{"id":242503,"date":"2025-01-25T17:14:18","date_gmt":"2025-01-25T17:14:18","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/"},"modified":"2025-01-25T17:14:18","modified_gmt":"2025-01-25T17:14:18","slug":"conditional-access-policies-in-office-365","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/","title":{"rendered":"What Are Conditional Access Policies in Office 365?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Conditional access policies in Office 365 function as <strong>advanced security checks<\/strong> for your <strong>sensitive work data<\/strong>! These policies assess three critical factors before granting access: your identity, the location from which you&#039;re logging in, and the device you&#039;re using. Much like a secret password for an exclusive club, these policies ensure that only <strong>authorized individuals<\/strong> can enter and use work applications and files. It&#039;s akin to a game of &#034;red light, green light&#034; with your <strong>online access<\/strong>&#x2014;only when everything aligns perfectly do you receive the green light to proceed! Let&#039;s explore how these digital sentinels protect your professional environment.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Understanding_Conditional_Access_Policies_and_Their_Purpose\" >Understanding Conditional Access Policies and Their Purpose<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Key_Components_of_Conditional_Access_Implementation\" >Key Components of Conditional Access Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Setting_Up_and_Managing_Access_Controls\" >Setting Up and Managing Access Controls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Essential_Benefits_for_Business_Security\" >Essential Benefits for Business Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Best_Practices_and_Strategic_Considerations\" >Best Practices and Strategic Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#How_Long_Does_It_Take_to_Implement_Conditional_Access_Policies_Across_an_Organization\" >How Long Does It Take to Implement Conditional Access Policies Across an Organization?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Can_Conditional_Access_Policies_Be_Temporarily_Disabled_for_Maintenance_or_Emergencies\" >Can Conditional Access Policies Be Temporarily Disabled for Maintenance or Emergencies?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#What_Happens_if_Users_Change_Their_Device_After_Policies_Are_Implemented\" >What Happens if Users Change Their Device After Policies Are Implemented?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Do_Conditional_Access_Policies_Affect_Performance_or_Loading_Times_of_Applications\" >Do Conditional Access Policies Affect Performance or Loading Times of Applications?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#Can_Different_Departments_Have_Their_Own_Unique_Conditional_Access_Policy_Administrators\" >Can Different Departments Have Their Own Unique Conditional Access Policy Administrators?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/conditional-access-policies-in-office-365\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Conditional access policies are security controls that manage who can access Office 365 applications based on identity, location, and device status.<\/li>\n<li>They function as digital gatekeepers using if-then statements to automatically grant or deny access to Office 365 resources.<\/li>\n<li>Organizations can require multi-factor authentication, compliant devices, or specific network locations before allowing access to Office 365 services.<\/li>\n<li>Policies protect sensitive data by evaluating real-time risk factors and enforcing security rules during each access attempt.<\/li>\n<li>Implementation requires Microsoft Entra ID P1 licensing and enables customizable security rules for different users and applications.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Conditional_Access_Policies_and_Their_Purpose\"><\/span>Understanding Conditional Access Policies and Their Purpose<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/conditional_access_policy_overview.jpg\" alt=\"conditional access policy overview\" title=\"\"><\/div>\n<p>Imagine having a <strong>special door guard<\/strong> who knows exactly who should come into your clubhouse! That&#039;s what <strong>conditional access policies<\/strong> are like in Office 365 &#8211; they&#039;re like super-smart security guards for your computer stuff.<\/p>\n<p>You know how your mom checks if you&#039;ve washed your hands before dinner? That&#039;s similar to how these policies work! They look at different things, like who you are, where you&#039;re trying to log in from, and what device you&#039;re using. Cool, right?<\/p>\n<p>The main job of these policies is keeping your <strong>important computer files<\/strong> safe while letting you do your work. Modern security needs <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/oxfordcomputertraining.com\/glossary\/conditional-access\/\">Zero Trust security<\/a> to protect organizations effectively.<\/p>\n<p>Think of it like having a <strong>secret password<\/strong> to enter your treehouse, but even better! It <strong>checks multiple things<\/strong> to make sure you&#039;re really you before letting you in.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Components_of_Conditional_Access_Implementation\"><\/span>Key Components of Conditional Access Implementation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize what these <strong>special security guards<\/strong> do, let&#039;s check out the <strong>cool tools<\/strong> they use! Think of it like building the perfect clubhouse &#8211; you need all the right pieces to keep it safe.<\/p>\n<p>First, we choose who gets to come in, just like picking teams for kickball.<\/p>\n<p>Then, we <strong>pick which apps<\/strong> they can use &#8211; maybe email or fun work games.<\/p>\n<p>Next, we set up <strong>special rules<\/strong>, like &#034;only phones allowed&#034; or &#034;must be in the school building.&#034; This ensures that <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-mfa\/\">only compliant devices<\/a> are allowed access to sensitive data.<\/p>\n<p>Finally, we decide what happens when someone tries to enter. It&#039;s like having a <strong>secret password<\/strong> &#8211; if you know it, you&#039;re in! If not, sorry friend, try again!<\/p>\n<p>Have you ever played &#034;red light, green light&#034;? That&#039;s exactly how it works &#8211; we give a green light to the good stuff and a red light to anything suspicious. These policies work like <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/office365concepts.com\/mastering-conditional-access-policies\/\">if-then statements<\/a> to make quick decisions about who gets access.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_and_Managing_Access_Controls\"><\/span>Setting Up and Managing Access Controls<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/access_control_management_setup.jpg\" alt=\"access control management setup\" title=\"\"><\/div>\n<p>Three simple steps will get your <strong>Office 365 security system<\/strong> up and running! Think of it like building the world&#039;s coolest fortress to keep your digital treasures safe.<\/p>\n<p>First, I&#039;ll help you <strong>create a policy<\/strong> &#8211; it&#039;s like making rules for a super-fun game, but for keeping your computer safe instead! You&#039;ll pick which people can play (that&#039;s your users) and what apps they can use. Implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-single-sign-on\/\">MFA SSO<\/a> in your policy can further enhance security by requiring multiple authentication factors.<\/p>\n<p>Next, we&#039;ll <strong>set up special controls<\/strong> &#8211; just like having a <strong>secret password<\/strong> to enter your tree house. You&#039;ll choose things like requiring a special code on phones or making sure computers have their safety gear on. You&#039;ll need <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.manageengine.com\/mobile-device-management\/help\/profile_management\/mdm_o365_conditional_access.html\">Microsoft Entra ID P1<\/a> to enable these advanced security features.<\/p>\n<p>Finally, I&#039;ll show you how to <strong>test everything<\/strong>, just like trying out a new bike before riding it around the neighborhood. By regularly monitoring account activity, you can ensure that your security measures are effective and up to date.<\/p>\n<p>Want to give it a try?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Essential_Benefits_for_Business_Security\"><\/span>Essential Benefits for Business Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>After setting up those awesome security controls, let&#039;s see what cool things they can do for your business! Think of Conditional Access Policies like having a super-smart security guard who knows exactly who should enter your treehouse club. They keep the bad guys out while letting your friends play safely! With <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/infrasos.com\/using-conditional-access-policies-to-enhance-office-365-security\/\">Azure AD Premium<\/a> licenses, organizations can implement these powerful security features. Implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/bypass-mfa\/\">multi-factor authentication<\/a> is one of the key benefits of these policies, as it significantly enhances access security.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Benefit<\/th>\n<th style=\"text-align: center\">What It Does<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Safety Shield<\/td>\n<td style=\"text-align: center\">Stops sneaky people from getting in<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Rule Master<\/td>\n<td style=\"text-align: center\">Makes sure everyone follows the rules<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Smart Detective<\/td>\n<td style=\"text-align: center\">Spots danger before it happens<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Happy Helper<\/td>\n<td style=\"text-align: center\">Makes it easy for good guys to work<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>I&#039;ve seen businesses become so much safer with these policies &#8211; just like how a combination lock protects your favorite toys! Plus, it&#039;s like having a magical doorway that only opens for the right people. Isn&#039;t that amazing?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_and_Strategic_Considerations\"><\/span>Best Practices and Strategic Considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"body-image-wrapper\" style=\"margin-bottom:20px\"><img decoding=\"async\" height=\"100%\" src=\"https:\/\/logmeonce.com\/resources\/wp-content\/uploads\/2025\/01\/effective_strategies_and_guidelines.jpg\" alt=\"effective strategies and guidelines\" title=\"\"><\/div>\n<p>When you&#039;re setting up your <strong>Conditional Access rules<\/strong>, it&#039;s kind of like building the perfect pillow fort! You want to make sure only your <strong>special friends<\/strong> can get in, and they need to know the <strong>secret password<\/strong>.<\/p>\n<p>I&#039;ll help you create super-strong rules that keep the <strong>bad guys<\/strong> out while letting your team work smoothly.<\/p>\n<p>Here are some cool tricks to make your rules work like magic:<\/p>\n<ul>\n<li>Mix and match different rules &#8211; just like picking toppings for your pizza<\/li>\n<li>Check if people are using safe devices, like making sure they wash their hands before dinner<\/li>\n<li>Only let people in from places you trust, like having a VIP list for your birthday party<\/li>\n<li>Keep things simple &#8211; remember, too many rules can be confusing, like having too many flavors of ice cream<\/li>\n<\/ul>\n<p>Think of these rules as your digital superhero shield, protecting your important stuff!<\/p>\n<p>Adding <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/blog.quest.com\/4-conditional-access-best-practices\/\">custom attributes<\/a> to your applications helps you organize them into neat groups based on how important they are to your business.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_It_Take_to_Implement_Conditional_Access_Policies_Across_an_Organization\"><\/span>How Long Does It Take to Implement Conditional Access Policies Across an Organization?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;d say it typically takes 4-8 weeks to fully roll out <strong>conditional access policies<\/strong>.<\/p>\n<p>Think of it like building a big sandcastle &#8211; you can&#039;t do it all at once!<\/p>\n<p>First, I&#039;ll spend about a week <strong>planning<\/strong>.<\/p>\n<p>Then, I&#039;ll <strong>test with a small group<\/strong> for 1-2 weeks.<\/p>\n<p>Finally, I&#039;ll gradually add more users over 2-5 weeks, making sure everything&#039;s working smoothly.<\/p>\n<p>Just like learning to ride a bike, we take it step by step!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Conditional_Access_Policies_Be_Temporarily_Disabled_for_Maintenance_or_Emergencies\"><\/span>Can Conditional Access Policies Be Temporarily Disabled for Maintenance or Emergencies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help you understand how to <strong>temporarily turn off<\/strong> these policies!<\/p>\n<p>Think of it like hitting a pause button on your favorite video game. During maintenance, you can disable them through <strong>Azure Active Directory<\/strong>&#039;s <strong>security settings<\/strong>.<\/p>\n<p>For emergencies, there&#039;s even a quick way to shut them off right away.<\/p>\n<p>Just remember to turn them back on when you&#039;re done &#8211; it&#039;s like remembering to close the refrigerator door after getting a snack!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_Users_Change_Their_Device_After_Policies_Are_Implemented\"><\/span>What Happens if Users Change Their Device After Policies Are Implemented?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When you get a <strong>new device<\/strong>, I need to make sure it&#039;s safe before you can use your work stuff.<\/p>\n<p>Think of it like getting a new backpack &#8211; you&#039;ve got to put your name tag on it first!<\/p>\n<p>You&#039;ll need to re-register your device and let me check that it follows all the <strong>safety rules<\/strong>.<\/p>\n<p>It&#039;s just like how you need a hall pass at school to show you&#039;re allowed to be there.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Do_Conditional_Access_Policies_Affect_Performance_or_Loading_Times_of_Applications\"><\/span>Do Conditional Access Policies Affect Performance or Loading Times of Applications?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I&#039;ve noticed that <strong>Conditional Access policies<\/strong> can impact app performance in a few ways.<\/p>\n<p>During <strong>full syncs<\/strong>, you might see some delays &#8211; kind of like when a game takes longer to load!<\/p>\n<p>Race conditions (that&#039;s when two things try to happen at once) can slow things down too.<\/p>\n<p>But don&#039;t worry! <strong>Recent updates<\/strong> have made things much faster, now taking less than a minute to process most changes.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Different_Departments_Have_Their_Own_Unique_Conditional_Access_Policy_Administrators\"><\/span>Can Different Departments Have Their Own Unique Conditional Access Policy Administrators?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, departments can have their own <strong>policy administrators<\/strong>!<\/p>\n<p>I manage this by assigning the <strong>Conditional Access Administrator<\/strong> role to specific people in each department.<\/p>\n<p>It&#039;s like having different hall monitors for different parts of your school.<\/p>\n<p>While I can&#039;t create custom roles, I use <strong>built-in roles<\/strong> to give each department control over their unique security rules and settings.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Conditional access policies are essential for safeguarding your Office 365 environment, but they are just one piece of the security puzzle. To further bolster your defenses, it&#039;s crucial to focus on <strong>password security and management<\/strong>. <strong>Strong passwords<\/strong> are your first line of defense against unauthorized access. However, managing multiple passwords can be overwhelming and insecure. That&#039;s where effective password and passkey management come into play.<\/p>\n<p>By utilizing a reliable <strong>password management solution<\/strong>, you can streamline your login processes while enhancing security. I encourage you to take a proactive step in securing your digital workspace by exploring <strong>password management options<\/strong>. Check out <strong>LogMeOnce<\/strong>, which offers a comprehensive solution for password security and management. Sign up for a free account today at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and take control of your passwords to ensure a safer, more productive environment for you and your team. Don&#039;t wait&#x2014;secure your access now!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Modern security gatekeepers in Office 365 control who gets access to what, based on identity, location, and device status.<\/p>\n","protected":false},"author":5,"featured_media":242502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[20550,3047,10312],"class_list":["post-242503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-conditional-access","tag-office-365","tag-security-policies"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/242503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=242503"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/242503\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/242502"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=242503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=242503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=242503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}