{"id":2286,"date":"2014-06-09T13:42:01","date_gmt":"2014-06-09T19:42:01","guid":{"rendered":"http:\/\/www.jumpcloud.com\/?p=2286"},"modified":"2024-01-12T16:34:33","modified_gmt":"2024-01-12T21:34:33","slug":"know-users-accessing-servers","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers","title":{"rendered":"Do you know all of the users accessing your servers?"},"content":{"rendered":"\n

One of the most dangerous issues for an IT admin is having dormant admin users on machines. Compliance regulations such as PCI call this issue out (see Section 8, page 46 of the PCI standard<\/a>), but with a large number of servers, applications, and network devices it is often hard to keep track of all of your servers and accounts. Even if you happen to use a directory service like LDAP<\/a> or Active Directory<\/a>, chances are you have some user accounts not connected to those directory services. Also, you may have some servers that aren\u2019t part of the \u201cdomain\u201d. Either way, having an accurate picture of every admin account on all of your systems is an important and critical issue to track.<\/p>\n\n\n\n

Today, outside of trusting your OpenLDAP server or AD implementation there isn\u2019t really a good way to solve for this issue. You may write a script to tell you, but that inherently has all of the trouble of ensuring that you know about each server, can log into it, and then can bring back all of the data. With 探花大神, we are going to tell you about two methods that you can solve for this issue.<\/p>\n\n\n\n

探花大神 centralized user management \u2013 monitoring and managing server access<\/b><\/h4>\n\n\n\n

The first option to solving this issue is to use 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae. 探花大神\u2019s cloud-based, centralized user management solution can manage Linux (SSH) and Windows user accounts (and Mac user accounts as well among all kinds of other applications and network infrastructure components). You simply create the privileged user account in 探花大神 and then link it in an easy-to-use web-based UI to the servers that the person should have access to. You can manage access across internal servers, virtual servers, and cloud servers across providers and operating systems. We provide a central console for you to manage and track access. If you manage all of your accounts within 探花大神, you can easily add, delete, and modify access controls with just a few clicks. No writing code to manage your users and getting in the middle of handling SSH keys or passwords. 探花大神\u2019s end user portal handles all of those issues for you so that you aren\u2019t in the middle of it \u2013 which by the way is a security risk anyway. 探花大神 will track all access so you have a log of all logins and privileged commands executed by the user. That\u2019s a nice wrap-up to ensuring you know who is on your servers \u2013 what they are doing!<\/p>\n\n\n\n

探花大神 command execution functionality to report on all privileged users on a server<\/b><\/h4>\n\n\n\n

The second option provides an audit or double check. 探花大神\u2019s server orchestration functionality enables you to execute tasks across your entire server infrastructure. You can use 探花大神\u2019s command execution functionality for all kinds of tasks including checking of log files, patching servers, setting security conditions, and thousands of other tasks that you need to execute. In this case, we are going to leverage the functionality to get a quick report of every privileged user on each server. We\u2019ll also tell you when they last logged in, if they logged in from a strange location, or if it\u2019s the first time they used their account.<\/p>\n\n\n\n

Let\u2019s put together how you would accomplish this task within 探花大神.<\/p>\n\n\n\n

Step 1: 探花大神 agent on servers<\/b><\/h5>\n\n\n\n

Ensure that the 探花大神 agent<\/a> is on all of your servers. There are two ways to make that happen automatically \u2013 one, include the 探花大神 agent with your standard image or AMI; two, distribute the agent with your favorite configuration automation solution.<\/p>\n\n\n\n

Step 2: Develop a script to query all servers for their users<\/b><\/h5>\n\n\n\n

Here\u2019s our script to accomplish that:<\/p>\n\n\n\n

Linux<\/b><\/p>\n\n\n\n

awk -F’:’ ‘{ if ($2 != “*”) print }’ \/etc\/shadow<\/p>\n\n\n\n

Windows<\/b><\/p>\n\n\n\n

Get-WmiObject -Class Win32_UserAccount<\/p>\n\n\n\n

Step 3: Schedule<\/b><\/h5>\n\n\n\n

Let\u2019s put this script to run weekly so that we know exactly what\u2019s happening with our servers:<\/p>\n\n\n\n

    \n
  1. Login to the 探花大神 console<\/li>\n\n\n\n
  2. Go into the Commands tab on the left hand navigation.<\/li>\n\n\n\n
  3. Click on \u201cCreate Command\u201d at the top of the \u201cSaved Commands\u201d table.<\/li>\n\n\n\n
  4. Select whether the command is for Linux or Windows at the top of the window.<\/li>\n\n\n\n
  5. Select a name for the command, such as \u201cAudit Windows Users\u201d<\/li>\n\n\n\n
  6. Select the user to run as to \u2018root\u2019 (if you\u2019re running against Linux servers)<\/li>\n\n\n\n
  7. Select the set of servers to run the command against, either server-by-server, or via the tag.<\/li>\n\n\n\n
  8. Then, cut and paste one of the commands below (make sure you\u2019re pasting a Linux command if you select Linux in step 4, same for Windows).<\/li>\n\n\n\n
  9. Change the Launch Event to \u201cRun as Repeating\u201d<\/li>\n\n\n\n
  10. Select \u201cCommand Repeats By: Week\u201d<\/li>\n\n\n\n
  11. Select the days you\u2019d like to run on during the week, and the time of day to run on.<\/li>\n\n\n\n
  12. Click \u201cSave & Run as Repeating\u201d<\/li>\n<\/ol>\n\n\n\n

    Your screen should look like the following:<\/p>\n\n\n

    \n
    \"探花大神-execute-commands\"<\/figure><\/div>\n\n\n
    Step 4: Execute across server infrastructure<\/b><\/h5>\n\n\n\n

    Let\u2019s run it across our entire server infrastructure. To do so, we\u2019ll just take the scheduled command we created, and run it now.<\/p>\n\n\n\n

      \n
    1. Login to the 探花大神 console<\/li>\n\n\n\n
    2. Go into the Commands tab on the left hand navigation.<\/li>\n\n\n\n
    3. Find the command you just saved, and click the green \u201cRun Now\u201d button next to it.<\/li>\n<\/ol>\n\n\n\n
      Step 5: Let\u2019s process the output<\/b><\/h5>\n\n\n\n

      Your user list for each host will appear on the Commands tab in the Command Results table. Just click \u201cDetails\u201d, and you\u2019ll be able to see the list of all active users on each server.<\/p>\n\n\n\n

      It was that easy. Feel free to use these scripts and modify them for your 探花大神 installation. Automating key tasks like this is the power of 探花大神. We\u2019ll be putting out many more \u201chow to\u2019s\u201d \u2013 if you have any suggestions on tasks that you would like us to highlight, please feel free to let us know<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"

      Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.<\/p>\n","protected":false},"author":9,"featured_media":2288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[],"collection":[2778,2780],"platform":[],"funnel_stage":[3015],"coauthors":[2511],"acf":[],"yoast_head":"\nDo you know all of the users accessing your servers? - 探花大神<\/title>\n<meta name=\"description\" content=\"Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do you know all of the users accessing your servers?\" \/>\n<meta property=\"og:description\" content=\"Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\" \/>\n<meta property=\"og:site_name\" content=\"探花大神\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-09T19:42:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-12T21:34:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rajat Bhargava\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rajat Bhargava\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\"},\"author\":{\"name\":\"Rajat Bhargava\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/bda984539a66b23f47085df4f41635ba\"},\"headline\":\"Do you know all of the users accessing your servers?\",\"datePublished\":\"2014-06-09T19:42:01+00:00\",\"dateModified\":\"2024-01-12T21:34:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\"},\"wordCount\":988,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg\",\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\",\"url\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\",\"name\":\"Do you know all of the users accessing your servers? - 探花大神\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg\",\"datePublished\":\"2014-06-09T19:42:01+00:00\",\"dateModified\":\"2024-01-12T21:34:33+00:00\",\"description\":\"Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do you know all of the users accessing your servers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"探花大神\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"探花大神\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"探花大神\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/bda984539a66b23f47085df4f41635ba\",\"name\":\"Rajat Bhargava\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/be4a33b774a839755d850c80fafe3427\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf74832070f694ca8ecf307f64295d14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf74832070f694ca8ecf307f64295d14?s=96&d=mm&r=g\",\"caption\":\"Rajat Bhargava\"},\"description\":\"Rajat Bhargava is an entrepreneur, investor, author, and CEO and co-founder of 探花大神. An MIT graduate with over two decades of high-tech experience, Rajat is a ten-time entrepreneur with six exits including two IPOs and four trade sales.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Do you know all of the users accessing your servers? - 探花大神","description":"Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers","og_locale":"en_US","og_type":"article","og_title":"Do you know all of the users accessing your servers?","og_description":"Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.","og_url":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers","og_site_name":"探花大神","article_published_time":"2014-06-09T19:42:01+00:00","article_modified_time":"2024-01-12T21:34:33+00:00","og_image":[{"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg","width":1,"height":1,"type":"image\/jpeg"}],"author":"Rajat Bhargava","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rajat Bhargava","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers"},"author":{"name":"Rajat Bhargava","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/bda984539a66b23f47085df4f41635ba"},"headline":"Do you know all of the users accessing your servers?","datePublished":"2014-06-09T19:42:01+00:00","dateModified":"2024-01-12T21:34:33+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers"},"wordCount":988,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg","articleSection":["Best Practices"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers","url":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers","name":"Do you know all of the users accessing your servers? - 探花大神","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg","datePublished":"2014-06-09T19:42:01+00:00","dateModified":"2024-01-12T21:34:33+00:00","description":"Know the users accessing your servers by using 探花大神 as your centralized user management platform or what we call Directory-as-a-Service\u00ae.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2014\/06\/users-team.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/know-users-accessing-servers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Do you know all of the users accessing your servers?"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"探花大神","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"探花大神","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"探花大神"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/bda984539a66b23f47085df4f41635ba","name":"Rajat Bhargava","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/be4a33b774a839755d850c80fafe3427","url":"https:\/\/secure.gravatar.com\/avatar\/bf74832070f694ca8ecf307f64295d14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf74832070f694ca8ecf307f64295d14?s=96&d=mm&r=g","caption":"Rajat Bhargava"},"description":"Rajat Bhargava is an entrepreneur, investor, author, and CEO and co-founder of 探花大神. An MIT graduate with over two decades of high-tech experience, Rajat is a ten-time entrepreneur with six exits including two IPOs and four trade sales.","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/2286"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=2286"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/2286\/revisions"}],"predecessor-version":[{"id":103533,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/2286\/revisions\/103533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/2288"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=2286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=2286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=2286"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=2286"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=2286"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=2286"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=2286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}