{"id":1289,"date":"2018-02-26T12:22:05","date_gmt":"2018-02-26T10:22:05","guid":{"rendered":"https:\/\/msb365.abstergo.ch\/?p=1289"},"modified":"2023-06-23T13:16:47","modified_gmt":"2023-06-23T11:16:47","slug":"mfa-microsoft-authenticator-app-owa","status":"publish","type":"post","link":"https:\/\/www.msb365.blog\/?p=1289","title":{"rendered":"MFA with Microsoft Authenticator App for OWA"},"content":{"rendered":"<p>In one of my <u><a href=\"https:\/\/msb365.abstergo.ch\/?p=1260\" target=\"_blank\" rel=\"noopener\"><strong>last articles<\/strong><\/a>,<\/u> I wrote about installing, customizing and about the functionality of the ADFS servers.<\/p>\n<p>Today I want to write about the ADFS \/ Azure Multi-Factor Authentication server (MFA). In Q2 of the last year Microsoft announced an app called \u201cMicrosoft Authenticator\u201d. The functionality is similar to Google\u2019s authentication App \u201cGoogle Authenticator\u201d.<\/p>\n<p>The Microsoft authenticator app lets you quickly and securely verify your identity online, for all of your accounts. A variety of features are available for many types of accounts.<\/p>\n<p>To download the App for your device, you can simply hit the link below. It only depends on which device type you have:<\/p>\n<p>Android:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.azure.authenticator\">https:\/\/play.google.com\/store\/apps\/details?id=com.azure.authenticator<\/a><\/p>\n<p>Apple:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/itunes.apple.com\/de\/app\/microsoft-authenticator\/id983156458?mt=8\">https:\/\/itunes.apple.com\/de\/app\/microsoft-authenticator\/id983156458?mt=8<\/a><\/p>\n<p>\u00a0<\/p>\n<p>As I wrote earlier, the functionality of the app works similar like the one of Google, or (maybe the older generation of the readers here) a hardware<a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_token\" target=\"_blank\" rel=\"noopener\"><strong><u> security token.<\/u><\/strong><\/a><\/p>\n<p>The cool thing with this app is, that you are able to manage multiple services from third party companies by this app. For example: Github, Dropbox or Facebook.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-1293\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/0-1.png\" alt=\"\" width=\"424\" height=\"709\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/0-1.png 424w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/0-1-179x300.png 179w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/p>\n<p>So far so good, let\u2019s talk about how to set it up\u2026<\/p>\n<p>\u00a0<\/p>\n<p>As a first point there are following prerequisites needed:<\/p>\n<p>\u00a0<\/p>\n<ul>\n<li>Windows server 2016: WAP with Exchange 2016<\/li>\n<li>MFA for Exchange OWA and ECP<\/li>\n<li>Exchange 2016 and ADFS authentication (for accepting ADFS Claims)<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Before we go to run our steps for the installation, let us have a look on the final architecture:<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1383 size-full\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B.png\" alt=\"\" width=\"1896\" height=\"1057\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B.png 1896w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B-300x167.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B-768x428.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B-1024x571.png 1024w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B-600x334.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B-1600x892.png 1600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/9C23F24B-780x435.png 780w\" sizes=\"(max-width: 1896px) 100vw, 1896px\" \/><\/p>\n<p>First, in our scenario, we start with a WAP-Server, on which we have installed the ADFS-Proxy role. Please note: we do not need IIS for that on the WAP, neither on the ADFS server!<\/p>\n<p>In our LAN environment, we have our Exchange server on which we run IIS.<\/p>\n<p>On the Exchange server, we will be installing the second MFA server, on which we can configure the web services.<\/p>\n<p>\u00a0<\/p>\n<p>Here a high level view of the WAP:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-1295\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3.png\" alt=\"\" width=\"1892\" height=\"1318\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3.png 1892w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3-300x209.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3-768x535.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3-1024x713.png 1024w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3-600x418.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3-1600x1115.png 1600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/2-3-780x543.png 780w\" sizes=\"(max-width: 1892px) 100vw, 1892px\" \/><\/p>\n<p>Installing the web application server (WAP) is not a big deal. Important to know is that the server is located in the DMZ and is not a domain member. That means in our case, we are not able to use a domain account to login or install the role on the server. In this case, the server is running in a Workgroup and I will be logging in with an account which has administrative permissions.<\/p>\n<p>After the login we have to install a SSL certificate on the WAP, which we want to use for the WAP. For the next step we need to copy the thumbprint of the certificate.<\/p>\n<p>We open the PowerShell console and run the following commands:<\/p>\n<pre class=\"\">$FScredential = Get-Credential\r\nInstall-WebApplicationProxy -FederationServiceName \"FS01.Contoso.com\" -FederationServiceTrustCredential $FScredential -CertificateThumbprint \"0a11s3d5g50b2c3d0a1b2c8r4tf6583d0a1b2c3d\"<\/pre>\n<p>For more information about setting up Web Application Proxy, you can follow this Microsoft <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/webapplicationproxy\/install-webapplicationproxy?view=win10-ps\" target=\"_blank\" rel=\"noopener\"><strong><u>Link<\/u><\/strong><\/a>.<\/p>\n<p>In this article, I will not explain every step of configuring ADFS and WAP with each other. Microsoft has a good documentation about it, which you can find <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-fs\/deployment\/best-practices-securing-ad-fs\" target=\"_blank\" rel=\"noopener\"><strong><u>HERE<\/u>.<\/strong><\/a><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>So let\u2019s now start the installation of the MFA on our Exchange server\u2026<\/p>\n<p>\u00a0<\/p>\n<p>First we sign in to the Azure portal as an administrator. Then we navigate to <strong>Active Directory<\/strong> > <strong>MFA Server<\/strong>.<\/p>\n<p>Select <strong>Server settings<\/strong>, and now hit on <strong>Download<\/strong>. Download the installer and follow the instructions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1297\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/3-3.png\" alt=\"\" width=\"678\" height=\"500\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/3-3.png 678w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/3-3-300x221.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/3-3-600x442.png 600w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><\/p>\n<p>After you downloaded the MFA server, double-click the .exe and start the setup.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1298\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-3.png\" alt=\"\" width=\"570\" height=\"478\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-3.png 570w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-3-300x252.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<p>On the <em>Select Installation Folder<\/em> screen, make sure that the folder is correct and click\u00a0<strong>Next<\/strong>.<\/p>\n<p>Once the installation is complete, click\u00a0<strong>Finish<\/strong>. The configuration wizard launches.<\/p>\n<p>Now we have configured the WAP and ADFS server and we also installed the MFA server on our Exchange server. Now, the next step we need to go to is, installing the web service.<\/p>\n<p>For that we follow these steps:<\/p>\n<ul>\n<li>Login to the Exchange server<\/li>\n<li>Run the MFA-Server<\/li>\n<li>Choose SDK web services<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1299\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-1.jpg\" alt=\"\" width=\"520\" height=\"429\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-1.jpg 520w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-1-300x248.jpg 300w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><\/p>\n<ul>\n<li>Chose the site <strong>\u201cDefault Web Site\u201d<\/strong> and then enter the Virtual Directory <strong>\u201cMFAwebserviceSDK\u201d. <\/strong>For<strong>\u00a0<\/strong>the application pool choose <strong>\u201cDefaultAppPool\u201d <\/strong><\/li>\n<li>Push <strong>Next<\/strong> to start the installation.<\/li>\n<\/ul>\n<p>Back on the page that you downloaded the MFA server installer from, click the\u00a0<strong>Generate Activation Credentials<\/strong>\u00a0button. Copy this information into the Azure MFA Server in the boxes provided and click\u00a0<strong>Activate<\/strong>.<\/p>\n<p>After you have installed the MFA, you can see in your IIS that you have a new directory, which is called <strong>\u201cMFAwebservicesSDK\u201d<\/strong>.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Now we need to install the MFA App service\u2026<\/p>\n<p>To do that we have to logon to the server where the IIS and MFA is installed. In our case we go to the Exchange server. After the logon to the server, we need to browse to the following directory:<\/p>\n<p><strong>\u201cC:\\Program Files\\Multi-Factor Authentication Server\u201d<\/strong>. Once you have opened the path, you will find a file which is called \u201cMultiFactorAuthenticationMobileAppWebServiceSetup64.msi\u201c.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1301\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-2-1.png\" alt=\"\" width=\"375\" height=\"136\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-2-1.png 375w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-2-1-300x109.png 300w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><\/p>\n<p>When you found it, double click it and proceed with the following steps:<\/p>\n<p>\u00a0<\/p>\n<ul>\n<li>Choose <strong>\u201cDefault Web Site\u201d<\/strong> -> describe the virtual directory with <strong>\u201cMFA\u201d<\/strong> -> ApplicationPool:\u00a0<strong>\u201cDefault App Pool\u201d<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1302\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-3-1.png\" alt=\"\" width=\"513\" height=\"422\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-3-1.png 513w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-3-1-300x247.png 300w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/><\/p>\n<p>Than click\u00a0<strong>Next<\/strong> for the installation.<\/p>\n<p>\u00a0<\/p>\n<p>If you now have a look at your IIS, you will notice that there is a new directory called <strong>\u201cMFA\u201d<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1303\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-4.png\" alt=\"\" width=\"249\" height=\"136\" \/><\/p>\n<p>If you right click the new directory, choose <strong>\u201cOpen in Explorer\u201d<\/strong> and there you open the file <strong>\u201cweb.config\u201d<\/strong> in an editor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1304\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5.png\" alt=\"\" width=\"1063\" height=\"507\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5.png 1063w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5-300x143.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5-768x366.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5-1024x488.png 1024w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5-600x286.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-5-780x372.png 780w\" sizes=\"(max-width: 1063px) 100vw, 1063px\" \/><\/p>\n<p>In this file you need to edit the following two tags:<\/p>\n<ul>\n<li><strong><span style=\"color: #008000;\">WEB_SERVICE_SDKAUTHENTICATION_USERNAME<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #008000;\">WEB_SERVICE_SDKAUTHENTICATION_PASSWORD<\/span><\/strong><\/li>\n<\/ul>\n<p>After that, you also need to edit the path (further down in the same file).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1305\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-6.png\" alt=\"\" width=\"741\" height=\"425\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-6.png 741w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-6-300x172.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-6-600x344.png 600w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/p>\n<p>In the tag pfpaws.properties.setting you need to modify the URL, then save the <strong>Web.Config<\/strong> and this part is done.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Now we\u2019ll go on to configure our App service\u2026<\/p>\n<p>On the ADFS server, or on a MFA multi server replication to another MFA-server we simply have to configure the mobile application. This URL is the one we also have to publish to the internet. This is needed for the mobile devices to access it.<\/p>\n<p>\u00a0<\/p>\n<p>We have to login\u00a0 to our <strong>ADFS server<\/strong>,\u00a0now, open our <strong>MFA-server<\/strong> and then we browse to the <strong>\u201cMobile Application\u201d<\/strong>.<\/p>\n<p>Now we modify our web service URL to\u00a0<strong><a href=\"https:\/\/mail.contoso.com\/mfa\">https:\/\/mail.contoso.com\/mfa<\/a><\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1306\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-7.png\" alt=\"\" width=\"819\" height=\"217\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-7.png 819w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-7-300x79.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-7-768x203.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-7-600x159.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-7-780x207.png 780w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/p>\n<p>In the ADFS-MFA settings, we simply have to activate 3 points:<\/p>\n<ul>\n<li>Allow user registration<\/li>\n<li>Mobile application<\/li>\n<li>activate protocolling<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>In the ADFS Company settings, we have to set the following:<\/p>\n<ul>\n<li>User Defaults: Mobile app and Pin is selected<\/li>\n<li>The rest is configured as on the picture below (exept the <strong>Standard<\/strong>, here we choose PIN)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1307\" src=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-8.png\" alt=\"\" width=\"802\" height=\"619\" srcset=\"https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-8.png 802w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-8-300x232.png 300w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-8-768x593.png 768w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-8-600x463.png 600w, https:\/\/msb365.abstergo.ch\/wp-content\/uploads\/2018\/02\/4-8-780x602.png 780w\" sizes=\"(max-width: 802px) 100vw, 802px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>Let\u2019s now publish our MFA App\u2026<\/p>\n<p>To make our mobile devices able to connect to the MFA service, we need to publish our URL. To do that we can use our WAP server, which we configured in the beginning. For this part we simply can use PowerShell on the WAP server and run the following command:<\/p>\n<pre class=\"\">Add-WebApplicationProxyApplication -ExternalUrl https:\/\/mail.contoso.com\/mfa\/ -BackendServerUrl https:\/\/mail.contoso.com\/mfa\/ -ExternalPreauthentication PassThrough -ExternalCertificateThumbprint \"0a11s3d5g50b2c3d0a1b2c8r4tf6583d0a1b2c3d\" -Name \"MFA APP\"<\/pre>\n<p>After running this command, the publishing rule is set.<\/p>\n<p>So, we are done! \u2013 Almost\u2026<\/p>\n<p>\u00a0<\/p>\n<p>As last step, you have to verify if all is working as expected and configured.<\/p>\n<p>\u00a0<\/p>\n<p>I hope all worked well for you and this article helped you with implementing Microsoft MFA.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Photo by\u00a0<a href=\"https:\/\/unsplash.com\/photos\/89xuP-XmyrA?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText\">Caspar Camille Rubin<\/a>\u00a0on\u00a0<a href=\"https:\/\/unsplash.com\/search\/photos\/phone?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText\">Unsplash<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In one of my last articles, I wrote about installing, customizing and about the functionality of the ADFS servers. Today I want to write about the ADFS \/ Azure Multi-Factor Authentication server (MFA). In Q2 of the last year Microsoft announced an app called \u201cMicrosoft Authenticator\u201d. The functionality is similar to Google\u2019s authentication App \u201cGoogle [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4,12,1923,2,3],"tags":[],"class_list":["post-1289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adfs","category-azure","category-microsoft-365","category-exchange","category-powershell"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/1289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1289"}],"version-history":[{"count":13,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/1289\/revisions"}],"predecessor-version":[{"id":5217,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/1289\/revisions\/5217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/media\/3125"}],"wp:attachment":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}