{"id":5198,"date":"2019-03-25T21:20:37","date_gmt":"2019-03-25T21:20:37","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5198"},"modified":"2021-04-01T21:23:51","modified_gmt":"2021-04-01T20:23:51","slug":"active-directory-password-complexity","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity","title":{"rendered":"Active Directory Password Complexity and Policy"},"content":{"rendered":"<p>enterprise\u2019s cybersecurity\u00a0strategy\u2014each connected device represents an entry point into your network, and protecting those endpoints with\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/do-we-go-overboard-security\" target=\"_blank\" rel=\"noopener\">reasonably strong<\/a>\u00a0passwords is the first reliable line of defense against cyberattacks. AD allows you to enforce set standards for passwords used by employees, requiring them to use a certain number and\/or variety of characters in every password they create.<\/p>\n<p>But getting control over password policies isn\u2019t always the easiest or most intuitive thing for a security professional to do. It may be simple enough to set default protections like \u201cPassword must meet complexity requirements,\u201d but going beyond the default options is harder. Common questions include: What are AD password policy best practices? How do you develop specific permissions and protections for different users or groups of users? How do you get visibility into everyone\u2019s access rights? What is password complexity, and what levels of password complexity are right for which user groups?<\/p>\n<p>No matter how experienced you are in enterprise security, it can be helpful to re-examine the basics to look for steps you can take to better tailor your AD password policy to the needs of your enterprise. Let\u2019s clear up some common misconceptions, go over some AD password policy best practices, and start ensuring that all your users are protected.<\/p>\n<h2 class=\"h3\"><b>How do I disable password policy?<\/b><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg\" alt=\"\" width=\"437\" height=\"216\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Disabling your current password policy rules is straightforward through the Group Policy Objects option in Windows. If your current policy is proving too difficult for users or resulting in a lot of additional help desk calls, you can either edit your policy or disable it entirely with a few simple steps.<\/p>\n<p>In Windows, go to either the Group Policy Management or Active Directory Users console and you\u2019ll see all Group Policy Objects (GPOs) currently linked at the domain level. Find the GPO you use to create and enforce your domain password policy (if you haven\u2019t done this before, it\u2019s likely Default Domain Policy GPO) and right-click it, then click Edit.<\/p>\n<p>Now open Computer Configuration and click Policies, or go directly to Windows Settings. From there, select Security Settings, Account Policies, then Password Policy items. Here you\u2019ll see a GPO Editor with two panes. Find \u201cEnforce password history\u201d in the pane on the right, Type 0 in the text box, then click OK. Do the exact same thing for other policies like \u201cMaximum password age,\u201d \u201cMinimum password age,\u201d and \u201cMinimum password length\u201d policies. Double-click on \u201cPassword must meet complexity requirements\u201d in that same right pane, select Disabled, then click OK.<\/p>\n<h2 class=\"h3\"><b>What are password complexity requirements?<\/b><\/h2>\n<p>Certain kinds of passwords are particularly easy for a\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/seven-ways-to-make-yourself-hard-to-hack\" target=\"_blank\" rel=\"noopener\">dedicated hacker<\/a>\u00a0to obtain because they lack complexity. Complexity is measured according to how difficult it would be for a hacker to guess a user\u2019s password using obvious information like their name, or to break into their account using a brute force attack. A good example of a password complexity requirement is one that ensures all passwords are at least eight characters long.<\/p>\n<p>Complexity requirements must strike a careful balance\u2014they should be stringent enough to ward off all but the most dedicated of cybercriminals, but not so strict that they frustrate users and flood the help desk with calls. It\u2019s best practice to use some form of password complexity requirement. If the default settings on AD are either too strict or not strict enough for your needs, be sure to replace the policy rather than simply disabling it.<\/p>\n<h2 class=\"h3\"><b>What is password complexity in Group Policy Objects?<\/b><\/h2>\n<p>Group Policy Objects represent specific groups of users for whom you can set specific password requirements, in much the same way that you grant different groups of users different levels of access to company assets. Creating more onerous\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/active-directory-password-reset-tool\" target=\"_blank\" rel=\"noopener noreferrer\">Active Directory password<\/a>\u00a0complexity requirements for those users with access to more sensitive information, while asking less of the majority of your users, is a great way to minimize the impact on help centers while protecting your most valuable data.<\/p>\n<p>GPOs allow you to perform a number of functions from a security standpoint, including disabling Local Administrator rights, granting administrative permissions to sole individuals or groups, and disabling outdated protocols like\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/tls-vs-ssl-whats-difference\" target=\"_blank\" rel=\"noopener\">SSLv2<\/a>. It also makes management far easier from a security perspective.<\/p>\n<h2 class=\"h3\"><b>What is the default password policy for AD?<\/b><\/h2>\n<p>For all versions of Windows software since Windows 2000, default Active Directory password complexity requirements are simple: the user can\u2019t use their own name and has to include different types of characters.<\/p>\n<p>First, a user\u2019s password can\u2019t have their Account Name in it, nor their Full Name. Just like \u201cPassword1234,\u201d a password that repeats or slightly modifies your account name is incredibly easy for hackers to guess. This check is overridden if the user\u2019s Account Name or Full Name is less than three characters long. If you have an initial in your Full Name, for example, you won\u2019t be prohibited from using that letter in your password.<\/p>\n<p>Second, passwords have to contain characters from a variety of\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/123456-now-worlds-worst-password\" target=\"_blank\" rel=\"noopener\">different categories<\/a>. These categories include: uppercase letter; lowercase letters; single digits 0-9; special characters like !,&amp;,%,$, or #; and Unicode characters. Under Windows 10\u2019s default password complexity requirements, every password must contain characters from at least three of these categories. This rule, along with the requirement that passwords be at least eight characters long, makes it far harder to break into an account using a\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/brute-force-attack-mitigation-101\" target=\"_blank\" rel=\"noopener\">brute force attack<\/a>. Hackers would have to run through at least 218,340,105,584,896 different possibilities in order to gain a single password.<\/p>\n<h2 class=\"h3\"><b>Automating access<\/b><\/h2>\n<p>If all this strikes you as being a little complicated, that\u2019s because it is. While AD offers plenty of functionalities for determining who should be subject to what restrictions when it comes to password complexity, keeping track of which groups are subject to what policies can quickly become overwhelming. A resource like SolarWinds<sup>\u00ae<\/sup>\u00a0Access Rights Manager can help you improve IT and data security by automating this work.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/access-rights-manager\" target=\"_blank\" rel=\"noopener noreferrer\">Access Rights Manager<\/a>\u00a0is a powerful and intuitive access rights monitoring and access management system for companies of all sizes that offers threat protection from the inside out. We call it security simplified. It clearly displays group memberships from AD and makes it perfectly clear who has access rights to what file servers. You can also monitor, analyze, and audit AD and Group Policy, as Access Rights Manager creates a ledger detailing who made changes to policies and when, simplifying compliance and reducing risk.<\/p>\n<p>Now that you know about Active Directory password policies and the tools you can use to leverage them, you\u2019ve got what you need to ensure your users are secure and that AD password policy best practices are being followed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5198","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Active Directory Password Policy Tips - N-able<\/title>\n<meta name=\"description\" content=\"Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Active Directory Password Policy Tips - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T21:20:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-01T20:23:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Active Directory Password Complexity and Policy\",\"datePublished\":\"2019-03-25T21:20:37+00:00\",\"dateModified\":\"2021-04-01T20:23:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\"},\"wordCount\":1121,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\",\"name\":\"Active Directory Password Policy Tips - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg\",\"datePublished\":\"2019-03-25T21:20:37+00:00\",\"dateModified\":\"2021-04-01T20:23:51+00:00\",\"description\":\"Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Active Directory Password Complexity and Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Active Directory Password Policy Tips - N-able","description":"Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity","og_locale":"es_ES","og_type":"article","og_title":"Active Directory Password Policy Tips - N-able","og_description":"Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.","og_url":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-03-25T21:20:37+00:00","article_modified_time":"2021-04-01T20:23:51+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Active Directory Password Complexity and Policy","datePublished":"2019-03-25T21:20:37+00:00","dateModified":"2021-04-01T20:23:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity"},"wordCount":1121,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg","articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity","url":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity","name":"Active Directory Password Policy Tips - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg","datePublished":"2019-03-25T21:20:37+00:00","dateModified":"2021-04-01T20:23:51+00:00","description":"Learn about Active Directory password policies to ensure your users are secure and AD password policy best practices are being followed.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/password%20blog%20header.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/active-directory-password-complexity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Active Directory Password Complexity and Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5198"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5198\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}