{"id":1527,"date":"2013-10-18T13:05:25","date_gmt":"2013-10-18T11:05:25","guid":{"rendered":"http:\/\/www.oradba.ch\/?p=1527"},"modified":"2013-10-18T13:14:19","modified_gmt":"2013-10-18T11:14:19","slug":"avcli-audit-vault-command-line-interface","status":"publish","type":"post","link":"https:\/\/www.oradba.ch\/wordpress\/2013\/10\/avcli-audit-vault-command-line-interface\/","title":{"rendered":"AVCLI Audit Vault command line interface"},"content":{"rendered":"<p>When I started to deal with Oracle Audit Vault and Database Firewall (AVDF), I have always worked with the Web console. Since a few weeks I regularly use the AVCLI and start to like it. It is a simple java based command line utility, from which you can access  Audit Vault and Database Firewall servers. The look and feel of AVCLI is comparable with SQLPlus or RMAN utility and allows to configure and administer the Oracle AVDF server. The utility can be used interactive or with scripts. All you need to use it is JDK 1.6 or later and a supported platform. So far I could not find any information about supported operating systems, but I&#8217;m assuming that they are the same as for the vault audit agent. The MOS note <a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1536380.1\" target=\"_blank\">1536380.1<\/a> Oracle Audit Vault and Database Firewall 12.1 platform support list the latest informations. At the moment I&#8217;m using the AVCLI on Windows 7 and Oracle Enterprise Linux 5u8.<\/p>\n<h3>Download and Install<\/h3>\n<p>The AVCLI has to be downloaded from the AVCLI Web console. For this navigate to <strong>settings<\/strong> tab, in the system menu click <strong>manage<\/strong> and click the <em>Download Command Line Utility<\/em> Button to download and save the avcli.jar.<br \/>\n<a href=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/AVCLI_Download.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/AVCLI_Download.png?resize=300%2C212&#038;ssl=1\" alt=\"AVCLI_Download\" width=\"300\" height=\"212\" class=\"aligncenter size-medium wp-image-1531\" srcset=\"https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/AVCLI_Download.png?resize=300%2C212&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/AVCLI_Download.png?resize=624%2C442&amp;ssl=1 624w, https:\/\/i0.wp.com\/www.oradba.ch\/wordpress\/wp-content\/uploads\/AVCLI_Download.png?w=784&amp;ssl=1 784w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nTo install it just run java with the following parameters:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\njava -jar avcli.jar -d INSTALLATIONPATH\n<\/pre>\n<h3>First Steps<\/h3>\n<p>A user account with the AV_ADMIN role is required to use the AVCLI and connect to the AVDF server. On my test and engineering system still using AVADMIN.<\/p>\n<p>Log in and show the help:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\noracle@melete2:\/var\/lib\/oracle\/dbfw\/ [dbfwdb] avcli\n\nAVCLI : Release 12.1.1.1.0 - Production on Fri Oct 18 10:28:16 UTC 2013\n\nCopyright (c) 1996, 2013 Oracle.  All Rights Reserved.\n\nAVCLI&gt; connect avadmin\/manager;\nConnected.\nAVCLI&gt; help;\n ---------------------------------------------------------------------\n For detailed help, see HELP [command] e.g., HELP REGISTER SECURED TARGET    \n \n Secured Target Management:\n   * REGISTER SECURED TARGET [secured target name] OF SECURED TARGET TYPE \n        [secured target type name] AT [location] [AUTHENTICATED BY \n        [username\/password]]\n   * ALTER SECURED TARGET [secured target name] SET [options]\n   * ALTER SECURED TARGET [secured target name] ADD ADDRESS [ip:port]\n   * ALTER SECURED TARGET [secured target name] DROP ADDRESS [ip:port]\n   * LIST ATTRIBUTE FOR SECURED TARGET [secured target name]\n   * LIST METRICS FOR SECURED TARGET [secured target name]\n   * LIST SECURED TARGET\n   * LIST SECURED TARGET TYPE\n   * LIST ADDRESS FOR SECURED TARGET [secured target name]\n   * DROP SECURED TARGET [secured target name]\n \n Host Management:\n   * REGISTER HOST [hostname] [WITH IP [ip address]]\n   * ALTER HOST [hostname] SET [options]\n   * ACTIVATE HOST [hostname]\n   * DEACTIVATE HOST [hostname]\n   * LIST HOST\n   * DROP HOST [hostname]\n \n Trail Management:\n   * START COLLECTION FOR SECURED TARGET [options]\n   * STOP COLLECTION FOR SECURED TARGET [options]\n   * LIST TRAIL FOR SECURED TARGET [secured target name]\n   * DROP TRAIL FOR SECURED TARGET [options]\n \n Security Management:\n   * GRANT ADMIN TO [username]\n   * REVOKE ADMIN FROM [username]\n   * GRANT SUPERADMIN TO [username]\n   * REVOKE SUPERADMIN FROM [username]\n   * GRANT ACCESS ON SECURED TARGET [secured target name] TO [username]\n   * GRANT ACCESS ON SECURED TARGET GROUP [secured target group name] \n        TO [username]\n   * REVOKE ACCESS ON SECURED TARGET [secured target name] FROM [username]\n   * REVOKE ACCESS ON SECURED TARGET GROUP [secured target group name]\n        FROM [username]\n \n Plugin Management:\n   * DEPLOY PLUGIN [plugin archive]\n   * UNDEPLOY PLUGIN [plugin id]\n   * LIST PLUGIN FOR SECURED TARGET TYPE [secured target type name]\n \n SMTP Server Integration:\n   * REGISTER SMTP SERVER AT [host[:port]] SENDER ID [sender id]\n        SENDER EMAIL [sender e-mail]\n        [AUTHENTICATED BY [username]\/[password]]\n   * ALTER SMTP SERVER [options]\n   * ALTER SMTP SERVER SECURE MODE ON PROTOCOL [SSL | TLS]\n        [TRUSTSTORE [truststore]]\n   * ALTER SMTP SERVER SECURE MODE OFF\n   * ALTER SMTP SERVER ENABLE\n   * ALTER SMTP SERVER DISABLE\n   * TEST SMTP SERVER SEND EMAIL TO [e-mail address]\n   * LIST ATTRIBUTE OF SMTP SERVER\n   * DROP SMTP SERVER\n \n Server Management:\n   * ALTER SYSTEM SET [options]\n   * SHOW CERTIFICATE FOR SERVER\n \n Firewall Management:\n   * REGISTER FIREWALL [firewall name] WITH IP [ip address]\n   * LIST FIREWALL\n   * REBOOT FIREWALL [firewall name]\n   * POWEROFF FIREWALL [firewall name]\n   * DROP FIREWALL [firewall name]\n   * ALTER FIREWALL [firewall name] SET [options]\n   * SHOW STATUS FOR FIREWALL [firewall name] [WITH DIAGNOSTICS]\n   * CREATE RESILIENT PAIR FOR FIREWALL PRIMARY [ primary firewall]\n        SECONDARY [secondary firewall]\n   * SWAP RESILIENT PAIR HAVING FIREWALL [firewall name]\n   * DROP RESILIENT PAIR HAVING FIREWALL [firewall name]\n \n Enforcement Point Management:\n   * CREATE ENFORCEMENT POINT [enforcement point name] FOR\n        SECURED TARGET [secured target name] USING FIREWALL\n        [firewall name] TRAFFIC SOURCE [traffic source name] \n        WITH MODE [mode name DPE\/DAM]\n   * LIST ENFORCEMENT POINT FOR FIREWALL [firewall name]\n   * LIST ENFORCEMENT POINT FOR SECURED TARGET [secured target name]\n   * START ENFORCEMENT POINT [enforcement point name]\n   * STOP ENFORCEMENT POINT [enforcement point name]\n   * ALTER ENFORCEMENT POINT [enforcement point name] SET [options]\n   * DROP ENFORCEMENT POINT [enforcement point name]\n \n Miscellaneous:\n   * CONNECT [username\/password]\n   * QUIT\n   * HELP\n<\/pre>\n<p>List the secured targets:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\nAVCLI&gt; LIST SECURED TARGET;\n---------------------------------------------------------------------------------------------------------------------------------\n| NAME   | DESCRIPTION                                             | LOCATION                               | SECUREDTARGETTYPE |\n=================================================================================================================================\n| TDB11  | Oracle 11.2.0.3.0 Test Database (Use to be 12.1.0.1 DB) | jdbc:oracle:thin:@\/\/urania:1521\/TDB11  | Oracle Database   |\n| TDB11A | Oracle 11.2.0.3.0 Test Database                         | jdbc:oracle:thin:@\/\/urania:1521\/TDB11A | Oracle Database   |\n---------------------------------------------------------------------------------------------------------------------------------\n\n2 row(s) selected.\n\nThe command completed successfully. \n<\/pre>\n<p>List status of audit trails for a secure target:<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\nAVCLI&gt; LIST TRAIL FOR SECURED TARGET TDB11;\n----------------------------------------------------------------------------------------------------------------\n| AUDIT_TRAIL_TYPE | HOST   | LOCATION                          | STATUS      | REQUEST_STATUS | ERROR_MESSAGE |\n================================================================================================================\n| DIRECTORY        | urania | \/u00\/app\/oracle\/admin\/TDB11\/adump | UNREACHABLE |                |               |\n| TABLE            | urania | SYS.AUD$                          | UNREACHABLE |                |               |\n| TRANSACTION LOG  | urania |                                   | UNREACHABLE |                |               |\n----------------------------------------------------------------------------------------------------------------\n\n3 row(s) selected.\n\nThe command completed successfully. \n<\/pre>\n<p>Start collection of an audit trail. This requires to specify the agent host and the trail location. Below you see how to start the audit trail for database table SYS.AUD$ and the redo collector.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\n\nAVCLI&gt; START COLLECTION FOR SECURED TARGET TDB11 USING HOST urania FROM TABLE &#039;SYS.AUD$&#039;;\n\nRequest submitted successfully.\n\nAVCLI&gt; START COLLECTION FOR SECURED TARGET TDB11 USING HOST urania FROM TRANSACTION LOG;\n\nRequest submitted successfully.\n\nAVCLI&gt; LIST TRAIL FOR SECURED TARGET TDB11;\n----------------------------------------------------------------------------------------------------------------\n| AUDIT_TRAIL_TYPE | HOST   | LOCATION                          | STATUS      | REQUEST_STATUS | ERROR_MESSAGE |\n================================================================================================================\n| DIRECTORY        | urania | \/u00\/app\/oracle\/admin\/TDB11\/adump | UNREACHABLE |                |               |\n| TABLE            | urania | SYS.AUD$                          | IDLE        |                |               |\n| TRANSACTION LOG  | urania |                                   | COLLECTING  |                |               |\n----------------------------------------------------------------------------------------------------------------\n\n3 row(s) selected.\n\nThe command completed successfully. \n<\/pre>\n<h3>Run Scripts<\/h3>\n<p>Scripts can be executed directly as command line parameter when starting AVCLI or interactively when using the AVCLI.<\/p>\n<p>Start a script from the command line with specifying the user and script name. <\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\noracle@melete2:~\/ [dbfwdb] avcli -u avadmin -f report_av_status.av\n\nAVCLI : Release 12.1.1.1.0 - Production on Fri Oct 18 10:40:04 UTC 2013\n\nCopyright (c) 1996, 2013 Oracle.  All Rights Reserved.\n\nEnter password for &#039;avadmin&#039;:        \n\nConnected to:\nOracle Audit Vault Server - Version : 12.1.1.1.0\n\nAVCLI&gt; \n---------------------------------------------------------------------------------------------------------------------------------\n| NAME   | DESCRIPTION                                             | LOCATION                               | SECUREDTARGETTYPE |\n=================================================================================================================================\n| TDB11  | Oracle 11.2.0.3.0 Test Database (Use to be 12.1.0.1 DB) | jdbc:oracle:thin:@\/\/urania:1521\/TDB11  | Oracle Database   |\n| TDB11A | Oracle 11.2.0.3.0 Test Database                         | jdbc:oracle:thin:@\/\/urania:1521\/TDB11A | Oracle Database   |\n---------------------------------------------------------------------------------------------------------------------------------\n\n2 row(s) selected.\n\nThe command completed successfully. \n\nAVCLI&gt; \n----------------------------------------------------------------------------------------------------------------\n| AUDIT_TRAIL_TYPE | HOST   | LOCATION                          | STATUS      | REQUEST_STATUS | ERROR_MESSAGE |\n================================================================================================================\n| DIRECTORY        | urania | \/u00\/app\/oracle\/admin\/TDB11\/adump | UNREACHABLE |                |               |\n| TABLE            | urania | SYS.AUD$                          | IDLE        |                |               |\n| TRANSACTION LOG  | urania |                                   | COLLECTING  |                |               |\n----------------------------------------------------------------------------------------------------------------\n\n3 row(s) selected.\n\nThe command completed successfully. \n\nAVCLI&gt; \n<\/pre>\n<p>Or with username\/password in the script.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"bash\">\noracle@melete2:~\/ [dbfwdb] avcli -f start_trails_TDB11.av \n\nAVCLI : Release 12.1.1.1.0 - Production on Fri Oct 18 10:46:45 UTC 2013\n\nCopyright (c) 1996, 2013 Oracle.  All Rights Reserved.\n\nAVCLI&gt; Connected.\nAVCLI&gt; AVCLI&gt; \nRequest submitted successfully.\n\nAVCLI&gt; \nRequest submitted successfully.\n\nAVCLI&gt; \nRequest submitted successfully.\n\nAVCLI&gt; \n\noracle@melete2:~\/ [dbfwdb] cat start_trails_TDB11.av \nconnect avadmin\/manager;\n\nSTART COLLECTION FOR SECURED TARGET TDB11 USING HOST urania FROM TABLE &#039;SYS.AUD$&#039;;\nSTART COLLECTION FOR SECURED TARGET TDB11 USING HOST urania FROM TRANSACTION LOG;\nSTART COLLECTION FOR SECURED TARGET TDB11 USING HOST urania FROM DIRECTORY &#039;\/u00\/app\/oracle\/admin\/TDB11\/adump&#039;;\n<\/pre>\n<p>The downside is that the password is stored in the script or it must be entered interactively.<\/p>\n<h3>Conclusion<\/h3>\n<p>Is a nice little tool that is worth looking at more closely. In addition to the automation of administrative tasks it is a handy day to day tool for the AV administrator with a bit room for improvement. \ud83d\ude42 Ok would be helpful, if there is an alternative for username\/passwords to automatically execute scripts without storing the passwords in cleartext. Why not have something similar to secure external password store or the emcli function to store credentials? <\/p>\n<p>A few possible use cases for AVCLI:<\/p>\n<ul>\n<li>Provision new secure targets and audit trails<\/li>\n<li>Automating administration tasks<\/li>\n<li>Alternative administration interface<\/li>\n<li>Automatic start of audit collection with system oder database startup<\/li>\n<\/ul>\n<h3>References<\/h3>\n<p>Some links related to this post.<\/p>\n<ul>\n<li>Oracle Audit Vault and Database Firewall 12.1 Platform Support [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1536380.1\" target=\"_blank\">1536380.1<\/a><\/em>]<\/li>\n<li>Oracle\u00ae Audit Vault and Database Firewall Administrator&#8217;s Guide Release 12.1.1<br \/>\n<a href=\"http:\/\/docs.oracle.com\/cd\/E37100_01\/doc.121\/e27776\/manage_server.htm#SIGAD40925\" target=\"_blank\">Downloading and Using the AVCLI Command Line Interface<\/a><\/li>\n<li>Oracle\u00ae Audit Vault and Database Firewall Administrator&#8217;s Guide Release 12.1.1<br \/>\n<a href=\"http:\/\/docs.oracle.com\/cd\/E37100_01\/doc.121\/e27776\/avcli_commands.htm#SIGAD40582\" target=\"_blank\">AVCLI Administrative Commands Reference<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>When I started to deal with Oracle Audit Vault and Database Firewall (AVDF), I have always worked with the Web console. Since a few weeks I regularly use the AVCLI and start to like it. It is a simple java based command line utility, from which you can access Audit Vault and Database Firewall servers. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[85,88,11],"tags":[119,111],"class_list":["post-1527","post","type-post","status-publish","format-standard","hentry","category-audit-vault-and-database-firewall","category-avdf","category-security","tag-avcli","tag-tvdsecexpert"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1aErb-oD","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2069,"url":"https:\/\/www.oradba.ch\/wordpress\/2015\/12\/audit-vault-and-database-firewall-12-2\/","url_meta":{"origin":1527,"position":0},"title":"Audit Vault and Database Firewall 12.2","author":"Stefan","date":"22. December 2015","format":false,"excerpt":"Oracle has just released a new major Release of its Oracle Audit Vault and Database Firewall. The new release is immediately available on Oracle's Software Delivery Cloud. But the OTN website have not been updated. Beside the upgrade of the OS and embedded Oracle Database to 12.1.0.2, Oracle added a\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1690,"url":"https:\/\/www.oradba.ch\/wordpress\/2014\/05\/audit-vault-and-database-firewall-12-1-2\/","url_meta":{"origin":1527,"position":1},"title":"Audit Vault and Database Firewall 12.1.2","author":"Stefan","date":"7. May 2014","format":false,"excerpt":"Oracle has just released a new Release of its Oracle Audit Vault and Database Firewall. The new release is immediately available on Oracle's Software Delivery Cloud. It look's like Oracle added a bunch of Enterprise-Grade Features like iSCSI SAN Disk, NFS Storage as well as SYSLOG integration. Starting with this\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1793,"url":"https:\/\/www.oradba.ch\/wordpress\/2014\/07\/release-of-audit-vault-and-database-firewall-12-1-2-bundle-patch-1\/","url_meta":{"origin":1527,"position":2},"title":"Release of Audit Vault and Database Firewall 12.1.2 Bundle Patch 1","author":"Stefan","date":"2. July 2014","format":false,"excerpt":"Earlier today, Oracle has released the first Bundle Patch for Audit Vault and Database Firewall 12.1.2. The patch can be downloaded on Oracle Metalink as Patchset 18728905 for existing installations or on Oracle eDelivery as full installation image for new installations. The installation image is split in two parts which\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1862,"url":"https:\/\/www.oradba.ch\/wordpress\/2014\/08\/release-of-audit-vault-and-database-firewall-12-1-2-bundle-patch-2\/","url_meta":{"origin":1527,"position":3},"title":"Release of Audit Vault and Database Firewall 12.1.2 Bundle Patch 2","author":"Stefan","date":"4. August 2014","format":false,"excerpt":"End of last week, Oracle has released the second Bundle Patch for Audit Vault and Database Firewall 12.1.2. I've missed the release due to public holiday here in Switzerland. :-) The patch can be downloaded as usual on Oracle Metalink as Patchset 19190265 for existing installations or on Oracle eDelivery\u2026","rel":"","context":"In &quot;Audit Vault&quot;","block_context":{"text":"Audit Vault","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2057,"url":"https:\/\/www.oradba.ch\/wordpress\/2015\/11\/release-of-audit-vault-and-database-firewall-12-1-2-bundle-patch-7\/","url_meta":{"origin":1527,"position":4},"title":"Release of Audit Vault and Database Firewall 12.1.2 Bundle Patch 7","author":"Stefan","date":"9. November 2015","format":false,"excerpt":"Today Oracle released the new Bundle Patch for Audit Vault and Database Firewall 12.1.2. The patch can be downloaded as usual on Oracle Metalink as Patchset 21920205 for existing installations. The full installation image for new installations is not yet available on Oracle eDelivery. I guess this will follow in\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1970,"url":"https:\/\/www.oradba.ch\/wordpress\/2015\/05\/release-of-audit-vault-and-database-firewall-12-1-2-bundle-patch-5\/","url_meta":{"origin":1527,"position":5},"title":"Release of Audit Vault and Database Firewall 12.1.2 Bundle Patch 5","author":"Stefan","date":"15. May 2015","format":false,"excerpt":"Today Oracle released the new Bundle Patch for Audit Vault and Database Firewall 12.1.2. The patch can be downloaded as usual on Oracle Metalink as Patchset 20829881 for existing installations. The full installation image for new installations is not yet available on Oracle eDelivery. I guess this will follow in\u2026","rel":"","context":"In &quot;Audit Vault and Database Firewall&quot;","block_context":{"text":"Audit Vault and Database Firewall","link":"https:\/\/www.oradba.ch\/wordpress\/category\/audit\/audit-vault-and-database-firewall\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/comments?post=1527"}],"version-history":[{"count":11,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1527\/revisions"}],"predecessor-version":[{"id":1540,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1527\/revisions\/1540"}],"wp:attachment":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/media?parent=1527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/categories?post=1527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/tags?post=1527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}