{"id":4046,"date":"2023-01-31T18:17:20","date_gmt":"2023-01-31T18:17:20","guid":{"rendered":"https:\/\/seeromega.com\/erpcrm\/?p=4046"},"modified":"2023-02-07T17:00:14","modified_gmt":"2023-02-07T17:00:14","slug":"dynamics-365-security-configuration","status":"publish","type":"post","link":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/","title":{"rendered":"Dynamics 365 Security Configuration in Examples"},"content":{"rendered":"<p><strong>\u00a0<\/strong>Microsoft Dynamics 365 security is based on security roles. A role identifies the scope of access to different areas of the ERP system, as well as the permissions to interact with records and processes. At the same time, the security configuration has a direct impact on the license cost which depends on the number of users and the extent of their access.<\/p>\n<p>This article focuses on the practical application of security configuration in Microsoft Dynamics 365.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#Restricting_Access_to_Certain_Areas_of_System\" >Restricting Access to Certain Areas of System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#Controlling_Access_to_Sensitive_Data\" >Controlling Access to Sensitive Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#Limiting_Permissions_to_Perform_Actions\" >Limiting Permissions to Perform Actions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#Cost_Management\" >Cost Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#Accurate_Security_Configuration_for_Effective_Operations\" >Accurate Security Configuration for Effective Operations<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Restricting_Access_to_Certain_Areas_of_System\"><\/span>Restricting Access to Certain Areas of System<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>First of all, an organization can completely restrict access to an entire module of the ERP system. Not all employees need to deal with all the applications and functionalities you have included in your suite. Customizing security roles ensures that this is possible.<\/p>\n<p>For example, if you have Microsoft Dynamics 365 Finance and Supply Chain Management, not everyone in your organization actually has to work with both applications. At the same time, granting full access also poses security risks. Roles allow you to flexibly limit the access of specific users or grant it on demand.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Controlling_Access_to_Sensitive_Data\"><\/span>Controlling Access to Sensitive Data<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Every organization, regardless of its size, inevitably deals with sensitive data. Proper configuration of security roles in Microsoft Dynamics 365 helps companies ensure that information is only visible to users who really need it.<\/p>\n<p>A good illustration of this is modifying access to financial data. Even if your company does not collect sensitive information about your customers, you still do not want every employee to be able to view financials. This can be easily limited by creating an appropriate role with the permission to view such records and assigning it to authorized users.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Limiting_Permissions_to_Perform_Actions\"><\/span>Limiting Permissions to Perform Actions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security role configuration also includes the actions users can perform in your system. Obviously, not all users need broad permissions to interact with the ERP software.<\/p>\n<p>For instance, if you want your vendors to work with your system, it is unlikely that you will grant them advanced permissions to edit your records or workflows. Most likely, you would prefer to limit interactions to viewing their own purchase orders and invoices.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cost_Management\"><\/span>Cost Management<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As mentioned earlier, the licensing cost of your ERP system depends on the access you want to grant to its users. Whether you value security more or cost is your primary concern, you can save money if you create precise security roles and assign them to the right users.<\/p>\n<p>You can understand the possibilities for savings even when you think about the previous example. Payments for users who can only view invoices and purchase orders are much lower than the cost of having a user with ultimate access to all applications, records and activities.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Accurate_Security_Configuration_for_Effective_Operations\"><\/span>Accurate Security Configuration for Effective Operations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Proper security configuration has many benefits for your business, but it can also be somewhat challenging, especially when you need to change access rights or create new roles under time pressure. Building an optimal security plan for a large organization can take more than a year.<\/p>\n<p>To speed up this process and eliminate possible errors, you can use the Security Setup tool for Microsoft Dynamics 365 from Executive Automats. This solution can automatically analyze workflows as well as data used for testing to generate security role suggestions. It is also an efficient way to address any changes in your company and keep your security configuration up-to-date with frequent and quick reviews.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Microsoft Dynamics 365 security is based on security roles. A role identifies the scope of access to different areas of the ERP system, as well as the permissions to interact with records and processes. At the same time, the security configuration has a direct impact on the license cost which depends on the number of<\/p>\n","protected":false},"author":2,"featured_media":4047,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":{"0":"post-4046","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-dynamics-365"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Dynamics 365 Security Configuration in Examples - Seeromega ERP CRM Software Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dynamics 365 Security Configuration in Examples\" \/>\n<meta property=\"og:description\" content=\"\u00a0Microsoft Dynamics 365 security is based on security roles. A role identifies the scope of access to different areas of the ERP system, as well as the permissions to interact with records and processes. At the same time, the security configuration has a direct impact on the license cost which depends on the number of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/\" \/>\n<meta property=\"og:site_name\" content=\"Seeromega ERP CRM Software Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/seeromegablog\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-31T18:17:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-07T17:00:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seeromega.com\/erpcrm\/wp-content\/uploads\/2023\/01\/dynamics-365.png\" \/>\n\t<meta property=\"og:image:width\" content=\"951\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Micah Phillips\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micah Phillips\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/\"},\"author\":{\"name\":\"Micah Phillips\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/#\\\/schema\\\/person\\\/fea91100378ca29c31a788ad5336f507\"},\"headline\":\"Dynamics 365 Security Configuration in Examples\",\"datePublished\":\"2023-01-31T18:17:20+00:00\",\"dateModified\":\"2023-02-07T17:00:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/\"},\"wordCount\":564,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/dynamics-365.png\",\"articleSection\":[\"Dynamics 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/\",\"url\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/\",\"name\":\"Dynamics 365 Security Configuration in Examples - Seeromega ERP CRM Software Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/dynamics-365.png\",\"datePublished\":\"2023-01-31T18:17:20+00:00\",\"dateModified\":\"2023-02-07T17:00:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/#\\\/schema\\\/person\\\/fea91100378ca29c31a788ad5336f507\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/dynamics-365.png\",\"contentUrl\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/dynamics-365.png\",\"width\":951,\"height\":567,\"caption\":\"dynamics 365\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/dynamics-365-security-configuration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dynamics 365 Security Configuration in Examples\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/#website\",\"url\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/\",\"name\":\"ERP CRM Software Blog-List your business now - Seeromega\",\"description\":\"Discover the Best ERP &amp; CRM Solutions, Software, and Service Providers in One Place\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seeromega.com\\\/erpcrm\\\/#\\\/schema\\\/person\\\/fea91100378ca29c31a788ad5336f507\",\"name\":\"Micah Phillips\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/31f4a7e344d73e4ac0cb5a8d54ba2210cbba06c2389bbd18a57e46d7f54d1ec6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/31f4a7e344d73e4ac0cb5a8d54ba2210cbba06c2389bbd18a57e46d7f54d1ec6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/31f4a7e344d73e4ac0cb5a8d54ba2210cbba06c2389bbd18a57e46d7f54d1ec6?s=96&d=mm&r=g\",\"caption\":\"Micah Phillips\"},\"description\":\"Micah Philips is a well-known writer and we can understand how fantastic writer he is. His extreme and overwhelming writing style have touched the mind of many as he always writes factual matter that is informational and is capable of sharing with others as well. His words are meaningful, and the readers really enjoy reading his written articles &amp; blogs.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dynamics 365 Security Configuration in Examples - Seeromega ERP CRM Software Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/","og_locale":"en_US","og_type":"article","og_title":"Dynamics 365 Security Configuration in Examples","og_description":"\u00a0Microsoft Dynamics 365 security is based on security roles. A role identifies the scope of access to different areas of the ERP system, as well as the permissions to interact with records and processes. At the same time, the security configuration has a direct impact on the license cost which depends on the number of","og_url":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/","og_site_name":"Seeromega ERP CRM Software Blogs","article_publisher":"https:\/\/www.facebook.com\/seeromegablog\/","article_published_time":"2023-01-31T18:17:20+00:00","article_modified_time":"2023-02-07T17:00:14+00:00","og_image":[{"width":951,"height":567,"url":"https:\/\/seeromega.com\/erpcrm\/wp-content\/uploads\/2023\/01\/dynamics-365.png","type":"image\/png"}],"author":"Micah Phillips","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Micah Phillips","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#article","isPartOf":{"@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/"},"author":{"name":"Micah Phillips","@id":"https:\/\/seeromega.com\/erpcrm\/#\/schema\/person\/fea91100378ca29c31a788ad5336f507"},"headline":"Dynamics 365 Security Configuration in Examples","datePublished":"2023-01-31T18:17:20+00:00","dateModified":"2023-02-07T17:00:14+00:00","mainEntityOfPage":{"@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/"},"wordCount":564,"commentCount":0,"image":{"@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/seeromega.com\/erpcrm\/wp-content\/uploads\/2023\/01\/dynamics-365.png","articleSection":["Dynamics 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/seeromega.com\/erpcrm\/#organization"}},{"@type":"WebPage","@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/","url":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/","name":"Dynamics 365 Security Configuration in Examples - Seeromega ERP CRM Software Blogs","isPartOf":{"@id":"https:\/\/seeromega.com\/erpcrm\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#primaryimage"},"image":{"@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/seeromega.com\/erpcrm\/wp-content\/uploads\/2023\/01\/dynamics-365.png","datePublished":"2023-01-31T18:17:20+00:00","dateModified":"2023-02-07T17:00:14+00:00","author":{"@id":"https:\/\/seeromega.com\/erpcrm\/#\/schema\/person\/fea91100378ca29c31a788ad5336f507"},"breadcrumb":{"@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#primaryimage","url":"https:\/\/seeromega.com\/erpcrm\/wp-content\/uploads\/2023\/01\/dynamics-365.png","contentUrl":"https:\/\/seeromega.com\/erpcrm\/wp-content\/uploads\/2023\/01\/dynamics-365.png","width":951,"height":567,"caption":"dynamics 365"},{"@type":"BreadcrumbList","@id":"https:\/\/seeromega.com\/erpcrm\/dynamics-365-security-configuration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seeromega.com\/erpcrm\/"},{"@type":"ListItem","position":2,"name":"Dynamics 365 Security Configuration in Examples"}]},{"@type":"WebSite","@id":"https:\/\/seeromega.com\/erpcrm\/#website","url":"https:\/\/seeromega.com\/erpcrm\/","name":"ERP CRM Software Blog-List your business now - Seeromega","description":"Discover the Best ERP &amp; CRM Solutions, Software, and Service Providers in One Place","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seeromega.com\/erpcrm\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/seeromega.com\/erpcrm\/#\/schema\/person\/fea91100378ca29c31a788ad5336f507","name":"Micah Phillips","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/31f4a7e344d73e4ac0cb5a8d54ba2210cbba06c2389bbd18a57e46d7f54d1ec6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/31f4a7e344d73e4ac0cb5a8d54ba2210cbba06c2389bbd18a57e46d7f54d1ec6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/31f4a7e344d73e4ac0cb5a8d54ba2210cbba06c2389bbd18a57e46d7f54d1ec6?s=96&d=mm&r=g","caption":"Micah Phillips"},"description":"Micah Philips is a well-known writer and we can understand how fantastic writer he is. His extreme and overwhelming writing style have touched the mind of many as he always writes factual matter that is informational and is capable of sharing with others as well. His words are meaningful, and the readers really enjoy reading his written articles &amp; blogs."}]}},"_links":{"self":[{"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/posts\/4046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/comments?post=4046"}],"version-history":[{"count":1,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/posts\/4046\/revisions"}],"predecessor-version":[{"id":4048,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/posts\/4046\/revisions\/4048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/media\/4047"}],"wp:attachment":[{"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/media?parent=4046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/categories?post=4046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seeromega.com\/erpcrm\/wp-json\/wp\/v2\/tags?post=4046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}