{"id":246802,"date":"2025-02-17T22:56:38","date_gmt":"2025-02-17T22:56:38","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/aws-scim\/"},"modified":"2025-02-17T22:56:38","modified_gmt":"2025-02-17T22:56:38","slug":"aws-scim","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/aws-scim\/","title":{"rendered":"What Is AWS SCIM and How Does It Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of cybersecurity, <strong>leaked passwords<\/strong> pose a significant threat, as they often lead to <strong>unauthorized access<\/strong> and <strong>data breaches<\/strong>. Recently, a prominent password began circulating in various online forums and data breach leaks, highlighting the vulnerabilities that many users face. This particular password, which was discovered alongside millions of others in compromised databases, serves as a stark reminder of the importance of <strong>strong, unique passwords<\/strong> for each account. As users increasingly rely on digital platforms for everything from banking to social networking, understanding the implications of leaked passwords becomes crucial in <strong>safeguarding personal information<\/strong> and enhancing overall security practices.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Understanding_SCIM_Protocol_Fundamentals\" >Understanding SCIM Protocol Fundamentals<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Key_Components_of_AWS_SCIM_Integration\" >Key Components of AWS SCIM Integration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Setting_Up_AWS_SCIM_Configuration\" >Setting Up AWS SCIM Configuration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#User_Provisioning_and_Deprovisioning_Workflow\" >User Provisioning and Deprovisioning Workflow<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Security_Best_Practices_for_AWS_SCIM\" >Security Best Practices for AWS SCIM<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Common_Implementation_Challenges_and_Solutions\" >Common Implementation Challenges and Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Real-World_Use_Cases_and_Benefits\" >Real-World Use Cases and Benefits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Can_AWS_SCIM_Be_Used_With_Non-Aws_Identity_Providers\" >Can AWS SCIM Be Used With Non-Aws Identity Providers?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#What_Happens_to_SCIM_Synchronization_During_AWS_Service_Outages\" >What Happens to SCIM Synchronization During AWS Service Outages?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Does_AWS_SCIM_Support_Custom_Attribute_Mapping_for_Unique_Organizational_Requirements\" >Does AWS SCIM Support Custom Attribute Mapping for Unique Organizational Requirements?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#How_Frequently_Does_AWS_SCIM_Automatically_Sync_User_Data\" >How Frequently Does AWS SCIM Automatically Sync User Data?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#Can_AWS_SCIM_Handle_Bulk_User_Operations_Across_Multiple_AWS_Regions\" >Can AWS SCIM Handle Bulk User Operations Across Multiple AWS Regions?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/aws-scim\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>AWS SCIM is a protocol that automates user account management across multiple applications and systems within AWS environments.<\/li>\n<li>It synchronizes user identity data between an identity provider (IdP) and AWS IAM Identity Center for seamless access control.<\/li>\n<li>SCIM uses endpoints and authentication tokens to securely transfer user information like names, emails, and permissions between systems.<\/li>\n<li>The protocol automatically handles user provisioning, updates, and deprovisioning when employees join, change roles, or leave organizations.<\/li>\n<li>SCIM streamlines user management by acting as a central communication channel between identity systems and AWS services.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_SCIM_Protocol_Fundamentals\"><\/span>Understanding SCIM Protocol Fundamentals<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me tell you about something super cool called <strong>SCIM<\/strong> &#8211; it&#039;s like a special language that helps different computer systems talk to each other!<\/p>\n<p>Have you ever played telephone with your friends? SCIM works kind of like that, but for managing <strong>user accounts<\/strong> across different apps.<\/p>\n<p>Think of SCIM as a friendly mail carrier who delivers <strong>information about users<\/strong> &#8211; like their name, email, and what they&#039;re allowed to do &#8211; between different places on the internet.<\/p>\n<p>When you use apps at school or when your parents use work programs, SCIM helps keep everything <strong>organized and secure<\/strong>.<\/p>\n<p>I like to imagine SCIM as a traffic controller directing cars (that&#039;s our user information!) to the right parking spots.<\/p>\n<p>Isn&#039;t it neat how it helps keep everything <strong>running smoothly<\/strong>?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Components_of_AWS_SCIM_Integration\"><\/span>Key Components of AWS SCIM Integration<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When we&#039;re working with <strong>AWS SCIM<\/strong>, there are three super important parts that work together like a well-oiled machine!<\/p>\n<p>Think of it like building your favorite sandwich &#8211; you need all the right ingredients to make it perfect!<\/p>\n<ol>\n<li>The SCIM endpoint &#8211; it&#039;s like a special mailbox where all your user info gets delivered.<\/li>\n<li>The identity provider (IdP) &#8211; imagine a friendly guard who keeps track of who&#039;s allowed to play.<\/li>\n<li>The AWS IAM Identity Center &#8211; this is like the control room where everything gets organized.<\/li>\n<li>The provisioning connector &#8211; picture a magical bridge that helps move information back and forth.<\/li>\n<\/ol>\n<p>Have you ever played &#034;telephone&#034; where you pass messages down the line? That&#039;s kind of how these parts work together!<\/p>\n<p>They talk to each other to make sure everyone can <strong>log in safely and easily<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_AWS_SCIM_Configuration\"><\/span>Setting Up AWS SCIM Configuration<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up AWS SCIM is like building your own secret clubhouse &#8211; you need to follow a special plan!<\/p>\n<p>Let me show you how it works. First, you&#039;ll need to get your <strong>SCIM endpoint URL<\/strong> &#8211; it&#039;s like your clubhouse&#039;s special address.<\/p>\n<p>Then, you&#039;ll create <strong>authentication tokens<\/strong> (think of them as magic passwords) that let your <strong>identity provider<\/strong> talk to AWS. Have you ever played &#034;Simon Says&#034;? SCIM is similar &#8211; it tells AWS exactly who can join the fun!<\/p>\n<p>Next, you&#039;ll map your <strong>user attributes<\/strong> (that&#039;s just a fancy way of saying &#034;match up everyone&#039;s information&#034;).<\/p>\n<p>Finally, you&#039;ll <strong>test everything<\/strong> to make sure it works. It&#039;s like checking if all the pieces of your LEGO set fit together perfectly.<\/p>\n<p>Want to try setting it up together?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"User_Provisioning_and_Deprovisioning_Workflow\"><\/span>User Provisioning and Deprovisioning Workflow<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The <strong>awesome world of SCIM<\/strong> helps AWS handle your users like a busy restaurant manages its guests!<\/p>\n<p>Just like a restaurant keeps track of who comes and goes, SCIM helps me <strong>manage your team members<\/strong> in AWS. Let me show you how it works &#8211; it&#039;s super cool!<\/p>\n<p>Here&#039;s what happens when we use SCIM for user management:<\/p>\n<ol>\n<li>A new team member joins &#8211; SCIM creates their special AWS account, like making a new player card in your favorite video game.<\/li>\n<li>When someone changes roles, SCIM updates their permissions faster than you can say &#034;peanut butter sandwich.&#034;<\/li>\n<li>If someone takes a break, SCIM can pause their account just like hitting the pause button on your game.<\/li>\n<li>When team members leave, SCIM removes their access as quickly as a magician making things disappear.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Security_Best_Practices_for_AWS_SCIM\"><\/span>Security Best Practices for AWS SCIM<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Since keeping your AWS SCIM setup safe is like protecting your favorite toy from younger siblings, I&#039;ll show you some super important security tricks!<\/p>\n<p>First, you&#039;ll want to use really <strong>strong passwords<\/strong> &#8211; like mixing up letters, numbers, and special characters. It&#039;s just like creating a secret code with your best friend!<\/p>\n<p>Next, I always make sure to update my <strong>SCIM token<\/strong> (that&#039;s like a special key card) regularly, just like how you change your toothbrush every few months.<\/p>\n<p>You should also check who&#039;s <strong>permission to use<\/strong> your SCIM setup &#8211; think of it as choosing who gets to join your secret clubhouse!<\/p>\n<p>Remember to keep your <strong>SCIM endpoint URL<\/strong> private, just like you wouldn&#039;t tell everyone where you hide your candy stash!<\/p>\n<p>And don&#039;t forget to <strong>monitor your logs<\/strong> &#8211; it&#039;s like being a detective watching for anything <strong>suspicious<\/strong>. Additionally, implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">multi-factor authentication<\/a> is crucial to further enhance your SCIM security measures!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_Implementation_Challenges_and_Solutions\"><\/span>Common Implementation Challenges and Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While keeping your SCIM safe is super important, sometimes things can get a bit tricky &#8211; like trying to build a LEGO castle without instructions!<\/p>\n<p>I want to help you understand some common <strong>challenges<\/strong> and how to fix them, just like solving a fun puzzle.<\/p>\n<ol>\n<li><strong>Token troubles<\/strong>: Sometimes your authentication token (think of it as your secret password) stops working, just like when your TV remote needs new batteries.<\/li>\n<li><strong>Mapping mishaps<\/strong>: User attributes can get mixed up, like putting socks in the shirt drawer.<\/li>\n<li><strong>Sync struggles<\/strong>: Data mightn&#039;t update right away, similar to when your game takes forever to load.<\/li>\n<li><strong>Error enigmas<\/strong>: When error messages pop up, they can be as confusing as trying to read upside down!<\/li>\n<\/ol>\n<p>Let&#039;s tackle these challenges together &#8211; I&#039;ll show you how to make everything work smoothly!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Real-World_Use_Cases_and_Benefits\"><\/span>Real-World Use Cases and Benefits<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Organizations of all shapes and sizes are finding amazing ways to use AWS SCIM &#8211; it&#039;s like having a magical helper for managing users! I&#039;ve seen companies save countless hours by automating their user management, just like how a robot helper might organize your toys.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Company Type<\/th>\n<th style=\"text-align: center\">Benefits<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Schools<\/td>\n<td style=\"text-align: center\">Easy student access setup<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Hospitals<\/td>\n<td style=\"text-align: center\">Secure staff logins<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Game Studios<\/td>\n<td style=\"text-align: center\">Quick player accounts<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Tech Startups<\/td>\n<td style=\"text-align: center\">Fast team scaling<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Retail Stores<\/td>\n<td style=\"text-align: center\">Simple employee management<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You know how frustrating it is when you can&#039;t find your favorite toy? Well, without SCIM, companies feel the same way about managing their users! But with SCIM, it&#039;s as easy as sorting candy by color. Companies can add new team members faster than you can say &#034;cloud computing,&#034; and keep everyone&#039;s access super safe &#8211; just like having a special lock on your secret diary!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Can_AWS_SCIM_Be_Used_With_Non-Aws_Identity_Providers\"><\/span>Can AWS SCIM Be Used With Non-Aws Identity Providers?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that <strong>AWS SCIM<\/strong> works great with lots of non-AWS <strong>identity providers<\/strong>!<\/p>\n<p>I use it with popular services like Okta, Azure AD, and OneLogin all the time.<\/p>\n<p>Think of SCIM like a friendly translator &#8211; it helps different systems talk to each other.<\/p>\n<p>It&#039;s super handy because you don&#039;t have to stick with just AWS tools. You can <strong>mix and match<\/strong> what works best for you!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_to_SCIM_Synchronization_During_AWS_Service_Outages\"><\/span>What Happens to SCIM Synchronization During AWS Service Outages?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>During <strong>AWS service outages<\/strong>, I&#039;ll tell you what happens to <strong>SCIM sync<\/strong> &#8211; it might pause or slow down, just like when your favorite video game buffers!<\/p>\n<p>Don&#039;t worry though, once AWS is back up, SCIM will catch up automatically. It&#039;s like when you pause jumping rope &#8211; when you start again, you pick up right where you left off!<\/p>\n<p>Your <strong>user data<\/strong> stays safe and syncs when everything&#039;s working again.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_AWS_SCIM_Support_Custom_Attribute_Mapping_for_Unique_Organizational_Requirements\"><\/span>Does AWS SCIM Support Custom Attribute Mapping for Unique Organizational Requirements?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help you understand <strong>custom attribute mapping<\/strong> in AWS SCIM!<\/p>\n<p>Think of it like creating your own special recipe &#8211; you can mix and match different ingredients.<\/p>\n<p>AWS SCIM lets you map custom attributes to match your <strong>organization&#039;s needs<\/strong>, just like arranging your favorite building blocks.<\/p>\n<p>You can connect things like <strong>employee IDs<\/strong>, departments, or special roles that make your organization unique.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Frequently_Does_AWS_SCIM_Automatically_Sync_User_Data\"><\/span>How Frequently Does AWS SCIM Automatically Sync User Data?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>AWS SCIM doesn&#039;t have a fixed <strong>sync schedule<\/strong> &#8211; it&#039;s more like a <strong>flexible friend<\/strong>!<\/p>\n<p>I&#039;ll tell you how it works: when changes happen in your <strong>identity provider<\/strong> (like adding a new user), SCIM immediately pushes these updates to AWS.<\/p>\n<p>Think of it like a game of telephone, but super fast and accurate!<\/p>\n<p>For the best results, I&#039;d suggest setting up your own sync schedule every 24-48 hours.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_AWS_SCIM_Handle_Bulk_User_Operations_Across_Multiple_AWS_Regions\"><\/span>Can AWS SCIM Handle Bulk User Operations Across Multiple AWS Regions?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help you with <strong>bulk user operations<\/strong> in AWS SCIM!<\/p>\n<p>You can <strong>manage lots of users<\/strong> at once across different AWS regions. Think of it like moving a whole classroom of students together instead of one by one.<\/p>\n<p>I&#039;ve found it super helpful for tasks like adding many employees simultaneously or updating everyone&#039;s information at once.<\/p>\n<p>Just remember that syncing might take a little time.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While <strong>AWS SCIM<\/strong> revolutionizes <strong>user identity management<\/strong>, it&#039;s crucial to complement this with robust <strong>password security practices<\/strong>. As you streamline your user provisioning, don&#039;t overlook the importance of <strong>secure password management<\/strong> and passkey solutions. A single compromised password can jeopardize your entire cloud infrastructure. To enhance your security posture, consider adopting a comprehensive <strong>password management system<\/strong> that not only secures your credentials but also simplifies access for your team.<\/p>\n<p>Now is the perfect time to take action! I encourage you to explore how you can safeguard your accounts with advanced password management tools. Check out <strong>LogMeOnce<\/strong> for a seamless solution that integrates with your AWS setup. Sign up for a <a href=\"https:\/\/logmeonce.com\/\">Free account<\/a> today and elevate your security strategy. With effective password management, you can ensure that your user identities remain secure as you scale your operations.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover how AWS SCIM streamlines user management across cloud applications, making access control seamless and secure for organizations.<\/p>\n","protected":false},"author":5,"featured_media":246801,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[2317,23026,35825],"class_list":["post-246802","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-access-control","tag-scim","tag-user-management-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246802"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246802\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246801"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}