{"id":142,"date":"2014-07-02T18:01:20","date_gmt":"2014-07-02T15:01:20","guid":{"rendered":"http:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron.jpg"},"modified":"2014-07-02T18:01:20","modified_gmt":"2014-07-02T15:01:20","slug":"mobileiron","status":"inherit","type":"attachment","link":"https:\/\/bitsecurity.info\/index.php\/2014\/07\/02\/mobileiron-exchange-2003-kerberos-integration\/mobileiron\/","title":{"rendered":"MobileIron"},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"class_list":["post-142","attachment","type-attachment","status-inherit","hentry"],"aioseo_notices":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"94\" src=\"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-300x94.jpg\" class=\"attachment-medium size-medium\" alt=\"MobileIron Exchange 2003 Kerberos Integration\" srcset=\"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-300x94.jpg 300w, https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-768x241.jpg 768w, https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-1024x321.jpg 1024w, https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-2000x632.jpg 2000w, https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron.jpg 2016w\" sizes=\"auto, 100vw\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"MobileIron Exchange 2003 Kerberos Integration","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":2016,"height":632,"file":"2014\/07\/MobileIron.jpg","sizes":{"thumbnail":{"file":"MobileIron-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-150x150.jpg"},"medium":{"file":"MobileIron-300x94.jpg","width":300,"height":94,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-300x94.jpg"},"medium_large":{"file":"MobileIron-768x241.jpg","width":768,"height":241,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-768x241.jpg"},"large":{"file":"MobileIron-1024x321.jpg","width":1024,"height":321,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-1024x321.jpg"},"twentyseventeen-featured-image":{"file":"MobileIron-2000x632.jpg","width":2000,"height":632,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-2000x632.jpg"},"twentyseventeen-thumbnail-avatar":{"file":"MobileIron-100x100.jpg","width":100,"height":100,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron-100x100.jpg"},"full":{"file":"MobileIron.jpg","width":2016,"height":632,"mime_type":"image\/jpeg","source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":137,"source_url":"https:\/\/bitsecurity.info\/wp-content\/uploads\/2014\/07\/MobileIron.jpg","_links":{"self":[{"href":"https:\/\/bitsecurity.info\/index.php\/wp-json\/wp\/v2\/media\/142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitsecurity.info\/index.php\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/bitsecurity.info\/index.php\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/bitsecurity.info\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bitsecurity.info\/index.php\/wp-json\/wp\/v2\/comments?post=142"}]}}