{"id":2717,"date":"2014-05-21T13:05:04","date_gmt":"2014-05-21T13:05:04","guid":{"rendered":"http:\/\/blog.eginnovations.com\/?p=2717"},"modified":"2022-10-31T09:19:26","modified_gmt":"2022-10-31T13:19:26","slug":"ssl-monitoring-web-applications","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/","title":{"rendered":"SSL Certificates \u2013 Not Just for Web Applications"},"content":{"rendered":"<p style=\"text-align: justify;\">When a client and server communicate, secure socket layer (SSL) ensures that the communication is private and secure by providing authentication, encryption, and integrity checks. A general assumption is that SSL handshake and SSL data transfer only happens between a Web Browser and a Web Server, so SSL Certificates are only required for Web Servers in the overall IT Infrastructure. In reality SSL Certificates can be used for many key applications in an IT infrastructure &#8211; Web servers, Java application servers, databases (Oracle, SQL), Microsoft Active Directory servers and mail servers like Microsoft Exchange can all use SSL.<\/p>\n<p><a style=\"display: block; margin-top: 25px;\" href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2817 size-full aligncenter\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png\" alt=\"SSL monitoring is an important element of internal system security\" width=\"376\" height=\"379\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png 376w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3-150x150.png 150w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3-298x300.png 298w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3-310x312.png 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3-140x141.png 140w\" sizes=\"auto, (max-width: 376px) 100vw, 376px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Isn&#8217;t it Enough to Just Protect the Web Servers using SSL?<\/strong><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl-prevents-hackers4.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2783 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl-prevents-hackers4.jpg\" alt=\"\" width=\"227\" height=\"357\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl-prevents-hackers4.jpg 227w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl-prevents-hackers4-191x300.jpg 191w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl-prevents-hackers4-140x220.jpg 140w\" sizes=\"auto, (max-width: 227px) 100vw, 227px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Application environments have become complex. Many infrastructure tiers are involved in supporting the service and the different tiers communicate with each other to support the service. \u00a0The servers involved could be in different geographic locations. With the increasing use of cloud computing, some of the servers involved may even be hosted on public clouds.<\/p>\n<p style=\"text-align: justify;\">SSL secures all communications between any two servers. If servers are unprotected, hackers could actively eavesdrop all the communications and maybe able to inject new ones. The more security critical the application, the more important it is to protect it with SSL.\u00a0This is the reason why some of the core IT servers \u2013 Web Servers, Java application servers, Database Servers, messaging servers, \u00a0Active Directory servers, and Microsoft Exchange \u2013 are often configured with SSL certificates.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Why protect these services with SSL?<\/strong><\/p>\n<table style=\"font-family: Verdana, sans-serif; font-size: 11px; background: #b9b9b9;\" border=\"0\" width=\"100%\" cellspacing=\"1\" cellpadding=\"6\">\n<tbody>\n<tr style=\"font-size: 12px; font-weight: bold; color: #fdfdfd;\" bgcolor=\"#4096ee\">\n<td style=\"font-size: 12px; font-weight: bold; color: #fdfdfd;\">Services<\/td>\n<td style=\"font-size: 12px; font-weight: bold; color: #fdfdfd;\">Why SSL?<\/td>\n<td>Without SSL<\/td>\n<\/tr>\n<tr>\n<td style=\"font-size: 12px; font-weight: bold; border-right: 5px solid #dfdfdf;\" valign=\"top\" bgcolor=\"dfdfdf\" width=\"100\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/web-server.png\" alt=\"\" width=\"70\" height=\"60\" border=\"0\" \/><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><span style=\"font-size: 12px; font-weight: bold; color: #434343;\">Web Servers<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">SSL ensures secure communication between a browser and a Web Server<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">Hackers can easily steal confidential information &#8211; credit card, PIN, Social Security numbers and other personal information of a customer.<\/td>\n<\/tr>\n<tr>\n<td style=\"border-right: 5px solid #dfdfdf;\" valign=\"top\" bgcolor=\"dfdfdf\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/application-server.png\" alt=\"\" width=\"70\" height=\"60\" border=\"0\" \/><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><span style=\"font-size: 12px; font-weight: bold; color: #434343;\">Application Servers<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">SSL protects access to business logic and secures data access service from application server to other systems and database<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">Unauthorized personal can modify critical data by accessing the database and other systems.<\/td>\n<\/tr>\n<tr>\n<td style=\"border-right: 5px solid #dfdfdf;\" valign=\"top\" bgcolor=\"dfdfdf\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/microsoft_exchange.png\" alt=\"\" width=\"70\" height=\"60\" border=\"0\" \/><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><span style=\"font-size: 12px; font-weight: bold; color: #434343;\">Microsoft Exchange<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">SSL enables emails exchanged between mail client and exchange server to be encrypted and secured<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">Attackers can steal important emails and passwords of key executives.<\/td>\n<\/tr>\n<tr>\n<td style=\"border-right: 5px solid #dfdfdf;\" valign=\"top\" bgcolor=\"dfdfdf\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/active-directory.png\" alt=\"\" width=\"70\" height=\"60\" border=\"0\" \/><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><span style=\"font-size: 12px; font-weight: bold; color: #434343;\">Microsoft Active Directory<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">SSL secures access to user accounts, administrative groups, server accounts and resource accounts stored in Active Directory<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">Active Directory can be compromised and the damage might be a substantial monetary loss or even a serious blow to the reputation of the organization.<\/td>\n<\/tr>\n<tr>\n<td style=\"font-size: 12px; font-weight: bold; border-right: 5px solid #dfdfdf;\" valign=\"top\" bgcolor=\"dfdfdf\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/data-base.png\" alt=\"\" width=\"70\" height=\"60\" border=\"0\" \/><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><span style=\"font-size: 12px; font-weight: bold; color: #434343;\">Databases<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">SSL secures data transfer across the network between instances of databases and other systems of that application environment<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">Hackers can steal critical data stored in the database.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Monitoring SSL Certificates<\/strong><\/p>\n<p style=\"text-align: justify;\">SSL certificates often have a validity period and if ever an SSL certificate becomes invalid, the application that uses it will stop working. So monitoring of SSL certificates is important. The key requirements for SSL certificate monitoring include:<\/p>\n<ul style=\"text-align: justify;\">\n<li>The ability to proactively monitor the validity of all the SSL certificates used by an organization;<\/li>\n<li>Multi-modal alerting capability to alert administrators about impending certificate expiry or validity issues with certificates;<\/li>\n<li>Capability to track and alert about changes to SSL certificates;<\/li>\n<li>The ability to check the legitimacy of a SSL certificate by verifying certificate fingerprint;<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The eG Enterprise performance management system can check SSL certificates used by different applications &#8211; Active Directory, Exchange Server, Web Servers (<a class=\"link\" href=\"https:\/\/www.eginnovations.com\/supported-technologies\/apache-monitoring\">Apache<\/a>, IIS, etc.) and application servers \u2013 Tomcat, WebSphere, WebLogic and GlassFish, and databases \u2013 Oracle, SQL Server, MySQL and others. For more information on how eG Enterprise can ensure the validity and legitimacy of your SSL certificates please read the white paper <a href=\"https:\/\/www.eginnovations.com\/white-paper\/ssl-monitoring\" target=\"_blank\" rel=\"noopener noreferrer\">SSL Certificate Expiry Monitoring and Management<\/a><\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/white-paper\/ssl-monitoring\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2576 size-thumbnail\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/04\/download-whitepaper.png?w=150\" alt=\"Download-Whitepaper\" width=\"150\" height=\"50\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/04\/download-whitepaper.png 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/04\/download-whitepaper-140x47.png 140w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\">Learn more about IT Monitoring Solutions from eG Innovations<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a client and server communicate, secure socket layer (SSL) ensures that the communication is private and secure by providing authentication, encryption, and integrity checks. A general assumption is that SSL handshake and SSL data transfer only happens between a Web Browser and a Web Server, so SSL Certificates are only required for Web Servers [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2817,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[366],"tags":[1544,1538,242,1537,1542,1536,1541,1545,1543],"class_list":["post-2717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-to-end-monitoring-e2e","tag-ssl-ad","tag-ssl-certificate-expiry","tag-ssl-certificate-monitoring","tag-ssl-certificate-monitoring-tool","tag-ssl-certificate-renewal","tag-ssl-certificates","tag-ssl-expiry-alert","tag-ssl-iis","tag-ssl-sql"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SSL Certificates \u2013 Not Just for Web Applications<\/title>\n<meta name=\"description\" content=\"SSL certificates are used to secure all communications between servers. Learn why &amp; how you should protect these systems with an effective monitoring tool.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SSL Certificates \u2013 Not Just for Web Applications | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"SSL secures all communications between any two servers. Learn why and how you should protect these systems with an effective monitoring tool.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-21T13:05:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-31T13:19:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png\" \/>\n<meta name=\"author\" content=\"Arun Srinivas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SSL Certificates \u2013 Not Just for Web Applications | eG Innovations\" \/>\n<meta name=\"twitter:description\" content=\"SSL secures all communications between any two servers. Learn why and how you should protect these systems with an effective monitoring tool.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arun Srinivas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SSL Certificates \u2013 Not Just for Web Applications","description":"SSL certificates are used to secure all communications between servers. Learn why & how you should protect these systems with an effective monitoring tool.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/","og_locale":"en_US","og_type":"article","og_title":"SSL Certificates \u2013 Not Just for Web Applications | eG Innovations","og_description":"SSL secures all communications between any two servers. Learn why and how you should protect these systems with an effective monitoring tool.","og_url":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2014-05-21T13:05:04+00:00","article_modified_time":"2022-10-31T13:19:26+00:00","og_image":[{"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png","type":"","width":"","height":""}],"author":"Arun Srinivas","twitter_card":"summary_large_image","twitter_title":"SSL Certificates \u2013 Not Just for Web Applications | eG Innovations","twitter_description":"SSL secures all communications between any two servers. Learn why and how you should protect these systems with an effective monitoring tool.","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Arun Srinivas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/"},"author":{"name":"Arun Srinivas","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/39cf71f9ec7dc9e40797d8330cf99511"},"headline":"SSL Certificates \u2013 Not Just for Web Applications","datePublished":"2014-05-21T13:05:04+00:00","dateModified":"2022-10-31T13:19:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/"},"wordCount":598,"commentCount":0,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png","keywords":["SSL AD","SSL certificate expiry","SSL Certificate Monitoring","SSL certificate monitoring tool","SSL certificate renewal","SSL certificates","SSL expiry alert","SSL IIS","SSL SQL"],"articleSection":["End-to-End Monitoring (E2E)"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/","url":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/","name":"SSL Certificates \u2013 Not Just for Web Applications","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png","datePublished":"2014-05-21T13:05:04+00:00","dateModified":"2022-10-31T13:19:26+00:00","description":"SSL certificates are used to secure all communications between servers. Learn why & how you should protect these systems with an effective monitoring tool.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/05\/ssl_v3.png","width":376,"height":379,"caption":"Monitoring SSL Certificates"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/ssl-monitoring-web-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SSL Certificates \u2013 Not Just for Web Applications"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/39cf71f9ec7dc9e40797d8330cf99511","name":"Arun Srinivas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89fe8afa3a9cc9ed9c429cbeb02b6959?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89fe8afa3a9cc9ed9c429cbeb02b6959?s=96&d=mm&r=g","caption":"Arun Srinivas"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/arunksrinivas\/"}]}},"modified_by":"Review eG","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/2717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=2717"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/2717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/2817"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=2717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=2717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=2717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}