{"id":12938,"date":"2023-07-15T18:33:29","date_gmt":"2023-07-15T09:33:29","guid":{"rendered":"https:\/\/lab4ict.com\/system\/?p=12938"},"modified":"2024-01-06T16:44:13","modified_gmt":"2024-01-06T07:44:13","slug":"easyrsa%e3%82%92%e4%bd%bf%e7%94%a8%e3%81%97%e3%81%a6%e8%a8%bc%e6%98%8e%e6%9b%b8%e3%82%92%e4%bd%9c%e6%88%90%e3%81%99%e3%82%8b%ef%bc%81%ef%bc%88rocky-linux-9%ef%bc%89","status":"publish","type":"post","link":"https:\/\/lab4ict.com\/system\/archives\/12938","title":{"rendered":"EasyRSA\u3092\u4f7f\u7528\u3057\u3066\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3059\u308b\uff01\uff08Rocky Linux 9\uff09"},"content":{"rendered":"<p>Rocky Linux 9\u4e0a\u3067\u3001EasyRSA\u3092\u4f7f\u7528\u3057\u3066\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<br \/>\n<!--more--><\/p>\n<h2>EasyRSA\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\uff01<\/h2>\n<p>EasyRSA\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u307e\u3059\u3002<\/p>\n<h3>EasyRSA\u3092\u4f7f\u7528\u3059\u308b\u74b0\u5883\u3092\u78ba\u8a8d\u3059\u308b\uff01<\/h3>\n<p>EasyRSA\u3092\u4f7f\u7528\u3059\u308b\u74b0\u5883\u3092\u78ba\u8a8d\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n# hostnamectl\r\n Static hostname: vmsans01.loc.lab4ict.com\r\n       Icon name: computer-vm\r\n         Chassis: vm\r\n      Machine ID: d7818b80129a422a853325243ce5eef3\r\n         Boot ID: 68c9a2eeb3b94c17a11ddec2ad58e995\r\n  Virtualization: oracle\r\nOperating System: Rocky Linux 9.1 (Blue Onyx)          \r\n     CPE OS Name: cpe:\/o:rocky:rocky:9::baseos\r\n          Kernel: Linux 5.14.0-162.6.1.el9_1.0.1.x86_64\r\n    Architecture: x86-64\r\n Hardware Vendor: innotek GmbH\r\n  Hardware Model: VirtualBox\r\n<\/pre>\n<h3>EPEL\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u767b\u9332\u3059\u308b\uff01<\/h3>\n<p>EPEL\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u767b\u9332\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1,14]; title: ; notranslate\" title=\"\">\r\n# dnf install -y epel-release\r\n...\r\n========================================================================================================================\r\n Package                         Architecture              Version                      Repository                 Size\r\n========================================================================================================================\r\nInstalling:\r\n epel-release                    noarch                    9-4.el9                      extras                     19 k\r\n\r\nTransaction Summary\r\n========================================================================================================================\r\nInstall  1 Package\r\n...                                                                                    \r\nComplete!\r\n# dnf makecache\r\n...\r\nExtra Packages for Enterprise Linux 9 - x86_64\r\n...\r\n<\/pre>\n<h3>EasyRSA\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\uff01<\/h3>\n<p>EasyRSA\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n# dnf install -y easy-rsa\r\n...\r\n========================================================================================================================\r\n Package                      Architecture               Version                         Repository                Size\r\n========================================================================================================================\r\nInstalling:\r\n easy-rsa                     noarch                     3.0.8-3.el9                     epel                      45 k\r\n\r\nTransaction Summary\r\n========================================================================================================================\r\nInstall  1 Package\r\n...                                                                           \r\nComplete!\r\n<\/pre>\n<h2>\u8a3c\u660e\u66f8\u4f5c\u6210\u3059\u308b\uff01<\/h2>\n<p>EasyRSA\u3092\u4f7f\u7528\u3057\u3066\u3001\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<h3>CA\u5c40\u3092\u4f5c\u6210\u3059\u308b\uff01<\/h3>\n<p>CA\u5c40\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002\u57fa\u672c\u3068\u306a\u308b\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u3092\u4f5c\u6210\u3057\u3066\u3001\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u3092\u521d\u671f\u5316\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1,2,3,8,9,10]; title: ; notranslate\" title=\"\">\r\n$ mkdir sample\r\n$ ln -s \/usr\/share\/easy-rsa\/3\/* sample\r\n$ ls -l sample\r\ntotal 0\r\nlrwxrwxrwx. 1 usradmin usradmin 29 Jul 15 17:57 easyrsa -&gt; \/usr\/share\/easy-rsa\/3\/easyrsa\r\nlrwxrwxrwx. 1 usradmin usradmin 41 Jul 15 17:57 openssl-easyrsa.cnf -&gt; \/usr\/share\/easy-rsa\/3\/openssl-easyrsa.cnf\r\nlrwxrwxrwx. 1 usradmin usradmin 32 Jul 15 17:57 x509-types -&gt; \/usr\/share\/easy-rsa\/3\/x509-types\r\n$ chmod 700 sample\r\n$ cd sample\r\n$ .\/easyrsa init-pki\r\n\r\ninit-pki complete; you may now create a CA or requests.\r\nYour newly created PKI dir is: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\r\n<\/pre>\n<p>CA\u5c40\u306e\u60c5\u5831\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1,2,3,4,5,6,7,8,9,10]; title: ; notranslate\" title=\"\">\r\n$ cat &lt;&lt; EOF &gt; vars\r\nset_var EASYRSA_REQ_COUNTRY    &quot;JP&quot;\r\nset_var EASYRSA_REQ_PROVINCE   &quot;Sample Province&quot;\r\nset_var EASYRSA_REQ_CITY       &quot;Sample City&quot;\r\nset_var EASYRSA_REQ_ORG        &quot;Sample ORG&quot;\r\nset_var EASYRSA_REQ_EMAIL      &quot;info@sample.com&quot;\r\nset_var EASYRSA_REQ_OU         &quot;Sample OU&quot;\r\nset_var EASYRSA_ALGO           &quot;ec&quot;\r\nset_var EASYRSA_DIGEST         &quot;sha512&quot;\r\nEOF\r\n<\/pre>\n<p>\u5b9f\u969b\u306b\u3001CA\u66f2\u306e\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n$ .\/easyrsa build-ca\r\nUsing SSL: openssl OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021)\r\n\r\nEnter New CA Key Passphrase: \r\nRe-Enter New CA Key Passphrase: \r\nEnter PEM pass phrase:\r\nVerifying - Enter PEM pass phrase:\r\n-----\r\nYou are about to be asked to enter information that will be incorporated\r\ninto your certificate request.\r\nWhat you are about to enter is what is called a Distinguished Name or a DN.\r\nThere are quite a few fields but you can leave some blank\r\nFor some fields there will be a default value,\r\nIf you enter '.', the field will be left blank.\r\n-----\r\nCommon Name (eg: your user, host, or server name) &#x5B;Easy-RSA CA]:Sample CA\r\n\r\nCA creation complete and you may now import and sign cert requests.\r\nYour new CA certificate file for publishing is at:\r\n\/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/ca.crt\r\n<\/pre>\n<h3>\u30b5\u30fc\u30d0\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3059\u308b\uff01<\/h3>\n<p>\u30b5\u30fc\u30d0\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002\u307e\u305a\u3001CSR\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n$ .\/easyrsa gen-req server.sample.com nopass\r\nUsing SSL: openssl OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021)\r\n...+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+..+..........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+.......+...+..+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n..............+.....+.+...+......+.....+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+...........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.....+.....+....+...+..................+.....+....+...........+.......+......+.....+.........................+..+.......+........+...+......+.........+.+.....+....+......+...+.....+......+....+...+...+..+.......+...+..+...+..................+.........+......+................+.....+.+..+.............+.......................+....+........+.......+........+............+.......+.........+.....+.+........+.......+.....+.............+..+....+..+...+....+...+..............+...+.+.....+.......+.....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n-----\r\nYou are about to be asked to enter information that will be incorporated\r\ninto your certificate request.\r\nWhat you are about to enter is what is called a Distinguished Name or a DN.\r\nThere are quite a few fields but you can leave some blank\r\nFor some fields there will be a default value,\r\nIf you enter '.', the field will be left blank.\r\n-----\r\nCommon Name (eg: your user, host, or server name) &#x5B;server.sample.com]:\r\n\r\nKeypair and certificate request completed. Your files are:\r\nreq: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/reqs\/server.sample.com.req\r\nkey: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/private\/server.sample.com.key\r\n<\/pre>\n<p>CA\u5c40\u306e\u8a3c\u660e\u66f8\u3067\u7f72\u540d\u3057\u3066\u3001\u30b5\u30fc\u30d0\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n$ .\/easyrsa sign-req server server.sample.com\r\nUsing SSL: openssl OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021)\r\n\r\n\r\nYou are about to sign the following certificate.\r\nPlease check over the details shown below for accuracy. Note that this request\r\nhas not been cryptographically verified. Please be sure it came from a trusted\r\nsource or that you have verified the request checksum with the sender.\r\n\r\nRequest subject, to be signed as a server certificate for 825 days:\r\n\r\nsubject=\r\n    commonName                = server.sample.com\r\n\r\n\r\nType the word 'yes' to continue, or any other input to abort.\r\n  Confirm request details: yes\r\nUsing configuration from \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/easy-rsa-6161.H5ZxMS\/tmp.UypA8Q\r\nEnter pass phrase for \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/private\/ca.key:\r\n802B325D997F0000:error:0700006C:configuration file routines:NCONF_get_string:no value:crypto\/conf\/conf_lib.c:315:group=&lt;NULL&gt; name=unique_subject\r\nCheck that the request matches the signature\r\nSignature ok\r\nThe Subject's Distinguished Name is as follows\r\ncommonName            :ASN.1 12:'server.sample.com'\r\nCertificate is to be certified until Oct 17 09:20:54 2025 GMT (825 days)\r\n\r\nWrite out database with 1 new entries\r\nData Base Updated\r\n\r\nCertificate created at: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/issued\/server.sample.com.crt\r\n<\/pre>\n<h3>\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3059\u308b\uff01<\/h3>\n<p>\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002\u307e\u305a\u3001CSR\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n$ .\/easyrsa gen-req client.sample.com nopass\r\nUsing SSL: openssl OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021)\r\n........+......+.....+...+....+..+.........+.........+......+....+...........+.......+...+..+.......+...+............+..+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+.......+............+...+..+....+.....+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*........+...+......+.+.....+......+............+............+....+...............+......+..............+.+......+........+.+...+.....+...+....+..............+..........+...............+.........+...+........+.+.....+.+.................+...+...+.+...+..+.............+..+......+...+......+......+.......+.....+..........+...+.....+.........+....+......+........+.+.....+.......+.........+...+.................+.+..+...+....+.....+...+.+..+.............+..+....+...+.................+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n...+..+...+...+.+......+...+..+.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*........+......+..+....+.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*......+.+......+..+...............................+.....+......+....+..+.......+........+...+................+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n-----\r\nYou are about to be asked to enter information that will be incorporated\r\ninto your certificate request.\r\nWhat you are about to enter is what is called a Distinguished Name or a DN.\r\nThere are quite a few fields but you can leave some blank\r\nFor some fields there will be a default value,\r\nIf you enter '.', the field will be left blank.\r\n-----\r\nCommon Name (eg: your user, host, or server name) &#x5B;client.sample.com]:\r\n\r\nKeypair and certificate request completed. Your files are:\r\nreq: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/reqs\/client.sample.com.req\r\nkey: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/private\/client.sample.com.key\r\n<\/pre>\n<p>CA\u5c40\u306e\u8a3c\u660e\u66f8\u3067\u8a3c\u660e\u3057\u3066\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n$ .\/easyrsa sign-req client client.sample.com\r\nUsing SSL: openssl OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021)\r\n\r\n\r\nYou are about to sign the following certificate.\r\nPlease check over the details shown below for accuracy. Note that this request\r\nhas not been cryptographically verified. Please be sure it came from a trusted\r\nsource or that you have verified the request checksum with the sender.\r\n\r\nRequest subject, to be signed as a client certificate for 825 days:\r\n\r\nsubject=\r\n    commonName                = client.sample.com\r\n\r\n\r\nType the word 'yes' to continue, or any other input to abort.\r\n  Confirm request details: yes\r\nUsing configuration from \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/easy-rsa-6382.4seXTJ\/tmp.cCmeRW\r\nEnter pass phrase for \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/private\/ca.key:\r\nCheck that the request matches the signature\r\nSignature ok\r\nThe Subject's Distinguished Name is as follows\r\ncommonName            :ASN.1 12:'client.sample.com'\r\nCertificate is to be certified until Oct 17 09:24:39 2025 GMT (825 days)\r\n\r\nWrite out database with 1 new entries\r\nData Base Updated\r\n\r\nCertificate created at: \/home\/usradmin\/docs\/easy-rsa\/sample\/pki\/issued\/client.sample.com.crt\r\n<\/pre>\n<p>pkcs12\u5f62\u5f0f\u306e\u30d5\u30a1\u30a4\u30eb\u306f\u3001\u4ee5\u4e0b\u306e\u30b3\u30de\u30f3\u30c9\u3067\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"brush: plain; highlight: [1]; title: ; notranslate\" title=\"\">\r\n$ openssl pkcs12 -export -in pki\/issued\/client.sample.com.crt -inkey pki\/private\/client.sample.com.key -certfile pki\/ca.crt -out pki\/issued\/sample.p12\r\nEnter Export Password:\r\nVerifying - Enter Export Password:\r\n<\/pre>\n<h2>\u304a\u308f\u308a\u306b<\/h2>\n<p>Rocky Linux 9\u3067\u3001EasyRSA\u3067CA\u5c40\u3001\u30b5\u30fc\u30d0\u8a3c\u660e\u66f8\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3057\u305f\u3002\u4e00\u65e6\u4f5c\u6210\u3057\u3066\u304a\u3051\u3070\u3001\u69d8\u3005\u306a\u5c40\u9762\u3067\u5229\u7528\u3067\u304d\u308b\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<h2>\u95a2\u9023\u8a18\u4e8b<\/h2>\n<div class=\"sc_getpost\"><a class=\"clearfix\" href=\"https:\/\/lab4ict.com\/system\/archives\/10355\" ><div class=\"sc_getpost_thumb post-box-thumbnail__wrap\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODdhAQABAPAAAN3d3QAAACwAAAAAAQABAAACAkQBADs=\" width=\"150\" height=\"150\" alt=\"\u3010\u8a18\u4e8b\u4e00\u89a7\u3011 \u30b5\u30fc\u30d0\u74b0\u5883\u3092\u69cb\u7bc9\u3059\u308b\uff01\" loading=\"lazy\" data-src=\"https:\/\/lab4ict.com\/system\/wp-content\/uploads\/2022\/11\/eyecatch_serverapps_01-150x150.png\" class=\"lazyload\"><\/div><div class=\"title\">\u3010\u8a18\u4e8b\u4e00\u89a7\u3011 \u30b5\u30fc\u30d0\u74b0\u5883\u3092\u69cb\u7bc9\u3059\u308b\uff01<\/div><div class=\"substr\">\u5404\u7a2e\u30b5\u30fc\u30d0\u74b0\u5883\u3092\u69cb\u7bc9\u3059\u308b\u305f\u3081\u306e\u8a18\u4e8b\u4e00\u89a7\u3092\u63b2\u8f09\u3057\u307e\u3059\u3002...<\/div><\/a><\/div>\n<div class=\"sc_getpost\"><a class=\"clearfix\" href=\"https:\/\/lab4ict.com\/system\/archives\/4965\" ><div class=\"sc_getpost_thumb post-box-thumbnail__wrap\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODdhAQABAPAAAN3d3QAAACwAAAAAAQABAAACAkQBADs=\" width=\"150\" height=\"150\" alt=\"\u3010\u8a18\u4e8b\u4e00\u89a7\u3011RHEL\u7cfb\u306eOS\u3092\u4f7f\u3044\u3053\u306a\u3059\uff01\" loading=\"lazy\" data-src=\"https:\/\/lab4ict.com\/system\/wp-content\/uploads\/2022\/04\/fi_rhel_01-150x150.png\" class=\"lazyload\"><\/div><div class=\"title\">\u3010\u8a18\u4e8b\u4e00\u89a7\u3011RHEL\u7cfb\u306eOS\u3092\u4f7f\u3044\u3053\u306a\u3059\uff01<\/div><div class=\"substr\">RHEL\u7cfb\u306eOS\u3092\u4f7f\u3044\u3053\u306a\u3059\u305f\u3081\u306e\u8a18\u4e8b\u4e00\u89a7\u3092\u63b2\u8f09\u3057\u307e\u3059\u3002...<\/div><\/a><\/div>\n<h2>\u53c2\u8003\u66f8\u7c4d\uff08Amazon\uff09<\/h2>\n<p><iframe sandbox=\"allow-popups allow-scripts allow-modals allow-forms allow-same-origin\" style=\"width:120px;height:240px;\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/rcm-fe.amazon-adsystem.com\/e\/cm?lt1=_blank&bc1=000000&IS2=1&bg1=FFFFFF&fc1=000000&lc1=0000FF&t=infotecr-22&language=ja_JP&o=9&p=8&l=as4&m=amazon&f=ifr&ref=as_ss_li_til&asins=B0B3QSS8DT&linkId=084bc293878287f1edff8e093bf34311\"><\/iframe><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rocky Linux 9\u4e0a\u3067\u3001EasyRSA\u3092\u4f7f\u7528\u3057\u3066\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"author":1,"featured_media":14987,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[232],"tags":[602,728,726,282,467,469,730,729,630,727],"class_list":["post-12938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-server-applications","tag-alma-linux","tag-ca","tag-easyrsa","tag-linux","tag-rocky-linux","tag-rocky-linux-9","tag-730","tag-729","tag-630","tag-727"],"_links":{"self":[{"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/posts\/12938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/comments?post=12938"}],"version-history":[{"count":22,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/posts\/12938\/revisions"}],"predecessor-version":[{"id":15738,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/posts\/12938\/revisions\/15738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/media\/14987"}],"wp:attachment":[{"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/media?parent=12938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/categories?post=12938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab4ict.com\/system\/wp-json\/wp\/v2\/tags?post=12938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}