{"id":7215,"date":"2021-05-18T17:27:15","date_gmt":"2021-05-18T20:27:15","guid":{"rendered":"http:\/\/ec2-54-232-63-254.sa-east-1.compute.amazonaws.com\/?p=7215"},"modified":"2021-09-25T10:09:14","modified_gmt":"2021-09-25T13:09:14","slug":"what-is-integrated-authentication-and-how-does-it-work","status":"publish","type":"post","link":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/","title":{"rendered":"What is Integrated Authentication and how does it work?"},"content":{"rendered":"\n<p>A very common scenario nowadays is to have a lot of passwords to access banks, social networks, online stores, Netflix, among thousands of other services. The same applies in the business context, since in our companies we also have to control access credentials for various systems such as email, <a href=\"https:\/\/www.neomind.com.br\/blog\/diferencas-entre-bpm-e-erp\/\" target=\"_blank\" rel=\"noopener noreferrer\">ERP systems,<\/a> <a href=\"https:\/\/www.neomind.com.br\/blog\/checklist-investir-em-ecm\/\" target=\"_blank\" rel=\"noopener noreferrer\">ECM<\/a>, Human Resources, etc. The problem is both for users and for IT administrators who have to manage all these password repositories.<\/p>\n\n\n\n<p>Currently, for the personal context we have several alternatives for password control, such as the Google Chrome password manager, which, when synchronized with our Google user, allows us to store several passwords. In companies, the dream of users and system administrators is to have a single password authenticated in one place (the so-called Single Sign-on) that allows instant access to all the systems in the organization.<\/p>\n\n\n\n<p>To assist in this process there are several <strong>integrated authentication mechanisms<\/strong>, which, as the name implies, integrate with the company various systems and guarantee the user&#8217;s identity without us having to enter it several times.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How do integrated authentication mechanisms work?<\/strong><\/h2>\n\n\n\n<p>Basically these systems work as follows:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The integrated authentication system is configured against a repository of users and passwords, which can be, for example, a password repository of your own or integrated with an Active Directory (repository of users and computers of a Windows domain).<\/li><li>When a user accesses an application (in our example, the company ERP), the application checks whether the user is already logged in. If not, it asks the integrated authentication system &#8220;Which user is logged in?<\/li><li>The integrated authentication system checks whether there is an authenticated user. If not, it requests the user&#8217;s credentials (user and password).<\/li><li>Once the user is logged into the integrated authentication system, it tells the application which user is logged in.<\/li><li>The ERP application in our example receives the user and proceeds to give access to the tool.<\/li><li>In case the user accesses another company application, such as the HR system, this new application repeats step 2. However, since the user is already logged into the system, it goes straight to step 4.<\/li><\/ol>\n\n\n\n<p>We can see that the operation is relatively simple: the user accesses the system, the system accesses the integrated authentication, and the integrated authentication passes the logged-on user to the system (and if necessary, collects the user&#8217;s credentials).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Advantages of integrated authentication<\/strong><\/h2>\n\n\n\n<p>Integrated authentication mechanisms also allow for a number of advantages, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>User-friendly login interface, because the &#8220;login screen&#8221; will always be the same;<\/li><li>Centralized password repository;<\/li><li>Possibility to implement token authentication, multi-factor authentication (with SMS messaging for example) for all applications; and<\/li><li>Implementation of policies (schedules, allowed stations, among others) that affect the routine access to the systems.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Integrated authentication systems and protocols<\/strong><\/h2>\n\n\n\n<p>Here we will mention three:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CAS<\/li><li>SAML<\/li><li>ADFS<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CAS \u2013 Central Authentication Service<\/strong><\/h3>\n\n\n\n<p>This is a single sign-on authentication protocol for the web, allowing users to access multiple applications by entering their credentials only once. It basically follows the script mentioned above: when the client accesses a system that requires authentication, it redirects to the CAS, which authenticates the user and returns the user to the application.<\/p>\n\n\n\n<p>CAS was conceived and developed at YALE University and later became a project of the JASIG (Java in Administration Special Interest Group). Currently it is maintained by the APEREO Foundation. Among the main resources we can mention:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Support for various authentication protocols (LDAP, SAML, and others);<\/li><li>Multi-factor authentication (password and SMS for example);<\/li><li>Password management and authentication policies.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SAML \u2013 Security Assertion Markup Language<\/strong><\/h3>\n\n\n\n<p>Unlike CAS, SAML is an XML language for exchanging security information. It is mentioned here because it is used by many integrated authentication mechanisms (including CAS) to exchange information.<\/p>\n\n\n\n<p>Basically it defines a standard XML message for the &#8220;conversations&#8221; between the application and the authentication service. For example, it defines the pattern of what information the IDP (Identity Provider) should return to the application according to what the application requests.<\/p>\n\n\n\n<p>This language is widespread and can work with many integrated, single sign-on authentication systems such as CAS and Microsoft&#8217;s ADFS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ADFS \u2013 Active Directory Federation Services<\/strong><\/h3>\n\n\n\n<p>It is an integrated authentication system that can run on Windows servers and provides single sign-on for applications located in the organization. ADFS uses the Windows Active Directory as the identity provider and password repository and integrates with systems via various protocols such as LDAP, SAML and others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>In closing<\/strong><\/h2>\n\n\n\n<p>In this article we have only mentioned a few protocols and systems that allow you to implement integrated, single sign-on authentication within organizations, but there are many other systems and protocols in the market.<\/p>\n\n\n\n<p>It is important to reinforce that while these tools increase security &#8211; because we have a centralized repository and a specialized system for the purpose of authentication control &#8211; good management is required to avoid points of vulnerability. Restricted policies, password expiration, and multi-factor authentication are important items to increase security.<\/p>\n\n\n\n<p>Implementing authentication systems has its complexities in the choice of tools and supported protocols, but their adoption solves a number of authentication-related problems while increasing security and making life easier for users.<\/p>\n\n\n\n<p>For our customers, it is worth reinforcing that <a href=\"https:\/\/www.neomind.com.br\/fusion\/site\/PT\/home\" target=\"_blank\" rel=\"noopener noreferrer\">Fusion Platform<\/a> supports all the mechanisms mentioned in this article, adhering to the policies of companies that adopt or wish to adopt them.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.neomind.com.br\/fusion\/site\/EN\/solutions?cloud&amp;ref=blog\" target=\"_blank\" rel=\"noopener noreferrer\">Try it for 15 days free right now!<\/a>&nbsp;Or, if you prefer, request a demonstration from our consultants. Count on us to answer all your doubts and help your company!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Integrated authentication mechanisms ensure the user&#8217;s identity without having to inform it several times.<\/p>\n","protected":false},"author":14,"featured_media":7216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[326],"tags":[],"class_list":["post-7215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fusion-platform-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Integrated Authentication and how does it work? - Neomind<\/title>\n<meta name=\"description\" content=\"Integrated authentication mechanisms ensure the user&#039;s identity without having to inform it several times.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Integrated Authentication and how does it work?\" \/>\n<meta property=\"og:description\" content=\"Having a single authenticated password (the so-called Single Sign-on), that allows instant access to all systems in the organization. This is the dream of users and system administrators. It is the integrated authentication mechanisms that make the dream come true. We explain in this post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Neomind\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/neomindsocial\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-18T20:27:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-25T13:09:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luiz C\u00e9zar Medeiros Filho\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luiz C\u00e9zar Medeiros Filho\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\"},\"author\":{\"name\":\"Luiz C\u00e9zar Medeiros Filho\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/fca9e467b7d9e4a41643f75f0a5c97b5\"},\"headline\":\"What is Integrated Authentication and how does it work?\",\"datePublished\":\"2021-05-18T20:27:15+00:00\",\"dateModified\":\"2021-09-25T13:09:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\"},\"wordCount\":917,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg\",\"articleSection\":[\"Fusion Platform\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\",\"url\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\",\"name\":\"What is Integrated Authentication and how does it work? - Neomind\",\"isPartOf\":{\"@id\":\"https:\/\/www.neomind.com.br\/#website\"},\"about\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg\",\"datePublished\":\"2021-05-18T20:27:15+00:00\",\"dateModified\":\"2021-09-25T13:09:14+00:00\",\"description\":\"Integrated authentication mechanisms ensure the user's identity without having to inform it several times.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage\",\"url\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg\",\"contentUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg\",\"width\":770,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.neomind.com.br\/#website\",\"url\":\"https:\/\/www.neomind.com.br\/\",\"name\":\"Neomind\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.neomind.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.neomind.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.neomind.com.br\/#organization\",\"name\":\"Neomind\",\"url\":\"https:\/\/www.neomind.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png\",\"contentUrl\":\"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png\",\"width\":1280,\"height\":713,\"caption\":\"Neomind\"},\"image\":{\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/neomindsocial\",\"https:\/\/www.instagram.com\/neomind.solutions\/\",\"https:\/\/www.linkedin.com\/company\/neomind\/\",\"https:\/\/www.youtube.com\/NeomindSocial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/fca9e467b7d9e4a41643f75f0a5c97b5\",\"name\":\"Luiz C\u00e9zar Medeiros Filho\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.neomind.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/363087c79a3a20773922709162d2b11b22e4b9fab0c82f47dcedb50590c3d570?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/363087c79a3a20773922709162d2b11b22e4b9fab0c82f47dcedb50590c3d570?s=96&d=mm&r=g\",\"caption\":\"Luiz C\u00e9zar Medeiros Filho\"},\"description\":\"Gerente de Manuten\u00e7\u00e3o da Neomind, formado em Sistemas de Informa\u00e7\u00e3o com \u00canfase em Redes pela Unisociesc. Tem experi\u00eancia de 17 anos em Tecnologia da Informa\u00e7\u00e3o.\",\"url\":\"https:\/\/www.neomind.com.br\/en\/blog\/author\/luiz-cezar-medeiros-filho\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Integrated Authentication and how does it work? - Neomind","description":"Integrated authentication mechanisms ensure the user's identity without having to inform it several times.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/","og_locale":"en_US","og_type":"article","og_title":"What is Integrated Authentication and how does it work?","og_description":"Having a single authenticated password (the so-called Single Sign-on), that allows instant access to all systems in the organization. This is the dream of users and system administrators. It is the integrated authentication mechanisms that make the dream come true. We explain in this post.","og_url":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/","og_site_name":"Neomind","article_publisher":"https:\/\/www.facebook.com\/neomindsocial","article_published_time":"2021-05-18T20:27:15+00:00","article_modified_time":"2021-09-25T13:09:14+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog.jpg","type":"image\/jpeg"}],"author":"Luiz C\u00e9zar Medeiros Filho","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Luiz C\u00e9zar Medeiros Filho","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#article","isPartOf":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/"},"author":{"name":"Luiz C\u00e9zar Medeiros Filho","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/fca9e467b7d9e4a41643f75f0a5c97b5"},"headline":"What is Integrated Authentication and how does it work?","datePublished":"2021-05-18T20:27:15+00:00","dateModified":"2021-09-25T13:09:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/"},"wordCount":917,"commentCount":0,"publisher":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"image":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg","articleSection":["Fusion Platform"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/","url":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/","name":"What is Integrated Authentication and how does it work? - Neomind","isPartOf":{"@id":"https:\/\/www.neomind.com.br\/#website"},"about":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"primaryImageOfPage":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg","datePublished":"2021-05-18T20:27:15+00:00","dateModified":"2021-09-25T13:09:14+00:00","description":"Integrated authentication mechanisms ensure the user's identity without having to inform it several times.","breadcrumb":{"@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#primaryimage","url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg","contentUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2021\/05\/capas-blog2.jpg","width":770,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.neomind.com.br\/en\/blog\/what-is-integrated-authentication-and-how-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio"}]},{"@type":"WebSite","@id":"https:\/\/www.neomind.com.br\/#website","url":"https:\/\/www.neomind.com.br\/","name":"Neomind","description":"","publisher":{"@id":"https:\/\/www.neomind.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.neomind.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.neomind.com.br\/#organization","name":"Neomind","url":"https:\/\/www.neomind.com.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png","contentUrl":"https:\/\/www.neomind.com.br\/wp-content\/uploads\/2018\/04\/logo-neomind-vertical.png","width":1280,"height":713,"caption":"Neomind"},"image":{"@id":"https:\/\/www.neomind.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/neomindsocial","https:\/\/www.instagram.com\/neomind.solutions\/","https:\/\/www.linkedin.com\/company\/neomind\/","https:\/\/www.youtube.com\/NeomindSocial\/"]},{"@type":"Person","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/fca9e467b7d9e4a41643f75f0a5c97b5","name":"Luiz C\u00e9zar Medeiros Filho","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.neomind.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/363087c79a3a20773922709162d2b11b22e4b9fab0c82f47dcedb50590c3d570?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/363087c79a3a20773922709162d2b11b22e4b9fab0c82f47dcedb50590c3d570?s=96&d=mm&r=g","caption":"Luiz C\u00e9zar Medeiros Filho"},"description":"Gerente de Manuten\u00e7\u00e3o da Neomind, formado em Sistemas de Informa\u00e7\u00e3o com \u00canfase em Redes pela Unisociesc. Tem experi\u00eancia de 17 anos em Tecnologia da Informa\u00e7\u00e3o.","url":"https:\/\/www.neomind.com.br\/en\/blog\/author\/luiz-cezar-medeiros-filho\/"}]}},"_links":{"self":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/7215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/comments?post=7215"}],"version-history":[{"count":6,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/7215\/revisions"}],"predecessor-version":[{"id":12754,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/posts\/7215\/revisions\/12754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/media\/7216"}],"wp:attachment":[{"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/media?parent=7215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/categories?post=7215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.neomind.com.br\/en\/wp-json\/wp\/v2\/tags?post=7215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}