{"id":2027,"date":"2022-04-27T15:23:57","date_gmt":"2022-04-27T22:23:57","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2027"},"modified":"2023-11-07T15:22:07","modified_gmt":"2023-11-07T20:22:07","slug":"public-sector-identity-needs","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","title":{"rendered":"\u0625\u0645\u0643\u0627\u0646\u064a\u0627\u062a \u0627\u0644\u0647\u0648\u064a\u0629 \u0627\u0644\u062a\u064a \u064a\u062d\u062a\u0627\u062c\u0647\u0627 \u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u0639\u0627\u0645 \u0644\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0622\u0645\u0646"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>\u0628\u0627\u0644\u0646\u0633\u0628\u0629 \u0644\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0648\u0643\u0627\u0644\u0627\u062a \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0630\u0627\u062a \u0627\u0644\u0625\u062c\u0631\u0627\u0621\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u0645\u0634\u062f\u062f\u0629 \u0648\u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a \u0627\u0644\u0623\u062e\u0631\u0649 \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0645\u0646 \u0627\u0644\u0646\u0627\u062d\u064a\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629\u060c \u062a\u0639\u062a\u0628\u0631 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0635\u0644\u0628\u0629 \u0627\u0644\u0645\u0639\u064a\u0627\u0631 \u0627\u0644\u0630\u0647\u0628\u064a \u0644\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0627\u0644\u0642\u0648\u064a\u0629. \u064a\u0648\u0641\u0631 ID Plus \u0644\u0647\u0630\u0647 \u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a \u0633\u0647\u0648\u0644\u0629 \u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0631\u0645\u0648\u0632 \u0627\u0644\u0635\u0644\u0628\u0629 \u0641\u064a \u0627\u0644\u0633\u062d\u0627\u0628\u0629\u060c \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0623\u0645\u0627\u0646 MFA \u0639\u0627\u0644\u064a \u0627\u0644\u062a\u0648\u0627\u0641\u0631 \u0627\u0644\u0642\u0627\u0626\u0645 \u0639\u0644\u0649 \u0627\u0644\u062a\u062d\u0648\u064a\u0644 \u0627\u0644\u062a\u0644\u0642\u0627\u0626\u064a. <\/p>","protected":false},"author":6,"featured_media":3325,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-2027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Identity Capabilities the Public Sector Needs to Secure Access - RSA<\/title>\n<meta name=\"description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Identity Capabilities the Public Sector Needs to Secure Access\" \/>\n<meta property=\"og:description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T22:23:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T20:22:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Identity Capabilities the Public Sector Needs to Secure Access\" \/>\n<meta name=\"twitter:description\" content=\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"The Identity Capabilities the Public Sector Needs to Secure Access\",\"datePublished\":\"2022-04-27T22:23:57+00:00\",\"dateModified\":\"2023-11-07T20:22:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"articleSection\":[\"Products and Solutions\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\",\"name\":\"The Identity Capabilities the Public Sector Needs to Secure Access - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"datePublished\":\"2022-04-27T22:23:57+00:00\",\"dateModified\":\"2023-11-07T20:22:07+00:00\",\"description\":\"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Add-a-heading.png\",\"width\":1200,\"height\":675,\"caption\":\"The Identity Capabilities the Public Sector Needs to Secure Access\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/products-and-solutions\\\/public-sector-identity-needs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Identity Capabilities the Public Sector Needs to Secure Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"knowsAbout\":[\"multi-factor authentication\",\"passwordless authentication\",\"identity and access management\",\"identity governance and administration\",\"zero trust\",\"threat detection and response\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0625\u0645\u0643\u0627\u0646\u064a\u0627\u062a \u0627\u0644\u0647\u0648\u064a\u0629 \u0627\u0644\u062a\u064a \u064a\u062d\u062a\u0627\u062c\u0647\u0627 \u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u0639\u0627\u0645 \u0644\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0622\u0645\u0646 - RSA","description":"\u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0642\u062f\u0631\u0627\u062a \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0627\u062c\u0647\u0627 \u0648\u0643\u0627\u0644\u0627\u062a \u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u0639\u0627\u0645 \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","og_locale":"ar_AR","og_type":"article","og_title":"The Identity Capabilities the Public Sector Needs to Secure Access","og_description":"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.","og_url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","og_site_name":"RSA","article_published_time":"2022-04-27T22:23:57+00:00","article_modified_time":"2023-11-07T20:22:07+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"The Identity Capabilities the Public Sector Needs to Secure Access","twitter_description":"Learn the core capabilities that public sector agencies and security-sensitive organizations need to secure access.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"The Identity Capabilities the Public Sector Needs to Secure Access","datePublished":"2022-04-27T22:23:57+00:00","dateModified":"2023-11-07T20:22:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","articleSection":["Products and Solutions"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/","name":"\u0625\u0645\u0643\u0627\u0646\u064a\u0627\u062a \u0627\u0644\u0647\u0648\u064a\u0629 \u0627\u0644\u062a\u064a \u064a\u062d\u062a\u0627\u062c\u0647\u0627 \u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u0639\u0627\u0645 \u0644\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0622\u0645\u0646 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","datePublished":"2022-04-27T22:23:57+00:00","dateModified":"2023-11-07T20:22:07+00:00","description":"\u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u0627\u0644\u0642\u062f\u0631\u0627\u062a \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0627\u062c\u0647\u0627 \u0648\u0643\u0627\u0644\u0627\u062a \u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u0639\u0627\u0645 \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0645\u0646\u064a\u0627\u064b \u0644\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Add-a-heading.png","width":1200,"height":675,"caption":"The Identity Capabilities the Public Sector Needs to Secure Access"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/products-and-solutions\/public-sector-identity-needs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/ar\/"},{"@type":"ListItem","position":2,"name":"The Identity Capabilities the Public Sector Needs to Secure Access"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\u062d\u0644\u0648\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0631\u0642\u0645\u064a\u0629","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"},"knowsAbout":["multi-factor authentication","passwordless authentication","identity and access management","identity governance and administration","zero trust","threat detection and response"]},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"\u0628\u0646 \u0644\u064a\u0628\u0648","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/comments?post=2027"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2027\/revisions"}],"predecessor-version":[{"id":27135,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/2027\/revisions\/27135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media\/3325"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media?parent=2027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/categories?post=2027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/tags?post=2027"}],"curies":[{"name":"\u062f\u0628\u0644\u064a\u0648 \u0628\u064a","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}