{"id":1582,"date":"2022-07-22T16:36:30","date_gmt":"2022-07-22T16:36:30","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=1582"},"modified":"2022-07-22T16:36:34","modified_gmt":"2022-07-22T16:36:34","slug":"allow-creation-of-ssh-keys-without-passwords-in-cpanel","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/","title":{"rendered":"Allow creation of SSH Keys without passwords in cPanel"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>There are some instances where cPanel users wish to create a password-less SSH key. By default, this is not allowed in the cPanel SSH Access interface unless the administrator configures their password strength requirements for SSH. From our\u00a0<a href=\"https:\/\/docs.cpanel.net\/cpanel\/security\/ssh-access\/#generate-a-new-key\">documentation<\/a>, passwords are\u00a0<strong>optional<\/strong>\u00a0if the administrator sets the\u00a0<em>SSH Keys<\/em>\u00a0setting to\u00a0<code>0<\/code>\u00a0in WHM\u2019s\u00a0<a href=\"https:\/\/docs.cpanel.net\/whm\/security-center\/password-strength-configuration\/\"><em>Password Strength Configuration<\/em><\/a>\u00a0interface<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Procedure<\/h3>\n\n\n\n<p>To adjust your Password Strength Requirements:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"419\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png\" alt=\"\" class=\"wp-image-1583\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png 535w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19-300x235.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19-150x117.png 150w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/figure>\n\n\n\n<p>2. Navigate to &#8220;Security Center&#8221; &gt;&gt; &#8220;Password Strength Configuration&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"71\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-21.png\" alt=\"\" class=\"wp-image-1585\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-21.png 256w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-21-150x42.png 150w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"403\" height=\"73\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-22.png\" alt=\"\" class=\"wp-image-1586\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-22.png 403w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-22-300x54.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-22-150x27.png 150w\" sizes=\"auto, (max-width: 403px) 100vw, 403px\" \/><\/figure>\n\n\n\n<p>3. Set the SSH setting to 0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"474\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-23-1024x474.png\" alt=\"\" class=\"wp-image-1587\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-23-1024x474.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-23-300x139.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-23-768x355.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-23-150x69.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-23.png 1096w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>4. Click &#8220;Save&#8221;<\/p>\n\n\n\n<p>From here, you can now access cPanel &gt;&gt; SSH Access once more and create a password-less key.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction There are some instances where cPanel users wish to create a password-less SSH key. By default, this is not allowed in the cPanel SSH Access interface unless the administrator configures their password strength requirements for SSH. From our\u00a0documentation, passwords are\u00a0optional\u00a0if the administrator sets the\u00a0SSH Keys\u00a0setting to\u00a00\u00a0in WHM\u2019s\u00a0Password Strength Configuration\u00a0interface Procedure To adjust your Password ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1582","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Allow creation of SSH Keys without passwords in cPanel - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Allow creation of SSH Keys without passwords in cPanel - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction There are some instances where cPanel users wish to create a password-less SSH key. By default, this is not allowed in the cPanel SSH Access interface unless the administrator configures their password strength requirements for SSH. From our\u00a0documentation, passwords are\u00a0optional\u00a0if the administrator sets the\u00a0SSH Keys\u00a0setting to\u00a00\u00a0in WHM\u2019s\u00a0Password Strength Configuration\u00a0interface Procedure To adjust your Password ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-22T16:36:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-22T16:36:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png\" \/>\n<meta name=\"author\" content=\"vijender\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vijender\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/\"},\"author\":{\"name\":\"vijender\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/7e483f3adf4e0c18f959adcaf9ea3f3d\"},\"headline\":\"Allow creation of SSH Keys without passwords in cPanel\",\"datePublished\":\"2022-07-22T16:36:30+00:00\",\"dateModified\":\"2022-07-22T16:36:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/\"},\"wordCount\":109,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/image-19.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/\",\"name\":\"Allow creation of SSH Keys without passwords in cPanel - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/image-19.png\",\"datePublished\":\"2022-07-22T16:36:30+00:00\",\"dateModified\":\"2022-07-22T16:36:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/7e483f3adf4e0c18f959adcaf9ea3f3d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/image-19.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/image-19.png\",\"width\":535,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2022\\\/07\\\/22\\\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Allow creation of SSH Keys without passwords in cPanel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/7e483f3adf4e0c18f959adcaf9ea3f3d\",\"name\":\"vijender\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29c5aebbdf439bbeaeea52d1cf1a0166768889fd6238deb28b6851eebb2cfb32?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29c5aebbdf439bbeaeea52d1cf1a0166768889fd6238deb28b6851eebb2cfb32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29c5aebbdf439bbeaeea52d1cf1a0166768889fd6238deb28b6851eebb2cfb32?s=96&d=mm&r=g\",\"caption\":\"vijender\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/vijender\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Allow creation of SSH Keys without passwords in cPanel - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/","og_locale":"en_US","og_type":"article","og_title":"Allow creation of SSH Keys without passwords in cPanel - PheonixSolutions Knowledge-Base","og_description":"Introduction There are some instances where cPanel users wish to create a password-less SSH key. By default, this is not allowed in the cPanel SSH Access interface unless the administrator configures their password strength requirements for SSH. From our\u00a0documentation, passwords are\u00a0optional\u00a0if the administrator sets the\u00a0SSH Keys\u00a0setting to\u00a00\u00a0in WHM\u2019s\u00a0Password Strength Configuration\u00a0interface Procedure To adjust your Password ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2022-07-22T16:36:30+00:00","article_modified_time":"2022-07-22T16:36:34+00:00","og_image":[{"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png","type":"","width":"","height":""}],"author":"vijender","twitter_card":"summary_large_image","twitter_misc":{"Written by":"vijender","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/"},"author":{"name":"vijender","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/7e483f3adf4e0c18f959adcaf9ea3f3d"},"headline":"Allow creation of SSH Keys without passwords in cPanel","datePublished":"2022-07-22T16:36:30+00:00","dateModified":"2022-07-22T16:36:34+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/"},"wordCount":109,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/","name":"Allow creation of SSH Keys without passwords in cPanel - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png","datePublished":"2022-07-22T16:36:30+00:00","dateModified":"2022-07-22T16:36:34+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/7e483f3adf4e0c18f959adcaf9ea3f3d"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#primaryimage","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png","contentUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2022\/07\/image-19.png","width":535,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2022\/07\/22\/allow-creation-of-ssh-keys-without-passwords-in-cpanel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"Allow creation of SSH Keys without passwords in cPanel"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/7e483f3adf4e0c18f959adcaf9ea3f3d","name":"vijender","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/29c5aebbdf439bbeaeea52d1cf1a0166768889fd6238deb28b6851eebb2cfb32?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29c5aebbdf439bbeaeea52d1cf1a0166768889fd6238deb28b6851eebb2cfb32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29c5aebbdf439bbeaeea52d1cf1a0166768889fd6238deb28b6851eebb2cfb32?s=96&d=mm&r=g","caption":"vijender"},"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/vijender\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/1582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=1582"}],"version-history":[{"count":1,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/1582\/revisions"}],"predecessor-version":[{"id":1588,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/1582\/revisions\/1588"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=1582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=1582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=1582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}