{"id":5495,"date":"2024-04-16T08:03:59","date_gmt":"2024-04-16T06:03:59","guid":{"rendered":"https:\/\/www.msb365.blog\/?p=5495"},"modified":"2024-04-16T08:03:59","modified_gmt":"2024-04-16T06:03:59","slug":"microsoft-365-entra-id-administrative-units-authorization-concept-part-1","status":"publish","type":"post","link":"https:\/\/www.msb365.blog\/?p=5495","title":{"rendered":"Recommendation &#8211; Microsoft 365 authorization concepts &#8211; Part 1"},"content":{"rendered":"<p>Microsoft 365 administrators have various roles and tasks that they need to manage to ensure that the organization runs smoothly.<br \/>\nAuthorization concepts that are familiar from the on-premise world cannot be replicated 1:1 in the Microsoft Cloud. In order to ensure data security, several steps need to be implemented.<br \/>\nThese are as follows:<\/p>\n<p>&nbsp;<\/p>\n<h3>PIM:<\/h3>\n<p>With the Privileged Identity Management (PIM) function, Microsoft 365 offers the option of assigning predefined administrator rights to time-limited and only explicitly authorized persons.<br \/>\nIn order for such roles to be assigned to the corresponding users, these users must fulfil corresponding requirements. These include a multifactor authentication (MFA) obligation, authorization for the corresponding PIM role, etc.<br \/>\nUsers who have PIM authorization should only be able to request this for higher-level, non-daily work. The aim is for the individual departments to be self-managed or managed by so-called delegates.<\/p>\n<p>&nbsp;<\/p>\n<h3>Administrative units:<\/h3>\n<p>From a technical perspective, each department of a company is assigned to so-called administrative units (AU). This action can be used to define users who explicitly have administrative authorizations for this dedicated AU only. As certain areas are not only managed by the corresponding AU, users of the Delegated Administrators can also be assigned to several AUs.<br \/>\nAuthorizations for the respective AUs can be assigned and removed in several ways. The following options are currently available:<\/p>\n<ul>\n<li>Direct assignment of individual users to an AU. (Not recommended)<\/li>\n<li>Assignment via M365 groups (static and dynamic groups possible)<\/li>\n<li>Dynamic assignment via predefined attributes.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>AUs also support the following compliance solutions:<\/p>\n<ul>\n<li>Data lifecycle management<\/li>\n<li>Data loss prevention (DLP)<\/li>\n<li>Communication compliance<\/li>\n<li>Records management<\/li>\n<li>Sensitivity labelling<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>SharePoint sites (through MS Teams)<\/h3>\n<p>Whenever possible, new SharePoint online (SPO) sites should be created by Microsoft Teams. This has several advantages, such as the optional availability of the SPO site in Microsoft Teams. Furthermore, you can decide what kind of site (In Teams: Team) should be created.<\/p>\n<p>The following options are available:<\/p>\n<ul>\n<li><strong>Org wide<\/strong> (This type of Microsoft Teams team is automatically displayed in Teams for every user who has a cloud or synchronized account. Each user can also search for the corresponding site on the entire tenant and move freely, depending on their document authorization).<\/li>\n<li><strong>Public<\/strong> (Public sites are basically similar to Org wide sites. However, they differ in that the sites are not automatically assigned to each user in the Teams client. Nevertheless, every user can search for the site and consume content).<\/li>\n<li><strong>Private<\/strong> (From Microsoft Teams&#8217; point of view, private sites offer the highest level of security. Only users who are explicitly members can have access to the corresponding site. An unauthorized user cannot search for private sites).<\/li>\n<li><strong>Shared<\/strong> (Shared sites were developed by Microsoft to enable cross-tenant work with partners and\/or customers. Since the introduction of shared channels, employees no longer have to switch between the tenant accounts by logging in and out, but can access the shared sites directly in their own tenant. Provided they are authorized). <span style=\"color: #ff0000;\"><strong>*1<\/strong><\/span><\/li>\n<\/ul>\n<p><span style=\"color: #ff0000;\"><strong>*1)<\/strong><\/span> In order for shared channels to be used, a two-sided trust position is required for each customer\/partner, which is configured by Azure B2B.<\/p>\n<p>&nbsp;<\/p>\n<h3>Data Classification<\/h3>\n<p>Labelling is basically used to ensure that confidential documents are not leaked. This can be defined internally and externally, but also at departmental level (e.g. finance, HR, management, police, etc.). There are various application options for labels, which allow customers to design and use them individually.<br \/>\nAs a further example, labels can also be used to ensure that documents classified with the &#8220;Internal&#8221; label in this example cannot be sent by e-mail to external recipients.<\/p>\n<p>&nbsp;<\/p>\n<h3>DLP<\/h3>\n<p>When implementing AUs, dedicated custom DLPs can be created which are focussed on the respective AU and its users.<br \/>\nThese DLP policies can be created and applied separately for each AU or individually.<\/p>\n<p>&nbsp;<\/p>\n<h3>PIM roles<\/h3>\n<p>In the authorization concept for the Canton of Aargau, only the role of Global Administrator (GA) is to be provided via PIM. A group of administrators is defined by the customer, who can apply for the corresponding GA role. PIM also offers other administrator roles, but we recommend that these are not managed via PIM but via the AUs.<br \/>\nThis ensures that administrators cannot assign roles to each other for no reason.<\/p>\n<p>The length of GA access via PIM should be limited to a maximum of 4 hours so that administrators do not work with the highest authorization level for longer than necessary.<\/p>\n<p>&nbsp;<\/p>\n<h3>Azure Subscriptions<\/h3>\n<p>The authorization concept described is aimed at Entra ID and Microsoft 365 apps and services.<br \/>\nAzure services such as Azure Speech services or storage accounts are not managed by Microsoft 365. These are Azure services.<br \/>\nAzure Services can be managed in the following two ways:<\/p>\n<ul>\n<li>Authorizations on the respective Azure subscription on which the services are stored<\/li>\n<li>Authorizations on the respective resource group on which the services are stored.<\/li>\n<\/ul>\n<p>Here too, the authorization can be defined and assigned using several levels.<\/p>\n<p>&nbsp;<\/p>\n<h3>Authorization matrix as a basis for decision-making<\/h3>\n<p>A dedicated authorization matrix makes sense, especially in connection with administrative units. Dedicated support teams can be set up depending on the area (country location, department, division, etc.). These units can then be divided more granularly and the corresponding authorizations controlled. It is recommended that there is a superordinate IT department that is responsible for the management and administration of the respective administrative units.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"47\"><strong>Location<\/strong><\/td>\n<td width=\"46\"><strong>Role<\/strong><\/td>\n<td width=\"46\"><strong>Entra ID<\/strong><\/td>\n<td width=\"46\"><strong>Purview<\/strong><\/td>\n<td width=\"46\"><strong>Defender<\/strong><\/td>\n<td width=\"46\"><strong>EXO<\/strong><\/td>\n<td width=\"46\"><strong>SPO<\/strong><\/td>\n<td width=\"46\"><strong>Power Platform<\/strong><\/td>\n<td width=\"46\"><strong>Teams<\/strong><\/td>\n<td width=\"46\"><strong>M365 Apps<\/strong><\/td>\n<td width=\"46\"><strong>Intune<\/strong><\/td>\n<td width=\"46\"><strong>Viva<\/strong><\/td>\n<td width=\"46\"><strong>PIM (Global Admin)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Department<\/strong><\/td>\n<td width=\"46\">Default End User<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Environment Maker<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Department<\/strong><\/td>\n<td width=\"46\">Power User<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Environment Maker<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Department<\/strong><\/td>\n<td width=\"46\">Guest User<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Department<\/strong><\/td>\n<td width=\"46\">1<sup>st<\/sup> Level Support<\/td>\n<td width=\"46\">Message Center Reader<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Environment Maker<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><\/td>\n<td width=\"46\">Read only Operator<\/td>\n<td width=\"46\"><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Department<\/strong><\/td>\n<td width=\"46\">2<sup>nd<\/sup> Level Support<\/td>\n<td width=\"46\">Message Center Reader<\/p>\n<p>Authentication Admin (AU Level)<\/p>\n<p>Cloud Device Admin (AU Level)<\/p>\n<p>User Admin (AU Level)<\/p>\n<p>Guest Inviter<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">View-Only MGMT<\/p>\n<p>Mail-Forwarding (Custom RBAC Role)<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Environment Admin<\/td>\n<td width=\"46\">Teams Communication Support Specialist<\/p>\n<p>Teams Administrator (AU Level)<\/p>\n<p>Teams Device Administrator (AU Level)<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">Read Only Operator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Department<\/strong><\/td>\n<td width=\"46\">Application Manager<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"47\"><strong>Location<\/strong><\/td>\n<td width=\"46\"><strong>Role<\/strong><\/td>\n<td width=\"46\"><strong>Entra ID<\/strong><\/td>\n<td width=\"46\"><strong>Purview<\/strong><\/td>\n<td width=\"46\"><strong>Defender<\/strong><\/td>\n<td width=\"46\"><strong>EXO<\/strong><\/td>\n<td width=\"46\"><strong>SPO<\/strong><\/td>\n<td width=\"46\"><strong>Power Platform<\/strong><\/td>\n<td width=\"46\"><strong>Teams<\/strong><\/td>\n<td width=\"46\"><strong>M365 Apps<\/strong><\/td>\n<td width=\"46\"><strong>Intune<\/strong><\/td>\n<td width=\"46\"><strong>Viva<\/strong><\/td>\n<td width=\"46\"><strong>PIM (Global Admins)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">3<sup>rd<\/sup> Level Support<\/td>\n<td width=\"46\">Message Center Reader<\/p>\n<p>Authentication Admin<\/p>\n<p>Cloud Device Admin<\/p>\n<p>User Admin<\/p>\n<p>Guest Inviter<br \/>\nHelpdesk Admin<\/p>\n<p>Knowledge Admin<\/p>\n<p>Directory Readers<\/p>\n<p>Report Readers<\/p>\n<p>Application Admin<\/p>\n<p>Groups Admin<\/p>\n<p>License Admin<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Quarantine Admin<\/p>\n<p>Seurity Operator<\/td>\n<td width=\"46\">Exchange Administrator<\/td>\n<td width=\"46\">SharePoint Administrator<\/td>\n<td width=\"46\">Environment Admin<\/p>\n<p>Power Platform Administrator<\/td>\n<td width=\"46\">Teams Communication Support Engineer<\/p>\n<p>Teams Device Administrator<\/p>\n<p>Teams Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">Intune Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">Lead Engineer<\/td>\n<td width=\"46\"><strong><span style=\"color: #3366ff;\">3<sup>rd<\/sup> Level Supporter +<\/span><\/strong><\/p>\n<p>User Administrator<\/p>\n<p>Global Reader<\/td>\n<td width=\"46\">Compliance Administrator<\/td>\n<td width=\"46\">Security Operator<\/td>\n<td width=\"46\">Exchange Administrator<\/td>\n<td width=\"46\">SharePoint Administrator<\/td>\n<td width=\"46\">Power Platform Administrator<\/td>\n<td width=\"46\">Teams Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">Intune Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #99cc00;\">YES<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">Architect<\/td>\n<td width=\"46\">Message Center Reader<\/p>\n<p>License Administrator<\/p>\n<p>Authentication Administrator<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/p>\n<p>Power Platform Administrator<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">Intune Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #99cc00;\">YES<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">CSO<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">Security<\/td>\n<td width=\"46\">Authentication Administrator<\/p>\n<p>Privileged Role Administrator<\/p>\n<p>Global Reader<\/p>\n<p>Conditional Access Administrator<\/p>\n<p>Cloud Application Administrator<\/p>\n<p>Identity Governance Administrator<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">Security Administrator<\/td>\n<td width=\"46\">Security Administrator<\/td>\n<td width=\"46\">Security Administrator<\/td>\n<td width=\"46\">Security Administrator<\/td>\n<td width=\"46\">Security Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">Intune Administrator<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #99cc00;\">YES<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">Risk<\/td>\n<td width=\"46\">Global Reader<\/td>\n<td width=\"46\">Compliance Administrator<\/p>\n<p>Insider Risk Management Administrator<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">Legal<\/td>\n<td width=\"46\">Global Reader<\/td>\n<td width=\"46\">Insights Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior<\/strong> <strong>IT<\/strong><\/td>\n<td width=\"46\">Compliance<\/td>\n<td width=\"46\">Global Reader<\/p>\n<p>Identity Governance Administrator<\/td>\n<td width=\"46\">Compliance Administrator<\/p>\n<p>Customer Lockbox Access Approver<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\">Security Reader<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #ff9900;\">YES (After approval)<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"47\"><strong>Superior IT<\/strong><\/td>\n<td width=\"46\">Licence Management<\/td>\n<td width=\"46\">Licence Administrator<\/p>\n<p>Billing Administrator<\/p>\n<p>Guest Inviter<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\">N\/V<\/td>\n<td width=\"46\"><span style=\"color: #993366;\">Company-specific authorization definition<\/span><\/td>\n<td width=\"46\"><span style=\"color: #ff0000;\">NO<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>Supplements<\/h3>\n<p>This matrix is intended as an illustrative <strong>example<\/strong>; it can of course be adapted and\/or expanded depending on the requirements of your own company.<\/p>\n<ul>\n<li>The distinction between &#8220;<em>Default Users<\/em>&#8221; and &#8220;<em>Power Users<\/em>&#8221; are the local authorisations on the user&#8217;s own device.<br \/>\nThe power user also has the authorisation to install something on their device, whereas the <em>default<\/em> <em>user<\/em> does not have this option.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>How <strong>Exchange online Custom RBAC Roles<\/strong> can be built and the <strong>automatic Administrative Unit on-boarding<\/strong>, as well as a possible <strong>training matrix<\/strong>, which is related to the authorisation matrix, is dealt with in a Part two of this article.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft 365 administrators have various roles and tasks that they need to manage to ensure that the organization runs smoothly. Authorization concepts that are familiar from the on-premise world cannot be replicated 1:1 in the Microsoft Cloud. In order to ensure data security, several steps need to be implemented. These are as follows: &nbsp; PIM: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[685,12,1923],"tags":[],"class_list":["post-5495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-active-directory","category-azure","category-microsoft-365"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/5495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5495"}],"version-history":[{"count":12,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/5495\/revisions"}],"predecessor-version":[{"id":5542,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/posts\/5495\/revisions\/5542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=\/wp\/v2\/media\/5527"}],"wp:attachment":[{"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msb365.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}