{"id":27046,"date":"2022-02-01T15:35:00","date_gmt":"2022-02-01T20:35:00","guid":{"rendered":"https:\/\/colombiainteligente.org\/?p=27046"},"modified":"2023-01-19T15:37:17","modified_gmt":"2023-01-19T20:37:17","slug":"identity-and-access-management-idam","status":"publish","type":"post","link":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/identity-and-access-management-idam\/","title":{"rendered":"Identity and Access Management (IdAM)\u00a0"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"27046\" class=\"elementor elementor-27046\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-87c6aa2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"87c6aa2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-558bb819\" data-id=\"558bb819\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3067325c elementor-widget elementor-widget-text-editor\" data-id=\"3067325c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Muchas empresas de servicios p\u00fablicos tienen sistemas de gesti\u00f3n de identidades y accesos (IdAM) separados para acceder a los sistemas de tecnolog\u00eda de la informaci\u00f3n (TI) y de tecnolog\u00eda operativa (OT), subestaciones y equipos. A falta de un sistema central para gestionar el acceso a todos los recursos cr\u00edticos, las compa\u00f1\u00edas el\u00e9ctricas se exponen a riesgos de seguridad.\u00a0<\/p><p>The NCCoE developed an example solution that electric utilities can use to centrally manage access to the networked devices and facilities on which power generation, transmission, and distribution depend. Our solution uses commercially available products to demonstrate a converged IdAM platform. This platform provides a comprehensive view of users across all the entity\u2019s business and utility operation silos, and the access rights granted those users.<\/p><p>Para Mayor informacion ingrese a los siguientes enlaces:<\/p><p><a href=\"https:\/\/www.nccoe.nist.gov\/energy\/identity-and-access-management-idam\">https:\/\/www.nccoe.nist.gov\/energy\/identity-and-access-management-idam<\/a><\/p><p><a href=\"https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/legacy-files\/es-idam-sp1800-2.pdf\">https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/legacy-files\/es-idam-sp1800-2.pdf<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div style=\"text-align:center\" class=\"yasr-auto-insert-visitor\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Muchas empresas de servicios p\u00fablicos tienen sistemas de gesti\u00f3n de identidades y accesos (IdAM) separados para acceder a los sistemas de tecnolog\u00eda de la informaci\u00f3n (TI) y de tecnolog\u00eda operativa (OT), subestaciones y equipos. A falta de un sistema central para gestionar el acceso a todos los recursos cr\u00edticos, las compa\u00f1\u00edas el\u00e9ctricas se exponen a riesgos de seguridad. <\/p>","protected":false},"author":27,"featured_media":27047,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[55,53],"tags":[],"class_list":["post-27046","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalizacion","category-tendencias"],"yasr_visitor_votes":{"number_of_votes":0,"sum_votes":0,"stars_attributes":{"read_only":false,"span_bottom":false}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity and Access Management (IdAM)\u00a0 - Colombia Inteligente<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/identity-and-access-management-idam\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity and Access Management (IdAM)\u00a0 - Colombia Inteligente\" \/>\n<meta property=\"og:description\" content=\"Muchas empresas de servicios p\u00fablicos tienen sistemas de gesti\u00f3n de identidades y accesos (IdAM) separados para acceder a los sistemas de tecnolog\u00eda de la informaci\u00f3n (TI) y de tecnolog\u00eda operativa (OT), subestaciones y equipos. A falta de un sistema central para gestionar el acceso a todos los recursos cr\u00edticos, las compa\u00f1\u00edas el\u00e9ctricas se exponen a riesgos de seguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/identity-and-access-management-idam\/\" \/>\n<meta property=\"og:site_name\" content=\"Colombia Inteligente\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-01T20:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-19T20:37:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/04-03-_identity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Luisa Buitrago\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:site\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luisa Buitrago\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/\"},\"author\":{\"name\":\"Luisa Buitrago\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/7a8c7be348df0b891a16dc2fe342977d\"},\"headline\":\"Identity and Access Management (IdAM)\u00a0\",\"datePublished\":\"2022-02-01T20:35:00+00:00\",\"dateModified\":\"2023-01-19T20:37:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/\"},\"wordCount\":165,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/04-03-_identity.png\",\"articleSection\":[\"Digitalizaci\u00f3n\",\"Tendencias\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/\",\"name\":\"Identity and Access Management (IdAM)\u00a0 - Colombia Inteligente\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/04-03-_identity.png\",\"datePublished\":\"2022-02-01T20:35:00+00:00\",\"dateModified\":\"2023-01-19T20:37:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/04-03-_identity.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/04-03-_identity.png\",\"width\":300,\"height\":388,\"caption\":\"Identity and Access Management (IdAM)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/identity-and-access-management-idam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/colombiainteligente.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity and Access Management (IdAM)\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"name\":\"Colombia Inteligente\",\"description\":\"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano\",\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/colombiainteligente.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\",\"name\":\"Colombia Inteligente\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"width\":588,\"height\":274,\"caption\":\"Colombia Inteligente\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/colombiaintelig\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/colombiainteligente\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/7a8c7be348df0b891a16dc2fe342977d\",\"name\":\"Luisa Buitrago\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"caption\":\"Luisa Buitrago\"},\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/es_co\\\/author\\\/luisa-buitragocolombiainteligente-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity and Access Management (IdAM)\u00a0 - Colombia Inteligente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/identity-and-access-management-idam\/","og_locale":"es_ES","og_type":"article","og_title":"Identity and Access Management (IdAM)\u00a0 - Colombia Inteligente","og_description":"Muchas empresas de servicios p\u00fablicos tienen sistemas de gesti\u00f3n de identidades y accesos (IdAM) separados para acceder a los sistemas de tecnolog\u00eda de la informaci\u00f3n (TI) y de tecnolog\u00eda operativa (OT), subestaciones y equipos. A falta de un sistema central para gestionar el acceso a todos los recursos cr\u00edticos, las compa\u00f1\u00edas el\u00e9ctricas se exponen a riesgos de seguridad.","og_url":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/identity-and-access-management-idam\/","og_site_name":"Colombia Inteligente","article_published_time":"2022-02-01T20:35:00+00:00","article_modified_time":"2023-01-19T20:37:17+00:00","og_image":[{"width":300,"height":388,"url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/04-03-_identity.png","type":"image\/png"}],"author":"Luisa Buitrago","twitter_card":"summary_large_image","twitter_creator":"@colombiaintelig","twitter_site":"@colombiaintelig","twitter_misc":{"Escrito por":"Luisa Buitrago","Tiempo estimado de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#article","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/"},"author":{"name":"Luisa Buitrago","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/7a8c7be348df0b891a16dc2fe342977d"},"headline":"Identity and Access Management (IdAM)\u00a0","datePublished":"2022-02-01T20:35:00+00:00","dateModified":"2023-01-19T20:37:17+00:00","mainEntityOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/"},"wordCount":165,"commentCount":0,"publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/04-03-_identity.png","articleSection":["Digitalizaci\u00f3n","Tendencias"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/","url":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/","name":"Identity and Access Management (IdAM)\u00a0 - Colombia Inteligente","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#primaryimage"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/04-03-_identity.png","datePublished":"2022-02-01T20:35:00+00:00","dateModified":"2023-01-19T20:37:17+00:00","breadcrumb":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#primaryimage","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/04-03-_identity.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/01\/04-03-_identity.png","width":300,"height":388,"caption":"Identity and Access Management (IdAM)"},{"@type":"BreadcrumbList","@id":"https:\/\/colombiainteligente.org\/tendencias\/identity-and-access-management-idam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/colombiainteligente.org\/"},{"@type":"ListItem","position":2,"name":"Identity and Access Management (IdAM)\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/colombiainteligente.org\/#website","url":"https:\/\/colombiainteligente.org\/","name":"Colombia Inteligente","description":"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano","publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colombiainteligente.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/colombiainteligente.org\/#organization","name":"Colombia Inteligente","url":"https:\/\/colombiainteligente.org\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","width":588,"height":274,"caption":"Colombia Inteligente"},"image":{"@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/colombiaintelig","https:\/\/www.linkedin.com\/company\/colombiainteligente\/"]},{"@type":"Person","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/7a8c7be348df0b891a16dc2fe342977d","name":"Luisa Buitrago","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","caption":"Luisa Buitrago"},"url":"https:\/\/colombiainteligente.org\/es_co\/author\/luisa-buitragocolombiainteligente-org\/"}]}},"_links":{"self":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/27046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/comments?post=27046"}],"version-history":[{"count":5,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/27046\/revisions"}],"predecessor-version":[{"id":27052,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/27046\/revisions\/27052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media\/27047"}],"wp:attachment":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media?parent=27046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/categories?post=27046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/tags?post=27046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}