{"id":33375,"date":"2023-11-28T13:48:06","date_gmt":"2023-11-28T12:48:06","guid":{"rendered":"https:\/\/xiting.com\/?page_id=33375"},"modified":"2025-04-08T11:28:15","modified_gmt":"2025-04-08T09:28:15","slug":"the-top-50-sap-security-tables","status":"publish","type":"page","link":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/","title":{"rendered":"The Top 50 SAP Security Tables &#8211; Xiting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"33375\" class=\"elementor elementor-33375 elementor-33374\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2abeb56 elementor-section-stretched page-header elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2abeb56\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f44631 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f44631\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45cd9d0\" data-id=\"45cd9d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c3b31a elementor-widget elementor-widget-spacer\" data-id=\"9c3b31a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b21f313 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b21f313\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-95b80c3\" data-id=\"95b80c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75683af elementor-widget elementor-widget-image\" data-id=\"75683af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px-1-300x225.png\" class=\"attachment-medium size-medium wp-image-33382\" alt=\"\" srcset=\"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px-1-300x225.png 300w, https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px-1-768x576.png 768w, https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px-1.png 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13ac3d6 elementor-widget elementor-widget-heading\" data-id=\"13ac3d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">EXcLUSIVE DOWNLOAD:<span class=\"xiting-rot\"> <br>the TOP 50 SAP SECURITY TABles<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b7b9d5 elementor-widget elementor-widget-heading\" data-id=\"4b7b9d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">An overview of the most important security tables of SAP.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63bd361 elementor-widget elementor-widget-text-editor\" data-id=\"63bd361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"elements-subheader pltext\" data-bind=\"plshortcode: subheader\" data-cedit=\"subheader\"><span class=\"ui-provider bim bin bio bip biq bir bis bit biu biv biw bix biy biz bja bjb bjc bjd bje bjf bjg bjh bji bjj bjk bjl bjm bjn bjo bjp bjq bjr bjs bjt bju\" dir=\"ltr\">In this document, you will find a comprehensive overview of the most important SAP Security tables. If you&#8217;ve ever wanted to know which SAP tables are the most common and crucial within the realm of SAP Security, you can download the list here for free.<\/span><br><\/p>\n<p class=\"elements-subheader pltext\" data-bind=\"plshortcode: subheader\" data-cedit=\"subheader\">If you have any questions, please contact marketing@xiting.com.<\/p>\n<h3 class=\"elements-subheader pltext\" data-bind=\"plshortcode: subheader\" data-cedit=\"subheader\">&nbsp;<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12a3473 elementor-widget elementor-widget-spacer\" data-id=\"12a3473\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1415b25\" data-id=\"1415b25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-313fffc elementor-widget elementor-widget-heading\" data-id=\"313fffc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Download<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-488ea87 elementor-widget elementor-widget-html\" data-id=\"488ea87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!--[if lte IE 8]>\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/v2-legacy.js\"><\/script>\n<![endif]-->\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n\n<script>\n\n  hbspt.forms.create({\n\n    region: \"eu1\",\n\n    portalId: \"25088517\",\n\n    formId: \"04853141-8aa2-4301-b1ce-9e564b0e1b8e\"\n\n  });\n\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e441e23 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e441e23\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bddf781\" data-id=\"bddf781\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-392b240 elementor-widget elementor-widget-spacer\" data-id=\"392b240\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>EXcLUSIVE DOWNLOAD: the TOP 50 SAP SECURITY TABles An overview of the most important security tables of SAP. In this document, you will find a comprehensive overview of the most important SAP Security tables. If you&#8217;ve ever wanted to know which SAP tables are the most common and crucial within the realm of SAP Security, [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":33378,"parent":22003,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[],"class_list":["post-33375","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Top 50 SAP Security Tables - Xiting<\/title>\n<meta name=\"description\" content=\"Explore key SAP Security Tables for comprehensive access management. Access our detailed overview by filling out the form.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top 50 SAP Security Tables &#8211; Xiting\" \/>\n<meta property=\"og:description\" content=\"EXcLUSIVE DOWNLOAD: the TOP 50 SAP SECURITY TABles An overview of the most important security tables of SAP. In this document, you will find a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-08T09:28:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/\",\"name\":\"The Top 50 SAP Security Tables - Xiting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/50-sap-security-tables_1000-x-750-px.png\",\"datePublished\":\"2023-11-28T12:48:06+00:00\",\"dateModified\":\"2025-04-08T09:28:15+00:00\",\"description\":\"Explore key SAP Security Tables for comprehensive access management. Access our detailed overview by filling out the form.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/50-sap-security-tables_1000-x-750-px.png\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/50-sap-security-tables_1000-x-750-px.png\",\"width\":1000,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/the-top-50-sap-security-tables\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Downloads\",\"item\":\"https:\\\/\\\/xiting.com\\\/en\\\/downloads\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Top 50 SAP Security Tables &#8211; Xiting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xiting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\\\/\\\/xiting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"contentUrl\":\"https:\\\/\\\/xiting.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\\\/\\\/xiting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XitingAG\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1345129\\\/\",\"https:\\\/\\\/www.instagram.com\\\/xiting.global\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Top 50 SAP Security Tables - Xiting","description":"Explore key SAP Security Tables for comprehensive access management. Access our detailed overview by filling out the form.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"The Top 50 SAP Security Tables &#8211; Xiting","og_description":"EXcLUSIVE DOWNLOAD: the TOP 50 SAP SECURITY TABles An overview of the most important security tables of SAP. In this document, you will find a","og_url":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_modified_time":"2025-04-08T09:28:15+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/","url":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/","name":"The Top 50 SAP Security Tables - Xiting","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px.png","datePublished":"2023-11-28T12:48:06+00:00","dateModified":"2025-04-08T09:28:15+00:00","description":"Explore key SAP Security Tables for comprehensive access management. Access our detailed overview by filling out the form.","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px.png","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2023\/11\/50-sap-security-tables_1000-x-750-px.png","width":1000,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/downloads\/the-top-50-sap-security-tables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Downloads","item":"https:\/\/xiting.com\/en\/downloads\/"},{"@type":"ListItem","position":3,"name":"The Top 50 SAP Security Tables &#8211; Xiting"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/pages\/33375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=33375"}],"version-history":[{"count":10,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/pages\/33375\/revisions"}],"predecessor-version":[{"id":47830,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/pages\/33375\/revisions\/47830"}],"up":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/pages\/22003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/33378"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=33375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=33375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}