{"id":475,"date":"2024-12-01T17:54:18","date_gmt":"2024-12-01T14:54:18","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/implementing-role-based-access-control-in-linux-server-environments\/"},"modified":"2024-12-01T17:58:59","modified_gmt":"2024-12-01T14:58:59","slug":"implementing-role-based-access-control-in-linux-server-environments","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/","title":{"rendered":"Implementing Role-Based Access Control in Linux Server Environments"},"content":{"rendered":"\n<p>Implementing Role-Based Access Control (RBAC) in Linux Server Environments<\/p>\n<p>In today&#8217;s fast-paced digital landscape, securing sensitive information is more important than ever. Organizations are increasingly turning to Role-Based Access Control (RBAC) as a means of managing user permissions and access in Linux server environments. RBAC enables administrators to define roles with specific permissions and assign these roles to users based on their job functions. This article delves into the concepts of RBAC, its benefits, and how to implement it in Linux server environments.<\/p>\n<h3>Understanding Role-Based Access Control<\/h3>\n<p>RBAC is a security mechanism that restricts system access to authorized users. Instead of managing permissions directly for every individual user, RBAC allows for the grouping of users into roles. Each role has defined permissions, which simplifies the management of user access and enhances security.<\/p>\n<h3>Benefits of RBAC<\/h3>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong>Enhanced Security<\/strong>: By restricting access based on user roles, RBAC minimizes the risk of unauthorized access to sensitive data.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong>Simplified Management<\/strong>: With predefined roles, administrators can easily manage user permissions without needing to modify individual accounts.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong>Improved Compliance<\/strong>: RBAC can help organizations meet regulatory compliance requirements by enforcing strict access controls aligned with user roles.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong>Scalability<\/strong>: RBAC is particularly beneficial for larger organizations where user roles can become complex. It allows for scalable access control governance.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><strong>Reduced Administrative Overhead<\/strong>: Automated role assignment and management reduce the time and effort required for ongoing access control administration.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h3>Implementing RBAC in Linux<\/h3>\n<p>To effectively implement RBAC in a Linux environment, you can utilize several tools and techniques. Below is a step-by-step guide to setting up RBAC using Linux&#8217;s built-in capabilities such as <code>sudo<\/code>, along with additional tools like SELinux and AppArmor.<\/p>\n<h4>Step 1: Define Roles and Permissions<\/h4>\n<p>Begin by identifying the roles needed within your organization. Common roles include:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Administrator<\/strong>: Full access to the server.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>User<\/strong>: Limited access to certain applications.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Developer<\/strong>: Access to development environments and code repositories.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Once roles are defined, outline permissions associated with each role.<\/p>\n<h4>Step 2: Set Up User Accounts<\/h4>\n<p>Create user accounts on the Linux server using the following command:<\/p>\n<pre><code class=\"language-bash\">sudo adduser username<\/code><\/pre>\n<p>This command should be repeated for each user you need to add, changing &#8220;username&#8221; accordingly.<\/p>\n<h4>Step 3: Configure <code>sudo<\/code><\/h4>\n<p><code>sudo<\/code> allows users to execute commands with elevated privileges based on their assigned role. To configure <code>sudo<\/code> for a specific role, edit the <code>\/etc\/sudoers<\/code> file using the <code>visudo<\/code> command:<\/p>\n<pre><code class=\"language-bash\">sudo visudo<\/code><\/pre>\n<p>In this file, you can specify user privileges based on their roles. For example:<\/p>\n<pre><code class=\"language-bash\"># Grant user1 admin role\nuser1 ALL=(ALL:ALL) ALL\n\n# Grant developer role\nuser2 ALL=(ALL:ALL) \/path\/to\/specific\/command<\/code><\/pre>\n<h4>Step 4: Implement SELinux or AppArmor<\/h4>\n<p>Both SELinux and AppArmor provide Mandatory Access Control (MAC) and can be integrated into your RBAC strategy.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>SELinux<\/strong>: Use SELinux to enforce policies that restrict access based on roles. You can set contexts and policies to ensure that each role has access only to required resources.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>AppArmor<\/strong>: Similar to SELinux, AppArmor can create profiles that limit the capabilities of applications based on their assigned roles.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>To enable SELinux, you can run:<\/p>\n<pre><code class=\"language-bash\">sudo setenforce 1<\/code><\/pre>\n<h4>Step 5: Test and Validate<\/h4>\n<p>After configuring RBAC, it is crucial to test the setup. Attempt to access various resources and commands to ensure that each role has the appropriate level of access. Adjust permissions as necessary.<\/p>\n<h4>Conclusion<\/h4>\n<p>Implementing Role-Based Access Control in your Linux server environment can significantly enhance security and simplify user management. By defining roles, setting up user accounts, using <code>sudo<\/code>, and leveraging SELinux or AppArmor, you can create a robust access control system that meets your organization\u2019s specific needs. Properly executed, RBAC will help you protect sensitive data while offering flexibility as your organization grows.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Implementing Role-Based Access Control (RBAC) in Linux Server Environments In today&#8217;s fast-paced digital landscape, securing sensitive information is more important than ever. Organizations are increasingly turning to Role-Based Access Control (RBAC) as a means of managing user permissions and access in Linux server environments. RBAC enables administrators to define roles with specific permissions and assign [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-475","post","type-post","status-publish","format-standard","hentry","category-linux-security","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Implementing Role-Based Access Control in Linux Server Environments - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Implementing Role-Based Access Control in Linux Server Environments %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing Role-Based Access Control in Linux Server Environments\" \/>\n<meta property=\"og:description\" content=\"Implementing Role-Based Access Control in Linux Server Environments %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-01T14:54:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-01T14:58:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Implementing Role-Based Access Control in Linux Server Environments\",\"datePublished\":\"2024-12-01T14:54:18+00:00\",\"dateModified\":\"2024-12-01T14:58:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/\"},\"wordCount\":577,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/\",\"name\":\"Implementing Role-Based Access Control in Linux Server Environments - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"datePublished\":\"2024-12-01T14:54:18+00:00\",\"dateModified\":\"2024-12-01T14:58:59+00:00\",\"description\":\"Implementing Role-Based Access Control in Linux Server Environments %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/implementing-role-based-access-control-in-linux-server-environments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementing Role-Based Access Control in Linux Server Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Implementing Role-Based Access Control in Linux Server Environments - WafaTech Blogs","description":"Implementing Role-Based Access Control in Linux Server Environments %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/","og_locale":"en_US","og_type":"article","og_title":"Implementing Role-Based Access Control in Linux Server Environments","og_description":"Implementing Role-Based Access Control in Linux Server Environments %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2024-12-01T14:54:18+00:00","article_modified_time":"2024-12-01T14:58:59+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Implementing Role-Based Access Control in Linux Server Environments","datePublished":"2024-12-01T14:54:18+00:00","dateModified":"2024-12-01T14:58:59+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/"},"wordCount":577,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/","name":"Implementing Role-Based Access Control in Linux Server Environments - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"datePublished":"2024-12-01T14:54:18+00:00","dateModified":"2024-12-01T14:58:59+00:00","description":"Implementing Role-Based Access Control in Linux Server Environments %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/implementing-role-based-access-control-in-linux-server-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Implementing Role-Based Access Control in Linux Server Environments"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=475"}],"version-history":[{"count":2,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/475\/revisions"}],"predecessor-version":[{"id":481,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/475\/revisions\/481"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}