{"id":64051,"date":"2023-02-27T14:25:47","date_gmt":"2023-02-27T06:25:47","guid":{"rendered":"https:\/\/version-2.com\/?p=64051"},"modified":"2024-09-13T16:31:26","modified_gmt":"2024-09-13T08:31:26","slug":"how-scottmadden-rolled-out-security-integration-with-azure-ad","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/02\/how-scottmadden-rolled-out-security-integration-with-azure-ad\/","title":{"rendered":"How ScottMadden rolled out security integration with Azure AD"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"64051\" class=\"elementor elementor-64051\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/><\/p><div class=\"nord-col lg:col-8 lg:offset-1 break-words mt-5 text-grey-shuttle\"><article><p class=\"my-4 blog-paragraph text-still-dark-blue\"><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.scottmadden.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ScottMaden<\/a> is a management consulting group that supports Fortune 500 companies. The service provider focuses on two primary business areas: the energy sector and corporate &amp; shared services. With 40-year experience in the industry, ScottMadden provides its clients with strategic planning through implementation across different business fields and functions.<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/18HS181yz7Wvn68aPLzPzZ\/55cba64065515c3def2bc6edb59a23c2\/Profile_of_ScottMadden_web_1400x696.png?w=1400&amp;h=696&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"696\" \/><\/p><p><picture>Addressing numerous global clientele challenges represents ScottMadden\u2019s expertise in sophisticated planning. Therefore, how does a company with up to 250 full-time employees throughout the United States and three local East Coast offices face internal security issues? Clinton Miller, IT Director of ScottMadden, shares their story on filling in the missing links in the organization\u2019s cybersecurity strategy.<\/picture><\/p><\/div><h2 id=\"the-challenge\" class=\"Heading Heading-h2 text-dark-blue\">The Challenge<\/h2><h3 class=\"Heading Heading-h3 text-dark-blue\">Securing employees on the go the right way<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The company consults domestic and international clients \u2014 employees travel quite a bit to client sites and work hands-on on their projects. Hence, a hybrid work model wasn\u2019t the new normal for the organization once the pandemic hit.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">ScottMadden consultants spend a lot of time in airports and other public spaces where they would connect to the airport or mobile hotspots and hotel wifi. Yet, the company\u2019s solution wasn\u2019t as good for protecting and running smoothly while traveling.<\/p><div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\"><div><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThe concern was to improve the existing security model and ensure our employees had an encrypted connection regardless of which network they were on.\u201d<\/p><\/div><p><a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThe%2520concern%2520was%2520to%2520improve%2520the%2520existing%2520security%2520model%2520and%2520ensure%2520our%2520employees%2520had%2520an%2520encrypted%2520connection%2520regardless%2520of%2520which%2520network%2520they%2520were%2520on.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fscottmadden-azura-security-integration\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">Having better performance, following industry best practices, and fulfilling client requirements to protect data outside the office were the driving factors in looking for a change. But is there a solution that can solve the problem effectively and efficiently onboard?<\/p><h2 id=\"the-solution\" class=\"Heading Heading-h2 text-dark-blue\">The Solution<\/h2><h3 class=\"Heading Heading-h3 text-dark-blue\">Streamlined client drive-out to different environments<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The traveling ScottMadden consultants and employees working from home used to rely on browser-based encryption. Using built-in data encoding in Office365 applications allowed them to perform job tasks and communicate with teams with some security levels.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">However, the issue was the poor connection flow while video conferencing \u2014 latency is a deal breaker for online business meetings in a remote setup.<\/p><div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\"><div><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cEveryone during the pandemic did a lot of video conferencing via Google Meet, Microsoft Teams, or Zoom. We aimed to ensure there was a minimal impact on video calls.\u201d<\/p><\/div><p><a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CEveryone%2520during%2520the%2520pandemic%2520did%2520a%2520lot%2520of%2520video%2520conferencing%2520via%2520Google%2520Meet,%2520Microsoft%2520Teams,%2520or%2520Zoom.%2520We%2520aimed%2520to%2520ensure%2520there%2520was%2520a%2520minimal%2520impact%2520on%2520video%2520calls.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fscottmadden-azura-security-integration\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">One thing is handling latency to elevate employees\u2019 and clients\u2019 experience. But can the transition process administratively have a minimal impact on existing company infrastructure and cybersecurity strategy?<\/p><div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\"><div><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cOne of the things we wanted to do was to push out the client fairly easily, operating on an SSO solution already in use.\u201d<\/p><\/div><p><a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259COne%2520of%2520the%2520things%2520we%2520wanted%2520to%2520do%2520was%2520to%2520push%2520out%2520the%2520client%2520fairly%2520easily,%2520operating%2520on%2520an%2520SSO%2520solution%2520already%2520in%2520use.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fscottmadden-azura-security-integration\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">ScottMadden uses solution Azure AD single sign-on solution for user identification within the organization. The company operates in macOS and Windows environments, so the chosen solution had to fit into the criteria for integration and simplicity.<\/p><h2 id=\"why-choose-nordlayer\" class=\"Heading Heading-h2 text-dark-blue\">Why choose NordLayer?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer solution is compatible with major service providers on the market. Thus, the company could integrate with AzureAD IAM solution and roll out organization-wide onboarding to a new solution using existing SSO.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">The endpoint management solution allowed remote access in macOS and Windows environments.<\/p><div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\"><div><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThe implementation of NordLayer went a lot easier when we connected clients to Azure AD. It relieved us from setting up new individual accounts for every 250+ people in the organization.\u201d<\/p><\/div><p><a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThe%2520implementation%2520of%2520NordLayer%2520went%2520a%2520lot%2520easier%2520when%2520we%2520connected%2520clients%2520to%2520Azure%2520AD.%2520It%2520relieved%2520us%2520from%2520setting%2520up%2520new%2520individual%2520accounts%2520for%2520every%2520250+%2520people%2520in%2520the%2520organization.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fscottmadden-azura-security-integration\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">The IT Director handled the process \u2014 it didn\u2019t require<strong> a lot of resources and time <\/strong>to deploy the solution in the organization.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Organization onboarding using Azure AD by ScottMadden<\/h3><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/40qWOW5p9Oa7w8wT44Iutg\/62c288aac4bd7cd3201cbecde53240c5\/Scheme_web_1400x720.png?w=1400&amp;h=720&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"720\" \/><\/p><p><picture>According to Clinton Miller, the IT Director of the company, the longest step was to create an Azure group and add NordLayer. Once it was solved, the complete rollout to NordLayer solution took only a few hours.<\/picture><\/p><\/div><h2 id=\"the-outcome\" class=\"Heading Heading-h2 text-dark-blue\">The Outcome<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Onboarding to a chosen solution enabled the company to secure team connections and extensive access to functionalities that comply with ScottMadden set benchmarks. Achieving data security didn\u2019t have to compromise connection speed and video conferencing quality.<\/p><div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\"><div><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cAnytime employees are outside the office &#8211; at home or coffee shop &#8211; wherever they might be, we validated that they can reach all the services they needed, and speed wasn\u2019t an issue.\u201d<\/p><\/div><p><a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CAnytime%2520employees%2520are%2520outside%2520the%2520office%2520-%2520at%2520home%2520or%2520coffee%2520shop%2520-%2520wherever%2520they%2520might%2520be,%2520we%2520validated%2520that%2520they%2520can%2520reach%2520all%2520the%2520services%2520they%2520needed,%2520and%2520speed%2520wasn%25E2%2580%2599t%2520an%2520issue.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fscottmadden-azura-security-integration\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">The transition to the new tool was heavily based on the company\u2019s SSO. The <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/help.nordlayer.com\/docs\/azure-ad-3rd-party-authentication\/\" target=\"_blank\" rel=\"noopener\">documentation, knowledge base<\/a>, and support team are highly responsive with communication to walk IT leaders through the process.<\/p><div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\"><div><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cFor other potential decision-makers: onboarding NordLayer isn\u2019t a heavy lift \u2014 you have the support and knowledge base ready, so it\u2019s pretty straightforward.\u201d<\/p><\/div><p><a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CFor%2520other%2520potential%2520decision-makers:%2520onboarding%2520NordLayer%2520isn%25E2%2580%2599t%2520a%2520heavy%2520lift%2520%25E2%2580%2594%2520you%2520have%2520the%2520support%2520and%2520knowledge%2520base%2520ready,%2520so%2520it%25E2%2580%2599s%2520pretty%2520straightforward.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fscottmadden-azura-security-integration\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">Moreover, NordLayer\u2019s Control Panel provides a good cross-reference point for those using the tool while working outside the office by filtering ongoing active connections.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">It also delivers another step in the reporting process for the IT admin and the whole organization. For instance, it verifies that the organization follows internal policies by exporting connection data to verify and justify to a third-party audit.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Pro cybersecurity tips<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Different sectors, industries, and services, but the same goal unites every organization\u2019s IT leaders \u2014 securing their company assets. Following best practices and professional knowledge helps achieve security targets easier. Clinton Miller, the IT Director at ScottMadden, shares his top-on-the-list tips:<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5u3P0QXTUY3n3fpQi7bxsk\/793ad6e3cd89533f32a7238964c088bb\/Quotes_of_ScottMadden_with_photo_web_1400x704.png?w=1400&amp;h=704&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"704\" \/><\/p><p><picture>Do you need to upgrade existing tools used in your organization to align with best practices in the industry, improve processes and performance for the team, or expand your capabilities of tracking and reviewing the implemented security strategy?<\/picture><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">Using NordLayer, you can integrate more features and functionalities with the organization\u2019s preferred tools, service providers, and <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/identity-access-management\/\">IAM solutions<\/a>. It is possible without committing to massive changes and re-organizing current policies and infrastructure. <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/contact-sales\/\">Reach out<\/a> to find out about your options on how to secure connections for the off-office employees and improve their experience while working online.<\/p><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ScottMaden is a management consulting group that suppor [&hellip;]<\/p>\n","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,973,1075,61],"tags":[1132,974,1076],"class_list":["post-64051","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-nord-security","category-year2023","category-press-release","tag-nordlayer","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How ScottMadden rolled out security integration with Azure AD - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How ScottMadden rolled out security integration with Azure AD - Version 2\" \/>\n<meta property=\"og:description\" content=\"ScottMaden is a management consulting group that suppor [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-27T06:25:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/how-scottmadden-rolled-out-security-integration-with-azure-ad\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"How ScottMadden rolled out security integration with Azure AD\",\"datePublished\":\"2023-02-27T06:25:47+00:00\",\"dateModified\":\"2024-09-13T08:31:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/how-scottmadden-rolled-out-security-integration-with-azure-ad\\\/\"},\"wordCount\":953,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1J5d3H6yqHUdTUbcKoS3fp\\\/a700094553cb5918eb4cdd2d047b6612\\\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"Nord Security\",\"2023\"],\"articleSection\":[\"NordLayer\",\"Nord Security\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/how-scottmadden-rolled-out-security-integration-with-azure-ad\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/\",\"name\":\"How ScottMadden rolled out security integration with Azure AD - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1J5d3H6yqHUdTUbcKoS3fp\\\/a700094553cb5918eb4cdd2d047b6612\\\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-02-27T06:25:47+00:00\",\"dateModified\":\"2024-09-13T08:31:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1J5d3H6yqHUdTUbcKoS3fp\\\/a700094553cb5918eb4cdd2d047b6612\\\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1J5d3H6yqHUdTUbcKoS3fp\\\/a700094553cb5918eb4cdd2d047b6612\\\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/scottmadden-azura-security-integration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How ScottMadden rolled out security integration with Azure AD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How ScottMadden rolled out security integration with Azure AD - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/","og_locale":"zh_HK","og_type":"article","og_title":"How ScottMadden rolled out security integration with Azure AD - Version 2","og_description":"ScottMaden is a management consulting group that suppor [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/","og_site_name":"Version 2","article_published_time":"2023-02-27T06:25:47+00:00","article_modified_time":"2024-09-13T08:31:26+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"versionpan","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/02\/how-scottmadden-rolled-out-security-integration-with-azure-ad\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"How ScottMadden rolled out security integration with Azure AD","datePublished":"2023-02-27T06:25:47+00:00","dateModified":"2024-09-13T08:31:26+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/02\/how-scottmadden-rolled-out-security-integration-with-azure-ad\/"},"wordCount":953,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["NordLayer","Nord Security","2023"],"articleSection":["NordLayer","Nord Security","2023","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/02\/how-scottmadden-rolled-out-security-integration-with-azure-ad\/","url":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/","name":"How ScottMadden rolled out security integration with Azure AD - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-02-27T06:25:47+00:00","dateModified":"2024-09-13T08:31:26+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1J5d3H6yqHUdTUbcKoS3fp\/a700094553cb5918eb4cdd2d047b6612\/Case_Study_ScottMadden_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/scottmadden-azura-security-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How ScottMadden rolled out security integration with Azure AD"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/zh\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gF5","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/64051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=64051"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/64051\/revisions"}],"predecessor-version":[{"id":64055,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/64051\/revisions\/64055"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=64051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=64051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=64051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}