{"id":22668,"date":"2026-02-20T14:50:30","date_gmt":"2026-02-20T14:50:30","guid":{"rendered":"https:\/\/saga.rs\/?p=22668"},"modified":"2026-03-19T08:57:22","modified_gmt":"2026-03-19T08:57:22","slug":"saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9","status":"publish","type":"post","link":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/","title":{"rendered":"Passkey \u2013 a more secure cyber future"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=&#8221;22676&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;&#8221;]Passwords have been the standard for authentication for decades, but they have proven to be one of the weakest elements of security. Phishing, password reuse, brute-force attacks, and database breaches make passwords risky and costly to maintain. Passkey technology addresses these issues by introducing a modern, cryptography-based, passwordless authentication method.<\/p>\n<p><strong>What are passkeys?<\/strong><\/p>\n<p>A passkey is a login method based on a combination of a public and private key (public-key cryptography).<\/p>\n<p>Instead of users remembering a password, their device generates a key pair:<\/p>\n<p>\u2022 The private key is securely stored on the device (TPM, Secure Enclave, hardware key).<br \/>\n\u2022 The public key is registered with the service (server).<\/p>\n<p>During login, the server sends a cryptographic challenge that is signed with the private key. The user\u2019s identity is verified without transmitting any secrets over the network.<\/p>\n<p><strong>What does the login process look like in practice?<\/strong><\/p>\n<p><img class=\"aligncenter wp-image-22690 size-large\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Blog_Grafika-1-1024x287.png\" alt=\"\" width=\"1024\" height=\"287\" srcset=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Blog_Grafika-1-1024x287.png 1024w, https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Blog_Grafika-1-300x84.png 300w, https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Blog_Grafika-1-768x215.png 768w, https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Blog_Grafika-1.png 1203w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>Key advantages<\/strong><\/p>\n<p>\u2022 Phishing resistance<br \/>\nA passkey is tied to a specific domain, so a fake website cannot use it.<\/p>\n<p>\u2022 No reuse problem<br \/>\nEach service has its own unique key.<\/p>\n<p>\u2022 No password leaks<br \/>\nThe server does not store secrets that could be compromised.<\/p>\n<p>\u2022 Better user experience<br \/>\nFaster login without the need to remember passwords.<\/p>\n<p>Challenges and limitations<\/p>\n<p>Of course, it\u2019s not all perfect, there are challenges with this technology as well. A passkey is tied to a device, so care must be taken not to lose the device. There must be a way for users to access the system even if they lose their passkey.<\/p>\n<p>Users also need to be trained to use this new technology, which never comes without some resistance and initial difficulties.<\/p>\n<p>There are scenarios where using a device for authentication can be challenging. For example, when you are logged in via remote desktop to a remote computer. On that remote machine, you may want to authenticate to an application, but the key is on your local device while the browser is unavailable. However, solutions exist for all of these challenges.<\/p>\n<p><strong>Where can you use passkeys today?<\/strong><\/p>\n<p><img class=\"aligncenter wp-image-22673\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/logoi-1-300x148.jpg\" alt=\"\" width=\"600\" height=\"297\" srcset=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/logoi-1-300x148.jpg 300w, https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/logoi-1-768x380.jpg 768w, https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/logoi-1.jpg 779w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Passkey technology represents a practical and mature step toward a passwordless future. It brings stronger security, a better user experience, and lower operational costs. Organizations planning to modernize their authentication systems should consider passkeys as a primary method, with carefully planned onboarding, recovery options, and compatibility with existing systems.<\/p>\n<p>If you would like to test passkey technology, visit <a href=\"https:\/\/saga.rs\/en\/cyber-security\/multi-factor-authentication\/\">the link<\/a> and get in touch with us.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below  thegem-custom-69e187b9ac5e2301\"  style=\"\" ><div class=\"gem-wrapbox-inner \" ><a href=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Potpis-za-blog-transparent-Djordje.png\" class=\"fancybox\"><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Potpis-za-blog-transparent-Djordje.png\" alt=\"\"\/><\/a><\/div><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Passkey technology brings a new era of passwordless authentication, based on cryptography, resistant to phishing, and adapted to modern security challenges. Learn how it works, where it\u2019s already being used, and what organizations need to know before transitioning to a passwordless approach.<\/p>\n","protected":false},"author":7,"featured_media":22677,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107],"tags":[],"class_list":{"0":"post-22668","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Passkey \u2013 a more secure cyber future - Saga<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passkey \u2013 a more secure cyber future - Saga\" \/>\n<meta property=\"og:description\" content=\"Passkey technology brings a new era of passwordless authentication, based on cryptography, resistant to phishing, and adapted to modern security challenges. Learn how it works, where it\u2019s already being used, and what organizations need to know before transitioning to a passwordless approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\" \/>\n<meta property=\"og:site_name\" content=\"Saga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-20T14:50:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T08:57:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katarina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katarina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\"},\"author\":{\"name\":\"Katarina\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/9affa51337305b4459f1cac7ae7ef99e\"},\"headline\":\"Passkey \u2013 a more secure cyber future\",\"datePublished\":\"2026-02-20T14:50:30+00:00\",\"dateModified\":\"2026-03-19T08:57:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\"},\"wordCount\":439,\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\",\"url\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\",\"name\":\"Passkey \u2013 a more secure cyber future - Saga\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg\",\"datePublished\":\"2026-02-20T14:50:30+00:00\",\"dateModified\":\"2026-03-19T08:57:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saga.rs\/en\/sample-page-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passkey \u2013 a more secure cyber future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saga.rs\/#website\",\"url\":\"https:\/\/saga.rs\/\",\"name\":\"Saga\",\"description\":\"A Noventiq Company\",\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saga.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/saga.rs\/#organization\",\"name\":\"Saga A Noventiq Company\",\"url\":\"https:\/\/saga.rs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"width\":1596,\"height\":450,\"caption\":\"Saga A Noventiq Company\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\",\"https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs\",\"https:\/\/www.instagram.com\/saga_beograd\/\",\"https:\/\/www.youtube.com\/@SagaBeograd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/9affa51337305b4459f1cac7ae7ef99e\",\"name\":\"Katarina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/040b5827e77ecffe9a5cafeb074b7c17be77320ba03874b97e9e02a1518dd15b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/040b5827e77ecffe9a5cafeb074b7c17be77320ba03874b97e9e02a1518dd15b?s=96&d=mm&r=g\",\"caption\":\"Katarina\"},\"url\":\"https:\/\/saga.rs\/en\/author\/katarina\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Passkey \u2013 a more secure cyber future - Saga","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/","og_locale":"en_US","og_type":"article","og_title":"Passkey \u2013 a more secure cyber future - Saga","og_description":"Passkey technology brings a new era of passwordless authentication, based on cryptography, resistant to phishing, and adapted to modern security challenges. Learn how it works, where it\u2019s already being used, and what organizations need to know before transitioning to a passwordless approach.","og_url":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/","og_site_name":"Saga","article_publisher":"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","article_published_time":"2026-02-20T14:50:30+00:00","article_modified_time":"2026-03-19T08:57:22+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg","type":"image\/jpeg"}],"author":"Katarina","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katarina","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#article","isPartOf":{"@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/"},"author":{"name":"Katarina","@id":"https:\/\/saga.rs\/#\/schema\/person\/9affa51337305b4459f1cac7ae7ef99e"},"headline":"Passkey \u2013 a more secure cyber future","datePublished":"2026-02-20T14:50:30+00:00","dateModified":"2026-03-19T08:57:22+00:00","mainEntityOfPage":{"@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/"},"wordCount":439,"publisher":{"@id":"https:\/\/saga.rs\/#organization"},"image":{"@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage"},"thumbnailUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/","url":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/","name":"Passkey \u2013 a more secure cyber future - Saga","isPartOf":{"@id":"https:\/\/saga.rs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage"},"image":{"@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage"},"thumbnailUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg","datePublished":"2026-02-20T14:50:30+00:00","dateModified":"2026-03-19T08:57:22+00:00","breadcrumb":{"@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#primaryimage","url":"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2026\/02\/Artboard-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/saga.rs\/en\/blog-en\/saga-and-wazuh-join-forces-for-scalable-cybersecurity-solutions-9\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saga.rs\/en\/sample-page-2\/"},{"@type":"ListItem","position":2,"name":"Passkey \u2013 a more secure cyber future"}]},{"@type":"WebSite","@id":"https:\/\/saga.rs\/#website","url":"https:\/\/saga.rs\/","name":"Saga","description":"A Noventiq Company","publisher":{"@id":"https:\/\/saga.rs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saga.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/saga.rs\/#organization","name":"Saga A Noventiq Company","url":"https:\/\/saga.rs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","width":1596,"height":450,"caption":"Saga A Noventiq Company"},"image":{"@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs","https:\/\/www.instagram.com\/saga_beograd\/","https:\/\/www.youtube.com\/@SagaBeograd"]},{"@type":"Person","@id":"https:\/\/saga.rs\/#\/schema\/person\/9affa51337305b4459f1cac7ae7ef99e","name":"Katarina","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/040b5827e77ecffe9a5cafeb074b7c17be77320ba03874b97e9e02a1518dd15b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/040b5827e77ecffe9a5cafeb074b7c17be77320ba03874b97e9e02a1518dd15b?s=96&d=mm&r=g","caption":"Katarina"},"url":"https:\/\/saga.rs\/en\/author\/katarina\/"}]}},"menu_order":0,"_links":{"self":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/22668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/comments?post=22668"}],"version-history":[{"count":5,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/22668\/revisions"}],"predecessor-version":[{"id":23238,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/22668\/revisions\/23238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media\/22677"}],"wp:attachment":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media?parent=22668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/categories?post=22668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/tags?post=22668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}