{"id":681,"date":"2026-03-19T19:45:13","date_gmt":"2026-03-19T19:45:13","guid":{"rendered":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/"},"modified":"2026-03-19T19:45:13","modified_gmt":"2026-03-19T19:45:13","slug":"2-way-ssl-breaks-when-your-cdn-touches-it-heres-why","status":"publish","type":"post","link":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/","title":{"rendered":"2-Way SSL Breaks When Your CDN Touches It (Here&#8217;s Why)"},"content":{"rendered":"<p>Mutual TLS authentication breaks the moment you introduce a CDN or reverse proxy because the edge terminates the client certificate handshake before your origin server ever sees it. Your backend loses the cryptographic proof of client identity that makes mTLS valuable\u2014the certificate chain stops at the CDN, not your application.<\/p>\n<p>This architectural conflict forces a choice: pass certificate data through headers (trusting your CDN to validate correctly), implement application-layer re-authentication between CDN and origin (doubling the handshake overhead), accept edge-only validation (shifting trust boundaries), or bypass the CDN entirely for sensitive endpoints (fragmenting your architecture). Each approach trades security guarantees against operational complexity.<\/p>\n<p>The solutions below explain how certificate termination actually works at the protocol level, why proxied environments break the trust chain, and specific implementation patterns for Cloudflare, Fastly, and AWS CloudFront that preserve client authentication without abandoning edge caching. You&#8217;ll see exact header configurations, connection reuse gotchas, and the precise security assumptions each workaround requires\u2014enough detail to choose the right tradeoff for your threat model and deploy it correctly the first time.<\/p>\n<h2>What 2-Way SSL Actually Does<\/h2>\n<p>Standard SSL\u2014the lock icon in your browser\u2014proves the server is who it claims to be. Your browser checks the server&#8217;s certificate, signed by a trusted authority, before exchanging encrypted traffic. The server never verifies you.<\/p>\n<p>2-way SSL, also called mutual TLS or mTLS, flips this into a two-sided handshake. The server presents its certificate as usual, but now the server also demands a certificate from the client. Both parties verify each other&#8217;s cryptographic identity before any application data flows.<\/p>\n<p>In practice: the client holds a private key and certificate (often installed in a browser, application, or operating system). During the TLS handshake, the server challenges the client to prove possession of that private key. Only clients with valid, server-approved certificates can establish the connection.<\/p>\n<p>This mutual authentication matters when you need machine-to-machine trust\u2014API gateways talking to backend services, IoT devices authenticating to cloud infrastructure, or internal tools restricting access to specific devices. Unlike password authentication, stolen credentials can&#8217;t be reused without also stealing the private key file.<\/p>\n<p>The tradeoff: certificate distribution and lifecycle management add operational complexity. You&#8217;re now issuing, rotating, and revoking certificates for potentially thousands of clients, not just servers.<\/p>\n<figure class=\"wp-block-image size-large\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"514\" src=\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/authentication-barrier-handshake.jpg\" alt=\"Two people shaking hands through a chain-link fence barrier\" class=\"wp-image-679\" srcset=\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/authentication-barrier-handshake.jpg 900w, https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/authentication-barrier-handshake-300x171.jpg 300w, https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/authentication-barrier-handshake-768x439.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption>Like a handshake interrupted by a barrier, CDN termination creates a break in the direct authentication chain between client and origin server.<\/figcaption><\/figure>\n<h2>The CDN Challenge: Who Validates What<\/h2>\n<h3>Edge-to-Client Authentication<\/h3>\n<p>When a CDN edge node terminates the TLS handshake, the client certificate typically stops there\u2014it doesn&#8217;t automatically forward to your origin server. The edge validates the certificate against its trust store during the handshake, confirms the client&#8217;s identity, then discards the cryptographic material. Your origin never sees the raw certificate.<\/p>\n<p>Some CDN providers extract claims from the validated certificate (subject DN, serial number, fingerprint) and pass them as HTTP headers to your origin. This gives you proof of authentication without re-implementing the full mTLS stack. Other providers offer passthrough modes where the edge proxies the encrypted tunnel end-to-end, preserving true mutual TLS but sacrificing caching and most edge optimizations. Without explicit forwarding configuration, your backend receives ordinary HTTPS requests with no client identity context.<\/p>\n<h3>Edge-to-Origin Authentication<\/h3>\n<p>When a CDN terminates the first TLS handshake, it decrypts the traffic completely before establishing a second, independent connection to your origin. This architecture means the origin server never sees the original client certificate\u2014only the CDN&#8217;s identity. The client&#8217;s cryptographic proof of identity exists solely in that first hop and cannot be forwarded through the decrypted tunnel.<\/p>\n<p>This creates a verification gap: your origin needs to authenticate clients, but the standard mTLS chain is broken at the edge. The CDN knows who the client is; the origin knows who the CDN is\u2014but the origin has no cryptographic way to verify the end client without additional mechanisms. Standard certificate forwarding via headers is not cryptographically secure since headers can be spoofed once inside the private network.<\/p>\n<p>You need explicit workarounds to bridge this gap and restore client authentication at the origin layer.<\/p>\n<figure class=\"wp-block-image size-large\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"514\" src=\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/multiple-authentication-keys.jpg\" alt=\"Three different security keys representing alternative authentication methods\" class=\"wp-image-680\" srcset=\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/multiple-authentication-keys.jpg 900w, https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/multiple-authentication-keys-300x171.jpg 300w, https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/multiple-authentication-keys-768x439.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption>Multiple authentication strategies exist to preserve security when traditional mutual TLS cannot work through CDN infrastructure.<\/figcaption><\/figure>\n<h2>Three Workarounds That Actually Function<\/h2>\n<h3>Certificate Pass-Through Headers<\/h3>\n<p>Many CDNs terminate SSL at the edge, then forward client certificate details to your origin server via custom HTTP headers\u2014typically X-Client-Cert, X-SSL-Client-DN, or similar. This lets your application logic authenticate users without handling raw TLS handshakes.<\/p>\n<p>The tradeoff: you&#8217;re trusting the CDN to validate certificates correctly and securely inject headers. If an attacker bypasses the CDN or the headers aren&#8217;t stripped from untrusted requests, they could forge credentials. This approach works when you control both CDN configuration and origin firewall rules, ensuring only CDN IPs can reach your backend and header sanitization is strict.<\/p>\n<p>Check your CDN&#8217;s documentation for supported header formats and validation options. Cloudflare, Fastly, and AWS CloudFront each implement slightly different schemes. For production workloads, combine header forwarding with IP allowlisting and consider signing the headers cryptographically if your CDN supports it.<\/p>\n<h3>CDN Bypass for Authenticated Routes<\/h3>\n<p>Some teams route authenticated endpoints directly to origin servers, bypassing the CDN entirely. This cleanly sidesteps the termination conflict: client certificates reach origin unmodified, CDN handles only public content. Implementation typically involves DNS splits (auth.example.com points directly to origin) or edge routing rules that forward specific paths upstream without caching.<\/p>\n<p>The tradeoff is meaningful. Direct-to-origin traffic loses geographic distribution, DDoS mitigation, and latency optimization that CDNs provide. If authenticated users represent significant traffic volume or need fast global access, performance degradation becomes noticeable. Security improves for certificate validation but your origin infrastructure now accepts internet traffic directly, requiring hardened firewalls and rate limiting you might have delegated to the CDN layer.<\/p>\n<p>Best for: low-traffic admin panels, internal tooling, or scenarios where authentication naturally segments from public pages. Evaluate whether your authenticated workload justifies losing edge acceleration.<\/p>\n<h3>Application-Layer Authentication Tokens<\/h3>\n<p>When CDN or load balancer termination breaks mTLS, many teams shift authentication into the application layer using bearer tokens in HTTP headers. JSON Web Tokens (JWT) carry signed claims about client identity\u2014the edge proxy validates an initial credential, then issues a short-lived token the backend trusts. OAuth 2.0 client credentials flow works similarly for service-to-service scenarios, trading a secret for a time-boxed access token.<\/p>\n<p>This approach separates transport security from authentication, letting you cache aggressively at the edge while still proving who&#8217;s calling your API. Tokens travel over standard HTTPS, so existing CDN infrastructure works without modification. The tradeoff: you&#8217;re now responsible for key rotation, token revocation, and replay protection\u2014problems mTLS handled at the protocol level.<\/p>\n<p>Choose application tokens when you need fine-grained permissions, integration with identity providers, or mobile clients that struggle with certificate provisioning. Stick with mTLS when hardware-backed certificates or zero-trust network segmentation matter more than edge caching flexibility.<\/p>\n<h2>When You Actually Need This<\/h2>\n<p>Two-way SSL through a CDN is overkill for most authentication needs. Consider it primarily when the client&#8217;s cryptographic identity\u2014not just a shared secret\u2014is your security anchor.<\/p>\n<p>API gateways serving enterprise partners who manage their own certificate infrastructure benefit most. If a partner rotates API keys monthly but maintains stable TLS certificates tied to their organization, mutual TLS offers less operational friction. Banking integrations, B2B SaaS platforms, and government data exchanges often mandate client certificates for auditability.<\/p>\n<p>IoT device fleets present another compelling case. When thousands of sensors or edge devices authenticate, embedding unique client certificates during manufacturing creates tamper-resistant identity. Revocation becomes certificate-based rather than managing per-device tokens across distributed systems. Medical devices, industrial controllers, and connected vehicles frequently use this pattern.<\/p>\n<p>Internal microservice authentication within zero-trust architectures increasingly relies on mutual TLS, though CDN involvement is rare here since traffic stays within private networks.<\/p>\n<p>For most scenarios\u2014single-page apps, mobile clients, typical REST APIs\u2014bearer tokens or OAuth flows are simpler and equally secure. The operational complexity of certificate lifecycle management, proper CDN passthrough configuration, and debugging encrypted handshake failures only pays off when you need cryptographically verifiable client identity at the transport layer. If your current authentication works and audit requirements don&#8217;t explicitly demand client certificates, the engineering cost likely exceeds the security benefit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mutual TLS authentication breaks the moment you introduce a CDN or reverse proxy because the edge terminates the client certificate&#8230;<\/p>\n","protected":false},"author":4,"featured_media":678,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network-architecture-hosting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2-Way SSL Breaks When Your CDN Touches It (Here&#039;s Why) - Hetneo&#039;s Links Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2-Way SSL Breaks When Your CDN Touches It (Here&#039;s Why) - Hetneo&#039;s Links Blog\" \/>\n<meta property=\"og:description\" content=\"Mutual TLS authentication breaks the moment you introduce a CDN or reverse proxy because the edge terminates the client certificate...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/\" \/>\n<meta property=\"og:site_name\" content=\"Hetneo&#039;s Links Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-19T19:45:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/authentication-barrier-handshake.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"514\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"madison\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@maddiehoulding\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"madison\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/\",\"url\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/\",\"name\":\"2-Way SSL Breaks When Your CDN Touches It (Here's Why) - Hetneo&#039;s Links Blog\",\"isPartOf\":{\"@id\":\"https:\/\/hetneo.link\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/mtls-broken-at-cdn-edge.jpeg\",\"datePublished\":\"2026-03-19T19:45:13+00:00\",\"author\":{\"@id\":\"https:\/\/hetneo.link\/blog\/#\/schema\/person\/6c6a683e9a50d03ee7fa5ac6432d56a6\"},\"breadcrumb\":{\"@id\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#primaryimage\",\"url\":\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/mtls-broken-at-cdn-edge.jpeg\",\"contentUrl\":\"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/mtls-broken-at-cdn-edge.jpeg\",\"width\":900,\"height\":514,\"caption\":\"Broken steel chain draped over a rack-mounted network device with a padlocked Ethernet cable in the foreground and blurred data center racks behind, symbolizing mTLS failing when a CDN terminates at the edge\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hetneo.link\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2-Way SSL Breaks When Your CDN Touches It (Here&#8217;s Why)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hetneo.link\/blog\/#website\",\"url\":\"https:\/\/hetneo.link\/blog\/\",\"name\":\"Hetneo's Links Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hetneo.link\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hetneo.link\/blog\/#\/schema\/person\/6c6a683e9a50d03ee7fa5ac6432d56a6\",\"name\":\"madison\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hetneo.link\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f4d2520c34ef92cc2328426bfca387d318cbd9a2eec2d15835a67cc4a3414cd7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f4d2520c34ef92cc2328426bfca387d318cbd9a2eec2d15835a67cc4a3414cd7?s=96&d=mm&r=g\",\"caption\":\"madison\"},\"description\":\"Content Manager at Hetneo's Links. Loves a clean brief, hates a buried lede. Probably editing something right now.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/madisonhoulding\/\",\"https:\/\/x.com\/maddiehoulding\"],\"url\":\"https:\/\/hetneo.link\/blog\/author\/madison\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2-Way SSL Breaks When Your CDN Touches It (Here's Why) - Hetneo&#039;s Links Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/","og_locale":"en_US","og_type":"article","og_title":"2-Way SSL Breaks When Your CDN Touches It (Here's Why) - Hetneo&#039;s Links Blog","og_description":"Mutual TLS authentication breaks the moment you introduce a CDN or reverse proxy because the edge terminates the client certificate...","og_url":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/","og_site_name":"Hetneo&#039;s Links Blog","article_published_time":"2026-03-19T19:45:13+00:00","og_image":[{"width":900,"height":514,"url":"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/authentication-barrier-handshake.jpg","type":"image\/jpeg"}],"author":"madison","twitter_card":"summary_large_image","twitter_creator":"@maddiehoulding","twitter_misc":{"Written by":"madison","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/","url":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/","name":"2-Way SSL Breaks When Your CDN Touches It (Here's Why) - Hetneo&#039;s Links Blog","isPartOf":{"@id":"https:\/\/hetneo.link\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#primaryimage"},"image":{"@id":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#primaryimage"},"thumbnailUrl":"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/mtls-broken-at-cdn-edge.jpeg","datePublished":"2026-03-19T19:45:13+00:00","author":{"@id":"https:\/\/hetneo.link\/blog\/#\/schema\/person\/6c6a683e9a50d03ee7fa5ac6432d56a6"},"breadcrumb":{"@id":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#primaryimage","url":"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/mtls-broken-at-cdn-edge.jpeg","contentUrl":"https:\/\/hetneo.link\/blog\/wp-content\/uploads\/2026\/03\/mtls-broken-at-cdn-edge.jpeg","width":900,"height":514,"caption":"Broken steel chain draped over a rack-mounted network device with a padlocked Ethernet cable in the foreground and blurred data center racks behind, symbolizing mTLS failing when a CDN terminates at the edge"},{"@type":"BreadcrumbList","@id":"https:\/\/hetneo.link\/blog\/2-way-ssl-breaks-when-your-cdn-touches-it-heres-why\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hetneo.link\/blog\/"},{"@type":"ListItem","position":2,"name":"2-Way SSL Breaks When Your CDN Touches It (Here&#8217;s Why)"}]},{"@type":"WebSite","@id":"https:\/\/hetneo.link\/blog\/#website","url":"https:\/\/hetneo.link\/blog\/","name":"Hetneo's Links Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hetneo.link\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hetneo.link\/blog\/#\/schema\/person\/6c6a683e9a50d03ee7fa5ac6432d56a6","name":"madison","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hetneo.link\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f4d2520c34ef92cc2328426bfca387d318cbd9a2eec2d15835a67cc4a3414cd7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4d2520c34ef92cc2328426bfca387d318cbd9a2eec2d15835a67cc4a3414cd7?s=96&d=mm&r=g","caption":"madison"},"description":"Content Manager at Hetneo's Links. Loves a clean brief, hates a buried lede. Probably editing something right now.","sameAs":["https:\/\/www.linkedin.com\/in\/madisonhoulding\/","https:\/\/x.com\/maddiehoulding"],"url":"https:\/\/hetneo.link\/blog\/author\/madison\/"}]}},"_links":{"self":[{"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/posts\/681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/comments?post=681"}],"version-history":[{"count":0,"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/posts\/681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/media\/678"}],"wp:attachment":[{"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/media?parent=681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/categories?post=681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hetneo.link\/blog\/wp-json\/wp\/v2\/tags?post=681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}