{"id":13238,"date":"2022-02-17T08:01:00","date_gmt":"2022-02-17T07:01:00","guid":{"rendered":"https:\/\/contabo.com\/blog\/?p=13238"},"modified":"2023-05-15T02:42:42","modified_gmt":"2023-05-15T00:42:42","slug":"how-to-use-ssh-keys-with-your-server","status":"publish","type":"post","link":"https:\/\/contabo.com\/blog\/how-to-use-ssh-keys-with-your-server\/","title":{"rendered":"How to Use SSH Keys with Your Server"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"630\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg\" alt=\"ssh keys cover\" class=\"wp-image-13266\" srcset=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg 1200w, https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys-600x315.jpg 600w, https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys-768x403.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p>Simply password-protecting your Linux server no longer cuts it (they&#8217;re vulnerable to online and offline brute force and dictionary attacks, and people historically are terrible with maintaining secure password practices): you have to secure it with SSH keys. This tutorial will teach you what are SSH keys and how to replace the default Linux password authentication with SSH key-based authentication. <br><br>Note that I use a <a href=\"https:\/\/contabo.com\/en\/vps\/\">Contabo VPS<\/a> in this tutorial, but this guide applies to any virtual server from any other provider. Also, I&#8217;ve included both a step-by-step video guide and written tutorial.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-ssh-keys\">What are SSH Keys?<\/h2>\n\n\n\n<p>SSH keys are an abbreviation of Secure Shell keys. <a href=\"https:\/\/ylonen.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cybersecurity researcher Tatu Yl\u00f6nen<\/a> created SSH in 1995, and they now come with every Unix, Linux, and Mac computer. They&#8217;re also available for every platform, and are a critical part of all cloud infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-use-ssh-keys-for-vps-video-tutorial\">How to Use SSH Keys for VPS Video Tutorial<\/h2>\n\n\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/WyZWMIA4XUA\" allowfullscreen=\"allowfullscreen\" width=\"800\" height=\"450\" frameborder=\"0\"><\/iframe><\/p>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-should-i-use-ssh-keys-instead-of-passwords\">Why Should I Use SSH Keys Instead of Passwords?<\/h2>\n\n\n\n<p>&#8220;Real deal Holyfield&#8221; hackers can crack your server&#8217;s password well before you finish skimming this sentence (PSA: always use a password manager like <a href=\"https:\/\/contabo.com\/blog\/bitwarden-self-hosting-vps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitwarden<\/a> to keep your passwords secure). Hackers can use tried-and-true brute force attacks to get into your server, or other, more sophisticated methods.<br><br>Now, we&#8217;re not here to lecture you on security hygiene or best practices (you&#8217;re more than welcome to read scaremongering articles that have the eyeroll-inducing stock photo of a &#8220;hacker in a hoodie&#8221;). But, we do want to emphasize that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ssh-keygen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">SSH keys<\/a> are the way to go for securing your server because much longer and more complex than any password could be. And unlike passwords, SSH keys aren&#8217;t sent to the server. You do have to protect your SSH key with a passphrase, though.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-generate-ssh-keys\">How to Generate SSH Keys<\/h2>\n\n\n\n<p>SSH uses pre-generated public and private keys (hence it being called a SSH key pair). These public and private keys are formed through asymmetric key cryptography, and they&#8217;re stored for future use. As a best practice, we recommend generating new keys for new devices (it&#8217;s more secure), but it does require re-establishing trust relationships.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-authenticate-ssh-keys\">How to Authenticate SSH Keys<\/h2>\n\n\n\n<p>The public key is saved on your server, while the private key is saved on your computer. If you try to log in to your server, the server will generate a random string and encrypt it using the public key. You can decrypt the string using the private key (this is the only way to decrypt the string).<\/p>\n\n\n\n<p>The server then sends this encrypted string to your computer. Your computer will decrypt it with the private key and send the decrypted string back to the server. You can access your server if the decrypted string from your computer matches the original string from the server.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-generate-ssh-keys-for-linux\">How to Generate SSH Keys for Linux<\/h2>\n\n\n\n<p>Open a terminal and enter the following command to generate a pair of keys (assuming your local computer runs Linux):<br><code>ssh-keygen -t rsa<\/code><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Note: you might need to choose a filename and file save destination depending on your version of Linux.<\/p>\n\n\n\n<p>And here&#8217;s the default path for the saved keys:<\/p>\n\n\n\n<p><strong>\/root\/.ssh<\/strong><\/p>\n\n\n\n<p>While id_rsa is your private key, id_rsa.pub is your public key.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-generate-ssh-keys-for-windows\">How to Generate SSH Keys for Windows<\/h2>\n\n\n\n<p>If your local computer runs Windows, we recommend installing <a href=\"https:\/\/www.putty.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">PuTTY<\/a>, the free and open source SSH and terminal emulator (it also includes PuTTYgen).<\/p>\n\n\n\n<p>After installing PuTTY, open the Windows search bar and search for &#8220;PuTTYgen&#8221;.<\/p>\n\n\n\n<p>After opening it, this screen will appear:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"471\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Puttygenerator.png\" alt=\"Use the PuTTY Key Generator to generate SSH keys for Windows.\" class=\"wp-image-13240\"\/><figcaption class=\"wp-element-caption\">The PuTTY Key Generator in all its SSH key generating glory.<\/figcaption><\/figure>\n\n\n\n<p>Just click on \u201cGenerate\u201d and move your mouse over the blank field.<\/p>\n\n\n\n<p>Your keys will then generate:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"471\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/PuTTY-generator-II.png\" alt=\"PuTTY key generator for Windows can create SSH keys using the RSA, DSA, ECDSA, ED25519, and SSH-1 (RSA) algorithms.\" class=\"wp-image-13242\"\/><figcaption class=\"wp-element-caption\">Look at that public key! It&#8217;s so public (and hopefully safe).<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-add-a-comment-to-existing-public-and-private-keys-optional\">How to Add a Comment to Existing Public and Private Keys (Optional)<\/h3>\n\n\n\n<p>You can add comments to a SSH key by typing in a space after the key and putting in the comment. And if you consult the <a href=\"http:\/\/man.he.net\/man5\/authorized_keys\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BSD System Manager&#8217;s manual<\/a>, you&#8217;ll see that lines starting with # are treated as comments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-assign-a-key-passphrase-optional-but-recommended\">How to Assign a Key Passphrase (Optional, but Recommended)<\/h3>\n\n\n\n<p>Assigning a key passphrase will enhance the private key&#8217;s security by locally encrypting (and decrypting) your private key. You&#8217;ll need to enter your key passphrase whenever you connect to your server (the key passphrase acts as another layer of security to connect to your server \u2013 almost like 2FA).<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-upload-ssh-public-keys-to-your-server\">How to Upload SSH Public Keys to Your Server<\/h2>\n\n\n\n<p>You&#8217;ll need to upload the public key to your server after you created the key pair. You can upload the public key through FTP or the server console.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-upload-public-key-via-ftp\">Upload Public Key via FTP<\/h3>\n\n\n\n<p>If you want to upload your public key using FTP, start your FTP program and connect to your server as root. Create the following directory in the root-directory: <\/p>\n\n\n\n<p><strong>.ssh<\/strong><\/p>\n\n\n\n<p>Now create the authorized_keys text file in this folder and paste the whole public key into it. Now save the file.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-upload-public-key-via-console\">Upload Public Key via Console<\/h3>\n\n\n\n<p>Log yourself in via SSH as root. With this command you can create the right directory and switch to it at the same time:<br><code>mkdir \/root\/.ssh &amp;&amp; cd \/root\/.ssh<\/code><\/p>\n\n\n\n<p>Now create and open the authorized_keys text file with this command:<br><code>nano authorized_keys<\/code><\/p>\n\n\n\n<p>Paste in your whole public key and save the file by pressing [CTRL+O]. To exit the editor use [CTRL+X]<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-use-your-ssh-private-key-with-putty\">How to Use Your SSH Private Key with PuTTY:<\/h2>\n\n\n\n<p>After you\u2019ve created a key pair consisting of a private key and a public key and after uploading your public key to your server you need to insert your private key into PuTTY.<\/p>\n\n\n\n<p>To do so open PuTTY.<\/p>\n\n\n\n<p>Under &#8220;Category&#8221; on the left-hand side, you&#8217;ll find a list of categories like &#8220;Window&#8221; and &#8220;Connection. Follow these four steps to select your private key: <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-click-connection-to-expand\">1: Click &#8220;Connection&#8221; to expand.<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-click-next-to-ssh\">2: Click &#8220;[+]&#8221; next to &#8220;SSH&#8221;.<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-click-auth-to-open-a-window-on-the-right-hand-side\">3: Click &#8220;Auth&#8221; to open a window on the right-hand side<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-click-browse-to-select-your-private-key\">4: Click &#8220;Browse&#8221; to select your private key<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"474\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/PuTTY-settings.png\" alt=\"Follow these four steps to select your private key via the PuTTY key generator.\" class=\"wp-image-13244\"\/><figcaption class=\"wp-element-caption\">You can select your private key via the PuTTY key generator in four steps.<\/figcaption><\/figure>\n\n\n\n<p>Now scroll up on the left list and click on <strong>Session<\/strong>.<\/p>\n\n\n\n<p>Enter your server\u2019s IP-Address and choose a profile name in the <strong>Saved Sessions<\/strong> field.<\/p>\n\n\n\n<p>Save your profile by clicking on the<strong> Save<\/strong>-Button.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"495\" height=\"480\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/PuTTY-settings-II.png\" alt=\"PuTTY settings 2\" class=\"wp-image-13246\"\/><\/figure>\n\n\n\n<p>Now you\u2019ve created a profile in PuTTY with your private key.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-use-your-ssh-private-key-with-pageant\">How to use your SSH Private Key with Pageant:<\/h2>\n\n\n\n<p>Alternative to inserting your Private Key into PuTTY you can use Pageant.<\/p>\n\n\n\n<p>Pageant is an SSH-Agent, which comes with PuTTY.<\/p>\n\n\n\n<p>With this program it\u2019s even easier to use Private Keys to connect to your server.<\/p>\n\n\n\n<p>If you use Pageant you don\u2019t need to type in your Passphrase over and over again, in case you secured your Private Key with a Passphrase.<\/p>\n\n\n\n<p>To get started, search for Pageant in the Windows Search Bar. After executing this program, it will appear in the Windows Systemtray:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"281\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/SSH-keys-pagent.png\" alt=\"Starting pageant\" class=\"wp-image-13262\"\/><\/figure>\n\n\n\n<p>To import a Private Key into Pageant, right-click the Pagent-Icon and click on \u201c<strong>Add Key<\/strong>\u201d.<\/p>\n\n\n\n<p>The file explorer will open and you need to select your Private Key. If you decided to secure your Private Key with a Passphrase, you will be asked to enter it.<\/p>\n\n\n\n<p>Now you can just login to your Server without getting prompted to enter your Passphrase everytime you start an SSH connection.<\/p>\n\n\n\n<p>Note: You need to import your Private Key again after rebooting your local computer.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-testing-ssh-key-authentication-and-disabling-password-authentication\">Testing SSH Key Authentication and Disabling Password Authentication:<\/h2>\n\n\n\n<p>After you\u2019ve successfully generated a key-pair, uploaded your public-key on the server and created a PuTTY-Profile with your private-key it\u2019s now time to test if your new login method is working.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-testing-ssh-key-authentication\">Testing SSH Key Authentication<\/h3>\n\n\n\n<p>To test if your new authentication method is working just login to your server using the PuTTY profile you\u2019ve just created. After double-clicking on the profile, a console will open prompting you to enter your username which is usually <strong>root<\/strong>.<\/p>\n\n\n\n<p>After entering the username and confirming it by pressing [Enter] you will be logged in. Besides that, the following message will appear during the login process: <strong>\u201cAuthenticating with public key &lt;key comment&gt;\u201d<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-disabling-password-authentication\">Disabling Password Authentication<\/h3>\n\n\n\n<p>The reason behind choosing ssh-key authentication as your login method is server security. Therefore, it\u2019s logical to disable password authentication now.<\/p>\n\n\n\n<p>To do so open the sshd_config with this command:<br><code>nano \/etc\/ssh\/sshd_config<\/code><\/p>\n\n\n\n<p>Now set the following values to \u201c<strong>no<\/strong>\u201d:<\/p>\n\n\n\n<p><strong>ChallengeResponseAuthentication<\/strong><\/p>\n\n\n\n<p><strong>PasswordAuthentication<\/strong><\/p>\n\n\n\n<p><strong>UsePAM<\/strong><\/p>\n\n\n\n<p>To avoid scrolling through the whole config to find the values that need to be changed you can open a search-field by pressing [CTRL+W]. Enter the name of the value and press enter.<\/p>\n\n\n\n<p>If it happens that some values are commented out by a # in front of it, just remove it.<\/p>\n\n\n\n<p>Save your changes with [CTRL+O] and close the editor with [CTRL+X]<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-removing-ssh-key-authentication-and-re-enabling-password-authentication\">Removing SSH Key Authentication and Re-enabling Password Authentication:<\/h2>\n\n\n\n<p>If you want to go back to password authentication all you need to do is setting the values in the sshd_config back to \u201cyes\u201d.<\/p>\n\n\n\n<p>After this delete the .ssh folder and its content with:<br><code>rm -R \/root\/.ssh<\/code><\/p>\n\n\n\n<p>Restart the ssh service with this command:<br><code>systemctl restart ssh<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simply password-protecting your Linux server no longer cuts it (they&#8217;re vulnerable to online and offline brute force and dictionary attacks, and people historically are terrible with maintaining secure password practices): you have to secure it with SSH keys. This tutorial will teach you what are SSH keys and how to replace the default Linux password [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":13266,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[18],"tags":[],"ppma_author":[1491],"class_list":["post-13238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials"],"uagb_featured_image_src":{"full":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg",1200,630,false],"thumbnail":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys-150x150.jpg",150,150,true],"medium":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys-600x315.jpg",600,315,true],"medium_large":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys-768x403.jpg",768,403,true],"large":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg",1200,630,false],"1536x1536":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg",1200,630,false],"2048x2048":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg",1200,630,false]},"uagb_author_info":{"display_name":"Tobias Mildenberger","author_link":"https:\/\/contabo.com\/blog\/author\/tobias\/"},"uagb_comment_info":0,"uagb_excerpt":"Simply password-protecting your Linux server no longer cuts it (they&#8217;re vulnerable to online and offline brute force and dictionary attacks, and people historically are terrible with maintaining secure password practices): you have to secure it with SSH keys. This tutorial will teach you what are SSH keys and how to replace the default Linux password&hellip;","authors":[{"term_id":1491,"user_id":50,"is_guest":0,"slug":"tobias","display_name":"Tobias Mildenberger","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/077178d5dce6c3d4c0c0396857a7e544bfdf8adf04145fff5160b33a22e28b1f?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts\/13238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/comments?post=13238"}],"version-history":[{"count":2,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts\/13238\/revisions"}],"predecessor-version":[{"id":17032,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts\/13238\/revisions\/17032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/media\/13266"}],"wp:attachment":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/media?parent=13238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/categories?post=13238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/tags?post=13238"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=13238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}