{"id":6004,"date":"2020-12-26T09:06:07","date_gmt":"2020-12-26T03:36:07","guid":{"rendered":"https:\/\/blog.pheonixsolutions.com\/?p=6004"},"modified":"2021-02-16T14:51:21","modified_gmt":"2021-02-16T09:21:21","slug":"how-to-secure-mongodb-databases","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/","title":{"rendered":"How to secure MongoDB databases"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">How to secure MongoDB databases<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">Date: 22-12-2020<\/h4>\n\n\n\n<p>You must edit mongod.conf, MongoDB\u2019s configuration file to enable authentication. Once you enabled it and restart the Mongo service, users will still be able to connect to the database without authenticating. However, they won\u2019t be able to read or modify any data until they provide a correct username and password.<\/p>\n\n\n\n<p><strong>Step 1:<\/strong> Adding username and password for admin database by using below steps.<\/p>\n\n\n\n<p><code># mongo<\/code><br><code>&gt; show dbs<\/code><br>Output shows the database names like below.<br>         admin  0.000GB<br>         config   0.000GB<br>         local     0.000GB<br><br>You must first connect to the database by using below command.<br><code>&gt; use admin<\/code><br>You can create username and password for this database by using below command.<br><code>&gt; db.createUser(&nbsp;{user: \"username\",pwd: \"strong password\",roles: [ { role: \"userAdminAnyDatabase\", db:\"admin\" },{ role: \"dbAdminAnyDatabase\", db: \"admin\" },{ role:\"readWriteAnyDatabase\", db: \"admin\" } ]})<\/code><br>Exit the Database.<br><code>&gt; exit<\/code><\/p>\n\n\n\n<p><strong>Step 2:<\/strong> Open the configuration file by using the below command. Scroll down to find the commented-out&nbsp;<code>security<\/code>&nbsp;section and uncomment this line by removing # simbol.<\/p>\n\n\n\n<p><code># vim \/etc\/mongod.conf<\/code><\/p>\n\n\n\n<p><strong>Step 3: <\/strong>Add the&nbsp;<code>authorization<\/code>&nbsp;parameter and set it to&nbsp;<code>\"enabled\"<\/code> like below. Save and exit the file.<\/p>\n\n\n\n<p><code>security:<br>  authorization: enabled<\/code><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"586\" height=\"948\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\" alt=\"\" class=\"wp-image-6123\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png 586w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM-185x300.png 185w\" sizes=\"auto, (max-width: 586px) 100vw, 586px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Step 4:<\/strong> Restart the Mongodb service and check the status by using below commands.<br><code># systemctl restart mongod<\/code><br><code># systemctl status mongod<\/code><\/p>\n\n\n\n<p><strong>Step 5:<\/strong> You have to make sure the authentication is working for this admin database so you need login to mongodb via terminal by using below command<br><code># mongo -u username -p --authenticationDatabase admin<\/code><br>Once you enter the above command will ask password for the username.<br>Password:<\/p>\n\n\n\n<p>Thank you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to secure MongoDB databases Date: 22-12-2020 You must edit mongod.conf, MongoDB\u2019s configuration file to enable authentication. Once you enabled it and restart the Mongo service, users will still be able to connect to the database without authenticating. However, they won\u2019t be able to read or modify any data until&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">How to secure MongoDB databases<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[386],"tags":[180,743],"class_list":{"0":"post-6004","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-database","7":"tag-database","8":"tag-mongo","9":"h-entry","11":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"How to secure MongoDB databases Date: 22-12-2020 You must edit mongod.conf, MongoDB\u2019s configuration file to enable authentication. Once you enabled it and restart the Mongo service, users will still be able to connect to the database without authenticating. However, they won\u2019t be able to read or modify any data until&hellip; Continue Reading How to secure MongoDB databases\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-26T03:36:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-16T09:21:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\"},\"headline\":\"How to secure MongoDB databases\",\"datePublished\":\"2020-12-26T03:36:07+00:00\",\"dateModified\":\"2021-02-16T09:21:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/\"},\"wordCount\":216,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\",\"keywords\":[\"database\",\"Mongo\"],\"articleSection\":[\"Database\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\",\"datePublished\":\"2020-12-26T03:36:07+00:00\",\"dateModified\":\"2021-02-16T09:21:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\",\"contentUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Screen-Shot-2021-02-16-at-2.48.22-PM.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-secure-mongodb-databases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to secure MongoDB databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/blog.pheonixsolutions.com\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"How to secure MongoDB databases Date: 22-12-2020 You must edit mongod.conf, MongoDB\u2019s configuration file to enable authentication. Once you enabled it and restart the Mongo service, users will still be able to connect to the database without authenticating. However, they won\u2019t be able to read or modify any data until&hellip; Continue Reading How to secure MongoDB databases","og_url":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2020-12-26T03:36:07+00:00","article_modified_time":"2021-02-16T09:21:21+00:00","og_image":[{"url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/"},"author":{"name":"admin","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503"},"headline":"How to secure MongoDB databases","datePublished":"2020-12-26T03:36:07+00:00","dateModified":"2021-02-16T09:21:21+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/"},"wordCount":216,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png","keywords":["database","Mongo"],"articleSection":["Database"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/","url":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png","datePublished":"2020-12-26T03:36:07+00:00","dateModified":"2021-02-16T09:21:21+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#primaryimage","url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png","contentUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2021\/02\/Screen-Shot-2021-02-16-at-2.48.22-PM.png"},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-secure-mongodb-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to secure MongoDB databases"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/blog.pheonixsolutions.com"],"url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-1yQ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=6004"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6004\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=6004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=6004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=6004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}