{"id":19441,"date":"2018-05-07T13:08:42","date_gmt":"2018-05-07T11:08:42","guid":{"rendered":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2.jpg"},"modified":"2018-05-07T13:08:42","modified_gmt":"2018-05-07T11:08:42","slug":"berechtigungs_management_2-2","status":"inherit","type":"attachment","link":"https:\/\/gis-consulting.de\/en\/unsere-prinzipien\/berechtigungs_management_2-2\/","title":{"rendered":"Berechtigungsmanagement"},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"class_list":["post-19441","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-300x300.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-300x300.jpg 300w, https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-768x768.jpg 768w, https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-60x60.jpg 60w, https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-1024x1024.jpg 1024w, https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-600x600.jpg 600w, https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" itemprop=\"image\" \/><\/a><\/p>\n<p>Das integrierte Berechtigungsmanagement ist ein weiteres Grundprinzip der gis GmbH. <\/p>\n"},"caption":{"rendered":"<p>Das integrierte Berechtigungsmanagement ist ein weiteres Grundprinzip der gis GmbH. <\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":900,"height":900,"file":"2018\/05\/berechtigungs_management_2.jpg","sizes":{"thumbnail":{"file":"berechtigungs_management_2-344x250.jpg","width":344,"height":250,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-344x250.jpg"},"medium":{"file":"berechtigungs_management_2-300x300.jpg","width":300,"height":300,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-300x300.jpg"},"medium_large":{"file":"berechtigungs_management_2-768x768.jpg","width":768,"height":768,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-768x768.jpg"},"60x60":{"file":"berechtigungs_management_2-60x60.jpg","width":60,"height":60,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-60x60.jpg"},"600x99999":{"file":"berechtigungs_management_2-600x900.jpg","width":600,"height":900,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-600x900.jpg"},"large":{"file":"berechtigungs_management_2-1024x1024.jpg","width":1024,"height":1024,"filesize":101410,"width_query":"1024","height_query":"1024","mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-1024x1024.jpg"},"600x0":{"file":"berechtigungs_management_2-600x600.jpg","width":600,"height":600,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2-600x600.jpg"},"full":{"file":"berechtigungs_management_2.jpg","width":900,"height":900,"mime_type":"image\/jpeg","source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"This content is subject to copyright.","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":23650,"source_url":"https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2.jpg","_links":{"self":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/media\/19441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=19441"}],"wp:attached-to":[{"embeddable":true,"post_type":"page","id":23650,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/23650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}