com.au\/elankanew\/changing-identity-management-methods-by-aditya-abeysinghe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/websitedesigns.com.au\/elankanew\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/"},{"@type":"ListItem","position":3,"name":"Changing identity management methods &#8211; By Aditya Abeysinghe"}]},{"@type":"WebSite","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website","url":"https:\/\/websitedesigns.com.au\/elankanew\/","name":"eLanka","description":"eLanka - Sri lanka events in Australia","publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization","name":"eLanka","url":"https:\/\/websitedesigns.com.au\/elankanew\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","width":192,"height":82,"caption":"eLanka"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eLanka.com.au\/","https:\/\/www.linkedin.com\/in\/elanka\/","https:\/\/www.youtube.com\/user\/SriLankanDownUnder"]},{"@type":"Person","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd","name":"eLanka admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","caption":"eLanka admin"},"sameAs":["https:\/\/websitedesigns.com.au\/elankanew"],"url":"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/"}]}},"_links":{"self":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/104205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/comments?post=104205"}],"version-history":[{"count":3,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/104205\/revisions"}],"predecessor-version":[{"id":104209,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/104205\/revisions\/104209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media\/104206"}],"wp:attachment":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media?parent=104205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/categories?post=104205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/tags?post=104205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}