{"id":48004,"date":"2022-04-26T09:27:35","date_gmt":"2022-04-26T01:27:35","guid":{"rendered":"https:\/\/version-2.com\/?p=48004"},"modified":"2022-05-30T10:42:12","modified_gmt":"2022-05-30T02:42:12","slug":"how-does-active-directory-help-with-access-management","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/04\/how-does-active-directory-help-with-access-management\/","title":{"rendered":"How Does Active Directory Help with Access Management?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"48004\" class=\"elementor elementor-48004\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><b>Active Directory <\/b><span style=\"font-weight: 400;\">started with Windows Server due to the convenience of using the same password to perform several activities in a company, such as authenticating on a computer, accessing a system, and opening an email.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In its database, one can store information about domains, organizational units, trust relationships, computer accounts, users, groups, group members, and passwords, among other objects.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This solution brings several other benefits, such as the centralization of security features, the use of a single management point for resources, and the simplification of the search for the desired resource.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we explain the concept of <\/span><b>Active Directory <\/b><span style=\"font-weight: 400;\">and unravel its advantages, among other countless information. To facilitate your reading, we divided our text into topics:<\/span><\/p>\n<ul>\n<li><b>What is Active Directory?<\/b><\/li>\n<li><b>What Is the Importance of Active Directory?<\/b><\/li>\n<li><b>Benefits of Active Directory<\/b><\/li>\n<li><b>Active Directory in Practice<\/b><\/li>\n<li><b>How Active Directory Is Structured<\/b><\/li>\n<li><b>Functioning of AD in Two Perspectives<\/b><\/li>\n<li><b>About senhasegura<\/b><\/li>\n<li><b>Conclusion<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Follow our text to the end!<\/span><\/p>\n<ul>\n<li>\n<h2><b>What is Active Directory?<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It is a database and set of services performed on Microsoft Windows Server, whose main purpose is to enable the management of permissions and the control of access to network resources.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through this solution, one can store data as objects, including users, groups, applications, and devices, categorizing them according to their names and characteristics.<\/span><\/p>\n<ul>\n<li><b>What Is the Importance of Active Directory?<\/b><\/li>\n<\/ul>\n<p><b>Active Directory<\/b><span style=\"font-weight: 400;\"> is important in many ways. It consists of a directory service that makes it possible to store data about networked objects, making this information available to administrators and users. Also, it is a Microsoft software used in Windows.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was developed to organize the search for required information in daily activities and centralize this data, and its advantages are availability, security, and performance. In addition, an <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\"> can have multiple domains with different administrators and security policies. That is, administrators do not need to have access to all domains.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Each user can have only one name to access network resources. Their accounts are stored in the AD database;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Users need to log on once to access any network environment;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Domains can grow unlimitedly without changing the form of administration;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Active Directory-based domains enable centralized management. Data related to accounts, groups, and network resources can be managed in a single environment.&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If a company needs to have a single location, Active Directory allows users to have access to all network resources with a single password.&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li><b>Benefits of Active Directory<\/b><\/li>\n<\/ul>\n<p><b>Active Directory<\/b><span style=\"font-weight: 400;\"> provides several benefits for users, and we can highlight some of them:<\/span><\/p>\n<ul>\n<li><b>Centralization of Security Features<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In a single location, one can manage and protect network resources and related security objects. A company can manage AD based on a business model, organizational model, or the types of roles it manages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is the case for organizations that manage <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\"> by dividing their users according to the departments in which they work, the physical place where they work, or a combination of both.<\/span><\/p>\n<p><b>Active Directory<\/b><span style=\"font-weight: 400;\"> allows one to manage the security of all network resources and extend interoperability with multiple applications and devices. When this feature is implemented and protected in the right way, it makes it possible to implement a company\u2019s policy and procedures involving cybersecurity, resources, and network services in a detailed manner.<\/span><\/p>\n<ul>\n<li><b>Single Management Point for Resources<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In AD, network resources are accessed from a single management point. This is because a single logon is used to gain access to network resources located on all servers within the domain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In practice, the user is identified only once. After that, they connect to access network resources, depending on their roles and permissions.&nbsp;<\/span><\/p>\n<ul>\n<li><b>It Simplifies the Task of Finding the Desired Resource<\/b><\/li>\n<\/ul>\n<p><b>Active Directory<\/b><span style=\"font-weight: 400;\"> simplifies the task of finding the desired resource as it allows publishing files and print resources to the network. Publishing an object enables network resources to be securely accessed for search in the AC database.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To do this search, the name, location, or description of the object can be used. If you want to search for a shared folder, for example, just use the network in Windows 10 or Microsoft Windows Server 2012 and click the search button.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can configure the search scope without using the shared folder name and keyword as requirements.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more specific results, just provide more information. For example, if you set up the same keyword in multiple folders, a search for the keyword will return many results, which will make it more difficult to find the folder you are looking for.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Suppose you have access to a network with dozens of servers, in which each one has several resources required to perform your activities. In this case, it would be difficult to identify which server provides each resource.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This task can become even more difficult when you have mobile users, who need to locate devices from somewhere else.<\/span><\/p>\n<ul>\n<li><b>Trust Relationships Between Various Domains<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">AD makes it possible to establish efficient management of trust relationships between several domains. That is, a trust relationship can be established between two websites. In this way, one can use the features on both websites with a single username and password.<\/span><\/p>\n<ul>\n<li><b>Improved Scalability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Through the concept of organizational units (OUs), <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\"> makes it possible to improve scalability in large companies. An OU consists of a collection of users and computers.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An organization with large domains can organize them into OUs. For example, a company has a large department that has an administrator managing the domain. In this case, one can create an OU to which all user accounts and computers related to that department can be moved.<\/span><\/p>\n<ul>\n<li><b>Multi-Master Replication<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This concept is another advantage of an <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\"> environment. In an AD multi-master replication environment, each domain controller contains a copy of the directory.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When a change is made to AD, the nearest controller will be updated. Other domain controllers in the environment will also update.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That goes for websites, too. Each website has its domain controller, that is, when a user of a website updates <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\">, the changes are reflected in it.&nbsp;<\/span><\/p>\n<ul>\n<li><b>Active Directory in Practice<\/b><\/li>\n<\/ul>\n<p><b>Active Directory<\/b><span style=\"font-weight: 400;\"> consists of an administrator network of the logins responsible for releasing access to resources. Through it, users can access one or several rooms, depending on their needs, with a single login and password, eliminating the need to create numerous accesses.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It works as a free protocol used to manage information from distributed directories over an IP network, which enables users to access network resources by performing a single logon.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is organized with the use of domains through a hierarchy, with an administration that is based on the tree and forest concepts, which supports the organization of the domain structure and eliminates the need for individual visits to desktops.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this context, each domain is equivalent to a maximum administrative unit within the network. The forest would be the \u201cset of trees\u201d, which we cover in more detail in the next topic.<\/span><\/p>\n<ul>\n<li><b>How Active Directory Is Structured<\/b><\/li>\n<\/ul>\n<p><b>Active Directory<\/b><span style=\"font-weight: 400;\"> has the function of storing data about network users and resources in a structure formed by domains, trees, and forests.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When we talk about a domain, we refer to a collection of objects, such as users and devices, that share the AD database.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A tree, on the other hand, is a collection of domains with a contiguous namespace, which have a common DNS root name.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A forest, in turn, refers to a collection of trees that share the same scheme, global catalog, and directory configuration, without being part of a contiguous namespace. It works as a security limit on a corporate network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Within a domain, objects can be grouped into organizational units (OUs), which enables administrators to create organizational units that allow them to mirror business,<\/span> <span style=\"font-weight: 400;\">functional, or geographic structures and apply group policies that simplify management.&nbsp;<\/span><\/p>\n<ul>\n<li><b>Functioning of AD in Two Perspectives<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The AD operation can be understood through two perspectives: the technical and the user one. Here\u2019s how they differ:<\/span><\/p>\n<ul>\n<li><b>Technical Perspective<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Generally, data stored in <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\"> encompasses user contact, printer queue, and desktop or network configuration information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><i><span style=\"font-weight: 400;\">Active Directory Data Store<\/span><\/i><span style=\"font-weight: 400;\"> contains directory data, such as information about users, groups, computers, objects that these users can access, other objects, and network components, allowing full access administration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Directories are still used to manage software packages, files, and user accounts. The administrator uses the AD tree and forest concepts, which do not require individual visits to desktops.<\/span><\/p>\n<ul>\n<li><b>User Perspective<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With AD, users can access available resources on the network by logging on once to the local network environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When the user enters their login and password, <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\"> confirms the validity of the information to grant authentication. As already mentioned, AD is organized hierarchically through the use of domains.&nbsp;<\/span><\/p>\n<ul>\n<li><b>About senhasegura<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Present in 54 countries, we are one of the units of MT4 Tecnologia, a group of companies focused on information security founded in 2001.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our purpose is to guarantee cybersecurity to the organizations we provide services to, acting on the control of privileged actions and information. In this sense, we avoid problems such as: data leaks and thefts in virtual environments and their consequences for our customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We understand digital sovereignty is a right of citizens, organizations, and society, so we work around this goal, believing that applied technology is essential for the promotion of prosperity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our job is to address the lifecycle of privileged access management, be it before, during, and after access, considering that machine automation is a current need, as manually managing digital privileges has become an insufficient task. Therefore, we seek to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Avoid interruptions due to expirations and increase the efficiency of organizations;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Automatically audit the use of privileges;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Automatically audit privileged changes to anticipate detection of privilege abuses;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure successful deployments and satisfied customers;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide advanced PAM capabilities;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide resources that reduce risks in a fast and advanced way;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">We also bring companies into compliance with audit criteria and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.<\/span><\/li>\n<\/ul>\n<ul>\n<li><b>Conclusion<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By reading this article, you saw that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Active Directory <\/b><span style=\"font-weight: 400;\">came up with Windows Server due to the need to use the same password to perform multiple tasks;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">AD is a database and set of services that have the&nbsp;main function of enabling the management of permissions and the control of access to network resources;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It was created to organize the search for necessary information at work and centralize this data;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Through it, users log on once to access any network environment;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Active Directory<\/b><span style=\"font-weight: 400;\">-based domains enable centralized administration;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An organization can manage AD based on a business model, organizational model, or the types of roles it manages;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Active Directory<\/b><span style=\"font-weight: 400;\"> allows one to find a resource more easily, making it possible to publish files and print resources on the network;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Through AD, one can establish trust relationships between several areas;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Through the concept of organizational units (OUs), AD allows for improving scalability in large organizations;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Active Directory<\/b><span style=\"font-weight: 400;\"> has the function of storing data about network users and resources in a structure formed by domains, trees, and forests;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The AD operation can be understood through two perspectives: the technical and the user one;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The directories are used to administer software packages, files, and user accounts, among other functions;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">After a user enters their login and password, Active Directory confirms the information is valid and authenticates.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Did you like our article on <\/span><b>Active Directory<\/b><span style=\"font-weight: 400;\">? Share it with someone else who might be interested in this topic.<\/span><\/p>\n<p><b>ALSO READ IN SENHASEGURA\u2019S BLOG<\/b><\/p>\n<p><a href=\"\/2021\/07\/common-questions-about-privileged-access-management-pam-solutions\/\"><b>Common Questions about Privileged Access Management (PAM) Solutions<\/b><\/a><\/p>\n<p><a href=\"\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/\"><b>Multifactor Authentication: How to Benefit from This Security Strategy<\/b><\/a><\/p>\n<p><a href=\"\/2021\/10\/my-company-suffered-a-ransomware-attack-should-i-pay-the-ransom-or-not\/\"><b>My Company Suffered a Ransomware Attack: Should I Pay the Ransom or Not?<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Active Directory started with Windows Server due to the [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-48004","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Does Active Directory Help with Access Management? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Does Active Directory Help with Access Management? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Active Directory started with Windows Server due to the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T01:27:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/how-does-active-directory-help-with-access-management\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How Does Active Directory Help with Access Management?\",\"datePublished\":\"2022-04-26T01:27:35+00:00\",\"dateModified\":\"2022-05-30T02:42:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/how-does-active-directory-help-with-access-management\\\/\"},\"wordCount\":1964,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/how-does-active-directory-help-with-access-management\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/\",\"name\":\"How Does Active Directory Help with Access Management? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg\",\"datePublished\":\"2022-04-26T01:27:35+00:00\",\"dateModified\":\"2022-05-30T02:42:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/how-does-active-directory-help-with-access-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Does Active Directory Help with Access Management?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Does Active Directory Help with Access Management? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/","og_locale":"zh_HK","og_type":"article","og_title":"How Does Active Directory Help with Access Management? - Version 2","og_description":"Active Directory started with Windows Server due to the [&hellip;]","og_url":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/","og_site_name":"Version 2","article_published_time":"2022-04-26T01:27:35+00:00","article_modified_time":"2022-05-30T02:42:12+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"11 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/how-does-active-directory-help-with-access-management\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How Does Active Directory Help with Access Management?","datePublished":"2022-04-26T01:27:35+00:00","dateModified":"2022-05-30T02:42:12+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/how-does-active-directory-help-with-access-management\/"},"wordCount":1964,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/how-does-active-directory-help-with-access-management\/","url":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/","name":"How Does Active Directory Help with Access Management? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg","datePublished":"2022-04-26T01:27:35+00:00","dateModified":"2022-05-30T02:42:12+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Como-o-Active-Directory-ajuda-na-gestao-dos-acessos.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/how-does-active-directory-help-with-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How Does Active Directory Help with Access Management?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-cug","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/48004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=48004"}],"version-history":[{"count":9,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/48004\/revisions"}],"predecessor-version":[{"id":48013,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/48004\/revisions\/48013"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=48004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=48004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=48004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}