{"id":1594,"date":"2018-08-13T08:21:08","date_gmt":"2018-08-13T08:21:08","guid":{"rendered":"http:\/\/dbtut.com\/?p=1594"},"modified":"2018-11-09T22:48:29","modified_gmt":"2018-11-09T22:48:29","slug":"tracking-configuration-changes-in-sap-ase-16","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/","title":{"rendered":"Tracking configuration changes in SAP ASE 16"},"content":{"rendered":"<h1>Introduction<\/h1>\n<p>A principal component of a protected system is accountability. One way to ensure accountability is to examine events on the system. Many events that occur in SAP ASE can be recorded, such as \u2013 but not limited to &#8211; DMLs and DDLs. Auditing is an important part of security in any RDBMS. By probing the audit trail, a Sytem Security Officer &#8211; SSO- can monitor the activity of specific users.<\/p>\n<p>Each audit record can capture the nature of the event, the date\/time, the login responsible for it, and the success or failure of the event. The <em>audit trail<\/em>, or log of audit records, allows the SSO to reconstruct events that occurred on the system and evaluate their impact on ASE.<\/p>\n<p>One major enhancement introduced in SAP ASE 16, is the possibility to track configuration changes. For several years, DBAs were relying on their own scripts built around \u201csysconfigures\u201d and \u201csyscurconfigs\u201d system tables to gather such info.<\/p>\n<h1>Tracking configuration changes<\/h1>\n<p>A new feature is introduced in SAP ASE 16 that allows a DBA to track the configuration changes done on SAP ASE. This is a new enhancement done on the \u201csybsecurity\u201d database. Using the SAP ASE security database, one can easily track modifications done on configuration parameters. Installing \u201csybsecurity\u201d database is mandatory to be able to implement this new functionality. Refer to the following link for installing \u201csybsecurity\u201d database: <a href=\"https:\/\/help.sap.com\/viewer\/c06a453f9967403e975210b1b335765b\/16.0.2.2\/en-US\/a66d26ccbc2b1014908781a76829be08.html\">Install the Audit System<\/a><\/p>\n<h1><a name=\"_Toc515445050\"><\/a>Auditing configuration changes<\/h1>\n<p>Once the audit system is installed and configured, you only need to apply the below set of commands:<\/p>\n<pre class=\"lang:default decode:true\">sp_audit \"config_history\", \"all\", \"all\", \"on\"\r\ngo\r\nsp_configure 'auditing', 1\r\ngo\r\nuse sybsecurity\r\ngo\r\nsp_confighistory create_view\r\ngo<\/pre>\n<h1>Simulation \u2013 Tracking configuration changes<\/h1>\n<p>Once done, simulate some changes as below:<\/p>\n<pre class=\"lang:default decode:true\">sp_configure \"number of devices\", 20\r\ngo\r\nsp_configure \"audit queue size\", 400\r\ngo<\/pre>\n<p>&nbsp;<\/p>\n<p>Check the changes using: sp_confighistory<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png\" width=\"733\" height=\"94\" \/><\/p>\n<p>Happy auditing!<\/p>\n\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1594\" class=\"pvc_stats all  \" data-element-id=\"1594\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction A principal component of a protected system is accountability. One way to ensure accountability is to examine events on the system. Many events that occur in SAP ASE can be recorded, such as \u2013 but not limited to &#8211; DMLs and DDLs. Auditing is an important part of security in any RDBMS. By probing &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1594\" class=\"pvc_stats all  \" data-element-id=\"1594\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":99,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1319],"tags":[],"class_list":["post-1594","post","type-post","status-publish","format-standard","","category-sybase"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tracking configuration changes in SAP ASE 16 - Database Tutorials<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tracking configuration changes in SAP ASE 16 - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"Introduction A principal component of a protected system is accountability. One way to ensure accountability is to examine events on the system. Many events that occur in SAP ASE can be recorded, such as \u2013 but not limited to &#8211; DMLs and DDLs. Auditing is an important part of security in any RDBMS. By probing &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-13T08:21:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-09T22:48:29+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png\" \/>\n<meta name=\"author\" content=\"Marc Daccache\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marc Daccache\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\"},\"author\":{\"name\":\"Marc Daccache\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/9cd4ed3ea4987dc0853855f177c14042\"},\"headline\":\"Tracking configuration changes in SAP ASE 16\",\"datePublished\":\"2018-08-13T08:21:08+00:00\",\"dateModified\":\"2018-11-09T22:48:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\"},\"wordCount\":281,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png\",\"articleSection\":[\"Sybase\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\",\"name\":\"Tracking configuration changes in SAP ASE 16 - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png\",\"datePublished\":\"2018-08-13T08:21:08+00:00\",\"dateModified\":\"2018-11-09T22:48:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage\",\"url\":\"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png\",\"contentUrl\":\"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tracking configuration changes in SAP ASE 16\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/9cd4ed3ea4987dc0853855f177c14042\",\"name\":\"Marc Daccache\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5414eb7359d558a042184c2a32e7c482c047e610778b0ac78bc72ace53445c9a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5414eb7359d558a042184c2a32e7c482c047e610778b0ac78bc72ace53445c9a?s=96&d=mm&r=g\",\"caption\":\"Marc Daccache\"},\"url\":\"https:\/\/dbtut.com\/index.php\/author\/marcdaccache\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tracking configuration changes in SAP ASE 16 - Database Tutorials","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/","og_locale":"en_US","og_type":"article","og_title":"Tracking configuration changes in SAP ASE 16 - Database Tutorials","og_description":"Introduction A principal component of a protected system is accountability. One way to ensure accountability is to examine events on the system. Many events that occur in SAP ASE can be recorded, such as \u2013 but not limited to &#8211; DMLs and DDLs. Auditing is an important part of security in any RDBMS. By probing &hellip;","og_url":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/","og_site_name":"Database Tutorials","article_published_time":"2018-08-13T08:21:08+00:00","article_modified_time":"2018-11-09T22:48:29+00:00","og_image":[{"url":"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png","type":"","width":"","height":""}],"author":"Marc Daccache","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marc Daccache","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/"},"author":{"name":"Marc Daccache","@id":"https:\/\/dbtut.com\/#\/schema\/person\/9cd4ed3ea4987dc0853855f177c14042"},"headline":"Tracking configuration changes in SAP ASE 16","datePublished":"2018-08-13T08:21:08+00:00","dateModified":"2018-11-09T22:48:29+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/"},"wordCount":281,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage"},"thumbnailUrl":"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png","articleSection":["Sybase"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/","url":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/","name":"Tracking configuration changes in SAP ASE 16 - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage"},"thumbnailUrl":"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png","datePublished":"2018-08-13T08:21:08+00:00","dateModified":"2018-11-09T22:48:29+00:00","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#primaryimage","url":"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png","contentUrl":"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png"},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Tracking configuration changes in SAP ASE 16"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/9cd4ed3ea4987dc0853855f177c14042","name":"Marc Daccache","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5414eb7359d558a042184c2a32e7c482c047e610778b0ac78bc72ace53445c9a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5414eb7359d558a042184c2a32e7c482c047e610778b0ac78bc72ace53445c9a?s=96&d=mm&r=g","caption":"Marc Daccache"},"url":"https:\/\/dbtut.com\/index.php\/author\/marcdaccache\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/1594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/99"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=1594"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/1594\/revisions"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=1594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=1594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=1594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}