{"id":160596,"date":"2019-01-31T03:57:49","date_gmt":"2019-01-31T03:57:49","guid":{"rendered":"https:\/\/webkul.com\/blog\/?p=160596"},"modified":"2019-02-12T04:45:12","modified_gmt":"2019-02-12T04:45:12","slug":"types-of-authentication-wiz-oauth-digest-basic-token-based","status":"publish","type":"post","link":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/","title":{"rendered":"Types of authentication wiz. oauth, digest, basic, token-based ."},"content":{"rendered":"<p>Hello Everyone, today I am going to explain some important authentication types that are most commonly used nowadays.<\/p>\n<p>But before starting with the types, Here is the most basic definition of authentication-<\/p>\n<p><em>Authentication is the process by which the system decides, whether the one who is trying to access it has the permission to access the system or not. It does not determine what tasks the individual can do or what files the individual can see but, identifies and verifies who the person or system is.<\/em><\/p>\n<p>Now, here are some important and most basic authentication types-<\/p>\n<h2><strong>OAuth Authentication<\/strong><\/h2>\n<p>OAuth is an open authentication protocol, which allows accessing the resources of the resource owner by enabling the client applications on HTTP services such as Facebook, GitHub, etc. It allows sharing of resources stored on one site to another site without using their credentials. It uses username and password tokens instead.<\/p>\n<p>Basically, there are three parties involved: oAuth Provider, OAuth Client,\u00a0and Owner.<\/p>\n<p>oAuth Client (Application Which wants to access your credential)<br \/>\noAuth Provider (eg. facebook, twitter&#8230;)<br \/>\nOwner (the person with facebook,twitter.. account )<\/p>\n<div id=\"attachment_162017\" style=\"width: 581px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-162017\" class=\"wp-image-162017 size-full\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png\" alt=\"OAuth type authenticatoin\" width=\"571\" height=\"332\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png 571w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication-250x145.png 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication-300x174.png 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" loading=\"lazy\" \/><p id=\"caption-attachment-162017\" class=\"wp-caption-text\">FIg. OAuth type authentication<\/p><\/div>\n<p>Here is a diagram that depicts OAuth type authentication in a simple way-<\/p>\n<p>OAuth gives the Client the flexibility to choose which specific resources the client wants to use in its application.<\/p>\n<p>for example, if the Provider is Facebook, then the\u00a0client\u00a0can choose from the &#8216;messages&#8217;,\u00a0 &#8216;notifications&#8217;, &#8216;wall posts&#8217; etc. to be used in its application.<\/p>\n<h2><strong>Digest Authentication<\/strong><\/h2>\n<p>This type of authentication is intended to replace unencrypted HTTP basic access authentication. It is not, however, intended to replace strong authentication protocols, such as public-key or Kerberos authentication.<\/p>\n<p>Digest authentication is a method of\u00a0authentication\u00a0in which a request from a potential user is received by a\u00a0network\u00a0server\u00a0and then sent to a\u00a0domain controller. The domain controller sends a special\u00a0key, called a <strong>digest session key<\/strong>, to the server that received the original request. The user must then produce a response, which is encrypted and transmitted to the server. If the user&#8217;s response is of the correct form, the server grants the user access to the network,\u00a0Web site\u00a0or requested resources for a single\u00a0session.<\/p>\n<p>However, there is a disadvantage of this authentication,\u00a0<em>digest access authentication provides no mechanism for clients to verify the server&#8217;s identity.<\/em><\/p>\n<h2><strong>Basic Authentication<\/strong><\/h2>\n<p>Next one in the list is <strong>Basic type authentication<\/strong>. In this, The server sends back a header stating that it requires\u00a0<b>authentication<\/b>\u00a0for a given realm. The user provides the username and password, which the browser concatenates (username + &#8220;:&#8221; + password), and base64 encodes. This encoded string is then sent using\u00a0 &#8220;<strong>Authorization<\/strong>&#8220;-header on each request from the browser.<\/p>\n<p>Following Image will help you understand the basic flow used in Basic type Authentication-<\/p>\n<div id=\"attachment_162021\" style=\"width: 438px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-162021\" class=\"wp-image-162021 size-full\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/basic-auth.gif\" alt=\"Basic-authentication\" width=\"428\" height=\"231\" loading=\"lazy\" \/><p id=\"caption-attachment-162021\" class=\"wp-caption-text\">Fig. Basic-authentication<\/p><\/div>\n<p>It is <em>relatively a simple protocol<\/em> and is <em>supported by all the major browsers<\/em>. However, there are some drawbacks in using this type of authentication &#8211;<\/p>\n<ul>\n<li class=\"\"><em>User credentials are sent in the request.<\/em><\/li>\n<li class=\"\"><em>Credentials are sent as plaintext.<\/em><\/li>\n<li class=\"\"><em>Credentials are sent with every request.<\/em><\/li>\n<li><em>No way to log out, except by ending the browser session.<\/em><\/li>\n<li class=\"\"><em>Vulnerable to cross-site request forgery (CSRF); requires anti-CSRF measures.<\/em><\/li>\n<\/ul>\n<p>These drawbacks make\u00a0it a bit insecure as compared to the other types of Authentication.<\/p>\n<h2>Token Based Authentication<\/h2>\n<p>Token-based authentication involves<em> the issue of an access token<\/em> at the time of authentication. This token can be in different forms compatible with the ecosystem being used in. The client can enter their username and password in order to obtain an access token. The client keeps this token and sends it across with every request to the server. While processing every individual request from the client, the server doesn\u2019t know that the client is already authenticated &#8211; because HTTP is stateless &#8211; and so checks the token sent along and ascertains that the client is already authenticated and so provides access to the resources being requested.<\/p>\n<p>Following fig will show the basic structure of a TOken Based Authentication-<\/p>\n<div id=\"attachment_162018\" style=\"width: 784px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-162018\" class=\"size-full wp-image-162018\" src=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Token_based_authorization.png\" alt=\"Token Based authentication\" width=\"774\" height=\"263\" srcset=\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Token_based_authorization.png 774w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Token_based_authorization-250x85.png 250w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Token_based_authorization-300x102.png 300w, https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Token_based_authorization-768x261.png 768w\" sizes=\"(max-width: 774px) 100vw, 774px\" loading=\"lazy\" \/><p id=\"caption-attachment-162018\" class=\"wp-caption-text\">Fig. Token Based Authentication.<\/p><\/div>\n<p>Token-based authentication systems work well in a web API environment where most applications are available via their APIs. And so tokens can be used to obtain access to multiple services and applications across domains at once without worrying about the single domain policy.<\/p>\n<p>It is comparatively faster and secure because the token is encrypted and is digitally signed.<\/p>\n<p>So this is all for now.<\/p>\n<p>Hope this will help to understand the basics of the authentication types mentioned above. \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello Everyone, today I am going to explain some important authentication types that are most commonly used nowadays. But before starting with the types, Here is the most basic definition of authentication- Authentication is the process by which the system decides, whether the one who is trying to access it has the permission to access <a href=\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":167,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[8121,8125,8122,8124,8123],"class_list":["post-160596","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-authentication","tag-basic-authentication","tag-digest-authentication","tag-oauth-authentication","tag-token-based"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Types of authentication wiz. oauth, digest, basic, token-based . - Webkul Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of authentication wiz. oauth, digest, basic, token-based . - Webkul Blog\" \/>\n<meta property=\"og:description\" content=\"Hello Everyone, today I am going to explain some important authentication types that are most commonly used nowadays. But before starting with the types, Here is the most basic definition of authentication- Authentication is the process by which the system decides, whether the one who is trying to access it has the permission to access [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\" \/>\n<meta property=\"og:site_name\" content=\"Webkul Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webkul\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-31T03:57:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-12T04:45:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png\" \/>\n<meta name=\"author\" content=\"Hemant Jain\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webkul\" \/>\n<meta name=\"twitter:site\" content=\"@webkul\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hemant Jain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\"},\"author\":{\"name\":\"Hemant Jain\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/a824ac6c5c14d32569263100b85f47c6\"},\"headline\":\"Types of authentication wiz. oauth, digest, basic, token-based .\",\"datePublished\":\"2019-01-31T03:57:49+00:00\",\"dateModified\":\"2019-02-12T04:45:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\"},\"wordCount\":772,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png\",\"keywords\":[\"authentication\",\"basic authentication\",\"digest authentication\",\"oAuth authentication\",\"token-based\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\",\"url\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\",\"name\":\"Types of authentication wiz. oauth, digest, basic, token-based . - Webkul Blog\",\"isPartOf\":{\"@id\":\"https:\/\/webkul.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png\",\"datePublished\":\"2019-01-31T03:57:49+00:00\",\"dateModified\":\"2019-02-12T04:45:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png\",\"width\":571,\"height\":332},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Types of authentication wiz. oauth, digest, basic, token-based .\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webkul.com\/blog\/#website\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"name\":\"Webkul Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/webkul.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webkul.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webkul.com\/blog\/#organization\",\"name\":\"WebKul Software Private Limited\",\"url\":\"https:\/\/webkul.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"contentUrl\":\"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png\",\"width\":380,\"height\":380,\"caption\":\"WebKul Software Private Limited\"},\"image\":{\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webkul\/\",\"https:\/\/x.com\/webkul\",\"https:\/\/www.instagram.com\/webkul\/\",\"https:\/\/www.linkedin.com\/company\/webkul\",\"https:\/\/www.youtube.com\/user\/webkul\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/a824ac6c5c14d32569263100b85f47c6\",\"name\":\"Hemant Jain\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/184358b1c25c580a3e32952605156294dedfff2b8b75bdb2a719c8e6a5d318b6?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/184358b1c25c580a3e32952605156294dedfff2b8b75bdb2a719c8e6a5d318b6?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g\",\"caption\":\"Hemant Jain\"},\"url\":\"https:\/\/webkul.com\/blog\/author\/hemant-jain591\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Types of authentication wiz. oauth, digest, basic, token-based . - Webkul Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/","og_locale":"en_US","og_type":"article","og_title":"Types of authentication wiz. oauth, digest, basic, token-based . - Webkul Blog","og_description":"Hello Everyone, today I am going to explain some important authentication types that are most commonly used nowadays. But before starting with the types, Here is the most basic definition of authentication- Authentication is the process by which the system decides, whether the one who is trying to access it has the permission to access [...]","og_url":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/","og_site_name":"Webkul Blog","article_publisher":"https:\/\/www.facebook.com\/webkul\/","article_published_time":"2019-01-31T03:57:49+00:00","article_modified_time":"2019-02-12T04:45:12+00:00","og_image":[{"url":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png","type":"","width":"","height":""}],"author":"Hemant Jain","twitter_card":"summary_large_image","twitter_creator":"@webkul","twitter_site":"@webkul","twitter_misc":{"Written by":"Hemant Jain","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#article","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/"},"author":{"name":"Hemant Jain","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/a824ac6c5c14d32569263100b85f47c6"},"headline":"Types of authentication wiz. oauth, digest, basic, token-based .","datePublished":"2019-01-31T03:57:49+00:00","dateModified":"2019-02-12T04:45:12+00:00","mainEntityOfPage":{"@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/"},"wordCount":772,"commentCount":0,"publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"image":{"@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage"},"thumbnailUrl":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png","keywords":["authentication","basic authentication","digest authentication","oAuth authentication","token-based"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/","url":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/","name":"Types of authentication wiz. oauth, digest, basic, token-based . - Webkul Blog","isPartOf":{"@id":"https:\/\/webkul.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage"},"image":{"@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage"},"thumbnailUrl":"https:\/\/webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png","datePublished":"2019-01-31T03:57:49+00:00","dateModified":"2019-02-12T04:45:12+00:00","breadcrumb":{"@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#primaryimage","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2019\/01\/Oauth-Authentication.png","width":571,"height":332},{"@type":"BreadcrumbList","@id":"https:\/\/webkul.com\/blog\/types-of-authentication-wiz-oauth-digest-basic-token-based\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Types of authentication wiz. oauth, digest, basic, token-based ."}]},{"@type":"WebSite","@id":"https:\/\/webkul.com\/blog\/#website","url":"https:\/\/webkul.com\/blog\/","name":"Webkul Blog","description":"","publisher":{"@id":"https:\/\/webkul.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webkul.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webkul.com\/blog\/#organization","name":"WebKul Software Private Limited","url":"https:\/\/webkul.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","contentUrl":"https:\/\/cdnblog.webkul.com\/blog\/wp-content\/uploads\/2021\/08\/webkul-logo-accent-sq.png","width":380,"height":380,"caption":"WebKul Software Private Limited"},"image":{"@id":"https:\/\/webkul.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webkul\/","https:\/\/x.com\/webkul","https:\/\/www.instagram.com\/webkul\/","https:\/\/www.linkedin.com\/company\/webkul","https:\/\/www.youtube.com\/user\/webkul\/"]},{"@type":"Person","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/a824ac6c5c14d32569263100b85f47c6","name":"Hemant Jain","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/184358b1c25c580a3e32952605156294dedfff2b8b75bdb2a719c8e6a5d318b6?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/184358b1c25c580a3e32952605156294dedfff2b8b75bdb2a719c8e6a5d318b6?s=96&d=https%3A%2F%2Fcdnblog.webkul.com%2Fblog%2Fwp-content%2Fuploads%2F2019%2F10%2Fmike.png&r=g","caption":"Hemant Jain"},"url":"https:\/\/webkul.com\/blog\/author\/hemant-jain591\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/160596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/users\/167"}],"replies":[{"embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/comments?post=160596"}],"version-history":[{"count":8,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/160596\/revisions"}],"predecessor-version":[{"id":162022,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/posts\/160596\/revisions\/162022"}],"wp:attachment":[{"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/media?parent=160596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/categories?post=160596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webkul.com\/blog\/wp-json\/wp\/v2\/tags?post=160596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}