{"id":62,"date":"2026-04-09T07:04:51","date_gmt":"2026-04-09T07:04:51","guid":{"rendered":"https:\/\/wordpress.sarservice.site\/?p=62"},"modified":"2026-04-09T07:09:40","modified_gmt":"2026-04-09T07:09:40","slug":"azure-ad-seamless-single-sign-on-setup-azure-ad-sso","status":"publish","type":"post","link":"https:\/\/wordpress.sarservice.site\/index.php\/2026\/04\/09\/azure-ad-seamless-single-sign-on-setup-azure-ad-sso\/","title":{"rendered":"Azure AD Seamless Single Sign-on &#8211; Setup Azure AD SSO"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\" id=\"what-is-single-sign-on\">What is Single Sign-on<\/h4>\n\n\n\n<p>Azure AD Seamless Single Sign-on is a feature of Azure Active Directory that allows users to login to the applications without their usernames and passwords when they are using domain-joined machines. When this feature is enabled, users are automatically logged-in to the on-premises applications as well as the Cloud applications.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"azure-ad-seamless-single-sign-on-benefits\">Azure AD Seamless Single Sign-on benefits<\/h4>\n\n\n\n<p>Azure AD Seamless SSO is enabled using&nbsp;<a href=\"https:\/\/office365concepts.com\/azure-ad-connect-architecture\/\">Azure AD Connect<\/a>&nbsp;(Microsoft Entra Connect). Below are few benefits provided by Azure AD Seamless SSO.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>This feature is very easy to deploy. If you want to enable Azure AD SSO, you do not need any additional components in on-premises.<\/li>\n\n\n\n<li>You can configure Azure AD Seamless Single Sign-on with Password Hash Synchronization or Pass-through Authentication. Both cloud-authentication methods are supported.<\/li>\n\n\n\n<li>You can roll out this feature to a set of users, or to all the users using Group Policy.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"how-seamless-single-sign-on-works\">How Seamless Single Sign On works<\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"532\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-2.png\" alt=\"\" class=\"wp-image-63\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-2.png 946w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-2-300x169.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-2-768x432.png 768w\" sizes=\"auto, (max-width: 946px) 100vw, 946px\" \/><\/figure>\n\n\n\n<p>Let\u2019s understand how Azure AD Seamless Single Sign-on works.<\/p>\n\n\n\n<p><strong>Important<\/strong>: When you enable Seamless SSO using Azure AD Connect, it creates a computer account object in on-premises Active Directory with name&nbsp;<strong>AZUREADSSOACC<\/strong>&nbsp;(Azure AD SSO Account). This account represents Azure Active Directory tenant. In addition to this, a Kerberos Service Principal Name is also created. This SPN is used during Azure AD sign-in process.<\/p>\n\n\n\n<p>So let\u2019s understand how a user is authenticated using Azure AD Seamless Single Sign-on.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Let\u2019s assume a user is trying to access portal.office.com from a domain-joined machine.<\/li>\n\n\n\n<li>Using JavaScript in the background, Azure AD will send a challenge to the browser (using 401 Un-authorized response) and it will ask to provide a Kerberos ticket.<\/li>\n\n\n\n<li>Then browser will request a ticket from Active Directory for Azure AD SSO Account.<\/li>\n\n\n\n<li>Then Active Directory will locate the computer account object. It will create a Kerberos ticket, it will encrypt this ticket using the secret key of Azure AD SSO Account, and will send the Kerberos ticket to the browser.<\/li>\n\n\n\n<li>Browser will forward this Kerberos ticket to Azure Active Directory.<\/li>\n\n\n\n<li>Azure AD will decrypt the Kerberos ticket, and will evaluate the identity that is included within the Kerberos ticket.<\/li>\n\n\n\n<li>After successful evaluation, Azure AD will send a token to the application, and the user will login to the application.<\/li>\n<\/ol>\n\n\n\n<p>In this entire process of Seamless SSO, the user did not enter his username or password. He simply typed portal.office.com in browser in domain-joined machine, and he was logged in.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"azure-ad-seamless-sso-prerequisites\">Azure AD Seamless SSO prerequisites<\/h4>\n\n\n\n<p>Now let\u2019s talk about the prerequisites for using Azure AD Seamless SSO.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>You need to set up Azure AD Connect in on-premises using either Password Hash Synchronization or Pass-through Authentication.<\/li>\n\n\n\n<li>You need to make sure that your are using the latest version of Azure AD Connect.<\/li>\n\n\n\n<li>You need Admin credentials for Office 365 Tenant and on-premises Active Directory.<\/li>\n\n\n\n<li>Before you enable Azure AD Seamless SSO, make sure\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/exchange\/clients-and-mobile-in-exchange-online\/enable-or-disable-modern-authentication-in-exchange-online\" target=\"_blank\" rel=\"noreferrer noopener\">Modern Authentication<\/a>\u00a0is enabled in your Microsoft 365 tenant.<\/li>\n\n\n\n<li>If you want to use SSO feature with Microsoft 365 clients (like, Outlook, Word or Excel), make sure you are using the latest version of these clients.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"how-to-set-up-sso-with-azure-ad\">How to set up SSO with Azure AD<\/h4>\n\n\n\n<p>Let\u2019s set up Azure AD Seamless SSO step by step.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"enable-seamless-single-sign-on-using-microsoft-entra-connect\">Enable Seamless Single Sign-on using Microsoft Entra Connect<\/h5>\n\n\n\n<p>To enable Seamless SSO using Azure AD Connect (Microsoft Entra Connect), open Azure AD Connect wizard, and on the&nbsp;<strong>Welcome<\/strong>&nbsp;page, click&nbsp;<strong>Configure<\/strong>.<\/p>\n\n\n\n<p>On the&nbsp;<strong>Additional tasks<\/strong>&nbsp;page of Azure AD Connect wizard, select&nbsp;<strong>Change user sign-in<\/strong>&nbsp;and click&nbsp;<strong>Next<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"592\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-5.png\" alt=\"\" class=\"wp-image-66\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-5.png 840w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-5-300x211.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-5-768x541.png 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure>\n\n\n\n<p>On the&nbsp;<strong>Connect to Azure AD<\/strong>&nbsp;page, type Azure AD Global Administrator credentials and click&nbsp;<strong>Next<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"835\" height=\"592\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-6.png\" alt=\"\" class=\"wp-image-67\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-6.png 835w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-6-300x213.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-6-768x544.png 768w\" sizes=\"auto, (max-width: 835px) 100vw, 835px\" \/><\/figure>\n\n\n\n<p>On the&nbsp;<strong>User sign-in<\/strong>&nbsp;page, check&nbsp;<strong>Enable single sign-on<\/strong>&nbsp;option and click&nbsp;<strong>Next<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"837\" height=\"591\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-7.png\" alt=\"\" class=\"wp-image-68\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-7.png 837w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-7-300x212.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-7-768x542.png 768w\" sizes=\"auto, (max-width: 837px) 100vw, 837px\" \/><\/figure>\n\n\n\n<p>On the&nbsp;<strong>Enable single sign-on<\/strong>&nbsp;page click&nbsp;<strong>Enter credentials<\/strong>&nbsp;and type on-premises Active Directory Enterprise Admin credentials and click&nbsp;<strong>Next<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"836\" height=\"212\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-8.png\" alt=\"\" class=\"wp-image-69\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-8.png 836w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-8-300x76.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-8-768x195.png 768w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/figure>\n\n\n\n<p>On the&nbsp;<strong>Ready to configure<\/strong>&nbsp;page, check&nbsp;<strong>Start the synchronization process when configuration completes<\/strong>, and click&nbsp;<strong>Configure<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"838\" height=\"593\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-9.png\" alt=\"\" class=\"wp-image-70\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-9.png 838w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-9-300x212.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-9-768x543.png 768w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><\/figure>\n\n\n\n<p>On the&nbsp;<strong>Configuration complete<\/strong>&nbsp;page click&nbsp;<strong>Exit<\/strong>&nbsp;to close the wizard.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"835\" height=\"592\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-10.png\" alt=\"\" class=\"wp-image-71\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-10.png 835w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-10-300x213.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-10-768x544.png 768w\" sizes=\"auto, (max-width: 835px) 100vw, 835px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"verify-seamless-sso-in-azure-ad\">Verify Seamless SSO in Azure AD<\/h5>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"573\" height=\"171\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-11.png\" alt=\"\" class=\"wp-image-72\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-11.png 573w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-11-300x90.png 300w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/figure>\n\n\n\n<p>Go to Microsoft Entra Admin Center, click&nbsp;<strong>Hybrid management<\/strong>, click&nbsp;<strong>Microsoft Entra Connect<\/strong>, click&nbsp;<strong>Connect Sync<\/strong>. Verify that&nbsp;<strong>Seamless single sign-on<\/strong>&nbsp;is set to&nbsp;<strong>Enabled<\/strong>.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"roll-out-seamless-single-sign-on-using-group-policy\">Roll out Seamless Single Sign-on using Group Policy<\/h5>\n\n\n\n<p>In the next step we will create a group policy in on-premises Active Directory to roll out Seamless SSO to the users.<\/p>\n\n\n\n<p>Open&nbsp;<strong>Group Policy Management<\/strong>, expand&nbsp;<strong>Forest: Domain.com<\/strong>, expand&nbsp;<strong>Domains<\/strong>, and expand your Active Directory domain as shown in below image:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"649\" height=\"335\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-12.png\" alt=\"\" class=\"wp-image-73\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-12.png 649w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-12-300x155.png 300w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/figure>\n\n\n\n<p>Right click&nbsp;<strong>Default Domain Policy<\/strong>&nbsp;and click&nbsp;<strong>Edit<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"440\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-13.png\" alt=\"\" class=\"wp-image-74\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-13.png 596w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-13-300x221.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure>\n\n\n\n<p>Expand&nbsp;<strong>User Configuration<\/strong>&nbsp;&gt;&nbsp;<strong>Policies<\/strong>&nbsp;&gt;&nbsp;<strong>Administrative Templates<\/strong>&nbsp;&gt;&nbsp;<strong>Windows Components<\/strong>&nbsp;&gt;&nbsp;<strong>Internet Explorer<\/strong>&nbsp;&gt;&nbsp;<strong>Internet Control Panel<\/strong>, click&nbsp;<strong>Security Page<\/strong>, and double click&nbsp;<strong>Site to Zone Assignment List<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"546\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-14.png\" alt=\"\" class=\"wp-image-75\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-14.png 938w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-14-300x175.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-14-768x447.png 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/figure>\n\n\n\n<p>Set the policy to&nbsp;<strong>Enabled<\/strong>&nbsp;and click&nbsp;<strong>Show<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"658\" height=\"311\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-15.png\" alt=\"\" class=\"wp-image-76\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-15.png 658w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-15-300x142.png 300w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\" \/><\/figure>\n\n\n\n<p>On the&nbsp;<strong>Show Contents<\/strong>&nbsp;screen, under&nbsp;<strong>Value name<\/strong>&nbsp;type&nbsp;<strong>https:\/\/autologon.microsoftazuread-sso.com<\/strong>&nbsp;and under&nbsp;<strong>Value<\/strong>&nbsp;type&nbsp;<strong>1<\/strong>. Click&nbsp;<strong>OK<\/strong>&nbsp;and click&nbsp;<strong>OK<\/strong>&nbsp;again.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"318\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-16.png\" alt=\"\" class=\"wp-image-77\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-16.png 473w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-16-300x202.png 300w\" sizes=\"auto, (max-width: 473px) 100vw, 473px\" \/><\/figure>\n\n\n\n<p>Go to&nbsp;<strong>User Configuration<\/strong>&nbsp;&gt;&nbsp;<strong>Policies<\/strong>&nbsp;&gt;&nbsp;<strong>Administrative Templates<\/strong>&nbsp;&gt;&nbsp;<strong>Windows Components<\/strong>&nbsp;&gt;&nbsp;<strong>Internet Explorer<\/strong>&nbsp;&gt;&nbsp;<strong>Internet Control Panel<\/strong>&nbsp;&gt;&nbsp;<strong>Security Page<\/strong>&nbsp;&gt;&nbsp;<strong>Intranet Zone<\/strong>, and double click&nbsp;<strong>Allow updates to status bar via script<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"540\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-17.png\" alt=\"\" class=\"wp-image-78\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-17.png 943w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-17-300x172.png 300w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-17-768x440.png 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/figure>\n\n\n\n<p>Set this policy to&nbsp;<strong>Enabled<\/strong>&nbsp;and click&nbsp;<strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"702\" height=\"331\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-18.png\" alt=\"\" class=\"wp-image-79\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-18.png 702w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-18-300x141.png 300w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/figure>\n\n\n\n<p>Go to&nbsp;<strong>User Configuration<\/strong>&nbsp;&gt;&nbsp;<strong>Preferences<\/strong>&nbsp;&gt;&nbsp;<strong>Windows Settings<\/strong>, right click&nbsp;<strong>Registry<\/strong>&nbsp;and click&nbsp;<strong>New<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"611\" height=\"480\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-19.png\" alt=\"\" class=\"wp-image-80\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-19.png 611w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-19-300x236.png 300w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/figure>\n\n\n\n<p>Enter or select the following values as shown below, and then select&nbsp;<strong>OK<\/strong>.<\/p>\n\n\n\n<p><strong>Key Path<\/strong>: Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\Domains\\microsoftazuread-sso.com\\autologon<br><strong>Value name<\/strong>: https<br><strong>Value type<\/strong>: REG_DWORD<br><strong>Value data<\/strong>: 00000001<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"381\" height=\"462\" src=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-20.png\" alt=\"\" class=\"wp-image-81\" srcset=\"https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-20.png 381w, https:\/\/wordpress.sarservice.site\/wp-content\/uploads\/2026\/04\/image-20-247x300.png 247w\" sizes=\"auto, (max-width: 381px) 100vw, 381px\" \/><\/figure>\n\n\n\n<p>That\u2019s it! You have successfully rolled out Azure AD Seamless SSO.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Single Sign-on Azure AD Seamless Single Sign-on is a feature of Azure Active Directory that allows users to login to the applications without their usernames and passwords when &hellip; <a href=\"https:\/\/wordpress.sarservice.site\/index.php\/2026\/04\/09\/azure-ad-seamless-single-sign-on-setup-azure-ad-sso\/\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":83,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-62","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sarservice","entry"],"_links":{"self":[{"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/posts\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":1,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/posts\/62\/revisions"}],"predecessor-version":[{"id":82,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/posts\/62\/revisions\/82"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/media\/83"}],"wp:attachment":[{"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/media?parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/categories?post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.sarservice.site\/index.php\/wp-json\/wp\/v2\/tags?post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}