{"id":245416,"date":"2025-02-10T06:10:53","date_gmt":"2025-02-10T06:10:53","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/"},"modified":"2025-02-10T06:10:53","modified_gmt":"2025-02-10T06:10:53","slug":"what-is-a-scim","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/","title":{"rendered":"Understanding SCIM for Identity Management"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Ever wonder how a single <strong>leaked password<\/strong> can cause chaos in the digital world? Recently, a commonly used password surfaced in multiple <strong>data breaches<\/strong>, appearing on notorious leak sites and forums where hackers trade stolen information. This leak is significant in the context of cybersecurity because it highlights the vulnerability of user accounts and the importance of <strong>strong, unique passwords<\/strong>. For everyday users, this serves as a crucial reminder to regularly update their passwords and adopt better <strong>security practices<\/strong> to protect their personal information from potential threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#What_Is_SCIM_and_Why_Does_It_Matter\" >What Is SCIM and Why Does It Matter?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#The_Core_Components_of_SCIM_Architecture\" >The Core Components of SCIM Architecture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Key_Benefits_for_Enterprise_Identity_Management\" >Key Benefits for Enterprise Identity Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#How_SCIM_Streamlines_User_Provisioning\" >How SCIM Streamlines User Provisioning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Best_Practices_for_SCIM_Implementation\" >Best Practices for SCIM Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Overcoming_Common_SCIM_Challenges\" >Overcoming Common SCIM Challenges<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#How_Does_SCIM_Compare_to_Other_Identity_Management_Protocols_Like_LDAP\" >How Does SCIM Compare to Other Identity Management Protocols Like LDAP?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Can_SCIM_Handle_Complex_Password_Policies_and_Multi-Factor_Authentication_Requirements\" >Can SCIM Handle Complex Password Policies and Multi-Factor Authentication Requirements?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#What_Are_the_Costs_Associated_With_Implementing_SCIM_in_an_Organization\" >What Are the Costs Associated With Implementing SCIM in an Organization?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Is_There_a_Limit_to_How_Many_User_Attributes_SCIM_Can_Manage\" >Is There a Limit to How Many User Attributes SCIM Can Manage?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#Does_SCIM_Support_Real-Time_Synchronization_Between_Systems\" >Does SCIM Support Real-Time Synchronization Between Systems?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/what-is-a-scim\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>SCIM is a standardized protocol that automates user identity management across multiple cloud-based applications and systems.<\/li>\n<li>It functions as a digital directory system that synchronizes user information updates across all connected platforms simultaneously.<\/li>\n<li>The system streamlines employee onboarding by automatically creating accounts and managing access permissions across various applications.<\/li>\n<li>SCIM enhances security through automated account deactivation when employees leave and maintains consistent access control across platforms.<\/li>\n<li>Core components include standardized schemas, extension models, and API endpoints that facilitate seamless communication between different systems.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"What_Is_SCIM_and_Why_Does_It_Matter\"><\/span>What Is SCIM and Why Does It Matter?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you think about keeping track of people&#039;s accounts online, it&#039;s a bit like having a <strong>magical address book<\/strong> that updates itself!<\/p>\n<p>Have you ever wondered how your teacher keeps track of everyone&#039;s information at school? Well, SCIM is like a <strong>super-smart helper<\/strong> that does that for computers!<\/p>\n<p>Think of SCIM as a <strong>special language<\/strong> that helps different computer systems talk to each other. It&#039;s like having a translator who helps kids from different countries play together at recess!<\/p>\n<p>When someone joins or leaves a company, SCIM makes sure all their information gets <strong>updated everywhere at once<\/strong> &#8211; just like how changing your favorite ice cream flavor in one place would automatically tell all your friends!<\/p>\n<p>Isn&#039;t it amazing? SCIM keeps everything organized and safe, like having the <strong>world&#039;s best digital backpack<\/strong>! Modern companies use SCIM because it helps them manage their <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/guptadeepak.com\/securing-cloud-applications-scims-role-in-modern-identity-management-2\/\">cloud-based applications<\/a> more easily.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Core_Components_of_SCIM_Architecture\"><\/span>The Core Components of SCIM Architecture<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize what SCIM is, let&#039;s peek inside its tool box!<\/p>\n<p>SCIM has four super important parts that work together like a team of superheroes. First, there&#039;s the <strong>Core Schema<\/strong> &#8211; it&#039;s like a recipe that tells everyone how to describe users and groups.<\/p>\n<p>Then we&#039;ve got the <strong>Extension Model<\/strong>, which lets you add your own special ingredients to the recipe.<\/p>\n<p>Third comes the <strong>SCIM Protocol<\/strong> &#8211; think of it as the secret handshake that helps different systems talk to each other. The protocol enables <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.goodaccess.com\/blog\/what-is-scim\">automated user provisioning<\/a> across various applications and systems.<\/p>\n<p>Finally, there are <strong>API Endpoints<\/strong>, which are like <strong>magical doorways<\/strong> where all the user information travels through.<\/p>\n<p>It&#039;s just like how you might&#039;ve different doors at school &#8211; one for the cafeteria, one for the gym, and one for your classroom!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Benefits_for_Enterprise_Identity_Management\"><\/span>Key Benefits for Enterprise Identity Management<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>You know how frustrating it&#039;s when you can&#039;t find your favorite toy in a <strong>messy room<\/strong>? Well, SCIM helps keep all your computer passwords and accounts neat and tidy, just like having special pockets for everything in your backpack!<\/p>\n<p>Think of SCIM as your digital helper that makes sure you can get into all your favorite apps without typing passwords over and over. It&#039;s like having a <strong>magic key<\/strong> that opens every door! When users leave the company, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.descope.com\/learn\/post\/scim\">SCIM deactivates accounts<\/a> automatically to keep everything secure.<\/p>\n<p>Plus, it keeps all your information super safe &#8211; kind of like having the <strong>world&#039;s best security guard<\/strong> watching over your precious Pokemon cards.<\/p>\n<p>Isn&#039;t it amazing how SCIM makes everything work together smoothly? It&#039;s just like when all the pieces of your <strong>LEGO set<\/strong> fit perfectly!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_SCIM_Streamlines_User_Provisioning\"><\/span>How SCIM Streamlines User Provisioning<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Imagine your teacher giving out classroom jobs to everyone each morning &#8211; that&#039;s a lot of work, right? Well, that&#039;s kind of like what happens in big companies with lots of computers and programs.<\/p>\n<p>I&#039;m excited to tell you about something called <strong>SCIM<\/strong> that makes everything super easy! It&#039;s like having a <strong>magical helper<\/strong> that gives everyone the right keys to the right doors automatically. When a <strong>new person joins<\/strong>, SCIM quickly sets up all their accounts &#8211; just like getting your library card, lunch pass, and playground pass all at once!<\/p>\n<p>SCIM <strong>keeps track<\/strong> of everything, making sure everyone can get into the programs they need. It&#039;s like having the smartest hall monitor ever!<\/p>\n<p>When someone leaves, it&#039;s just as quick &#8211; SCIM <strong>takes away their access<\/strong> just like collecting badges at the end of field day.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_SCIM_Implementation\"><\/span>Best Practices for SCIM Implementation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Getting <strong>SCIM<\/strong> to work just right is like building the perfect LEGO castle &#8211; you need all the right pieces in the right spots!<\/p>\n<p>I&#039;ll help you understand how to set it up like a pro. Think of SCIM as your <strong>digital helper<\/strong> that makes sure everyone gets their computer passwords and access just right. The system uses <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.scalekit.com\/scim\">standardized REST APIs<\/a> to smoothly connect different applications.<\/p>\n<p>Here are my <strong>top tips<\/strong> that&#039;ll make you say &#034;Wow!&#034;:<\/p>\n<ol>\n<li>Test it first with a small group (like trying a new game at recess)<\/li>\n<li>Set up your digital pathways carefully (imagine building a bridge between two playgrounds)<\/li>\n<li>Keep an eye on how it&#039;s working (like watching your garden grow)<\/li>\n<li>Train your team well (just like teaching friends a new game)<\/li>\n<\/ol>\n<p>Remember to check everything regularly and update when needed &#8211; it&#039;s like keeping your toys organized and working perfectly!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Overcoming_Common_SCIM_Challenges\"><\/span>Overcoming Common SCIM Challenges<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Even with the best <strong>SCIM setup<\/strong>, sometimes things can get a bit wobbly &#8211; just like when your favorite tower of blocks falls over!<\/p>\n<p>You know how frustrating it&#039;s when different toys don&#039;t fit together? Well, that&#039;s what happens with SCIM sometimes!<\/p>\n<p>Different systems mightn&#039;t play nicely together, just like when your puzzle pieces don&#039;t quite match up.<\/p>\n<p>I&#039;ve found that the trickiest part is when <strong>lots of users<\/strong> try to log in at once &#8211; it&#039;s like everyone rushing to get through the playground gate at the same time! When this happens, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/workos.com\/blog\/implementation-challenges-of-a-homegrown-scim-solution\">concurrent requests<\/a> can overwhelm the system and cause delays.<\/p>\n<p>And sometimes, <strong>fixing SCIM problems<\/strong> is like being a detective &#8211; you have to search for clues about what went wrong.<\/p>\n<p>But don&#039;t worry! With some patience and <strong>careful planning<\/strong>, we can solve these challenges together.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_SCIM_Compare_to_Other_Identity_Management_Protocols_Like_LDAP\"><\/span>How Does SCIM Compare to Other Identity Management Protocols Like LDAP?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I like to think of <strong>SCIM<\/strong> and <strong>LDAP<\/strong> as two different superheroes!<\/p>\n<p>SCIM is like a <strong>cloud superhero<\/strong> &#8211; it&#039;s great at managing users across different cloud apps and services.<\/p>\n<p>LDAP, on the other hand, is like the guardian of your building &#8211; it&#039;s perfect for managing users inside your organization&#039;s network.<\/p>\n<p>While they can work together, they&#039;re usually best at different jobs.<\/p>\n<p>SCIM is newer and built for the cloud, while LDAP is older and better for local networks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_SCIM_Handle_Complex_Password_Policies_and_Multi-Factor_Authentication_Requirements\"><\/span>Can SCIM Handle Complex Password Policies and Multi-Factor Authentication Requirements?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that SCIM handles <strong>complex password rules<\/strong> like a strict hall monitor!<\/p>\n<p>It&#039;s super good at making sure your passwords are strong &#8211; like requiring special characters and numbers.<\/p>\n<p>Think of it as a <strong>security guard<\/strong> for your digital treehouse.<\/p>\n<p>For <strong>multi-factor authentication<\/strong> (that&#039;s when you need more than just a password), SCIM works with other tools to keep things extra safe.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Are_the_Costs_Associated_With_Implementing_SCIM_in_an_Organization\"><\/span>What Are the Costs Associated With Implementing SCIM in an Organization?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When you want to use SCIM in your organization, there are several costs to think about.<\/p>\n<p>First, you&#039;ll need to pay for <strong>SSO plans<\/strong> from your apps &#8211; just like Slack charges about $11.75 per user each month.<\/p>\n<p>You&#039;ll also spend time setting everything up, but don&#039;t worry!<\/p>\n<p>The good news is you&#039;ll save money by <strong>automating processes<\/strong> and reducing mistakes.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Is_There_a_Limit_to_How_Many_User_Attributes_SCIM_Can_Manage\"><\/span>Is There a Limit to How Many User Attributes SCIM Can Manage?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SCIM can handle tons of <strong>user details<\/strong> &#8211; it&#039;s like having a giant digital backpack!<\/p>\n<p>While there&#039;s no hard limit on attributes, I&#039;ll let you in on a secret: most organizations stick to around 20-30 <strong>common ones<\/strong>, like name, email, and phone number.<\/p>\n<p>Think of it as collecting baseball cards &#8211; you can have lots, but you&#039;ll probably focus on your favorites.<\/p>\n<p>Just remember that some systems might get a bit picky about <strong>multiple values<\/strong> for one attribute.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_SCIM_Support_Real-Time_Synchronization_Between_Systems\"><\/span>Does SCIM Support Real-Time Synchronization Between Systems?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, SCIM absolutely supports <strong>real-time synchronization<\/strong>!<\/p>\n<p>I&#039;ll tell you how it works &#8211; it&#039;s like having a <strong>magical mirror<\/strong> that shows the same reflection in different places at once. When you update a user&#039;s information in one system, SCIM instantly shares that change with all connected systems.<\/p>\n<p>Think of it like when you text your friends &#8211; the message appears on their phones right away! It&#039;s <strong>super fast and automatic<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we delve into the world of <strong>SCIM<\/strong> and its remarkable ability to streamline <strong>identity management<\/strong>, it&#039;s crucial to also consider the importance of <strong>password security<\/strong>. With the complexities of managing user access, ensuring that your passwords are secure and effectively managed should be a top priority. This is where robust <strong>password management solutions<\/strong> come into play, providing you with the tools to safeguard your sensitive information.<\/p>\n<p>Don&#039;t leave your digital identity vulnerable; take control of your password security today! Explore innovative options for password and passkey management that enhance your overall security posture.<\/p>\n<p>Start by checking out <strong>LogMeOnce<\/strong>, a comprehensive solution designed to simplify and strengthen your password management efforts. Sign up for a free account now at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and take the first step towards a more <strong>secure digital experience<\/strong>! Your safety is just a click away.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Find out how SCIM revolutionizes user access management across multiple platforms, making identity control seamless and secure.<\/p>\n","protected":false},"author":5,"featured_media":245415,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[3604,23026,1295],"class_list":["post-245416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-identity-management","tag-scim","tag-user-access"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245416"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245416\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245415"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}