{"id":235,"date":"0215-03-31T18:28:47","date_gmt":"0215-03-31T18:28:47","guid":{"rendered":"https:\/\/www.securekloud.com\/blog\/?p=235"},"modified":"2025-07-28T06:48:10","modified_gmt":"2025-07-28T06:48:10","slug":"eziam-on-premise-and-cloud-connectivity-options","status":"publish","type":"post","link":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/","title":{"rendered":"EzIAM: Your Perfect Ally to Track Cloud Identity Management"},"content":{"rendered":"<p>For an enterprise, a key decision factor in selecting a good Cloud Identity Management service, is the ability of the service to connect to on-premise &amp; cloud endpoints. Enterprises normally have User data stored in their endpoints. User data would range from the groups (segregation of users into a classification needed for the endpoint) the user belongs to, to the roles(a classification that allows the user to perform a particular function in that endpoint when the user is part of that classification) of the user and access privileges(permission levels to access resources) for that particular endpoint.<\/p>\n<p>The same user in an enterprise, can have different types of access, can perform different roles and can be part of different groups in different endpoints. We normally witness the fact that, once the number of endpoints grows in an enterprise this User data &amp; the related objects like groups and roles become unmanageable and untraceable. Enterprise want to have this problem fixed.<\/p>\n<p>Any enterprise would love to know what types of access each user has in each of the endpoints at a given point in time. It would be key for them to have this information in one central place. Having this data in a single location, would help enterprise managers to look out for improper access, redundant roles in each of the endpoints on a periodic basis.<\/p>\n<p>EzIAM<sup>TM<\/sup> (a Cloud Identity Management Service from SecureKloud Inc.) offers something called a provisioning directory, where relevant data (User, groups, roles) from the endpoints can be stored and accessed by the enterprise administrator. (Please refer to my previous blog \u2013 EzIAM FAQ \u2013 to know about the origins and capabilities of EzIAM<sup>TM<\/sup>). This data can then be imported to an Identity Access Governance Service, that would then analyze the roles, groups &amp; access permissions during periodic certification campaigns conducted by the business managers. That can be a topic for a future blog. Now, let us dwelve into the various facets of endpoint connectivity options available within EzIAM<sup>TM<\/sup>.<\/p>\n<p><strong>EndPoints:<\/strong><\/p>\n<p>Endpoints are Directories, databases, LDAPs, applications, OS user stores etc. Almost any endpoint in an enterprise would have a data store where the users of that particular endpoint would be stored. Sometimes the endpoint themselves could be applications, in which case there would be an application database where the user information would be stored. Almost any system that contains user information could act as an endpoint for EzIAM<sup>TM<\/sup>. The endpoints could reside either on-premise or in a cloud.<\/p>\n<p>Typically, an endpoint is a specific installation of a platform or application, such as Active Directory or Microsoft Exchange, which communicates with Identity Management to synchronize information (primarily attributes of a user stored in the endpoint). An endpoint can be:<\/p>\n<p>\u25a0 An operating system (such as Windows)<br \/>\n\u25a0 A security product that protects an operating system (such as CA Top Secret and CA ACF2)<br \/>\n\u25a0 An authentication server that creates, supplies, and manages user credentials (such as CA Arcot)<br \/>\n\u25a0 A business application (such as SAP, Oracle Applications, and PeopleSoft)<br \/>\n\u25a0 A cloud application (such as Salesforce and Google Apps)<\/p>\n<p><strong>Connectors:<\/strong><\/p>\n<p>A connector is the software that enables communication between EzIAM<sup>TM<\/sup>&nbsp;and an endpoint system. A connector server (an EzIAM<sup>TM<\/sup>&nbsp;Server Component) uses a connector to manage an endpoint. One can generate a dynamic connector using Connector Xpress (an EzIAM Tool), or one can develop a custom static connector in Java. For each endpoint that you want to manage, you must have a connector. Connectors are responsible for representing each of the managed objects in the endpoint in a consistent manner. Connectors translate add, modify, delete, rename, and search LDAP operations on those objects into corresponding actions against the endpoint system. A connector acts as a gateway to a native endpoint type system technology. For example, to manage computers running Active Directory Services (ADS) install the ADS connector on a connector server.<\/p>\n<p><strong>Three Types of Connectors:<\/strong><\/p>\n<p>EzIAM<sup>TM<\/sup>&nbsp;has a rich set of On-premise connectivity options. There are 3 primary ways of connecting to endpoints;<\/p>\n<p>C++ Connectors (managed by C++ Connector Server (CCS))<br \/>\nJava Connectors (managed by CA IAM Connector Server (CA IAM CS)).<br \/>\nProvisioning Server Plugins<\/p>\n<p>The endpoints (in the diagram, courtesy: CA) the Connectors connect to range primarily from PeopleSoft, SalesForce (IAM CS) to AD, DB2 (C++ Connector), RACF(Prov. Server Plugin). These are just examples of connectors. A list of out-of-the-box connectors is given in \u201cConnecting to endpoints\u201d sub-section below.<\/p>\n<p>One cannot use both CA IAM CS and CCS to manage the same endpoint type.<\/p>\n<p><strong>What Connectors Can Do:<\/strong><\/p>\n<p>EzIAM<sup>TM<\/sup>&nbsp;has a number of out-of-the-box Connectors that help to connect to popular endpoints. Each connector lets Identity Management within EzIAM<sup>TM<\/sup>, perform the following operations on managed objects on the endpoint:<\/p>\n<p>\u25a0 Add<br \/>\n\u25a0 Modify\u2014Changes the value of attributes, including modifying associations between them (for example, changing which accounts belong to a group).<br \/>\n\u25a0 Delete<br \/>\n\u25a0 Rename<br \/>\n\u25a0 Search\u2014Queries the values of the attributes that are stored for an endpoint system or the managed objects that it contains.<\/p>\n<p>For most endpoint types, all of these operations can be performed on accounts. These operations can also be performed on other managed objects if the endpoint permits it.<\/p>\n<p><strong>Connecting to Endpoints:<\/strong><\/p>\n<p>Popular out-of-the-box Connectors in EzIAM<sup>TM<\/sup>:<br \/>\nCA Access Control Connector<br \/>\nCA ACF2 v2 Connector<br \/>\nCA Arcot Connector<br \/>\nCA DLP Connector<br \/>\nCA SSO Connector for Advanced Policy Server<br \/>\nCA Top Secret Connector<br \/>\nIBM DB2 UDB for z\/OS Connector<br \/>\nGoogle Apps Connector<br \/>\nIBM DB2 UDB Connector<br \/>\nIBM RACF v2 Connector<br \/>\nKerberos Connector<br \/>\nLotus Domino Connector<br \/>\nMicrosoft Active Directory Services Connector<br \/>\nMicrosoft Exchange Connector<br \/>\nMicrosoft Office 365 Connector<br \/>\nMicrosoft SQL Server Connector<br \/>\nMicrosoft Windows Connector<br \/>\nOracle Applications Connector<br \/>\nOracle Connector<br \/>\nIBM i5\/OS (OS\/400) Connector<br \/>\nPeopleSoft Connector<br \/>\nRSA ACE (SecurID) Connector<br \/>\nRSA Authentication Manager SecurID 7 Connector<br \/>\nSalesforce.com Connector<br \/>\nSAP R\/3 Connector<br \/>\nSAP UME Connector<br \/>\nSiebel Connector<br \/>\nUNIX ETC and NIS Connector<\/p>\n<p><strong>Ways to Create a New Connector:<\/strong><\/p>\n<p>One can connect to an endpoint that is not supported out-of-the-box in EzIAM<sup>TM<\/sup>, also. To do this, an enterprise needs to create its own connector in one of these ways:<\/p>\n<p>\u25a0 Use Connector Xpress to create the connector.<br \/>\n\u25a0 Use the CA IAM CS SDK to create the connector.<br \/>\n\u25a0 Ask SecureKloud to create a connector.<\/p>\n<p><strong>Set Up Identity Management Provisioning with Active Directory:<\/strong><\/p>\n<p>One can use Active Directory Server (ADS) to synchronize attribute data to supported endpoints. This could be done by configuring CA IAM CS to propagate local changes in Active Directory to a cloud-based identity store using a connector. For example, assume that you have a GoogleApps installation in the cloud. You could create an ADS group named \u201cGoogleApps\u201d and then configure the CA IAM CS to monitor that group. CA IAM CS synchronizes any changes to the GoogleApps environment in the cloud. If you add a user to the ADS GoogleApps group, CA IAM CS uses the GoogleApps connector to trigger a \u201cCreate User\u201d action in the GoogleApps environment proper.<\/p>\n<p>To set up directory synchronization:<br \/>\n1. Install CA IAM CS in your environment.<br \/>\n2. Acquire the endpoints that you want to synchronize with. You must acquire endpoints in order to create templates in step 4.<br \/>\n3. Create one or more directory monitors. Monitors capture changes that you make in your local Active Directory, and report them for the synchronization.<br \/>\n4. Create one or more synchronization templates. Templates control settings for the directory synchronization.<\/p>\n<p><strong>Custom Connectors:<\/strong><\/p>\n<p>Custom Connectors are connectors that can be programmed (mostly from pre-available template structures) that enables an enterprise to connect to custom endpoints (i.e endpoints that are not supported out-of-the-box in EzIAM<sup>TM<\/sup>).<\/p>\n<p><strong>Custom Connector Implementation Guidelines:<\/strong><\/p>\n<p>It would help the developers to consider the following guidelines when designing and implementing a connector:<\/p>\n<p>\u25a0 Drive as much of the connector implementation logic as possible using metadata.<br \/>\n\u25a0 Write code that takes advantage of the service provided by the CA IAM CS framework, like pluggable validators and converters, and connection pooling support classes.<br \/>\n\u25a0 Write custom connector code to address any additional specific coding requirements.<\/p>\n<p>In summary, connection to endpoints is a critical aspect of modern Cloud Identity Management systems. The crucial Connector properties to look for from your Cloud Identity Management system would be,<\/p>\n<ul>\n<li style=\"font-weight: 400;\">the efficiency of the connectors that would dictate the speed of data transfer between the endpoint and the Corporate user store<\/li>\n<li style=\"font-weight: 400;\">the synchronization of attributes between the endpoint and the store (strong synchronization vs weak synchronization)<\/li>\n<li style=\"font-weight: 400;\">the customization aspects of the connector (connector pool size, reverse synchronization from the endpoint to the Corporate Store etc.)<\/li>\n<li style=\"font-weight: 400;\">the Validators and Convertors of datatypes (from endpoint to Directory) that the connectors offer<\/li>\n<li style=\"font-weight: 400;\">the range of endpoints that the connectors could connect to ranging from AD, LDAP, DBs, Web Services (SOAP and REST-based) to custom endpoints with custom schema &amp; metadata<\/li>\n<\/ul>\n<p>EzIAM<sup>TM<\/sup>&nbsp;is an ideal candidate in this regard as it has a rich set of on-premise and cloud connectivity options. It has all the ideal connector properties that an enterprise would need to connect to their favourite endpoints.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For an enterprise, a key decision factor in selecting a good Cloud Identity Management service, is the ability of the service to connect to on-premise &amp; cloud endpoints. Enterprises normally have User data stored in their endpoints. User data would range from the groups (segregation of users into a classification needed for the endpoint) the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[40],"tags":[],"class_list":["post-235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-access-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>EziAM On Premise and Cloud Connectivity Options Guide<\/title>\n<meta name=\"description\" content=\"Learn how eZIAM bridges on-premise and cloud systems with secure identity access, enabling seamless hybrid connectivity and user management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EziAM On Premise and Cloud Connectivity Options Guide\" \/>\n<meta property=\"og:description\" content=\"Learn how eZIAM bridges on-premise and cloud systems with secure identity access, enabling seamless hybrid connectivity and user management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\" \/>\n<meta property=\"og:site_name\" content=\"SecureKloud\" \/>\n<meta property=\"article:published_time\" content=\"0215-03-31T18:28:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T06:48:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/eziam-on-premise-and-cloud-connectivity-options_v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joe Arputhan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joe Arputhan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\"},\"author\":{\"name\":\"Joe Arputhan\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708\"},\"headline\":\"EzIAM: Your Perfect Ally to Track Cloud Identity Management\",\"datePublished\":\"0215-03-31T18:28:47+00:00\",\"dateModified\":\"2025-07-28T06:48:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\"},\"wordCount\":1487,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"articleSection\":[\"Identity Access Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\",\"name\":\"EziAM On Premise and Cloud Connectivity Options Guide\",\"isPartOf\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\"},\"datePublished\":\"0215-03-31T18:28:47+00:00\",\"dateModified\":\"2025-07-28T06:48:10+00:00\",\"description\":\"Learn how eZIAM bridges on-premise and cloud systems with secure identity access, enabling seamless hybrid connectivity and user management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securekloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EzIAM: Your Perfect Ally to Track Cloud Identity Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#website\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"name\":\"SecureKloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#organization\",\"name\":\"SecureKloud\",\"url\":\"https:\/\/www.securekloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png\",\"width\":240,\"height\":48,\"caption\":\"SecureKloud\"},\"image\":{\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708\",\"name\":\"Joe Arputhan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg\",\"caption\":\"Joe Arputhan\"},\"description\":\"Writer, researcher, content marketing evangelist, cloud and blockchain enthusiast.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/joe-arputhan-68b90523\/\"],\"url\":\"https:\/\/www.securekloud.com\/blog\/author\/joe-arputhan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EziAM On Premise and Cloud Connectivity Options Guide","description":"Learn how eZIAM bridges on-premise and cloud systems with secure identity access, enabling seamless hybrid connectivity and user management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/","og_locale":"en_US","og_type":"article","og_title":"EziAM On Premise and Cloud Connectivity Options Guide","og_description":"Learn how eZIAM bridges on-premise and cloud systems with secure identity access, enabling seamless hybrid connectivity and user management.","og_url":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/","og_site_name":"SecureKloud","article_published_time":"0215-03-31T18:28:47+00:00","article_modified_time":"2025-07-28T06:48:10+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2021\/04\/eziam-on-premise-and-cloud-connectivity-options_v1.jpg","type":"image\/jpeg"}],"author":"Joe Arputhan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Joe Arputhan","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#article","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/"},"author":{"name":"Joe Arputhan","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708"},"headline":"EzIAM: Your Perfect Ally to Track Cloud Identity Management","datePublished":"0215-03-31T18:28:47+00:00","dateModified":"2025-07-28T06:48:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/"},"wordCount":1487,"commentCount":0,"publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"articleSection":["Identity Access Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/","url":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/","name":"EziAM On Premise and Cloud Connectivity Options Guide","isPartOf":{"@id":"https:\/\/www.securekloud.com\/blog\/#website"},"datePublished":"0215-03-31T18:28:47+00:00","dateModified":"2025-07-28T06:48:10+00:00","description":"Learn how eZIAM bridges on-premise and cloud systems with secure identity access, enabling seamless hybrid connectivity and user management.","breadcrumb":{"@id":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securekloud.com\/blog\/eziam-on-premise-and-cloud-connectivity-options\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securekloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"EzIAM: Your Perfect Ally to Track Cloud Identity Management"}]},{"@type":"WebSite","@id":"https:\/\/www.securekloud.com\/blog\/#website","url":"https:\/\/www.securekloud.com\/blog\/","name":"SecureKloud","description":"","publisher":{"@id":"https:\/\/www.securekloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securekloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securekloud.com\/blog\/#organization","name":"SecureKloud","url":"https:\/\/www.securekloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/03\/header-logo.png","width":240,"height":48,"caption":"SecureKloud"},"image":{"@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/de22247532aa8172abce3df9a1b12708","name":"Joe Arputhan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securekloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg","contentUrl":"https:\/\/www.securekloud.com\/blog\/wp-content\/uploads\/2023\/04\/joe-arputhan-150x150.jpg","caption":"Joe Arputhan"},"description":"Writer, researcher, content marketing evangelist, cloud and blockchain enthusiast.","sameAs":["https:\/\/www.linkedin.com\/in\/joe-arputhan-68b90523\/"],"url":"https:\/\/www.securekloud.com\/blog\/author\/joe-arputhan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/comments?post=235"}],"version-history":[{"count":3,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/235\/revisions"}],"predecessor-version":[{"id":1053,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/posts\/235\/revisions\/1053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media\/236"}],"wp:attachment":[{"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/media?parent=235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/categories?post=235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securekloud.com\/blog\/wp-json\/wp\/v2\/tags?post=235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}