{"id":245970,"date":"2025-02-15T02:04:09","date_gmt":"2025-02-15T02:04:09","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/scim-apis\/"},"modified":"2025-02-15T02:04:09","modified_gmt":"2025-02-15T02:04:09","slug":"scim-apis","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/scim-apis\/","title":{"rendered":"What Are SCIM APIs and How Do They Function?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>The recent leak of passwords has sent shockwaves through the <strong>cybersecurity community<\/strong>, highlighting the ever-present vulnerabilities in our digital lives. These passwords, discovered in a massive <strong>data breach<\/strong> that affected millions of users across various platforms, serve as a critical reminder of the importance of <strong>safeguarding personal information<\/strong>. As hackers increasingly target online accounts, the leaked passwords not only expose individual users to identity theft and unauthorized access but also underscore the need for stronger security measures, such as <strong>multi-factor authentication<\/strong> and regular password updates. This incident is a wake-up call for users to take their <strong>online security<\/strong> seriously and be vigilant against potential threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Understanding_SCIM_APIs_and_Their_Purpose\" >Understanding SCIM APIs and Their Purpose<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Core_Components_of_SCIM_Architecture\" >Core Components of SCIM Architecture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#The_Role_of_Identity_and_Service_Providers\" >The Role of Identity and Service Providers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#User_Provisioning_and_Deprovisioning_Workflow\" >User Provisioning and Deprovisioning Workflow<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Data_Synchronization_and_Management_Features\" >Data Synchronization and Management Features<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Best_Practices_for_SCIM_Implementation\" >Best Practices for SCIM Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#How_Do_SCIM_APIS_Handle_Multi-Factor_Authentication_Integration\" >How Do SCIM APIS Handle Multi-Factor Authentication Integration?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#What_Security_Measures_Protect_SCIM_Endpoints_From_Unauthorized_Access_Attempts\" >What Security Measures Protect SCIM Endpoints From Unauthorized Access Attempts?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#Can_SCIM_APIS_Support_Custom_Attributes_Specific_to_My_Organization\" >Can SCIM APIS Support Custom Attributes Specific to My Organization?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#How_Does_SCIM_Handle_Bulk_Operations_for_Large-Scale_User_Migrations\" >How Does SCIM Handle Bulk Operations for Large-Scale User Migrations?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#What_Backup_Mechanisms_Exist_if_SCIM_Synchronization_Fails_Between_Systems\" >What Backup Mechanisms Exist if SCIM Synchronization Fails Between Systems?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/scim-apis\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>SCIM APIs are standardized protocols that enable automated sharing of identity information between different systems and applications.<\/li>\n<li>They use HTTP methods (GET, POST) to communicate user data between identity providers and service providers through REST APIs.<\/li>\n<li>SCIM APIs follow specific schemas that define how user and group information should be structured and formatted.<\/li>\n<li>They automate user provisioning and deprovisioning processes, ensuring real-time access management across multiple platforms.<\/li>\n<li>SCIM APIs maintain data synchronization across systems, automatically updating user information to ensure consistency in all connected applications.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_SCIM_APIs_and_Their_Purpose\"><\/span>Understanding SCIM APIs and Their Purpose<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Have you ever wondered how your favorite apps and games remember who you are? That&#039;s where <strong>SCIM APIs<\/strong> come in &#8211; they&#039;re like <strong>magical messengers<\/strong> that help different computer systems share information about users!<\/p>\n<p>Think of SCIM as a special language that helps computers talk to each other. It&#039;s like having a <strong>universal translator<\/strong> for user information! When you log into different apps, SCIM APIs make sure all your details (like your username and settings) stay the same everywhere.<\/p>\n<p>Want to know something cool? SCIM APIs work just like a <strong>busy post office<\/strong>, delivering <strong>important messages<\/strong> between systems. This helps with <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/ironcovesolutions.com\/blog\/scim-and-api-what-is-the-difference\">user account management<\/a> across multiple platforms.<\/p>\n<p>They use special codes called &#034;HTTP methods&#034; (like GET and POST) to send and receive information. Isn&#039;t it amazing how computers can keep track of everything so perfectly?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Core_Components_of_SCIM_Architecture\"><\/span>Core Components of SCIM Architecture<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me show you the building blocks that make SCIM so amazing!<\/p>\n<p>Think of SCIM like a giant puzzle with four super cool pieces that work together perfectly.<\/p>\n<p>First, there&#039;s the <strong>SCIM Schema<\/strong> &#8211; it&#039;s like a recipe that tells everyone how to describe users and groups.<\/p>\n<p>Then we&#039;ve the <strong>SCIM Protocol<\/strong>, which is like a special language that helps computers talk to each other using something called REST &#8211; just like how you use words to talk to your friends!<\/p>\n<p>The third piece is about <strong>SCIM Clients and Servers<\/strong> &#8211; imagine a game of catch where one friend throws the ball (that&#039;s the client) and another catches it (that&#039;s the server).<\/p>\n<p>Finally, we&#039;ve <strong>API Endpoints<\/strong>, which are like <strong>magical doorways<\/strong> where all this information travels through. These endpoints commonly use <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.rippling.com\/glossary\/scim\">OAuth and OpenID Connect<\/a> to keep everything secure and protected.<\/p>\n<p>Cool, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Role_of_Identity_and_Service_Providers\"><\/span>The Role of Identity and Service Providers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While managing lots of usernames and passwords might sound tricky, SCIM has two special helpers that make everything super easy &#8211; <strong>Identity Providers<\/strong> and <strong>Service Providers<\/strong>!<\/p>\n<p>Think of Identity Providers like a big <strong>digital backpack<\/strong> that holds all your information. Just like how your school backpack keeps your books and pencils organized, Identity Providers keep track of who you&#039;re online! They&#039;re like the captain of the team, telling other apps &#034;Hey, this is my friend, and they&#039;re allowed to play!&#034;<\/p>\n<p>Service Providers are like the fun places you visit &#8211; maybe it&#039;s Roblox or your favorite learning game. When you want to use these apps, the Identity Provider sends them a <strong>special message<\/strong> saying &#034;Let my friend in!&#034; They use <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.scalekit.com\/scim\">RESTful API standards<\/a> to communicate and share information with each other seamlessly.<\/p>\n<p>It&#039;s just like having a <strong>magic pass<\/strong> to all your favorite digital playgrounds!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"User_Provisioning_and_Deprovisioning_Workflow\"><\/span>User Provisioning and Deprovisioning Workflow<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like a librarian keeps books <strong>organized<\/strong> on shelves, <strong>SCIM<\/strong> helps organize people in the digital world! When you join a new school, you need <strong>access to lots of things<\/strong> &#8211; your classroom, the cafeteria, and maybe even the computer lab. SCIM does the same thing with computer programs!<\/p>\n<p>Think of it like getting a <strong>special backpack<\/strong> on your first day. Inside, you&#039;ll find everything you need &#8211; your lunch card, library pass, and computer password. That&#039;s what we call &#034;provisioning!&#034;<\/p>\n<p>And when summer vacation comes (or you change schools), we need to take back that backpack &#8211; that&#039;s &#034;deprovisioning!&#034; SCIM makes sure you lose access to everything <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/workos.com\/blog\/how-scim-deprovisioning-works\">in real time<\/a> so there&#039;s no waiting around.<\/p>\n<p>I love how SCIM makes this super easy. It&#039;s like having a <strong>magic wand<\/strong> that instantly gives you access to everything you need, or takes it away when you&#039;re done!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_Synchronization_and_Management_Features\"><\/span>Data Synchronization and Management Features<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Imagine your backpack has <strong>magical powers<\/strong> to <strong>copy everything<\/strong> inside it perfectly! That&#039;s kind of how SCIM works with data &#8211; it keeps all your information the same everywhere, just like having perfect copies of your favorite toys in different playrooms.<\/p>\n<p>When you <strong>update something<\/strong> in one place, SCIM makes sure it changes everywhere else too! It&#039;s like when you share stickers with friends &#8211; everyone gets the exact same ones.<\/p>\n<p>I use <strong>special rules<\/strong> (we call them schemas) to make sure everything stays <strong>organized<\/strong>, just like keeping your Pokemon cards in the right slots of your collection book.<\/p>\n<p>The coolest part? It does all this <strong>automatically<\/strong>! No more running around to fix things one by one.<\/p>\n<p>Have you ever played Simon Says? SCIM is like that &#8211; when the leader (main system) makes a change, all the players (other systems) follow along perfectly!<\/p>\n<p>This helps big companies save time since <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/stytch.com\/blog\/scim-api-your-comprehensive-guide-and-introduction\/\">manual account setup<\/a> can be really slow and full of mistakes when done by hand.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_SCIM_Implementation\"><\/span>Best Practices for SCIM Implementation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up SCIM is like building the perfect pillow fort &#8211; you need to follow certain rules to make it super strong! I&#039;ll show you how to do it right, just like following a recipe for your favorite cookies. Let&#039;s look at some important things to remember:<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Do This!<\/th>\n<th style=\"text-align: center\">Don&#039;t Do This!<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Use SCIM 2.0<\/td>\n<td style=\"text-align: center\">Skip security checks<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Test everything twice<\/td>\n<td style=\"text-align: center\">Forget to make backups<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Keep data safe with locks<\/td>\n<td style=\"text-align: center\">Leave doors open<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Check if things match up<\/td>\n<td style=\"text-align: center\">Mix up user information<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Fix problems quickly<\/td>\n<td style=\"text-align: center\">Wait too long to fix errors<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You know how your video games need updates to work better? That&#039;s just like SCIM! We need to keep checking if everything&#039;s working right and fix any problems fast. Want to make your SCIM super strong? Always use good security, like putting a password on your tablet! Implementing <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/workos.com\/blog\/scim-protocol-explained\">OAuth 2.0 authorization<\/a> ensures your SCIM endpoints remain secure and protected from unauthorized access.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_SCIM_APIS_Handle_Multi-Factor_Authentication_Integration\"><\/span>How Do SCIM APIS Handle Multi-Factor Authentication Integration?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you how <strong>SCIM APIs<\/strong> handle <strong>MFA<\/strong> &#8211; it&#039;s like having a special security club!<\/p>\n<p>When you log in, SCIM helps manage different ways to prove it&#039;s really you. Think of it as using your <strong>secret handshake<\/strong> (password) plus showing your club badge (like a phone code).<\/p>\n<p>SCIM makes sure everything works together smoothly, just like when you&#039;re playing a game with your friends and everyone follows the same rules.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Security_Measures_Protect_SCIM_Endpoints_From_Unauthorized_Access_Attempts\"><\/span>What Security Measures Protect SCIM Endpoints From Unauthorized Access Attempts?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I protect SCIM endpoints using multiple security layers &#8211; like having special locks on your treehouse!<\/p>\n<p>First, I use <strong>TLS encryption<\/strong>, which is like sending secret messages that only the right person can read.<\/p>\n<p>Then, I require <strong>OAuth tokens<\/strong> (think of them as special passes) and enforce strict access controls.<\/p>\n<p>I also monitor for any <strong>suspicious activity<\/strong>, just like a security camera watches your house!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_SCIM_APIS_Support_Custom_Attributes_Specific_to_My_Organization\"><\/span>Can SCIM APIS Support Custom Attributes Specific to My Organization?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help your organization create its own special SCIM attributes!<\/p>\n<p>Think of these like adding <strong>custom toppings<\/strong> to your pizza. Just like you might want extra cheese or pepperoni, you can add <strong>unique fields<\/strong> for things your company needs.<\/p>\n<p>Maybe you want to track employee birthdays, office locations, or project teams.<\/p>\n<p>I&#039;ll help you set these up through the <strong>SCIM API<\/strong>, just like following a recipe.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_SCIM_Handle_Bulk_Operations_for_Large-Scale_User_Migrations\"><\/span>How Does SCIM Handle Bulk Operations for Large-Scale User Migrations?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you how <strong>bulk operations<\/strong> work &#8211; it&#039;s like moving a whole playground of kids at once!<\/p>\n<p>Instead of moving each kid one by one, SCIM lets me move lots of users together in one <strong>big group<\/strong>. I send a single <strong>POST request<\/strong> to the \/Bulk endpoint, just like sending one big package instead of many small ones.<\/p>\n<p>Think of it as packing all your toys in one giant box instead of carrying them separately!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Backup_Mechanisms_Exist_if_SCIM_Synchronization_Fails_Between_Systems\"><\/span>What Backup Mechanisms Exist if SCIM Synchronization Fails Between Systems?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you about the <strong>backup plans<\/strong> when SCIM systems can&#039;t talk to each other &#8211; it&#039;s like having a spare key when you&#039;re locked out!<\/p>\n<p>First, there&#039;s <strong>automatic monitoring<\/strong> that watches for problems.<\/p>\n<p>Then, we keep backup copies of all the important stuff, just like saving your game progress.<\/p>\n<p>If something breaks, we can quickly switch to <strong>backup systems<\/strong>, kind of like having a backup snack when your first one falls on the ground!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we navigate the evolving landscape of <strong>digital identity management<\/strong> with <strong>SCIM APIs<\/strong>, it&#039;s crucial to ensure that our user data remains secure. Just as SCIM APIs streamline user information across applications, robust <strong>password security<\/strong> is paramount in keeping our accounts safe from unauthorized access. Transitioning to effective <strong>password management<\/strong> and passkey management can significantly enhance your overall security posture.<\/p>\n<p>Now is the perfect time to take control of your digital identity. I encourage you to explore smarter solutions for managing your passwords. Sign up for a <strong>Free account<\/strong> at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, where you can discover innovative tools that simplify password management, enhance security, and help you maintain peace of mind. Don&#039;t wait&#x2014;secure your digital life today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Imagine seamlessly syncing user data across enterprise applications &#8211; SCIM APIs make it possible, but there&#8217;s more to this digital orchestra.<\/p>\n","protected":false},"author":5,"featured_media":245969,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[20253,36832,6712],"class_list":["post-245970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-enterprise-applications","tag-scim-apis","tag-user-data"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245970"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245970\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245969"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}