{"id":243237,"date":"2025-01-28T11:53:38","date_gmt":"2025-01-28T11:53:38","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/"},"modified":"2025-01-28T11:53:38","modified_gmt":"2025-01-28T11:53:38","slug":"how-does-passwordless-work","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/","title":{"rendered":"How Does Passwordless Authentication Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of <strong>cybersecurity<\/strong>, the recent leak of passwords has sent shockwaves through the online community, highlighting the <strong>vulnerabilities<\/strong> that persist even in our digital age. These leaked credentials, often found in massive <strong>data breaches<\/strong> on popular websites and forums, serve as a stark reminder of the importance of <strong>password security<\/strong> and the perpetual threat of identity theft. As users across the globe grapple with the implications of these leaks, the conversation around strengthening online security measures has intensified, making it clear that adopting more secure practices, such as <strong>passwordless authentication<\/strong>, is not just an option but a necessity for protecting personal information in an increasingly risky environment.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Understanding_the_Basics_of_Passwordless_Authentication\" >Understanding the Basics of Passwordless Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Key_Components_and_Technologies_Behind_Passwordless_Systems\" >Key Components and Technologies Behind Passwordless Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Common_Methods_and_Implementation_Approaches\" >Common Methods and Implementation Approaches<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Security_Benefits_and_Risk_Mitigation\" >Security Benefits and Risk Mitigation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Best_Practices_for_Deployment_and_User_Adoption\" >Best Practices for Deployment and User Adoption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#What_Happens_if_My_Authentication_Device_Breaks_or_Gets_Stolen\" >What Happens if My Authentication Device Breaks or Gets Stolen?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Can_Passwordless_Authentication_Work_Without_an_Internet_Connection\" >Can Passwordless Authentication Work Without an Internet Connection?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#How_Much_Does_It_Cost_to_Implement_Passwordless_Authentication\" >How Much Does It Cost to Implement Passwordless Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#Are_Passwordless_Systems_Compatible_With_Legacy_Applications_and_Older_Devices\" >Are Passwordless Systems Compatible With Legacy Applications and Older Devices?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#What_Backup_Authentication_Methods_Exist_if_Biometric_Sensors_Fail\" >What Backup Authentication Methods Exist if Biometric Sensors Fail?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/how-does-passwordless-work\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Passwordless authentication replaces traditional passwords with unique identifiers like fingerprints, face recognition, or hardware tokens for secure access.<\/li>\n<li>Users verify their identity through biometric data, special codes sent via text\/email, or push notifications to their devices.<\/li>\n<li>The system uses cryptographic keys to verify user identity, eliminating the need to store passwords on servers.<\/li>\n<li>Authentication requests are processed through secure protocols like FIDO2, which facilitate communication between devices and security systems.<\/li>\n<li>Multi-factor authentication combines multiple verification methods, such as biometrics and security keys, for enhanced security.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_Basics_of_Passwordless_Authentication\"><\/span>Understanding the Basics of Passwordless Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Imagine having a magical key that lets you into your favorite video game without typing any passwords! That&#039;s exactly what <strong>passwordless authentication<\/strong> is &#8211; it&#039;s like having a super-special way to prove it&#039;s really you.<\/p>\n<p>Instead of remembering tricky passwords, you can use things that are uniquely yours, like your <strong>fingerprint<\/strong> or your <strong>face<\/strong>. It&#039;s just like how your mom knows it&#039;s you by looking at you!<\/p>\n<p>Have you ever used your thumbprint to access a phone? That&#039;s passwordless authentication in action!<\/p>\n<p>The cool part is that it&#039;s <strong>super safe<\/strong>. When you try to log in, your device uses special computer magic (we call it <strong>cryptography<\/strong>) to prove you&#039;re really you.<\/p>\n<p>It&#039;s like having a secret handshake that only works with your special features! Since it&#039;s so secure and easy to use, companies can save up to <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.strongdm.com\/blog\/passwordless-authentication\">1.9 million dollars<\/a> by switching to passwordless login systems.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Components_and_Technologies_Behind_Passwordless_Systems\"><\/span>Key Components and Technologies Behind Passwordless Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s explore the super-cool gadgets and tools that make passwordless login work &#8211; it&#039;s like having a high-tech treasure chest!<\/p>\n<p>I&#039;ll show you all the amazing tech that keeps your accounts safe without needing to remember tricky passwords. It&#039;s just like having a magic key that only works for you! <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-passwords\/\">MFA enhances security<\/a> by ensuring legitimate user access and significantly reducing risks of data breaches and unauthorized access.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Cool Tech<\/th>\n<th style=\"text-align: center\">What It Does<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Biometrics<\/td>\n<td style=\"text-align: center\">Uses your fingerprint or face (like your phone&#039;s camera!)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Hardware Tokens<\/td>\n<td style=\"text-align: center\">Special tiny devices that make secret codes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Mobile Apps<\/td>\n<td style=\"text-align: center\">Apps on your phone that send special messages<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">FIDO2<\/td>\n<td style=\"text-align: center\">Makes your computer talk to security devices<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Decentralized ID<\/td>\n<td style=\"text-align: center\">Keeps your info safe using special computer networks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Have you ever used your fingerprint to gain access to your tablet? That&#039;s passwordless authentication in action! Pretty neat, right?<\/p>\n<p>These modern security methods are helping organizations achieve <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/identity-protection\/passwordless-authentication\/\">strong authentication hygiene<\/a> while making access easier than ever before.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_Methods_and_Implementation_Approaches\"><\/span>Common Methods and Implementation Approaches<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Logging into your accounts can be super easy &#8211; just like using your very own superpower! Have you ever accessed your parent&#039;s phone with your fingerprint? That&#039;s called <strong>biometric authentication<\/strong>, and it&#039;s like having a magical key that only works for you!<\/p>\n<p>There are lots of cool ways to log in without typing passwords. Sometimes you get a <strong>special code<\/strong> in a text message, like a secret mission code! FIDO authentication lets you use <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/blog.bio-key.com\/biometrics-fido-and-more-a-guide-to-passwordless-authentication-methods\">public-key cryptography<\/a> to keep your accounts extra safe. This process is enhanced by <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/biometric-mfa\/\">biometric MFA<\/a>, which adds an extra layer of security through unique biological identifiers.<\/p>\n<p>Other times, you might click a <strong>magic link<\/strong> in your email &#8211; poof, you&#039;re in! My favorite is using <strong>push notifications<\/strong> &#8211; it&#039;s like getting a friendly knock on your door asking &#034;Hey, is this really you?&#034;<\/p>\n<p>You can even use <strong>tiny security keys<\/strong> that look like toys but are super strong protectors of your accounts!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Benefits_and_Risk_Mitigation\"><\/span>Security Benefits and Risk Mitigation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>All those fun ways to log in without passwords aren&#039;t just cool &#8211; they&#039;re like having a <strong>superhero shield<\/strong> for your accounts!<\/p>\n<p>Think about it: when you use your fingerprint or face to access something, bad guys can&#039;t steal your password because there isn&#039;t one to steal! It&#039;s like having an <strong>invisible force field<\/strong>. <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">Multi-Factor Authentication (MFA)<\/a> provides an additional layer of security that makes unauthorized access extremely challenging.<\/p>\n<p>You know how sometimes you forget the secret code to your treehouse? Well, with <strong>passwordless login<\/strong>, you don&#039;t have to remember anything tricky. Using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/jumpcloud.com\/blog\/benefits-challenges-passwordless-authentication\">flexible authentication options<\/a> like push notifications or biometrics makes accessing your accounts much easier.<\/p>\n<p>Plus, it stops <strong>sneaky tricks<\/strong> like phishing (that&#039;s when bad guys try to trick you into giving them your password). It&#039;s <strong>super safe<\/strong> because your device knows it&#039;s really you &#8211; just like how your best friend knows your voice even with your eyes closed! MFA protects against common cyber attack vectors, including phishing, enhancing the overall security of your accounts.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Deployment_and_User_Adoption\"><\/span>Best Practices for Deployment and User Adoption<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Getting <strong>passwordless login<\/strong> to work smoothly is like setting up a new game at recess &#8211; you need a good plan!<\/p>\n<p>First, I&#039;ll check what <strong>security tools<\/strong> you already have, just like counting your marbles before starting a game. Then, I&#039;ll pick the best spots to use passwordless login, like choosing the perfect playground spot.<\/p>\n<p>Want to know my secret for helping everyone learn this new system? I start small!<\/p>\n<p>Just like when you learned to ride a bike with training wheels, we&#039;ll begin with a <strong>small group of users<\/strong> first. I also make sure to give everyone lots of choices &#8211; some people might prefer using their <strong>fingerprint<\/strong>, while others like <strong>facial recognition<\/strong> better. Regular <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.oloid.ai\/blog\/a-step-by-step-guide-to-implementing-passwordless-authentication-in-your-organization\/\">monitoring and feedback<\/a> helps us improve the system as we go along.<\/p>\n<p>What would you choose?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_My_Authentication_Device_Breaks_or_Gets_Stolen\"><\/span>What Happens if My Authentication Device Breaks or Gets Stolen?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Don&#039;t worry! If your device breaks, I&#039;ve got <strong>backup plans<\/strong> ready, just like keeping a spare house key with a trusted neighbor.<\/p>\n<p>I&#039;ll help you get a new device quickly and use temporary backup methods to log in. If it&#039;s stolen, I&#039;ll immediately turn off that device&#039;s access &#8211; like changing the locks on your door!<\/p>\n<p>You&#039;ll <strong>stay safe<\/strong> while we set up your new device.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Passwordless_Authentication_Work_Without_an_Internet_Connection\"><\/span>Can Passwordless Authentication Work Without an Internet Connection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can still use <strong>passwordless login<\/strong> even when my internet is down!<\/p>\n<p>It&#039;s like having a special backup plan. My device stores <strong>secure information locally<\/strong> &#8211; think of it as a secret code box right on my computer.<\/p>\n<p>I can use things like my fingerprint, a PIN, or a special offline code to get in. It&#039;s super handy when I&#039;m traveling or if my wifi isn&#039;t working!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Does_It_Cost_to_Implement_Passwordless_Authentication\"><\/span>How Much Does It Cost to Implement Passwordless Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you straight up &#8211; implementing <strong>passwordless authentication<\/strong> isn&#039;t cheap at first!<\/p>\n<p>You&#039;ll need to spend big money on special hardware, software, and IT experts.<\/p>\n<p>But here&#039;s the cool part: it <strong>saves tons of money<\/strong> later! Companies like Microsoft saved 87% on costs after switching.<\/p>\n<p>Think of it like buying a bike &#8211; <strong>expensive at first<\/strong>, but saves you bus money forever!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Passwordless_Systems_Compatible_With_Legacy_Applications_and_Older_Devices\"><\/span>Are Passwordless Systems Compatible With Legacy Applications and Older Devices?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ve got good news and tricky news about using <strong>passwordless systems<\/strong> with older stuff!<\/p>\n<p>While they can work with <strong>legacy applications<\/strong>, it&#039;s not always simple.<\/p>\n<p>Think of it like trying to plug your new phone charger into an old outlet &#8211; sometimes you need a special adapter!<\/p>\n<p>We can use cool tools like <strong>reverse proxy servers<\/strong> (they&#039;re like digital translators) and special bridges to make old and new systems play nice together.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Backup_Authentication_Methods_Exist_if_Biometric_Sensors_Fail\"><\/span>What Backup Authentication Methods Exist if Biometric Sensors Fail?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ve got some cool backup plans when those fancy <strong>biometric scanners<\/strong> don&#039;t work!<\/p>\n<p>If your fingerprint reader&#039;s acting up, you can use your face instead &#8211; just like taking a selfie!<\/p>\n<p>Can&#039;t get facial recognition to work? No worries! You can try speaking into your phone or scanning your eye.<\/p>\n<p>There&#039;s even a special code that gets sent to your phone as a <strong>backup plan<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we embrace the benefits of <strong>passwordless authentication<\/strong>, it&#039;s essential to consider the broader landscape of <strong>password security<\/strong> and management. While passwordless solutions significantly enhance security, effective <strong>password management<\/strong> remains crucial in safeguarding our digital identities. By utilizing advanced <strong>passkey management strategies<\/strong>, you can further streamline your security processes and protect sensitive information.<\/p>\n<p>Now is the perfect time to take action! Transform your approach to security by signing up for a <strong>Free account<\/strong> at <a href=\"https:\/\/logmeonce.com\/\" target=\"_blank\">LogMeOnce<\/a>. Experience the ease of managing your passwords and passkeys effectively, ensuring a seamless and <strong>secure digital experience<\/strong>. Don&#039;t wait for a security breach to take action; empower yourself with the tools you need to keep your data safe. Join the movement towards a more secure future today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hoping to ditch passwords forever? Discover how modern authentication uses your unique features to keep accounts secure and hackers out.<\/p>\n","protected":false},"author":5,"featured_media":243236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[36020,12803,14687],"class_list":["post-243237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-modern-security","tag-passwordless-authentication","tag-secure-accounts"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=243237"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243237\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/243236"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=243237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=243237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=243237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}