{"id":102,"date":"2022-05-05T10:09:41","date_gmt":"2022-05-05T04:39:41","guid":{"rendered":"https:\/\/www.adsumsoftware.com\/blog\/\/?p=102"},"modified":"2023-01-20T22:49:07","modified_gmt":"2023-01-20T17:19:07","slug":"rest-apis-security-principles","status":"publish","type":"post","link":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles","title":{"rendered":"Security Principles for REST APIs:\u00a02023"},"content":{"rendered":"\n<p>REST is an architectural style for distributed hypermedia systems that stands for REpresentational State Transfer. It was first presented in Roy Fielding\u2019s famous dissertation in 2000.<\/p>\n\n\n\n<p>REST has its own set of guiding principles and constraints, just like other architectural styles. If a service interface is to be called RESTful, it must adhere to these standards.<\/p>\n\n\n\n<div style=\"color:#ddd\" class=\"wp-block-genesis-blocks-gb-spacer gb-block-spacer gb-divider-solid gb-divider-size-1\"><hr style=\"height:30px\"\/><\/div>\n\n\n\n<p><strong>What is a REST API?<\/strong><\/p>\n\n\n\n<p><br>REST stands for Representational State Transfer, and it\u2019s more of a philosophy than a single tool or programming library when it comes to design and communication. RESTful programming is stateless and delivers a consistent user experience, typically using HTTP-based URLs with query parameters that hide the backend architecture from the user. APIs can support any sort of material, including XML, test documents, and even photos, and often return basic JSON-based key\/value pairs. The data can then be served up in a user-friendly format by front-end software.<\/p>\n\n\n\n<p><br>REST APIs are a common process in today\u2019s cloud-based software economy. Even from a wide data source, they can serve accurate information. For example, your app can use Amazon\u2019s API to retrieve product pricing or Google Maps to get a geographic position. It can also query a complicated back-end service that requires a lot of computer resources. Do you want a service that can add descriptive text to a photo or detect someone\u2019s face? That\u2019s what Microsoft\u2019s REST-based API does.<\/p>\n\n\n\n<p><br>Following exchanges are normally carried out through HTTP:<\/p>\n\n\n\n<ul>\n<li>GET: The GET method is used to get data from a REST API for a given resource.<\/li>\n\n\n\n<li>POST: A child resource will be created under a collection of resources when you use the POST method.<\/li>\n\n\n\n<li>PUT: The PUT method is used for updating the entire resource.<\/li>\n\n\n\n<li>PATCH: The PATCH method is used for updating the partial resource.<\/li>\n\n\n\n<li>DELETE: The DELETE method is used to remove the resource.<\/li>\n<\/ul>\n\n\n\n<div style=\"color:#ddd\" class=\"wp-block-genesis-blocks-gb-spacer gb-block-spacer gb-divider-solid gb-divider-size-1\"><hr style=\"height:30px\"\/><\/div>\n\n\n\n<p><a href=\"https:\/\/blog.postman.com\/api-growth-rate\/\">REST API Growth:<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adsumsoftware.com\/enquiry\"><img decoding=\"async\" src=\"https:\/\/www.adsumsoftware.com\/public\/uploads\/blog\/main\/2022\/02\/REST-API-Growth-Graph.jpeg\" alt=\"REST-API-Growth-Graph\"\/><\/a><\/figure>\n\n\n\n<p><br>Postman\u2019s API Platform is now developed by over 17 million developers in over 800,000 companies throughout the world, giving it a unique perspective on the API explosion: Between 2016 and 2020, the number of Postman Collections\u200a\u2014\u200abasically folders where API developers put their API queries together\u200a\u2014\u200aincreased from fewer than half a million to roughly 35 million. (There was a more than 100 percent rise in the number of people between January 2019 and January 2020, from 17.4 million to 34.9 million.) UPDATE: As of January 2021, the total number of collections had topped 46 million.<\/p>\n\n\n\n<div style=\"color:#ddd\" class=\"wp-block-genesis-blocks-gb-spacer gb-block-spacer gb-divider-solid gb-divider-size-1\"><hr style=\"height:20px\"\/><\/div>\n\n\n\n<p><br><strong>REST API Usage:<\/strong><\/p>\n\n\n\n<p>The REST API allows different types of data formats:&nbsp;<\/p>\n\n\n\n<ul>\n<li>application\/xml<\/li>\n\n\n\n<li>application\/json<\/li>\n\n\n\n<li>multipart\/form-data<\/li>\n\n\n\n<li>application\/x-wbe+xml<\/li>\n\n\n\n<li>application\/x-www-form-urlencoded<br><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"javascript:void(0);\"><img decoding=\"async\" src=\"https:\/\/www.adsumsoftware.com\/public\/uploads\/blog\/main\/2022\/02\/rest-api-flow.jpg\" alt=\"rest-api-flow\"\/><\/a><\/figure>\n\n\n\n<div style=\"color:#ddd\" class=\"wp-block-genesis-blocks-gb-spacer gb-block-spacer gb-divider-solid gb-divider-size-1\"><hr style=\"height:23px\"\/><\/div>\n\n\n\n<p><strong>What are some good REST API development and testing practices?<\/strong><\/p>\n\n\n\n<ul>\n<li>Use JSON<\/li>\n\n\n\n<li>Error Handling<\/li>\n\n\n\n<li>API Documentation<\/li>\n\n\n\n<li>Use Nouns instead of Verbs<\/li>\n\n\n\n<li>Use a comprehensive API testing tool<\/li>\n\n\n\n<li>Always start with API smoke and sanity testing<\/li>\n\n\n\n<li>Versioning<\/li>\n\n\n\n<li>Name the collections using Plural Nouns<\/li>\n\n\n\n<li>Using SSL\/TLS<\/li>\n\n\n\n<li>Use resource nesting to show relations or hierarchy<\/li>\n\n\n\n<li>Filtering, sorting, paging, and field selection<\/li>\n<\/ul>\n\n\n\n<div style=\"color:#ddd\" class=\"wp-block-genesis-blocks-gb-spacer gb-block-spacer gb-divider-solid gb-divider-size-1\"><hr style=\"height:19px\"\/><\/div>\n\n\n\n<p><strong>How can we make a REST API more secure?<\/strong><\/p>\n\n\n\n<p>API security is the single most important topic that enterprises want to see addressed in the next years, and addressing the security issue is predicted to be a catalyst for API growth.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"javascript:void(0);\"><img decoding=\"async\" src=\"https:\/\/www.adsumsoftware.com\/public\/uploads\/blog\/main\/2022\/02\/security-state.jpg\" alt=\"security-state\"\/><\/a><\/figure>\n\n\n\n<ul>\n<li>Data Protection<\/li>\n\n\n\n<li>TLS<\/li>\n\n\n\n<li>DOS Attacks<\/li>\n\n\n\n<li>Anti-Farming<\/li>\n\n\n\n<li>Basic Authentication<\/li>\n\n\n\n<li>API Keys<\/li>\n\n\n\n<li>OAuth 2<\/li>\n\n\n\n<li>JSON Web Token (JWT)<\/li>\n<\/ul>\n\n\n\n<div style=\"color:#ddd\" class=\"wp-block-genesis-blocks-gb-spacer gb-block-spacer gb-divider-solid gb-divider-size-1\"><hr style=\"height:21px\"\/><\/div>\n\n\n\n<p><a href=\"javascript:void(0);\"><\/a><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><br>API testing could appear to be an afterthought in the development process. However, because APIs control a large portion of an app\u2019s functionality, they should be thoroughly tested with the rest of the app\u2019s components. To get the best results, REST API developers, testers, and users should keep the above best practice in mind while doing their testing methods. APIs, particularly for the Internet of Things (IoT) and mobile devices, have arguably become the standard technique for developing modern applications. While the concept of giving the data into a program from a third-party source isn\u2019t new, the challenging goals of app development methodologies and the need to innovate mean that some companies may not yet realize the risks associated with making their APIs public. The good news is that obtaining them isn\u2019t particularly difficult.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>REST is an architectural style for distributed hypermedia systems that stands for REpresentational State Transfer. It was first presented in Roy Fielding\u2019s famous dissertation in 2000. REST has its own set of guiding principles and constraints, just like other architectural styles. If a service interface is to be called RESTful, it must adhere to these [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[20,15,14],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Principles for REST APIs:\u00a02023 - Adsum Software<\/title>\n<meta name=\"description\" content=\"REST APIs Security Principles: 2022\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Principles for REST APIs:\u00a02023 - Adsum Software\" \/>\n<meta property=\"og:description\" content=\"REST APIs Security Principles: 2022\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\" \/>\n<meta property=\"og:site_name\" content=\"Adsum Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adsumsoftware\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-05T04:39:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-20T17:19:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/rest-api-security.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adsum Software\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdsumSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdsumSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adsum Software\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\"},\"author\":{\"name\":\"Adsum Software\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/person\/c594d0e9fd51ecfcf9d2303f5be3a820\"},\"headline\":\"Security Principles for REST APIs:\u00a02023\",\"datePublished\":\"2022-05-05T04:39:41+00:00\",\"dateModified\":\"2023-01-20T17:19:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\"},\"wordCount\":680,\"publisher\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#organization\"},\"articleSection\":[\"App Development\",\"Web App Development\",\"Website Development\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\",\"url\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\",\"name\":\"Security Principles for REST APIs:\u00a02023 - Adsum Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#website\"},\"datePublished\":\"2022-05-05T04:39:41+00:00\",\"dateModified\":\"2023-01-20T17:19:07+00:00\",\"description\":\"REST APIs Security Principles: 2022\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adsumsoftware.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Principles for REST APIs:\u00a02023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#website\",\"url\":\"https:\/\/www.adsumsoftware.com\/blog\/\",\"name\":\"Adsum Software\",\"description\":\"IT Consulting &amp; Professional Services\",\"publisher\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adsumsoftware.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#organization\",\"name\":\"Adsum Software\",\"url\":\"https:\/\/www.adsumsoftware.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/logo-adsum-software.jpg\",\"contentUrl\":\"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/logo-adsum-software.jpg\",\"width\":667,\"height\":186,\"caption\":\"Adsum Software\"},\"image\":{\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adsumsoftware\",\"https:\/\/twitter.com\/AdsumSoftware\",\"https:\/\/www.linkedin.com\/company\/adsum-software\",\"https:\/\/www.instagram.com\/adsumsoftware\/\",\"https:\/\/adsumsoftware.quora.com\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/person\/c594d0e9fd51ecfcf9d2303f5be3a820\",\"name\":\"Adsum Software\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/642ed98e6f9110659aaa38eace9de170?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/642ed98e6f9110659aaa38eace9de170?s=96&d=mm&r=g\",\"caption\":\"Adsum Software\"},\"description\":\"Award-winning Adsum Software Development Company. Adsum Software Custom Web and Mobile App Development Company. We are born to innovative solutions. The company is not only a globally recognized IT company but also a family filled with talented experts that help global brands, enterprises, mid-size businesses or even startups with innovative solutions.\",\"sameAs\":[\"http:\/\/localhost\/adsum\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Principles for REST APIs:\u00a02023 - Adsum Software","description":"REST APIs Security Principles: 2022","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles","og_locale":"en_US","og_type":"article","og_title":"Security Principles for REST APIs:\u00a02023 - Adsum Software","og_description":"REST APIs Security Principles: 2022","og_url":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles","og_site_name":"Adsum Software","article_publisher":"https:\/\/www.facebook.com\/adsumsoftware","article_published_time":"2022-05-05T04:39:41+00:00","article_modified_time":"2023-01-20T17:19:07+00:00","og_image":[{"width":1400,"height":787,"url":"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/rest-api-security.jpeg","type":"image\/jpeg"}],"author":"Adsum Software","twitter_card":"summary_large_image","twitter_creator":"@AdsumSoftware","twitter_site":"@AdsumSoftware","twitter_misc":{"Written by":"Adsum Software","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles#article","isPartOf":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles"},"author":{"name":"Adsum Software","@id":"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/person\/c594d0e9fd51ecfcf9d2303f5be3a820"},"headline":"Security Principles for REST APIs:\u00a02023","datePublished":"2022-05-05T04:39:41+00:00","dateModified":"2023-01-20T17:19:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles"},"wordCount":680,"publisher":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/#organization"},"articleSection":["App Development","Web App Development","Website Development"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles","url":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles","name":"Security Principles for REST APIs:\u00a02023 - Adsum Software","isPartOf":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/#website"},"datePublished":"2022-05-05T04:39:41+00:00","dateModified":"2023-01-20T17:19:07+00:00","description":"REST APIs Security Principles: 2022","breadcrumb":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adsumsoftware.com\/blog\/rest-apis-security-principles#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adsumsoftware.com\/blog"},{"@type":"ListItem","position":2,"name":"Security Principles for REST APIs:\u00a02023"}]},{"@type":"WebSite","@id":"https:\/\/www.adsumsoftware.com\/blog\/#website","url":"https:\/\/www.adsumsoftware.com\/blog\/","name":"Adsum Software","description":"IT Consulting &amp; Professional Services","publisher":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adsumsoftware.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.adsumsoftware.com\/blog\/#organization","name":"Adsum Software","url":"https:\/\/www.adsumsoftware.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/logo-adsum-software.jpg","contentUrl":"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/logo-adsum-software.jpg","width":667,"height":186,"caption":"Adsum Software"},"image":{"@id":"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/adsumsoftware","https:\/\/twitter.com\/AdsumSoftware","https:\/\/www.linkedin.com\/company\/adsum-software","https:\/\/www.instagram.com\/adsumsoftware\/","https:\/\/adsumsoftware.quora.com\/"]},{"@type":"Person","@id":"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/person\/c594d0e9fd51ecfcf9d2303f5be3a820","name":"Adsum Software","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.adsumsoftware.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/642ed98e6f9110659aaa38eace9de170?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/642ed98e6f9110659aaa38eace9de170?s=96&d=mm&r=g","caption":"Adsum Software"},"description":"Award-winning Adsum Software Development Company. Adsum Software Custom Web and Mobile App Development Company. We are born to innovative solutions. The company is not only a globally recognized IT company but also a family filled with talented experts that help global brands, enterprises, mid-size businesses or even startups with innovative solutions.","sameAs":["http:\/\/localhost\/adsum\/blog"]}]}},"featured_image_src":"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/rest-api-security-600x400.jpeg","featured_image_src_square":"https:\/\/www.adsumsoftware.com\/blog\/wp-content\/uploads\/2022\/07\/rest-api-security-600x600.jpeg","author_info":{"display_name":"Adsum Software","author_link":"https:\/\/www.adsumsoftware.com\/blog\/author\/softadminadsum"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/102"}],"collection":[{"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/comments?post=102"}],"version-history":[{"count":3,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/102\/revisions"}],"predecessor-version":[{"id":483,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/102\/revisions\/483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/media\/103"}],"wp:attachment":[{"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/media?parent=102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/categories?post=102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adsumsoftware.com\/blog\/wp-json\/wp\/v2\/tags?post=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}