{"id":485,"date":"2019-11-08T11:17:54","date_gmt":"2019-11-08T11:17:54","guid":{"rendered":"http:\/\/opcconnect.integrationobjects.com\/?p=485"},"modified":"2026-03-12T13:25:12","modified_gmt":"2026-03-12T13:25:12","slug":"dcom-vulnerability-opc-alarm-systems","status":"publish","type":"post","link":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/","title":{"rendered":"Eliminate DCOM Vulnerabilities in Your Alarm Management System with OPCNet Broker &#038; OPC Easy Archiver"},"content":{"rendered":"\r\n<p data-start=\"626\" data-end=\"869\">Many industrial facilities still rely on OPC Classic technologies to manage alarms and events. However, these systems often expose organizations to serious DCOM vulnerabilities that affect reliability, security, and operational efficiency.<\/p>\r\n<p data-start=\"871\" data-end=\"1146\">DCOM was originally designed for local Windows communication and struggles to meet the requirements of modern industrial networks. As a result, engineers frequently face connection failures, firewall complications, and cybersecurity risks when managing OPC AE communications.<\/p>\r\n<p data-start=\"1148\" data-end=\"1390\">This article explains why <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/windows-itpro-blog\/dcom-authentication-hardening-what-you-need-to-know\/3657154\">DCOM vulnerabilities<\/a> remain a critical issue in industrial alarm systems and how a tunneling architecture combined with secure alarm archiving can eliminate these risks while improving reliability and compliance.<\/p>\r\n<h3>Why DCOM Vulnerabilities Persist in Industrial Alarm Systems<\/h3>\r\n<p>DCOM was never designed for today\u2019s segmented, security-focused industrial networks. Consequently, it introduces several DCOM vulnerabilities that impact cybersecurity, system stability, and engineering productivity.<\/p>\r\n<table style=\"height: 1368px;\" width=\"696\">\r\n<tbody>\r\n<tr>\r\n<td width=\"162\">\r\n<p><strong>1. High cybersecurity exposure<\/strong><\/p>\r\n<\/td>\r\n<td width=\"438\">\r\n<p data-start=\"1718\" data-end=\"1900\">DCOM communication requires dynamic port ranges to remain open across network segments. Unfortunately, this behavior significantly increases the attack surface of industrial systems.<\/p>\r\n<p data-start=\"1902\" data-end=\"2054\">Because of this, many organizations struggle to comply with cybersecurity frameworks such as ISA\/IEC 62443 when OPC AE relies on DCOM communication.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"162\">\r\n<p><strong>2. Complex firewall and domain rules<\/strong><\/p>\r\n<\/td>\r\n<td width=\"438\">\r\n<p data-start=\"2106\" data-end=\"2187\">Another major DCOM vulnerability is the complexity of firewall configuration.<\/p>\r\n<p data-start=\"2189\" data-end=\"2218\">DCOM communication relies on:<\/p>\r\n<ul data-start=\"2220\" data-end=\"2332\">\r\n<li data-section-id=\"16ka1hi\" data-start=\"2220\" data-end=\"2243\">\r\n<p data-start=\"2222\" data-end=\"2243\">Multiple open ports<\/p>\r\n<\/li>\r\n<li data-section-id=\"1urdkx4\" data-start=\"2244\" data-end=\"2269\">\r\n<p data-start=\"2246\" data-end=\"2269\">Domain authentication<\/p>\r\n<\/li>\r\n<li data-section-id=\"14i7763\" data-start=\"2270\" data-end=\"2301\">\r\n<p data-start=\"2272\" data-end=\"2301\">Bidirectional communication<\/p>\r\n<\/li>\r\n<li data-section-id=\"1e4ysdd\" data-start=\"2302\" data-end=\"2332\">\r\n<p data-start=\"2304\" data-end=\"2332\">RPC subsystem dependencies<\/p>\r\n<\/li>\r\n<\/ul>\r\n<p data-start=\"2334\" data-end=\"2432\">As a result, communication frequently fails when OPC AE servers operate across segmented networks.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"162\">\r\n<p><strong>3. Unreliable remote OPC connections<\/strong><\/p>\r\n<\/td>\r\n<td width=\"438\">\r\n<p data-start=\"2475\" data-end=\"2532\">DCOM also causes instability in distributed environments.<\/p>\r\n<p data-start=\"2534\" data-end=\"2563\">Connections often break when:<\/p>\r\n<ul data-start=\"2565\" data-end=\"2672\">\r\n<li data-section-id=\"1tgkxqh\" data-start=\"2565\" data-end=\"2594\">\r\n<p data-start=\"2567\" data-end=\"2594\">Network latency increases<\/p>\r\n<\/li>\r\n<li data-section-id=\"1x3gvvt\" data-start=\"2595\" data-end=\"2614\">\r\n<p data-start=\"2597\" data-end=\"2614\">Servers restart<\/p>\r\n<\/li>\r\n<li data-section-id=\"c25f84\" data-start=\"2615\" data-end=\"2643\">\r\n<p data-start=\"2617\" data-end=\"2643\">VPN connections are used<\/p>\r\n<\/li>\r\n<li data-section-id=\"16z1wc0\" data-start=\"2644\" data-end=\"2672\">\r\n<p data-start=\"2646\" data-end=\"2672\">Domain boundaries change<\/p>\r\n<\/li>\r\n<\/ul>\r\n<p data-start=\"2674\" data-end=\"2792\">When these failures occur, engineers must manually reconnect clients, which increases the risk of alarm data loss.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"162\">\r\n<p><strong>4. No encryption for alarm and event traffic<\/strong><\/p>\r\n<\/td>\r\n<td width=\"438\">\r\n<p data-start=\"2843\" data-end=\"2928\">One of the most serious DCOM vulnerabilities is the absence of native encryption.<\/p>\r\n<p data-start=\"2930\" data-end=\"3128\">OPC AE communication over DCOM transmits alarm and event data in clear text unless additional security layers are implemented. Consequently, sensitive operational data may be exposed on the network.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"162\">\r\n<p><strong>5. Engineering time lost in troubleshooting<\/strong><\/p>\r\n<\/td>\r\n<td width=\"438\">\r\n<p style=\"text-align: left;\" data-start=\"3178\" data-end=\"3420\">DCOM misconfiguration remains one of the most common causes of OPC connectivity issues. Engineers frequently spend hours troubleshooting domain permissions, RPC dependencies, and firewall rules instead of focusing on operational improvements.<\/p>\r\n<p data-start=\"3422\" data-end=\"3626\">Because of these recurring problems, many industrial organizations are now looking for DCOM-free architectures that preserve their existing OPC infrastructure while improving security and reliability.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2 data-section-id=\"18c4kt7\" data-start=\"3633\" data-end=\"3690\">A Modern Architecture to Eliminate DCOM Vulnerabilities<\/h2>\r\n<p>A widely adopted method to eliminate DCOM in industrial systems is to use a tunneling layer that replaces DCOM communication with secure, encrypted channels. This architecture also enables centralized alarm collection, consistent database logging and simpler network segmentation.<\/p>\r\n<p>A modern DCOM-free architecture should provide:<\/p>\r\n<ul>\r\n<li>Encrypted communication between OPC AE servers and clients<\/li>\r\n<li>Stable connections across domain boundaries and firewalls<\/li>\r\n<li>Authentication and least privilege access<\/li>\r\n<li>Store and forward mechanisms for resilience<\/li>\r\n<li>Cloud and on-premises database flexibility<\/li>\r\n<li>Easy deployment without changes to existing OPC AE servers<\/li>\r\n<\/ul>\r\n<p>This approach protects OT systems while still supporting legacy infrastructure.<\/p>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td width=\"300\">\r\n<ul>\r\n<li><a href=\"https:\/\/integrationobjects.com\/opc-products\/opc-tunneling\/opcnet-broker-da-hda-ae\/\"><strong>OPCNet Broker Free Trial<\/strong><\/a>\u00a0\u2013 Experience DCOM-free OPC tunneling firsthand<\/li>\r\n<\/ul>\r\n<\/td>\r\n<td width=\"300\">\r\n<ul>\r\n<li style=\"text-align: left;\"><a href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-data-archiving\/opc-easy-archiver\/\"><strong>OPC Easy Archiver Free Trial<\/strong><\/a>\u00a0\u2013 Test enterprise alarm archiving capabilities in your environment<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h3><strong>How the Architecture Works<\/strong><\/h3>\r\n<p>Below is the typical workflow that eliminates DCOM entirely and creates a secure alarm collection pipeline.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1630 aligncenter\" src=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/ONB-Architecture-1024x952.png\" alt=\"Eliminate DCOM security risks in industrial alarm management. \" width=\"472\" height=\"439\" srcset=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/ONB-Architecture-1024x952.png 1024w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/ONB-Architecture-300x279.png 300w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/ONB-Architecture-768x714.png 768w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/ONB-Architecture-1536x1428.png 1536w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/ONB-Architecture.png 1600w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/p>\r\n<ol>\r\n<li><strong>Server side tunneling: <\/strong>OPCNet Broker is installed near the OPC AE servers inside the secured control network. It communicates with the servers locally and securely tunnels the data.<\/li>\r\n<li><strong>Encrypted communication through firewalls: <\/strong>The tunnel crosses firewalled zones using predictable ports, which simplifies firewall rules and avoids opening RPC port ranges.<\/li>\r\n<li><strong>Client side tunneling: <\/strong>Another instance of OPCNet Broker\u00ae receives the data and exposes it locally as OPC AE.<\/li>\r\n<li><strong>Alarm collection and archiving: <\/strong>OPC Easy Archiver connects to this local endpoint, collects alarms in real time and stores them in the selected database.<\/li>\r\n<li><strong>Analytics and reporting: <\/strong>Business intelligence tools can use the structured alarm database for KPIs, compliance documentation and optimization initiatives.<\/li>\r\n<\/ol>\r\n<p>This architecture strengthens cybersecurity, increases reliability and simplifies maintenance.<\/p>\r\n<h3><strong>Security, Reliability and Compliance Benefits<\/strong><\/h3>\r\n<p>By eliminating DCOM, facilities gain several operational advantages<\/p>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td width=\"204\">\r\n<p><strong>Reinforced cybersecurity<\/strong><\/p>\r\n<\/td>\r\n<td width=\"396\">\r\n<ul>\r\n<li>Encrypted communication<\/li>\r\n<li>Predictable network rules<\/li>\r\n<li>Isolation of process control systems<\/li>\r\n<li>Authentication for alarm access<\/li>\r\n<li>Alignment with ISA IEC 62443 concepts<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"204\">\r\n<p><strong>Reliable alarm transmission<\/strong><\/p>\r\n<p>&nbsp;<\/p>\r\n<\/td>\r\n<td width=\"396\">\r\n<ul>\r\n<li>Stable communication across domains<\/li>\r\n<li>Automatic reconnection<\/li>\r\n<li>Store and forward protection during outages<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"204\">\r\n<p><strong>Cloud-ready workflows<\/strong><\/p>\r\n<p>&nbsp;<\/p>\r\n<\/td>\r\n<td width=\"396\">\r\n<p>With OPCNet Broker\u00ae protecting the OT perimeter, OPC Easy Archiver can store alarms into cloud databases like Azure SQL without exposing the control network.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"204\">\r\n<p><strong>Streamlined compliance and reporting<\/strong><\/p>\r\n<\/td>\r\n<td width=\"396\">\r\n<p>Historical alarm data supports:<\/p>\r\n<ul>\r\n<li>Audit trails<\/li>\r\n<li>Operator performance metrics<\/li>\r\n<li>Alarm rationalization programs<\/li>\r\n<li>Incident reviews<\/li>\r\n<li>Continuous improvement initiatives<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>Where This Architecture Delivers the Most Value<\/strong><\/h3>\r\n<p>This approach is widely used in:<\/p>\r\n<ul>\r\n<li>Chemical and petrochemical plants<\/li>\r\n<li>Power generation and utilities<\/li>\r\n<li>Water and wastewater facilities<\/li>\r\n<li>Food and beverage operations<\/li>\r\n<li>Pharmaceutical manufacturing<\/li>\r\n<li>Oil and gas upstream, midstream and downstream<\/li>\r\n<li>Critical buildings and hospitals<\/li>\r\n<\/ul>\r\n<p>Any site with legacy OPC AE running over DCOM benefits from this modernization.<\/p>\r\n<h2><strong>Conclusion<\/strong><\/h2>\r\n<p>DCOM has become a significant obstacle in modern industrial environments. It introduces avoidable security risks, complicates firewall configurations and causes recurring communication failures. By adopting a tunneling architecture with structured alarm archiving, facilities can gain higher security, improved reliability and a more sustainable alarm management system.<\/p>\r\n<p>OPCNet Broker\u00ae removes DCOM entirely and secures alarm traffic. OPC Easy Archiver provides a robust historian for long-term storage, analysis and compliance.<\/p>\r\n<p>Together they deliver modern, reliable and cloud-ready architecture for OPC AE alarm management.<\/p>\r\n<p><em><strong>Related Resources:<\/strong><\/em><\/p>\r\n<ul>\r\n<li><a href=\"https:\/\/integrationobjects.com\/resources\/white-papers\/industrial-network-security-opc-tunneling\/\"><strong>White Paper: Industrial Network Security with OPC Tunneling<\/strong><\/a><\/li>\r\n<li><a href=\"https:\/\/integrationobjects.com\/blog\/tutorial-store-opc-alarms-events-in-sql\/\"><strong>Video Tutorial: How to Store OPC Alarms &amp; Events in SQL Database<\/strong><\/a>\u00a0<\/li>\r\n<li><a href=\"https:\/\/integrationobjects.com\/FileDownload\/PDF\/OPCAEArchiverUserGuide1.5Rev2.pdf\"><strong>OPC AE Archiver User Guide<\/strong><\/a>\u00a0<\/li>\r\n<\/ul>\r\n","protected":false},"excerpt":{"rendered":"<p>Many industrial facilities still rely on OPC Classic technologies to manage alarms and events. However, these systems often expose organizations to serious DCOM vulnerabilities that<\/p>\n","protected":false},"author":1,"featured_media":1631,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[189,185],"tags":[53,49],"class_list":["post-485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opc-data-archiving","category-opc-tunneling","tag-opc-easy-archiver","tag-opcnet-broker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DCOM Vulnerability in OPC Alarm Systems: How to Eliminate It<\/title>\n<meta name=\"description\" content=\"Eliminate DCOM vulnerability in OPC alarm systems. Learn how secure OPC tunneling and alarm archiving improve reliability, cybersecurity, and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DCOM Vulnerability in OPC Alarm Systems: How to Eliminate It\" \/>\n<meta property=\"og:description\" content=\"Eliminate DCOM vulnerability in OPC alarm systems. Learn how secure OPC tunneling and alarm archiving improve reliability, cybersecurity, and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"OPC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Integration.Objects.OPC\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-08T11:17:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:25:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/Your-paragraph-text-24.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"OPCBlogAdmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:site\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OPCBlogAdmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DCOM Vulnerability in OPC Alarm Systems: How to Eliminate It","description":"Eliminate DCOM vulnerability in OPC alarm systems. Learn how secure OPC tunneling and alarm archiving improve reliability, cybersecurity, and compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/","og_locale":"en_US","og_type":"article","og_title":"DCOM Vulnerability in OPC Alarm Systems: How to Eliminate It","og_description":"Eliminate DCOM vulnerability in OPC alarm systems. Learn how secure OPC tunneling and alarm archiving improve reliability, cybersecurity, and compliance.","og_url":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/","og_site_name":"OPC Blog","article_publisher":"https:\/\/www.facebook.com\/Integration.Objects.OPC\/","article_published_time":"2019-11-08T11:17:54+00:00","article_modified_time":"2026-03-12T13:25:12+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/Your-paragraph-text-24.png","type":"image\/png"}],"author":"OPCBlogAdmin","twitter_card":"summary_large_image","twitter_creator":"@IntegObjects","twitter_site":"@IntegObjects","twitter_misc":{"Written by":"OPCBlogAdmin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/","url":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/","name":"DCOM Vulnerability in OPC Alarm Systems: How to Eliminate It","isPartOf":{"@id":"https:\/\/integrationobjects.com\/blog-\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/#primaryimage"},"image":{"@id":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/Your-paragraph-text-24.png","datePublished":"2019-11-08T11:17:54+00:00","dateModified":"2026-03-12T13:25:12+00:00","author":{"@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b"},"description":"Eliminate DCOM vulnerability in OPC alarm systems. Learn how secure OPC tunneling and alarm archiving improve reliability, cybersecurity, and compliance.","breadcrumb":{"@id":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/#primaryimage","url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/Your-paragraph-text-24.png","contentUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2019\/11\/Your-paragraph-text-24.png","width":800,"height":450,"caption":"DCOM Vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/integrationobjects.com\/blog\/dcom-vulnerability-opc-alarm-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrationobjects.com\/blog-\/"},{"@type":"ListItem","position":2,"name":"Eliminate DCOM Vulnerabilities in Your Alarm Management System with OPCNet Broker &#038; OPC Easy Archiver"}]},{"@type":"WebSite","@id":"https:\/\/integrationobjects.com\/blog-\/#website","url":"https:\/\/integrationobjects.com\/blog-\/","name":"OPC Blog","description":"OPC and related technologies news from Integration Objects","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrationobjects.com\/blog-\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b","name":"OPCBlogAdmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","caption":"OPCBlogAdmin"}}]}},"_links":{"self":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/comments?post=485"}],"version-history":[{"count":16,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/485\/revisions"}],"predecessor-version":[{"id":1726,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/485\/revisions\/1726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media\/1631"}],"wp:attachment":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media?parent=485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/categories?post=485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/tags?post=485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}