{"id":1698,"date":"2018-10-17T09:25:00","date_gmt":"2018-10-17T09:25:00","guid":{"rendered":"https:\/\/www.pentame.com\/blog\/?p=1698"},"modified":"2025-07-28T08:47:39","modified_gmt":"2025-07-28T08:47:39","slug":"importance-of-email-authentication","status":"publish","type":"post","link":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/","title":{"rendered":"IMPORTANCE OF EMAIL AUTHENTICATION"},"content":{"rendered":"<p>Nowadays email authentication is one of the important factors that determine your email is secured. For the security purpose of the email server all email service provider us email authentication.<\/p>\n<p>Email authentication is a method for verifying an email id as valid or genuine email id. There are different kinds of email authentication used to\u00a0authenticate an email id.<\/p>\n<p>Before going to email authentication, we should know the importance of email authentication and how the invalid authentication affects our business.<\/p>\n<p>Please find some points are given below regarding email authentication<\/p>\n<p>. Email authentication verifies that email is from your valid or authorized sender.<\/p>\n<p>. Email authentication help to receive the email in the inbox rather going to spam folder.<\/p>\n<p>. To prevent spoofing or phishing email.<\/p>\n<p>. Chance for email rejection will be less.<\/p>\n<p>If the email is not authenticated the emails will be received in the spam\/quarantine or will be bounced back. Now a day most of the people use email clients to access emails like outlook, Thunderbird etc. Depending on the email client add-ins or antivirus some email received in the spam folder in the webmail will not be downloaded outlook.<\/p>\n<p>Depending on the spam or quarantine folder it is received the recovery of email differ. If the email is received in the spam folder in the webmail it should be moved manually to inbox to receive in inbox or outlook. If the email is directly received in the quarantine the email service provider or from the admin console the email should be released.<\/p>\n<p>Email authentication is one of the important factors to increase the trustworthiness in receiving mail in the recipient email servers. Please find the below given most important email authentication standards<\/p>\n<p>.DKIM<\/p>\n<p>.SPF<\/p>\n<p>.DMARC<\/p>\n<p><strong>DKIM<\/strong><\/p>\n<p>DKIM known as Domain Keys Identified Mail is an email authentication standard that uses public key encryption to verify email messages. When the recipient email server receives the DKIM signed message the public key in it is used to decrypt the signature. The recipient mail server then compares the incoming message using the same algorithm. If the comparison matches the decrypted signature, it is authenticated otherwise authentication failed. Changing the DKIM keys once a year is an effective way to increase the security of DKIM authentication.<\/p>\n<p><strong>SPF<\/strong><\/p>\n<p>SPF (Sender Policy Framework) is an email authentication system that allows sender domains which IP addresses are allowed to deliver email messages on behalf of that domain.<\/p>\n<p><strong>DMARC<\/strong><\/p>\n<p>DMARC (Domain-based Message Authentication Reporting and Conformance) is the way to protect your mailbox or email server from phishing and spoofing attacks.<\/p>\n<p>IF SPF or DKIM authenticates with an identity if the domain does not match the domain in the human-readable &#8220;From&#8221; address, the non-matching authentication. Passing SPF or DKIM may also cause DMARC failure due to misalignment.<\/p>\n<p>Contact us now for <a href=\"https:\/\/www.pentame.com\/email-hosting-services-abu-dhabi\/\">best email hosting services in UAE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays email authentication is one of the important factors that determine your email is secured. For the security purpose of the email server all email service provider us email authentication. Email authentication is a method for verifying an email id as valid or genuine email id. There are different kinds of email authentication used to\u00a0authenticate [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":3616,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,12],"tags":[],"class_list":["post-1698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-services","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IMPORTANCE OF EMAIL AUTHENTICATION | Pentagon<\/title>\n<meta name=\"description\" content=\"Stay ahead of trends, read IMPORTANCE OF EMAIL AUTHENTICATION . Dive into the latest blogs from Pentagon Information Technology\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IMPORTANCE OF EMAIL AUTHENTICATION | Pentagon\" \/>\n<meta property=\"og:description\" content=\"Stay ahead of trends, read IMPORTANCE OF EMAIL AUTHENTICATION . Dive into the latest blogs from Pentagon Information Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Pentagon Information Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pentagon.ae\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-17T09:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T08:47:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Rojo Jose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pentame\" \/>\n<meta name=\"twitter:site\" content=\"@pentame\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rojo Jose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\"},\"author\":{\"name\":\"Rojo Jose\",\"@id\":\"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/9081191afbc065d24a97d9b578d19c5b\"},\"headline\":\"IMPORTANCE OF EMAIL AUTHENTICATION\",\"datePublished\":\"2018-10-17T09:25:00+00:00\",\"dateModified\":\"2025-07-28T08:47:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\"},\"wordCount\":474,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp\",\"articleSection\":[\"Email Services\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\",\"url\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\",\"name\":\"IMPORTANCE OF EMAIL AUTHENTICATION | Pentagon\",\"isPartOf\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp\",\"datePublished\":\"2018-10-17T09:25:00+00:00\",\"dateModified\":\"2025-07-28T08:47:39+00:00\",\"description\":\"Stay ahead of trends, read IMPORTANCE OF EMAIL AUTHENTICATION . Dive into the latest blogs from Pentagon Information Technology\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage\",\"url\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp\",\"contentUrl\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp\",\"width\":787,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pentame.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.pentame.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IMPORTANCE OF EMAIL AUTHENTICATION\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pentame.com\/blog\/#website\",\"url\":\"https:\/\/www.pentame.com\/blog\/\",\"name\":\"Pentagon Information Technology\",\"description\":\"World Class SEO Friendly Web Design &amp; Development Company UAE\",\"publisher\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pentame.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pentame.com\/blog\/#organization\",\"name\":\"Pentagon Information Technology\",\"url\":\"https:\/\/www.pentame.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pentame.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2023\/12\/logo.png\",\"contentUrl\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2023\/12\/logo.png\",\"width\":397,\"height\":397,\"caption\":\"Pentagon Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.pentame.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pentagon.ae\/\",\"https:\/\/x.com\/pentame\",\"https:\/\/www.instagram.com\/pentagon.ae\/\",\"https:\/\/www.youtube.com\/user\/pentamevideos\",\"https:\/\/www.linkedin.com\/company\/pentasolutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/9081191afbc065d24a97d9b578d19c5b\",\"name\":\"Rojo Jose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg\",\"contentUrl\":\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg\",\"caption\":\"Rojo Jose\"},\"description\":\"Rojo Jose is the Founder and CEO of Pentagon Information Technology and a seasoned Digital Strategist with over 29 years of expertise in Cloud Infrastructure &amp; Hosting, Web &amp; E-commerce Development, Cybersecurity, Penetration Testing, and Digital Marketing. With a strong presence across the UAE, US, and UK, he has helped businesses implement secure, scalable, and growth-focused digital solutions. Under his leadership, Pentagon has become a trusted name in delivering innovative IT services worldwide.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/rojo-jose\/\"],\"url\":\"https:\/\/www.pentame.com\/blog\/author\/rojojose\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IMPORTANCE OF EMAIL AUTHENTICATION | Pentagon","description":"Stay ahead of trends, read IMPORTANCE OF EMAIL AUTHENTICATION . Dive into the latest blogs from Pentagon Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/","og_locale":"en_US","og_type":"article","og_title":"IMPORTANCE OF EMAIL AUTHENTICATION | Pentagon","og_description":"Stay ahead of trends, read IMPORTANCE OF EMAIL AUTHENTICATION . Dive into the latest blogs from Pentagon Information Technology","og_url":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/","og_site_name":"Pentagon Information Technology","article_publisher":"https:\/\/www.facebook.com\/pentagon.ae\/","article_published_time":"2018-10-17T09:25:00+00:00","article_modified_time":"2025-07-28T08:47:39+00:00","og_image":[{"width":787,"height":425,"url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp","type":"image\/webp"}],"author":"Rojo Jose","twitter_card":"summary_large_image","twitter_creator":"@pentame","twitter_site":"@pentame","twitter_misc":{"Written by":"Rojo Jose","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#article","isPartOf":{"@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/"},"author":{"name":"Rojo Jose","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/9081191afbc065d24a97d9b578d19c5b"},"headline":"IMPORTANCE OF EMAIL AUTHENTICATION","datePublished":"2018-10-17T09:25:00+00:00","dateModified":"2025-07-28T08:47:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/"},"wordCount":474,"commentCount":0,"publisher":{"@id":"https:\/\/www.pentame.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp","articleSection":["Email Services","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/","url":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/","name":"IMPORTANCE OF EMAIL AUTHENTICATION | Pentagon","isPartOf":{"@id":"https:\/\/www.pentame.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp","datePublished":"2018-10-17T09:25:00+00:00","dateModified":"2025-07-28T08:47:39+00:00","description":"Stay ahead of trends, read IMPORTANCE OF EMAIL AUTHENTICATION . Dive into the latest blogs from Pentagon Information Technology","breadcrumb":{"@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#primaryimage","url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp","contentUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp","width":787,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.pentame.com\/blog\/importance-of-email-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pentame.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.pentame.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"IMPORTANCE OF EMAIL AUTHENTICATION"}]},{"@type":"WebSite","@id":"https:\/\/www.pentame.com\/blog\/#website","url":"https:\/\/www.pentame.com\/blog\/","name":"Pentagon Information Technology","description":"World Class SEO Friendly Web Design &amp; Development Company UAE","publisher":{"@id":"https:\/\/www.pentame.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pentame.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pentame.com\/blog\/#organization","name":"Pentagon Information Technology","url":"https:\/\/www.pentame.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2023\/12\/logo.png","contentUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2023\/12\/logo.png","width":397,"height":397,"caption":"Pentagon Information Technology"},"image":{"@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pentagon.ae\/","https:\/\/x.com\/pentame","https:\/\/www.instagram.com\/pentagon.ae\/","https:\/\/www.youtube.com\/user\/pentamevideos","https:\/\/www.linkedin.com\/company\/pentasolutions"]},{"@type":"Person","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/9081191afbc065d24a97d9b578d19c5b","name":"Rojo Jose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg","contentUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg","caption":"Rojo Jose"},"description":"Rojo Jose is the Founder and CEO of Pentagon Information Technology and a seasoned Digital Strategist with over 29 years of expertise in Cloud Infrastructure &amp; Hosting, Web &amp; E-commerce Development, Cybersecurity, Penetration Testing, and Digital Marketing. With a strong presence across the UAE, US, and UK, he has helped businesses implement secure, scalable, and growth-focused digital solutions. Under his leadership, Pentagon has become a trusted name in delivering innovative IT services worldwide.","sameAs":["https:\/\/www.linkedin.com\/in\/rojo-jose\/"],"url":"https:\/\/www.pentame.com\/blog\/author\/rojojose\/"}]}},"fimg_url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/10\/IMPORTANCE-OF-EMAIL.webp","time":"","related_services":false,"tag_names":[],"category":[],"category_names":{"Email Services":"email-services","Security":"security"},"_links":{"self":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts\/1698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/comments?post=1698"}],"version-history":[{"count":2,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts\/1698\/revisions"}],"predecessor-version":[{"id":3944,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts\/1698\/revisions\/3944"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/media\/3616"}],"wp:attachment":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/media?parent=1698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/categories?post=1698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/tags?post=1698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}