{"id":3248,"date":"2025-09-24T06:30:45","date_gmt":"2025-09-24T06:30:45","guid":{"rendered":"https:\/\/www.devopssupport.in\/blog\/?p=3248"},"modified":"2025-09-24T06:30:46","modified_gmt":"2025-09-24T06:30:46","slug":"key-differences-and-concepts-openid-connect-oauth-2-0-and-saml","status":"publish","type":"post","link":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/","title":{"rendered":"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML"},"content":{"rendered":"\n<p>In today\u2019s interconnected digital world, authentication and authorization are essential for securing web applications and services. When users access a service, proper validation of their identity (authentication) and determining their level of access (authorization) is critical. OpenID Connect, OAuth 2.0, and SAML are three popular protocols used to manage these processes.<\/p>\n\n\n\n<p>This blog post will break down these protocols, compare them, and explain why they\u2019re important for modern identity management systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is OpenID Connect?<\/strong><\/h3>\n\n\n\n<p>OpenID Connect (OIDC) is an identity layer built on top of the OAuth 2.0 protocol. It provides a simple, secure way for applications to authenticate users, allowing them to log in with their existing accounts from identity providers (IDPs) such as Google, Facebook, or Microsoft.<\/p>\n\n\n\n<p>OpenID Connect works by using OAuth 2.0 for authorization and adds authentication capabilities. It uses <strong>ID tokens<\/strong>, which are cryptographically signed pieces of data containing user identity details, to securely confirm the identity of the user.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features of OpenID Connect:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Built on top of OAuth 2.0, it leverages OAuth&#8217;s authorization capabilities for authentication.<\/li>\n\n\n\n<li>It supports Single Sign-On (SSO), allowing users to log in once and access multiple applications.<\/li>\n\n\n\n<li>OIDC provides a standard set of scopes and claims to retrieve user information like email, name, and profile.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is OAuth 2.0?<\/strong><\/h3>\n\n\n\n<p>OAuth 2.0 is an authorization framework that allows third-party applications to access a user&#8217;s resources without needing to share their credentials. This is done by granting <strong>access tokens<\/strong>, which are short-lived credentials that permit access to specific parts of the user\u2019s data.<\/p>\n\n\n\n<p>OAuth 2.0 is commonly used for granting permissions between applications in scenarios such as allowing a music streaming service to access your contacts or enabling a photo-sharing app to access your cloud storage.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features of OAuth 2.0:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It doesn&#8217;t authenticate users; it only authorizes access to resources.<\/li>\n\n\n\n<li>OAuth 2.0 supports various types of grants (authorization code, implicit, resource owner password credentials, and client credentials).<\/li>\n\n\n\n<li>It allows third-party apps to request access without knowing the user\u2019s login credentials.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is SAML?<\/strong><\/h3>\n\n\n\n<p>Security Assertion Markup Language (SAML) is an XML-based framework used for exchanging authentication and authorization data between an identity provider (IDP) and a service provider (SP). It\u2019s primarily used for Single Sign-On (SSO) in enterprise environments, allowing users to log in once to access multiple applications without re-authenticating.<\/p>\n\n\n\n<p>Unlike OAuth 2.0 and OpenID Connect, which are more commonly used for web-based apps, SAML is often seen in older systems and corporate environments.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features of SAML:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It\u2019s an XML-based standard used for exchanging authentication and authorization data.<\/li>\n\n\n\n<li>It\u2019s widely used in enterprise settings for SSO across a range of applications.<\/li>\n\n\n\n<li>SAML assertions (i.e., XML documents) contain authentication information about the user, such as whether they have logged in and their role within the organization.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Differences Between OAuth 2.0, OpenID Connect, and SAML<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Feature<\/strong><\/th><th><strong>OAuth 2.0<\/strong><\/th><th><strong>OpenID Connect<\/strong><\/th><th><strong>SAML<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>Protocol Type<\/strong><\/td><td>Authorization Framework<\/td><td>Authentication Layer on top of OAuth 2.0<\/td><td>Authentication &amp; Authorization Framework<\/td><\/tr><tr><td><strong>Used For<\/strong><\/td><td>Granting access to resources<\/td><td>Authentication and SSO<\/td><td>Authentication and SSO<\/td><\/tr><tr><td><strong>Token Format<\/strong><\/td><td>Access Token<\/td><td>ID Token (JWT) and Access Token<\/td><td>SAML Assertion (XML)<\/td><\/tr><tr><td><strong>Authentication<\/strong><\/td><td>No<\/td><td>Yes (via OAuth)<\/td><td>Yes<\/td><\/tr><tr><td><strong>Authorization<\/strong><\/td><td>Yes<\/td><td>Yes (via OAuth)<\/td><td>Yes<\/td><\/tr><tr><td><strong>Common Use Case<\/strong><\/td><td>API Authorization<\/td><td>Web-based Single Sign-On (SSO)<\/td><td>Enterprise and Federated SSO<\/td><\/tr><tr><td><strong>Format of Messages<\/strong><\/td><td>JSON<\/td><td>JSON<\/td><td>XML<\/td><\/tr><tr><td><strong>Standardization Body<\/strong><\/td><td>IETF (Internet Engineering Task Force)<\/td><td>OpenID Foundation<\/td><td>OASIS (Organization for the Advancement of Structured Information Standards)<\/td><\/tr><tr><td><strong>Mobile and Web Use<\/strong><\/td><td>Common in mobile apps and APIs<\/td><td>Common in mobile apps and web applications<\/td><td>Common in enterprise applications<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is Authentication and Authorization?<\/strong><\/h3>\n\n\n\n<p><strong>Authentication<\/strong> and <strong>Authorization<\/strong> are two critical concepts in identity management.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authentication<\/strong> is the process of verifying a user\u2019s identity, confirming that they are who they claim to be. This is typically done by asking for credentials like usernames, passwords, or biometric data (fingerprints, facial recognition).<\/li>\n\n\n\n<li><strong>Authorization<\/strong>, on the other hand, determines what an authenticated user is allowed to do or access. Once a user\u2019s identity is authenticated, the system uses authorization to check whether the user has the necessary permissions to access a specific resource or perform a certain action.<\/li>\n<\/ul>\n\n\n\n<p>To summarize:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authentication<\/strong> answers the question: &#8220;Who are you?&#8221;<\/li>\n\n\n\n<li><strong>Authorization<\/strong> answers the question: &#8220;What can you do?&#8221;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why OAuth 2.0 Cannot Do Authentication<\/strong><\/h3>\n\n\n\n<p>OAuth 2.0 is an <strong>authorization protocol<\/strong>, not an <strong>authentication protocol<\/strong>. It is designed to allow third-party applications to access specific user resources (e.g., contacts, photos, etc.) but does not concern itself with confirming a user&#8217;s identity.<\/p>\n\n\n\n<p>OAuth 2.0 provides <strong>access tokens<\/strong> that grant permissions for a third-party service to interact with a user\u2019s resources. However, it does not return any information about the user\u2019s identity, such as their name, email, or other personal details. To authenticate a user, you need an identity layer, such as OpenID Connect, which can confirm that a person is who they say they are.<\/p>\n\n\n\n<p>Without an identity layer, OAuth 2.0 cannot ensure that the user accessing a service is actually the one they claim to be. This is why OAuth 2.0 is often paired with OpenID Connect to provide both authentication (user identity verification) and authorization (resource access permissions).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is the Difference Between SAML and OpenID Connect?<\/strong><\/h3>\n\n\n\n<p>While both <strong>SAML<\/strong> and <strong>OpenID Connect<\/strong> are used for <strong>Single Sign-On (SSO)<\/strong>, they differ significantly in the following ways:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. <strong>Technology Stack<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAML<\/strong> is an XML-based standard, often used in older, enterprise environments. It works well for web applications but may be more cumbersome to implement in modern, mobile-first systems.<\/li>\n\n\n\n<li><strong>OpenID Connect<\/strong> is built on top of OAuth 2.0 and uses <strong>JSON Web Tokens (JWT)<\/strong> for token-based authentication, making it lighter and more modern, especially for web and mobile applications.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">2. <strong>Ease of Use and Flexibility<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAML<\/strong> is generally more complex to implement due to its reliance on XML. It often requires heavy lifting in terms of integration and configuration.<\/li>\n\n\n\n<li><strong>OpenID Connect<\/strong> is easier to implement, as it uses modern web technologies (JSON, JWT, REST) and is more suitable for cloud-based and mobile applications.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">3. <strong>Target Audience<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAML<\/strong> is more commonly used in <strong>enterprise<\/strong> environments with <strong>legacy systems<\/strong> requiring federated identity management.<\/li>\n\n\n\n<li><strong>OpenID Connect<\/strong> is designed for the <strong>modern web and mobile<\/strong> applications, supporting OAuth 2.0 and more commonly used for services like Google, Facebook, and Microsoft account logins.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h3>\n\n\n\n<p>Understanding the differences between OpenID Connect, OAuth 2.0, and SAML is crucial for anyone working in identity and access management (IAM). Each protocol serves a different purpose, and understanding their roles can help you design secure, scalable, and efficient authentication and authorization systems for web and mobile applications.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OAuth 2.0<\/strong> is great for authorizing third-party applications to access user resources, but it lacks authentication capabilities.<\/li>\n\n\n\n<li><strong>OpenID Connect<\/strong> is a modern solution for authentication and authorization, built on top of OAuth 2.0.<\/li>\n\n\n\n<li><strong>SAML<\/strong> remains a robust solution in enterprise settings for federated SSO, but it can be more complex and less flexible than OpenID Connect.<\/li>\n<\/ul>\n\n\n\n<p>Each protocol has its place, and knowing when and how to use them will ensure that your application is secure and provides the best user experience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s interconnected digital world, authentication and authorization are essential for securing web applications and services. When users access a service, proper validation of their identity (authentication)&#8230; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3248","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML - DevOps Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML - DevOps Support\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s interconnected digital world, authentication and authorization are essential for securing web applications and services. When users access a service, proper validation of their identity (authentication)...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOps Support\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T06:30:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T06:30:46+00:00\" \/>\n<meta name=\"author\" content=\"Avinash kumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Avinash kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\"},\"author\":{\"name\":\"Avinash kumar\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347\"},\"headline\":\"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML\",\"datePublished\":\"2025-09-24T06:30:45+00:00\",\"dateModified\":\"2025-09-24T06:30:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\"},\"wordCount\":1164,\"commentCount\":0,\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\",\"url\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\",\"name\":\"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML - DevOps Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#website\"},\"datePublished\":\"2025-09-24T06:30:45+00:00\",\"dateModified\":\"2025-09-24T06:30:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.devopssupport.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#website\",\"url\":\"https:\/\/www.devopssupport.in\/blog\/\",\"name\":\"DevOps Support\",\"description\":\"DevOps Support | DevSecOps Support | SRE Support | MLOps SRE Support\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.devopssupport.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347\",\"name\":\"Avinash kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g\",\"caption\":\"Avinash kumar\"},\"sameAs\":[\"www.linkedin.com\/in\/avinash-kumar-150791240\"],\"url\":\"https:\/\/www.devopssupport.in\/blog\/author\/avinash\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML - DevOps Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/","og_locale":"en_US","og_type":"article","og_title":"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML - DevOps Support","og_description":"In today\u2019s interconnected digital world, authentication and authorization are essential for securing web applications and services. When users access a service, proper validation of their identity (authentication)...","og_url":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/","og_site_name":"DevOps Support","article_published_time":"2025-09-24T06:30:45+00:00","article_modified_time":"2025-09-24T06:30:46+00:00","author":"Avinash kumar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Avinash kumar","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#article","isPartOf":{"@id":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/"},"author":{"name":"Avinash kumar","@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347"},"headline":"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML","datePublished":"2025-09-24T06:30:45+00:00","dateModified":"2025-09-24T06:30:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/"},"wordCount":1164,"commentCount":0,"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/","url":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/","name":"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML - DevOps Support","isPartOf":{"@id":"https:\/\/www.devopssupport.in\/blog\/#website"},"datePublished":"2025-09-24T06:30:45+00:00","dateModified":"2025-09-24T06:30:46+00:00","author":{"@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347"},"breadcrumb":{"@id":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.devopssupport.in\/blog\/key-differences-and-concepts-openid-connect-oauth-2-0-and-saml\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.devopssupport.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Key Differences and Concepts: OpenID Connect, OAuth 2.0, and SAML"}]},{"@type":"WebSite","@id":"https:\/\/www.devopssupport.in\/blog\/#website","url":"https:\/\/www.devopssupport.in\/blog\/","name":"DevOps Support","description":"DevOps Support | DevSecOps Support | SRE Support | MLOps SRE Support","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.devopssupport.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/ee29c62455ded10b2424fb9ca585e347","name":"Avinash kumar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.devopssupport.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db01f522798b98f8f474a1dfdd200df1c0e7ada232088d7a8192e14919e4de0a?s=96&d=mm&r=g","caption":"Avinash kumar"},"sameAs":["www.linkedin.com\/in\/avinash-kumar-150791240"],"url":"https:\/\/www.devopssupport.in\/blog\/author\/avinash\/"}]}},"_links":{"self":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts\/3248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/comments?post=3248"}],"version-history":[{"count":2,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts\/3248\/revisions"}],"predecessor-version":[{"id":3250,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/posts\/3248\/revisions\/3250"}],"wp:attachment":[{"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/media?parent=3248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/categories?post=3248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopssupport.in\/blog\/wp-json\/wp\/v2\/tags?post=3248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}