{"id":22883,"date":"2023-02-23T18:32:22","date_gmt":"2023-02-23T17:32:22","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/?p=22883"},"modified":"2023-06-20T10:25:22","modified_gmt":"2023-06-20T08:25:22","slug":"oracle-tde-part-ii-encrypting-data","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/","title":{"rendered":"Oracle TDE part II : Encrypting Data"},"content":{"rendered":"\n<p><strong>By Mouhamadou Diaw<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>In the first part of this blog, we activate TDE in the database, in this part we will see how we can encrypt data. I am using Oracle 19c for the tests<\/p>\n\n\n\n<p>As specified before TDE will allow encryption at 2 levels<\/p>\n\n\n\n<p>-Tablespace level<\/p>\n\n\n\n<p>-Table column level<\/p>\n\n\n\n<p>TDE will encrypt your data in rest at filesystem level.<\/p>\n\n\n\n<p><strong>Tablespace level<\/strong><\/p>\n\n\n\n<p>A tablespace can be encrypted during its creation.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt;  create tablespace TBS_ENC datafile  size 10m autoextend on maxsize 3G EXTENT MANAGEMENT LOCAL SEGMENT SPACE MANAGEMENT AUTO ENCRYPTION DEFAULT STORAGE (ENCRYPT);\n\nTablespace created.\n\nSQL&gt;\n<\/code><\/pre>\n\n\n\n<p>We can specify the encryption algorithm to use, otherwise the default will be used<\/p>\n\n\n\n<p>You can use dba_tablespaces, v$encrypted_tablespaces for information about encrypted tablespaces<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt; select TABLESPACE_NAME,ENCRYPTED from dba_tablespaces;\n\nTABLESPACE_NAME                ENC\n------------------------------ ---\nSYSTEM                         NO\nSYSAUX                         NO\nUNDOTBS1                       NO\nTEMP                           NO\nUSERS                          NO\nMYTABAA                        NO\nPRODTAB                         NO\nTBS_ENC                        YES\n\n8 rows selected.\n<\/code><\/pre>\n\n\n\n<p>It\u2019s also possible to do an online encryption for existing tablespaces<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt; alter tablespace PRODTAB encryption online  encrypt;\n\nTablespace altered.\n<\/code><\/pre>\n\n\n\n<p>The&nbsp;parameter <code>ENCRYPT_NEW_TABLESPACES<\/code>&nbsp;will allow future tablespaces to be encrypted.<\/p>\n\n\n\n<p><strong>Column table level<\/strong><\/p>\n\n\n\n<p>We can encrypt a column in at the &nbsp;table with creation<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt; create table edge.test_encrypt (id number, name varchar2(30), salary number encrypt);\n\nTable created.\n\nSQL&gt;\n<\/code><\/pre>\n\n\n\n<p>We can add an encrypted column to an existing table<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt; alter table edge.test_encrypt add (idcard varchar(12) encrypt);\n\nTable altered.\n<\/code><\/pre>\n\n\n\n<p>We can transform a non-encrypted column to encrypted one<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt; alter table edge.test_encrypt modify (name  encrypt);\n\nTable altered.\n\nSQL&gt;\n<\/code><\/pre>\n\n\n\n<p>To get information about encrypted column the dba_encrypted_columns can be queried.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SQL&gt; select TABLE_NAME,COLUMN_NAME,ENCRYPTION_ALG from dba_encrypted_columns where OWNER='EDGE';\n\nTABLE_NAME      COLUMN_NAME     ENCRYPTION_ALG\n--------------- --------------- -----------------\nTEST_ENCRYPT    NAME            AES 192 bits key\nTEST_ENCRYPT    SALARY          AES 192 bits key\nTEST_ENCRYPT    IDCARD          AES 192 bits key\n\nSQL&gt;\n\n<\/code><\/pre>\n\n\n\n<p>Note that you can also specify the encryption algorithm if you don\u2019t want to use the default one.<\/p>\n\n\n\n<p><strong>Questions that can be asked<\/strong><\/p>\n\n\n\n<p>-Column vs tablespace encryption<\/p>\n\n\n\n<p>One question may be which encryption level I have to use. There is really no fix answer, it\u2019s depends of your requirements. In the following <a href=\"https:\/\/www.oracle.com\/br\/a\/tech\/docs\/technical-resources\/twp-transparent-data-encryption-bestpractices.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">document<\/a> we have some guidelines<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>CHOOSE TDE COLUMN ENCRYPTION IF \u2026:<\/strong><\/td><td><strong>CHOOSE TDE TABLESPACE ENCRYPTION IF \u2026:<\/strong><\/td><\/tr><tr><td>Location of sensitive information is known<\/td><td>Location of sensitive information is unknown<\/td><\/tr><tr><td>Less than 5% of all application columns are encryption candidates.<\/td><td>Most of the application data is deemed sensitive, or <strong>multiple <\/strong>national and international security and privacy mandates apply to your industry<\/td><\/tr><tr><td>Data type and length is supported by TDE column encryption<\/td><td>Not all data types that hold sensitive information are supported by TDE column encryption<\/td><\/tr><tr><td>Encryption candidates are not foreign-key columns<\/td><td>Encryption candidates are foreign key columns<\/td><\/tr><tr><td>Indexes over encryption candidates are normal B-tree indexes<\/td><td>Indexes of encryption candidates are functional indexes<\/td><\/tr><tr><td>Application does not perform range scans over encrypted data<\/td><td>Application searches for ranges of sensitive data<\/td><\/tr><tr><td>Increase in storage by 1 to 52 bytes per encrypted value<\/td><td>No storage increase acceptable<\/td><\/tr><tr><td>Performance impact depends on percentage of encrypted columns; how often the encrypted values are selected or updated, the size of encrypted data, and other variables.<\/td><td>Constant performance impact below 10%<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>In any case we should know that TDE column encryption has some limitations. Check the <a href=\"https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/19\/asoag\/configuring-transparent-data-encryption.html#GUID-9A78E72B-D9D9-4BA2-BFEF-11C0060B6F91\" target=\"_blank\" rel=\"noreferrer noopener\">documentation<\/a><\/p>\n\n\n\n<p>-Can we remove TDE once activated in the DB<\/p>\n\n\n\n<p>Have a look in this document<\/p>\n\n\n\n<p>The response is definitevely <strong>NO<\/strong><\/p>\n\n\n\n<p>In this document <strong><em>Is it Possible to Remove\/Disable TDE? (Doc ID 2488898.1)<\/em><\/strong> we have following lines<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-small-font-size\"><em>It is not possible to remove TDE once implemented.<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Even if there are no encrypted objects in the database, the TDE wallet has to be present in the wallet location.It does not cause any harm.<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Also, the metadata related to TDE keys cannot be cleaned up from the dictionary manually.<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Deleting the TDE wallet will not disable TDE.&nbsp;Once the TDE wallet is configured, the wallet&nbsp;<strong>should never<\/strong>&nbsp;be deleted or recreated.<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Recreating the wallet using any parameters is&nbsp;<strong>not supported<\/strong>.<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Oracle Support\/Development team&nbsp;<strong>will not<\/strong>&nbsp;help in resolving any issues arising due to such operations.&nbsp;<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>If the wallet or its password is lost, then there is no way to recover the encrypted data.There is no back door, the database has to be recreated.<\/em><\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>We have seen how TDE can help for encrypting data. Just remember that TDE need Oracle Advanced Security.  As disabling TDE is not supported, all daily procedures should be tested before implementation. This include RMAN backup and restore, RMAN duplicate , Data Guard operation &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mouhamadou Diaw In the first part of this blog, we activate TDE in the database, in this part we will see how we can encrypt data. I am using Oracle 19c for the tests As specified before TDE will allow encryption at 2 levels -Tablespace level -Table column level TDE will encrypt your data [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[229,198,59,149],"tags":[1171,2856,2855,25],"type_dbi":[],"class_list":["post-22883","post","type-post","status-publish","format-standard","hentry","category-database-administration-monitoring","category-database-management","category-oracle","category-security","tag-oracle-19c","tag-oracle-tde","tag-oracle-transparent-data-encryption","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Oracle TDE part II : Encrypting Data - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Oracle TDE part II : Encrypting Data\" \/>\n<meta property=\"og:description\" content=\"By Mouhamadou Diaw In the first part of this blog, we activate TDE in the database, in this part we will see how we can encrypt data. I am using Oracle 19c for the tests As specified before TDE will allow encryption at 2 levels -Tablespace level -Table column level TDE will encrypt your data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T17:32:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-20T08:25:22+00:00\" \/>\n<meta name=\"author\" content=\"Oracle Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oracle Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/\"},\"author\":{\"name\":\"Oracle Team\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/66ab87129f2d357f09971bc7936a77ee\"},\"headline\":\"Oracle TDE part II : Encrypting Data\",\"datePublished\":\"2023-02-23T17:32:22+00:00\",\"dateModified\":\"2023-06-20T08:25:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/\"},\"wordCount\":622,\"commentCount\":0,\"keywords\":[\"Oracle 19c\",\"Oracle TDE\",\"oracle transparent data encryption\",\"Security\"],\"articleSection\":[\"Database Administration &amp; Monitoring\",\"Database management\",\"Oracle\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/\",\"name\":\"Oracle TDE part II : Encrypting Data - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\"},\"datePublished\":\"2023-02-23T17:32:22+00:00\",\"dateModified\":\"2023-06-20T08:25:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/66ab87129f2d357f09971bc7936a77ee\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/oracle-tde-part-ii-encrypting-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Oracle TDE part II : Encrypting Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/66ab87129f2d357f09971bc7936a77ee\",\"name\":\"Oracle Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g\",\"caption\":\"Oracle Team\"},\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/author\\\/oracle-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Oracle TDE part II : Encrypting Data - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/","og_locale":"en_US","og_type":"article","og_title":"Oracle TDE part II : Encrypting Data","og_description":"By Mouhamadou Diaw In the first part of this blog, we activate TDE in the database, in this part we will see how we can encrypt data. I am using Oracle 19c for the tests As specified before TDE will allow encryption at 2 levels -Tablespace level -Table column level TDE will encrypt your data [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/","og_site_name":"dbi Blog","article_published_time":"2023-02-23T17:32:22+00:00","article_modified_time":"2023-06-20T08:25:22+00:00","author":"Oracle Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Oracle Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/"},"author":{"name":"Oracle Team","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee"},"headline":"Oracle TDE part II : Encrypting Data","datePublished":"2023-02-23T17:32:22+00:00","dateModified":"2023-06-20T08:25:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/"},"wordCount":622,"commentCount":0,"keywords":["Oracle 19c","Oracle TDE","oracle transparent data encryption","Security"],"articleSection":["Database Administration &amp; Monitoring","Database management","Oracle","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/","url":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/","name":"Oracle TDE part II : Encrypting Data - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"datePublished":"2023-02-23T17:32:22+00:00","dateModified":"2023-06-20T08:25:22+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/oracle-tde-part-ii-encrypting-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Oracle TDE part II : Encrypting Data"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/66ab87129f2d357f09971bc7936a77ee","name":"Oracle Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f711f7cd2c9b09bf2627133755b569fb5be0694810cfd33033bdd095fedba86d?s=96&d=mm&r=g","caption":"Oracle Team"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/oracle-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/22883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=22883"}],"version-history":[{"count":8,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/22883\/revisions"}],"predecessor-version":[{"id":26154,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/22883\/revisions\/26154"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=22883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=22883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=22883"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=22883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}