{"id":1380,"date":"2024-11-24T17:23:03","date_gmt":"2024-11-24T11:53:03","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1380"},"modified":"2025-10-22T14:50:34","modified_gmt":"2025-10-22T09:20:34","slug":"web-portal-commerce-cyber-forensics","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","title":{"rendered":"Web portal &amp; commerce cyber forensics"},"content":{"rendered":"\n<p id=\"ember14112\"><strong>For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.liferay.com\/\"><strong>Home &#8211; Liferay<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/wordpress.com\/\"><strong>WordPress.com<\/strong><\/a><a href=\"https:\/\/wordpress.com\/\"><strong>: Build a Site, Sell Your Stuff, Start a Blog &amp; More<\/strong><\/a><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.drupal.org\/\">Drupal &#8211; Open Source CMS |<\/a> <\/strong><a href=\"http:\/\/drupal.org\/\"><strong>Drupal.org<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/sharepoint\/collaboration?ocid=ORSEARCH_Bing\"><strong>Microsoft SharePoint Online &#8211; Collaboration Software | Microsoft 365<\/strong><\/a><\/li>\n\n\n\n<li><strong>Always remember you can learn cutting edge tech internals from enterprise open source like Liferay, Canonical, RedHat, GitHub, CNCF, WordPress, Drupal, Apache Foundation, Mozilla Foundation, etc. &#8211; check top 20 open-source companies and contributors overall and on GITHUB \/ Google \/ Gemini \/ ChatGPT \/ Bing regularly<\/strong><\/li>\n<\/ul>\n\n\n\n<p id=\"ember14115\">Before studying cyber forensics for portals and commerce area, we must understand it&#8217;s architecture and security.<\/p>\n\n\n\n<p id=\"ember14117\"><strong>Web application architecture:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Three tier architecture:<\/li>\n\n\n\n<li>CDN, WAF, Web server &#8211; Typically in external exposed subnet &#8211; Demilitarized subnet \/ zone<\/li>\n\n\n\n<li>Application Server, Database, File Store, Search, Caching in internal subnet &#8211; Militarized zone<\/li>\n\n\n\n<li>Integrations like IAM\/LDAP\/SSO, APIs, LLMs, AI, MQ, Kafka, etc. from various layers possible<\/li>\n\n\n\n<li>Server \/ cloud \/ VM infrastructure \/ VPN<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Use-cases:<\/strong><\/li>\n\n\n\n<li>Insurance policy administration<\/li>\n\n\n\n<li>Supplier portals<\/li>\n\n\n\n<li>Intranets<\/li>\n\n\n\n<li>Search based use cases<\/li>\n\n\n\n<li>Workflows \/ BPMs<\/li>\n\n\n\n<li>eCommerce<\/li>\n\n\n\n<li>Public websites and more<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Sample features:<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/learn.liferay.com\/documentation\">Documentation &#8211; Liferay Learn<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deployment:<\/strong><\/li>\n\n\n\n<li>Cloud<\/li>\n\n\n\n<li>In-prem \/ self-hosted<\/li>\n\n\n\n<li>Clustered environment at most layers<\/li>\n<\/ul>\n\n\n\n<p id=\"ember14125\">Solutions could be monolith or micro-services driven, etc.<\/p>\n\n\n\n<p id=\"ember14127\"><strong>Security:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Programming level<\/strong><\/li>\n\n\n\n<li>Secure programming around APIs, Integrations and more<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>App server security<\/strong><\/li>\n\n\n\n<li>Separate subnets<\/li>\n\n\n\n<li>JVM security<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Web server &amp; overall security<\/strong><\/li>\n\n\n\n<li>Https<\/li>\n\n\n\n<li>CSP<\/li>\n\n\n\n<li>CSRF \/ CORS<\/li>\n\n\n\n<li>XSS<\/li>\n\n\n\n<li>Server hardening<\/li>\n\n\n\n<li>Access \/ IAM \/ 2FA \/ MFA<\/li>\n\n\n\n<li>OWASP like SQL injection and more<\/li>\n\n\n\n<li>Cookies &amp; Sessions<\/li>\n\n\n\n<li>DoS, DDoS, Malware, Spyware, etc.<\/li>\n\n\n\n<li>And more &#8211; <a href=\"https:\/\/learn.liferay.com\/capabilities\/security\">Security &#8211; Liferay Learn<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Products:<\/strong><\/li>\n\n\n\n<li>Liferay<\/li>\n\n\n\n<li>Drupal<\/li>\n\n\n\n<li>WordPress<\/li>\n\n\n\n<li>SharePoint, Mozilla foundation and many more<\/li>\n\n\n\n<li>Custom portals, commerce built with PHP, Java, Dot Net and more<\/li>\n<\/ul>\n\n\n\n<p id=\"ember14136\"><strong>Forensics:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Logs of app server<\/li>\n\n\n\n<li>Logs of web servers &#8211; Why? &#8211; IPs many times don\u2019t pass beyond this layer of CDN, WAF, Web server<\/li>\n\n\n\n<li>Logs of CDN, WAF<\/li>\n\n\n\n<li>Logs of cloud, infra, VM, etc. and details Network Management System, Application Performance Monitoring<\/li>\n\n\n\n<li>Database for the state &#8211; Very critical &#8211; don\u2019t forget this if you get access to logs and overall access of portal<\/li>\n\n\n\n<li>File store<\/li>\n\n\n\n<li>Search<\/li>\n\n\n\n<li>Code for integration, customizations<\/li>\n\n\n\n<li>Configurations &#8211; XMLs, etc.<\/li>\n\n\n\n<li>Access logs and full control of all servers<\/li>\n\n\n\n<li>DNS pings<\/li>\n\n\n\n<li>Integration logs<\/li>\n\n\n\n<li>Concerns: PII, Privacy, State of workflows, system, data, content, etc.\u00a0Multi session login by single user\u00a0and 2FA\/MFA<\/li>\n\n\n\n<li>Building chain of events<\/li>\n\n\n\n<li>Audit trails if enabled<\/li>\n\n\n\n<li>Admin and other rights<\/li>\n\n\n\n<li>Data governance, data security, data analytics, web analytics like Google Analytics<\/li>\n\n\n\n<li>Logins, Logouts, Public APIs, Insecure APIs, Insecure servers, Authentication, Authorization<\/li>\n\n\n\n<li>Understanding the resolution path: User -> ISP -> Internet over https -> DNS resolution -> Portal CDN -> WAF -> WS (External world and https typically breaks here) -> AS -> Integrations &amp; Search -> DB and back it goes<\/li>\n<\/ul>\n\n\n\n<p id=\"ember14139\"><strong>References:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/owasp.org\/\">OWASP Foundation, the Open Source Foundation for Application Security | OWASP Foundation<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DNS searches &#8211; WHOIS search<\/li>\n\n\n\n<li>Address &amp; owner searches\u00a0on WHOIS search<\/li>\n\n\n\n<li>Internet archive &#8211; Goback machine<\/li>\n\n\n\n<li>ISP logs \/ Mobile tower logs<\/li>\n\n\n\n<li>ICAAN &#8211; <a href=\"https:\/\/lookup.icann.org\/en\">ICANN Lookup<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/apache.org\/\">Welcome to The Apache Software Foundation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/foundation.mozilla.org\/en\/\">Homepage &#8211; Mozilla Foundation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_free_and_open-source_software_packages\">List of free and open-source software packages &#8211; Wikipedia<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email me: <a href=\"mailto:Neil@HarwaniSytems.in\">Neil@HarwaniSytems.in<\/a><\/li>\n\n\n\n<li>Website: <a href=\"http:\/\/www.harwanisystems.in\/\">www.HarwaniSystems.in<\/a><\/li>\n\n\n\n<li>Blog: <a href=\"http:\/\/www.techandtrain.com\/blog\">www.TechAndTrain.com\/blog<\/a><\/li>\n\n\n\n<li>LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/neil27\/\">Neil Harwani | LinkedIn<\/a><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/newsletters\/mini-caselets-6941275783361372160\/\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1381,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[411,40],"tags":[412,216,365],"class_list":["post-1380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-forensics","category-cyber-security","tag-cyber-forensics","tag-ecommerce","tag-portals"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1280%2C854&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-mg","jetpack-related-posts":[{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":1380,"position":0},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3,"url":"https:\/\/www.techandtrain.com\/blog\/2015\/07\/open-source-security-platform-for-security-of-physical-installations\/","url_meta":{"origin":1380,"position":1},"title":"Open source security platform for security of physical installations","author":"Neil Harwani","date":"July 24, 2015","format":false,"excerpt":"I hope to publish my thoughts on innovation around software on this blog. Starting off with my first post. We live in a world where security has now evolved from physical to cyber to multiple levels and context. Open source software has been a revolution which now is reaching us\u2026","rel":"","context":"In &quot;Open Source&quot;","block_context":{"text":"Open Source","link":"https:\/\/www.techandtrain.com\/blog\/category\/open-source\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/07\/Security3.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/07\/Security3.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/07\/Security3.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/07\/Security3.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/07\/Security3.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1125,"url":"https:\/\/www.techandtrain.com\/blog\/2023\/09\/performance-tuning-in-liferay-part-1\/","url_meta":{"origin":1380,"position":2},"title":"Performance tuning in Liferay &#8211; Part 1","author":"Neil Harwani","date":"September 1, 2023","format":false,"excerpt":"Expanding on my post here on performance tuning:\u00a0Post | Feed | LinkedIn Below are the main points to work on for a performance tuning engagement in Liferay - Part 1. Firstly, we need to find out what is slow: Database, service calls, elastic search, memory is an issue, threads are\u2026","rel":"","context":"In &quot;Liferay&quot;","block_context":{"text":"Liferay","link":"https:\/\/www.techandtrain.com\/blog\/category\/liferay\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/09\/Ferrari.jpg?fit=1200%2C821&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/09\/Ferrari.jpg?fit=1200%2C821&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/09\/Ferrari.jpg?fit=1200%2C821&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/09\/Ferrari.jpg?fit=1200%2C821&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/09\/Ferrari.jpg?fit=1200%2C821&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1242,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/04\/cyber-security-tips-for-portals-generated-by-chatgpt-gemini-part-1\/","url_meta":{"origin":1380,"position":3},"title":"Cyber security tips for Portals &#8211; Generated by ChatGPT &amp; GEMINI &#8211; Part 1","author":"Neil Harwani","date":"April 8, 2024","format":false,"excerpt":"Cyber security is a critical concern for portal applications, which often serve as gateways to a wide range of resources and services. Here are some vital tips to enhance the cyber security posture of portal applications: 1. Use Strong Authentication Mechanisms: Implement multi-factor authentication (MFA) to add an extra layer\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1383,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/how-can-portals-commerce-have-intelligence-via-llms-gai-chatgpt-gemini-etc-part-1\/","url_meta":{"origin":1380,"position":4},"title":"How can portals &amp; commerce have intelligence via LLMs\/GAI\/ChatGPT\/Gemini\/etc. &#8211; Part 1","author":"Neil Harwani","date":"November 26, 2024","format":false,"excerpt":"Here is my solution template for having intelligence from AI\/GAI\/LLMs in Portals & Commerce - Part 1: Assumptions: Java\/PHP\/Dot Net\/SharePoint\/Liferay\/WordPress\/Drupal type of a portal and \/ or commerce Just like we have HTML - HEAD \/ BODY \/ FOOTER \/ HEADER \/ META TAGS \/ BACKEND LOGIC in Java \/\u2026","rel":"","context":"In &quot;AIML&quot;","block_context":{"text":"AIML","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiml\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/web.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/web.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/web.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/web.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/web.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1018,"url":"https:\/\/www.techandtrain.com\/blog\/2023\/01\/links-on-important-technical-concepts-of-liferay-part-1\/","url_meta":{"origin":1380,"position":5},"title":"Links on important technical concepts of Liferay &#8211; Part 1","author":"Neil Harwani","date":"January 25, 2023","format":false,"excerpt":"Here are some links on important technical concepts of Liferay - Part 1. Hope this is helpful to all using and learning Liferay. Clustering:\u00a0Liferay DXP Clustering \u2013 Liferay Help Center Upgrade:\u00a0Upgrade Basics \u2014 Liferay Learn LXC:\u00a0Liferay Experience Cloud \u2013 Liferay Help Center Search:\u00a0Search Overview \u2014 Liferay Learn Architecture:\u00a0Introduction to Architecture\u2026","rel":"","context":"In &quot;Liferay&quot;","block_context":{"text":"Liferay","link":"https:\/\/www.techandtrain.com\/blog\/category\/liferay\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/01\/door-g5a9b513f9_1920.jpg?fit=1200%2C944&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/01\/door-g5a9b513f9_1920.jpg?fit=1200%2C944&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/01\/door-g5a9b513f9_1920.jpg?fit=1200%2C944&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/01\/door-g5a9b513f9_1920.jpg?fit=1200%2C944&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/01\/door-g5a9b513f9_1920.jpg?fit=1200%2C944&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1380"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1380\/revisions"}],"predecessor-version":[{"id":1382,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1380\/revisions\/1382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/1381"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}