{"id":24159,"date":"2024-02-15T14:53:34","date_gmt":"2024-02-15T22:53:34","guid":{"rendered":"https:\/\/docs.extraview.com\/v25\/book\/saml-authentication-1\/"},"modified":"2025-02-25T09:01:08","modified_gmt":"2025-02-25T17:01:08","slug":"saml-authentication-1","status":"publish","type":"page","link":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/","title":{"rendered":"SAML Authentication"},"content":{"rendered":"<p>Security Assertion Markup Language (SAML) is an open standard that allows an identity provider (IDP) to pass authorization credentials to a service provider (SP). SAML is the link between the authentication of users&#8217; identities and the authorization to use a service from the provider.\u00a0 ExtraView relies on the use of a third party IDP.<\/p>\n<p>SAML is used in conjunction with SSO and often with LDAP.\u00a0 With an operational ExtraView installation, the configuration of SAML requires these three steps:<\/p>\n<ol style=\"list-style-type: lower-alpha;\">\n<li>The configuration of a working SSO external to ExtraView, in the ExtraView behavior settings and Configuration.properties file<\/li>\n<li>The configuration of the third party Identity Provider (IDP)<\/li>\n<li>The configuration of ExtraView SAML behavior settings and the storage of the certificate used by the IDP<\/li>\n<\/ol>\n<h3>LDAP Configuration<\/h3>\n<p>See the previous pages on <a href=\"v25\/external-authentication-ldap-sso-and-saml-1\/\">External Authentication &#8211; LDAP, SSO and SAML<\/a>.<\/p>\n<h3>SSO Configuration<\/h3>\n<p>See the previous page on <a href=\"v25\/ldap-connections-sso-1\/\">LDAP Connections with SSO<\/a>.<\/p>\n<h3>Identity Provider (IDP) Configuration<\/h3>\n<p>The components of the IDP configuration depend on the provider itself, but it is expected that the most relevant points are:<\/p>\n<ul>\n<li>The specification of the URL to which authentication responses are directed<\/li>\n<li>The assertion key-value mapping for SSO keys; the SSO_PRIMARY_KEY must have an assertion in the authentication message to identify the ExtraView user.<\/li>\n<\/ul>\n<h3>ExtraView Configuration<\/h3>\n<p>The following behavior settings should be configured as appropriate for your installation.\u00a0 You should determine the parameter values for all the settings below to be used in the authentication response before starting the configuration.<\/p>\n<table border=\"0\" cellspacing=\"2\" cellpadding=\"2\">\n<tbody>\n<tr bgcolor=\"#ddd\">\n<td><strong>ExtraView Setting<\/strong><\/td>\n<td><strong>Explanation<\/strong><\/td>\n<\/tr>\n<tr>\n<td>SSO_STATE<\/td>\n<td>This behavior setting must be set to SAML<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SAML_ASSERTION_CONSUMER_URL<\/td>\n<td>This behavior setting is the URL of the consumer service that receives the authentication response from the SAML IDP. This is the URL that invokes the Consumer Servlet when the behavior setting <code>SSO_STATE<\/code> has a value of <code>SAML<\/code>.\u00a0 Typically, this will have a value that looks similar to <code>https:\/\/myserver.mydomain.com\/Consumer<\/code>.\u00a0 This is the application URL registered with the IDP.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SAML_SSO_SERVICE<\/td>\n<td>This behavior setting provides the URL of the SSO service to which the SAML SP sends an authentication request. This URL points to a target in the IDP<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SAML_SSO_SP_ENTITY_ID<\/td>\n<td>The SP Entity ID behavior setting is a URL or other identifier given by the Service Provider (SP) that uniquely identifies it to the IDP.\u00a0 This is derived from the metadata for the SP.\u00a0 A typical value is an XML fragment and will look similar to:<code>&lt;md:entitydescriptor entityid=<br \/>\n\"http:\/\/www.okta.com\/exki3aihaifAHCbex0h7\"<br \/>\nxmlns:md=\"urn:oasis:names:tc:SAML:2.0:metadata\"&gt;<br \/>\n&lt;\/md:entitydescriptor&gt;<\/code><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SSO_DO_UPSERT<\/td>\n<td>This is set within the Configuration.properties file if it the values from the authentication are to be updated within the ExtraView database with each authentication<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SSO_PRIMARYKEY<\/td>\n<td>This is the mapping for the user name that is set within the Configuration.properties file.\u00a0 This parameter must include the expected ExtraView User ID<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SSO_SURNAME<\/td>\n<td>This is the mapping for the user&#8217;s last name that is set within the Configuration.properties file<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SSO_GIVENNAME<\/td>\n<td>This is the mapping for the user&#8217;s given name that is set within the Configuration.properties file<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">SSO_EMAIL<\/td>\n<td>This is the mapping for the user&#8217;s email address <span style=\"display: inline !important; float: none; background-color: transparent; color: #333333; font-family: Arial,Verdana,Helvetica,sans-serif; font-size: 12px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">that is set within the Configuration.properties file<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The IDP will typically require a valid security certificate to validate the encrypted signature in the authentication response from the IDP.\u00a0 This certificate is stored securely within ExtraView within the <a style=\"color: #333333; text-decoration: none;\" href=\"\/encryption-key-management\/\">Key Manager<\/a> administration utility.\u00a0 This is located at Admin &#8211;&gt; Advanced &#8211;&gt; <a href=\"v25\/encryption-key-management-1\/\">Encryption Key Management<\/a> \u00a0 The format for the certificate is known as PEM (Privacy Enhanced Mail).\u00a0 The name is somewhat of a misnomer as the certificates for SAML have no connection with email.\u00a0 The format is a Base 64 encoded string of characters which is pasted into the <strong>Enter certificate PEM<\/strong> field within the Encryption Key Manager.\u00a0 If there is no entry in this field, the new entry you create for the key is added as a secret key only and is not used for SAML authentication.<\/p>\n<p>The entry in the key manager should look like this:<\/p>\n<ul>\n<li>Name for the key &#8211; this must be <strong>SPKey<\/strong><\/li>\n<li>Key password &#8211; this must be <strong>password<\/strong><\/li>\n<li>Certificate PEM &#8211; this is the field where you paste the contents of the certificate<\/li>\n<\/ul>\n<p>The action to save a certificate in this field builds the appropriate credentials for the SAML certificate.<\/p>\n<h3>SAML Logging Configuration<\/h3>\n<p>When first establishing a connection to an IDP to perform SAML authentication it can be useful to add additional logging to view the precise details of the transactions.\u00a0 This configuration is achieved within the ExtraView <code>WEB-INF\/configuration\/Configuration.properties<\/code> file.<\/p>\n<div>Any property name within the Configuration.properties file that begins with <code>LOGBACK<\/code> is treated as a replaceable variable for the <code>logback.template <\/code>file.\u00a0 The\u00a0<code>logback.template\u00a0<\/code>file is part of the third-party SAML installation.<\/div>\n<div><\/div>\n<div>The replaceable variable modifies the <code>logback.template <\/code>file that creates the <code>logback.xml<\/code> configuration file that is then passed to the loggers for SAML.<\/div>\n<div><\/div>\n<div>For example, <code>LOGBACK_FILE_PATH_NAME_ABSOLUTE <\/code>is a replaceable variable that may have the value <code>\/tmp\/logs<\/code>.<\/div>\n<div><\/div>\n<div>The <code>Configuration.properties <\/code>file will contain the line:<\/div>\n<div><\/div>\n<div><code>LOGBACK_FILE_PATH_NAME_ABSOLUTE=\/tmp\/logs<\/code><\/div>\n<div><\/div>\n<div>The <code>logback.xml <\/code>will contain the line:<\/div>\n<div><\/div>\n<div><code>&lt;file&gt;__LOGBACK_FILE_PATH_NAME_ABSOLUTE__\/SAML.log&lt;\/file&gt;<\/code><\/div>\n<div><\/div>\n<div>This will result in a log file named <code>\/tmp\/logs\/SAML.log<\/code>.<\/div>\n<div><\/div>\n<div>There are two configurable files:<\/div>\n<ol>\n<li><code>Configuration.properties<\/code>, which defines the <code>LOGBACK...<\/code> properties<\/li>\n<li><code>logback.template<\/code>, which has replaceable variables surrounded by &#8220;__&#8221;.<\/li>\n<\/ol>\n<div><\/div>\n<div>The following are the replaceable variables, and the values specified in the delivered <code>Configuration.properties<\/code>:<\/div>\n<div><\/div>\n<div><code>LOGBACK_FILE_PATH_NAME_ABSOLUTE=<\/code><\/div>\n<div><code>LOGBACK_MAX_FILE_SIZE=10mb<\/code><\/div>\n<div><code>LOGBACK_LOG_LEVEL=INFO<\/code><\/div>\n<div><\/div>\n<div>The value of the <code>LOGBACK_LOG_LEVEL<\/code> attribute may be one of the case-insensitive string values <code>TRACE<\/code>, <code>DEBUG<\/code>, <code>INFO<\/code>, <code>WARN<\/code>, <code>ERROR<\/code>, <code>ALL <\/code>or <code>OFF<\/code>.<\/div>\n<h3>Bypassing SAML Authentication<\/h3>\n<p>There are some circumstances where you might want to bypass the SAML authentication, for example if the IDP service is not operable, or you need to access the ExtraView ADMIN account directly.\u00a0 To achieve this, include the parameter EV_BYPASS_SSO=YES on the URL, following the ExtraView address.\u00a0 This will produce the standard built-in ExtraView login screen for authorization.\u00a0 For example, your address might look like:<\/p>\n<p><code>http:\/\/myserver.mycompany.com\/evj\/ExtraView?EV_BYPASS_SSO=YES<\/code><\/p>\n<h3>SAML Authentication Via the CLI<\/h3>\n<p>CLI calls, by their very nature, cannot support SAML authentication, so the EV_BYPASS_SSO option is used to overcome this limitation.\u00a0 A\u00a0<code>-B true<\/code> option on the CLI command line allows the user to enter a valid user ID and password for authentication.<\/p>\n<h3>SAML Certificate<\/h3>\n<p>If there is a SAML certificate, place the name of the certificate in the behavior setting named KEY_ENTRY_ID and place the certificate in the key store.\u00a0 The default certificate name is SPKey.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Assertion Markup Language (SAML) is an open standard that allows an identity provider (IDP) to pass authorization credentials to a service provider (SP). SAML is the link between the authentication of users&#8217; identities and the authorization to use a service from the provider.\u00a0 ExtraView relies on the use of a third party IDP. SAML&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":24152,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"class_list":["post-24159","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SAML Authentication - Product Documentation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAML Authentication - Product Documentation\" \/>\n<meta property=\"og:description\" content=\"Security Assertion Markup Language (SAML) is an open standard that allows an identity provider (IDP) to pass authorization credentials to a service provider (SP). SAML is the link between the authentication of users&#8217; identities and the authorization to use a service from the provider.\u00a0 ExtraView relies on the use of a third party IDP. SAML...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Product Documentation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-25T17:01:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/\",\"url\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/\",\"name\":\"SAML Authentication - Product Documentation\",\"isPartOf\":{\"@id\":\"https:\/\/docs.extraview.com\/v25\/#website\"},\"datePublished\":\"2024-02-15T22:53:34+00:00\",\"dateModified\":\"2025-02-25T17:01:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/docs.extraview.com\/v25\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ExtraView 25\",\"item\":\"https:\/\/docs.extraview.com\/v25\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Administration Guide\",\"item\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Site Configuration Menu\",\"item\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"External Authentication &#8211; LDAP, SSO and SAML\",\"item\":\"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"SAML Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/docs.extraview.com\/v25\/#website\",\"url\":\"https:\/\/docs.extraview.com\/v25\/\",\"name\":\"ExtraView Product Documentation\",\"description\":\"ExtraView Documentation\",\"publisher\":{\"@id\":\"https:\/\/docs.extraview.com\/v25\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/docs.extraview.com\/v25\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/docs.extraview.com\/v25\/#organization\",\"name\":\"ExtraView Corporation\",\"url\":\"https:\/\/docs.extraview.com\/v25\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/docs.extraview.com\/v25\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/docs-stg.extraview.com\/wp-content\/uploads\/2024\/03\/favicon.png\",\"contentUrl\":\"https:\/\/docs-stg.extraview.com\/wp-content\/uploads\/2024\/03\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"ExtraView Corporation\"},\"image\":{\"@id\":\"https:\/\/docs.extraview.com\/v25\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAML Authentication - Product Documentation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/","og_locale":"en_US","og_type":"article","og_title":"SAML Authentication - Product Documentation","og_description":"Security Assertion Markup Language (SAML) is an open standard that allows an identity provider (IDP) to pass authorization credentials to a service provider (SP). SAML is the link between the authentication of users&#8217; identities and the authorization to use a service from the provider.\u00a0 ExtraView relies on the use of a third party IDP. SAML...","og_url":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/","og_site_name":"Product Documentation","article_modified_time":"2025-02-25T17:01:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/","url":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/","name":"SAML Authentication - Product Documentation","isPartOf":{"@id":"https:\/\/docs.extraview.com\/v25\/#website"},"datePublished":"2024-02-15T22:53:34+00:00","dateModified":"2025-02-25T17:01:08+00:00","breadcrumb":{"@id":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/saml-authentication-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/docs.extraview.com\/v25\/"},{"@type":"ListItem","position":2,"name":"ExtraView 25","item":"https:\/\/docs.extraview.com\/v25\/"},{"@type":"ListItem","position":3,"name":"Administration Guide","item":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/"},{"@type":"ListItem","position":4,"name":"Site Configuration Menu","item":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/"},{"@type":"ListItem","position":5,"name":"External Authentication &#8211; LDAP, SSO and SAML","item":"https:\/\/docs.extraview.com\/v25\/extraview-25\/administration-guide-1\/site-configuration-menu-1\/external-authentication-ldap-sso-and-saml-1\/"},{"@type":"ListItem","position":6,"name":"SAML Authentication"}]},{"@type":"WebSite","@id":"https:\/\/docs.extraview.com\/v25\/#website","url":"https:\/\/docs.extraview.com\/v25\/","name":"ExtraView Product Documentation","description":"ExtraView Documentation","publisher":{"@id":"https:\/\/docs.extraview.com\/v25\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/docs.extraview.com\/v25\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/docs.extraview.com\/v25\/#organization","name":"ExtraView Corporation","url":"https:\/\/docs.extraview.com\/v25\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/docs.extraview.com\/v25\/#\/schema\/logo\/image\/","url":"https:\/\/docs-stg.extraview.com\/wp-content\/uploads\/2024\/03\/favicon.png","contentUrl":"https:\/\/docs-stg.extraview.com\/wp-content\/uploads\/2024\/03\/favicon.png","width":512,"height":512,"caption":"ExtraView Corporation"},"image":{"@id":"https:\/\/docs.extraview.com\/v25\/#\/schema\/logo\/image\/"}}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"carl.koppel","author_link":"https:\/\/docs.extraview.com\/v25\/author\/carl-koppel\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/pages\/24159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/comments?post=24159"}],"version-history":[{"count":0,"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/pages\/24159\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/pages\/24152"}],"wp:attachment":[{"href":"https:\/\/docs.extraview.com\/v25\/wp-json\/wp\/v2\/media?parent=24159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}