{"id":14154,"date":"2024-06-09T11:28:04","date_gmt":"2024-06-09T11:28:04","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/06\/24\/granular-password-policy\/---bff7ca51-a424-469b-a98f-e1b01794bba8"},"modified":"2024-09-06T11:54:10","modified_gmt":"2024-09-06T11:54:10","slug":"granular-password-policy","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/granular-password-policy\/","title":{"rendered":"Granular Password Policies: Enhancing Security and Control"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Gone are the days when jotting down passwords on paper was the norm. Today, the focus has shifted to adopting a Granular Password Policy within a safe framework. A granular password policy is a strategy for enhancing password strength and applying IP address limitations, ensuring your online accounts remain as protected as possible. This <a title=\"Granular Password Policy\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/\" data-abc=\"true\">policy provides strong password security<\/a> by enabling users to implement various security layers, tailor authentication processes, and oversee permission settings in an app. Consequently, it allows individuals to dictate which IP addresses have access to their accounts and establish the required complexity of passwords to block the usage of easily guessable passwords.<\/p>\n<p>Granular Password Policy is the modern, secure way to protect your accounts from malicious actors, and it\u2019s become an essential part of any business looking to stay safe online.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#1_Get_the_Best_Security_with_Granular_Password_Policies\" >1. Get the Best Security with Granular Password Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#2_Keep_Your_Passwords_Secure_with_Advanced_Policies\" >2. Keep Your Passwords Secure with Advanced Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#3_Defend_Against_Password_Cracks_with_Granular_Policies\" >3. Defend Against Password Cracks with Granular Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#4_A_Closer_Look_at_Granular_Password_Policies\" >4. A Closer Look at Granular Password Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Benefits_of_Granular_Password_Policies\" >Benefits of Granular Password Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_A\" >Q&amp;A<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_What_is_a_Granular_Password_Policy\" >Q: What is a Granular Password Policy?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_What_is_Active_Directory\" >Q: What is Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_What_are_Fine-Grained_Password_Policies_in_Active_Directory\" >Q: What are Fine-Grained Password Policies in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_How_do_lockout_policies_work_in_Active_Directory\" >Q: How do lockout policies work in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_What_is_the_difference_between_the_default_domain_password_policy_and_a_custom_password_policy_in_Active_Directory\" >Q: What is the difference between the default domain password policy and a custom password policy in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_What_are_some_common_settings_that_can_be_controlled_in_a_password_policy_in_Active_Directory\" >Q: What are some common settings that can be controlled in a password policy in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_How_can_administrators_enforce_stronger_password_policies_for_privileged_accounts_in_Active_Directory\" >Q: How can administrators enforce stronger password policies for privileged accounts in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_How_can_users_reset_their_own_passwords_in_Active_Directory\" >Q: How can users reset their own passwords in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/#Q_What_are_some_best_practices_for_password_compliance_in_Active_Directory\" >Q: What are some best practices for password compliance in Active Directory?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-get-the-best-security-with-granular-password-policies\"><span class=\"ez-toc-section\" id=\"1_Get_the_Best_Security_with_Granular_Password_Policies\"><\/span>1. Get the Best Security with Granular Password Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Ensure Safety with Password Control<\/b><\/p>\n<p>Having a strong and secure password is one of the first steps in protecting your data and accounts online. To fully benefit from the advantages of a password system, organizations should consider applying granular password policies that provide complete control over authentication and access. Different levels of passwords can define access to various systems and sensitive information.<\/p>\n<p>Granular password policies allow for the creation of specific access rules for different user groups. The granularity of these rules makes it easier to manage access to content and resources for an organization. Authorization and authentication rules can be set according to the roles, departments, and systems in the organization. For example, while all users may need to set up a password to gain access to the company\u2019s intranet, only senior executives may need to use an authentication token to view confidential reports.<\/p>\n<p>Organizations can also set up expiration and renewal rules for passwords. This allows for passwords to be regularly changed, thus reducing the risk of hackers gaining access to the system. In addition, automated notifications can be set up to remind users when their passwords will expire so that they can proactively update them and maintain a high-security level.<\/p>\n<p>Granular password policies allow for enhanced control and security within organizations. By setting responsibility, expiration, and renewal rules for passwords, organizations can ensure that their systems and information are secure.<\/p>\n<h2 id=\"2-keep-your-passwords-secure-with-advanced-policies\"><span class=\"ez-toc-section\" id=\"2_Keep_Your_Passwords_Secure_with_Advanced_Policies\"><\/span>2. Keep Your Passwords Secure with Advanced Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Password Policies: Lock It Down<\/strong><\/p>\n<p>The biggest risk to your sensitive data is password insecurity, so it pays to use strong password policies to keep unauthorized users out. There are a few advanced policies you can implement to keep your data secure:<\/p>\n<ul>\n<li>Require strong passwords with a minimum of 8 characters.<\/li>\n<li>Prompt users to change their passwords periodically.<\/li>\n<li>Enforce log-in timeouts after an established period of inactivity.<\/li>\n<li>Never store plaintext passwords. Use a one-way hash with strong encryption.<\/li>\n<\/ul>\n<p>With data becoming more valuable than ever, cybercriminals are more motivated than ever to hack unprotected accounts. Your best defense is to ensure your passwords are strong and secure. Relying on basic password security measures is no longer good enough. To keep your data safe, use complex passwords and advanced policies to make your accounts more difficult to crack.<\/p>\n<h2 id=\"3-defend-against-password-cracks-with-granular-policies\"><span class=\"ez-toc-section\" id=\"3_Defend_Against_Password_Cracks_with_Granular_Policies\"><\/span>3. Defend Against Password Cracks with Granular Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cybersecurity is an important component of any business these days, and one threat is password cracking. To defend against this, it\u2019s important to use granular policies. These policies are specific rules and requirements that can help protect against attempts to break into databases and accounts.<\/p>\n<ul>\n<li><strong>Provide Access-Level Accountability<\/strong> \u2013 Granular policies allow you to customize access levels for different users. This way it\u2019s easier to keep track of who can access what, providing you with a secure environment.<\/li>\n<li><strong>Strengthen Your Password Regulations<\/strong> \u2013 Granular policies can reduce your risk of password cracking by establishing strong password rules, such as length restrictions and complexity requirements. This can help make it harder for hackers to break into your systems.<\/li>\n<li><strong>Monitor Activity<\/strong> \u2013 With granular policies, you can monitor user activity and detect unusual or suspicious behavior. This way you can quickly spot a potential attack and take steps to prevent it.<\/li>\n<\/ul>\n<p>Granular policies are an effective way to protect against password-cracking attempts, and organizations should consider implementing them as part of a comprehensive cybersecurity strategy. This can help to ensure that your databases and accounts remain secure and that your business operations are not disrupted.<\/p>\n<h2 id=\"4-a-closer-look-at-granular-password-policies\"><span class=\"ez-toc-section\" id=\"4_A_Closer_Look_at_Granular_Password_Policies\"><\/span>4. A Closer Look at Granular Password Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Granular password policies go beyond standard password requirements. They provide additional and detailed security protocols to ensure secure authentication. <b>Let\u2019s take a closer look at what these policies are and how they can benefit businesses.<\/b><\/p>\n<p>Firstly, granular policies allow businesses to set individual requirements for passwords and password changes. This can include restrictions on minimum length, previously used passwords, special characters, dictionary words, and more. Passwords are checked against known virtual threats, which further strengthen the authentication process.<\/p>\n<p><b>Moreover, granular policies can also provide a higher layer of accessibility.<\/b> Companies can set parameters for automatic lockouts or enable users to reset their own passwords. Additionally, these policies can be enforced across multiple platforms, allowing businesses to secure authentication over both internal and external networks. All this is made possible without <a title=\"Useradd No Password\" href=\"https:\/\/logmeonce.com\/resources\/useradd-no-password\/\" data-abc=\"true\">sacrificing user experience<\/a> or usability.<\/p>\n<p>Active Directory is a centralized system for managing user accounts, passwords, and other resources in a networked environment. Fine-Grained Password Policies allow for more granular control over password settings, such as lockout policies and password complexity requirements. These policies can be applied to individual user objects within a domain, ensuring that privileged accounts like domain admins have stronger password protection. The default domain password policy sets the standard for password complexity and expiration, while custom password policies can be tailored to specific user groups or individual users. With stricter settings in place, organizations can better protect against modern password attacks and comply with password compliance regulations. Utilizing tools like password self-service and password auditing can further enhance password management and security. Additionally, access controls and account management solutions help maintain a secure environment for all types of accounts, including contractor and executive accounts. Sources: Microsoft Active Directory Documentation, Specops Password Auditor Guide.<\/p>\n<p>Domain functional levels play a crucial role in determining the features and capabilities available within a domain. Setting a strong password policy is essential for ensuring the security of user accounts. Parameters such as minimum password length and complexity requirements are defined in the policy to enhance the overall security posture of the domain. Implementing a single password policy simplifies management and ensures consistency across all user accounts. Service accounts and admin tools are crucial components for efficient account management within the domain. The New-ADFineGrainedPasswordPolicy cmdlet allows administrators to create fine-grained password policies, offering more flexibility compared to previous versions. Utilizing reversible encryption in password storage poses a security risk and should be avoided. Default domain policies should be carefully configured to meet the organization&#8217;s security standards. Privileged users, such as administrators, should have separate password policies to enhance security. Compliance with password standards and restrictions is essential to prevent unauthorized access to sensitive information. A separate password policy for contractor accounts can help manage access rights effectively. By utilizing a comprehensive password setting object, organizations can ensure that all users adhere to password standards. Secure IT management solutions offer protection against hacking threats and security breaches. Implementing a robust password policy is critical for safeguarding user accounts and sensitive data within the domain.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Granular_Password_Policies\"><\/span>Benefits of Granular Password Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th style=\"background-color: lightgray; font-weight: bold; font-size: 1.2em;\">Policy<\/th>\n<th style=\"background-color: lightgray; font-weight: bold; font-size: 1.2em;\">Description<\/th>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center;\">Enhanced Security<\/td>\n<td>Granular policies provide detailed security protocols to ensure secure authentication.<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"text-align: center;\">Individual Password Requirements<\/td>\n<td>Set unique requirements for passwords and changes, including length, characters, and more.<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center;\">Higher Accessibility<\/td>\n<td>Enforce parameters for lockouts and enable users to reset their own passwords.<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"text-align: center;\">Multi-Platform Enforcement<\/td>\n<td>Secure authentication across internal and external networks without compromising user experience.<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center;\">Fine-Grained Password Policies<\/td>\n<td>Allows for more control over password settings, tailored to specific user groups.<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"text-align: center;\">Compliance and Security<\/td>\n<td>Meet security standards, protect against modern attacks, and comply with password regulations.<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center;\">Efficient Account Management<\/td>\n<td>Utilize tools like password self-service and auditing for enhanced password management and security.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_a_Granular_Password_Policy\"><\/span>Q: What is a Granular Password Policy?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: A Granular Password Policy is a way for companies to keep their sensitive data safe by setting up rules that govern how their employees use passwords. These rules might include things like requiring strong passwords, setting expiration dates for passwords, and restricting how many times a password can be used.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_Active_Directory\"><\/span>Q: What is Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Active Directory is a directory service developed by Microsoft for Windows domain networks. It is used for storing information about user objects, groups, and computers within a network.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_Fine-Grained_Password_Policies_in_Active_Directory\"><\/span>Q: What are Fine-Grained Password Policies in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Fine-Grained Password Policies allow for more granular control over password settings for different sets of users within a domain. This feature was introduced in Windows Server 2008.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_do_lockout_policies_work_in_Active_Directory\"><\/span>Q: How do lockout policies work in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Lockout policies in Active Directory determine the lockout settings for user accounts when too many incorrect password attempts are made. This helps to protect against brute-force attacks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_the_difference_between_the_default_domain_password_policy_and_a_custom_password_policy_in_Active_Directory\"><\/span>Q: What is the difference between the default domain password policy and a custom password policy in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: The default domain password policy applies to all user objects within a domain, while a custom password policy allows for specific settings to be applied to individual users or groups.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_common_settings_that_can_be_controlled_in_a_password_policy_in_Active_Directory\"><\/span>Q: What are some common settings that can be controlled in a password policy in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Some common settings include minimum and maximum password age, password history requirements, password complexity requirements, and lockout threshold settings.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_administrators_enforce_stronger_password_policies_for_privileged_accounts_in_Active_Directory\"><\/span>Q: How can administrators enforce stronger password policies for privileged accounts in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Administrators can use Fine-Grained Password Policies to create a custom password policy specifically for privileged accounts, ensuring that they adhere to stricter password requirements.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_users_reset_their_own_passwords_in_Active_Directory\"><\/span>Q: How can users reset their own passwords in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Password self-service tools can be implemented to allow users to reset their passwords without the need for intervention from an administrator.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_best_practices_for_password_compliance_in_Active_Directory\"><\/span>Q: What are some best practices for password compliance in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Best practices include implementing strict password complexity requirements, enforcing regular password changes, and monitoring for compromised passwords.<\/p>\n<p>Conclusion<\/p>\n<p>Not sure which granular password policy solution is right for you? Create a free <a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a> account and start benefiting from its fine-tuned password policies today. LogMeOnce features a highly secure, comprehensive, and granular password policy that\u2019s easy to manage and keeps your data safe at all times. Get the utmost control over your passwords and data with this state-of-the-art granular password policy solution.<\/p>\n<p>Reference: <a href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy\/\" target=\"_new\" rel=\"noopener\">Granular Password Policy<\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Gone are the days when jotting down passwords on paper was the norm. Today, the focus has shifted to adopting a Granular Password Policy within a safe framework. A granular password policy is a strategy for enhancing password strength and applying IP address limitations, ensuring your online accounts remain as protected as possible. This policy [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[6522,1740,9569,7252,783,781],"class_list":["post-14154","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-policy-2","tag-cyber-security","tag-granular","tag-information-technology","tag-password","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/14154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=14154"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/14154\/revisions"}],"predecessor-version":[{"id":223485,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/14154\/revisions\/223485"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=14154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=14154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=14154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}