{"id":14093,"date":"2014-03-26T14:44:33","date_gmt":"2014-03-26T14:44:33","guid":{"rendered":"http:\/\/demo.qodeinteractive.com\/bridge\/?page_id=14093"},"modified":"2024-02-06T03:28:17","modified_gmt":"2024-02-06T03:28:17","slug":"services","status":"publish","type":"page","link":"https:\/\/www.lastmile.id\/confluxsys\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; padding_top=&#8221;87&#8243; padding_bottom=&#8221;34&#8243; css_animation=&#8221;&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<div class='q_icon_with_title medium normal_icon'><div class=\"icon_holder q_icon_animation\" style=\" transition-delay: 100ms; -webkit-transition-delay: 100ms; -moz-transition-delay: 100ms; -o-transition-delay: 100ms;\"><span data-icon-type=\"normal\"   style=\"font-size: 38px;\" class=\"qode_iwt_icon_holder q_font_awsome_icon fa-3x \"><i class=\"qode_icon_font_awesome fa fa-users qode_iwt_icon_element\" style=\"color: #c0c0c0;\" ><\/i><\/span><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h5 class=\"icon_title\" style=\"\">IDENTITY MANAGEMENT &amp; GOVERNANCE<\/h5><p style=''>Extensive experience with Identity Management solution design, customization and integration<\/p><\/div><\/div><\/div>[vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class='q_icon_with_title medium normal_icon'><div class=\"icon_holder q_icon_animation\" style=\" transition-delay: 200ms; -webkit-transition-delay: 200ms; -moz-transition-delay: 200ms; -o-transition-delay: 200ms;\"><span data-icon-type=\"normal\"   style=\"font-size: 38px;\" class=\"qode_iwt_icon_holder q_font_awsome_icon fa-3x \"><i class=\"qode_icon_font_awesome fa fa-bell-o qode_iwt_icon_element\" style=\"color: #c0c0c0;\" ><\/i><\/span><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h5 class=\"icon_title\" style=\"\">ACCESS MANAGEMENT &amp; SSO<\/h5><p style=''>Authentication, authorization, auditing and Web SSO solution<\/p><\/div><\/div><\/div>[vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class='q_icon_with_title medium normal_icon'><div class=\"icon_holder q_icon_animation\" style=\" transition-delay: 300ms; -webkit-transition-delay: 300ms; -moz-transition-delay: 300ms; -o-transition-delay: 300ms;\"><span data-icon-type=\"normal\"   style=\"font-size: 38px;\" class=\"qode_iwt_icon_holder q_font_awsome_icon fa-3x \"><i class=\"qode_icon_font_awesome fa fa-eye qode_iwt_icon_element\" style=\"color: #c0c0c0;\" ><\/i><\/span><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h5 class=\"icon_title\" style=\"\">ROLE BASED ACCESS CONTROL (RBAC)<\/h5><p style=''>RBAC methodology and Entitlement Management: Design and Implementation of Role Based Access.<\/p><\/div><\/div><\/div>[vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<div class='q_icon_with_title medium normal_icon'><div class=\"icon_holder q_icon_animation\" style=\" transition-delay: 400ms; -webkit-transition-delay: 400ms; -moz-transition-delay: 400ms; -o-transition-delay: 400ms;\"><span data-icon-type=\"normal\"   style=\"font-size: 38px;\" class=\"qode_iwt_icon_holder q_font_awsome_icon fa-3x \"><i class=\"qode_icon_font_awesome fa fa-thumb-tack qode_iwt_icon_element\" style=\"color: #c0c0c0;\" ><\/i><\/span><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h5 class=\"icon_title\" style=\"\">FEDERATED IDENTITY MANAGEMENT<\/h5><p style=''>Context and Policy-based integrated web security management and Federated SSO for employees, partners and customers.<\/p><\/div><\/div><\/div>[vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class='q_icon_with_title medium normal_icon'><div class=\"icon_holder q_icon_animation\" style=\" transition-delay: 500ms; -webkit-transition-delay: 500ms; -moz-transition-delay: 500ms; -o-transition-delay: 500ms;\"><span data-icon-type=\"normal\"   style=\"font-size: 38px;\" class=\"qode_iwt_icon_holder q_font_awsome_icon fa-3x \"><i class=\"qode_icon_font_awesome fa fa-microphone qode_iwt_icon_element\" style=\"color: #c0c0c0;\" ><\/i><\/span><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h5 class=\"icon_title\" style=\"\">SECURITY INFORMATION MANAGEMENT AND COMPLIANCE<\/h5><p style=''>Audit, Compliance management and Reporting across the enterprise IT resources.<\/p><\/div><\/div><\/div>[vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class='q_icon_with_title medium normal_icon'><div class=\"icon_holder q_icon_animation\" style=\" transition-delay: 600ms; -webkit-transition-delay: 600ms; -moz-transition-delay: 600ms; -o-transition-delay: 600ms;\"><span data-icon-type=\"normal\"   style=\"font-size: 38px;\" class=\"qode_iwt_icon_holder q_font_awsome_icon fa-3x \"><i class=\"qode_icon_font_awesome fa fa-flask qode_iwt_icon_element\" style=\"color: #c0c0c0;\" ><\/i><\/span><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h5 class=\"icon_title\" style=\"\">DIRECTORY SERVICES<\/h5><p style=''>Integration solutions with Directory Services, Federated Directory, Virtual Directory.<\/p><\/div><\/div><\/div>[vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_left&#8221; transition_delay=&#8221;0.3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Identity Management &amp; Governance<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Identity Management (IM) system provides a policy based automated user privileges management throughout the entire user lifecycle. It can effectively manage user accounts, access permissions, and passwords from creation to termination across heterogeneous IT resources. Identity Management system can ensure that access to resources has been given to the correct identities, at the correct time, and for the correct purpose.<br \/>\nConfluxsys has extensive experience with Identity Management solution design, customization and integration. Our Identity Management service offerings include:<\/p>\n<ul>\n<li>Import Identities (HR Feed) from multiple source of truth to have unified user identity.<\/li>\n<li>Integration with Help-desk and ticketing systems for automated provisioning.<\/li>\n<li>Design complex IM workflows and integrations.<\/li>\n<li>Custom Adapter development to provision legacy and vendor specific target resources.<\/li>\n<li>Custom UI design and development for role based and request based solutions.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Access Management &amp; SSO<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Access Management (AM) system provides authentication, authorization, auditing and Web SSO solution for enforcing security policies over a wide range of Web and application resources. It centralizes user access and policy management for online portal and Web application server resources. Access Management solution addresses the challenges of growing complexity of enterprise security solutions, and the inability to implement security policies across platforms.<br \/>\nOur Access Management service offerings include:<\/p>\n<ul>\n<li>Centralized Authentication and Authorization across Web-based applications.<\/li>\n<li>SSO Solution for heterogeneous Web-based applications.<\/li>\n<li>Authorization service for custom web applications.<\/li>\n<li>Integrated user provisioning and password management.<\/li>\n<li>Integrated strong authentication.<\/li>\n<li>Audit and compliance reports<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_right&#8221; transition_delay=&#8221;0.3&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_left&#8221; transition_delay=&#8221;0.3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Role Based Access Control (RBAC) &amp; Certifications<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Role and Entitlement Management embraces all functional services that relate to the grouping of identities and to the administration of access to information and resources at a group rather than an individual level. Role Modeling:<br \/>\nOur RBAC service offerings include:<\/p>\n<ul>\n<li>Design and Implement Role Based Access Control system<\/li>\n<li>Design and Implement Request based provisioning for Roles and Entitlements<\/li>\n<li>Role discovery and entitlements.<\/li>\n<li>Role modeling: design of role structures to address business and IT requirements.<\/li>\n<li>Enforce enterprise security policy requirements.<\/li>\n<li>Integration with Identity and Access Management solution<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Federated Identity Management and Web Service Security<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Federated Identity Management (FIM) provides policy-based integrated web security management and federated SSO for federated Web services in companies deploying service-oriented architecture (SOA) and Web Services. With browser-based integration and OAuth open standard for authorization and other standards like SAML, OpenID, Liberty, WS-Federation, WS-Securit, WS-Trust to provide employees SSO access to cloud-based applications.<br \/>\nOur Federated Identity Management service offerings include:<\/p>\n<ul>\n<li>Federated SSO design and implementation.<\/li>\n<li>Integrated SOA architecture design and implementation.<\/li>\n<li>Web Services security, trust service and attribute mapping.<\/li>\n<li>Integration with Access Management system and XML gateways.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_right&#8221; transition_delay=&#8221;0.3&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_left&#8221; transition_delay=&#8221;0.3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Security Policy Management<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Security Policy Management provides application and data security management solution by implementing unified, centralized policy management and enforcement. With this solution, security policies can be enforced across multiple policy enforcement points and throughout the policy lifecycle from authoring and publishing to enforcing and updating security policies.<br \/>\nOur Security Policy Management service offerings include:<\/p>\n<ul>\n<li>Design of application roles, entitlements and data-level access control.<\/li>\n<li>Unified SOA security policy management and application entitlements management.<\/li>\n<li>Application integration.<\/li>\n<li>Integration with Identity and Access Management solution.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Security Information Management and Compliance<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Security Information Management provides audit and compliance management and reporting across the enterprise IT resources. It allows to centrally manage logs, monitor user activities, co-relate events and generate alerts, including privileged users and demonstrate compliance through audit reporting.<br \/>\nOur Security Information Management service offerings include:<\/p>\n<ul>\n<li>Operating system, mainframe, database and application auditing.<\/li>\n<li>Design security policies and alerts.<\/li>\n<li>Compliance reports and auditing.<\/li>\n<li>Integration with Identity and Access Management solution<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_right&#8221; transition_delay=&#8221;0.3&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; padding_top=&#8221;87&#8243; css_animation=&#8221;&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;7&#8243; down=&#8221;0&#8243;][vc_single_image image=&#8221;14097&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;element_from_left&#8221; transition_delay=&#8221;0.3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\">Directory Services<\/h2>\n<p>[\/vc_column_text][vc_separator type=&#8221;small&#8221; position=&#8221;left&#8221; up=&#8221;7&#8243; down=&#8221;34&#8243;][vc_column_text]Directory Services<br \/>\nDirectory Service provides a central repository for storing and managing information. Information stored in Directory server can be used for the authentication and authorization of users to enable secure access to enterprise and Internet services and applications. Directory Server is extensible, enables integration &amp; consolidation and provides the foundation for the e-business and Web services applications.<br \/>\nOur Directory Services service offerings include:<\/p>\n<ul>\n<li>Architect and implement highly available enterprise directory server.<\/li>\n<li>Directory migration \/ synchronization.<\/li>\n<li>Virtual directory mappings and Meta directory transformations.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;94&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#ffffff&#8221; padding_top=&#8221;87&#8243; padding_bottom=&#8221;34&#8243; css_animation=&#8221;&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_separator type=&#8221;transparent&#8221; up=&#8221;26&#8243; down=&#8221;0&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221;&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"full_width.php","meta":{"footnotes":""},"class_list":["post-14093","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/pages\/14093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/comments?post=14093"}],"version-history":[{"count":1,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/pages\/14093\/revisions"}],"predecessor-version":[{"id":15675,"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/pages\/14093\/revisions\/15675"}],"wp:attachment":[{"href":"https:\/\/www.lastmile.id\/confluxsys\/wp-json\/wp\/v2\/media?parent=14093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}