{"id":17239,"date":"2026-01-12T19:23:20","date_gmt":"2026-01-12T13:53:20","guid":{"rendered":"https:\/\/www.skynats.com\/?p=17239"},"modified":"2026-01-12T19:23:26","modified_gmt":"2026-01-12T13:53:26","slug":"ssh-two-factor-authentication-2fa-setup-documentation","status":"publish","type":"post","link":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/","title":{"rendered":"SSH Two-Factor Authentication (2FA) Setup Documentation"},"content":{"rendered":"\n<p>Configuring SSH authentication with two factor authentication (2FA) using Google Authenticator for a Linux server. The goal is to enhance security by requiring a second factor for specific users while allowing standard password login for others. The configuration uses PAM (Pluggable Authentication Modules) to manage authentication and SSH server settings to enforce the required login methods.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\" id=\"h-objective\"><strong>Objective<\/strong><\/h2>\n\n\n\n<p>Configure SSH to enable:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Two-Factor Authentication (2FA) using Google Authenticator<\/strong> for a specific user.<\/li>\n\n\n\n<li><strong>Normal password authentication<\/strong> for all other users.<\/li>\n\n\n\n<li>Ensure only <strong>keyboard-interactive<\/strong> + <strong>public key<\/strong> authentication is required for the 2FA user.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\"><strong>Prerequisites<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Linux server with SSH<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\" id=\"h-install-required-packages\"><strong>Install Required Packages<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-small-font-size\">1. Install libpam-google-authenticator package:<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt install libpam-google-authenticator<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading has-small-font-size\">2. Configuring authentication<\/h3>\n\n\n\n<p>The user-specific Google Authenticator secret should be initialized (login as that user and run the command). This generates the QR code or secret key for authenticator app setup.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>google-authenticator<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It will ask you a series of questions, here is a recommended configuration:<\/li>\n\n\n\n<li>Make tokens \u201ctime-base\u201d\u201d: yes<\/li>\n\n\n\n<li>Update the .google_authenticator file: yes<\/li>\n\n\n\n<li>Disallow multiple uses: yes<\/li>\n\n\n\n<li>Increase the original generation time limit: no<\/li>\n\n\n\n<li>Enable rate-limiting: yes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\"><strong>2. PAM Configuration<\/strong><\/h2>\n\n\n\n<p>Open PAM configuration file \/etc\/pam.d\/sshd<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>vim \/etc\/pam.d\/sshd<\/code><\/pre>\n\n\n\n<p>PAM manages authentication policies through following entries. Add them:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># PAM configuration for the Secure Shell service \nauth  required                pam_google_authenticator.so nullok\nauth  sufficient                pam_permit.so\n\n# Standard Un*x authentication.\n@include common-auth<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading has-small-font-size\"><strong>Explanation of each line<\/strong><\/h3>\n\n\n\n<p><strong>auth required pam_google_authenticator.so nullok<\/strong> &#8211; Mandatory if 2FA is desired. nullok makes it optional for users without a 2FA. Remove nullok to <strong>force 2FA<\/strong> for all users.<br><br><strong>auth sufficient pam_permit.so<\/strong> &#8211; Optional. Usually used to allow other auth methods to pass if Google Authenticator is not set up.<br><br><strong>@include common-auth<\/strong> &#8211; Required to allow fallback password authentication for other users. Necessary for normal password login for users not using 2FA. If you <strong>comment it out<\/strong> (#@include common-auth), then <strong>password authentication is skipped<\/strong>, so users who rely on passwords cannot log in.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\"><strong>3. SSH Daemon Configuration<\/strong><\/h2>\n\n\n\n<p>Open SSH configuration file \/etc\/ssh\/sshd_config<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>vim \/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<p>This configuration controls SSH authentication methods.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Match User specificuser\n    KbdInteractiveAuthentication yes\n    AuthenticationMethods publickey,keyboard-interactive<\/code><\/pre>\n\n\n\n<p><strong>Match User specificuser<\/strong> &#8211; Useful to enable 2FA for a specific user while others unaffected.<br><strong>KbdInteractiveAuthentication<\/strong> &#8211; Required for PAM-based 2FA. Must be yes for 2FA.<\/p>\n\n\n\n<p><strong>AuthenticationMethods publickey,keyboard-interactive<\/strong> &#8211; Ensures 2FA is enforced only for this user. Other users will continue to use password authentication if allowed.<br><\/p>\n\n\n\n<p><strong>Restart SSH daemon after changes<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl restart sshd<\/code><\/pre>\n\n\n\n<p><strong>Testing<\/strong><\/p>\n\n\n\n<p>Login as specificuser:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh specificuser@server_ip<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Should prompt for 2FA code.<\/li>\n<\/ul>\n\n\n\n<p>Login as other users:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh otheruser@server_ip<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Should prompt only for password if configured.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\"><strong>4. Example Flow<\/strong><\/h2>\n\n\n\n<p><strong>User specificuser login:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>SSH client sends public key.<\/li>\n\n\n\n<li>Server validates public key.<\/li>\n\n\n\n<li>Server prompts for 2FA code (Google Authenticator).<\/li>\n\n\n\n<li>Access granted only after successful 2FA.<\/li>\n<\/ol>\n\n\n\n<p><strong>Other user login:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>SSH client prompts for password.<\/li>\n\n\n\n<li>Server validates password via common-auth.<\/li>\n\n\n\n<li>Access granted if password correct.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\"><strong>5. Conclusion<\/strong><\/h2>\n\n\n\n<p>This setup enables flexible and secure SSH authentication by combining traditional password-based login with two factor authentication (2FA) using Google Authenticator. this approach provides a balanced security model that enforces strong authentication for sensitive accounts while preserving usability for regular users.<\/p>\n\n\n\n<p>For expert assistance with SSH Two Factor Authentication (2FA) Setup Documentation, get in touch with our experienced support team. We help you securely configure SSH access, reduce unauthorized login risks, and maintain compliance across your infrastructure. With our reliable <a href=\"https:\/\/www.skynats.com\/server-management\/\">server management services<\/a>, you can ensure your servers are properly secured, monitored, and optimized for performance. Contact us today to strengthen your server security with confidence and professional support.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Configuring SSH authentication with two factor authentication (2FA) using Google Authenticator for a Linux server. The goal is to enhance security by requiring a second factor for specific users while allowing standard password login for others. The configuration uses PAM (Pluggable Authentication Modules) to manage authentication and SSH server settings to enforce the required login [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[302,1209],"class_list":["post-17239","post","type-post","status-publish","format-standard","hentry","category-blog","tag-server-management-services","tag-ssh-two-factor-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SSH Two Factor Authentication Setup Guide for Secure Access<\/title>\n<meta name=\"description\" content=\"Enable SSH Two Factor Authentication to secure server access\u2014follow our quick guide and protect your servers today!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SSH Two-Factor Authentication (2FA) Setup Documentation\" \/>\n<meta property=\"og:description\" content=\"Enable SSH Two Factor Authentication to secure server access\u2014follow our quick guide and protect your servers today!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/\" \/>\n<meta property=\"og:site_name\" content=\"Server Management Services | Cloud Management | Skynats\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/skynats\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-12T13:53:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T13:53:26+00:00\" \/>\n<meta name=\"author\" content=\"Jishnu V\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skynatstech\" \/>\n<meta name=\"twitter:site\" content=\"@skynatstech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jishnu V\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/\"},\"author\":{\"name\":\"Jishnu V\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/person\\\/c63611da5e22d216e38d8658e5a605c5\"},\"headline\":\"SSH Two-Factor Authentication (2FA) Setup Documentation\",\"datePublished\":\"2026-01-12T13:53:20+00:00\",\"dateModified\":\"2026-01-12T13:53:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\"},\"keywords\":[\"server management services\",\"SSH Two Factor Authentication\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/\",\"name\":\"SSH Two Factor Authentication Setup Guide for Secure Access\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#website\"},\"datePublished\":\"2026-01-12T13:53:20+00:00\",\"dateModified\":\"2026-01-12T13:53:26+00:00\",\"description\":\"Enable SSH Two Factor Authentication to secure server access\u2014follow our quick guide and protect your servers today!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/ssh-two-factor-authentication-2fa-setup-documentation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SSH Two-Factor Authentication (2FA) Setup Documentation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\",\"name\":\"Server Management Services | Cloud Management | Skynats\",\"description\":\"Server Management and Cloud Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\",\"name\":\"Skynats Technologies\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Sknats-Logo-New-whole.png\",\"contentUrl\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Sknats-Logo-New-whole.png\",\"width\":989,\"height\":367,\"caption\":\"Skynats Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/skynats\",\"https:\\\/\\\/x.com\\\/skynatstech\",\"https:\\\/\\\/www.instagram.com\\\/skynatstech\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/skynats-technologies\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCvTAjrFJ4_E2MJKwlDHomlg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/person\\\/c63611da5e22d216e38d8658e5a605c5\",\"name\":\"Jishnu V\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9fc7882cfbe811c2c069669ed9a43c27a8b4f7e013fc7e9d539199f807dc7ab1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9fc7882cfbe811c2c069669ed9a43c27a8b4f7e013fc7e9d539199f807dc7ab1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9fc7882cfbe811c2c069669ed9a43c27a8b4f7e013fc7e9d539199f807dc7ab1?s=96&d=mm&r=g\",\"caption\":\"Jishnu V\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SSH Two Factor Authentication Setup Guide for Secure Access","description":"Enable SSH Two Factor Authentication to secure server access\u2014follow our quick guide and protect your servers today!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/","og_locale":"en_US","og_type":"article","og_title":"SSH Two-Factor Authentication (2FA) Setup Documentation","og_description":"Enable SSH Two Factor Authentication to secure server access\u2014follow our quick guide and protect your servers today!","og_url":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/","og_site_name":"Server Management Services | Cloud Management | Skynats","article_publisher":"https:\/\/www.facebook.com\/skynats","article_published_time":"2026-01-12T13:53:20+00:00","article_modified_time":"2026-01-12T13:53:26+00:00","author":"Jishnu V","twitter_card":"summary_large_image","twitter_creator":"@skynatstech","twitter_site":"@skynatstech","twitter_misc":{"Written by":"Jishnu V","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/#article","isPartOf":{"@id":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/"},"author":{"name":"Jishnu V","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/person\/c63611da5e22d216e38d8658e5a605c5"},"headline":"SSH Two-Factor Authentication (2FA) Setup Documentation","datePublished":"2026-01-12T13:53:20+00:00","dateModified":"2026-01-12T13:53:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/"},"wordCount":538,"publisher":{"@id":"https:\/\/www.skynats.com\/blog\/#organization"},"keywords":["server management services","SSH Two Factor Authentication"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/","url":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/","name":"SSH Two Factor Authentication Setup Guide for Secure Access","isPartOf":{"@id":"https:\/\/www.skynats.com\/blog\/#website"},"datePublished":"2026-01-12T13:53:20+00:00","dateModified":"2026-01-12T13:53:26+00:00","description":"Enable SSH Two Factor Authentication to secure server access\u2014follow our quick guide and protect your servers today!","breadcrumb":{"@id":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.skynats.com\/blog\/ssh-two-factor-authentication-2fa-setup-documentation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.skynats.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SSH Two-Factor Authentication (2FA) Setup Documentation"}]},{"@type":"WebSite","@id":"https:\/\/www.skynats.com\/blog\/#website","url":"https:\/\/www.skynats.com\/blog\/","name":"Server Management Services | Cloud Management | Skynats","description":"Server Management and Cloud Management","publisher":{"@id":"https:\/\/www.skynats.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.skynats.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.skynats.com\/blog\/#organization","name":"Skynats Technologies","url":"https:\/\/www.skynats.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/08\/Sknats-Logo-New-whole.png","contentUrl":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/08\/Sknats-Logo-New-whole.png","width":989,"height":367,"caption":"Skynats Technologies"},"image":{"@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/skynats","https:\/\/x.com\/skynatstech","https:\/\/www.instagram.com\/skynatstech\/","https:\/\/www.linkedin.com\/company\/skynats-technologies","https:\/\/www.youtube.com\/channel\/UCvTAjrFJ4_E2MJKwlDHomlg"]},{"@type":"Person","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/person\/c63611da5e22d216e38d8658e5a605c5","name":"Jishnu V","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9fc7882cfbe811c2c069669ed9a43c27a8b4f7e013fc7e9d539199f807dc7ab1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9fc7882cfbe811c2c069669ed9a43c27a8b4f7e013fc7e9d539199f807dc7ab1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9fc7882cfbe811c2c069669ed9a43c27a8b4f7e013fc7e9d539199f807dc7ab1?s=96&d=mm&r=g","caption":"Jishnu V"}}]}},"_links":{"self":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/17239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/comments?post=17239"}],"version-history":[{"count":2,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/17239\/revisions"}],"predecessor-version":[{"id":17241,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/17239\/revisions\/17241"}],"wp:attachment":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/media?parent=17239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/categories?post=17239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/tags?post=17239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}