{"id":1189,"date":"2017-09-05T09:00:31","date_gmt":"2017-09-05T16:00:31","guid":{"rendered":"https:\/\/www.microsoft.com\/hr-hr\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/"},"modified":"2022-06-28T11:08:13","modified_gmt":"2022-06-28T18:08:13","slug":"how-we-secure-your-data-in-azure-ad","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/","title":{"rendered":"Kako osiguravamo va\u0161e podatke na servisu Azure AD"},"content":{"rendered":"

Pozdrav svima,<\/span>
\n<\/span><\/p>\n

Uz sva kr\u0161enja sigurnosti servisa za identitete u oblaku koja smo vidjeli u zadnjih nekoliko godina dobivamo puno pitanja o tome kako \u0161titimo podatke korisnika. Stoga \u0107emo u dana\u0161njem blogu u\u0107i u detalje kako \u0161titimo podatke korisnika na servisu Azure AD.
\n<\/span><\/p>\n

Sigurnost podatkovnih centara i servisa
\n<\/span><\/h3>\n

Po\u010dnimo s na\u0161im podatkovnim centrima. Prije svega, sve osoblje Microsoftovih podatkovnih centara mora pro\u0107i temeljitu provjeru. Sav pristup na\u0161im podatkovnim centrima strogo je kontroliran i svaki ulazak i izlazak se nadzire. U podatkovnim centrima kriti\u010dni servisi Azure AD koji pohranjuju podatke korisnika smje\u0161teni su u posebnim rackovima, a njihova fizi\u010dka adresa krajnje je nedostupna i pod nadzorom kamera 24 sata dnevno. Uz to, ako se neki od tih poslu\u017eitelja otpi\u0161e, svi se diskovi logi\u010dki i fizi\u010dki uni\u0161tavaju da bi se sprije\u010dilo curenje podataka.
\n<\/span><\/p>\n

Zatim ograni\u010davamo broj osoba koje mogu pristupati servisima Azure AD, pa \u010dak i oni koji imaju dozvole za pristup svakodnevno rade bez tih ovlasti kad se prijave. Kad im zatrebaju ovlasti za pristup servisu, moraju pro\u0107i upite vi\u0161estruke provjere autenti\u010dnosti pomo\u0107u pametne kartice da bi potvrdili identitet i poslali zahtjev. Kad se zahtjev odobri, korisni\u010dke ovlasti dodjeljuju im se samo za taj slu\u010daj. Te se ovlasti automatski uklanjaju nakon fiksnog vremenskog razdoblja i oni kojima treba vi\u0161e vremena moraju ponovno pro\u0107i postupak zahtijevanja i odobravanja.
\n<\/span><\/p>\n

Kad se te ovlasti dodijele, sav se pristup odvija putem upravljanje administratorske radne stanice (u skladu s objavljenim Smjernicama za radne stanice s ovla\u0161tenim pristupom<\/a>). To zahtijeva pravilnik, a uskla\u0111enost se strogo nadzire. Te radne stanice koriste fiksnu sliku i sav je softver na stroju posve upravljan. Da bi se minimizirale izlo\u017eene povr\u0161ine, dopu\u0161tene su samo odre\u0111ene aktivnosti i korisnici ne mogu slu\u010dajno zaobi\u0107i dizajn administratorske radne stanice jer nemaju administratorske ovlasti na ure\u0111aju. Radi dodatne za\u0161tite radnih stanica, sav se pristup mora odvijati putem pametnih kartica, a pristup svakoj ograni\u010den je na to\u010dno odre\u0111eni skup korisnika.
\n<\/span><\/p>\n

Na kraju, odr\u017eavamo i mali broj (manje od pet) ra\u010duna za hitne slu\u010dajeve. Ti su ra\u010duni rezervirani isklju\u010divo za nu\u017edu i osigurani posebnim procedurama u vi\u0161e koraka. Svaka upotreba takvih ra\u010duna nadzire se i pokre\u0107e alarme.
\n<\/span><\/p>\n

Otkrivanje prijetnji
\n<\/span><\/h3>\n

Postoji nekoliko automatskih provjera koje redovito radimo, svakih nekoliko minuta, da bismo osigurali da sve funkcionira prema o\u010dekivanju, \u010dak i kad dodajemo nove funkcionalnosti koje na\u0161i korisnici tra\u017ee:
\n<\/span><\/p>\n

    \n
  • Otkrivanje kr\u0161enja:<\/strong> provjeravamo uzorke koji upu\u0107uju na kr\u0161enja. Redovito dodajemo nove zna\u010dajke tom skupu otkrivanja. Koristimo i automatske testove koji pokre\u0107u te uzorke, pa provjeravamo i funkcionira li na\u0161a logika za otkrivanje kr\u0161enja pravilno!
    \n<\/span><\/li>\n
  • Testiranja propusnosti:<\/strong> ti se testovi izvode cijelo vrijeme. Ti testovi poku\u0161avaju cijelo vrijeme razne stvari kako bi kompromitirali na\u0161 servis i o\u010dekujemo da svaki put ne uspiju. Ako uspiju, znamo da ne\u0161to nije u redu i to odmah mo\u017eemo ispraviti.
    \n<\/span><\/li>\n
  • Nadzor:<\/strong> sve se administratorske aktivnosti bilje\u017ee. Sve neo\u010dekivane aktivnosti (npr. da administrator stvara ra\u010dune s ovlastima) uzrokuju pokretanje upozorenja, koja nas pak poti\u010du na dubinsku provjeru te radnje kako bismo se uvjerili da se ne radi o nepravilnosti.
    \n<\/span><\/li>\n<\/ul>\n

    Jesmo li rekli da \u0161ifriramo sve va\u0161e podatke na servisu Azure AD? Jer da, to radimo \u2013 koristimo BitLocker za \u0161ifriranje svih \u010duvanih podataka o identitetima na servisu Azure AD. A \u0161to kad putuju mre\u017eom? I tada ih \u0161ifriramo! Svi API-ji za Azure AD utemeljeni su na webu pomo\u0107u SSL-a preko HTTPS-a radi \u0161ifriranja podataka.\u00a0<\/span>Svi poslu\u017eitelji servisa Azure AD konfigurirani su za kori\u0161tenje TLS-a 1.2. Omogu\u0107ujemo ulazne veze preko TLS-a 1.1 i 1.0 radi podr\u0161ke vanjskih klijenata. Izri\u010dito odbijamo sve veze preko svih starijih verzija SSL-a, uklju\u010duju\u0107i SSL 3.0 i 2.0.\u00a0<\/span>Pristup informacijama ograni\u010den je preko autorizacije utemeljene na tokenima i podaci svakog klijenta dostupni su samo ra\u010dunima s dozvolama za taj klijent. Uz to, na\u0161i interni API-ji imaju dodatni zahtjev za kori\u0161tenje SSL klijentske\/poslu\u017eiteljske provjere autenti\u010dnosti preko pouzdanih certifikata i lanaca izdavanja.
    \n<\/span><\/p>\n

    Napomena za kraj
    \n<\/span><\/h3>\n

    Azure AD isporu\u010duje se na dva na\u010dina, a ova objava opisala je sigurnost i \u0161ifriranje javnog servisa koji nudi i kojim upravlja Microsoft. Pozivamo vas da se sa sli\u010dnim pitanjima o na\u0161im instancama nacionalnog oblaka kojima rukuju pouzdani partneri obratite va\u0161im timovima za ra\u010dune.
    \n<\/span><\/p>\n

    (Napomena: kao jednostavno pravilo palca, ako upravljate ili pristupate servisima Microsoft Online preko URL-ova koji zavr\u0161avaju na .com, ova objava govori o tome kako \u0161titimo i \u0161ifriramo va\u0161e podatke.)
    \n<\/span><\/p>\n

    Sigurnost va\u0161ih podataka na\u0161 je glavni prioritet i pristupamo joj VRLO ozbiljno. Nadam se da vam je ovaj pregled na\u0161eg \u0161ifriranja podataka i sigurnosnog protokola bio umiruju\u0107 i koristan.
    \n<\/span><\/p>\n

    Srda\u010dan pozdrav,
    \n<\/span><\/p>\n

    Alex Simons (Twitter: @Alex_A_Simons)
    \n<\/span><\/p>\n

    Director of Program Management
    \n<\/span><\/p>\n

    Microsoft Identity Division<\/span><\/p>\n

    \u00a0<\/p>\n

    [a\u017eurirano 3. listopada 2017. radi dodavanja informacija o verzijama u na\u0161em kori\u0161tenju TLS-a i SSL-a]<\/p>\n","protected":false},"excerpt":{"rendered":"

    Pozdrav svima, Uz sva kr\u0161enja sigurnosti servisa za identitete u oblaku koja smo vidjeli u zadnjih nekoliko godina dobivamo puno pitanja o tome kako \u0161titimo podatke korisnika. Stoga \u0107emo u dana\u0161njem blogu u\u0107i u detalje kako \u0161titimo podatke korisnika na servisu Azure AD. Sigurnost podatkovnih centara i servisa Po\u010dnimo s na\u0161im podatkovnim centrima. Prije svega,<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[147],"product":[158,148],"audience":[193],"tags":[219,233],"coauthors":[],"class_list":["post-1189","post","type-post","status-publish","format-standard","hentry","content-type-tips-and-guides","product-enterprise-mobility-security","product-microsoft-365","audience-enterprise","tag-azure","tag-mac"],"yoast_head":"\nKako osiguravamo va\u0161e podatke na servisu Azure AD - Microsoft 365 Blog<\/title>\n<meta name=\"description\" content=\"field_56e9a1828eb03\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kako osiguravamo va\u0161e podatke na servisu Azure AD - Microsoft 365 Blog\" \/>\n<meta property=\"og:description\" content=\"field_56e9a1828eb03\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft 365 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-05T16:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-28T18:08:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-content\/uploads\/sites\/37\/2022\/06\/cropped-microsoft_logo_element.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Kako osiguravamo va\u0161e podatke na servisu Azure AD\",\"datePublished\":\"2017-09-05T16:00:31+00:00\",\"dateModified\":\"2022-06-28T18:08:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\"},\"wordCount\":856,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#organization\"},\"keywords\":[\"Azure\",\"Mac\"],\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\",\"url\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\",\"name\":\"Kako osiguravamo va\u0161e podatke na servisu Azure AD - Microsoft 365 Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#website\"},\"datePublished\":\"2017-09-05T16:00:31+00:00\",\"dateModified\":\"2022-06-28T18:08:13+00:00\",\"description\":\"field_56e9a1828eb03\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kako osiguravamo va\u0161e podatke na servisu Azure AD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/\",\"name\":\"Microsoft 365 Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#organization\",\"name\":\"Microsoft 365 Blog\",\"url\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-content\/uploads\/sites\/37\/2022\/06\/ms-logo-amp.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-content\/uploads\/sites\/37\/2022\/06\/ms-logo-amp.webp\",\"width\":279,\"height\":60,\"caption\":\"Microsoft 365 Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kako osiguravamo va\u0161e podatke na servisu Azure AD - Microsoft 365 Blog","description":"field_56e9a1828eb03","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/","og_locale":"hr_HR","og_type":"article","og_title":"Kako osiguravamo va\u0161e podatke na servisu Azure AD - Microsoft 365 Blog","og_description":"field_56e9a1828eb03","og_url":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/","og_site_name":"Microsoft 365 Blog","article_published_time":"2017-09-05T16:00:31+00:00","article_modified_time":"2022-06-28T18:08:13+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-content\/uploads\/sites\/37\/2022\/06\/cropped-microsoft_logo_element.webp","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/"},"author":{"name":"","@id":""},"headline":"Kako osiguravamo va\u0161e podatke na servisu Azure AD","datePublished":"2017-09-05T16:00:31+00:00","dateModified":"2022-06-28T18:08:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/"},"wordCount":856,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#organization"},"keywords":["Azure","Mac"],"inLanguage":"hr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/","url":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/","name":"Kako osiguravamo va\u0161e podatke na servisu Azure AD - Microsoft 365 Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#website"},"datePublished":"2017-09-05T16:00:31+00:00","dateModified":"2022-06-28T18:08:13+00:00","description":"field_56e9a1828eb03","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/2017\/09\/05\/how-we-secure-your-data-in-azure-ad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/"},{"@type":"ListItem","position":2,"name":"Kako osiguravamo va\u0161e podatke na servisu Azure AD"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#website","url":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/","name":"Microsoft 365 Blog","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hr"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#organization","name":"Microsoft 365 Blog","url":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/","logo":{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-content\/uploads\/sites\/37\/2022\/06\/ms-logo-amp.webp","contentUrl":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-content\/uploads\/sites\/37\/2022\/06\/ms-logo-amp.webp","width":279,"height":60,"caption":"Microsoft 365 Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/posts\/1189"}],"collection":[{"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/comments?post=1189"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/posts\/1189\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/media?parent=1189"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/content-type?post=1189"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/product?post=1189"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/audience?post=1189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/tags?post=1189"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/hr-hr\/microsoft-365\/blog\/wp-json\/wp\/v2\/coauthors?post=1189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}