{"id":397,"date":"2015-05-19T10:51:25","date_gmt":"2015-05-19T08:51:25","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=397"},"modified":"2023-03-14T08:57:40","modified_gmt":"2023-03-14T07:57:40","slug":"privilegierte-it-zugriffe-leitfaden-zum-monitoring","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/","title":{"rendered":"Privileged IT access: monitoring guide"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-398\" src=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg\" alt=\"privileged-it-access-guide-to-monitoring-it-security\" width=\"200\" height=\"306\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg 200w, https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security-196x300.jpg 196w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n<p>One of IT's biggest challenges is to prevent privileged users from doing something in systems that they are not allowed to do. The activities of website visitors are subject to restrictions, to be sure. However, the same is not true for employees and certainly not for company system administrators. The freedom of users grows with their access rights: The higher their rights in IT systems, the greater the risks they pose to the company.<\/p>\n<p>System administrators are the most powerful users in the IT environment. They run the entire IT infrastructure with sensitive data and critical business systems. For those new to the position of CIO, monitoring staff may be a headache. How do you protect sensitive corporate data from mistakes or employee tampering?<\/p>\n<p>SecuMedia Verlags-GmbH, Germany, publishes white papers on various security topics at regular intervals.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Eine der gr\u00f6ssten Herausforderungen der IT besteht darin, zu verhindern, dass privilegierte Benutzer in den Systemen etwas tun, das ihnen nicht erlaubt ist. Die Aktivit\u00e4ten von Website-Besuchern unterliegen zwar Einschr\u00e4nkungen. Gleiches gilt jedoch nicht f\u00fcr Mitarbeitende und sicherlich nicht f\u00fcr Systemadministratoren des Unternehmens. Die Freiheit der Benutzer w\u00e4chst mit ihrer Zugriffsberechtigung: Je h\u00f6her ihre Rechte [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,62,63],"class_list":["post-397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Monitoring","_yoast_wpseo_opengraph-image":"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg","_yoast_wpseo_opengraph-description":"In jedem Unternehmen gibt es privilegierte IT-Zugriffe. Deshalb stellt sich die Frage: Wie sch\u00fctzt man sensible Unternehmensdaten vor Fehlern oder der Manipulation der Mitarbeitenden?","_yoast_wpseo_opengraph-title":"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privilegierte IT-Zugriffe: Leitfaden zum Monitoring - Save<\/title>\n<meta name=\"description\" content=\"In jedem Unternehmen gibt es privilegierte IT-Zugriffe. Wie sch\u00fctzt man sensible Unternehmensdaten vor Fehlern oder der Manipulation der Mitarbeitenden?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring\" \/>\n<meta property=\"og:description\" content=\"In jedem Unternehmen gibt es privilegierte IT-Zugriffe. Deshalb stellt sich die Frage: Wie sch\u00fctzt man sensible Unternehmensdaten vor Fehlern oder der Manipulation der Mitarbeitenden?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-19T08:51:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring\",\"datePublished\":\"2015-05-19T08:51:25+00:00\",\"dateModified\":\"2023-03-14T07:57:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/\"},\"wordCount\":149,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/\",\"name\":\"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg\",\"datePublished\":\"2015-05-19T08:51:25+00:00\",\"dateModified\":\"2023-03-14T07:57:40+00:00\",\"description\":\"In jedem Unternehmen gibt es privilegierte IT-Zugriffe. Wie sch\u00fctzt man sensible Unternehmensdaten vor Fehlern oder der Manipulation der Mitarbeitenden?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg\",\"width\":200,\"height\":306},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privileged IT access: monitoring guide - Save","description":"Every company has privileged IT access. How do you protect sensitive company data from errors or employee manipulation?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring","og_description":"In jedem Unternehmen gibt es privilegierte IT-Zugriffe. Deshalb stellt sich die Frage: Wie sch\u00fctzt man sensible Unternehmensdaten vor Fehlern oder der Manipulation der Mitarbeitenden?","og_url":"https:\/\/news.save.ch\/en\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/","og_site_name":"Save","article_published_time":"2015-05-19T08:51:25+00:00","article_modified_time":"2023-03-14T07:57:40+00:00","og_image":[{"url":"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring","datePublished":"2015-05-19T08:51:25+00:00","dateModified":"2023-03-14T07:57:40+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/"},"wordCount":149,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/","url":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/","name":"Privileged IT access: monitoring guide - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg","datePublished":"2015-05-19T08:51:25+00:00","dateModified":"2023-03-14T07:57:40+00:00","description":"Every company has privileged IT access. How do you protect sensitive company data from errors or employee manipulation?","breadcrumb":{"@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Privilegierte-IT-Zugriffe-Leitfaden-zum-Monitoring-it-security.jpg","width":200,"height":306},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/privilegierte-it-zugriffe-leitfaden-zum-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Privilegierte IT-Zugriffe: Leitfaden zum Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/397\/revisions"}],"predecessor-version":[{"id":17789,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/397\/revisions\/17789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/398"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}