{"id":15911,"date":"2026-04-15T03:01:42","date_gmt":"2026-04-14T18:01:42","guid":{"rendered":"https:\/\/m365jp.net\/?p=15911"},"modified":"2026-04-15T03:06:21","modified_gmt":"2026-04-14T18:06:21","slug":"mc1279830-second-deployment-phase-for-kerberos-rc4-hardening-begins-with-the-april-2026-windows-security-update","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-04-15-mc1279830-second-deployment-phase-for-kerberos-rc4-hardening-begins-with-the-april-2026-windows-security-update","title":{"rendered":"MC1279830 | Second deployment phase for Kerberos RC4 hardening begins with the April 2026 Windows security update"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1279830 | Second deployment phase for Kerberos RC4 hardening begins with the April 2026 Windows security update<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>stayInformed<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>04\/14\/2026 17:03:37<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>04\/14\/2026 17:03:33<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>04\/14\/2027 17:03:33<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<div>Windows updates released April 2026 and later begin the <a href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBN\" rel=\"noopener noreferrer\" target=\"_blank\">  second deployment phase<\/a> of protections for a Kerberos information disclosure vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20833\" rel=\"noopener noreferrer\" target=\"_blank\">CVE\u20112026\u201120833<\/a>). In this phase, domain   controllers change default Kerberos ticket behavior for accounts that do not have an explicit Kerberos encryption configuration, shifting to AES\u2011SHA1-only by default. Environments with remaining RC4 dependencies may experience authentication issues unless   those dependencies are remediated or explicitly configured.<\/div>\n<div>  <\/div>\n<div><b>When this will happen:<\/b><\/div>\n<ul>\n<li>April 2026 &#8211; Enforcement Phase with manual rollback: With installation of the April 2026 Windows security update, default Kerberos behavior changes so domain controllers use AES\u2011SHA1-only encryption for accounts without  <a href=\"https:\/\/learn.microsoft.com\/troubleshoot\/windows-server\/windows-security\/kerberos-protocol-registry-kdc-configuration-keys\" rel=\"noopener noreferrer\" target=\"_blank\">  explicit encryption type<\/a> settings, and Enforcement mode is enabled by default on Windows domain controllers. Audit mode remains available as a manual rollback option until July 2026.<\/li>\n<li>July 2026 &#8211; Enforcement Phase: Audit mode is removed, leaving Enforcement mode as the only option.<\/li>\n<\/ul>\n<div>  <\/div>\n<div><b>How this will affect your organization:<\/b><\/div>\n<div>With installation of the April 2026 Windows security update, domain controllers will default to issuing AES\u2011SHA1-encrypted tickets for accounts that do not explicitly define supported encryption types. Environments with service accounts, applications,   or devices that still require RC4-based Kerberos tickets may see authentication or connection failures unless those dependencies are addressed. Kerberos-related events in the System event log can help  <a href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL\" rel=\"noopener noreferrer\" target=\"_blank\">  identify and address misconfigurations or remaining dependencies<\/a> that are likely to become incompatible as enforcement progresses.<\/div>\n<div>  <\/div>\n<div><b>Note: <\/b>For devices using Azure Files SMB with Active Directory\u2013based authentication, address any RC4 dependencies before the Enforcement phase begins to reduce the risk of access disruption as Audit mode is removed in July 2026. Follow the steps   in the <a href=\"https:\/\/aka.ms\/rc4azurefiles\" rel=\"noopener noreferrer\" target=\"_blank\">  official documentation<\/a> to help maintain uninterrupted access to Azure Files and Azure Virtual Desktop.<\/div>\n<div>  <\/div>\n<div><b>What you need to do to prepare:<\/b><\/div>\n<div>Monitor the System event log for Kerberos-related events indicating RC4 dependencies or insecure encryption configurations. If event log data shows RC4 reliance, remediate by moving to stronger encryption or explicitly configuring the account\u2019s  <b>msds-SupportedEncryptionTypes<\/b> attribute where RC4 is still required. Complete remediation before July 2026, when Audit mode is removed and Enforcement mode becomes the only available option.<\/div>\n<div>  <\/div>\n<div><b>Note:<\/b> Audit events related to this change are only generated when Active Directory is unable to issue AES\u2011SHA1 service tickets or session keys. The absence of audit events does not guarantee that all non-Windows devices will successfully accept   Kerberos authentication after the April 2026 Enforcement phase begins. Validate non-Windows interoperability through testing before broadly enabling this behavior.<\/div>\n<div>  <\/div>\n<div><b>Additional&nbsp;information:&nbsp;<\/b><\/div>\n<ul>\n<li>Read the full hardening guidance:&nbsp;<a href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc\" rel=\"noopener noreferrer\" target=\"_blank\">How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to   CVE-2026-20833<\/a>.<\/li>\n<li>Learn about RC4 usage in Windows and its risks: <a href=\"https:\/\/learn.microsoft.com\/windows-server\/security\/kerberos\/detect-remediate-rc4-kerberos\" rel=\"noopener noreferrer\" target=\"_blank\">  Detect and remediate RC4 usage in Kerberos<\/a>.<\/li>\n<li>Learn more about the related vulnerability: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20833\" rel=\"noopener noreferrer\" target=\"_blank\">  CVE-2026-20833<\/a>.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<th>Machine Translation<\/th>\n<td>\n<div>2026\u5e744\u6708\u4ee5\u964d\u306b\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305fWindows\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306f\u3001Kerberos\u60c5\u5831\u958b\u793a\u8106\u5f31\u6027(<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20833\" rel=\"noopener noreferrer\" target=\"_blank\">CVE-2026-20833<\/a>)\u306b\u5bfe\u3059\u308b<a href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBN\" rel=\"noopener noreferrer\" target=\"_blank\">\u4fdd\u8b77\u306e\u7b2c2\u6bb5\u968e<\/a>\u5c55\u958b\u3092\u958b\u59cb\u3057\u307e\u3059\u3002\u3053\u306e\u6bb5\u968e\u3067\u306f\u3001\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u30fc\u306f\u660e\u793a\u7684\u306aKerberos\u6697\u53f7\u5316\u8a2d\u5b9a\u3092\u6301\u305f\u306a\u3044\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30c7\u30d5\u30a9\u30eb\u30c8\u306eKerberos\u30c1\u30b1\u30c3\u30c8\u52d5\u4f5c\u3092\u5909\u66f4\u3057\u3001\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u306fAES-SHA1\u306e\u307f\u306b\u30b7\u30d5\u30c8\u3057\u307e\u3059\u3002RC4\u4f9d\u5b58\u95a2\u4fc2\u304c\u6b8b\u3063\u3066\u3044\u308b\u74b0\u5883\u3067\u306f\u3001\u305d\u308c\u3089\u306e\u4f9d\u5b58\u95a2\u4fc2\u304c\u4fee\u5fa9\u3055\u308c\u308b\u304b\u660e\u793a\u7684\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u306a\u3044\u9650\u308a\u3001\u8a8d\u8a3c\u306e\u554f\u984c\u304c\u767a\u751f\u3059\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/div>\n<div>  <\/div>\n<div><b>\u305d\u306e\u6642\u671f:<\/b><\/div>\n<ul>\n<li>2026\u5e744\u6708 &#8211; \u624b\u52d5\u30ed\u30fc\u30eb\u30d0\u30c3\u30af\u3092\u4f34\u3046\u5f37\u5236\u30d5\u30a7\u30fc\u30ba:2026\u5e744\u6708\u306eWindows\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u306b\u3088\u308a\u3001\u30c7\u30d5\u30a9\u30eb\u30c8\u306eKerberos\u52d5\u4f5c\u304c\u5909\u66f4\u3055\u308c\u3001\u660e  <a href=\"https:\/\/learn.microsoft.com\/troubleshoot\/windows-server\/windows-security\/kerberos-protocol-registry-kdc-configuration-keys\" rel=\"noopener noreferrer\" target=\"_blank\">  \u793a\u7684\u306a\u6697\u53f7\u5316\u30bf\u30a4\u30d7<\/a> \u8a2d\u5b9a\u304c\u306a\u3044\u30a2\u30ab\u30a6\u30f3\u30c8\u3067\u306f\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u30fc\u304cAES-SHA1\u306e\u307f\u306e\u6697\u53f7\u5316\u3092\u4f7f\u7528\u3057\u3001Windows\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u30fc\u3067\u306f\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u5f37\u5236\u30e2\u30fc\u30c9\u304c\u6709\u52b9\u5316\u3055\u308c\u307e\u3059\u3002\u76e3\u67fb\u30e2\u30fc\u30c9\u306f2026\u5e747\u6708\u307e\u3067\u624b\u52d5\u30ed\u30fc\u30eb\u30d0\u30c3\u30af\u30aa\u30d7\u30b7\u30e7\u30f3\u3068\u3057\u3066\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002<\/li>\n<li>2026\u5e747\u6708 &#8211; \u57f7\u884c\u30d5\u30a7\u30fc\u30ba:\u76e3\u67fb\u30e2\u30fc\u30c9\u304c\u524a\u9664\u3055\u308c\u3001\u57f7\u884c\u30e2\u30fc\u30c9\u306e\u307f\u304c\u9078\u629e\u80a2\u3068\u306a\u308a\u307e\u3059\u3002<\/li>\n<\/ul>\n<div>  <\/div>\n<div><b>\u3053\u308c\u304c\u3042\u306a\u305f\u306e\u7d44\u7e54\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b:<\/b><\/div>\n<div>2026\u5e744\u6708\u306eWindows\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5c0e\u5165\u306b\u3088\u308a\u3001\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u30fc\u306f\u30b5\u30dd\u30fc\u30c8\u6697\u53f7\u5316\u30bf\u30a4\u30d7\u3092\u660e\u793a\u7684\u306b\u5b9a\u7fa9\u3057\u3066\u3044\u306a\u3044\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u3057\u3066AES-SHA1\u6697\u53f7\u5316\u3055\u308c\u305f\u30c1\u30b1\u30c3\u30c8\u3092\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u767a\u884c\u3059\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30c7\u30d0\u30a4\u30b9\u304cRC4\u30d9\u30fc\u30b9\u306eKerberos\u30c1\u30b1\u30c3\u30c8\u3092\u5fc5\u8981\u3068\u3059\u308b\u74b0\u5883\u3067\u306f\u3001\u3053\u308c\u3089\u306e\u4f9d\u5b58\u95a2\u4fc2\u304c\u5bfe\u51e6\u3055\u308c\u306a\u3044\u9650\u308a\u8a8d\u8a3c\u3084\u63a5\u7d9a\u5931\u6557\u304c\u767a\u751f\u3059\u308b\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002\u30b7\u30b9\u30c6\u30e0\u30a4\u30d9\u30f3\u30c8\u30ed\u30b0\u5185\u306eKerberos\u95a2\u9023\u30a4\u30d9\u30f3\u30c8\u306f\u3001\u57f7\u884c\u304c\u9032\u3080\u306b\u3064\u308c\u3066\u4e92\u63db\u6027\u304c\u306a\u304f\u306a\u308b\u53ef\u80fd\u6027\u306e\u3042\u308b  <a href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL\" rel=\"noopener noreferrer\" target=\"_blank\">  \u8aa4\u8a2d\u5b9a\u3084\u6b8b\u5b58\u3059\u308b\u4f9d\u5b58\u95a2\u4fc2\u3092\u7279\u5b9a\u3057\u5bfe\u51e6<\/a> \u3059\u308b\u306e\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002<\/div>\n<div>  <\/div>\n<div><b>\u6ce8: <\/b>Active Directory\u30d9\u30fc\u30b9\u306e\u8a8d\u8a3c\u3067Azure Files SMB\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u30c7\u30d0\u30a4\u30b9\u306b\u3064\u3044\u3066\u306f\u3001\u5f37\u5236\u30d5\u30a7\u30fc\u30ba\u958b\u59cb\u524d\u306bRC4\u4f9d\u5b58\u95a2\u4fc2\u3092\u51e6\u7406\u3057\u3001\u76e3\u67fb\u30e2\u30fc\u30c9\u304c2026\u5e747\u6708\u306b\u89e3\u9664\u3055\u308c\u308b\u305f\u3081\u30a2\u30af\u30bb\u30b9\u969c\u5bb3\u306e\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3057\u3066\u304f\u3060\u3055\u3044\u3002  <a href=\"https:\/\/aka.ms\/rc4azurefiles\" rel=\"noopener noreferrer\" target=\"_blank\">  \u516c\u5f0f\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8<\/a> \u306e\u624b\u9806\u306b\u5f93\u3063\u3066\u3001Azure Files\u304a\u3088\u3073Azure Virtual Desktop\u3078\u306e\u9014\u5207\u308c\u306a\u3044\u30a2\u30af\u30bb\u30b9\u3092\u7dad\u6301\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/div>\n<div>  <\/div>\n<div><b>\u6e96\u5099\u306e\u305f\u3081\u306b\u3084\u308b\u3079\u304d\u3053\u3068:<\/b><\/div>\n<div>\u30b7\u30b9\u30c6\u30e0\u30a4\u30d9\u30f3\u30c8\u30ed\u30b0\u3092\u76e3\u8996\u3057\u3001RC4\u4f9d\u5b58\u95a2\u4fc2\u3084\u4e0d\u5b89\u5168\u306a\u6697\u53f7\u5316\u8a2d\u5b9a\u3092\u793a\u3059Kerberos\u95a2\u9023\u30a4\u30d9\u30f3\u30c8\u3092\u76e3\u8996\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u30a4\u30d9\u30f3\u30c8\u30ed\u30b0\u306e\u30c7\u30fc\u30bf\u3067RC4\u4f9d\u5b58\u304c\u793a\u3055\u308c\u305f\u5834\u5408\u306f\u3001\u3088\u308a\u5f37\u529b\u306a\u6697\u53f7\u5316\u306b\u5207\u308a\u66ff\u3048\u308b\u304b\u3001RC4\u304c\u307e\u3060\u5fc5\u8981\u306a\u30a2\u30ab\u30a6\u30f3\u30c8\u306e  <b>msds-SupportedEncryptionTypes<\/b> \u5c5e\u6027\u3092\u660e\u793a\u7684\u306b\u8a2d\u5b9a\u3057\u3066\u88dc\u6b63\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u76e3\u67fb\u30e2\u30fc\u30c9\u304c\u64a4\u5ec3\u3055\u308c\u3001\u57f7\u884c\u30e2\u30fc\u30c9\u304c\u552f\u4e00\u306e\u9078\u629e\u80a2\u3068\u306a\u308b2026\u5e747\u6708\u307e\u3067\u306b\u5b8c\u5168\u306a\u4fee\u5fa9\u304c\u5fc5\u8981\u3067\u3059\u3002<\/div>\n<div>  <\/div>\n<div><b>\u6ce8:<\/b> \u3053\u306e\u5909\u66f4\u306b\u95a2\u9023\u3059\u308b\u76e3\u67fb\u30a4\u30d9\u30f3\u30c8\u306f\u3001Active Directory\u304cAES-SHA1\u30b5\u30fc\u30d3\u30b9\u30c1\u30b1\u30c3\u30c8\u3084\u30bb\u30c3\u30b7\u30e7\u30f3\u30ad\u30fc\u3092\u767a\u884c\u3067\u304d\u306a\u3044\u5834\u5408\u306e\u307f\u751f\u6210\u3055\u308c\u307e\u3059\u3002\u76e3\u67fb\u30a4\u30d9\u30f3\u30c8\u304c\u306a\u304b\u3063\u305f\u304b\u3089\u3068\u3044\u3063\u3066\u30012026\u5e744\u6708\u306e\u5f37\u5236\u30d5\u30a7\u30fc\u30ba\u958b\u59cb\u5f8c\u306b\u3059\u3079\u3066\u306e\u975eWindows\u30c7\u30d0\u30a4\u30b9\u304cKerberos\u8a8d\u8a3c\u3092\u6b63\u5e38\u306b\u53d7\u3051\u5165\u308c\u3089\u308c\u308b\u4fdd\u8a3c\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3053\u306e\u52d5\u4f5c\u3092\u5e83\u304f\u8a31\u53ef\u3059\u308b\u524d\u306b\u3001\u30c6\u30b9\u30c8\u3092\u901a\u3058\u3066\u975eWindows\u306e\u76f8\u4e92\u904b\u7528\u6027\u3092\u691c\u8a3c\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/div>\n<div>  <\/div>\n<div><b>\u8ffd\u52a0&nbsp;\u60c5\u5831:&nbsp;<\/b><\/div>\n<ul>\n<li><a href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc\" rel=\"noopener noreferrer\" target=\"_blank\">CVE-2026-20833\u306b\u95a2\u9023\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u30c1\u30b1\u30c3\u30c8\u767a\u884c\u306e\u5909\u66f4\u306b\u95a2\u3059\u308bKerberos KDC\u306eRC4\u4f7f\u7528<\/a>\u7ba1\u7406\u65b9\u6cd5\u3092\u5168\u6587\u3092\u304a\u8aad\u307f\u304f\u3060\u3055\u3044&nbsp;\u3002<\/li>\n<li>Windows\u3067\u306eRC4\u4f7f\u7528\u3068\u305d\u306e\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u5b66\u3073\u307e\u3057\u3087\u3046: <a href=\"https:\/\/learn.microsoft.com\/windows-server\/security\/kerberos\/detect-remediate-rc4-kerberos\" rel=\"noopener noreferrer\" target=\"_blank\">  Kerberos\u3067\u306eRC4\u4f7f\u7528\u3092\u691c\u51fa\u3057\u3001\u4fee\u6b63<\/a>\u3057\u307e\u3057\u3087\u3046\u3002<\/li>\n<li>\u95a2\u9023\u3059\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u8a73\u3057\u304f\u306f\u3053\u3061\u3089\u3092\u3054\u89a7\u304f\u3060\u3055\u3044: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20833\" rel=\"noopener noreferrer\" target=\"_blank\">  CVE-2026-20833<\/a>\u3002<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1279830 | Second deployment phase for Kerberos RC4 hardening begins with the April 2026 Windows security upd [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15911","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/15911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=15911"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/15911\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=15911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=15911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=15911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}