{"id":647,"date":"2019-08-08T15:16:12","date_gmt":"2019-08-08T20:16:12","guid":{"rendered":"http:\/\/zewwy.ca\/?p=647"},"modified":"2023-09-19T22:15:27","modified_gmt":"2023-09-20T03:15:27","slug":"http-to-https-redirect-sub-ca-core","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2019\/08\/08\/http-to-https-redirect-sub-ca-core\/","title":{"rendered":"HTTP to HTTPS redirect Sub-CA Core"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"The_Story\"><\/span><strong>The Story<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>One day I noticed I had configured my 2008 R2 CA server to automatically redirect to the certsrv site over HTTPS even when navigating to the root site via HTTP. There was however no URL rewrite module&#8230; and I didn&#8217;t blog about so I had to figure out&#8230;. how did I do it?! Why?&#8230;.. Cause this&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/D4tFi3d.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/D4tFi3d.png\" alt=\"\" width=\"1000\" height=\"402\" \/><\/a><\/p>\n<p>Sucks, and why would you issue certificates over unsecure HTTP (yeah yeah, locked down networks don&#8217;t matter, but still, if its easy enough to secure, why not).<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"The_First_Problem\"><\/span>The First Problem<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The first problem should be pretty evident from the title alone&#8230;. yeah it&#8217;s core, which means; No Desktop, no GUI tools, much of anything on the server itself. So <a href=\"http:\/\/zewwy.ca\/index.php\/2018\/02\/11\/manage-iis-on-server-core-remotely\/\">we will have to manage IIS settings remotely<\/a>.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>SubCA:<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/JY67cPP.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/JY67cPP.png\" alt=\"\" width=\"966\" height=\"507\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/Avc3VGJ.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Avc3VGJ.png\" alt=\"\" width=\"587\" height=\"102\" \/><\/a><\/p>\n<p>Nice, and&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/WWvGkeK.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/WWvGkeK.png\" alt=\"\" width=\"945\" height=\"58\" \/><\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Windows 10:<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/ZeheMNl.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/ZeheMNl.png\" alt=\"\" width=\"876\" height=\"391\" \/><\/a><\/p>\n<p>as well install <a href=\"https:\/\/drive.google.com\/file\/d\/1dHIDVfUT75J6vUfHe9aG4q4K3uI8lfiP\/view?usp=sharing\">IIS RM 1.2 (Google Drive share)<\/a> Why&#8230; <a href=\"https:\/\/forums.iis.net\/p\/1251179\/2162310.aspx?Re+IIS+Manager+for+Remote+Administration+1+2+missing\">see here<\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/f0uNpPQ.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/f0uNpPQ.png\" alt=\"\" width=\"501\" height=\"388\" \/><\/a><\/p>\n<p>and finally connect to the sub-CAs IIS&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/kv9qeJt.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/kv9qeJt.png\" alt=\"\" width=\"800\" height=\"322\" \/><\/a><\/p>\n<p>and<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/THKWc7Q.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/THKWc7Q.png\" alt=\"\" width=\"663\" height=\"511\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/PhZII2i.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/PhZII2i.png\" alt=\"\" width=\"353\" height=\"247\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/Qacme5S.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Qacme5S.png\" alt=\"\" width=\"1269\" height=\"396\" \/><\/a><\/p>\n<p>Expand Sites, and highlight the default site&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/8pLBk2h.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/8pLBk2h.png\" alt=\"\" width=\"1276\" height=\"536\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Default_Settings\"><\/span><strong>Default Settings<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>By default you can notice a few things, first there&#8217;s no binding for the alternative default port of 443 which HTTPS standardizes on.<\/p>\n<p>Now you can simply select the same Computer based certificate that was issued to the computer for the actual Sub-CA itself.. and this will work&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/fIK2RHm.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/fIK2RHm.png\" alt=\"\" width=\"642\" height=\"373\" \/><\/a><\/p>\n<p>however navigating to the site gave cert warnings as I was accessing the site by a hostname different than the common name, and without any SANs specified for this you get certificate errors\/warnings, not a great choice. So let&#8217;s create a new certificate for IIS.<\/p>\n<p>Alright, no worries<a href=\"http:\/\/zewwy.ca\/index.php\/2018\/02\/14\/creating-requesting-approving-installing-certificates-on-iis-core\/\"> I blogged about this as well<\/a>&#8230;<\/p>\n<p>On the Windows 10 client machine, open MMC&#8230;<\/p>\n<p>Certificates Snap in -&gt; Comp -&gt; SubCA<\/p>\n<p>-&gt; Personal -&gt; Certificates -&gt; Right Click open area -&gt; All Tasks -&gt; Advanced Operations -&gt; Create Custom Request&#8230;.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/XWEc1ET.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/XWEc1ET.png\" alt=\"\" width=\"943\" height=\"541\" \/><\/a><\/p>\n<p>Next, Pick AD enrollment, Next, Template: Web Server; PKCS #10, Next,<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/mjGv1DD.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/mjGv1DD.png\" alt=\"\" width=\"619\" height=\"761\" \/><\/a><\/p>\n<p>Click Details, then Properties, populate the CN and SANS, Next<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/JFjMvZG.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/JFjMvZG.png\" alt=\"\" width=\"600\" height=\"471\" \/><\/a><\/p>\n<p>Save the request file, Open the CA Snap-in&#8230;. sign the cert&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/UvpD2Fv.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/UvpD2Fv.png\" alt=\"\" width=\"620\" height=\"568\" \/><\/a><\/p>\n<p>provide the request file, and save the certificate&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/FXuP1LC.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/FXuP1LC.png\" alt=\"\" width=\"615\" height=\"471\" \/><\/a><\/p>\n<p>import it back to the CA via the remote MMC cert snap-in&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/pAUDosp.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/pAUDosp.png\" alt=\"\" width=\"950\" height=\"336\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/Dqa5cVw.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Dqa5cVw.png\" alt=\"\" width=\"533\" height=\"521\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/aIdTCWh.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/aIdTCWh.png\" alt=\"\" width=\"527\" height=\"516\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/nDLacc0.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/nDLacc0.png\" alt=\"\" width=\"289\" height=\"189\" \/><\/a><\/p>\n<p>Now back on IIS&#8230; let&#8217;s change the cert on the binding&#8230;<\/p>\n<p>Mhmmmm not showing up in the list&#8230; let&#8217;s re-open IIS manager&#8230; nope cause&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/OHG99nL.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/OHG99nL.png\" alt=\"\" width=\"836\" height=\"184\" \/><\/a><\/p>\n<p>I don&#8217;t have the key.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"The_Second_Problem\"><\/span><strong>The Second Problem<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>I see so even though I created the CSR on the server remotely&#8230; it doesn&#8217;t have the key after importing&#8230; I didn&#8217;t have this issue on my initial testing at work, so I&#8217;m not exactly sure what happened here considering I followed all the steps I did before exactly&#8230;. so ok weird&#8230;I think this might be an LTSB bug (Nope Tested on a 1903 client VM) or something, it&#8217;s the only difference I can think of at this moment.<\/p>\n<p>In my initial tests of this the SubCA did have the key with the cert but when attempting to bind it in IIS would always error out with an interesting error.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/cN5Z3sH.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/cN5Z3sH.png\" alt=\"\" width=\"520\" height=\"342\" \/><\/a><\/p>\n<p>Which now I&#8217;ll have to get a snippet of, as my home lab provided different results&#8230; which kind of annoys the shit out of me right now. So even if you get the key with the &#8220;first method&#8221; it won&#8217;t work you get the above ever, or you simply don&#8217;t get the key with the request and import and it never shows in the IIS bindings dropdown list.<\/p>\n<p>Anyway, I only managed to resolve it by following the second method of creating a cert on IIS Core.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Enabling_RDP_on_Core\"><\/span><strong>Enabling RDP on Core<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now I&#8217;m lazy and didn&#8217;t want to type out the whole inf file, and my first attempts to RDP in failed cause of course you have to configure it, i know how on desktop version, but<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/server-core\/server-core-manage#managing-with-remote-desktop-services\"> luckily MS documented<\/a> this finally&#8230;<\/p>\n<p>so on the console of the SubCA:<\/p>\n<pre>cscript C:\\Windows\\System32\\Scregedit.wsf \/ar 0<\/pre>\n<p><a href=\"https:\/\/i.imgur.com\/imax1mx.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/imax1mx.png\" alt=\"\" width=\"1019\" height=\"708\" \/><\/a><\/p>\n<p>open notepad and create CSR on SubCA directly&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/koQZTdH.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/koQZTdH.png\" alt=\"\" width=\"1014\" height=\"604\" \/><\/a><\/p>\n<p>save it, and convert it, and submit it!<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/CWnUzN2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/CWnUzN2.png\" alt=\"\" width=\"686\" height=\"518\" \/><\/a><\/p>\n<p>Save!!!! the Cert!<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/ka1S5rw.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/ka1S5rw.png\" alt=\"\" width=\"965\" height=\"667\" \/><\/a><\/p>\n<p>Accept! The Cert!<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/V1s3Aix.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/V1s3Aix.png\" alt=\"\" width=\"363\" height=\"65\" \/><\/a><\/p>\n<p>Now in cert snap-in you can see the system has the key:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/v9qQAqQ.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/v9qQAqQ.png\" alt=\"\" width=\"654\" height=\"237\" \/><\/a><\/p>\n<p>and should now be selectable in IIS, and not give and error like shown above.<\/p>\n<p>But first the default error messages section:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/4BbrnpT.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/4BbrnpT.png\" alt=\"\" width=\"778\" height=\"433\" \/><\/a><\/p>\n<p>and add the new port binding:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/7KbItc1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/7KbItc1.png\" alt=\"\" width=\"622\" height=\"416\" \/><\/a><\/p>\n<p>Now we should be able to access the certsrv page securely or you know the welcome splash&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/5vBkPDt.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/5vBkPDt.png\" alt=\"\" width=\"817\" height=\"652\" \/><\/a><\/p>\n<p>Now for the magic, I took the idea of this guy&#8221;<\/p>\n<header class=\"comment__header\"><span class=\"post-byline\"><span class=\"author publisher-anchor-color\"><a href=\"https:\/\/disqus.com\/by\/mauroleonelli\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"profile\" data-username=\"mauroleonelli\">Mauro<\/a><\/span> <\/span><span class=\"post-meta\"><span class=\"bullet time-ago-bullet\" aria-hidden=\"true\">\u2022<\/span> <a class=\"time-ago\" title=\"Tuesday, April 24, 2018 10:18 AM\" href=\"https:\/\/www.namecheap.com\/support\/knowledgebase\/article.aspx\/9953\/38\/iis-redirect-http-to-https#comment-3869684464\" data-role=\"relative-time\">a year ago<\/a><\/span><\/header>\n<div class=\"post-body-inner\">\n<div class=\"post-message-container\" data-role=\"message-container\">\n<div class=\"publisher-anchor-color\" data-role=\"message-content\">\n<div class=\"post-message \" dir=\"auto\" data-role=\"message\">\n<div>\n<p>Make sure that under SSL Settings, Require SSL is not checked. Otherwise it will complain with 403.4.forbidden<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&#8221; response from <a href=\"https:\/\/www.namecheap.com\/support\/knowledgebase\/article.aspx\/9953\/38\/iis-redirect-http-to-https\">this site<\/a> I sourced in my <a href=\"http:\/\/zewwy.ca\/index.php\/2018\/11\/01\/iis-redirect-http-to-https\/\">original HTTP to HTTPS redirect<\/a><\/p>\n<p>So&#8230;<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Creating_a_custom_Error_Page\"><\/span>Creating a custom Error Page<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/i.imgur.com\/GRiHJNc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/GRiHJNc.png\" alt=\"\" width=\"503\" height=\"523\" \/><\/a><\/p>\n<p>which gives this:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/rpMSe5B.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/rpMSe5B.png\" alt=\"\" width=\"808\" height=\"488\" \/><\/a><\/p>\n<p>and finally, enable require SSL:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/fzcWOb3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/fzcWOb3.png\" alt=\"\" width=\"715\" height=\"311\" \/><\/a><\/p>\n<p>Now if you navigate to http:\/\/subca you get https:\/\/subca\/certsrv<\/p>\n<p>No URL rewrite module required:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/kD7LUXF.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/kD7LUXF.png\" alt=\"\" width=\"601\" height=\"263\" \/><\/a><\/p>\n<p>Press enter.. and TADA:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/qQlOeSo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/qQlOeSo.png\" alt=\"\" width=\"703\" height=\"320\" \/><\/a><\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>There&#8217;s always multiple ways to accomplish something, I like this method cause I didn&#8217;t have to install and alternative module on my SubCA server. This also always enforces a secure connection when using the web portal to issue certificates. I also found no impact on any regular MMC requests either. All good all around.<\/p>\n<p>I hope someone enjoys this post! Cheers!<\/p>\n<p>*UPDATE 2023* This trick caused my SubCA CA services to not start. Stating failed to retrieve CRL, this was due to any attempt to retrieve the CRL over regular HTTP to fail as those requests would redirect back to the certsrv site, but requests to the same CRL via HTTPS would work. So only implement this change if you have already edited your Offline and SubCA Certificates to have CRL&#8217;s pointing to a https based URL references.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Story One day I noticed I had configured my 2008 R2 CA server to automatically redirect to the certsrv site over HTTPS even when navigating to the root site via HTTP. There was however no URL rewrite module&#8230; and I didn&#8217;t blog about so I had to figure out&#8230;. how did I do it?! &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2019\/08\/08\/http-to-https-redirect-sub-ca-core\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;HTTP to HTTPS redirect Sub-CA Core&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[4,8],"tags":[217,216,121],"class_list":["post-647","post","type-post","status-publish","format-standard","hentry","category-infosec","category-server-administration","tag-ca","tag-certsrv","tag-https"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=647"}],"version-history":[{"count":5,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/647\/revisions"}],"predecessor-version":[{"id":1504,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/647\/revisions\/1504"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}