{"id":3711,"date":"2024-04-30T10:08:40","date_gmt":"2024-04-30T04:38:40","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=3711"},"modified":"2024-08-01T16:03:12","modified_gmt":"2024-08-01T10:33:12","slug":"deploying-boundary-for-secure-developer-access-to-your-cloud-resources","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/","title":{"rendered":"Deploying Boundary for secure developer access to your cloud resources"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3712\" src=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?resize=1140%2C760&#038;ssl=1\" alt=\"\" width=\"1140\" height=\"760\" srcset=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?w=1140&amp;ssl=1 1140w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?resize=750%2C500&amp;ssl=1 750w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Whether databases, Kubernetes clusters, or storage, exposing them to the public internet can pose significant risks. One of the ways to mitigate vulnerability is with Hashicorp\u2019s Boundary, a secure virtual gateway that connects developers and cloud resources, ensuring access to sensitive assets remains private.\u00a0<\/span><\/p>\n<h3><strong>Boundary vs VPNs<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Traditionally, VPNs &#8211; which cloak online data traffic, shielding it from external interception &#8211; have been the go-to solution for secure access. But they often come with a hefty price tag. This is why companies have been turning towards Boundary, an open-source tool by HashiCorp, designed to provide secure access to cloud resources at a lesser price.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Boundary from Hashicorp offers a cloud-centric approach to user access management, ensuring scalability. It simplifies access workflows, employs trusted identity providers, secures end-user access, and manages credentials centrally. It provides session visibility, reduces attack surfaces, and supports automation, advanced credential management, audit logs, and hybrid cloud connectivity for enhanced security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Akin to a VPN, Boundary safeguards resources spread across AWS, Azure, and GCP. Given the need to maintain the security of these resources, it becomes essential to confine them within a private network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But there are some differences in how they work. For example, while VPNs authenticate users and establish secure tunnels to private networks, enabling remote access to organizational services, Boundary proposes a refined remote access model, granting granular access to specific services rather than the entire network. For many organizations, Boundary represents a security enhancement over traditional VPN solutions, offering more granular controls. But in some cases, the two are integrated. Boundary can complement existing corporate VPNs, providing additional security layers for accessing privileged networks such as data centers and cloud VPCs.<\/span><\/p>\n<h3><strong>Boundary vs Bastion Host<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Setting up a Bastion Host (or a jump server) is one way to ensure secure access to your cloud resources, but this approach also has a few shortcomings. First, security is implemented based on network location with a Bastion Host, while Boundary enables a true zero-trust approach to security. A Bastion Host also requires cumbersome manual configuration of access rules, as compared to Boundary where access control is automated based on user identity and policies.<\/span><\/p>\n<p><b>Here\u2019s how you can deploy Boundary to safeguard your cloud infrastructure while granting developers secure access to the resources they need.<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">1. <strong>Set up a Boundary on your Server<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Begin by downloading and installing Boundary onto your designated server. You can find detailed installation instructions on the HashiCorp website. Once installed, Boundary can be configured to integrate with cloud providers such as AWS, Azure, and GCP by providing the necessary credentials and permissions. This step ensures that Boundary can authenticate and authorize access to cloud resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users typically require credentials for authentication when connecting to remote machines and may need additional credentials to access services or other machines within the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Boundary supports various credential types such as username\/password, SSH private key, SSH certificate, JSON, token, certificate, JSON blob, and unstructured secrets stored in Vault.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Credential management in Boundary involves two paradigms: credential brokering and credential injection. Credential brokering fetches credentials from a store and returns them to the user during session establishment, while credential injection fetches credentials from a store and authenticates the user to the target without exposing the credentials to the user (this is a passwordless experience). Both processes ensure secure access to targets while abstracting the authentication process, enhancing security and usability in boundary environments.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. <strong>Deploy Boundary Client on User Devices<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Once the Boundary Server is running, one can equip developers with Boundary Client on their computers or other devices so they have the required permissions to connect to the Boundary Server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Boundary operates primarily through its API, with HashiCorp providing various clients including a Go SDK and a Desktop client, aside from the web user interface. The Boundary client daemon locally caches session and target information to expedite searches, helping to manage large lists of resources. Users can manually start the daemon and customize its behavior according to their preferences, including setting refresh intervals and managing authentication tokens. The client cache ensures efficient interaction with Boundary instances while providing flexibility and control over caching and authentication mechanisms.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. <strong>Define Access Policies<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Defining access policies that govern who can access which resources and under what conditions is important in the installation process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Boundary\u2019s Identity and Access Management (IAM) system comprises six main components:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Scopes:<\/b><span style=\"font-weight: 400;\"> act as containers for resources and permissions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Auth methods:<\/b><span style=\"font-weight: 400;\"> Authenticate users and are contained by global or org scopes, supporting options like username\/password<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Accounts:<\/b><span style=\"font-weight: 400;\"> represent authenticated users from identity providers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Users:<\/b><span style=\"font-weight: 400;\"> individual entities for access control and can have multiple accounts from various auth methods<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Groups:<\/b><span style=\"font-weight: 400;\"> collect users and can be managed or synced with identity providers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Roles:<\/b><span style=\"font-weight: 400;\"> contain permissions granted to users or groups and can be applied at any scope level<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To configure users with password auth, select the scope and auth method, create an account, and attach it to the user. It is recommended to manage permissions via groups for easier management and scalability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">In today\u2019s threat landscape, proactive measures like Boundary are essential to safeguarding valuable assets from potential breaches. At CloudNow, we\u2019re constantly looking for ways to enhance security while delivering advanced technology solutions fast &#8211; and Boundary is one of the tools that helps us achieve this.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether databases, Kubernetes clusters, or storage, exposing them to the public internet can pose significant risks. One of the ways to mitigate vulnerability is with Hashicorp\u2019s Boundary, a secure virtual gateway that connects developers and cloud resources, ensuring access to sensitive assets remains private.\u00a0 Boundary vs VPNs Traditionally, VPNs &#8211; which cloak online data traffic, [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-others"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deploying Boundary for secure developer access to your cloud resources - Discover Better Value Faster<\/title>\n<meta name=\"description\" content=\"Discover how HashiCorp&#039;s Boundary offers secure cloud resource access, replacing VPNs. Deploy it easily for enhanced cloud security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deploying Boundary for secure developer access to your cloud resources - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"Discover how HashiCorp&#039;s Boundary offers secure cloud resource access, replacing VPNs. Deploy it easily for enhanced cloud security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-30T04:38:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-01T10:33:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&ssl=1\",\"width\":1140,\"height\":760},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/\",\"name\":\"Deploying Boundary for secure developer access to your cloud resources - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#primaryimage\"},\"datePublished\":\"2024-04-30T04:38:40+00:00\",\"dateModified\":\"2024-08-01T10:33:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"description\":\"Discover how HashiCorp's Boundary offers secure cloud resource access, replacing VPNs. Deploy it easily for enhanced cloud security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deploying Boundary for secure developer access to your cloud resources\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deploying Boundary for secure developer access to your cloud resources - Discover Better Value Faster","description":"Discover how HashiCorp's Boundary offers secure cloud resource access, replacing VPNs. Deploy it easily for enhanced cloud security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/","og_locale":"en_US","og_type":"article","og_title":"Deploying Boundary for secure developer access to your cloud resources - Discover Better Value Faster","og_description":"Discover how HashiCorp's Boundary offers secure cloud resource access, replacing VPNs. Deploy it easily for enhanced cloud security.","og_url":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/","og_site_name":"Discover Better Value Faster","article_published_time":"2024-04-30T04:38:40+00:00","article_modified_time":"2024-08-01T10:33:12+00:00","og_image":[{"width":1140,"height":760,"url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&ssl=1","width":1140,"height":760},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/","name":"Deploying Boundary for secure developer access to your cloud resources - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#primaryimage"},"datePublished":"2024-04-30T04:38:40+00:00","dateModified":"2024-08-01T10:33:12+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"description":"Discover how HashiCorp's Boundary offers secure cloud resource access, replacing VPNs. Deploy it easily for enhanced cloud security.","breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/deploying-boundary-for-secure-developer-access-to-your-cloud-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Deploying Boundary for secure developer access to your cloud resources"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/04\/Blog-156.jpeg?fit=1140%2C760&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=3711"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3711\/revisions"}],"predecessor-version":[{"id":3715,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3711\/revisions\/3715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/3712"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=3711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=3711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=3711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}