{"id":5853,"date":"2005-11-16T18:14:00","date_gmt":"2005-11-16T18:14:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/windowsserver\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/"},"modified":"2024-03-07T16:50:42","modified_gmt":"2024-03-08T00:50:42","slug":"802-1x-authentication-for-wired-networks-a-vulnerability-note","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/","title":{"rendered":"802.1x Authentication for Wired Networks – A vulnerability note"},"content":{"rendered":"

Thanks to Steve Riley for pointing out some of the vulnerabilities about my post with using 802.1x to secure wired networks:<\/a>\u00a0 (The whitepaper from this post does address these concerns)<\/p>\n

Essentially,\u00a0\u00a0the vulnerability\u00a0is a weakness in the 802.1x protocol —\u00a0it authenticates only upon connection establishment and assumes\u00a0all traffic after authentication is legitimate. So if an attacker had physical access to your network, they could unplug an authenticated machine from the switch port and plug it an an ‘attack’ computer and the authenticated computer into a hub that is then connected back to the switch port. A little IP and MAC spoofing……and bingo. (There is a little more to it than that – but you get the gist)<\/p>\n

NET\/NET – For the highest level of security when using 802.1x for wired networks – use additional defense in depth strategies…..like IPSec.<\/p>\n

You can read the more on this here: http:\/\/www.microsoft.com\/technet\/community\/columns\/secmgmt\/sm0805.mspx<\/a>\u00a0or in Steve’s Blog.<\/p>\n

– Ward Ralston<\/p>\n","protected":false},"excerpt":{"rendered":"

Thanks to Steve Riley for pointing out some of the vulnerabilities about my post with using 802.1x to secure wired networks:\u00a0 (The whitepaper from this post does address these concerns) Essentially,\u00a0\u00a0the vulnerability\u00a0is a weakness in the 802.1x protocol —\u00a0it authenticates only upon connection establishment and assumes\u00a0all traffic after authentication is legitimate.<\/p>\n","protected":false},"author":685,"featured_media":20688,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"msxcm_post_with_no_image":false,"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"post_tag":[],"product":[],"content-type":[],"solution":[1000],"coauthors":[926],"class_list":["post-5853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","solution-networking","review-flag-1593580427-982"],"yoast_head":"\n802.1x Authentication for Wired Networks - A vulnerability note | Microsoft Windows Server Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"802.1x Authentication for Wired Networks - A vulnerability note | Microsoft Windows Server Blog\" \/>\n<meta property=\"og:description\" content=\"Thanks to Steve Riley for pointing out some of the vulnerabilities about my post with using 802.1x to secure wired networks:\u00a0 (The whitepaper from this post does address these concerns) Essentially,\u00a0\u00a0the vulnerability\u00a0is a weakness in the 802.1x protocol —\u00a0it authenticates only upon connection establishment and assumes\u00a0all traffic after authentication is legitimate.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Windows Server Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WindowsServer\" \/>\n<meta property=\"article:published_time\" content=\"2005-11-16T18:14:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T00:50:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Windows Server Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@WindowsServer\" \/>\n<meta name=\"twitter:site\" content=\"@WindowsServer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Windows Server Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/author\/microsoft-windows-server-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Windows Server Team\"}],\"headline\":\"802.1x Authentication for Wired Networks – A vulnerability note\",\"datePublished\":\"2005-11-16T18:14:00+00:00\",\"dateModified\":\"2024-03-08T00:50:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\"},\"wordCount\":180,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\",\"name\":\"802.1x Authentication for Wired Networks - A vulnerability note | Microsoft Windows Server Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg\",\"datePublished\":\"2005-11-16T18:14:00+00:00\",\"dateModified\":\"2024-03-08T00:50:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg\",\"width\":1170,\"height\":640,\"caption\":\"a man standing in front of a window\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"802.1x Authentication for Wired Networks – A vulnerability note\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/\",\"name\":\"Microsoft Windows Server Blog\",\"description\":\"Your Guide to the Latest Windows Server Product Information\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization\",\"name\":\"Microsoft Windows Server Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":1,\"height\":1,\"caption\":\"Microsoft Windows Server Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WindowsServer\",\"https:\/\/x.com\/WindowsServer\",\"https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/\",\"https:\/\/www.youtube.com\/user\/MSCloudOS\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"802.1x Authentication for Wired Networks - A vulnerability note | Microsoft Windows Server Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/","og_locale":"en_US","og_type":"article","og_title":"802.1x Authentication for Wired Networks - A vulnerability note | Microsoft Windows Server Blog","og_description":"Thanks to Steve Riley for pointing out some of the vulnerabilities about my post with using 802.1x to secure wired networks:\u00a0 (The whitepaper from this post does address these concerns) Essentially,\u00a0\u00a0the vulnerability\u00a0is a weakness in the 802.1x protocol —\u00a0it authenticates only upon connection establishment and assumes\u00a0all traffic after authentication is legitimate.","og_url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/","og_site_name":"Microsoft Windows Server Blog","article_publisher":"https:\/\/www.facebook.com\/WindowsServer","article_published_time":"2005-11-16T18:14:00+00:00","article_modified_time":"2024-03-08T00:50:42+00:00","og_image":[{"width":1170,"height":640,"url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg","type":"image\/jpeg"}],"author":"Microsoft Windows Server Team","twitter_card":"summary_large_image","twitter_creator":"@WindowsServer","twitter_site":"@WindowsServer","twitter_misc":{"Written by":"Microsoft Windows Server Team","Est. reading time":"1 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/author\/microsoft-windows-server-team\/","@type":"Person","@name":"Microsoft Windows Server Team"}],"headline":"802.1x Authentication for Wired Networks – A vulnerability note","datePublished":"2005-11-16T18:14:00+00:00","dateModified":"2024-03-08T00:50:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/"},"wordCount":180,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/","name":"802.1x Authentication for Wired Networks - A vulnerability note | Microsoft Windows Server Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg","datePublished":"2005-11-16T18:14:00+00:00","dateModified":"2024-03-08T00:50:42+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Conference-room-meeting_Colin_02.jpg","width":1170,"height":640,"caption":"a man standing in front of a window"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2005\/11\/16\/802-1x-authentication-for-wired-networks-a-vulnerability-note\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/"},{"@type":"ListItem","position":2,"name":"802.1x Authentication for Wired Networks – A vulnerability note"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/","name":"Microsoft Windows Server Blog","description":"Your Guide to the Latest Windows Server Product Information","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#organization","name":"Microsoft Windows Server Blog","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":1,"height":1,"caption":"Microsoft Windows Server Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WindowsServer","https:\/\/x.com\/WindowsServer","https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/","https:\/\/www.youtube.com\/user\/MSCloudOS"]}]}},"word_count":170,"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Windows Server Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts\/5853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/users\/685"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/comments?post=5853"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts\/5853\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/media\/20688"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/media?parent=5853"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/post_tag?post=5853"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/product?post=5853"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/content-type?post=5853"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/solution?post=5853"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/coauthors?post=5853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}