{"id":4674,"date":"2020-12-21T09:18:57","date_gmt":"2020-12-21T08:18:57","guid":{"rendered":"https:\/\/www-beta.easydoccontents.com\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/"},"modified":"2021-03-18T13:45:21","modified_gmt":"2021-03-18T12:45:21","slug":"using-access-management-authentication-to-design-personalised-user-content","status":"publish","type":"post","link":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/","title":{"rendered":"Using Access Management (Authentication) to Design Personalised User Content"},"content":{"rendered":"<p>When you store user data based on logins to your software, you\u2019re in a position to dive deeper into contextual embedded help. User data can drive your embedded content, providing more relevant information for each user. In this article, we\u2019ll talk about using data derived from authenticated users to design personalised user content.<\/p>\n<p>Authentication refers to the login process in which each user is identified with a username and password. In recent years, we\u2019ve seen more software companies adding contextual access to traditional authentication methods.<\/p>\n<p>The information gleaned using contextual access can also be used to drive content.<\/p>\n<h2>What is user access management?<\/h2>\n<p>Let\u2019s define each type of authentication generally.<\/p>\n<blockquote><p><em>Traditional Authentication: Users are created and assigned roles as well as a username and password. Users are given access based on the authentication of an assigned username and password. Each role has a predefined level of access.<\/em><\/p>\n<p><em>Contextual Access: Access requests are granted or denied based on user context. Also referred to as Adaptive Access.<\/em><\/p><\/blockquote>\n<h2>What factors determine contextual access?<\/h2>\n<p>Theoretically, any type of information you can gather about the user could be considered during authentication. Commonly, these factors can include geo-location, device verification, proximity, IP address, location velocity and time.<\/p>\n<h2>What are typical use cases for contextual\/adaptive access?<\/h2>\n<p>Typically, companies will use contextual access management to reduce risk by determining an overall risk factor. In an environment where employees work remotely or must access sensitive data outside of company walls, contextual access management allows user context to determine risk.<\/p>\n<p>You can see an example of this when you try to sign into your <em>Google<\/em> account while traveling. If <em>Google<\/em> notes that you are logging in from an unknown device, an unknown IP address or a geographical location that is different from your usual access location, <em>Google<\/em> may ask you to sign in again using your password. You\u2019ll usually get an email from <em>Google<\/em> notifying you that your account was accessed under unusual circumstances.<\/p>\n<h2>Contextual access management in user journeys<\/h2>\n<p>We\u2019ve talked a lot about user journeys, especially in relation to context (and personas). Delivering users the right information at the right time implies knowing the user\u2019s context.<\/p>\n<p>For a discussion on context, see <a href=\"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/contextual-information-for-software\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Contextual Information for Software<\/em><\/a>.<\/p>\n<p>Using the same data you gather for contextual access, you can design software help that delivers a more personal user experience. Think about the things you can determine when a user logs in to your software.<\/p>\n<p>First, you know who the user is. You can probably call them by name. While this may seem simplistic, calling users by name is the beginning of developing loyalty.<\/p>\n<p>You may have gathered other information about the user in the registration process. Leverage this information in software help to provide a more personal experience.<\/p>\n<p>Using authentication, you can know whether this is the user\u2019s first time, fifth time or 100<sup>th<\/sup> time logging in to your software. The information you deliver should change over time, based on user experience or other factors affected by the number of logins. You can also know how long it\u2019s been since the user\u2019s last login. Such information can inform your content.<\/p>\n<h2>Using APIs to gather user context<\/h2>\n<p>Depending on your system, you may need extra tools to gather information about users (with their consent, of course). Various products have APIs that allow you to connect your authentication process and gather additional data.<\/p>\n<p>For example, some APIs allow you to enhance data based on users\u2019 social activity. A sentiment API will allow you to monitor negative and positive user comments in reference to your software.<\/p>\n<p>The <a href=\"https:\/\/developers.google.com\/awareness\/\">Google Awareness API<\/a> for app developers gathers basic context based on time, geo-location, place and place type (such as a business name), activity (such as motion), nearby places, headphone use and weather conditions. Maybe your software has important information to share on rainy days!<\/p>\n<p>The <a href=\"https:\/\/fiware-iot-stack.readthedocs.io\/en\/latest\/context_broker\/index.html\">Orion Context Broker<\/a> is an open-source implementation for the FIWARE API. The context broker allows you to manage the lifecycle of context factors. You can query real-time data from public or private context providers. For example, you can query traffic information, temperature, water currents, stock prices, or any system that provides real-time data streams from sensors or data sets.<\/p>\n<h2>Using triggers to drive content<\/h2>\n<p>Once you know your user\u2019s context, think about triggers that allow content to be personalised to the user\u2019s situation.<\/p>\n<p>You\u2019ve seen a trigger before. When you try to delete something from an app or software, you get a message that asks, \u201cAre you sure you want to delete this?\u201d In this case, the simplified context is that a user is deleting something, and the software recognizes this trigger and sends a message to the user.<\/p>\n<p>Imagine a more complex trigger, coupled with user access management:<\/p>\n<ul>\n<li>A trigger returns TRUE when the user clicks an INSERT operation; the context reveals that the user is a first-time user and may need some onboarding help to understand the functionality of the operation.<\/li>\n<li>The trigger returns FALSE when the user clicks the same INSERT operation; the user context reveals that the user has been using this software every day for 3 months and has used this operation 10 times. This user probably already knows the function of the INSERT operation.<\/li>\n<\/ul>\n<p>Let\u2019s take this example one step farther:<\/p>\n<ul>\n<li>The trigger returns TRUE when the user clicks INSERT; the context reveals this authenticated user has logged in to the software 5 times over a one-year period. The user is not \u2018new\u2019, but logins have been infrequent. At this point, you\u2019ll want to decide if the trigger should return TRUE and deliver some basic info, or assume the user doesn\u2019t need this type of help.<\/li>\n<\/ul>\n<p>An example using sensors:<\/p>\n<ul>\n<li>Let\u2019s say you\u2019ve developed software specifically for boating enthusiasts. Using your software, a user wants to plan which days she\u2019ll go out on an excursion and what route she\u2019ll navigate. Your software can gather real-time marine data of water currents, wind speed and direction, and wave swell, and couple this data with personalized user data. Your software tracks the user\u2019s geo-location and based on data they entered when signing up for your software application, you know the boat type, boat size, motor size, and other details that would affect marine navigation.<\/li>\n<\/ul>\n<h2>Design personalized user content using <em><strong>edc<\/strong><\/em><\/h2>\n<p>Admittedly, it\u2019s going to take some writer and developer collaboration to design embedded help content based on user personas.<\/p>\n<p>And <em><strong>edc<\/strong> <\/em>is here to help.<\/p>\n<p>Using <em><strong>edc<\/strong><\/em>, writers and developers can log in to access the same content, add IDs to connect content to the software UI, add screenshots for clarity, comments, and links to related content. Embedded help with <em><strong>edc<\/strong> <\/em>addresses the users context, and related links to online help allow the user to go as far as he or she wants to go in search of information.<\/p>\n<p>Of course, you\u2019ll want to spend some time <a href=\"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/personas-mapping-user-experience-for-information-delivery\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>developing user personas<\/em><\/a> , planning how you will address the context of each persona, and mapping your content [link to article] for each persona.<\/p>\n<p><a href=\"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/lets-get-personal-how-we-imagined-personalized-embedded-software-help-in-youtube\/\">In our next post<\/a>, we\u2019ll look at how <em>YouTube<\/em> designs contextual help for users and how we see taking it one step further.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you store user data based on logins to your software, you\u2019re in a position to dive deeper into contextual embedded help. User data can drive your embedded content, providing more relevant information for each user. In this article, we\u2019ll talk about using data derived from authenticated users to design personalised user content. Authentication refers [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[41],"tags":[],"class_list":["post-4674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Using Access Management to Design Personalised User Content | edc<\/title>\n<meta name=\"description\" content=\"In this article, we\u2019ll talk about using data derived from authenticated users to design personalized user content.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Access Management to Design Personalised User Content | edc\" \/>\n<meta property=\"og:description\" content=\"In this article, we\u2019ll talk about using data derived from authenticated users to design personalized user content.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/\" \/>\n<meta property=\"og:site_name\" content=\"edc\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T08:18:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-18T12:45:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2017\/10\/USING-ACCESS-MANAGEMENT-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Using Access Management (Authentication) to Design Personalised User Content\",\"datePublished\":\"2020-12-21T08:18:57+00:00\",\"dateModified\":\"2021-03-18T12:45:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/\"},\"wordCount\":1220,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.easydoccontents.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/USING-ACCESS-MANAGEMENT-scaled.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/\",\"url\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/\",\"name\":\"Using Access Management to Design Personalised User Content | edc\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.easydoccontents.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/USING-ACCESS-MANAGEMENT-scaled.jpg\",\"datePublished\":\"2020-12-21T08:18:57+00:00\",\"dateModified\":\"2021-03-18T12:45:21+00:00\",\"description\":\"In this article, we\u2019ll talk about using data derived from authenticated users to design personalized user content.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.easydoccontents.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/USING-ACCESS-MANAGEMENT-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.easydoccontents.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/USING-ACCESS-MANAGEMENT-scaled.jpg\",\"width\":2560,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/2020\\\/12\\\/21\\\/using-access-management-authentication-to-design-personalised-user-content\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using Access Management (Authentication) to Design Personalised User Content\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#website\",\"url\":\"https:\\\/\\\/www.easydoccontents.com\\\/\",\"name\":\"edc\",\"description\":\"easydoccontents\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.easydoccontents.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#organization\",\"name\":\"edc\",\"url\":\"https:\\\/\\\/www.easydoccontents.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.easydoccontents.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/LogoTECH_advantage_noir-2-1.png\",\"contentUrl\":\"https:\\\/\\\/www.easydoccontents.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/LogoTECH_advantage_noir-2-1.png\",\"width\":117,\"height\":54,\"caption\":\"edc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.easydoccontents.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/edc---easy-doc-contents-software\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCPVgVUy5HMLnknwGwDqLnJw\\\/featured\"]},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/www.easydoccontents.com\\\/en\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using Access Management to Design Personalised User Content | edc","description":"In this article, we\u2019ll talk about using data derived from authenticated users to design personalized user content.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/","og_locale":"en_US","og_type":"article","og_title":"Using Access Management to Design Personalised User Content | edc","og_description":"In this article, we\u2019ll talk about using data derived from authenticated users to design personalized user content.","og_url":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/","og_site_name":"edc","article_published_time":"2020-12-21T08:18:57+00:00","article_modified_time":"2021-03-18T12:45:21+00:00","og_image":[{"width":2560,"height":1600,"url":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2017\/10\/USING-ACCESS-MANAGEMENT-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#article","isPartOf":{"@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/"},"author":{"name":"","@id":""},"headline":"Using Access Management (Authentication) to Design Personalised User Content","datePublished":"2020-12-21T08:18:57+00:00","dateModified":"2021-03-18T12:45:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/"},"wordCount":1220,"commentCount":0,"publisher":{"@id":"https:\/\/www.easydoccontents.com\/#organization"},"image":{"@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#primaryimage"},"thumbnailUrl":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2017\/10\/USING-ACCESS-MANAGEMENT-scaled.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/","url":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/","name":"Using Access Management to Design Personalised User Content | edc","isPartOf":{"@id":"https:\/\/www.easydoccontents.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#primaryimage"},"image":{"@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#primaryimage"},"thumbnailUrl":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2017\/10\/USING-ACCESS-MANAGEMENT-scaled.jpg","datePublished":"2020-12-21T08:18:57+00:00","dateModified":"2021-03-18T12:45:21+00:00","description":"In this article, we\u2019ll talk about using data derived from authenticated users to design personalized user content.","breadcrumb":{"@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#primaryimage","url":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2017\/10\/USING-ACCESS-MANAGEMENT-scaled.jpg","contentUrl":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2017\/10\/USING-ACCESS-MANAGEMENT-scaled.jpg","width":2560,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/www.easydoccontents.com\/en\/2020\/12\/21\/using-access-management-authentication-to-design-personalised-user-content\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.easydoccontents.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Using Access Management (Authentication) to Design Personalised User Content"}]},{"@type":"WebSite","@id":"https:\/\/www.easydoccontents.com\/#website","url":"https:\/\/www.easydoccontents.com\/","name":"edc","description":"easydoccontents","publisher":{"@id":"https:\/\/www.easydoccontents.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.easydoccontents.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.easydoccontents.com\/#organization","name":"edc","url":"https:\/\/www.easydoccontents.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.easydoccontents.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2020\/11\/LogoTECH_advantage_noir-2-1.png","contentUrl":"https:\/\/www.easydoccontents.com\/wp-content\/uploads\/2020\/11\/LogoTECH_advantage_noir-2-1.png","width":117,"height":54,"caption":"edc"},"image":{"@id":"https:\/\/www.easydoccontents.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/edc---easy-doc-contents-software\/","https:\/\/www.youtube.com\/channel\/UCPVgVUy5HMLnknwGwDqLnJw\/featured"]},{"@type":"Person","@id":"","url":"https:\/\/www.easydoccontents.com\/en\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/posts\/4674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/comments?post=4674"}],"version-history":[{"count":4,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/posts\/4674\/revisions"}],"predecessor-version":[{"id":5786,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/posts\/4674\/revisions\/5786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/media\/4485"}],"wp:attachment":[{"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/media?parent=4674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/categories?post=4674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.easydoccontents.com\/en\/wp-json\/wp\/v2\/tags?post=4674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}