{"id":742,"date":"2024-09-10T08:00:00","date_gmt":"2024-09-10T13:00:00","guid":{"rendered":"https:\/\/www.sqltabletalk.com\/?p=742"},"modified":"2024-09-09T11:54:57","modified_gmt":"2024-09-09T16:54:57","slug":"understanding-kerberos-authentication-sql-server","status":"publish","type":"post","link":"https:\/\/www.sqltabletalk.com\/?p=742","title":{"rendered":"Understanding Kerberos Authentication in SQL Server"},"content":{"rendered":"<h2>Introduction<\/h2>\n<p>Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.<\/p>\n<h3>Key Features of Kerberos<\/h3>\n<p>One of Kerberos&#8217; primary security enhancements is its use of encrypted tickets for authentication rather than password-based exchanges. This reduces the risk of credentials being intercepted during transmission, significantly enhancing security.<\/p>\n<p>Another important feature is <strong>credential delegation<\/strong>. This allows credentials to be securely passed across multiple machines, which is essential when users need to access resources from different systems or services.<\/p>\n<h3>How Kerberos Authentication Works<\/h3>\n<p>In a Kerberos-based authentication process, several key players are involved: the client, the server, and the domain controller, typically Active Directory (AD). Here\u2019s a simplified overview of how the authentication process works:<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"706\" height=\"495\" src=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png\" alt=\"\" class=\"wp-image-744\" srcset=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png 706w, https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1-300x210.png 300w\" sizes=\"auto, (max-width: 706px) 100vw, 706px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\">\n<li>After the user has logged into windows and received the Ticket Granting Ticket (TGT), it passes the TGT to the domain controller to request a Service Ticket. The service ticket is granted based on the Service Principal name. The SPN is for a specific service type and host name. With SQL Server, the port number or instance name is also included.&nbsp;<\/li>\n\n\n\n<li>If Active Directory locates the SPN, it returns the Service Ticket to the client.&nbsp;<\/li>\n\n\n\n<li>The client logs into the server and presents the Service Ticket as proof of identity.&nbsp;<\/li>\n\n\n\n<li>The service decrypts the ticket based on its service account. If the decryption succeeds, then it can validate the user identity. If it fails, the login is rejected.&nbsp;<\/li>\n\n\n\n<li>The server responds with data (HTML) or that the login succeeded (SQL).&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Kerberos Delegation&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"621\" height=\"442\" src=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-2.png\" alt=\"\" class=\"wp-image-745\" srcset=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-2.png 621w, https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-2-300x214.png 300w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The client passes the Service Ticket and Ticket Granting Ticket to the server. The server decrypts the Service Ticket and validates the user\u2019s identity.&nbsp;<\/li>\n\n\n\n<li>The service needs to delegate the user\u2019s credentials to SQL Server, so it passes the TGT to Active Directory and asks for a Service Ticket for SQL Server on the user\u2019s behalf.&nbsp;<\/li>\n\n\n\n<li>The domain controller returns a new Service Ticket.&nbsp;<\/li>\n\n\n\n<li>The web server connects to SQL Server and passes the Service Ticket to SQL Server as part of the login process.&nbsp;<\/li>\n\n\n\n<li>SQL Server decrypts the Service Ticket and validates the user identity.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The Double Hop Scenario<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"616\" src=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-3.png\" alt=\"\" class=\"wp-image-746\" srcset=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-3.png 840w, https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-3-300x220.png 300w, https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-3-768x563.png 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n<p><!-- Insert images and detailed diagrams here --><\/p>\n<ol>\n<li>The client provides credentials to the domain controller, which returns a Kerberos <strong>Ticket Granting Ticket (TGT)<\/strong>.<\/li>\n<li>The client uses the TGT to request a service ticket for Server 1.<\/li>\n<li>The client connects to Server 1, providing both the TGT and the service ticket.<\/li>\n<li>Server 1 uses the client\u2019s TGT to request a service ticket for Server 2.<\/li>\n<li>Server 1 then connects to Server 2 using the client\u2019s credentials.<\/li>\n<\/ol>\n<h3>Common Issues with Kerberos Authentication<\/h3>\n<p>While Kerberos offers robust security, configuring it can be challenging. Below are some common issues administrators may encounter:<\/p>\n<ul>\n<li><strong>Missing or Misconfigured SPNs (Service Principal Names)<\/strong>: If an SPN is not registered or is registered to the wrong account, authentication will fail.<\/li>\n<li><strong>Duplicate SPNs<\/strong>: When an SPN is associated with multiple accounts, Kerberos cannot determine which account to use, resulting in authentication failure.<\/li>\n<li><strong>Clock Skew<\/strong>: Kerberos is sensitive to time discrepancies between the client, server, and AD. Even small differences in system clocks can cause authentication to fail.<\/li>\n<\/ul>\n<p>Additionally, if the service account is a user account, the delegation tab may be missing until a service principal name is registered for the account. Without this, constrained delegation cannot be set up.<\/p>\n\n\n<p>To Debug you can use SQLcheck found here <a href=\"https:\/\/github.com\/microsoft\/CSS_SQL_Networking_Tools\/wiki\/SQLCHECK\">SQLCHECK \u00b7 microsoft\/CSS_SQL_Networking_Tools Wiki (github.com)<\/a><\/p>\n\n\n<h3>Conclusion<\/h3>\n\n<p>Kerberos remains a powerful and secure authentication protocol, essential for managing access across distributed systems. Its ability to use encrypted tickets and support credential delegation makes it a significant improvement over older protocols like NTLM. However, proper configuration is key to ensuring that Kerberos operates smoothly, as issues such as misconfigured SPNs or time discrepancies can hinder its effectiveness. By understanding the fundamental workings of Kerberos and being aware of potential pitfalls, administrators can better leverage its strengths to enhance security and streamline authentication processes within their networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[116,29],"tags":[266,263,264,262,265,131,161],"class_list":["post-742","post","type-post","status-publish","format-standard","hentry","category-connectivity","category-security","tag-active-directory","tag-authentication-protocols","tag-credential-delegation","tag-kerberos","tag-spn-configuration","tag-sql-server","tag-sql-server-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding Kerberos Authentication in SQL Server - SQL Table Talk<\/title>\n<meta name=\"description\" content=\"Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sqltabletalk.com\/?p=742\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Kerberos Authentication in SQL Server - SQL Table Talk\" \/>\n<meta property=\"og:description\" content=\"Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sqltabletalk.com\/?p=742\" \/>\n<meta property=\"og:site_name\" content=\"SQL Table Talk\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-10T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png\" \/>\n<meta name=\"author\" content=\"Yvonne Vanslageren\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yvonne Vanslageren\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742\"},\"author\":{\"name\":\"Yvonne Vanslageren\",\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/68bb31b454bafe9e139183ed4f3e9082\"},\"headline\":\"Understanding Kerberos Authentication in SQL Server\",\"datePublished\":\"2024-09-10T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742\"},\"wordCount\":700,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/1947e42a9438bccd91691d8b791888e0\"},\"image\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png\",\"keywords\":[\"Active Directory\",\"Authentication protocols\",\"Credential delegation\",\"Kerberos\",\"SPN configuration\",\"SQL Server\",\"SQL Server security\"],\"articleSection\":[\"Connectivity\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sqltabletalk.com\/?p=742#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742\",\"url\":\"https:\/\/www.sqltabletalk.com\/?p=742\",\"name\":\"Understanding Kerberos Authentication in SQL Server - SQL Table Talk\",\"isPartOf\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png\",\"datePublished\":\"2024-09-10T13:00:00+00:00\",\"description\":\"Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sqltabletalk.com\/?p=742\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage\",\"url\":\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png\",\"contentUrl\":\"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png\",\"width\":706,\"height\":495},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sqltabletalk.com\/?p=742#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sqltabletalk.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Kerberos Authentication in SQL Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sqltabletalk.com\/#website\",\"url\":\"https:\/\/www.sqltabletalk.com\/\",\"name\":\"SQL Table Talk\",\"description\":\"Breaking Down SQL Server, One Post at a Time.\",\"publisher\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/1947e42a9438bccd91691d8b791888e0\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sqltabletalk.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/1947e42a9438bccd91691d8b791888e0\",\"name\":\"Stephen Planck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64181114edc3de3d99072c049bcec024f025c9536dc89fc8ff1bac58976ca81e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64181114edc3de3d99072c049bcec024f025c9536dc89fc8ff1bac58976ca81e?s=96&d=mm&r=g\",\"caption\":\"Stephen Planck\"},\"logo\":{\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"https:\/\/dexterwiki.com\",\"https:\/\/www.linkedin.com\/in\/stephen-planck-4611b692?trk=people-guest_people_search-card&challengeId=AQErf8gbBmcVMwAAAYsyIsxO-0UvU8z7cHrBpZoo_n3xt9qEKpRN5B_jd_LmAMu-OfeArkQ7GDjobJ2uRoQQV35EQdh_rR6kxA&submissionId=09de7067-c335-8e17-40b8-8dc32b60ed6c&challengeSource=AgEcUCw35zpPmAAAAYsyI4vAWhJTV7Nt4vZYKc3V1qiDBpCkKgUvtlOBgYXcE84&challegeType=AgE_wZiTT09IAQAAAYsyI4vDmNvbZIYe6XHju5V2bXVvM3IVxnJslgY&memberId=AgESFTkUShzs_gAAAYsyI4vGYk0Gic1uc5kB6cKOABA26Gw&recognizeDevice=AgHdSZyUSI5CEwAAAYsyI4vKd_koF9JgpsCJShT8QfbK1QMiv8SI\",\"https:\/\/www.youtube.com\/linuxmate\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/68bb31b454bafe9e139183ed4f3e9082\",\"name\":\"Yvonne Vanslageren\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/22c274a7a354b81a0a8dc5b23e8e0be9bdd81a6bc0541474cfb6b954d6bb2089?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/22c274a7a354b81a0a8dc5b23e8e0be9bdd81a6bc0541474cfb6b954d6bb2089?s=96&d=mm&r=g\",\"caption\":\"Yvonne Vanslageren\"},\"url\":\"https:\/\/www.sqltabletalk.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Kerberos Authentication in SQL Server - SQL Table Talk","description":"Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sqltabletalk.com\/?p=742","og_locale":"en_US","og_type":"article","og_title":"Understanding Kerberos Authentication in SQL Server - SQL Table Talk","og_description":"Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.","og_url":"https:\/\/www.sqltabletalk.com\/?p=742","og_site_name":"SQL Table Talk","article_published_time":"2024-09-10T13:00:00+00:00","og_image":[{"url":"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png","type":"","width":"","height":""}],"author":"Yvonne Vanslageren","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Yvonne Vanslageren","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sqltabletalk.com\/?p=742#article","isPartOf":{"@id":"https:\/\/www.sqltabletalk.com\/?p=742"},"author":{"name":"Yvonne Vanslageren","@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/68bb31b454bafe9e139183ed4f3e9082"},"headline":"Understanding Kerberos Authentication in SQL Server","datePublished":"2024-09-10T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sqltabletalk.com\/?p=742"},"wordCount":700,"commentCount":0,"publisher":{"@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/1947e42a9438bccd91691d8b791888e0"},"image":{"@id":"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage"},"thumbnailUrl":"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png","keywords":["Active Directory","Authentication protocols","Credential delegation","Kerberos","SPN configuration","SQL Server","SQL Server security"],"articleSection":["Connectivity","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sqltabletalk.com\/?p=742#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sqltabletalk.com\/?p=742","url":"https:\/\/www.sqltabletalk.com\/?p=742","name":"Understanding Kerberos Authentication in SQL Server - SQL Table Talk","isPartOf":{"@id":"https:\/\/www.sqltabletalk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage"},"image":{"@id":"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage"},"thumbnailUrl":"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png","datePublished":"2024-09-10T13:00:00+00:00","description":"Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.","breadcrumb":{"@id":"https:\/\/www.sqltabletalk.com\/?p=742#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sqltabletalk.com\/?p=742"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqltabletalk.com\/?p=742#primaryimage","url":"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png","contentUrl":"https:\/\/www.sqltabletalk.com\/wp-content\/uploads\/2024\/09\/image-1.png","width":706,"height":495},{"@type":"BreadcrumbList","@id":"https:\/\/www.sqltabletalk.com\/?p=742#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sqltabletalk.com\/"},{"@type":"ListItem","position":2,"name":"Understanding Kerberos Authentication in SQL Server"}]},{"@type":"WebSite","@id":"https:\/\/www.sqltabletalk.com\/#website","url":"https:\/\/www.sqltabletalk.com\/","name":"SQL Table Talk","description":"Breaking Down SQL Server, One Post at a Time.","publisher":{"@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/1947e42a9438bccd91691d8b791888e0"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sqltabletalk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/1947e42a9438bccd91691d8b791888e0","name":"Stephen Planck","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64181114edc3de3d99072c049bcec024f025c9536dc89fc8ff1bac58976ca81e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64181114edc3de3d99072c049bcec024f025c9536dc89fc8ff1bac58976ca81e?s=96&d=mm&r=g","caption":"Stephen Planck"},"logo":{"@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/image\/"},"sameAs":["https:\/\/dexterwiki.com","https:\/\/www.linkedin.com\/in\/stephen-planck-4611b692?trk=people-guest_people_search-card&challengeId=AQErf8gbBmcVMwAAAYsyIsxO-0UvU8z7cHrBpZoo_n3xt9qEKpRN5B_jd_LmAMu-OfeArkQ7GDjobJ2uRoQQV35EQdh_rR6kxA&submissionId=09de7067-c335-8e17-40b8-8dc32b60ed6c&challengeSource=AgEcUCw35zpPmAAAAYsyI4vAWhJTV7Nt4vZYKc3V1qiDBpCkKgUvtlOBgYXcE84&challegeType=AgE_wZiTT09IAQAAAYsyI4vDmNvbZIYe6XHju5V2bXVvM3IVxnJslgY&memberId=AgESFTkUShzs_gAAAYsyI4vGYk0Gic1uc5kB6cKOABA26Gw&recognizeDevice=AgHdSZyUSI5CEwAAAYsyI4vKd_koF9JgpsCJShT8QfbK1QMiv8SI","https:\/\/www.youtube.com\/linuxmate"]},{"@type":"Person","@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/68bb31b454bafe9e139183ed4f3e9082","name":"Yvonne Vanslageren","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqltabletalk.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/22c274a7a354b81a0a8dc5b23e8e0be9bdd81a6bc0541474cfb6b954d6bb2089?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/22c274a7a354b81a0a8dc5b23e8e0be9bdd81a6bc0541474cfb6b954d6bb2089?s=96&d=mm&r=g","caption":"Yvonne Vanslageren"},"url":"https:\/\/www.sqltabletalk.com\/?author=2"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=\/wp\/v2\/posts\/742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=742"}],"version-history":[{"count":3,"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=\/wp\/v2\/posts\/742\/revisions"}],"predecessor-version":[{"id":755,"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=\/wp\/v2\/posts\/742\/revisions\/755"}],"wp:attachment":[{"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sqltabletalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}