{"id":718,"date":"2019-10-07T22:59:03","date_gmt":"2019-10-08T03:59:03","guid":{"rendered":"http:\/\/zewwy.ca\/?p=718"},"modified":"2019-10-07T22:59:44","modified_gmt":"2019-10-08T03:59:44","slug":"vcenter-sso","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2019\/10\/07\/vcenter-sso\/","title":{"rendered":"vCenter SSO"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"vCenter_SSO\"><\/span><strong>vCenter SSO<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>The other day I covered installing vCenter.<\/p>\n<p>Today I&#8217;ll do a very quick overview on setting up SSO with a Windows based AD Auth.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"DNS\"><\/span>DNS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Step 1) validate vCenter can reach any AD via the Root domain name:<br \/>\n*USE AD SERVER FOR DNS, 3rd Party DNS leads to failure as missing specialized records, E.G. srv records)<br \/>\n*Ensure Time is synced to within 5 minutes of AD server*<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/UNIC7mc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/UNIC7mc.png\" alt=\"\" width=\"584\" height=\"131\" \/><\/a><\/p>\n<p>I ssh&#8217;d into the VCSA using root and then, &#8220;shell&#8221; and a regular old ping command to validate.<\/p>\n<p>Step 2) Follow <a href=\"https:\/\/www.virten.net\/2017\/01\/how-to-join-the-vcsa-6-5-to-an-active-directory-domain\/\">Virten&#8217;s Guide for doing the Flash way, or CLI way<\/a> to join vCenter to the Windows Domain. Via the HTML5 Web Client: Menu -&gt; Administration -&gt; SSO -&gt; Configuration -&gt; Active Directory Domain -&gt; Click Join AD (hidden behind the menu in the snippet)<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/J6B3a7q.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/J6B3a7q.png\" alt=\"\" width=\"779\" height=\"626\" \/><\/a><\/p>\n<p>Enter the domain to join, and an account that is allowed to join systems to the domain, in my case I used my Domain ADmin Account:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/vMQ1fSd.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/vMQ1fSd.png\" alt=\"\" width=\"1284\" height=\"687\" \/><\/a><\/p>\n<p>Populate the fields, and click joing and sure enough you will join the domain without issue&#8230; if you have a proper working NTP\/AD architecture that is&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/GnZheuw.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/GnZheuw.png\" alt=\"\" width=\"569\" height=\"143\" \/><\/a><\/p>\n<p>Thanks VMware&#8230; Ugghh ok, and if I use the CLI maybe some more verbose error?<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/74GhUyz.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/74GhUyz.png\" alt=\"\" width=\"646\" height=\"131\" \/><\/a><\/p>\n<p>What do you mean you &#8220;DC not found&#8221; what kind of PCLoadLetter error is this? Like I just verified lookup via DNS which is like the primary pre-req besides firewalls, which I have already configured my actually firewalls&#8230; so what gives, <a href=\"https:\/\/www.google.com\/search?q=Error%3A+NERR_DCNotFound+%5Bcode+0x00000995%5D&amp;oq=Error%3A+NERR_DCNotFound+%5Bcode+0x00000995%5D&amp;aqs=chrome..69i57j69i58.955j0j7&amp;sourceid=chrome&amp;ie=UTF-8\">Googling this error<\/a> leads me to <a href=\"https:\/\/www.altaro.com\/vmware\/how-to-join-esxi-to-active-directory-for-improved-management-and-security\/\">this<\/a>.<\/p>\n<p>and I quote &#8220;On ESXi 6.5, the command is executed from \/usr\/lib\/likewise\/bin. If you haven\u2019t enabled the AD firewall rule mentioned earlier, you must temporarily unload the ESXi firewall \u2013 assuming it is enabled \u2013 for this to work. Failing this, you will get an Error: NERR_DCNotFound [code 0x00000995] error.&#8221;<\/p>\n<p>Are you ****in&#8217; with me&#8230;. for reals&#8230; man wtf VMware&#8230;.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/zqmMR8Y.png\" \/><\/p>\n<p>Shit, right this is the VCSA not a ESXi host&#8230; ugggh quick research&#8230;<\/p>\n<p>What&#8230; da&#8230; How, did I not know about <a href=\"https:\/\/www.vladan.fr\/vmware-vcenter-server-appliance-vcsa-manage-firewall-settings\/\">this<\/a>?! There&#8217;s a special VCSA management page, everything online just uses the &#8220;Web Client&#8221; which all <a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.0\/com.vmware.vsphere.vcsa.doc\/GUID-B37E5402-80B4-4846-B561-BF74500C99D8.html\">VMware&#8217;s documentation<\/a> assumes this to be the Flash client, which doesn&#8217;t even reference this at all!<\/p>\n<p>https:\/\/vcsa:5480<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/Si5oFuj.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Si5oFuj.png\" alt=\"\" width=\"754\" height=\"602\" \/><\/a><\/p>\n<p>Alrighty then&#8230; logging in&#8230; mhmm<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/Ggq3j6w.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Ggq3j6w.png\" alt=\"\" width=\"1083\" height=\"528\" \/><\/a><\/p>\n<p>That&#8217;s awesome but I don&#8217;t see firewall, maybe if I navigate to networking&#8230;<\/p>\n<p>Nope, NICs settings and that&#8217;s about it:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/2WD4Z5z.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/2WD4Z5z.png\" alt=\"\" width=\"1066\" height=\"449\" \/><\/a><\/p>\n<p>C&#8217;mon those firewall settings have to be here, I don&#8217;t want to have to be forced to use flash&#8230;. cmon&#8230;..<\/p>\n<p>F*** it says it&#8217;s for 6.7 I&#8217;m clearly on 6.5 there has to be a way&#8230;<\/p>\n<p>After some deeper digging ( I <a href=\"http:\/\/www.vmwarearena.com\/5-lessons-configuring-firewall-manage-vcsa-6-5-postgres-database-remotely-can-learn-superheroes\/\">found out VCSA uses python scripts<\/a> to use specific files to build the firewall) then also talking this problem over with someone on the IRC channel #wmware, and digging a bit further and finding <a href=\"https:\/\/communities.vmware.com\/thread\/606063\">this vmware post<\/a>&#8230;.<\/p>\n<p>I was at first simply using a third part DNS, having JUST an A host record for the AD server, not any of the other service records for LDAP or anything else, after changing my DNS settings on the VCSA to point to the AD server itself I got a different error at the CLI:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/GEHQcl9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/GEHQcl9.png\" alt=\"\" width=\"432\" height=\"91\" \/><\/a><\/p>\n<p>Bahhh what? oh wait&#8230; lol all my time is wrong, everywhere&#8230;<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"NTP_%E2%80%93_Fixing_Time\"><\/span>NTP &#8211; Fixing Time<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Actual time 8:20 PM Winnipeg Central Time. Mon Oct 7, 2019<\/p>\n<p>AD server time: 2:09 PM Mon Oct 7, 2019 (CST)<\/p>\n<p>VCSA time: Tue Oct 8 01:15:08 UTC 2019<\/p>\n<p>What a gong show&#8230; let&#8217;s fix this! First MS states to leave the PDC to system time to get form the host as host gets acurate time, well not for me. I could point the host to external, and wait then changing PDC time auto. But if you want to Domain join the hosts they should follow the hierarchy and use the PDC as time, catch 22, so instead PDC points to external source, and hosts will point to PDC for time and DNS (this allows for ease for changing external time provider and no issues with time sync).<\/p>\n<p>So fixing PDC time:<\/p>\n<p>before:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/6mBuuQH.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/6mBuuQH.png\" alt=\"\" width=\"839\" height=\"361\" \/><\/a><\/p>\n<p>after<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/LeKUNYw.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/LeKUNYw.png\" alt=\"\" width=\"819\" height=\"99\" \/><\/a><\/p>\n<p>NOw time has changed and my firewall shows the successful packets, but why is my offset still so off? and why is my time an hour off?<\/p>\n<p>Here&#8217;s my local workstation:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/oGb3Z6L.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/oGb3Z6L.png\" alt=\"\" width=\"864\" height=\"418\" \/><\/a><\/p>\n<p>Yet here&#8217;s my PDC:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/15B1dsc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/15B1dsc.png\" alt=\"\" width=\"874\" height=\"475\" \/><\/a><\/p>\n<p>ok everything I checked online I&#8217;m sure I did it right but the syntax on one of the guides I was following didn&#8217;t seem right and I tried again and this time it worked, finally!<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/B01gebF.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/B01gebF.png\" alt=\"\" width=\"972\" height=\"402\" \/><\/a><\/p>\n<p>K, now I can update each host in my lab&#8230;.<\/p>\n<p>Before:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/L2mKsiu.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/L2mKsiu.png\" alt=\"\" width=\"1058\" height=\"212\" \/><\/a><\/p>\n<p>Configure:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/DvopPgw.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/DvopPgw.png\" alt=\"\" width=\"861\" height=\"537\" \/><\/a><\/p>\n<p>After:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/qd3x66Q.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/qd3x66Q.png\" alt=\"\" width=\"1221\" height=\"217\" \/><\/a><\/p>\n<p>Finally VCSA itself, https:\/\/vcsa:5480 (login as root) -&gt; Time<\/p>\n<p>Before:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/K7MuSgz.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/K7MuSgz.png\" alt=\"\" width=\"899\" height=\"576\" \/><\/a><\/p>\n<p>Configure:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/yger05t.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/yger05t.png\" alt=\"\" width=\"623\" height=\"418\" \/><\/a><\/p>\n<p>After:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/bPq9ifD.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/bPq9ifD.png\" alt=\"\" width=\"811\" height=\"529\" \/><\/a><\/p>\n<p>Yay, after fixing my time everywhere:<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Joining_VSCA_to_Windows_Domain_via_CLI\"><\/span>Joining VSCA to Windows Domain via CLI<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<pre>\/opt\/likewise\/bin\/domainjoin-cli join $domain $user '$password'<\/pre>\n<p><a href=\"https:\/\/i.imgur.com\/Gu4Lnib.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/Gu4Lnib.png\" alt=\"\" width=\"680\" height=\"80\" \/><\/a><\/p>\n<p>YAY!<\/p>\n<p>Quick Re-Cap:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/WPpVz7t.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/WPpVz7t.png\" alt=\"\" width=\"763\" height=\"291\" \/><\/a><\/p>\n<p>So bad news is this isn&#8217;t as short a blog as I wanted, but good news is we are all learning something! Yay!<\/p>\n<p>Now that we got our system domain joined (reboot required)<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/u2AUWGz.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/u2AUWGz.png\" alt=\"\" width=\"827\" height=\"640\" \/><\/a><\/p>\n<p>waiting&#8230; waiting&#8230;.<\/p>\n<p>Verifying AD object on AD server (core, via powerhsell)<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/RECMDfE.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/RECMDfE.png\" alt=\"\" width=\"574\" height=\"171\" \/><\/a><\/p>\n<p>and on the HTML 5 Web Client:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/TvnSMhG.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/TvnSMhG.png\" alt=\"\" width=\"1018\" height=\"465\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Adding_Identity_Source\"><\/span>Adding Identity Source<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now I can finally <a href=\"https:\/\/www.virten.net\/2017\/01\/how-to-add-ad-authentication-in-vcenter-6-5\/\">follow adding the Identity source A) AD Auth from here<\/a>.<\/p>\n<p>Click on Identity Sources -&gt; Add Identity Source:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/DVjcESV.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/DVjcESV.png\" alt=\"\" width=\"1035\" height=\"452\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/eAvp1He.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/eAvp1He.png\" alt=\"\" width=\"863\" height=\"831\" \/><\/a><\/p>\n<p>omg finally something that was dead simple&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/QbKnChV.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/QbKnChV.png\" alt=\"\" width=\"1310\" height=\"412\" \/><\/a><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Defining_Permissions\"><\/span>Defining Permissions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now click on global Permissions.<\/p>\n<p>Click &#8220;+&#8221; icon, and if system join is all good it should be able to query the AD and find the users when typed into the Name field:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/cM4mOQP.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/cM4mOQP.png\" alt=\"\" width=\"1298\" height=\"666\" \/><\/a><\/p>\n<p>Lets test it&#8230;.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/pKsyHhr.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/pKsyHhr.png\" alt=\"\" width=\"844\" height=\"87\" \/><\/a><\/p>\n<p>Second attempt but pushing to children objects:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/cK01Zpl.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/cK01Zpl.png\" alt=\"\" width=\"563\" height=\"381\" \/><\/a><\/p>\n<p>and yay this time I was able to get in successfully:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/dGn1nLb.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/dGn1nLb.png\" alt=\"\" width=\"546\" height=\"316\" \/><\/a>but I had to put in my UPN (user@doman.local) what if I just want to enter my user name&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/YeySW5k.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/YeySW5k.png\" alt=\"\" width=\"983\" height=\"499\" \/><\/a><\/p>\n<p>What a bunch of poop, that&#8217;s cause we didn&#8217;t set the primary SSO domain&#8230; back in the VCSA settings https:\/\/vcsa:5480 &#8211; summary shows<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/eLyWt3e.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/eLyWt3e.png\" alt=\"\" width=\"415\" height=\"100\" \/><\/a>back on vCenter Web Client, Menu -&gt; Administration -&gt; SSO -&gt; Configure -&gt; Identity Sources -&gt; select new source -&gt; click Set as Default:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/0AgYVvt.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/0AgYVvt.png\" alt=\"\" width=\"1036\" height=\"444\" \/><\/a><\/p>\n<p>login again:<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/5s8apNK.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/5s8apNK.png\" alt=\"\" width=\"951\" height=\"483\" \/><\/a><\/p>\n<p><a href=\"https:\/\/i.imgur.com\/dGn1nLb.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/dGn1nLb.png\" alt=\"\" width=\"546\" height=\"316\" \/><\/a><\/p>\n<p>success, and finally as the source virten post stated, the &#8220;Use Windows Authentication&#8221; option is greyed out unless the<strong> Enhanced Authentication Plugin<\/strong> is installed. You can find the download link at the bottom of the login screen.<\/p>\n<p><a href=\"https:\/\/www.virten.net\/wp-content\/uploads\/2017\/01\/vcenter-download-enhanced-authentication-plugin.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.virten.net\/wp-content\/uploads\/2017\/01\/vcenter-download-enhanced-authentication-plugin.png\" alt=\"\" width=\"879\" height=\"327\" \/><\/a><\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>That was a bit more painful then I wanted it to be, but it really was nice that it was this painful cause it reminded me of the moving parts that have to be setup correct for this all to play nicely to begin with.<\/p>\n<p>I hope this guide has helped someone. Please leave a comment, any comment will do!!!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>vCenter SSO The other day I covered installing vCenter. Today I&#8217;ll do a very quick overview on setting up SSO with a Windows based AD Auth. DNS Step 1) validate vCenter can reach any AD via the Root domain name: *USE AD SERVER FOR DNS, 3rd Party DNS leads to failure as missing specialized records, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2019\/10\/07\/vcenter-sso\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;vCenter SSO&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[5,8],"tags":[242,16,88],"class_list":["post-718","post","type-post","status-publish","format-standard","hentry","category-hypervisors","category-server-administration","tag-sso","tag-vcenter","tag-vmware"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=718"}],"version-history":[{"count":2,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/718\/revisions"}],"predecessor-version":[{"id":721,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/718\/revisions\/721"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}