{"id":9155,"date":"2019-09-16T13:28:52","date_gmt":"2019-09-16T11:28:52","guid":{"rendered":"https:\/\/www.alinto.com\/?p=9155"},"modified":"2023-10-19T22:43:49","modified_gmt":"2023-10-19T20:43:49","slug":"authentification-email-protocole-dkim","status":"publish","type":"post","link":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/","title":{"rendered":"L&rsquo;authentification email : protocole DKIM"},"content":{"rendered":"<p>Dans un <a href=\"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-spf\/\">pr\u00e9c\u00e9dent article<\/a>, nous expliquions l\u2019importance de l\u2019utilisation d\u2019un champ SPF dans les enregistrements DNS du nom de domaine de l\u2019entreprise.<\/p>\n<p>En plus du SPF, il est recommand\u00e9 de recourir au protocole DKIM \u00a0d\u2019authentification email pour garantir l\u2019identit\u00e9 des \u00e9metteurs lors d\u2019un envoi d\u2019email, et \u00e9viter que nos messages soient consid\u00e9r\u00e9s comme ind\u00e9sirables par les destinataires.<\/p>\n<h2>Qu\u2019est-ce qu\u2019un enregistrement DKIM\u2009?<\/h2>\n<p><em>Domain Keys Identified Mail <\/em>(DKIM) est un protocole d\u2019authentification email qui permet au r\u00e9cepteur d\u2019un message de v\u00e9rifier de mani\u00e8re non \u00e9quivoque si cet email a \u00e9t\u00e9 effectivement envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine.<\/p>\n<p>Cela est fait gr\u00e2ce au moyen d\u2019une signature digitale utilisant la cryptographie asym\u00e9trique \u00e0 cl\u00e9 publique (nous vous expliquions dans un r\u00e9cent article les <a href=\"https:\/\/www.alinto.com\/fr\/cryptage-chiffrement-emails\/\">types de cryptographie email et l\u2019\u00e9tat actuel du chiffrement<\/a>) pour signer des emails et qu\u2019ils puissent \u00eatre confirm\u00e9s par les destinataires.<\/p>\n<h3>Fonctionnement du DKIM<\/h3>\n<p>En simplifiant le plus possible la question, le syst\u00e8me DKIM introduit un ent\u00eate unique avec une signature num\u00e9rique dans le contenu de chaque email. Chaque fois qu\u2019un message est envoy\u00e9, le serveur de destination fait une demande au DNS du domaine de l\u2019\u00e9metteur, et si, dans le champ de la signature le DKIM est param\u00e9tr\u00e9, il obtient la cl\u00e9 publique du domaine et l\u2019utilise pour d\u00e9chiffrer la valeur de la signature\u00a0: si ces deux valeurs co\u00efncident, l\u2019authenticit\u00e9 du message est confirm\u00e9e.<\/p>\n<p style=\"text-align: center;\">Le <strong>DKIM<\/strong>\u00a0emp\u00eache l\u2019usurpation de l\u2019identit\u00e9 de la part des cybercriminels.<\/p>\n<p>Le DKIM constitue un outil tr\u00e8s utile dans la lutte contre le <em>phishing<\/em> parce qu\u2019il emp\u00eache l\u2019usurpation de l\u2019identit\u00e9 de la part des cybercriminels. Cela b\u00e9n\u00e9ficie \u00e9norm\u00e9ment aux \u00e9metteurs d\u2019email\u2009; la v\u00e9rification de leur identit\u00e9 am\u00e9liore la r\u00e9putation de leurs domaines, ce qui se traduit par une optimisation de la d\u00e9livrabilit\u00e9 des emails.<\/p>\n<p>Pour des organisations envoyant des emails transactionnels, le d\u00e9ploiement du DKIM constitue un \u00e9l\u00e9ment indispensable pour s\u2019assurer que leurs courriers arrivent \u00e0 destination. Pour cette raison, Alinto recommande l\u2019usage du SPF ainsi que du DKIM dans l\u2019usage de son service de SMTP Gateway d\u2019email transactionnel, que les usagers peuvent param\u00e9trer facilement avec l\u2019aide de notre \u00e9quipe de support.<\/p>\n<p>D\u2019autre part, le DKIM b\u00e9n\u00e9ficie aussi aux destinataires des emails, nos seulement en leur \u00e9vitant des messages malveillants, aussi en augmentant l\u2019effectivit\u00e9 des listes autoris\u00e9es et bloqu\u00e9es param\u00e9tr\u00e9es par domaine.<\/p>\n<p>Cependant, il ne faut pas oublier que DKIM ne constitue pas un outil de lutte contre le spam\u2009; il permet au destinataire de distinguer le flux l\u00e9gitime de sa messagerie, mais il ne pr\u00e9vient pas ou n\u2019identifie pas les abus. Pour cela, il est bien n\u00e9cessaire d\u2019ajouter un <a href=\"https:\/\/www.alinto.com\/fr\/relais-de-messagerie-securise-alinto-protect\/\">relais antispam<\/a> qui analysera \u00e9galement le contenu du message.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un pr\u00e9c\u00e9dent article, nous expliquions l\u2019importance de l\u2019utilisation d\u2019un champ SPF dans les enregistrements DNS (&#8230;)<\/p>\n","protected":false},"author":9,"featured_media":9156,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[123],"tags":[],"class_list":["post-9155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emails"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L&#039;authentification email : protocole DKIM - Alinto Blog<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez DKIM, un protocole d\u2019authentification email pour v\u00e9rifier si cet email a \u00e9t\u00e9 envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;authentification email : protocole DKIM - Alinto Blog\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez DKIM, un protocole d\u2019authentification email pour v\u00e9rifier si cet email a \u00e9t\u00e9 envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/\" \/>\n<meta property=\"og:site_name\" content=\"Alinto\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-16T11:28:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T20:43:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2019\/09\/authentication-dkim-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"832\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rodolphe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rfrering@alinto.net\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rodolphe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/\"},\"author\":{\"name\":\"Rodolphe\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\"},\"headline\":\"L&rsquo;authentification email : protocole DKIM\",\"datePublished\":\"2019-09-16T11:28:52+00:00\",\"dateModified\":\"2023-10-19T20:43:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/\"},\"wordCount\":515,\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/authentication-dkim-1.png\",\"articleSection\":[\"Emails\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/\",\"name\":\"L'authentification email : protocole DKIM - Alinto Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/authentication-dkim-1.png\",\"datePublished\":\"2019-09-16T11:28:52+00:00\",\"dateModified\":\"2023-10-19T20:43:49+00:00\",\"description\":\"D\u00e9couvrez DKIM, un protocole d\u2019authentification email pour v\u00e9rifier si cet email a \u00e9t\u00e9 envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/authentication-dkim-1.png\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/authentication-dkim-1.png\",\"width\":832,\"height\":200,\"caption\":\"authentification email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/authentification-email-protocole-dkim\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&#8217;authentification email : protocole DKIM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"name\":\"Alinto\",\"description\":\"Solutions email &amp; securit\u00e9 email\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\",\"name\":\"Alinto\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"caption\":\"Alinto\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\",\"name\":\"Rodolphe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"caption\":\"Rodolphe\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/rfrering@alinto.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'authentification email : protocole DKIM - Alinto Blog","description":"D\u00e9couvrez DKIM, un protocole d\u2019authentification email pour v\u00e9rifier si cet email a \u00e9t\u00e9 envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/","og_locale":"fr_FR","og_type":"article","og_title":"L'authentification email : protocole DKIM - Alinto Blog","og_description":"D\u00e9couvrez DKIM, un protocole d\u2019authentification email pour v\u00e9rifier si cet email a \u00e9t\u00e9 envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine","og_url":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/","og_site_name":"Alinto","article_published_time":"2019-09-16T11:28:52+00:00","article_modified_time":"2023-10-19T20:43:49+00:00","og_image":[{"width":832,"height":200,"url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2019\/09\/authentication-dkim-1.png","type":"image\/png"}],"author":"Rodolphe","twitter_card":"summary_large_image","twitter_creator":"@rfrering@alinto.net","twitter_misc":{"\u00c9crit par":"Rodolphe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#article","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/"},"author":{"name":"Rodolphe","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297"},"headline":"L&rsquo;authentification email : protocole DKIM","datePublished":"2019-09-16T11:28:52+00:00","dateModified":"2023-10-19T20:43:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/"},"wordCount":515,"publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2019\/09\/authentication-dkim-1.png","articleSection":["Emails"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/","url":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/","name":"L'authentification email : protocole DKIM - Alinto Blog","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#primaryimage"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2019\/09\/authentication-dkim-1.png","datePublished":"2019-09-16T11:28:52+00:00","dateModified":"2023-10-19T20:43:49+00:00","description":"D\u00e9couvrez DKIM, un protocole d\u2019authentification email pour v\u00e9rifier si cet email a \u00e9t\u00e9 envoy\u00e9 et autoris\u00e9 par le propri\u00e9taire de ce domaine","breadcrumb":{"@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#primaryimage","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2019\/09\/authentication-dkim-1.png","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2019\/09\/authentication-dkim-1.png","width":832,"height":200,"caption":"authentification email"},{"@type":"BreadcrumbList","@id":"https:\/\/www.alinto.com\/fr\/authentification-email-protocole-dkim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.alinto.com\/fr\/"},{"@type":"ListItem","position":2,"name":"L&#8217;authentification email : protocole DKIM"}]},{"@type":"WebSite","@id":"https:\/\/www.alinto.com\/fr\/#website","url":"https:\/\/www.alinto.com\/fr\/","name":"Alinto","description":"Solutions email &amp; securit\u00e9 email","publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.alinto.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.alinto.com\/fr\/#organization","name":"Alinto","url":"https:\/\/www.alinto.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","caption":"Alinto"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297","name":"Rodolphe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","caption":"Rodolphe"},"sameAs":["https:\/\/x.com\/rfrering@alinto.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/9155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/comments?post=9155"}],"version-history":[{"count":0,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/9155\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media\/9156"}],"wp:attachment":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media?parent=9155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/categories?post=9155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/tags?post=9155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}