{"id":245780,"date":"2025-02-13T19:24:21","date_gmt":"2025-02-13T19:24:21","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/"},"modified":"2025-02-13T19:24:21","modified_gmt":"2025-02-13T19:24:21","slug":"seamless-single-sign-on","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/","title":{"rendered":"What Is Seamless Single Sign-On and How Does It Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of <strong>cybersecurity<\/strong>, the <strong>leaked password phenomenon<\/strong> has emerged as a critical concern for both individuals and organizations alike. These leaks often surface on the dark web or through data breaches, exposing sensitive user credentials that can lead to <strong>unauthorized access<\/strong> and <strong>identity theft<\/strong>. The significance of such breaches lies not only in the immediate threat they pose but also in the potential for widespread damage, as compromised passwords can grant attackers access to multiple accounts, especially in an era where many users rely on the same credentials across various platforms. Understanding the implications of leaked passwords is essential for users to enhance their online security and adopt best practices like unique passwords and <strong>two-factor authentication<\/strong>.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Understanding_the_Basics_of_Seamless_SSO\" >Understanding the Basics of Seamless SSO<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#The_Technical_Architecture_Behind_Seamless_SSO\" >The Technical Architecture Behind Seamless SSO<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Key_Benefits_for_Organizations_and_Users\" >Key Benefits for Organizations and Users<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Setting_Up_Seamless_SSO_in_Your_Environment\" >Setting Up Seamless SSO in Your Environment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Best_Practices_and_Security_Considerations\" >Best Practices and Security Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#What_Happens_if_Seamless_SSO_Fails_During_an_Authentication_Attempt\" >What Happens if Seamless SSO Fails During an Authentication Attempt?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Can_Seamless_SSO_Work_With_Third-Party_Identity_Providers_Besides_Microsoft\" >Can Seamless SSO Work With Third-Party Identity Providers Besides Microsoft?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#How_Does_Seamless_SSO_Handle_Authentication_When_Users_Work_Offline\" >How Does Seamless SSO Handle Authentication When Users Work Offline?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Whats_the_Impact_on_Performance_When_Enabling_Seamless_SSO\" >What&#039;s the Impact on Performance When Enabling Seamless SSO?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#Can_Different_Authentication_Methods_Be_Used_for_Different_Groups_of_Users\" >Can Different Authentication Methods Be Used for Different Groups of Users?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/seamless-single-sign-on\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Seamless SSO enables users to access multiple applications with a single login, eliminating the need for repeated password entry.<\/li>\n<li>The system uses Kerberos tickets to automatically verify user identity when accessing work applications through Microsoft Entra ID.<\/li>\n<li>Authentication occurs behind the scenes through an &#039;AZUREADSSOACC&#039; account, which manages secure access across different applications.<\/li>\n<li>Users only need to remember one password, while the system handles authentication across various work applications automatically.<\/li>\n<li>Implementation requires domain administrator setup, Azure AD Connect integration, and proper network configuration for secure functionality.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_Basics_of_Seamless_SSO\"><\/span>Understanding the Basics of Seamless SSO<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Have you ever wished you could use all your favorite apps without typing passwords over and over? That&#039;s exactly what <strong>Seamless SSO<\/strong> does! It&#039;s like having a <strong>magical key<\/strong> that opens all your computer programs at once.<\/p>\n<p>Think of it like this: When you go to school, you only need to show your face to your teacher once in the morning. After that, she knows who you&#039;re all day long!<\/p>\n<p>Seamless SSO works the same way with your computer. You <strong>log in once<\/strong>, and then &#8211; poof! &#8211; you can use all your apps without typing passwords again and again.<\/p>\n<p>It&#039;s <strong>super helpful<\/strong> for grown-ups at work who use lots of different programs. They just sign in once, and everything works like magic! When you use a work computer, your browser gets a special ticket called a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/hybrid\/connect\/how-to-connect-sso-how-it-works\">Kerberos ticket<\/a> that helps prove who you are.<\/p>\n<p>What do you think about having <strong>one special key<\/strong> for everything?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Technical_Architecture_Behind_Seamless_SSO\"><\/span>The Technical Architecture Behind Seamless SSO<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize what Seamless SSO does for us, let&#039;s peek under the hood to see how it really works!<\/p>\n<p>Think of Seamless SSO like a magical door that knows who you are. When you try to open it, lots of cool things happen behind the scenes. Just like how you need a special key to open your front door, your computer needs something called a Kerberos ticket to let you in! The system enables <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/pragmaticworks.com\/blog\/what-is-azure-active-directory-seamless-single-sign-on\">automatic user authentication<\/a> for computers connected to your corporate network.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Step<\/th>\n<th style=\"text-align: center\">What Happens<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">1<\/td>\n<td style=\"text-align: center\">Your computer creates a special account called &#039;AZUREADSSOACC&#039;<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">2<\/td>\n<td style=\"text-align: center\">The computer gets a secret ticket from Active Directory<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">3<\/td>\n<td style=\"text-align: center\">The ticket gets sent to Microsoft Entra ID<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">4<\/td>\n<td style=\"text-align: center\">Microsoft Entra ID checks the ticket and lets you in!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Isn&#039;t it amazing how your computer can do all this in just seconds? It&#039;s like having a super-fast security guard who already knows you&#039;re allowed inside!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Benefits_for_Organizations_and_Users\"><\/span>Key Benefits for Organizations and Users<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While many people think <strong>Seamless SSO<\/strong> is just about making logins easier, it&#039;s actually like having a <strong>super-powered helper<\/strong> for both companies and their workers!<\/p>\n<p>Imagine having a <strong>special key<\/strong> that opens all your favorite toy boxes at once &#8211; that&#039;s what SSO does for computer programs! The <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.concretecms.com\/about\/blog\/devops\/sso\">centralized authentication system<\/a> makes everything more secure by reducing vulnerable entry points. Additionally, it enhances security by supporting <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-mfa\/\">two-factor authentication<\/a>, ensuring that unauthorized access is minimized.<\/p>\n<p>For companies, it&#039;s like having a <strong>super-smart security guard<\/strong> who keeps everything safe while saving money.<\/p>\n<p>No more forgotten passwords or tricky logins slowing everyone down! And guess what? It helps catch bad guys trying to steal information, just like a superhero!<\/p>\n<p>For you and other users, it means you only need to remember one password instead of twenty!<\/p>\n<p>It&#039;s like having a <strong>magic wand<\/strong> that lets you zoom right into all your favorite apps and games. How cool is that?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_Seamless_SSO_in_Your_Environment\"><\/span>Setting Up Seamless SSO in Your Environment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up <strong>Seamless SSO<\/strong> is like building the coolest LEGO castle ever &#8211; we&#039;ll put all the pieces together step by step!<\/p>\n<p>First, we need to make sure our <strong>digital playground<\/strong> (that&#039;s what I call our computer network) is ready for the fun. Users with <a class=\"inline-youtube\" rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=fyU_IhaZBjU\">domain administrator credentials<\/a> will be essential for configuring the system properly.<\/p>\n<p>I&#039;ll show you how to set it up, just like following a treasure map! We start by checking if all our computer friends can talk to each other properly.<\/p>\n<p>Then, we use a special tool called <strong>Azure AD Connect<\/strong> &#8211; think of it as your magic wand that makes everything work together.<\/p>\n<p>Next, we create special rules (we call them <strong>Group Policies<\/strong>) that tell computers how to play nicely together.<\/p>\n<p>Finally, we <strong>test everything<\/strong> to make sure it works smoothly, like trying out a new slide at the playground!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_and_Security_Considerations\"><\/span>Best Practices and Security Considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>What Is Seamless Single Sign-On and How Does It Work?<\/p>\n<p>Best Practices and Security Considerations<\/p>\n<p>Making your <strong>SSO system<\/strong> super secure is like building a fortress for your digital treasures! You want to keep all your secret passwords safe from sneaky hackers, just like you&#039;d protect your favorite toys from your mischievous little brother.<\/p>\n<p>First, let&#039;s set up something called <strong>MFA<\/strong> &#8211; it&#039;s like having a special secret handshake AND a password! According to studies, companies have seen a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/ssojet.com\/blog\/mastering-sso-implementation-comprehensive-guide\/\">75% security increase<\/a> after implementing SSO solutions. <strong>Implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-difference-between-sso-and-mfa\/\">MFA<\/a> alongside SSO can significantly enhance overall security measures.<\/strong><\/p>\n<p>Next, I&#039;ll show you how to <strong>check your fortress<\/strong> regularly, just like a knight patrolling the castle walls. Remember to <strong>change your secret codes<\/strong> often, like switching up the rules in hide-and-seek.<\/p>\n<p>Want to know the coolest part? You can make your SSO system work with all your favorite apps! It&#039;s like having <strong>one special key<\/strong> that opens all your toy boxes. Isn&#039;t that amazing?<\/p>\n<p>Just don&#039;t forget to lock everything up tight when you&#039;re done playing!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_Seamless_SSO_Fails_During_an_Authentication_Attempt\"><\/span>What Happens if Seamless SSO Fails During an Authentication Attempt?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When <strong>Seamless SSO<\/strong> fails, I&#039;ll tell you what happens!<\/p>\n<p>Your device will show you a <strong>login prompt<\/strong> instead of signing you in automatically. It&#039;s like when your friend&#039;s secret clubhouse door won&#039;t open &#8211; you need to say the password!<\/p>\n<p>You&#039;ll need to type in your <strong>username and password<\/strong> manually. Sometimes, you might also need to complete an extra security check, just like solving a puzzle to prove it&#039;s really you.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Seamless_SSO_Work_With_Third-Party_Identity_Providers_Besides_Microsoft\"><\/span>Can Seamless SSO Work With Third-Party Identity Providers Besides Microsoft?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that <strong>Seamless SSO<\/strong> works great with other <strong>identity providers<\/strong>!<\/p>\n<p>Think of it like having different keys to your house &#8211; you can use the main key (Microsoft) or backup keys (other providers).<\/p>\n<p>Through protocols called <strong>SAML and OpenID Connect<\/strong> (they&#039;re like special handshakes between computers), you can connect services like FusionAuth or other third-party providers to work smoothly with your Seamless SSO setup.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_Seamless_SSO_Handle_Authentication_When_Users_Work_Offline\"><\/span>How Does Seamless SSO Handle Authentication When Users Work Offline?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I need to tell you something important &#8211; <strong>Seamless SSO<\/strong> doesn&#039;t work <strong>offline<\/strong>.<\/p>\n<p>It&#039;s like trying to play an online game without internet! When you&#039;re not connected to your work network, you can&#039;t use Seamless SSO to sign in.<\/p>\n<p>You&#039;ll need to wait until you&#039;re back online or use a different way to log in, like typing your username and password manually.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Whats_the_Impact_on_Performance_When_Enabling_Seamless_SSO\"><\/span>What&#039;s the Impact on Performance When Enabling Seamless SSO?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Enabling <strong>Seamless SSO<\/strong> makes everything zip along faster!<\/p>\n<p>I&#039;ve seen it cut <strong>login times<\/strong> way down &#8211; just like hitting the express lane at the grocery store.<\/p>\n<p>You&#039;ll notice apps open super quick since you don&#039;t need to type passwords anymore.<\/p>\n<p>Plus, your computer remembers who you are, just like your best friend recognizing you on the playground!<\/p>\n<p>It&#039;s like having a <strong>magic key<\/strong> that opens all your favorite apps at once.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Different_Authentication_Methods_Be_Used_for_Different_Groups_of_Users\"><\/span>Can Different Authentication Methods Be Used for Different Groups of Users?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help different groups use <strong>different ways to log in<\/strong>!<\/p>\n<p>Think of it like having <strong>multiple doors<\/strong> to enter a playground &#8211; some kids use the front gate, while others climb through the fun tunnel.<\/p>\n<p>For example, I can set up your office workers to use passwords, while your tech team uses special smartcards.<\/p>\n<p>It&#039;s like giving everyone their own <strong>special key<\/strong> that works best for them!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Seamless Single Sign-On (SSO) revolutionizes how we access our digital workspaces, but it&#039;s important to also focus on <strong>password security<\/strong> to ensure comprehensive protection. With the convenience of SSO, it&#039;s easy to overlook the critical role that <strong>strong password management<\/strong> plays in safeguarding sensitive information. Utilizing effective password management and passkey solutions can enhance your security posture and streamline your login processes.<\/p>\n<p>To take your security to the next level, I invite you to explore the benefits of a <strong>reliable password management system<\/strong>. By signing up for a <strong>free account<\/strong> at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can simplify your password management while ensuring that your accounts remain secure. Don&#039;t wait for a security breach to take action&#x2014;empower yourself with the tools needed to <strong>protect your digital identity<\/strong> today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Keep your digital life simple: discover how Single Sign-On lets you access all your apps with just one secure login.<\/p>\n","protected":false},"author":5,"featured_media":245779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[19872,3808,8032],"class_list":["post-245780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-digital-access","tag-secure-login","tag-single-sign-on"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245780"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245780\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245779"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}