{"id":2020,"date":"2010-02-06T08:59:56","date_gmt":"2010-02-06T16:59:56","guid":{"rendered":"https:\/\/www.zubairalexander.com\/stage\/?p=2020"},"modified":"2018-04-06T20:35:02","modified_gmt":"2018-04-07T03:35:02","slug":"netdom-examples","status":"publish","type":"post","link":"https:\/\/www.zubairalexander.com\/blog\/netdom-examples\/","title":{"rendered":"NetDom Examples"},"content":{"rendered":"<p>NetDom is a command-line tool that is built into Windows Server\u00a02008. It is available if you have the Active\u00a0Directory Domain Services (AD\u00a0DS) server role installed. To use NetDom, you must run the NetDom command from an elevated command prompt. To open an elevated command prompt, click Start, right-click Command Prompt, and then click Run as administrator.<\/p>\n<p>You can use NetDom to:<\/p>\n<p>&#8211; Join a computer that runs Windows\u00a0XP Professional or Windows\u00a0Vista to a Windows\u00a0Server\u00a02008 or Windows\u00a0Server\u00a02003 or Windows\u00a02000 or Windows\u00a0NT\u00a04.0 domain.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Provide an option to specify the organizational unit (OU) for the computer account.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Generate a random computer password for an initial Join operation.<\/p>\n<p>&#8211; Manage computer accounts for domain member workstations and member servers. Management operations include:<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Add, Remove, Query.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; An option to specify the OU for the computer account.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; An option to move an existing computer account for a member workstation from one domain to another while maintaining the security descriptor on the computer account.<\/p>\n<p>&#8211; Establish one-way or two-way trust relationships between domains, including the following kinds of trust relationships:<\/p>\n<p style=\"padding-left: 30px;\">&#8211; From a Windows\u00a02000 or Windows\u00a0Server\u00a02003 or Windows\u00a0Server\u00a02008 domain to a Windows\u00a0NT\u00a04.0 domain.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; From a Windows\u00a02000 or Windows\u00a0Server\u00a02003 or Windows\u00a0Server\u00a02008 domain to a Windows\u00a02000 or Windows\u00a0Server\u00a02003 or Windows\u00a0Server\u00a02008 domain in another enterprise.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Between two Windows\u00a02000 or Windows\u00a0Server\u00a02003 or Windows\u00a0Server\u00a02008 domains in an enterprise (a shortcut trust).<\/p>\n<p style=\"padding-left: 30px;\">&#8211; The Windows\u00a0Server\u00a02008 or Windows\u00a0Server\u00a02003 or Windows\u00a02000 Server half of an interoperable Kerberos protocol realm.<\/p>\n<p>&#8211; Verify or reset the secure channel for the following configurations:<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Member workstations and servers.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Backup domain controllers (BDCs) in a Windows\u00a0NT\u00a04.0 domain.<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Specific Windows\u00a0Server\u00a02008 or Windows\u00a0Server\u00a02003 or Windows\u00a02000 replicas.<\/p>\n<p>&#8211; Manage trust relationships between domains, including the following operations:<\/p>\n<p style=\"padding-left: 30px;\">&#8211; Enumerate trust relationships (direct and indirect).<\/p>\n<p style=\"padding-left: 30px;\">&#8211; View and change some attributes on a trust.<\/p>\n<p><strong>NetDom Commands<\/strong><\/p>\n<p>Here are the NetDom commands.<\/p>\n<table class=\" alignleft\" border=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<p align=\"center\"><strong>Command <\/strong><\/p>\n<\/td>\n<td>\n<p align=\"center\"><strong>Description <\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788018%28WS.10%29.aspx\">Netdom add<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Adds a workstation or server account to the domain.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc835082%28WS.10%29.aspx\">Netdom computername<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Manages the primary and alternate names for a computer. This command can safely rename Active Directory domain controllers as well as member servers.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788049%28WS.10%29.aspx\">Netdom join<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Joins a workstation or member server to a domain. The act of joining a computer to a domain creates an account for the computer on the domain, if it does not already exist.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788127%28WS.10%29.aspx\">Netdom move<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Moves a workstation or member server to a new domain. The act of moving a computer to a new domain creates an account for the computer on the domain, if it does not already exist.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc835089%28WS.10%29.aspx\">Netdom query<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Queries the domain for information such as membership and trust.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788074%28WS.10%29.aspx\">Netdom remove<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Removes a workstation or server from the domain.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788053%28WS.10%29.aspx\">Netdom movent4bdc<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Renames a Windows\u00a0NT\u00a04.0 backup domain controller to reflect a domain name change. This can assist in Windows\u00a0NT\u00a04.0 domain renaming efforts.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788029%28WS.10%29.aspx\">Netdom renamecomputer<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Renames a domain computer and its corresponding domain account. Use this command to rename domain workstations and member servers only. To rename domain controllers, use the <strong>netdom computername<\/strong> command.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc788073%28WS.10%29.aspx\">Netdom reset<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Resets the secure connection between a workstation and a domain controller.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc785478%28WS.10%29.aspx\">Netdom resetpwd<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Resets the computer account password for a domain controller.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc835085%28WS.10%29.aspx\">Netdom trust<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Establishes, verifies, or resets a trust relationship between domains.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left; vertical-align: top;\"><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc785466%28WS.10%29.aspx\">Netdom verify<\/a><\/td>\n<td style=\"text-align: left; vertical-align: top;\">Verifies the secure connection between a workstation and a domain controller.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Microsoft has listed lots of examples on TechNet <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc776879%28WS.10%29.aspx\">here<\/a>. Here are some of them.<\/p>\n<p><strong>NetDom Examples<\/strong><\/p>\n<p><span style=\"text-decoration: underline;\">NOTE<\/span>: The following examples apply to at least Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1 and Windows Server 2003 with SP2.<\/p>\n<p><strong>Example 1: Add a Workstation or Member Server to a Windows\u00a0NT\u00a04.0 Domain<\/strong><\/p>\n<p>To add the workstation <strong>mywksta<\/strong> to the Windows\u00a0NT\u00a04.0 domain<strong>reskita<\/strong>, type the following at the command line:<\/p>\n<p>netdom add \/d:reskita mywksta \/ud:mydomain\\admin \/pd:password<\/p>\n<p><strong>Example 2: Add a Workstation or Member Server to a Windows Server\u00a02003 Domain<\/strong><\/p>\n<p>To add the workstation mywksta to the Windows Server\u00a02003 domain devgroup.example.com in the organizational unit (OU) Dsys\/workstations, type the following at the command prompt:<\/p>\n<p>netdom add\/d:devgroup.example.com mywksta \/OU:OU=Dsys,OU=Workstations,DC=microsoft,DC=com<\/p>\n<p><strong>Note<\/strong><\/p>\n<ul type=\"disc\">\n<li>If the <strong>\/ou<\/strong> parameter is not specified, the account is created in the Computers container.<\/li>\n<\/ul>\n<p><strong>Example 3: Move a Windows\u00a0NT\u00a04.0 BDC to a new domain<\/strong><\/p>\n<p>To join myBDC to the Windows\u00a0NT\u00a04.0 domain reskita type the following at the command prompt:<\/p>\n<p>netdom mybdc moveNT4BDC \/domain:reskita<\/p>\n<p><strong>Example 4: Add an alternate name for a Windows Server\u00a02003 domain controller<\/strong><\/p>\n<p>To give an alternate name for the domain controller DC in the example.com domain, use the following syntax:<\/p>\n<p>netdom computername dc \/add:altDC.example.com<\/p>\n<p>A name must first exist as an alternate before it can be made the primary name of a computer.<\/p>\n<p><strong>Example 5: Rename a domain controller in a Windows Server\u00a02003 domain<\/strong><\/p>\n<p>To rename the domain controller DC to altDC in the example.com domain use the following syntax:<\/p>\n<p>netdom computername dc \/makeprimary:altdc.example.com<\/p>\n<p>To rename a member server you must choose one of the existing alternate names for the computer and make it the new primary name.<\/p>\n<p><strong>Example 6: Rename a Member Server<\/strong><\/p>\n<p>To rename the member server member to member1, type the following at the command prompt:<\/p>\n<p>netdom renamecomputer member \/newname:member1.example.com \/userd:administrator<\/p>\n<p><strong>Example 7: Join a Workstation or Member Server to a Domain<\/strong><\/p>\n<p>To join mywksta to the devgroup.example.com domain in the Dsys\/workstations organizational unit, type the following at the command prompt:<\/p>\n<p>netdom join \/d:devgroup.example.com mywksta \/OU:OU=Dsys,OU=Workstations,DC=microsoft,DC=com<\/p>\n<p>Besides adding the computer account to the domain, the workstation is modified to contain the appropriate shared secret to complete the <strong>join<\/strong> operation.<\/p>\n<p><strong>Example 8: Remove a Workstation or Member Server from a Domain<\/strong><\/p>\n<p>To remove mywksta from the mydomain domain and make the workstation a part of a workgroup, type the following at the command prompt:<\/p>\n<p>netdom remove \/d:mydomain mywksta \/ud:mydomain\\admin \/pd:password<\/p>\n<p><strong>Example 9: Move a Workstation or Member Server from One Domain to Another<\/strong><\/p>\n<p>To move mywksta from its current domain into the mydomain domain, type the following at the command prompt:<\/p>\n<p>netdom move \/d:mydomain mywksta \/ud:mydomain\\admin \/pd:password<\/p>\n<p>If the destination is a Windows\u00a02000 domain, the Security ID history (SIDHistory) for the workstation is updated, retaining the security permissions that the computer account had previously.<\/p>\n<p><strong>Example 10: Reset the secure channel for a workstation, member server, or Windows\u00a0NT\u00a04.0 BDC<\/strong><\/p>\n<p>To reset the secure channel secret maintained between mywksta and devgroup.example.com (regardless of OU), type the following at the command prompt:<\/p>\n<p>netdom reset \/d:devgroup.example.com mywksta<\/p>\n<p>To reset the secure channel between the Windows\u00a0NT\u00a04.0 PDC for Northamerica and the backup domain controller NABDC, type the following at the command prompt:<\/p>\n<p>netdom reset \/d:Northamerica NABDC<\/p>\n<p><strong>Example 11: Force a Secure Channel Session Between a Member and a Specific Domain Controller<\/strong><\/p>\n<p>Members often establish secure channel sessions with non-local domain controllers. To force a secure channel session between a member and a specific domain controller by using the <strong>\/server<\/strong> parameter with the <strong>reset<\/strong> operation, type the following at the command prompt:<\/p>\n<p>netdom reset \/d:devgroup.example.com mywksta \/Server:mylocalbdc<\/p>\n<p><strong>Example 12: Verify a Workstation or Member Server Secure Channel<\/strong><\/p>\n<p>To verify the secure channel secret is maintained between mywksta and devgroup.example.com, type the following at the command prompt:<\/p>\n<p>netdom verify \/d:devgroup.example.com mywksta<\/p>\n<p><strong>Example 13: Establish a One-Way Trust Relationship<\/strong><\/p>\n<p>When used with the <strong>trust<\/strong> operation, the <strong>\/d:<\/strong><em>Domain<\/em> parameter always refers to the trusted domain.<\/p>\n<p>To set the Windows\u00a0NT\u00a04.0 resource domain USA-Chicago to trust the Windows\u00a0NT\u00a04.0 account domain Northamerica, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:Northamerica USA-Chicago \/add \/Ud:Northamerica\\admin \/Pd:* \/Uo:USA-Chicago\\admin \/Po:*<\/p>\n<p>Press Enter and the following prompt is displayed:<\/p>\n<p>Password for Northamerica\\admin:<\/p>\n<p>Enter the password for Northamerica\\admin and press Enter. The following prompt is displayed:<\/p>\n<p>Password for USA-Chicago\\admin:<\/p>\n<p>Enter the password for USA-Chicago\\admin and press Enter.<\/p>\n<p>The user must have credentials for both domains. The <strong>\/pd<\/strong> parameter can be used to specify the password for Northamerica\\admin and the <strong>\/po<\/strong> parameter can be used to specify the password for USA-Chicago\\admin. If passwords are not provided on the command line, the user is prompted for both.<\/p>\n<p>If you then want to specify a two-way trust, type the following at the command prompt<\/p>\n<p>netdom trust \/d:marketing.example.com engineering.example.com \/add \/twoway \/Uo:admin@engineering.example.com \/Ud:admin@marketing.example.com:<\/p>\n<p><strong>Example 14: Establish a One-Way Trust Relationship from a Windows Domain to a Non-Windows Kerberos Realm<\/strong><\/p>\n<p>To establish a one-way trust where Northamerica trusts the non-Windows Kerberos realm ATHENA, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:ATHENA Northamerica \/add \/PT:password \/realm<\/p>\n<p>The <strong>\/d<\/strong> parameter specifies the trusted domain and the <strong>\/realm<\/strong> parameter indicates that this is a non-Windows Kerberos realm. The order of the domains is not important. Credentials to the Windows\u00a02000 domain can be supplied if needed.<\/p>\n<p><strong>Note<\/strong><\/p>\n<ul type=\"disc\">\n<li>Verifying a specific trust relationship requires credentials unless the user has domain administrator privileges on both domains.<\/li>\n<\/ul>\n<p>If you want to set the Kerberos realm ATHENA to trust the Northamerica domain, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:Northamerica ATHENA \/add<\/p>\n<p><strong>Note<\/strong><\/p>\n<ul type=\"disc\">\n<li>To make the trust two-way, you can specify the <strong>\/twoway<\/strong> parameter.<\/li>\n<\/ul>\n<p>Non-Windows Kerberos trusts are created as non-transitive. If you want to change the trust from ATHENA to Northamerica as transitive, type the following at the command prompt:<\/p>\n<p>netdom trust Northamerica \/d:ATHENA \/trans:yes<\/p>\n<p>To display the transitive state, type the following at the command prompt:<\/p>\n<p>netdom trust Northamerica \/d:ATHENA \/trans<\/p>\n<p>The order of the two domains above is not important. Either can be the non-Windows Kerberos domain.<\/p>\n<p><strong>Example 15: Break a One-Way Trust Relationship<\/strong><\/p>\n<p>To undo the trust that USA-Chicago has for Northamerica, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:Northamerica USA-Chicago \/remove<\/p>\n<p><strong>Example 16: Break a Two-Way Trust Relationship<\/strong><\/p>\n<p>To break a two-way trust relationship, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:marketing.example.com Engineering.example.com \/remove \/twoway \/Uo:admin@engineering.example.com \/Ud:admin@marketing.example.com<\/p>\n<p><strong>Example 17: Verify a Specific Trust Relationship<\/strong><\/p>\n<p>To verify the one-way trust that USA-Chicago has for Northamerica, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:Northamerica USA-Chicago \/verify<\/p>\n<p>To verify a two-way trust between the Northamerica and Europe domains, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:Northamerica EUROPE \/verify \/twoway<\/p>\n<p>The <strong>\/verify<\/strong> parameter checks that the appropriate shared secrets are synchronized between the two items involved in the trust.<\/p>\n<p><strong>Example 18: Reset a Specific Trust Relationship<\/strong><\/p>\n<p>To reset the secure channel for the one-way trust between Northamerica and USA-Chicago, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:Northamerica USA-Chicago \/Ud:Northamerica\\admin \/reset<\/p>\n<p>The <strong>\/reset<\/strong> parameter synchronizes the appropriate shared secrets if they are not already synchronized.<\/p>\n<p><strong>Example 19: Verify Kerberos Functionality<\/strong><\/p>\n<p>To verify Kerberos authentication between a workstation and a service located in the domain devgroup.example.com, type the following at the command prompt:<\/p>\n<p>netdom trust \/d:devgroup.example.com \/verify \/KERBEROS<\/p>\n<p>When you use the <strong>NetDom trust<\/strong> operation with the <strong>\/verify \/kerberos<\/strong> parameters, it seeks a session ticket for the Kerberos Admin service in the target domain. If successful, you can conclude that all Kerberos operations (for example KDC referrals) are operating correctly between the workstation and the target domain.<\/p>\n<p><strong>Note<\/strong><\/p>\n<ul type=\"disc\">\n<li>This operation cannot be executed remotely. It must be run on the workstation being tested.<\/li>\n<\/ul>\n<p><strong>Example 20: View All Workstation Members in a Domain<\/strong><\/p>\n<p>To list all the workstations in the domain Northamerica, type the following at the command prompt:<\/p>\n<p>netdom query \/d:Northamerica WORKSTATION<\/p>\n<p><strong>Example 21: View All Server Members in a Domain<\/strong><\/p>\n<p>To list all of the servers in Northamerica, type the following at the command prompt:<\/p>\n<p>netdom query \/d:Northamerica SERVER<\/p>\n<p><strong>Example 22: View All Domain Controller Members in a Domain<\/strong><\/p>\n<p>To list all the domain controllers in the domain Northamerica, type the following at the command prompt:<\/p>\n<p>netdom query \/d:Northamerica DC<\/p>\n<p><strong>Example 23: View All Organizational Unit Members in a Domain<\/strong><\/p>\n<p>To list all of the OUs in devgroup.example.com, type the following at the command prompt:<\/p>\n<p>netdom query \/d:devgroup.example.com OU<\/p>\n<p><strong>Example 24: List the Primary Domain Controller Member in a Domain<\/strong><\/p>\n<p>To list the PDC for Northamerica, type the following at the command prompt:<\/p>\n<p>netdom query \/d:Northamerica PDC<\/p>\n<p><strong>Example 25: List the Primary Domain Controller Emulator in a Domain<\/strong><\/p>\n<p>To list the current PDC emulator for devgroup.example.com, type the following at the command prompt:<\/p>\n<p>netdom query \/d:devgroup.example.com FSMO<\/p>\n<p><span style=\"text-decoration: underline;\">NOTE<\/span>: There are more examples on TechNet <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc776879%28WS.10%29.aspx\">here<\/a>.<\/p>\n<p>(Source: <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2003\/cc776879(v=ws.10)\" target=\"_blank\" rel=\"noopener\">Microsoft Corporation<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NetDom is a command-line tool that is built into Windows Server\u00a02008. It is available if you have the Active\u00a0Directory Domain Services (AD\u00a0DS) server role installed. To use NetDom, you must run the NetDom command from an elevated command prompt. To open an elevated command prompt, click Start, right-click Command Prompt, and then click Run as [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6,57,11,38,30],"tags":[],"class_list":["post-2020","post","type-post","status-publish","format-standard","hentry","category-active-directory","category-scripting","category-tips-tricks","category-windows-2003","category-longhorn-server"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/2020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/comments?post=2020"}],"version-history":[{"count":0,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/2020\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/media?parent=2020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/categories?post=2020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/tags?post=2020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}