{"id":268,"date":"2026-02-25T12:31:34","date_gmt":"2026-02-25T12:31:34","guid":{"rendered":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/"},"modified":"2026-02-25T12:31:34","modified_gmt":"2026-02-25T12:31:34","slug":"what-makes-a-secure-webinar-link","status":"publish","type":"post","link":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/","title":{"rendered":"What makes a secure webinar link"},"content":{"rendered":"<p><b>A secure webinar link is more than a URL<\/b><\/p>\n<p>A webinar link is the front door to your event. If it is easy to guess, easy to share, or poorly controlled, you risk uninvited attendees, disruption, data exposure, and a loss of trust. A secure webinar link is one that only the right people can use, only in the right way, and only for the right event at the right time.<\/p>\n<p><b>1) Unique, high-entropy meeting IDs (and no \u201cvanity\u201d shortcuts)<\/b><\/p>\n<p>Security starts with how hard a link is to predict. Strong webinar platforms generate long, random meeting IDs and links that are impractical to brute-force. Avoid public-facing \u201ceasy\u201d links (for example, simple vanity URLs or short codes) unless they sit behind additional controls such as authentication, registration approval, or a waiting room.<\/p>\n<p><b>2) Registration that matches your risk level<\/b><\/p>\n<p>Not every webinar needs the same level of gatekeeping, but a secure link usually sits behind a registration flow that fits the sensitivity of the content:<\/p>\n<p><b>\u2022 Open registration<\/b> works for broad marketing events, but should still use confirmation emails, limits on sharing, and strong in-session controls.<\/p>\n<p><b>\u2022 Approved registration<\/b> adds a manual or rules-based review step, reducing the chance of unknown participants entering.<\/p>\n<p><b>\u2022 Authenticated access<\/b> (for example, sign-in via a corporate identity provider) is best for internal or confidential sessions.<\/p>\n<p><b>3) Tokenised or single-use join links<\/b><\/p>\n<p>A genuinely secure webinar link often includes a unique token tied to an individual registrant. This makes the link far less useful if forwarded, because it can be limited to one device, one user, or a defined number of joins. It also improves auditability: you can trace attendance and troubleshoot access issues without relying on guesswork.<\/p>\n<p><b>4) Passwords and passcodes used properly<\/b><\/p>\n<p>Passcodes are still valuable when used well, but they are not a silver bullet. A secure setup avoids reusing passcodes across events, keeps them separate from the join URL where possible, and does not publish them on public web pages. If you must share a passcode, do so through controlled channels (such as confirmed registration emails) and consider rotating it for high-risk sessions.<\/p>\n<p><b>5) Waiting rooms and controlled admission<\/b><\/p>\n<p>A waiting room (or lobby) gives hosts a final checkpoint before anyone enters the live session. This is particularly important when links can be forwarded. For sensitive events, combine a waiting room with named registration so that the host or producer can verify attendees and remove unknown entries before they reach the main room.<\/p>\n<p><b>6) Domain restrictions and authenticated joining<\/b><\/p>\n<p>For corporate webinars, one of the strongest protections is restricting access to users signed in with a specific email domain or identity provider. This reduces the risk of link sharing outside your organisation and makes it easier to enforce policies such as multi-factor authentication at the account level.<\/p>\n<p><b>7) Time-bound access and event-specific links<\/b><\/p>\n<p>Secure webinar links should not be evergreen. Good practice includes:<\/p>\n<p><b>\u2022 Creating a fresh link for every event<\/b> rather than reusing the same meeting room repeatedly.<\/p>\n<p><b>\u2022 Limiting how early attendees can join<\/b> to reduce the chance of unsupervised use.<\/p>\n<p><b>\u2022 Closing access promptly<\/b> after the session ends, especially if the link could be shared later.<\/p>\n<p><b>8) Encryption in transit and platform security basics<\/b><\/p>\n<p>At a minimum, your webinar platform should use strong encryption for data in transit (TLS) and provide modern security controls such as account-level protections, role-based permissions, and secure admin access. While attendees may only see a link, the underlying security posture of the platform affects everything from chat privacy to the safety of shared content.<\/p>\n<p><b>9) Role separation: host, panellist, speaker, attendee<\/b><\/p>\n<p>A secure webinar is designed so that the link does not grant more permissions than necessary. Panellists and speakers should have separate invitations from attendees, with clear role-based controls. This reduces the risk of someone joining with elevated rights and sharing screens, unmuting themselves, or disrupting the session.<\/p>\n<p><b>10) In-session controls that limit damage if a link is shared<\/b><\/p>\n<p>Even with a strong link, plan for the possibility that it will be forwarded. Security is improved when the session is configured to minimise disruption:<\/p>\n<p><b>\u2022 Disable attendee screen sharing<\/b> by default.<\/p>\n<p><b>\u2022 Control chat<\/b> (for example, host-only or moderated Q&amp;A).<\/p>\n<p><b>\u2022 Mute on entry<\/b> and prevent attendees from unmuting if appropriate.<\/p>\n<p><b>\u2022 Lock the webinar<\/b> once the intended audience is present.<\/p>\n<p><b>\u2022 Remove and block<\/b> disruptive users quickly.<\/p>\n<p><b>11) Clear joining communications (to prevent phishing and confusion)<\/b><\/p>\n<p>A secure webinar link is also one your audience can trust. Use consistent sender addresses, branded registration pages, and clear instructions so attendees can recognise legitimate communications. Avoid sending multiple different links from different sources, which can create confusion and increase the risk of phishing lookalikes.<\/p>\n<p><b>12) Logging, monitoring, and post-event hygiene<\/b><\/p>\n<p>Security does not end when the webinar starts. Good practice includes monitoring join attempts, reviewing attendance logs, and ensuring recordings and chat exports are stored securely with appropriate permissions. If you publish an on-demand version, use a separate, controlled viewing link rather than reusing the live join URL.<\/p>\n<p><b>Putting it all together: the secure link is part of a secure production<\/b><\/p>\n<p>The strongest webinar links sit within a wider plan that covers registration, roles, moderation, content handling, and live support. That is where professional production makes a practical difference: you can keep the experience smooth for genuine attendees while maintaining tight control over access, permissions, and what goes to air.<\/p>\n<p><b>Want a webinar that is secure, polished, and stress-free to run?<\/b> Find out more about Enbecom Studios\u2019 live remote webcasting and video services, including producing live Zoom feeds with titles, captions, slides, pre-recorded video, interactivity, and multi-platform streaming at <a href=\"https:\/\/enbecom.tv\">https:\/\/enbecom.tv<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A secure webinar link is more than a URL A webinar link is the front door to your event. If it is easy to guess, easy to share, or poorly controlled, you risk uninvited attendees, disruption, data exposure, and a loss of trust. A secure webinar link is one that only the right people can&hellip; <a class=\"more-link\" href=\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\">Continue reading <span class=\"screen-reader-text\">What makes a secure webinar link<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":267,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-268","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-masterclass","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What makes a secure webinar link - Enbecom Studios Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What makes a secure webinar link - Enbecom Studios Blog\" \/>\n<meta property=\"og:description\" content=\"A secure webinar link is more than a URL A webinar link is the front door to your event. If it is easy to guess, easy to share, or poorly controlled, you risk uninvited attendees, disruption, data exposure, and a loss of trust. A secure webinar link is one that only the right people can&hellip; Continue reading What makes a secure webinar link\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\" \/>\n<meta property=\"og:site_name\" content=\"Enbecom Studios Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-25T12:31:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2024\/06\/esimage.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enbecom Studios Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enbecom Studios Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\"},\"author\":{\"name\":\"Enbecom Studios Team\",\"@id\":\"https:\/\/enbecom.tv\/blog\/#\/schema\/person\/9464a8e0beed2a8d28407e1e6c41d6c4\"},\"headline\":\"What makes a secure webinar link\",\"datePublished\":\"2026-02-25T12:31:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\"},\"wordCount\":924,\"publisher\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg\",\"articleSection\":[\"Masterclass\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\",\"url\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\",\"name\":\"What makes a secure webinar link - Enbecom Studios Blog\",\"isPartOf\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg\",\"datePublished\":\"2026-02-25T12:31:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage\",\"url\":\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg\",\"contentUrl\":\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enbecom.tv\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What makes a secure webinar link\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enbecom.tv\/blog\/#website\",\"url\":\"https:\/\/enbecom.tv\/blog\/\",\"name\":\"Enbecom Studios Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enbecom.tv\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enbecom.tv\/blog\/#organization\",\"name\":\"Enbecom Studios Blog\",\"url\":\"https:\/\/enbecom.tv\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/enbecom.tv\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2024\/06\/esimage.png\",\"contentUrl\":\"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2024\/06\/esimage.png\",\"width\":1440,\"height\":810,\"caption\":\"Enbecom Studios Blog\"},\"image\":{\"@id\":\"https:\/\/enbecom.tv\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enbecom.tv\/blog\/#\/schema\/person\/9464a8e0beed2a8d28407e1e6c41d6c4\",\"name\":\"Enbecom Studios Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/enbecom.tv\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/87ef5cfeda25d6c6a68f82b9ef9bae41f181b9632368bd68558074e826ef892a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/87ef5cfeda25d6c6a68f82b9ef9bae41f181b9632368bd68558074e826ef892a?s=96&d=mm&r=g\",\"caption\":\"Enbecom Studios Team\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What makes a secure webinar link - Enbecom Studios Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/","og_locale":"en_GB","og_type":"article","og_title":"What makes a secure webinar link - Enbecom Studios Blog","og_description":"A secure webinar link is more than a URL A webinar link is the front door to your event. If it is easy to guess, easy to share, or poorly controlled, you risk uninvited attendees, disruption, data exposure, and a loss of trust. A secure webinar link is one that only the right people can&hellip; Continue reading What makes a secure webinar link","og_url":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/","og_site_name":"Enbecom Studios Blog","article_published_time":"2026-02-25T12:31:34+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2024\/06\/esimage.png","type":"image\/png"}],"author":"Enbecom Studios Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enbecom Studios Team","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#article","isPartOf":{"@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/"},"author":{"name":"Enbecom Studios Team","@id":"https:\/\/enbecom.tv\/blog\/#\/schema\/person\/9464a8e0beed2a8d28407e1e6c41d6c4"},"headline":"What makes a secure webinar link","datePublished":"2026-02-25T12:31:34+00:00","mainEntityOfPage":{"@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/"},"wordCount":924,"publisher":{"@id":"https:\/\/enbecom.tv\/blog\/#organization"},"image":{"@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage"},"thumbnailUrl":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg","articleSection":["Masterclass"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/","url":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/","name":"What makes a secure webinar link - Enbecom Studios Blog","isPartOf":{"@id":"https:\/\/enbecom.tv\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage"},"image":{"@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage"},"thumbnailUrl":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg","datePublished":"2026-02-25T12:31:34+00:00","breadcrumb":{"@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#primaryimage","url":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg","contentUrl":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2026\/02\/img_1772022690.jpg","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/enbecom.tv\/blog\/2026\/02\/25\/what-makes-a-secure-webinar-link\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enbecom.tv\/blog\/"},{"@type":"ListItem","position":2,"name":"What makes a secure webinar link"}]},{"@type":"WebSite","@id":"https:\/\/enbecom.tv\/blog\/#website","url":"https:\/\/enbecom.tv\/blog\/","name":"Enbecom Studios Blog","description":"","publisher":{"@id":"https:\/\/enbecom.tv\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enbecom.tv\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/enbecom.tv\/blog\/#organization","name":"Enbecom Studios Blog","url":"https:\/\/enbecom.tv\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/enbecom.tv\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2024\/06\/esimage.png","contentUrl":"https:\/\/enbecom.tv\/blog\/wp-content\/uploads\/2024\/06\/esimage.png","width":1440,"height":810,"caption":"Enbecom Studios Blog"},"image":{"@id":"https:\/\/enbecom.tv\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enbecom.tv\/blog\/#\/schema\/person\/9464a8e0beed2a8d28407e1e6c41d6c4","name":"Enbecom Studios Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/enbecom.tv\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/87ef5cfeda25d6c6a68f82b9ef9bae41f181b9632368bd68558074e826ef892a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/87ef5cfeda25d6c6a68f82b9ef9bae41f181b9632368bd68558074e826ef892a?s=96&d=mm&r=g","caption":"Enbecom Studios Team"}}]}},"_links":{"self":[{"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":0,"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enbecom.tv\/blog\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}