{"id":245306,"date":"2025-02-09T19:41:48","date_gmt":"2025-02-09T19:41:48","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/"},"modified":"2025-02-09T19:41:48","modified_gmt":"2025-02-09T19:41:48","slug":"third-party-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/","title":{"rendered":"What Is Third Party Multi-Factor Authentication and How Does It Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of <strong>cybersecurity<\/strong>, <strong>leaked passwords<\/strong> are a pressing concern, as they can expose countless accounts and sensitive information. Recent leaks have surfaced on various <strong>dark web forums<\/strong> and hacker marketplaces, revealing usernames and passwords from major platforms. The significance of these breaches lies not only in the sheer volume of compromised data but also in the potential for <strong>identity theft<\/strong> and financial loss for users. For individuals, understanding the implications of leaked passwords is crucial, as it underscores the importance of robust security measures, such as <strong>multi-factor authentication<\/strong>, to safeguard their online presence against malicious actors.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Understanding_Third-Party_Multi-Factor_Authentication\" >Understanding Third-Party Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Key_Components_of_MFA_Systems\" >Key Components of MFA Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Common_Authentication_Methods_and_Tools\" >Common Authentication Methods and Tools<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Benefits_and_Security_Advantages\" >Benefits and Security Advantages<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Implementation_Challenges_and_Best_Practices\" >Implementation Challenges and Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#What_Happens_if_I_Lose_My_Authentication_Device_or_Phone\" >What Happens if I Lose My Authentication Device or Phone?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Can_Third-Party_MFA_Work_Without_an_Internet_Connection\" >Can Third-Party MFA Work Without an Internet Connection?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#How_Quickly_Can_MFA_Be_Disabled_in_Case_of_Emergency\" >How Quickly Can MFA Be Disabled in Case of Emergency?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Are_There_Backup_Options_if_Biometric_Authentication_Fails_Repeatedly\" >Are There Backup Options if Biometric Authentication Fails Repeatedly?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#Which_MFA_Method_Is_Most_Secure_for_International_Business_Travel\" >Which MFA Method Is Most Secure for International Business Travel?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/third-party-multi-factor-authentication\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Third-party MFA adds extra security layers by requiring multiple verification methods like passwords, codes, and biometric data.<\/li>\n<li>Authentication apps generate unique, time-sensitive codes every minute that users must enter alongside their password.<\/li>\n<li>MFA combines three factors: something you know (password), something you have (device), and something you are (biometrics).<\/li>\n<li>Users receive verification codes through different channels, such as text messages or authentication apps, for enhanced security.<\/li>\n<li>Third-party MFA blocks nearly all unauthorized access attempts and helps organizations comply with security regulations.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Third-Party_Multi-Factor_Authentication\"><\/span>Understanding Third-Party Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Think of <strong>third-party multi-factor authentication<\/strong> like having a <strong>super-special secret club<\/strong> with multiple secret handshakes! You know how you need a password to play your favorite video games? Well, I&#039;m here to tell you about something even cooler!<\/p>\n<p>When you use third-party MFA, it&#039;s like having different trusted friends helping to keep your stuff safe. There are fun apps that make special codes (like <strong>magic numbers<\/strong> that change every minute!), text messages with secret passwords, and even fancy gadgets that scan your fingerprint &#8211; just like a spy! This <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/how-mfa-works\/\">combination of factors<\/a> makes it much harder for attackers to gain unauthorized access!<\/p>\n<p>Have you ever used your mom&#039;s phone to access something with your face? That&#039;s <strong>biometric authentication<\/strong> &#8211; a fancy way of saying &#034;your body is the key!&#034; This helps protect against <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/identity-protection\/multifactor-authentication-mfa\/\">identity-driven attacks<\/a> that bad guys might try to use.<\/p>\n<p>Some services even <strong>live in the cloud<\/strong> (not the fluffy ones in the sky, silly!).<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Components_of_MFA_Systems\"><\/span>Key Components of MFA Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s plunge into the super-special world of <strong>MFA components<\/strong> &#8211; they&#039;re like the building blocks of a giant security fortress!<\/p>\n<p>Think of MFA as your <strong>secret clubhouse<\/strong> with three special keys to get in. First, there&#039;s &#034;something you know&#034; &#8211; like your super-secret password or PIN (just like your secret handshake!). This first component is crucial because it establishes a baseline level of security.<\/p>\n<p>Then there&#039;s &#034;something you have&#034; &#8211; maybe it&#039;s your phone that gets special codes, or a cool little device that makes magic numbers appear.<\/p>\n<p>When you log in, it&#039;s like going through your own special obstacle course! You start by typing your password, then you might get a <strong>special code<\/strong> on your phone. The system can also use <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.kaseya.com\/blog\/multifactor-authentication-mfa\/\">biometric traits<\/a> like fingerprints or face scans to verify your identity, which is an example of <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-two-factor-authentication\/\">MFA methods<\/a> that enhance security.<\/p>\n<p>Only when you complete all the steps &#8211; whoosh! &#8211; you&#039;re in! Pretty neat, right? It&#039;s like having a <strong>triple-locked treasure chest<\/strong> to keep all your precious stuff safe!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_Authentication_Methods_and_Tools\"><\/span>Common Authentication Methods and Tools<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize about our MFA fortress, I want to show you all the cool ways we can access it! Just like you might need a secret handshake to enter your treehouse club, there are different ways to prove you&#039;re really you when logging into your accounts.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Method<\/th>\n<th style=\"text-align: center\">What It Is<\/th>\n<th style=\"text-align: center\">How It Works<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Passwords<\/td>\n<td style=\"text-align: center\">Secret Code<\/td>\n<td style=\"text-align: center\">Like hiding your diary&#039;s key<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Biometrics<\/td>\n<td style=\"text-align: center\">Body Features<\/td>\n<td style=\"text-align: center\">Using your fingerprint, just like a superhero!<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Tokens<\/td>\n<td style=\"text-align: center\">Special Gadgets<\/td>\n<td style=\"text-align: center\">A magic key fob that makes special codes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Passwordless<\/td>\n<td style=\"text-align: center\">Smart Tech<\/td>\n<td style=\"text-align: center\">No passwords needed &#8211; just tap and go!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Have you ever used your fingerprint to gain access to a phone? That&#039;s biometric authentication! Or maybe you&#039;ve seen Mom or Dad use a special USB key &#8211; that&#039;s a token! These tools work together like superhero teammates to keep your digital fortress super safe. <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.swissbit.com\/en\/blog\/post\/authentication-101-a-comparison-of-five-well-known-authentication-methods\/\">Out-of-band authentication<\/a> adds extra security by sending codes through different channels like text messages. Additionally, using <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-passwords\/\">multi-factor authentication<\/a> can significantly reduce risks of data breaches and unauthorized access.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_and_Security_Advantages\"><\/span>Benefits and Security Advantages<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When your favorite toy chest has multiple locks, it&#039;s super hard for sneaky siblings to peek inside! That&#039;s exactly how <strong>multi-factor authentication<\/strong> protects your stuff online. It&#039;s like having three different types of locks on your <strong>digital treasure chest<\/strong>.<\/p>\n<p>I love how MFA stops bad guys in their tracks &#8211; it blocks nearly all their attempts to break in! Think of it as your <strong>personal security guard<\/strong> who checks multiple things: <strong>something you know<\/strong> (like a password), something you have (like your phone), and something special about you (like your fingerprint). Even if someone manages to guess your password, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.procyon.ai\/glossary\/pros-and-cons-of-multi-factor-authentication-2fa-explained\/\">push notifications options<\/a> make it easy and safe to confirm it&#039;s really you trying to log in.<\/p>\n<p>Plus, it helps grown-ups follow <strong>important rules<\/strong> to keep everyone&#039;s information safe. Just like how we follow playground rules, companies need to follow special internet safety rules too!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementation_Challenges_and_Best_Practices\"><\/span>Implementation Challenges and Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up <strong>MFA<\/strong> can be trickier than stacking a tower of blocks!<\/p>\n<p>Sometimes it&#039;s like trying to make your favorite puzzle pieces fit together when they don&#039;t want to. Have you ever tried teaching your grandparents how to use a new phone app? That&#039;s how <strong>tricky<\/strong> MFA can be for some people!<\/p>\n<p>I&#039;ll let you in on a secret &#8211; the best way to make MFA work is to <strong>keep it simple<\/strong> and fun.<\/p>\n<p>It&#039;s like following a recipe: start small, test each step, and make sure everyone understands what to do. Just like you wouldn&#039;t jump into the deep end of a pool without learning to swim, we need to help people learn MFA <strong>step by step<\/strong>.<\/p>\n<p>While some users may resist the change, studies show that MFA can prevent <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.oloid.ai\/blog\/multi-factor-authentication-benefits-and-challenges\/\">up to 99%<\/a> of account takeovers.<\/p>\n<p>Remember to always have a <strong>backup plan<\/strong> too &#8211; just like keeping a spare key to your treasure chest!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_I_Lose_My_Authentication_Device_or_Phone\"><\/span>What Happens if I Lose My Authentication Device or Phone?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you lose your <strong>authentication device<\/strong>, don&#039;t worry! You&#039;ve got options.<\/p>\n<p>First, try using another trusted device you&#039;ve already set up &#8211; like your iPad or laptop.<\/p>\n<p>If you don&#039;t have <strong>backup devices<\/strong>, contact your account&#039;s support team. They can help verify your identity and restore access.<\/p>\n<p>Remember to keep backup devices ready and save <strong>recovery codes<\/strong> in a safe place to avoid future headaches!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Third-Party_MFA_Work_Without_an_Internet_Connection\"><\/span>Can Third-Party MFA Work Without an Internet Connection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help explain <strong>offline MFA<\/strong>!<\/p>\n<p>Think of it like having a <strong>special key<\/strong> that works even without the internet. Just like you can still open your lunchbox without asking permission, offline MFA lets you log in securely when you&#039;re not connected.<\/p>\n<p>You&#039;ll need to set it up first when you&#039;re online, but then it works like magic! Common options include special security keys or <strong>one-time codes<\/strong> that work offline.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Quickly_Can_MFA_Be_Disabled_in_Case_of_Emergency\"><\/span>How Quickly Can MFA Be Disabled in Case of Emergency?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I can tell you that <strong>MFA<\/strong> can be disabled pretty quickly in emergencies &#8211; usually within minutes!<\/p>\n<p>It depends on your setup. If you&#039;re using <strong>Conditional Access policies<\/strong>, I can flip a switch almost instantly.<\/p>\n<p>For <strong>break-glass accounts<\/strong> (that&#039;s like a special emergency key), it&#039;s super fast too.<\/p>\n<p>But here&#039;s the important part &#8211; you need to plan ahead and test your emergency procedures regularly.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_There_Backup_Options_if_Biometric_Authentication_Fails_Repeatedly\"><\/span>Are There Backup Options if Biometric Authentication Fails Repeatedly?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ve got lots of <strong>backup plans<\/strong> if your fingerprint or face scan isn&#039;t working.<\/p>\n<p>You can use a <strong>special code<\/strong> sent to your phone, kind of like getting a secret message from a friend.<\/p>\n<p>Or try answering security questions about your favorite things.<\/p>\n<p>There&#039;s also a neat little device called a <strong>hardware token<\/strong> that makes special codes just for you &#8211; it&#039;s like having a tiny password factory in your pocket!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Which_MFA_Method_Is_Most_Secure_for_International_Business_Travel\"><\/span>Which MFA Method Is Most Secure for International Business Travel?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;d recommend <strong>hardware-based MFA<\/strong> like security keys for international business travel.<\/p>\n<p>They&#039;re <strong>super strong<\/strong> &#8211; like having a tiny fortress in your pocket! You don&#039;t need phone service to use them, and they&#039;re really tough for bad guys to hack.<\/p>\n<p>I love that they work even if my phone dies or I can&#039;t get a signal. Plus, they protect against sneaky tricks like phishing!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we delve into the importance of third-party multi-factor authentication (MFA), it&#039;s crucial to recognize that <strong>password security<\/strong> plays a vital role in protecting our online identities. With the increasing number of <strong>cyber threats<\/strong>, relying solely on passwords is no longer sufficient. This is where effective <strong>password management<\/strong> and innovative passkey solutions come into play. By adopting a comprehensive approach to security that includes MFA and robust password management, you can significantly enhance your <strong>online safety<\/strong>.<\/p>\n<p>Ready to take your security to the next level? Don&#039;t wait until it&#039;s too late! Explore how you can streamline your password management and protect your accounts with ease. Sign up for a free account today at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and experience the peace of mind that comes with knowing your digital life is secure. Your future self will thank you for taking this important step toward better <strong>online security<\/strong>!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Third-party authentication adds three layers of security to protect your accounts, but setting it up requires understanding these crucial steps.<\/p>\n","protected":false},"author":5,"featured_media":245305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1010,35827,36564],"class_list":["post-245306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-account-security","tag-multi-factor-authentication-2","tag-third-party-services-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245306"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245306\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245305"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}