{"id":246128,"date":"2025-02-16T00:46:34","date_gmt":"2025-02-16T00:46:34","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/scp-include-password\/"},"modified":"2025-02-16T00:46:34","modified_gmt":"2025-02-16T00:46:34","slug":"scp-include-password","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/scp-include-password\/","title":{"rendered":"Best Ways to Include a Password With SCP"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of cybersecurity, the <strong>leaked password phenomenon<\/strong> has emerged as a <strong>pressing concern<\/strong>, drawing attention from both individuals and organizations alike. Recent breaches have revealed that passwords, once thought to be secure, have made their way onto the <strong>dark web<\/strong> and in public repositories, exposing countless accounts to potential exploitation. These leaks often stem from <strong>compromised databases<\/strong> and poorly secured systems, emphasizing the critical need for <strong>robust password management practices<\/strong>. The significance of these leaks cannot be overstated; they highlight vulnerabilities in user security and the importance of adopting <strong>better authentication methods<\/strong> to protect sensitive information. As users navigate this digital age, understanding the implications of leaked passwords is essential for safeguarding their online presence and maintaining cybersecurity.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Understanding_SCP_Password_Authentication_Methods\" >Understanding SCP Password Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Setting_Up_Public_Key_Authentication_for_SCP\" >Setting Up Public Key Authentication for SCP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Using_SSHPASS_for_Automated_SCP_Transfers\" >Using SSHPASS for Automated SCP Transfers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Command-Line_Security_Risks_and_Mitigation\" >Command-Line Security Risks and Mitigation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Password_Management_Best_Practices_for_SCP\" >Password Management Best Practices for SCP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Alternative_Authentication_Methods_for_Secure_File_Transfers\" >Alternative Authentication Methods for Secure File Transfers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Can_I_Store_SCP_Passwords_in_Environment_Variables_for_Better_Security\" >Can I Store SCP Passwords in Environment Variables for Better Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#How_Often_Should_I_Rotate_SSH_Keys_Used_for_SCP_Transfers\" >How Often Should I Rotate SSH Keys Used for SCP Transfers?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Does_SCP_Support_Two-Factor_Authentication_for_Password-Protected_Transfers\" >Does SCP Support Two-Factor Authentication for Password-Protected Transfers?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#Can_I_Encrypt_Password_Files_Used_With_SCP_Commands\" >Can I Encrypt Password Files Used With SCP Commands?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#What_Happens_if_My_SCP_Password_Contains_Special_Characters\" >What Happens if My SCP Password Contains Special Characters?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/scp-include-password\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Public key authentication offers the most secure method by eliminating password entry through SSH key pairs.<\/li>\n<li>SSHPASS enables automated SCP transfers with passwords, installed via &#039;sudo apt-get install sshpass&#039; on Ubuntu systems.<\/li>\n<li>Store passwords in environment variables rather than typing them directly in command lines for improved security.<\/li>\n<li>Use SSH config files to store connection details securely instead of including passwords in commands.<\/li>\n<li>Implement password managers to safely store and retrieve credentials for SCP transfers when needed.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_SCP_Password_Authentication_Methods\"><\/span>Understanding SCP Password Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you want to send files between computers using <strong>SCP<\/strong>, it&#039;s kind of like having a <strong>secret clubhouse<\/strong> where you need a special <strong>password<\/strong> to get in!<\/p>\n<p>Have you ever played with a lockbox that needs a special code? That&#039;s how SCP works!<\/p>\n<p>I&#039;ll tell you about two main ways to use passwords with SCP. First, you can type your password when SCP asks for it &#8211; just like saying the secret password at your clubhouse door!<\/p>\n<p>The second way uses something called <strong>SSHPASS<\/strong>, which is like having a special key that remembers your password. You can easily install it with <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.vpsserver.com\/scp-password\/\">sudo apt-get install sshpass<\/a> on Ubuntu systems.<\/p>\n<p>But here&#039;s a secret &#8211; using passwords isn&#039;t the safest way! It&#039;s like telling your secret clubhouse password to everyone on the playground.<\/p>\n<p>Instead, I recommend using something called &#034;public keys&#034; &#8211; they&#039;re much safer, like having your very own special <strong>fingerprint scanner<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_Public_Key_Authentication_for_SCP\"><\/span>Setting Up Public Key Authentication for SCP<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me tell you about setting up a <strong>super-special security system<\/strong> for your computer files! It&#039;s like having a magical key that only you can use &#8211; isn&#039;t that cool?<\/p>\n<p>First, we&#039;ll create two special keys using a tool called <strong>ssh-keygen<\/strong> (I call it the &#034;key maker&#034;).<\/p>\n<p>Think of it like making a secret handshake with your computer! One key stays with you (that&#039;s your <strong>private key<\/strong> &#8211; keep it safe like your favorite teddy bear), and the other goes on the computer you want to connect to (that&#039;s the <strong>public key<\/strong>).<\/p>\n<p>We&#039;ll put the public key in a special folder called .ssh, just like putting your lunch in the right cubby at school. Your private key can use <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/files.jscape.com\/secureftpserver\/docs\/using_public_key_authenticatio.htm\">added password protection<\/a> for extra security. By adding <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-vs-two-factor-authentication\/\">multiple authentication methods<\/a>, you further enhance the security of your connection.<\/p>\n<p>Want to know the best part? Once it&#039;s set up, you won&#039;t need to type passwords anymore &#8211; it&#039;s like having an automatic door that only opens for you!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Using_SSHPASS_for_Automated_SCP_Transfers\"><\/span>Using SSHPASS for Automated SCP Transfers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Public keys are super cool, but sometimes you just need a quick and easy way to share files! That&#039;s where <strong>SSHPASS<\/strong> comes in &#8211; it&#039;s like having a magic key that helps you <strong>send files<\/strong> super fast!<\/p>\n<p>You know how you need a password to get into your favorite video game? SSHPASS works the same way! I can show you how to use it. First, you&#039;ll need to <strong>install<\/strong> it &#8211; it&#039;s as easy as typing &#039;sudo apt-get install sshpass&#039; if you&#039;re using Ubuntu. This tool is especially useful when you need <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.redhat.com\/en\/blog\/ssh-automation-sshpass\">non-interactive authentication<\/a> for automated tasks.<\/p>\n<p>Then, you can send files with a simple command. Think of it like passing notes in class, but way more <strong>secure<\/strong>! Just type &#039;sshpass -p &#034;your-password&#034; scp yourfile.txt friend@computer:\/folder\/&#039; and whoosh &#8211; your file <strong>zooms through the internet<\/strong> to its destination!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Command-Line_Security_Risks_and_Mitigation\"><\/span>Command-Line Security Risks and Mitigation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Staying safe while using commands is a bit like having a <strong>special lock<\/strong> on your treehouse! Just like you wouldn&#039;t share your <strong>secret clubhouse password<\/strong> with strangers, you shouldn&#039;t put passwords right into your computer commands.<\/p>\n<p>Think of SCP as a <strong>delivery service<\/strong> for your computer files. But here&#039;s the tricky part &#8211; sometimes <strong>bad guys<\/strong> can trick SCP into doing things it shouldn&#039;t! It&#039;s like when someone tries to peek at your lunch box without asking. Using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/venafi.com\/blog\/what-secure-copy-protocol-and-how-use-it\/\">public key authentication<\/a> helps keep your files safer when sending them. Additionally, implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/cisa-phishing-resistant-mfa\/\">CISA phishing resistant MFA<\/a> can provide an extra layer of security against unauthorized access.<\/p>\n<p>I&#039;ll teach you how to stay safe:<\/p>\n<ol>\n<li>Double-check every command before hitting enter<\/li>\n<li>Keep your passwords super secret (not written down!)<\/li>\n<li>Make backup copies of important files<\/li>\n<li>Always ask a grown-up before using special commands with &#034;sudo&#034;<\/li>\n<\/ol>\n<p>Remember: Being careful with commands keeps your computer safe and happy!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Password_Management_Best_Practices_for_SCP\"><\/span>Password Management Best Practices for SCP<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security is like having a <strong>super-secret hideout password<\/strong>! When you&#039;re using SCP to share files, you want to keep your passwords extra safe &#8211; just like protecting your favorite candy stash from sneaky siblings!<\/p>\n<p>I&#039;ll tell you a cool trick: instead of typing your password, use something called &#034;public key authentication.&#034; It&#039;s like having a special key that only works for you! Think of it as your own <strong>superhero gadget<\/strong> that keeps bad guys away. <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">Multi-Factor Authentication (MFA)<\/a> can further enhance your security by requiring additional verification steps.<\/p>\n<p>Want to make things even safer? Add something called &#034;two-factor authentication&#034; &#8211; it&#039;s like having a secret handshake AND a password! <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.syteca.com\/en\/blog\/password-management-best-practices\">Data breaches and fraud<\/a> can cost companies millions in damages and lost trust.<\/p>\n<p>You can also use a <strong>password manager<\/strong>, which is like a digital safe where all your passwords live, protected by super-strong locks. Pretty neat, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Alternative_Authentication_Methods_for_Secure_File_Transfers\"><\/span>Alternative Authentication Methods for Secure File Transfers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you&#039;re sending files to friends online, it&#039;s like having different secret ways to prove it&#039;s really you! Think of it like having special keys to your treehouse &#8211; only you have them!<\/p>\n<p>I love using something called &#034;public key authentication&#034; &#8211; it&#039;s like having a magic password that works automatically. Cool, right? You only set it up once, and then it&#039;s super easy to use every time. Remember that you need to use <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.techrepublic.com\/article\/how-to-use-secure-copy-with-ssh-key-authentication\/\">ssh-copy-id<\/a> to share your key.<\/p>\n<p>Have you ever used <strong>two-factor authentication<\/strong>? It&#039;s like having a <strong>secret handshake<\/strong> plus a special code!<\/p>\n<p>You can also use something called <strong>SFTP<\/strong>, which is like a <strong>super-safe backpack<\/strong> for your files. Or try <strong>Rsync<\/strong> &#8211; it&#039;s like having a helper that only moves the files that have changed. Isn&#039;t that smart?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_Store_SCP_Passwords_in_Environment_Variables_for_Better_Security\"><\/span>Can I Store SCP Passwords in Environment Variables for Better Security?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I wouldn&#039;t recommend storing <strong>SCP passwords<\/strong> in environment variables &#8211; it&#039;s like leaving your house key under the doormat where anyone could find it!<\/p>\n<p>Instead, I suggest using something called &#034;public key authentication.&#034;<\/p>\n<p>Think of it like having a special <strong>secret handshake<\/strong> that only you and your computer know. It&#039;s much safer and keeps your passwords protected from sneaky computer bugs that might try to steal them.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_I_Rotate_SSH_Keys_Used_for_SCP_Transfers\"><\/span>How Often Should I Rotate SSH Keys Used for SCP Transfers?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend rotating your <strong>SSH keys<\/strong> every 3 months for important stuff, or yearly for less critical transfers.<\/p>\n<p>Think of it like changing your <strong>locker combination<\/strong> at school &#8211; you wouldn&#039;t want to keep the same one forever!<\/p>\n<p>I make it super easy by marking my calendar and using automated tools.<\/p>\n<p>For extra-special files (like your <strong>secret cookie recipe<\/strong>), you might want to rotate keys more often.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_SCP_Support_Two-Factor_Authentication_for_Password-Protected_Transfers\"><\/span>Does SCP Support Two-Factor Authentication for Password-Protected Transfers?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help you understand SCP and <strong>two-factor authentication<\/strong>!<\/p>\n<p>SCP works with 2FA through its <strong>SSH connection<\/strong>. It&#039;s like having two locks on your door &#8211; one key and one <strong>special code<\/strong>.<\/p>\n<p>When you use SCP with 2FA, you&#039;ll need your password plus a second verification code. Think of it as your secret handshake plus a magic number from your phone.<\/p>\n<p>Pretty cool security, right?<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_Encrypt_Password_Files_Used_With_SCP_Commands\"><\/span>Can I Encrypt Password Files Used With SCP Commands?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I wouldn&#039;t recommend <strong>encrypting password files<\/strong> for SCP &#8211; that&#039;s like putting a lock on a box that already has a hole in it!<\/p>\n<p>Instead, I&#039;d use <strong>SSH keys<\/strong>, which are way safer. Think of SSH keys like a <strong>special secret handshake<\/strong> between computers.<\/p>\n<p>Let me help you set up SSH keys &#8211; they&#039;re super easy to use and much more secure than password files.<\/p>\n<p>Want to try it together?<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_My_SCP_Password_Contains_Special_Characters\"><\/span>What Happens if My SCP Password Contains Special Characters?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Special characters in your SCP password can be tricky! Think of them like puzzle pieces that don&#039;t quite fit.<\/p>\n<p>Characters like &#039;@&#039; or &#039;!&#039; need special handling &#8211; just like when you&#039;re carrying eggs, you&#039;ve got to be <strong>extra careful<\/strong>!<\/p>\n<p>You&#039;ll need to use quotes or backslashes to make them work properly. Otherwise, your computer might get confused and give you an error message.<\/p>\n<p>Let&#039;s pretend they&#039;re <strong>secret codes<\/strong> that need special wrapping!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to <strong>secure file transfers<\/strong>, <strong>safeguarding your passwords<\/strong> is paramount. As we&#039;ve discussed, using methods like public key authentication enhances security, but <strong>password management<\/strong> is equally crucial. This is where <strong>effective password practices<\/strong> come into play. Do you often struggle with remembering complex passwords, or worry about the security of your credentials? It&#039;s time to take charge of your <strong>password security<\/strong>.<\/p>\n<p>By adopting a reliable password management solution, you can streamline your login processes while ensuring your data remains protected. I encourage you to explore modern tools that simplify password management and enhance security. For a seamless experience, consider signing up for a Free account at <a href=\"https:\/\/logmeonce.com\/\">LogmeOnce<\/a>, where you can benefit from advanced features that help you manage your passwords and passkeys securely. Don&#039;t compromise on your security&#x2014;take the first step towards <strong>safer file transfers<\/strong> today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>How to securely transfer files using SCP with passwords while avoiding common security pitfalls and protecting your sensitive data.<\/p>\n","protected":false},"author":5,"featured_media":246127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[35762,36879,1584],"class_list":["post-246128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-data-protection-3","tag-scp-file-transfer","tag-secure-passwords"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246128"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246128\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246127"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}