{"id":3595,"date":"2022-12-13T13:25:48","date_gmt":"2022-12-13T13:25:48","guid":{"rendered":"https:\/\/trustcenter.solutions2share.com\/documentation\/architektur-und-sicherheit\/intranet"},"modified":"2024-05-13T09:26:18","modified_gmt":"2024-05-13T09:26:18","slug":"intranet","status":"publish","type":"manual_documentation","link":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet","title":{"rendered":"Intranet"},"content":{"rendered":"\n<p>Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Hinweis<\/h3>\n\n\n\n<p>Der Inhalt dieser Seite kann sich \u00e4ndern. Wir empfehlen dir, dich viertelj\u00e4hrlich \u00fcber Aktualisierungen zu informieren.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Praktiken der Datenverwaltung<\/h3>\n\n\n\n<p>Durch seine verschiedenen Funktionen greift das Intranet auf verschiedene Arten von Daten zu, verarbeitet und speichert sie:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Benutzerprofile<\/li>\n\n\n\n<li>Benutzerdaten<\/li>\n<\/ul>\n\n\n\n<p>Hier siehst du, wie wir die Daten f\u00fcr diese verschiedenen Kategorien verwalten:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Daten<\/strong> <\/td><td><strong>Accessed<\/strong> <\/td><td><strong>Cached<\/strong> <\/td><td><strong>Stored<\/strong> <\/td><td><strong>Anmerkungen<\/strong> <\/td><\/tr><tr><td>Benutzerprofile <\/td><td>\u2714&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>Wird nach jeder Anmeldung aufgerufen. <br> <\/td><\/tr><tr><td>Benutzerdaten <\/td><td>\u2714&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>Benutzerdaten (AAD ID, UPN). <\/td><\/tr><tr><td>Teams Kanal <\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>Kein Zugang. <br>Kein Cache. <br>Keine Speicherung. <\/td><\/tr><tr><td>Teams Konversationen <\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>Kein Zugang. <br>Kein Cache. <br>Keine Speicherung. <\/td><\/tr><tr><td>Teams Dateien <\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>Kein Zugang. <br>Kein Cache. <br>Keine Speicherung. <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"graph-i\">Microsoft Graph<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Scope<\/strong> <\/td><td><strong>Beschreibung<\/strong> <\/td><td><strong>Begr\u00fcndung<\/strong> <\/td><td><strong>Erforderliche Zustimmung der Administration<\/strong> <\/td><td><strong>Art der Genehmigung<\/strong> <\/td><\/tr><tr><td><code>User.Read<\/code> <\/td><td>Abrufen der Eigenschaften und Beziehungen des Benutzerobjekts. <\/td><td><strong>Erm\u00f6glicht das Lesen von Profilinformationen und grundlegenden Unternehmensinformationen.<\/strong> <\/td><td>Nein <\/td><td>Delegiert <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Microsoft SharePoint<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Scope<\/strong> <\/td><td><strong>Beschreibung<\/strong> <\/td><td><strong>Begr\u00fcndung<\/strong> <\/td><td><strong>Erforderliche Zustimmung der Administration<\/strong> <\/td><td><strong>Art der Genehmigung<\/strong> <\/td><\/tr><tr><td><code>AllSites.FullControl<\/code> <\/td><td>Volle Kontrolle \u00fcber alle Site Collections. <\/td><td><strong>Erm\u00f6glicht es der Anwendung, alle Site Collections von der UI aus zu lesen, zu erstellen und zu aktualisieren.<\/strong> <\/td><td>Ja <\/td><td>Delegiert <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Microsoft Teams Apps Sicherheit und Compliance<\/h3>\n\n\n\n<p>Um Unternehmen die Informationen zur Verf\u00fcgung zu stellen, die sie ben\u00f6tigen, um Entscheidungen \u00fcber die von ihnen verwendeten Microsoft Teams-Apps und Add-Ins zu beschleunigen und zu informieren, arbeitet Microsoft mit seinen Microsoft 365-Entwicklerpartnern zusammen. Diese Informationen werden durch Informationen aus dem App-Katalog von Microsoft Cloud App Security und durch Informationen erg\u00e4nzt, die von den Entwicklern bereitgestellt werden, wenn sie ihre Apps einreichen. Diese Informationen zur Sicherheit, zum Umgang mit Daten und zur Einhaltung von Vorschriften sollen Unternehmen dabei helfen, die Risiken bei der Nutzung dieser Anwendungen zu bewerten und zu bew\u00e4ltigen.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Hinweis<\/h3>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365-app-certification\/teams\/witivio-booking-room-pro\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365 App Compliance Programm<\/a><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Archtitektur und Flow Diagramm<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"1024\" src=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png\" alt=\"\" class=\"wp-image-3957\" srcset=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png 801w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-235x300.png 235w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-768x981.png 768w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-1202x1536.png 1202w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-600x767.png 600w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10.png 1249w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Resource Endpoints<\/h3>\n\n\n\n<p>Der gesamte Verkehr von und zur Intranet-Plattform erfolgt \u00fcber das HTTPS-Protokoll an Port 443. Im Folgenden findest du eine kurze Beschreibung der einzelnen Abl\u00e4ufe:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Name<\/strong> <\/td><td><strong>Kommentare<\/strong> <\/td><\/tr><tr><td>s2s-help-overview.azurewebsites.net\/Intranet\/HelpTab help.solutions2share.net <\/td><td>f\u00fcr die Anwendungen einschlie\u00dflich der Hilfeinhalte <\/td><\/tr><tr><td>.msecnd.net und *.visualstudio.com <\/td><td>f\u00fcr die Analyse von Leistungskennzahlen <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Dependencies<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Server<\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Name<\/strong> <\/td><td><strong>Version<\/strong> <\/td><td><strong>URL<\/strong> <\/td><td><strong>Lizenz<\/strong> <\/td><\/tr><tr><td>Microsoft.ApplicationInsights.AspNetCore <\/td><td>2.20.0  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.AspNetCore.SpaServices.Extensions <\/td><td>5.0.12   <\/td><td>https:\/\/licenses.nuget.org\/Apache-2.0 <\/td><td>Apache-2.0 <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore <\/td><td>5.0.15   <\/td><td>https:\/\/licenses.nuget.org\/Apache-2.0 <\/td><td>Apache-2.0 <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore.SqlServer <\/td><td>5.0.15  <\/td><td>https:\/\/licenses.nuget.org\/Apache-2.0 <\/td><td>Apache-2.0 <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore.Tools <\/td><td>5.0.15  <\/td><td>https:\/\/licenses.nuget.org\/Apache-2.0 <\/td><td>Apache-2.0 <\/td><\/tr><tr><td>Microsoft.Identity.Web <\/td><td>1.22.2   <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.Graph <\/td><td>4.17.0  <\/td><td>https:\/\/www.nuget.org\/packages\/Microsoft.Graph\/4.17.0\/License <\/td><td>MIT <\/td><\/tr><tr><td>Newtonsoft.Json <\/td><td>13.0.1  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>PnP.Framework <\/td><td>1.10.0  <\/td><td>https:\/\/raw.githubusercontent.com\/pnp\/pnpframework\/dev\/LICENSE <\/td><td>MIT <\/td><\/tr><tr><td>log4net <\/td><td>2.0.14   <\/td><td>https:\/\/licenses.nuget.org\/Apache-2.0 <\/td><td>Apache-2.0 <\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"author":1,"featured_media":0,"parent":3404,"menu_order":21,"template":"","manualdocumentationcategory":[72],"manual_doc_tag":[],"class_list":["post-3595","manual_documentation","type-manual_documentation","status-publish","hentry","manualdocumentationcategory-trust-center-de"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intranet - Trust Center by Solutions2Share<\/title>\n<meta name=\"description\" content=\"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intranet - Trust Center by Solutions2Share\" \/>\n<meta property=\"og:description\" content=\"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet\" \/>\n<meta property=\"og:site_name\" content=\"Trust Center by Solutions2Share\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/solutions2share\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-13T09:26:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet\",\"url\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet\",\"name\":\"Intranet - Trust Center by Solutions2Share\",\"isPartOf\":{\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png\",\"datePublished\":\"2022-12-13T13:25:48+00:00\",\"dateModified\":\"2024-05-13T09:26:18+00:00\",\"description\":\"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#primaryimage\",\"url\":\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png\",\"contentUrl\":\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/trustcenter.solutions2share.com\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Architektur und Sicherheit\",\"item\":\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Intranet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de#website\",\"url\":\"https:\/\/trustcenter.solutions2share.com\/de\",\"name\":\"Trust Center by Solutions2Share\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustcenter.solutions2share.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de#organization\",\"name\":\"Trust Center by Solutions2Share\",\"url\":\"https:\/\/trustcenter.solutions2share.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png\",\"contentUrl\":\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Trust Center by Solutions2Share\"},\"image\":{\"@id\":\"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/solutions2share\",\"https:\/\/www.linkedin.com\/company\/solutions2share\/\",\"https:\/\/www.youtube.com\/user\/Solutions2Share\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intranet - Trust Center by Solutions2Share","description":"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet","og_locale":"de_DE","og_type":"article","og_title":"Intranet - Trust Center by Solutions2Share","og_description":"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.","og_url":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet","og_site_name":"Trust Center by Solutions2Share","article_publisher":"https:\/\/www.facebook.com\/solutions2share","article_modified_time":"2024-05-13T09:26:18+00:00","og_image":[{"url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet","url":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet","name":"Intranet - Trust Center by Solutions2Share","isPartOf":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#primaryimage"},"image":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#primaryimage"},"thumbnailUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png","datePublished":"2022-12-13T13:25:48+00:00","dateModified":"2024-05-13T09:26:18+00:00","description":"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von Intranet auf unsere Datenerfassungspraktiken vertrauen k\u00f6nnen und sich dessen bewusst sind.","breadcrumb":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#primaryimage","url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png","contentUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-10-801x1024.png"},{"@type":"BreadcrumbList","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/intranet#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/trustcenter.solutions2share.com\/de"},{"@type":"ListItem","position":2,"name":"Architektur und Sicherheit","item":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit"},{"@type":"ListItem","position":3,"name":"Intranet"}]},{"@type":"WebSite","@id":"https:\/\/trustcenter.solutions2share.com\/de#website","url":"https:\/\/trustcenter.solutions2share.com\/de","name":"Trust Center by Solutions2Share","description":"","publisher":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcenter.solutions2share.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/trustcenter.solutions2share.com\/de#organization","name":"Trust Center by Solutions2Share","url":"https:\/\/trustcenter.solutions2share.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/","url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png","contentUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png","width":512,"height":512,"caption":"Trust Center by Solutions2Share"},"image":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/solutions2share","https:\/\/www.linkedin.com\/company\/solutions2share\/","https:\/\/www.youtube.com\/user\/Solutions2Share"]}]}},"_links":{"self":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation"}],"about":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/types\/manual_documentation"}],"author":[{"embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":4,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3595\/revisions"}],"predecessor-version":[{"id":3962,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3595\/revisions\/3962"}],"up":[{"embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3404"}],"wp:attachment":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/media?parent=3595"}],"wp:term":[{"taxonomy":"manualdocumentationcategory","embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manualdocumentationcategory?post=3595"},{"taxonomy":"manual_doc_tag","embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_doc_tag?post=3595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}