{"id":5113,"date":"2020-10-23T08:28:48","date_gmt":"2020-10-23T08:28:48","guid":{"rendered":"https:\/\/mpulsesoftware.com\/?p=5113"},"modified":"2025-07-30T06:18:52","modified_gmt":"2025-07-30T06:18:52","slug":"using-role-based-access-control","status":"publish","type":"post","link":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/","title":{"rendered":"Using Role-Based Access Control"},"content":{"rendered":"<p>With role-based access control, you can easily adjust settings in your MPulse implementation so the right people have the right access to the right records.<\/p>\n<p>So, you can give your employees access to what they need\u2014and only what they need.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-flat ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#What_is_Role-Based_Access_Control\" >What is Role-Based Access Control?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#Role-Based_Access_Control_Best_Practices\" >Role-Based Access Control Best Practices<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#Advantages_and_Disadvantages_of_Role_Based_Access_Control\" >Advantages and Disadvantages of Role Based Access Control<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_Role-Based_Access_Control\"><\/span>What is Role-Based Access Control?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Role-based access control puts record-level control in your hands. So, your maintenance personnel will only see the records relevant to their unique workloads.<\/p>\n<p>For example, one MPulse customer employs a variety of maintenance professionals with very specific job duties. With role-based access control, their plumbers only see plumbing work orders. Their electricians only see electrical work orders.<\/p>\n<p>Another customer with multiple facilities set up their role-based access control based on location. So the maintenance team at their Phoenix facility only sees work orders for that location, while the Denver facility team only sees the work orders for their location.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Role-Based_Access_Control_Best_Practices\"><\/span>Role-Based Access Control Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Study after study shows that software that\u2019s easier to use is used more often\u2014and more effectively. Removing the \u201cclutter\u201d will significantly streamline data access for your teams.<\/p>\n<p>Using role-based best practices also can help your organization comply with legal or ethical requirements. Here\u2019s how to implement role-based access control&#8230;<\/p>\n<ul>\n<li>Limit which records your employees see depending on their role in the organization<\/li>\n<li>Restrict sensitive information<\/li>\n<li>Filter according to departments, work order types, locations, or other fields<\/li>\n<li>Assign roles so people see the only their operating unit\u2019s information<\/li>\n<li>Choose which data are global, and which are unique to a group<\/li>\n<li>Define an unlimited number of custom filters<\/li>\n<li>Automatically link data to a user\u2019s area of expertise<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Advantages_and_Disadvantages_of_Role_Based_Access_Control\"><\/span>Advantages and Disadvantages of Role Based Access Control<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The biggest advantage of role-based access control is centralized control and enhanced security. As a result, with role-based access control in CMMS software, you\u2019ll\u2026<\/p>\n<ul>\n<li>Reduce errors in data entry<\/li>\n<li>Prevent unauthorized users from viewing or editing data<\/li>\n<li>Gain tighter control over data access<\/li>\n<li>Eliminate the \u201cdata clutter\u201d of unnecessary information<\/li>\n<li>Keep your teams running smoothly<\/li>\n<\/ul>\n<p>While some maintenance teams may feel uncertain about setting up role-based access control in CMMS software, MPulse makes it easy with our easy-to-use interface. Or, our affordable <a href=\"https:\/\/mpulsesoftware.com\/services\/\">training<\/a> and <a href=\"https:\/\/mpulsesoftware.com\/services\/implementation-services\/\">implementation services<\/a> can get you up and running with role-based access control quickly.<\/p>\n<p>Available in MPulse Advanced and Enterprise editions, role-based access control delivers the right level of access to your company\u2019s valuable information. <a href=\"https:\/\/mpulsesoftware.com\/contact\/\">Contact us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With role-based access control, you can easily adjust settings in your MPulse implementation so the right people have the right access to the right records. So, you can give your employees access to what they need\u2014and only what they need. What is Role-Based Access Control? Role-based access control puts record-level control in your hands. So, your maintenance personnel will only see the records relevant to their unique workloads. For example, one MPulse customer employs a variety of maintenance professionals with very specific job duties. With role-based access control, their plumbers only see plumbing work orders. Their electricians only see electrical work orders. Another customer with multiple facilities set up their role-based access control based on location. So the maintenance team at their Phoenix facility only sees work orders for that location, while the Denver facility team only sees the work orders for their location. Role-Based Access Control Best Practices Study after study shows that software that\u2019s easier to use is used more often\u2014and more effectively. Removing the \u201cclutter\u201d will significantly streamline data access for your teams. Using role-based best practices also can help your organization comply with legal or ethical requirements. Here\u2019s how to implement role-based access control&#8230; Limit which records your employees see depending on their role in the organization Restrict sensitive information Filter according to departments, work order types, locations, or other fields Assign roles so people see the only their operating unit\u2019s information Choose which data are global, and which are unique to a group Define an unlimited number of custom filters Automatically link data to a user\u2019s area of expertise Advantages and Disadvantages of Role Based Access Control The biggest advantage of role-based access control is centralized control and enhanced security. As a result, with role-based access control in CMMS software, you\u2019ll\u2026 Reduce errors in data entry Prevent unauthorized users from viewing or editing data Gain tighter control over data access Eliminate the \u201cdata clutter\u201d of unnecessary information Keep your teams running smoothly While some maintenance teams may feel uncertain about setting up role-based access control in CMMS software, MPulse makes it easy with our easy-to-use interface. Or, our affordable training and implementation services can get you up and running with role-based access control quickly. Available in MPulse Advanced and Enterprise editions, role-based access control delivers the right level of access to your company\u2019s valuable information. Contact us for more information.<\/p>\n","protected":false},"author":6,"featured_media":5115,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[12],"tags":[],"class_list":["post-5113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cmms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using Role-Based Access Control | MPulse Software<\/title>\n<meta name=\"description\" content=\"Discover the power of role-based access control in MPulse. Easily assign access levels to job roles and streamline data visibility across your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Role-Based Access Control\" \/>\n<meta property=\"og:description\" content=\"Discover the power of role-based access control in MPulse. Easily assign access levels to job roles and streamline data visibility across your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"MPulse Software\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-23T08:28:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T06:18:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1488\" \/>\n\t<meta property=\"og:image:height\" content=\"992\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle Nicolson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle Nicolson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\"},\"author\":{\"name\":\"Michelle Nicolson\",\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd\"},\"headline\":\"Using Role-Based Access Control\",\"datePublished\":\"2020-10-23T08:28:48+00:00\",\"dateModified\":\"2025-07-30T06:18:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\"},\"wordCount\":407,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg\",\"articleSection\":[\"CMMS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\",\"url\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\",\"name\":\"Using Role-Based Access Control | MPulse Software\",\"isPartOf\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg\",\"datePublished\":\"2020-10-23T08:28:48+00:00\",\"dateModified\":\"2025-07-30T06:18:52+00:00\",\"description\":\"Discover the power of role-based access control in MPulse. Easily assign access levels to job roles and streamline data visibility across your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage\",\"url\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg\",\"contentUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg\",\"width\":1488,\"height\":992,\"caption\":\"Using Role-Based Access Control\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mpulsesoftware.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMMS\",\"item\":\"https:\/\/mpulsesoftware.com\/blog\/category\/cmms\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Using Role-Based Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mpulsesoftware.com\/#website\",\"url\":\"https:\/\/mpulsesoftware.com\/\",\"name\":\"MPulse Software\",\"description\":\"CMMS Software\",\"publisher\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mpulsesoftware.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mpulsesoftware.com\/#organization\",\"name\":\"MPulse Software\",\"url\":\"https:\/\/mpulsesoftware.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png\",\"contentUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png\",\"width\":315,\"height\":105,\"caption\":\"MPulse Software\"},\"image\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd\",\"name\":\"Michelle Nicolson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g\",\"caption\":\"Michelle Nicolson\"},\"url\":\"https:\/\/mpulsesoftware.com\/blog\/author\/michelleblackcatcommunications-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using Role-Based Access Control | MPulse Software","description":"Discover the power of role-based access control in MPulse. Easily assign access levels to job roles and streamline data visibility across your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Using Role-Based Access Control","og_description":"Discover the power of role-based access control in MPulse. Easily assign access levels to job roles and streamline data visibility across your organization.","og_url":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/","og_site_name":"MPulse Software","article_published_time":"2020-10-23T08:28:48+00:00","article_modified_time":"2025-07-30T06:18:52+00:00","og_image":[{"width":1488,"height":992,"url":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg","type":"image\/jpeg"}],"author":"Michelle Nicolson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michelle Nicolson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#article","isPartOf":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/"},"author":{"name":"Michelle Nicolson","@id":"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd"},"headline":"Using Role-Based Access Control","datePublished":"2020-10-23T08:28:48+00:00","dateModified":"2025-07-30T06:18:52+00:00","mainEntityOfPage":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/"},"wordCount":407,"commentCount":0,"publisher":{"@id":"https:\/\/mpulsesoftware.com\/#organization"},"image":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg","articleSection":["CMMS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/","url":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/","name":"Using Role-Based Access Control | MPulse Software","isPartOf":{"@id":"https:\/\/mpulsesoftware.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage"},"image":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg","datePublished":"2020-10-23T08:28:48+00:00","dateModified":"2025-07-30T06:18:52+00:00","description":"Discover the power of role-based access control in MPulse. Easily assign access levels to job roles and streamline data visibility across your organization.","breadcrumb":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#primaryimage","url":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg","contentUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2020\/10\/MPulse-Software-Inc-Blog-Using-Role-Based-Access-Control-1f.jpg","width":1488,"height":992,"caption":"Using Role-Based Access Control"},{"@type":"BreadcrumbList","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/using-role-based-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mpulsesoftware.com\/"},{"@type":"ListItem","position":2,"name":"CMMS","item":"https:\/\/mpulsesoftware.com\/blog\/category\/cmms\/"},{"@type":"ListItem","position":3,"name":"Using Role-Based Access Control"}]},{"@type":"WebSite","@id":"https:\/\/mpulsesoftware.com\/#website","url":"https:\/\/mpulsesoftware.com\/","name":"MPulse Software","description":"CMMS Software","publisher":{"@id":"https:\/\/mpulsesoftware.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mpulsesoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mpulsesoftware.com\/#organization","name":"MPulse Software","url":"https:\/\/mpulsesoftware.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/","url":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png","contentUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png","width":315,"height":105,"caption":"MPulse Software"},"image":{"@id":"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd","name":"Michelle Nicolson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g","caption":"Michelle Nicolson"},"url":"https:\/\/mpulsesoftware.com\/blog\/author\/michelleblackcatcommunications-com\/"}]}},"_links":{"self":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/posts\/5113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/comments?post=5113"}],"version-history":[{"count":0,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/posts\/5113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/media\/5115"}],"wp:attachment":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/media?parent=5113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/categories?post=5113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/tags?post=5113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}