{"id":131512,"date":"2026-03-17T05:31:16","date_gmt":"2026-03-17T05:31:16","guid":{"rendered":"https:\/\/www.42gears.com\/?p=131512"},"modified":"2026-03-17T06:21:44","modified_gmt":"2026-03-17T06:21:44","slug":"what-is-four-eyes-principle-mdm","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/nl\/blog\/what-is-four-eyes-principle-mdm\/","title":{"rendered":"What Is the 4 Eyes Principle and Why Your IT Team Needs It"},"content":{"rendered":"\n<p><strong>Imagine this: <\/strong>An IT admin intends to perform a critical operation like wipe\/delete on a single device. Due to a small selection mistake, the action request is accidentally sent to an entire device group instead of just one device. Within seconds, multiple company devices could be wiped, resulting in data loss, operational disruption, and potential compliance issues.&nbsp;<\/p>\n\n\n\n<p>After the action is executed, there is often no easy way to reverse the impact. What began as a simple administrative task can quickly escalate into a large-scale operational issue affecting employees, business continuity, and data integrity.<\/p>\n\n\n\n<p>Scenarios like this highlight the need for stronger admin access control and an additional verification layer before executing sensitive operations. To address this risk, 42Gears\u2019 <a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\">SureMDM<\/a> has implemented the Four-Eyes Principle.&nbsp;<\/p>\n\n\n\n<p>But what is the four eyes principle, and why is it becoming essential for organizations managing critical administrator access?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-four-eyes-principle\"><strong>What is the Four-Eyes Principle?<\/strong><\/h2>\n\n\n\n<p>The Four Eyes Principle (also known as the 4 Eyes Principle) is a control mechanism that requires <strong>two authorized individuals<\/strong> to complete critical actions. One person initiates the action (the <em>Initiator<\/em>), and another reviews and approves it (the <em>Approver<\/em>).<\/p>\n\n\n\n<p>The core idea is simple:<\/p>\n\n\n\n<p><em>No critical action should be executed without review and authorization from a second responsible party.<\/em><\/p>\n\n\n\n<p>This approach significantly strengthens admin access control and reduces the risk of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unauthorized changes<\/li>\n\n\n\n<li>Accidental execution of sensitive actions<\/li>\n\n\n\n<li>Insider threats<\/li>\n\n\n\n<li>Compliance violations<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-the-four-eyes-principle-is-important\"><strong>Why the Four Eyes Principle Is Important<\/strong><\/h2>\n\n\n\n<p>As part of their day-to-day responsibilities, IT administrators perform a wide range of operations, including sensitive and high-risk actions such as device wipes, data deletion, and configuration changes. These actions can have irreversible consequences if executed incorrectly.<\/p>\n\n\n\n<p>Without proper checks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A simple mistake can impact thousands of devices.<\/li>\n\n\n\n<li>A compromised account can cause severe damage.<\/li>\n\n\n\n<li>Compliance requirements may be violated.<\/li>\n<\/ul>\n\n\n\n<p>The 4 Eyes Principle introduces <strong>accountability, transparency, and traceability<\/strong>, ensuring that every critical action is reviewed before execution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-the-four-eyes-principle-works-with-suremdm\"><strong>How the Four Eyes Principle Works with SureMDM<\/strong><\/h2>\n\n\n\n<p>The 4 Eyes Principle operates through structured role separation and an approval workflow.<\/p>\n\n\n\n<p>When a user initiates a designated critical action:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The action <strong>is not executed immediately<\/strong>.<\/li>\n\n\n\n<li>A <strong>request is generated<\/strong>.<\/li>\n\n\n\n<li>The request must be reviewed and approved by an authorized administrator.<\/li>\n\n\n\n<li>Only after approval is the action executed.<\/li>\n<\/ul>\n\n\n\n<p>This ensures enhanced security and prevents unintended operations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-approval-workflow-step-by-step\"><strong>The Approval Workflow: Step-by-Step<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-1-initiator-initiates-action\"><strong>Step 1: Initiator Initiates Action<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Initiator initiates a critical operation, like remote wipe or device deletion from SureMDM<\/li>\n\n\n\n<li>A confirmation message indicates approval is required, and a request is created.<\/li>\n\n\n\n<li>A unique Request ID is generated.<\/li>\n\n\n\n<li>The assigned Approver receives a notification.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-2-approver-reviews-the-request\"><strong>Step 2: Approver Reviews the Request<\/strong><\/h3>\n\n\n\n<p>The Approver:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reviews the request details.<\/li>\n\n\n\n<li>Verifies the target device and intended action.<\/li>\n\n\n\n<li>Approves or rejects the request.<\/li>\n\n\n\n<li>Adds optional comments.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-3-system-updates-status\"><strong>Step 3: System Updates Status<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Approved<\/strong> \u2192 Action is executed, status updated.<\/li>\n\n\n\n<li><strong>Rejected<\/strong> \u2192 Action is cancelled, status updated.<\/li>\n\n\n\n<li>Notifications are sent to both Initiator and Approver.<\/li>\n<\/ul>\n\n\n\n<p>All actions are recorded for audit and compliance tracking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-best-practices-for-implementing-the-four-eyes-principle\"><strong>Best Practices for Implementing the Four Eyes Principle<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Limit Approver roles to trusted administrators.<\/li>\n\n\n\n<li>Regularly review approval logs.<\/li>\n\n\n\n<li>Avoid excessive self-approval configurations.<\/li>\n\n\n\n<li>Ensure timely review of pending requests to prevent workflow delays.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-final-thoughts\"><strong>Final Thoughts<\/strong><\/h2>\n\n\n\n<p>The Four Eyes Principle is more than just an approval workflow\u2014it is an enterprise security governance model designed to protect organizations from operational, security, and compliance risks.<\/p>\n\n\n\n<p>By separating action initiation from authorization, it ensures that every critical operation is reviewed, validated, and properly documented.<\/p>\n\n\n\n<p>In an era where administrative actions can have massive consequences, the Four Eyes Principle stands as a simple yet powerful safeguard\u2014because sometimes, two pairs of eyes are better than one.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine this: An IT admin intends to perform a critical operation like wipe\/delete on a single device. Due to a small selection mistake, the action request is accidentally sent to an entire device group instead of just one device. Within seconds, multiple company devices could be wiped, resulting in data loss, operational disruption, and potential&hellip;<\/p>\n","protected":false},"author":36,"featured_media":131537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"latest-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-131512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Four Eyes Principle Explained: Strengthening Admin Access Control<\/title>\n<meta name=\"description\" content=\"Learn what the Four Eyes Principle is and how it strengthens admin access control by requiring approval for critical actions. Discover how SureMDM protects administrator access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is the 4 Eyes Principle and Why Your IT Team Needs It\" \/>\n<meta property=\"og:description\" content=\"Learn what the Four Eyes Principle is and how it strengthens admin access control by requiring approval for critical actions. Discover how SureMDM protects administrator access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T05:31:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T06:21:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nareddy Saivikas Reddy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nareddy Saivikas Reddy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\"},\"author\":{\"name\":\"Nareddy Saivikas Reddy\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f\"},\"headline\":\"What Is the 4 Eyes Principle and Why Your IT Team Needs It\",\"datePublished\":\"2026-03-17T05:31:16+00:00\",\"dateModified\":\"2026-03-17T06:21:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\"},\"wordCount\":609,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"nl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\",\"name\":\"Four Eyes Principle Explained: Strengthening Admin Access Control\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg\",\"datePublished\":\"2026-03-17T05:31:16+00:00\",\"dateModified\":\"2026-03-17T06:21:44+00:00\",\"description\":\"Learn what the Four Eyes Principle is and how it strengthens admin access control by requiring approval for critical actions. Discover how SureMDM protects administrator access.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg\",\"width\":1000,\"height\":538,\"caption\":\"Four Eyes Principle: A Key Control for Secure Admin Access\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is the 4 Eyes Principle and Why Your IT Team Needs It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f\",\"name\":\"Nareddy Saivikas Reddy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g\",\"caption\":\"Nareddy Saivikas Reddy\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Four Eyes Principle Explained: Strengthening Admin Access Control","description":"Learn what the Four Eyes Principle is and how it strengthens admin access control by requiring approval for critical actions. Discover how SureMDM protects administrator access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/","og_locale":"nl_NL","og_type":"article","og_title":"What Is the 4 Eyes Principle and Why Your IT Team Needs It","og_description":"Learn what the Four Eyes Principle is and how it strengthens admin access control by requiring approval for critical actions. Discover how SureMDM protects administrator access.","og_url":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2026-03-17T05:31:16+00:00","article_modified_time":"2026-03-17T06:21:44+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg","type":"image\/jpeg"}],"author":"Nareddy Saivikas Reddy","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"Nareddy Saivikas Reddy","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/"},"author":{"name":"Nareddy Saivikas Reddy","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f"},"headline":"What Is the 4 Eyes Principle and Why Your IT Team Needs It","datePublished":"2026-03-17T05:31:16+00:00","dateModified":"2026-03-17T06:21:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/"},"wordCount":609,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg","articleSection":["Uncategorized"],"inLanguage":"nl"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/","url":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/","name":"Four Eyes Principle Explained: Strengthening Admin Access Control","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg","datePublished":"2026-03-17T05:31:16+00:00","dateModified":"2026-03-17T06:21:44+00:00","description":"Learn what the Four Eyes Principle is and how it strengthens admin access control by requiring approval for critical actions. Discover how SureMDM protects administrator access.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/"]}]},{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg","width":1000,"height":538,"caption":"Four Eyes Principle: A Key Control for Secure Admin Access"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/what-is-four-eyes-principle-mdm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/nl\/"},{"@type":"ListItem","position":2,"name":"What Is the 4 Eyes Principle and Why Your IT Team Needs It"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/58570a4989f85f107145706d2131864f","name":"Nareddy Saivikas Reddy","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/459a0c72439f59dcaa1443e71b9272cc2f80b487c7f610672a728aede71df910?s=96&d=mm&r=g","caption":"Nareddy Saivikas Reddy"}}]}},"author_meta":{"ID":"36","user_nicename":"nareddy-reddy42gears-com","user_email":"nareddy.reddy@42gears.com","user_registered":"2024-02-23 06:21:35","display_name":"Nareddy Saivikas Reddy","first_name":"Nareddy","last_name":"Saivikas Reddy"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2026\/03\/What-Is-Four-Eyes-Principle.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/131512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/comments?post=131512"}],"version-history":[{"count":4,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/131512\/revisions"}],"predecessor-version":[{"id":133135,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/131512\/revisions\/133135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media\/131537"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media?parent=131512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/categories?post=131512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/tags?post=131512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}