{"id":51677,"date":"2025-09-28T20:58:20","date_gmt":"2025-09-28T17:58:20","guid":{"rendered":"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/"},"modified":"2025-09-28T20:58:21","modified_gmt":"2025-09-28T17:58:21","slug":"security-features-of-reseller-in-hosting","status":"publish","type":"post","link":"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/","title":{"rendered":"Security Features of Reseller in Hosting"},"content":{"rendered":"<p><\/p>\n<p>When you sell <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> accounts to other people, security becomes both <a href=\"https:\/\/infinitydomainhosting.com\/kb\/how-to-configure-2fa-step-by-step\/\">a<\/a> technical job and a trust issue. Here\u2019s a clear look at the specific security features you should look for or enable on a <a href=\"https:\/\/www.plesk.com\/wiki\/reseller-hosting\/\" target=\"_blank\" rel=\"noopener\">Reseller Hosting<\/a> plan so you can protect your customers and your reputation.<\/p>\n<p><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Why_security_matters_for_reseller_hosting\" >Why security matters for reseller hosting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Core_security_features_every_reseller_should_expect\" >Core security features every reseller should expect<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Account_isolation\" >Account isolation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Web_Application_Firewall_WAF_and_ModSecurity\" >Web Application Firewall (WAF) and ModSecurity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Automatic_ssl_AutoSSL_and_https_enforcement\" >Automatic ssl (AutoSSL) and https enforcement<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Malware_scanning_and_cleanup_tools\" >Malware scanning and cleanup tools<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Strong_authentication_and_access_controls\" >Strong authentication and access controls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Firewall_and_ddos_protection\" >Firewall and ddos protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Regular_backups_and_snapshot_recovery\" >Regular backups and snapshot recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Patch_management_and_hardened_control_panels\" >Patch management and hardened control panels<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Login_and_activity_monitoring\" >Login and activity monitoring<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Advanced_features_worth_paying_for\" >Advanced features worth paying for<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#How_to_harden_your_reseller_setup_practical_steps\" >How to harden your reseller setup (practical steps)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#What_to_ask_your_hosting_provider\" >What to ask your hosting provider<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Common_misconceptions\" >Common misconceptions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-reseller-in-hosting\/#Summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Why_security_matters_for_reseller_hosting\"><\/span>Why security matters for <a href=\"https:\/\/www.a2hosting.com\/reseller-hosting\/\" target=\"_blank\" rel=\"noopener\">reseller hosting<\/a><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>As a <a href=\"https:\/\/www.a2hosting.com\/reseller-hosting\/\" target=\"_blank\" rel=\"noopener\">reseller<\/a> you hold multiple customer accounts on the same server. A breach in one account can affect others, so you need controls that limit damage, detect threats early, and make recovery fast. Security isn\u2019t only about stopping attacks , it\u2019s about reducing risk and <a href=\"https:\/\/hostadvice.com\/blog\/server\/what-is-downtime\/\" target=\"_blank\" rel=\"noopener\">downtime<\/a>.<\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Core_security_features_every_reseller_should_expect\"><\/span>Core security features every reseller should expect<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>These are the baseline features that reduce common risks and give you tools to respond when something goes wrong.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Account_isolation\"><\/span>Account isolation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Isolation ensures that if one customer site is compromised, attackers can&#8217;t easily move laterally to other accounts. Look for technologies like CageFS, CloudLinux, or separate <a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-php\/\" target=\"_blank\" rel=\"noopener\">php<\/a>-FPM pools and user-level process limits.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Web_Application_Firewall_WAF_and_ModSecurity\"><\/span>Web Application Firewall (WAF) and ModSecurity<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>A WAF blocks common web attacks (SQL injection, XSS, etc.) before they reach sites. ModSecurity rulesets tailored for reseller environments add practical protection with low maintenance.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Automatic_ssl_AutoSSL_and_https_enforcement\"><\/span>Automatic <a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-ssl\" target=\"_blank\" rel=\"noopener\">ssl<\/a> (AutoSSL) and <a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-ssl\" target=\"_blank\" rel=\"noopener\">https<\/a> enforcement<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>AutoSSL keeps certificates current and reduces configuration errors. Enforce HTTPS by default so customer sites don\u2019t expose login pages or cookies in plain text.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Malware_scanning_and_cleanup_tools\"><\/span>Malware scanning and cleanup tools<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Regular scans detect injected files or suspicious code. Some providers offer one-click cleanup or paid cleanup services , useful if a customer account gets infected.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Strong_authentication_and_access_controls\"><\/span>Strong authentication and access controls<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Require two-factor authentication (<a href=\"https:\/\/infinitydomainhosting.com\/index.php?rp=\/knowledgebase\/112\/How-to-enableordisable-two-factor-authentication-in-cPanel.html\">2FA<\/a>) for reseller and customer control panels where possible. Implement role-based access so developers or subusers don\u2019t get unnecessary root-level permissions.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Firewall_and_ddos_protection\"><\/span>Firewall and <a href=\"https:\/\/support.hostinger.com\/en\/articles\/5634639-what-is-a-ddos-attack-and-how-to-prevent-it\" target=\"_blank\" rel=\"noopener\">ddos<\/a> protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>At the network level, a robust firewall and DDoS mitigation limit traffic-based outages. Many hosts provide upstream DDoS scrubbing and rate-limiting as part of the plan.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Regular_backups_and_snapshot_recovery\"><\/span>Regular backups and snapshot recovery<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Automatic, frequent backups with easy restore options reduce downtime and data loss. Check retention periods and whether restores can be performed per-account (not only server-wide).<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Patch_management_and_hardened_control_panels\"><\/span>Patch management and hardened control panels<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Make sure the <a href=\"https:\/\/www.a2hosting.com\/\" target=\"_blank\" rel=\"noopener\">host<\/a> keeps <a href=\"https:\/\/www.a2hosting.com\/whm-hosting\/\" target=\"_blank\" rel=\"noopener\">whm<\/a>\/<a href=\"https:\/\/www.a2hosting.com\/cpanel-hosting\/\" target=\"_blank\" rel=\"noopener\">cpanel<\/a>, OS packages, PHP, and common applications patched. A hardened <a href=\"https:\/\/infinitydomainhosting.com\/kb\/how-to-use-cpanel-or-other-control-panel\/\">control panel<\/a> reduces the risk of admin-level exploits.<\/p>\n<p><!--KB_CAT_BLOCK--><\/p>\n<figure class=\"kb-cat-placeholder\" style=\"margin:1.75rem 0;display:block;\">\n<div class=\"kb-cat-wrap\" style=\"position:relative; overflow:hidden; border-radius:12px; box-shadow:0 10px 36px rgba(0,0,0,0.14);\"><img src=\"https:\/\/infinitydomainhosting.com\/kb\/assets\/img\/cat-default.webp\" alt=\"Security Features of Reseller in Hosting\" loading=\"lazy\" decoding=\"async\" style=\"max-width:100%;height:auto;display:block;border-radius:12px;box-shadow:0 8px 28px rgba(0,0,0,0.12);\" \/><\/p>\n<div class=\"kb-cat-gradient\" style=\"position:absolute; inset:0; background:linear-gradient(180deg, rgba(9,23,60,0.66) 0%, rgba(11,30,70,0.45) 40%, rgba(11,30,70,0.15) 100%);\"><\/div>\n<div class=\"kb-cat-textbox\" style=\"position:absolute; inset:auto 5% 7% 5%; color:#fff; text-align:center; display:flex; flex-direction:column; gap:.4rem; align-items:center; justify-content:flex-end;\">\n<div class=\"kb-cat-title\" style=\"font-weight:800; font-size:clamp(20px,3.6vw,34px); line-height:1.2; letter-spacing:.2px; text-shadow:0 1px 2px rgba(0,0,0,.35);\">Security Features of Reseller in Hosting<\/div>\n<div class=\"kb-cat-meta\" style=\"opacity:1; font-weight:600; font-size:clamp(13px,2.6vw,16px); line-height:1.45; text-shadow:0 1px 2px rgba(0,0,0,.28);\">When you sell hosting accounts to other people, security becomes both a technical job and a trust issue. Here\u2019s a clear look at the specific security features you should look\u2026<\/div>\n<div class=\"kb-cat-desc\" style=\"opacity:1; font-weight:500; font-size:clamp(12px,2.4vw,15px); line-height:1.5; max-width:900px; text-wrap:balance; text-shadow:0 1px 2px rgba(0,0,0,.25);\">Computer Security<\/div>\n<\/div>\n<\/div>\n<\/figure>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Login_and_activity_monitoring\"><\/span>Login and activity monitoring<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Audit logs, login alerts, and file-change notifications help you find suspicious behavior early and prove what happened after an incident.<\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Advanced_features_worth_paying_for\"><\/span>Advanced features worth paying for<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>If security is a selling point for your customers, consider plans that include these extras.<\/p>\n<p><\/p>\n<ul><\/p>\n<li>Intrusion Prevention Systems (IPS) like Imunify360 or BitNinja<\/li>\n<p><\/p>\n<li>Real-time file integrity monitoring and automatic rollback<\/li>\n<p><\/p>\n<li>Per-account resource throttling to prevent abuse and brute-force attacks<\/li>\n<p><\/p>\n<li>Isolated containerization or VMs for high-value customers<\/li>\n<p><\/p>\n<li><a href=\"https:\/\/www.a2hosting.com\/wordpress-hosting\/managed\/\" target=\"_blank\" rel=\"noopener\">managed<\/a> malware removal and security incident response<\/li>\n<p>\n  <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_harden_your_reseller_setup_practical_steps\"><\/span>How to harden your reseller setup (practical steps)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Security features are only effective if you configure and use them. Here are concrete steps you can take right now.<\/p>\n<p><\/p>\n<ol><\/p>\n<li>Enable CageFS or CloudLinux to enforce account isolation.<\/li>\n<p><\/p>\n<li>Turn on AutoSSL and <a href=\"https:\/\/infinitydomainhosting.com\/kb\/htaccess-force-https\/\">force https<\/a> using <a href=\"https:\/\/www.a2hosting.com\/kb\/security\/ssl\/enabling-http-strict-transport-security-hsts-for-your-site\/\" target=\"_blank\" rel=\"noopener\">hsts<\/a> where appropriate.<\/li>\n<p><\/p>\n<li>Enable ModSecurity with a current rule set and monitor false positives.<\/li>\n<p><\/p>\n<li>Require 2FA for reseller and, if possible, encourage customers to enable it.<\/li>\n<p><\/p>\n<li>Schedule automated backups with offsite retention and test restores monthly.<\/li>\n<p><\/p>\n<li>Keep WHM\/<a href=\"https:\/\/www.a2hosting.com\/cpanel-hosting\/\" target=\"_blank\" rel=\"noopener\">cpanel<\/a> and server packages up to date , automate updates when safe.<\/li>\n<p><\/p>\n<li>Use strong password policies and limit <a href=\"https:\/\/www.a2hosting.com\/kb\/getting-started-guide\/accessing-your-account\/using-ssh-secure-shell\/\" target=\"_blank\" rel=\"noopener\">ssh<\/a> access by key only.<\/li>\n<p><\/p>\n<li>Set up login alerts and a SIEM or at least centralized logging for suspicious patterns.<\/li>\n<p>\n  <\/ol>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_to_ask_your_hosting_provider\"><\/span>What to ask your <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> provider<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>When comparing reseller plans, these questions separate basic offerings from secure ones.<\/p>\n<p><\/p>\n<ul><\/p>\n<li>How is account isolation implemented?<\/li>\n<p><\/p>\n<li>Do you include a WAF and DDoS protection? What\u2019s the mitigation capacity?<\/li>\n<p><\/p>\n<li>Are malware scans and cleanup provided, and how often are scans run?<\/li>\n<p><\/p>\n<li>What is the backup schedule, retention, and restore process?<\/li>\n<p><\/p>\n<li>Do you support AutoSSL\/Let\u2019s Encrypt and HTTPS enforcement?<\/li>\n<p><\/p>\n<li>How are critical updates applied to the control panel and OS?<\/li>\n<p><\/p>\n<li>Can I enable 2FA and role-based user access?<\/li>\n<p>\n  <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_misconceptions\"><\/span>Common misconceptions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Some people assume reseller plans are inherently insecure because resources are shared. That isn\u2019t true if the <a href=\"https:\/\/www.a2hosting.com\/\" target=\"_blank\" rel=\"noopener\">host<\/a> applies the right isolation and monitoring tools. Another mistake is thinking a single feature (like SSL) is enough , security works as layers.<\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Secure reseller <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> depends on layered protections: account isolation, a good WAF, automatic SSL, malware detection, backups, access controls, and proactive patching. Ask the right questions, enable the features available, and adopt a few operational habits (2FA, backups, monitoring). Do that and you\u2019ll greatly reduce the chance of breaches and the impact if they happen.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you sell hosting accounts to other people, security becomes both a technical job and a trust issue. Here\u2019s a clear look&hellip;<\/p>\n","protected":false},"author":1,"featured_media":51678,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[88,86,4593,1,4594,3,5,10,4,11,8,2],"tags":[11573,10725,677,10591,10721,300,10579,12325,579,10866,12324,78,262],"class_list":["post-51677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-hosting","category-computer-security","category-databases","category-general","category-networking","category-php-scripts","category-seo","category-servers","category-ssl-certificates","category-support","category-website-security","category-wordpress","tag-account-isolation","tag-firewalls","tag-hosting","tag-hosting-security","tag-malware-protection","tag-reseller","tag-reseller-hosting","tag-reseller-security","tag-security","tag-security-features","tag-security-features-of-reseller-in-hosting","tag-ssl","tag-web-hosting"],"_links":{"self":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/51677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/comments?post=51677"}],"version-history":[{"count":1,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/51677\/revisions"}],"predecessor-version":[{"id":51679,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/51677\/revisions\/51679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/media\/51678"}],"wp:attachment":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/media?parent=51677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/categories?post=51677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/tags?post=51677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}