{"id":2449,"date":"2019-06-25T17:11:20","date_gmt":"2019-06-25T17:11:20","guid":{"rendered":"https:\/\/virtual-campus.eu\/alien\/problems\/managing-computing-resource-with-domain-controller\/"},"modified":"2019-06-25T17:11:20","modified_gmt":"2019-06-25T17:11:20","slug":"managing-computing-resource-with-domain-controller","status":"publish","type":"problem","link":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/problems\/managing-computing-resource-with-domain-controller\/","title":{"rendered":"Managing Computing Resource with Domain Controller"},"content":{"rendered":"<p>To make students learn about security authentication requests and verifies users on computer networks, then manage their permission<\/p>","protected":false},"excerpt":{"rendered":"<p>To make students learn about security authentication requests and verifies users on computer networks, then manage their permission<\/p>","protected":false},"author":65,"featured_media":2450,"template":"","categories":[209],"tags":[552,551,549,550],"_links":{"self":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/problem\/2449"}],"collection":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/problem"}],"about":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/types\/problem"}],"author":[{"embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/users\/65"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/media\/2450"}],"wp:attachment":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/media?parent=2449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/categories?post=2449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/ms\/wp-json\/wp\/v2\/tags?post=2449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}