{"id":5430,"date":"2018-08-20T08:00:48","date_gmt":"2018-08-20T03:30:48","guid":{"rendered":"https:\/\/www.apk.co.ir\/security-center\/?p=5430"},"modified":"2018-08-20T08:00:48","modified_gmt":"2018-08-20T03:30:48","slug":"new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network","status":"publish","type":"manual_kb","link":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/","title":{"rendered":"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a"},"content":{"rendered":"

\u0627\u062e\u06cc\u0631\u0627 \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services<\/a> \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0645\u062a\u0639\u0644\u0642 \u0628\u0647 \u0634\u0631\u06a9\u062a \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\u060c \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062f\u0631 \u06a9\u0646\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0686\u0646\u062f\u0645\u0631\u062d\u0644\u0647\u200c\u0627\u06cc (Multi-Factor Authentication<\/a>)\u060c \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.<\/p>\n

\u0627\u06cc\u0646 \u0646\u0642\u0635\u060c \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u062f\u0648 \u0645\u0631\u062d\u0644\u0647\u200c\u0627\u06cc \u06a9\u0647 \u062f\u0631 \u06cc\u06a9 \u062d\u0633\u0627\u0628 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0631\u0627 \u0628\u0647 \u0633\u0627\u06cc\u0631 \u062d\u0633\u0627\u0628\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u062a\u0639\u0645\u06cc\u0645 \u0645\u06cc\u200c\u062f\u0647\u062f \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 \u0627\u06af\u0631 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u062f\u0686\u0627\u0631 \u0646\u0642\u0636 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0634\u0648\u062f \u062a\u0645\u0627\u0645\u06cc \u062d\u0633\u0627\u0628\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u062f\u0631 \u0633\u0627\u0632\u0645\u0627\u0646\u060c \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u062e\u0648\u0627\u0647\u0646\u062f \u06af\u0631\u0641\u062a. \u0627\u06a9\u062b\u0631 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u062d\u0641\u0627\u0638\u062a \u0627\u0632 \u0634\u0628\u06a9\u0647\u200c\u06cc \u062e\u0648\u062f\u060c \u0628\u0647 \u0647\u0645\u0631\u0627\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0686\u0646\u062f\u0645\u0631\u062d\u0644\u0647\u200c\u0627\u06cc \u0627\u0632 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f \u06a9\u0647 \u0634\u0627\u0645\u0644 \u062a\u0644\u0641\u0646 \u06cc\u0627 Token\u200c\u0647\u0627 \u0645\u06cc\u200c\u0628\u0627\u0634\u062f.<\/p>\n

\u0627\u0645\u0627 \u0627\u06af\u0631 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0628\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0633\u062f \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0648 Two-Factor Authentication \u0639\u0628\u0648\u0631 \u06a9\u0646\u062f\u060c \u0628\u0627 \u0648\u062c\u0648\u062f \u0627\u06cc\u0646 \u0636\u0639\u0641 \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 MFA \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\u060c \u0622\u0646 \u0645\u0647\u0627\u062c\u0645 \u062e\u0648\u0627\u0647\u062f \u062a\u0648\u0627\u0646\u0633\u062a \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0647\u0645\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u062f\u0648 \u0645\u0631\u062d\u0644\u0647\u200c\u0627\u06cc \u062a\u0645\u0627\u0645 \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0642\u0631\u0627\u0631 \u062f\u0647\u062f.<\/p>\n

\u0627\u06cc\u0646 \u0627\u0645\u0631 \u0628\u0631\u0627\u06cc \u0645\u0647\u0627\u062c\u0645\u06cc \u06a9\u0647 \u0628\u0647 \u0647\u062f\u0641 \u062e\u0648\u062f\u060c \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u062d\u062f\u0648\u062f\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f\u0647 \u0648 \u062e\u0648\u0627\u0647\u0627\u0646 \u06af\u0633\u062a\u0631\u0634 \u062d\u0645\u0644\u0647\u200c\u06cc \u062e\u0648\u062f \u0627\u0633\u062a\u060c \u0631\u0627\u0647\u06a9\u0627\u0631 \u0627\u0631\u0632\u0634\u0645\u0646\u062f\u06cc \u0645\u062d\u0633\u0648\u0628 \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n

\u0646\u062d\u0648\u0647 \u06a9\u0627\u0631 \u0622\u0633\u06cc\u0628<\/strong>\u200c<\/strong>\u067e\u0630\u06cc\u0631\u06cc <\/strong>ADFS<\/strong><\/p>\n

\u0628\u0627 \u0641\u0631\u0636 \u0627\u06cc\u0646\u06a9\u0647 \u0622\u0644\u06cc\u0633 \u0648 \u0628\u0627\u0628 \u0647\u0631 \u062f\u0648 \u062f\u0631 \u06cc\u06a9 \u0634\u0631\u06a9\u062a \u06a9\u0627\u0631 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f \u0648 \u0647\u0631 \u062f\u0648 \u062f\u0631 Active Directory \u06cc\u06a9\u0633\u0627\u0646\u06cc \u0647\u0633\u062a\u0646\u062f\u060c \u06a9\u0627\u0641\u06cc \u0627\u0633\u062a \u0645\u0647\u0627\u062c\u0645\u060c \u0646\u0627\u0645 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0648 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0622\u0644\u06cc\u0633 \u0631\u0627 \u0628\u062f\u0633\u062a \u0628\u06cc\u0627\u0648\u0631\u062f \u062a\u0627 \u0646\u0627\u0645 \u06a9\u0627\u0631\u0628\u0631\u06cc\u060c \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 Second Factor \u0628\u0627\u0628 \u0631\u0627 \u0646\u06cc\u0632 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0645\u0627\u06cc\u062f.<\/p>\n

\u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0647\u062f\u06cc\u062f \u062f\u0627\u062e\u0644\u06cc\u060c \u0627\u0632 \u062d\u0633\u0627\u0628\u200c\u0647\u0627\u06cc \u062f\u0627\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u0627\u06cc\u06cc\u0646 (Low Privileged) \u0648 \u06cc\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u0628\u0647 Helpdesk \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f\u0647 \u0648 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a Second Factor \u0631\u0627 \u0645\u062c\u062f\u062f\u0627 \u062a\u0646\u0638\u06cc\u0645 \u0646\u0645\u0627\u06cc\u062f.<\/p>\n

\u0645\u0647\u0627\u062c\u0645 \u0627\u0632 \u062d\u0645\u0644\u0647\u200c\u0647\u0627\u06cc Phishing \u060cBrute-Force \u0648 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u062f\u06cc\u06af\u0631 \u0628\u0631\u0627\u0633\u0627\u0633 \u0642\u0627\u0628\u0644\u06cc\u062a \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0646\u0645\u0627\u06cc\u062f \u062a\u0627 \u0646\u0627\u0645 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0648 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0622\u0644\u06cc\u0633 \u0631\u0627 \u0628\u062f\u0633\u062a \u0622\u0648\u0631\u062f.<\/p>\n

\u0633\u067e\u0633 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u062e\u0627\u0631\u062c\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0631\u0648\u0634 \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u06cc\u06a9\u0633\u0627\u0646\u06cc \u06a9\u0647 \u062f\u0627\u0631\u0627\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a Second Factor \u0646\u06cc\u0633\u062a\u060c \u0646\u0627\u0645 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0648 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0628\u0627\u0628 \u0631\u0627 \u0646\u06cc\u0632 \u0628\u062f\u0633\u062a \u0622\u0648\u0631\u0646\u062f.<\/p>\n

\u0627\u06af\u0631 \u0628\u0627\u0628 Second Factor \u062b\u0628\u062a \u0646\u06a9\u0631\u062f\u0647 \u0628\u0627\u0634\u062f\u060c \u0645\u0647\u0627\u062c\u0645 \u062a\u0644\u0641\u0646 \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 Second Factor \u062a\u0646\u0638\u06cc\u0645 \u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 \u0627\u0631\u0627\u0626\u0647 \u062f\u0647\u0646\u062f\u0647\u200c\u06cc MFA \u0641\u0631\u0627\u06cc\u0646\u062f \u062b\u0628\u062a \u0631\u0627 \u0628\u0647 \u0647\u0645\u0631\u0627\u0647 \u0645\u0647\u0627\u062c\u0645 \u0637\u06cc \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0627\u06cc\u0646 \u0627\u0645\u0631 \u062d\u0633\u0627\u0628 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0628\u0627\u0628 \u0631\u0627 \u062f\u0631 \u0627\u062e\u062a\u06cc\u0627\u0631 \u0645\u0647\u0627\u062c\u0645 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f. \u0645\u0647\u0627\u062c\u0645 \u0627\u06a9\u0646\u0648\u0646 \u0639\u0644\u0627\u0648\u0647\u200c \u0628\u0631 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0627\u0639\u062a\u0628\u0627\u0631\u06cc \u06a9\u0647 \u0627\u0632 \u0622\u0644\u06cc\u0633 \u062f\u0632\u062f\u06cc\u062f\u0647 \u0642\u0627\u062f\u0631 \u0627\u0633\u062a \u0628\u0647 \u0647\u0631 \u0646\u062d\u0648\u06cc \u06a9\u0647 \u062a\u0645\u0627\u06cc\u0644 \u062f\u0627\u0631\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0645\u0627\u06cc\u062f.<\/p>\n

\u0637\u0628\u0642 \u06af\u0641\u062a\u0647\u200c\u06cc \u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646\u060c \u062f\u0631\u062d\u0627\u0644\u06cc\u200c\u06a9\u0647 Notification\u0647\u0627\u06cc \u062a\u0644\u0641\u0646 \u0645\u062b\u0627\u0644\u06cc \u0645\u0644\u0645\u0648\u0633 \u0647\u0633\u062a\u0646\u062f\u060c \u0627\u06cc\u0646 \u062d\u0645\u0644\u0647 \u0628\u0627 \u0627\u0646\u0648\u0627\u0639 \u062f\u06cc\u06af\u0631 Second Factor \u0646\u06cc\u0632 \u0628\u0647 \u062e\u0648\u0628\u06cc \u06a9\u0627\u0631 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0633\u0631\u0648\u0631 AD \u0648 \u0627\u0631\u0627\u0626\u0647\u200c\u062f\u0647\u0646\u062f\u0647\u200c\u06cc MFA \u0627\u0632 MFA Context \u0648 MFA Token \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f \u062a\u0627 \u062c\u0631\u06cc\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a Second Factor \u0631\u0627 \u062a\u0646\u0638\u06cc\u0645 \u0646\u0645\u0627\u06cc\u0646\u062f.<\/p>\n

\u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u0645\u0647\u0627\u062c\u0645 \u0646\u0627\u0645 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0648 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0628\u0627\u0628 \u0631\u0627 \u062b\u0628\u062a \u0645\u06cc\u200c\u0646\u0645\u0627\u06cc\u062f\u060c \u062a\u0648\u0627\u0644\u06cc \u0645\u0634\u0627\u0628\u0647\u06cc \u0631\u062e \u0645\u06cc\u200c\u062f\u0647\u062f. \u0645\u0647\u0627\u062c\u0645 \u06cc\u06a9 \u06a9\u0648\u06a9\u06cc Session\u060c MFA Context \u0648 MFA Token \u0628\u0627\u0628 \u0631\u0627 \u062f\u0631\u06cc\u0627\u0641\u062a \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0627\u0645\u0627 \u0627\u06cc\u0646 \u0628\u0627\u0631 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u062c\u0631\u06cc\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a Second Factor \u0631\u0627 \u0628\u0631\u0627\u06cc Token \u0628\u0627\u0628 \u06a9\u0627\u0645\u0644 \u0646\u0645\u0627\u06cc\u062f. \u0627\u06cc\u0646 \u0641\u0631\u0627\u06cc\u0646\u062f \u0634\u0627\u0645\u0644 \u0627\u0631\u0633\u0627\u0644 Token \u0628\u0627\u0628 \u0628\u0647 MFA Provider \u0627\u0633\u062a \u06a9\u0647 \u0633\u067e\u0633 Notification\u06cc \u0631\u0627 \u0628\u0647 \u062a\u0644\u0641\u0646 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u0641\u0631\u0633\u062a\u062f \u0648 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u06af\u0632\u06cc\u0646\u0647\u200c\u06cc \u00abApprove\u00bb \u0631\u0627 \u0627\u0646\u062a\u062e\u0627\u0628 \u0646\u0645\u0627\u06cc\u062f. \u0633\u067e\u0633 MFA Provider \u062a\u0627\u06cc\u06cc\u062f \u062c\u0631\u06cc\u0627\u0646 \u0628\u0631\u0627\u06cc Token \u0628\u0627\u0628 \u0631\u0627 \u062b\u0628\u062a \u0645\u06cc\u200c\u06a9\u0646\u062f.<\/p>\n

\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0639\u0644\u0627\u0648\u0647 \u0628\u0631 ADFS \u0627\u062d\u062a\u0645\u0627\u0644\u0627 \u062f\u0631 \u062a\u0645\u0627\u0645\u06cc \u0645\u062d\u0635\u0648\u0644\u0627\u062a MFA \u0628\u0631\u0627\u06cc ADFS \u0646\u06cc\u0632 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f. \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u067e\u0633 \u0627\u0632 \u0622\u06af\u0627\u0647\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0648 \u062a\u0627\u06cc\u06cc\u062f \u0622\u0646 \u0628\u0647 \u0637\u0648\u0631 \u0645\u0633\u062a\u0642\u0644\u060c \u06cc\u06a9 Patch \u0628\u0631\u0627\u06cc \u062d\u0644 \u0622\u0646 \u0645\u0646\u062a\u0634\u0631 \u0646\u0645\u0648\u062f. \u067e\u06cc\u0634\u0646\u0647\u0627\u062f \u0645\u06cc\u200c\u0634\u0648\u062f \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0627\u0632 Microsoft ADFS \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u0633\u06cc\u0633\u062a\u0645 \u062e\u0648\u062f \u0631\u0627 Patch \u0646\u0645\u0627\u06cc\u0646\u062f.<\/p>\n","protected":false},"author":1001503,"featured_media":5433,"parent":0,"menu_order":0,"template":"","format":"standard","manualknowledgebasecat":[2970],"manual_kb_tag":[13134,13144,13135,13145,13136,11966,13137,13146,12004,13138,13147,13139,13148,13140,13149,13141,13150,11967,13151,13132,13142,13152,13133,13143],"class_list":{"0":"post-5430","1":"manual_kb","2":"type-manual_kb","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"manualknowledgebasecat-security","8":"manual_kb_tag-mfa-context-","9":"manual_kb_tag--mfa-","10":"manual_kb_tag-multi-factor-authentication-","11":"manual_kb_tag--brute-force","12":"manual_kb_tag---adfs","13":"manual_kb_tag-vulnerabilities","14":"manual_kb_tag-13137","16":"manual_kb_tag-security-services","17":"manual_kb_tag--adfs","18":"manual_kb_tag----mfa","19":"manual_kb_tag-13139","22":"manual_kb_tag--mfa-context","24":"manual_kb_tag--two-factor-authentication","25":"manual_kb_tag-cyber-threat","26":"manual_kb_tag---mfa","27":"manual_kb_tag-adfs","28":"manual_kb_tag--multi-factor-authentication","29":"manual_kb_tag----adfs","30":"manual_kb_tag-adfs-"},"yoast_head":"\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a<\/title>\n<meta name=\"description\" content=\"\u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\" \/>\n<meta property=\"og:locale\" content=\"fa_IR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\" \/>\n<meta property=\"og:description\" content=\"\u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apkco\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\"},\"author\":{\"name\":\"Hamed Jafari\",\"@id\":\"https:\/\/www.apk.co.ir\/#\/schema\/person\/103acc9c360cc53f3f9f39bd770468be\"},\"headline\":\"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\",\"datePublished\":\"2018-08-20T03:30:48+00:00\",\"dateModified\":\"2018-08-20T03:30:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\"},\"wordCount\":65,\"publisher\":{\"@id\":\"https:\/\/www.apk.co.ir\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage\"},\"thumbnailUrl\":\"\",\"inLanguage\":\"fa-IR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\",\"url\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\",\"name\":\"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\",\"isPartOf\":{\"@id\":\"https:\/\/www.apk.co.ir\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-08-20T03:30:48+00:00\",\"dateModified\":\"2018-08-20T03:30:48+00:00\",\"description\":\"\u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#breadcrumb\"},\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fa-IR\",\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u062e\u0627\u0646\u0647\",\"item\":\"https:\/\/www.apk.co.ir\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.apk.co.ir\/#website\",\"url\":\"https:\/\/www.apk.co.ir\/\",\"name\":\"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK\",\"description\":\"\u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\u060c \u0627\u0645\u0646\u06cc\u062a\u060c \u0634\u0628\u06a9\u0647\u060c \u0645\u062c\u0627\u0632\u06cc \u0633\u0627\u0632\u06cc\u060c \u062f\u06cc\u062a\u0627\u0633\u0646\u062a\u0631\",\"publisher\":{\"@id\":\"https:\/\/www.apk.co.ir\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.apk.co.ir\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fa-IR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.apk.co.ir\/#organization\",\"name\":\"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK\",\"url\":\"https:\/\/www.apk.co.ir\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fa-IR\",\"@id\":\"https:\/\/www.apk.co.ir\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.apk.co.ir\/wp-content\/uploads\/2016\/08\/apk-logo-black.png\",\"contentUrl\":\"https:\/\/www.apk.co.ir\/wp-content\/uploads\/2016\/08\/apk-logo-black.png\",\"width\":800,\"height\":158,\"caption\":\"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK\"},\"image\":{\"@id\":\"https:\/\/www.apk.co.ir\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/apkco\/\",\"https:\/\/www.instagram.com\/apk.co\/\",\"https:\/\/www.linkedin.com\/company\/apkco\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.apk.co.ir\/#\/schema\/person\/103acc9c360cc53f3f9f39bd770468be\",\"name\":\"Hamed Jafari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fa-IR\",\"@id\":\"https:\/\/www.apk.co.ir\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e55533d34d33f60fa85aa50361440a7?s=96&d=mm&r=r\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e55533d34d33f60fa85aa50361440a7?s=96&d=mm&r=r\",\"caption\":\"Hamed Jafari\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a","description":"\u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/","og_locale":"fa_IR","og_type":"article","og_title":"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a","og_description":"\u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.","og_url":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/","og_site_name":"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK","article_publisher":"https:\/\/www.facebook.com\/apkco\/","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#article","isPartOf":{"@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/"},"author":{"name":"Hamed Jafari","@id":"https:\/\/www.apk.co.ir\/#\/schema\/person\/103acc9c360cc53f3f9f39bd770468be"},"headline":"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a","datePublished":"2018-08-20T03:30:48+00:00","dateModified":"2018-08-20T03:30:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/"},"wordCount":65,"publisher":{"@id":"https:\/\/www.apk.co.ir\/#organization"},"image":{"@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage"},"thumbnailUrl":"","inLanguage":"fa-IR"},{"@type":"WebPage","@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/","url":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/","name":"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a","isPartOf":{"@id":"https:\/\/www.apk.co.ir\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage"},"image":{"@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-08-20T03:30:48+00:00","dateModified":"2018-08-20T03:30:48+00:00","description":"\u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 Active Directory Federated Services \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 ADFS \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u06cc \u06a9\u0634\u0641 \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0645\u0627\u0645 \u0634\u0628\u06a9\u0647\u200c\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.","breadcrumb":{"@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#breadcrumb"},"inLanguage":"fa-IR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/"]}]},{"@type":"ImageObject","inLanguage":"fa-IR","@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.apk.co.ir\/kb\/new-microsoft-adfs-protocol-vulnerability-allow-hackers-to-compromise-the-entire-organization-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u062e\u0627\u0646\u0647","item":"https:\/\/www.apk.co.ir\/"},{"@type":"ListItem","position":2,"name":"\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 ADFS \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a"}]},{"@type":"WebSite","@id":"https:\/\/www.apk.co.ir\/#website","url":"https:\/\/www.apk.co.ir\/","name":"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK","description":"\u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\u060c \u0627\u0645\u0646\u06cc\u062a\u060c \u0634\u0628\u06a9\u0647\u060c \u0645\u062c\u0627\u0632\u06cc \u0633\u0627\u0632\u06cc\u060c \u062f\u06cc\u062a\u0627\u0633\u0646\u062a\u0631","publisher":{"@id":"https:\/\/www.apk.co.ir\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apk.co.ir\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fa-IR"},{"@type":"Organization","@id":"https:\/\/www.apk.co.ir\/#organization","name":"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK","url":"https:\/\/www.apk.co.ir\/","logo":{"@type":"ImageObject","inLanguage":"fa-IR","@id":"https:\/\/www.apk.co.ir\/#\/schema\/logo\/image\/","url":"https:\/\/www.apk.co.ir\/wp-content\/uploads\/2016\/08\/apk-logo-black.png","contentUrl":"https:\/\/www.apk.co.ir\/wp-content\/uploads\/2016\/08\/apk-logo-black.png","width":800,"height":158,"caption":"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK"},"image":{"@id":"https:\/\/www.apk.co.ir\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apkco\/","https:\/\/www.instagram.com\/apk.co\/","https:\/\/www.linkedin.com\/company\/apkco"]},{"@type":"Person","@id":"https:\/\/www.apk.co.ir\/#\/schema\/person\/103acc9c360cc53f3f9f39bd770468be","name":"Hamed Jafari","image":{"@type":"ImageObject","inLanguage":"fa-IR","@id":"https:\/\/www.apk.co.ir\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e55533d34d33f60fa85aa50361440a7?s=96&d=mm&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e55533d34d33f60fa85aa50361440a7?s=96&d=mm&r=r","caption":"Hamed Jafari"}}]}},"_links":{"self":[{"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/manual_kb\/5430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/manual_kb"}],"about":[{"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/types\/manual_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/users\/1001503"}],"version-history":[{"count":0,"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/manual_kb\/5430\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apk.co.ir\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/media?parent=5430"}],"wp:term":[{"taxonomy":"manualknowledgebasecat","embeddable":true,"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/manualknowledgebasecat?post=5430"},{"taxonomy":"manual_kb_tag","embeddable":true,"href":"https:\/\/www.apk.co.ir\/wp-json\/wp\/v2\/manual_kb_tag?post=5430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}