{"id":4147,"date":"2023-10-27T19:08:23","date_gmt":"2023-10-27T19:08:23","guid":{"rendered":"https:\/\/quebit.com\/askquebit\/?p=4147"},"modified":"2026-01-20T16:00:24","modified_gmt":"2026-01-20T16:00:24","slug":"removing-element-level-security-in-ibm-planning-analytics","status":"publish","type":"post","link":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/","title":{"rendered":"How Do I Remove Element-Level Security in IBM Planning Analytics?"},"content":{"rendered":"<p><strong>Planning Analytics Security<\/strong><\/p>\n<p>You can create and implement a <strong>security scheme<\/strong> in TM1\\Planning Analytics to secure objects and data in your server by defining <a href=\"https:\/\/www.ibm.com\/docs\/en\/cognos-tm1\/10.2.2?topic=groups-tm1-users-security-overview\">security groups and clients (users)<\/a>, assigning access permissions to those groups and then assigning users to one or more of the groups. A good security schema will typically consider controlling access at the <strong>Element-level <\/strong>&#8211; which controls access to cells in a cube that are identified by elements. An example might be preventing a group of users from updating a particular group of general ledger accounts.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Control Cubes<\/strong><\/p>\n<p><a href=\"https:\/\/www.ibm.com\/docs\/ru\/planning-analytics\/2.0.0?topic=operations-control-cubes\">Planning Analytics uses <strong>control cubes<\/strong><\/a> to manage security (as well as other functionality, including performance monitoring) and <em>automatically generates<\/em> the control cubes it needs. To see the control cubes within a TM1\/PA database you can toggle the display in Server Explorer by clicking\u00a0<strong>View<\/strong>\u00a0then\u00a0<strong>Display Control Objects. <\/strong>If you are using <strong>Planning Analytics Workspace<\/strong> (or PAW), and appropriate permissions have been granted to you, all control objects (including security control cubes) are listed under a separate folder and can be expanded within the Databases pane.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Element Security<\/strong><\/p>\n<p>Security control cubes apply security privileges for TM1\/Planning Analytics objects to user groups on the Planning Analytics database. <em>Element<\/em> Security cubes apply security privileges based upon <em>elements<\/em>. You can <strong>manually create<\/strong> an element security cube using Architect (if you have administrator privileges) by\u00a0right-clicking on a dimension for which you want to define element-level security and then select <strong>Security<\/strong>, <strong>Create Cell Security Cube<\/strong>. TM1 will then automatically create a security control cube using the naming format }ElementSecurity_ CubeName where CubeName is the name of the dimension that you selected.<\/p>\n<p>&nbsp;<\/p>\n<p>Although there is a <em>programming method<\/em> to create a <strong><em>Cell<\/em><\/strong> Security cube (<strong>CellSecurityCubeCreate<\/strong> creates a security cube from an existing cube), there currently is not an equivalent method to create <strong><em>element<\/em><\/strong> security cubes. You can, however, use the <strong>ElementSecurityPut<\/strong>() function, and if the }ElementSecurity_ cube does not already exist, Planning Analytics will create it.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Don\u2019t Want Security on a Dimension?<\/strong><\/p>\n<p>Regardless of how you chose to create an Element Security cube within your Planning Analytics database, suppose you <em>inadvertently<\/em> create an element security cube on a dimension that should not have it? Or you \u201cinherit\u201d a model that includes element level security on a dimension that no longer requires security at that level?<\/p>\n<p>&nbsp;<\/p>\n<p>The following simple steps can be used to remove and reset security on a specific dimension:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Identify the dimension<\/strong> that you wish to remove implemented element security. In other words, if element security has been implemented on a dimension, you should find an element security control cube for that dimension.<\/li>\n<li><strong>Remove the }ElementSecurity cube <\/strong>and<strong> refresh security.<\/strong> This will reset security for all the elements within the dimension to WRITE for all security groups.<\/li>\n<\/ul>\n<p>Note: Be careful when making any changes (security or otherwise); we would advise you \u201c<a href=\"https:\/\/blog.quebit.com\/blog\/quebit-blog-prototyping-best-practices-for-ibm-planning-analytics-tm1-development\">prototype<\/a>\u201d any maintenance in a <u>development environment<\/u> first and then promote or repeat th validated changes to your controlled or production environment to avoid incorrect results or even loss of data.<\/p>\n<p><strong>An Example<\/strong><\/p>\n<p>In the below illustration, we see that element security has been implemented on the <strong>Model<\/strong> dimension as the }ElementSecurity_Model control cube shows:<\/p>\n<p><strong> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4148\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14-300x90.png\" alt=\"\" width=\"300\" height=\"90\" srcset=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14-300x90.png 300w, https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14.png 330w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<p>If you <strong>right-click<\/strong> on the cube and try to delete the cube, you will notice that the <strong>Delete Cube\u2026<\/strong> option is grayed-out and disabled (regardless of your access privileges):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4149\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture15-300x215.png\" alt=\"\" width=\"300\" height=\"215\" srcset=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture15-300x215.png 300w, https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture15.png 460w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>To properly remove the control cube, you can use the <a href=\"https:\/\/www.ibm.com\/docs\/en\/cognos-tm1\/10.2.2?topic=functions-cubedestroy\">CubeDestory<\/a> function. This is a\u00a0 TurboIntegrator function, so it is valid <em>only in <\/em>a <a href=\"https:\/\/www.ibm.com\/docs\/en\/cafme\/10.2.2?topic=features-cognos-tm1-turbointegrator-processes\">TurboIntegrator<\/a> process, so you\u2019ll need to create a new process (the below image is using Planning Analytics Workspace):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4150\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture16-300x211.png\" alt=\"\" width=\"300\" height=\"211\" srcset=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture16-300x211.png 300w, https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture16.png 582w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Once you have a new process, you can add the function\u2019s to the <strong>Prolog<\/strong> section of the process in the following fashion (note: when I am working with security, I always add a <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=functions-securityrefresh\">SecurityRefresh<\/a> as the last step in my script):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-4151\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture17-300x129.png\" alt=\"\" width=\"300\" height=\"129\" srcset=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture17-300x129.png 300w, https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture17-768x331.png 768w, https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture17.png 804w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Finally, save the process and run it. Once it is complete, check that indeed the }ElementSecurity_ CubeName control cube has been removed. If you feel that you need some assistance performing these steps, please reach out to QueBIT and we will be glad to asset with this or any there Planning Analytics security need.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Planning Analytics Security You can create and implement a security scheme in TM1\\Planning Analytics to secure objects and data in your server by defining security groups and clients (users), assigning access permissions to those groups and then assigning users to one or more of the groups. A good security schema will typically consider controlling access&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[85,105,104,70,36,51,83],"class_list":["post-4147","post","type-post","status-publish","format-standard","hentry","category-ibm","tag-cognos-tm1","tag-ibm-planning-ana","tag-ibm-tm1","tag-paw","tag-planning-analytics","tag-planning-analytics-how-tos","tag-tm1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Do I Remove Element-Level Security in IBM Planning Analytics? - QueBIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do I Remove Element-Level Security in IBM Planning Analytics? - QueBIT\" \/>\n<meta property=\"og:description\" content=\"Planning Analytics Security You can create and implement a security scheme in TM1Planning Analytics to secure objects and data in your server by defining security groups and clients (users), assigning access permissions to those groups and then assigning users to one or more of the groups. A good security schema will typically consider controlling access&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"QueBIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-27T19:08:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T16:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14.png\" \/>\n\t<meta property=\"og:image:width\" content=\"330\" \/>\n\t<meta property=\"og:image:height\" content=\"99\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick Quirke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Quirke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/\"},\"author\":{\"name\":\"Patrick Quirke\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/51bf83d531948247370683787d0f46ff\"},\"headline\":\"How Do I Remove Element-Level Security in IBM Planning Analytics?\",\"datePublished\":\"2023-10-27T19:08:23+00:00\",\"dateModified\":\"2026-01-20T16:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/\"},\"wordCount\":713,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Picture14-300x90.png\",\"keywords\":[\"Cognos TM1\",\"IBM Planning Ana\",\"IBM TM1\",\"PAW\",\"Planning Analytics\",\"Planning Analytics How To's\",\"TM1\"],\"articleSection\":[\"IBM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/\",\"name\":\"How Do I Remove Element-Level Security in IBM Planning Analytics? - QueBIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Picture14-300x90.png\",\"datePublished\":\"2023-10-27T19:08:23+00:00\",\"dateModified\":\"2026-01-20T16:00:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/51bf83d531948247370683787d0f46ff\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Picture14.png\",\"contentUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Picture14.png\",\"width\":330,\"height\":99},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/removing-element-level-security-in-ibm-planning-analytics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do I Remove Element-Level Security in IBM Planning Analytics?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\",\"name\":\"QueBIT\",\"description\":\"QueBIT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/51bf83d531948247370683787d0f46ff\",\"name\":\"Patrick Quirke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g\",\"caption\":\"Patrick Quirke\"},\"sameAs\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"],\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/author\\\/pquirke\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Do I Remove Element-Level Security in IBM Planning Analytics? - QueBIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/","og_locale":"en_US","og_type":"article","og_title":"How Do I Remove Element-Level Security in IBM Planning Analytics? - QueBIT","og_description":"Planning Analytics Security You can create and implement a security scheme in TM1Planning Analytics to secure objects and data in your server by defining security groups and clients (users), assigning access permissions to those groups and then assigning users to one or more of the groups. A good security schema will typically consider controlling access&hellip;","og_url":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/","og_site_name":"QueBIT","article_published_time":"2023-10-27T19:08:23+00:00","article_modified_time":"2026-01-20T16:00:24+00:00","og_image":[{"width":330,"height":99,"url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14.png","type":"image\/png"}],"author":"Patrick Quirke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Quirke","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#article","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/"},"author":{"name":"Patrick Quirke","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/51bf83d531948247370683787d0f46ff"},"headline":"How Do I Remove Element-Level Security in IBM Planning Analytics?","datePublished":"2023-10-27T19:08:23+00:00","dateModified":"2026-01-20T16:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/"},"wordCount":713,"commentCount":0,"image":{"@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14-300x90.png","keywords":["Cognos TM1","IBM Planning Ana","IBM TM1","PAW","Planning Analytics","Planning Analytics How To's","TM1"],"articleSection":["IBM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/","url":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/","name":"How Do I Remove Element-Level Security in IBM Planning Analytics? - QueBIT","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#primaryimage"},"image":{"@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14-300x90.png","datePublished":"2023-10-27T19:08:23+00:00","dateModified":"2026-01-20T16:00:24+00:00","author":{"@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/51bf83d531948247370683787d0f46ff"},"breadcrumb":{"@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#primaryimage","url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14.png","contentUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/10\/Picture14.png","width":330,"height":99},{"@type":"BreadcrumbList","@id":"https:\/\/quebit.com\/askquebit\/removing-element-level-security-in-ibm-planning-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quebit.com\/askquebit\/"},{"@type":"ListItem","position":2,"name":"How Do I Remove Element-Level Security in IBM Planning Analytics?"}]},{"@type":"WebSite","@id":"https:\/\/quebit.com\/askquebit\/#website","url":"https:\/\/quebit.com\/askquebit\/","name":"QueBIT","description":"QueBIT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quebit.com\/askquebit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/51bf83d531948247370683787d0f46ff","name":"Patrick Quirke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g","caption":"Patrick Quirke"},"sameAs":["https:\/\/quebit.com\/askquebit\/"],"url":"https:\/\/quebit.com\/askquebit\/author\/pquirke\/"}]}},"_links":{"self":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/4147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/comments?post=4147"}],"version-history":[{"count":4,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/4147\/revisions"}],"predecessor-version":[{"id":5074,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/4147\/revisions\/5074"}],"wp:attachment":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/media?parent=4147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/categories?post=4147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/tags?post=4147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}