{"id":261051,"date":"2023-06-21T17:36:20","date_gmt":"2023-06-21T14:36:20","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-set-up-a-yubikey-in-linux-using-call-response"},"modified":"2023-06-22T18:07:52","modified_gmt":"2023-06-22T15:07:52","slug":"how-to-set-up-a-yubikey-in-linux-using-call-response","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-set-up-a-yubikey-in-linux-using-call-response","title":{"rendered":"How to set up a YubiKey in Linux using call-response"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.8em&#8221; background_color=&#8221;#efefef&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;2%|4%|2%|4%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">YubiKey hardware security keys make your system more secure. And the procedure of logging into accounts is faster and more convenient. Follow the instructions below to easily add the required settings on your Linux system.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Setting up the YubiKey in Linux is quite different from setting up in other OSes, for example in <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/using-yubikey-with-windows-10\"><span style=\"font-weight: 400;\">Windows<\/span><\/a><span style=\"font-weight: 400;\">. First, you will need to perform operations through the terminal, not through the user interface. Secondly, you will need to make not one, but a number of settings so that hackers cannot bypass certain restrictions, while you do not block access to the system yourself. The following actions are meant:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#1\">installing Yubico software;<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#2\">setting up and binding the YubiKey security key;<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#3\">setting up the system to use keys;<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#4\">elimination of possible malfunctions.<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you know English well, you can watch<\/span> <a href=\"https:\/\/www.youtube.com\/watch?v=lrFcngyIJlo\"><span style=\"font-weight: 400;\">this video<\/span><\/a><span style=\"font-weight: 400;\">, it is about setting up using HMAC-SHA1 protocol. If you&#8217;re more comfortable with a text format, check out the text version of the instructions below. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">If you plan to use Security Key or YubiKey Bio series keys, please refer to the instructions for configuring keys<\/span><\/i> <a href=\"https:\/\/docs.google.com\/document\/d\/1EfWtRsGVaOGEaA1FE-HcjA8nxIU2RGIx6FBW_YbkpHs\/edit#\"><i><span style=\"font-weight: 400;\">using the U2F function<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<h2><b>Compatible keys<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Depending on how you want to configure your system (via HMAC-SHA1 or U2F) you will need to select compatible keys. Series 5 or FIPS keys are suitable for login without a password or two-factor authentication. But the Bio or Security Key series can only be used for U2F. <\/span><\/p>\n<h2 id=\"1\"><b>Ways to install Yubico software<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">There are several ways to install Yubico software on Linux:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">by installing the Yubico Authenticator;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">by installing YubiKey Manager;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">using built-in repositories;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">using Yubico&#8217;s PPA packages;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">by compiling from the source code.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">More information in the article: \u201c<\/span><a href=\"https:\/\/docs.google.com\/document\/d\/1wEiP9qxcAMiGZtmMXcJ52BeNe0eEQR_GpzDO8pJzpuk\/edit#\"><span style=\"font-weight: 400;\">How to install Yubico software on Linux<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/p>\n<h2 id=\"2\"><b>Configuring the YubiKey security key<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Consider setting up a YubiKey on an Ubuntu system using the HMAC-SHA1 challenge-response function. Based on this example, you will be able to make similar settings in systems similar to Ubuntu.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open a terminal and run the command to install the software for Ubuntu: <\/span><span style=\"font-weight: 400;\"><code>sudo apt install libpam-yubico yubikey-manager<\/code><\/span><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Insert the YubiKey. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Run the command: <\/span><span style=\"font-weight: 400;\"><code>ykman otp chalresp -g 2<\/code><\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Confirm the settings by pressing the key <\/span><b>Y<\/b><span style=\"font-weight: 400;\">, then <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">To bind the key to the account, run the command: <\/span><span style=\"font-weight: 400;\"><code>ykpamcfg -2<\/code><\/span><span style=\"font-weight: 400;\">. After that, you should receive confirmation from the system in the format: <\/span><span style=\"font-weight: 400;\"><code>\u00ab\u0417\u0431\u0435\u0440\u0435\u0436\u0435\u043d\u0438\u0439 \u043f\u043e\u0447\u0430\u0442\u043a\u043e\u0432\u0438\u0439 \u0432\u0438\u043a\u043b\u0438\u043a\u00bb, \u00ab\/home\/&lt;USER&gt;\/.yubico\/challenge-&lt;SERIAL&gt;\u00bb<\/code><\/span><span style=\"font-weight: 400;\">. where in place <\/span><span style=\"font-weight: 400;\"><code>&lt;USER&gt; <\/code><\/span><span style=\"font-weight: 400;\">will be your username, and instead <\/span><span style=\"font-weight: 400;\"><code>&lt;SERIAL&gt;<\/code> <\/span><span style=\"font-weight: 400;\">\u2014 the serial number of the YubiKey. If the file does not run, go to \u201c<\/span><a href=\"#4\"><span style=\"font-weight: 400;\">Troubleshoot<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In order not to lose access to your personal device in case you lose the key, we recommend adding a spare hardware device. To do this, you will need to repeat the same operations as when adding the first key. If you don&#8217;t have a spare key yet, you can come back to this step later.<\/span><\/p>\n<p><b>To set up an additional level of security, <\/b><span style=\"font-weight: 400;\">you<\/span> <span style=\"font-weight: 400;\">need to move the file <\/span><b>challenge-&lt;SERIAL&gt;<\/b><span style=\"font-weight: 400;\"> to an OS directory where you will need to get sudo permission to edit the file (eg <\/span><span style=\"font-weight: 400;\">\/etc<\/span><span style=\"font-weight: 400;\">). To do this, follow these steps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a named directory <\/span><b>yubico (sudo mkdir \/etc\/yubico)<\/b><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Move the call-response file to <\/span><b>\/etc\/yubico<\/b><span style=\"font-weight: 400;\">, while instead of <\/span><span style=\"font-weight: 400;\">challenge-&lt;SERIAL&gt;<\/span><span style=\"font-weight: 400;\"> should be written <\/span><span style=\"font-weight: 400;\">username-&lt;SERIAL&gt;<\/span><span style=\"font-weight: 400;\">. To move a file from <\/span><strong>~\/.yubico \u0434\u043e \/etc\/yubico<\/strong><span style=\"font-weight: 400;\"> and rename the login user, run the command: <\/span> <span style=\"font-weight: 400;\"><code>sudo mv ~\/.yubico\/challenge-&lt;SERIAL&gt; \/etc\/yubico\/`whoami`-&lt;SERIAL&gt;<\/code><\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">After the file <\/span><b>challenge-&lt;SERIAL&gt;<\/b> <span style=\"font-weight: 400;\">will be moved to a safe location, the PAM file will also need to be modified for it to work correctly. To do this, you will need to add to the configuration of the PAM file &#8220;<\/span><span style=\"font-weight: 400;\"><code>chalresp_path=\/etc\/yubico<\/code><\/span><span style=\"font-weight: 400;\">&#8221; at the end.<\/span><\/p>\n<p><b>Note that<\/b><span style=\"font-weight: 400;\">after performing these steps, you will not be able to modify the file if you lose the key. This can lead to blocking of access. So we don&#8217;t recommend doing this step without adding a backup security key.<\/span><\/p>\n<h2 id=\"3\"><b>Configuring the system to use security keys<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">In this section, we&#8217;ll look at how to configure keys using sudo commands without locking yourself out. We will also consider how to fix the system in case of errors. <\/span><\/p>\n<h3><b>The debug log<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If you&#8217;re having trouble logging in, you can turn on the debugging system to find the cause. To do this, launch Terminal and specify: <\/span><span style=\"font-weight: 400;\"><code>sudo touch \/var\/log\/pam_yubico.log<\/code><\/span><span style=\"font-weight: 400;\">. Next, find the line <\/span><strong>pam_yubico.so<\/strong><span style=\"font-weight: 400;\"> and add at the end: \u201c<\/span><span style=\"font-weight: 400;\"><code>debug debug_file=\/var\/log\/pam_yubico.log\u201d<\/code><\/span><span style=\"font-weight: 400;\">.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">After that, all the events will be saved in the debug log, and you can find the error and fix it. If you don&#8217;t need the debug log, you can disable it by removing the line \u201c<\/span><span style=\"font-weight: 400;\">debug debug_file=\/var\/log\/pam_yubico.log\u201d<\/span><span style=\"font-weight: 400;\"> from the files pam. <\/span> <\/p>\n<h3><b>The sudo Command<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Let&#8217;s wonder how to set up the system to vimagati the key when using the sudo command (this command helps to take away the privileges of the super-coordinator) and not to block yourself.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open the terminal and open the tax log.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a PAM configuration file, in which case it is set to:<\/span><\/li>\n<\/ol>\n<p><code><span style=\"font-weight: 400;\">#this will require password + YubiKey for Login<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">sudo nano \/etc\/pam.d\/yubico-required<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">auth required pam_yubico.so mode=challenge-response debug debug_file=\/var\/log\/pam_yubico.log<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">#This will only require YubiKey for Login<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">sudo nano \/etc\/pam.d\/yubico-sufficient<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">auth sufficient pam_yubico.so mode=challenge-response debug debug_file=\/var\/log\/pam_yubico.log<\/span><\/code><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Press<\/span> <b>Ctrl+X<\/b><span style=\"font-weight: 400;\">, then<\/span><b>Enter<\/b><span style=\"font-weight: 400;\">To save the file, but don&#8217;t close the terminal yet, otherwise you won&#8217;t be able to change anything else. You can have a look at:<\/span><\/li>\n<\/ol>\n<p><code><span style=\"font-weight: 400;\">sudo nano \/etc\/pam.d\/sudo <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">#for password + YubiKey<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">Add the line below the \u201c@include common-auth\u201d line. <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">@include yubico-required<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">#for YubiKey only <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">Add the line above the \u201c@include common-auth\u201d line. <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">@include yubico-sufficient<\/span><\/code><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remove the YubiKey from the computer. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Start a new terminal and enter the command: <\/span><span style=\"font-weight: 400;\"><code>sudo echo test<\/code><\/span><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If any program asks you for a password. Enter it and press <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">If the key is not inserted, authentication may fail. Well, it went well, otherwise look for pardons in the file changes <\/span><b>\/etc\/pam .d\/sudo<\/b><span style=\"font-weight: 400;\">, otherwise, check that you have correctly installed the Yubico PAM module.<\/span><\/li>\n<\/ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Insert the security key and open the new terminal.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Re-enter <\/span><span style=\"font-weight: 400;\">sudo echo test<\/span><span style=\"font-weight: 400;\">, then, if the program needs a password, enter the password and type <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">If the authorization with the updated key was successful, it means that you correctly set the key for the system. There is a need to close the system to fix the system for supplying the selected key at the entrance. <\/span><\/li>\n<\/ol>\n<\/ol>\n<h3><b>Configuring the system for a remote key when entering the system<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open the terminal and enter the command: <\/span><span style=\"font-weight: 400;\"><code>sudo nano \/etc\/pam.d\/gdm-password<\/code><\/span><span style=\"font-weight: 400;\">. You should receive an answer:<\/span><\/li>\n<\/ol>\n<p><code><span style=\"font-weight: 400;\">#for Password + YubiKey<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">Add the line below the \u201c@include common-auth\u201d line. <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">@include yubico-required<\/span><\/code><\/p>\n<p>&nbsp;<\/p>\n<p><code><span style=\"font-weight: 400;\">#for YubiKey only <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">Add the line above the \u201c@include common-auth\u201d line. <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">@include yubico-sufficient<\/span><\/code><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">After that, press <\/span><b>Ctrl+X<\/b><span style=\"font-weight: 400;\">, then <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">, to save the settings.<\/span><\/li>\n<\/ol>\n<h3><b>System settings on demand when using the terminal<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the same way, you can configure the terminal, only by entering a slightly different command: <\/span><span style=\"font-weight: 400;\">sudo nano \/etc\/pam.d\/login<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2 id=\"4\"><b>Elimination of possible malfunctions<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Sometimes, even during the launch of the file <\/span><b>ykpamcfg -2<\/b><span style=\"font-weight: 400;\">,<\/span> <span style=\"font-weight: 400;\">you can<\/span> <span style=\"font-weight: 400;\">see an error as if the file already exists. This can happen if one of the YubiKeys was previously bound to the system. To clear the association with the old hardware and add the new key, run the command in the terminal: <\/span><span style=\"font-weight: 400;\"><code>rm ~\/.yubico\/challenge-&lt;SERIAL&gt;<\/code><\/span><span style=\"font-weight: 400;\">. Only instead of <\/span><span style=\"font-weight: 400;\"><code>&lt;SERIAL&gt; <\/code><\/span><span style=\"font-weight: 400;\">enter the serial number of the new key. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This completes our instruction. If you have not yet chosen a key, or are looking for a spare hardware device, we invite you to view the offers in our <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><span style=\"font-weight: 400;\">online store<\/span><\/a><span style=\"font-weight: 400;\">. If you have any questions about key compatibility, please contact <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/contacts\"><span style=\"font-weight: 400;\">our managers<\/span><\/a><span style=\"font-weight: 400;\">. <\/span> <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_enable_mask_style=&#8221;on&#8221; background_mask_style=&#8221;honeycomb&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Similar materials in the Knowledge Base<\/h2>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;399&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>YubiKey hardware security keys make your system more secure. And the procedure of logging into accounts is faster and more convenient. Follow the instructions below to easily add the required settings on your Linux system.Setting up the YubiKey in Linux is quite different from setting up in other OSes, for example in Windows. First, you [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":261054,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Configuring the YubiKey on Linux using the call-response function","_seopress_titles_desc":"Setting up YubiKey in Linux is quite different from setting up in other OS. We will tell you which one and how to install it.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[402,439],"tags":[],"class_list":["post-261051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-settings","category-settings-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=261051"}],"version-history":[{"count":5,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261051\/revisions"}],"predecessor-version":[{"id":261118,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261051\/revisions\/261118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/261054"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=261051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=261051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=261051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}