{"id":241924,"date":"2025-01-23T17:09:21","date_gmt":"2025-01-23T17:09:21","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/"},"modified":"2025-01-23T17:09:21","modified_gmt":"2025-01-23T17:09:21","slug":"active-directory-passwordless","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/","title":{"rendered":"Implementing Passwordless Authentication in Active Directory"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of <strong>cybersecurity<\/strong>, the recent leaks of <strong>sensitive passwords<\/strong> have raised alarms among users and security professionals alike. These compromised credentials often surface in <strong>data breaches<\/strong> across various platforms, exposing millions to potential threats and <strong>identity theft<\/strong>. The significance of these leaks cannot be overstated; they serve as a stark reminder of the vulnerabilities within our digital lives and the urgent need for <strong>robust security measures<\/strong>. As users increasingly rely on online services for everyday activities, understanding the implications of leaked passwords becomes crucial in safeguarding personal information and maintaining privacy in an interconnected world.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Why_Go_Passwordless\" >Why Go Passwordless<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Technical_Requirements\" >Technical Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Passwordless_Authentication_Methods\" >Passwordless Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Security_Key_Configuration\" >Security Key Configuration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#User_Training_and_Adoption\" >User Training and Adoption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Monitoring_and_Maintenance\" >Monitoring and Maintenance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#How_Long_Does_It_Typically_Take_to_Fully_Implement_Passwordless_Authentication\" >How Long Does It Typically Take to Fully Implement Passwordless Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#What_Happens_if_a_User_Loses_Their_Authentication_Device\" >What Happens if a User Loses Their Authentication Device?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#Can_Passwordless_Authentication_Work_Offline_Without_Internet_Connectivity\" >Can Passwordless Authentication Work Offline Without Internet Connectivity?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#What_Are_the_Cost_Implications_Compared_to_Traditional_Password-Based_Systems\" >What Are the Cost Implications Compared to Traditional Password-Based Systems?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#How_Does_Passwordless_Authentication_Handle_Shared_Workstations_or_Devices\" >How Does Passwordless Authentication Handle Shared Workstations or Devices?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-passwordless\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Configure Microsoft Entra ID (formerly Azure AD) and ensure Active Directory is synchronized for seamless passwordless implementation.<\/li>\n<li>Enable FIDO2 security key authentication in Active Directory and verify all devices meet system compatibility requirements.<\/li>\n<li>Implement multi-factor authentication as a foundational security layer before transitioning to full passwordless authentication.<\/li>\n<li>Deploy Windows Hello for Business to enable biometric authentication options across your Active Directory environment.<\/li>\n<li>Establish user training programs and monitoring systems to ensure successful adoption and maintenance of passwordless authentication.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Why_Go_Passwordless\"><\/span>Why Go Passwordless<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/secure_access_without_passwords.jpg\" alt=\"\" title=\"\"><\/div>\n<p>As organizations face mounting <strong>cybersecurity challenges<\/strong>, <strong>passwordless authentication<\/strong> offers a compelling solution that transforms both security and <strong>user experience<\/strong>.<\/p>\n<p>Think of it like having a <strong>super-smart lock<\/strong> on your treehouse that only opens with your fingerprint or face &#8211; no secret password needed!<\/p>\n<p>I&#039;m excited to show you why going passwordless is so cool. It&#039;s like having a <strong>magical shield<\/strong> that keeps the bad guys out while making it super easy for you to get in. With <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-page\/\">multi-factor authentication<\/a> as an additional layer, the security of passwordless systems is greatly enhanced.<\/p>\n<p>You won&#039;t have to remember tricky passwords anymore (just like you don&#039;t need a special code to recognize your best friend!).<\/p>\n<p>Studies show organizations like Microsoft achieved a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.kensington.com\/news\/security-blog\/benefits-of-passwordless-logins\/\">99.9% reduction<\/a> in account compromises after implementing passwordless systems.<\/p>\n<p>Your company&#039;s IT team will spend less time helping people who forget their passwords, and everyone stays safer from cyber bullies who try to steal information.<\/p>\n<p>Pretty neat, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Technical_Requirements\"><\/span>Technical Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>You&#039;ll also need to make sure your security keys are FIDO2-compliant and your Active Directory is ready for <strong>Microsoft Entra integration<\/strong>. Organizations that implement <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/doubleoctopus.com\/blog\/passwordless-mfa-blog\/active-directory-passwordless-authentication\/\">multi-factor authentication<\/a> can reduce unauthorized access risks by 99.9%. Additionally, using <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-provider\/\">adaptive authentication<\/a> can further enhance security by adjusting access based on user behavior.<\/p>\n<p>Don&#039;t worry &#8211; I&#039;ll guide you through each step!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Passwordless_Authentication_Methods\"><\/span>Passwordless Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/secure_login_without_passwords.jpg\" alt=\"\" title=\"\"><\/div>\n<p>Now that you&#039;ve got your technical requirements in place, let&#039;s explore the various <strong>passwordless authentication methods<\/strong> available for Active Directory implementation.<\/p>\n<p>Think of these methods like different ways to access a magical treasure chest!<\/p>\n<p>You can use your face (just like taking a selfie) with <strong>Windows Hello<\/strong>, or your fingerprint (like pressing your thumb in paint).<\/p>\n<p>Cool, right? There are also <strong>special apps<\/strong> on your phone, kind of like having a secret decoder ring. These apps often utilize <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-active-directory-on-premise\/\">multi-factor authentication<\/a> to provide an extra layer of security.<\/p>\n<p>My favorite is using a <strong>security key<\/strong> &#8211; it&#039;s like having a tiny magic wand that you plug into your computer!<\/p>\n<p>Want to make it super easy for everyone? We can <strong>mix and match<\/strong> these methods, just like creating your own sundae with different toppings.<\/p>\n<p>Organizations can achieve <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/hoop.dev\/blog\/active-directory-passwordless-authentication-streamline-enterprise-security\/\">enhanced system security<\/a> by eliminating traditional password vulnerabilities.<\/p>\n<p>Which method sounds most fun to you?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Key_Configuration\"><\/span>Security Key Configuration<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before diving into <strong>security key setup<\/strong>, let&#039;s guarantee your <strong>Active Directory environment<\/strong> meets the essential requirements.<\/p>\n<p>WebAuthN authentication requires <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/github.com\/MicrosoftDocs\/entra-docs\/blob\/main\/docs\/identity\/authentication\/howto-authentication-passwordless-security-key-windows.md\">Windows 10 version 1903<\/a> for proper functionality.<\/p>\n<p>I&#039;ll walk you through configuring these cool security keys &#8211; they&#039;re like special magic keys for your computer!<\/p>\n<p>First, we&#039;ll make sure you&#039;ve got <strong>Windows 10 version 1903<\/strong> or newer installed.<\/p>\n<p>Here are the super-important steps we need to follow:<\/p>\n<ul>\n<li>Enable security key sign-in through Group Policy (it&#039;s like giving your computer special permission)<\/li>\n<li>Set up the Central Store (think of it as a safe spot for all your settings)<\/li>\n<li>Check if your device is Entra-joined using the dsregcmd \/status command<\/li>\n<\/ul>\n<p>Just like how you need the right key to open your house, we&#039;ll get your security key working perfectly.<\/p>\n<p>Ready to make your computer super secure?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"User_Training_and_Adoption\"><\/span>User Training and Adoption<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/user_training_and_adoption.jpg\" alt=\"\" title=\"\"><\/div>\n<p>Since implementing passwordless authentication requires significant changes to established workflows, effective user training and adoption strategies are essential for success. Organizations should design clear <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/hoop.dev\/blog\/how-to-implement-passwordless-authentication-in-active-directory-with-ease\/\">training programs<\/a> that simplify the concepts. I&#039;ll show you how to make this super easy, just like learning a new game! Let&#039;s break down the training into fun, bite-sized pieces that everyone can understand.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Training Step<\/th>\n<th style=\"text-align: center\">What We&#039;ll Do<\/th>\n<th style=\"text-align: center\">Why It&#039;s Cool<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Learn Basics<\/td>\n<td style=\"text-align: center\">Show how passwordless works<\/td>\n<td style=\"text-align: center\">No more forgotten passwords!<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Try Tools<\/td>\n<td style=\"text-align: center\">Play with security keys<\/td>\n<td style=\"text-align: center\">Like having a special key to your treehouse<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Practice Together<\/td>\n<td style=\"text-align: center\">Get hands-on experience<\/td>\n<td style=\"text-align: center\">You&#039;ll be a pro in no time<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Give Feedback<\/td>\n<td style=\"text-align: center\">Tell us what you think<\/td>\n<td style=\"text-align: center\">Help make it even better<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"Monitoring_and_Maintenance\"><\/span>Monitoring and Maintenance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Maintaining a <strong>secure and reliable<\/strong> passwordless authentication system requires <strong>thorough monitoring<\/strong> and <strong>regular maintenance procedures<\/strong>.<\/p>\n<p>The system leverages <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.manageengine.com\/products\/self-service-password\/kb\/how-passwordless-authentication-works.html\">multi-factor authentication<\/a> for maximum protection against unauthorized access.<\/p>\n<p>I&#039;ll help you understand how we keep everything running smoothly, just like how you maintain your bicycle to prevent flat tires! Regular checks and updates are super important to catch any problems early.<\/p>\n<p>Here are the key things I monitor to keep your system safe:<\/p>\n<ul>\n<li>System health checks &#8211; like giving your computer a daily checkup<\/li>\n<li>Security alerts &#8211; watching for bad guys trying to break in<\/li>\n<li>Performance tracking &#8211; making sure everything&#039;s running fast and smooth<\/li>\n<\/ul>\n<p>I use special tools in Azure AD to watch over everything, kind of like a security camera at a store.<\/p>\n<p>When something doesn&#039;t look right, I can fix it quickly before it becomes a big problem!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_It_Typically_Take_to_Fully_Implement_Passwordless_Authentication\"><\/span>How Long Does It Typically Take to Fully Implement Passwordless Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you straight up &#8211; switching to <strong>passwordless login<\/strong> usually takes about 12-18 months from start to finish.<\/p>\n<p>It&#039;s like building a big sandcastle &#8211; you&#039;ve got to plan it out, get all your tools ready, and build it step by step!<\/p>\n<p>First, there&#039;s <strong>planning and testing<\/strong> (3-6 months), then <strong>rolling it out<\/strong> slowly (6-12 months), and finally making sure everything&#039;s working smoothly.<\/p>\n<p>Think of it like learning to ride a bike &#8211; it takes time to get it just right!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_a_User_Loses_Their_Authentication_Device\"><\/span>What Happens if a User Loses Their Authentication Device?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Don&#039;t worry if you lose your <strong>authentication device<\/strong>! I&#039;ve got your back.<\/p>\n<p>First, tell your IT team right away &#8211; they&#039;ll block the lost device so no one else can use it. They&#039;ll give you a <strong>temporary password<\/strong> or another way to log in while you get a new device.<\/p>\n<p>Think of it like having a spare key when you lose your house key! Just remember to keep your <strong>backup options<\/strong> safe too.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Passwordless_Authentication_Work_Offline_Without_Internet_Connectivity\"><\/span>Can Passwordless Authentication Work Offline Without Internet Connectivity?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that <strong>passwordless authentication<\/strong> works <strong>offline<\/strong> &#8211; it&#039;s like having a special key saved on your device!<\/p>\n<p>Think of it like your favorite game that you can play even when the internet&#039;s down.<\/p>\n<p>But here&#039;s the catch &#8211; you&#039;ll need to connect to the internet first to set things up, just like downloading a game before playing offline.<\/p>\n<p>After that <strong>initial setup<\/strong>, you&#039;re good to go!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Are_the_Cost_Implications_Compared_to_Traditional_Password-Based_Systems\"><\/span>What Are the Cost Implications Compared to Traditional Password-Based Systems?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you why <strong>getting rid of passwords<\/strong> can save lots of money!<\/p>\n<p>Think about it &#8211; when people forget their passwords, it costs about $30-70 each time to fix it. That&#039;s like buying 10 pizzas just to reset one password!<\/p>\n<p>Big companies can <strong>save millions<\/strong> by switching to passwordless systems. <strong>Microsoft saved 87%<\/strong> of their costs &#8211; that&#039;s huge!<\/p>\n<p>Plus, workers don&#039;t waste time resetting forgotten passwords anymore.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_Passwordless_Authentication_Handle_Shared_Workstations_or_Devices\"><\/span>How Does Passwordless Authentication Handle Shared Workstations or Devices?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you how shared devices handle <strong>passwordless logins<\/strong> &#8211; it&#039;s pretty cool!<\/p>\n<p>Instead of typing passwords, users can tap their <strong>security key<\/strong> or use their phone to sign in. When you&#039;re done, you just <strong>log out<\/strong>, and the next person can do the same with their own key.<\/p>\n<p>It&#039;s like passing a magic wand that only works for you! Companies can track who&#039;s using what device and when.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we move towards a <strong>passwordless future<\/strong>, it&#039;s crucial to understand the broader implications of <strong>password security and management<\/strong>. While adopting <strong>modern authentication methods<\/strong> can significantly enhance safety, ensuring proper <strong>password and passkey management<\/strong> remains vital. Managing your credentials effectively not only protects your accounts but also streamlines access across your digital landscape. To take your security to the next level, consider exploring innovative solutions that simplify this process. I encourage you to check out <strong>LogMeOnce<\/strong>, where you can sign up for a free account and experience enhanced password management features. With tools designed to keep your information secure while reducing the hassle of remembering multiple passwords, LogMeOnce can be a game-changer in your journey toward a secure, passwordless environment. Don&#039;t wait&#x2014;start your journey to <strong>better security<\/strong> today at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Join IT leaders discovering how passwordless authentication revolutionizes Active Directory security while slashing help desk costs.<\/p>\n","protected":false},"author":5,"featured_media":241923,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1299,1501,12803],"class_list":["post-241924","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-active-directory","tag-it-security","tag-passwordless-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/241924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=241924"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/241924\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/241923"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=241924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=241924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=241924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}