{"id":62226,"date":"2024-06-18T12:06:31","date_gmt":"2024-06-18T12:06:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/01\/view-password-requirements-active-directory\/"},"modified":"2024-07-06T10:39:31","modified_gmt":"2024-07-06T10:39:31","slug":"view-password-requirements-active-directory","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/","title":{"rendered":"View Password Requirements Active Directory"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Do you want\u2064 to \u200bknow how to View Password Requirements \u2064Active Directory? Are you \u200dan IT administrator who \u200bwants \u200bto ensure \u200cthat \u200dyour users are \u200dusing secure passwords \u200con \u200dyour\u200b corporate network,\u200d but you\u2019re not sure\u2063 how \u2063to\u2064 go \u2064about \u2062doing\u200d it? This guide will\u200c explain how to view password\u2062 requirements in\u2064 active directory, and also \u200coffer tips on\u200c creating strong, secure \u2062passwords. \u200bThe\u200c right password \u200bcan help \u200bto protect your \u2064user\u2019s data,\u2062 and give you peace \u2063of\u200d mind. Take the time to learn \u2063about password requirements, and use \u2062them to create strong credentials for your network. This guide will help you\u200d review and\u2063 set \u200cpassword requirements for active directory.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#1_Keep_Your_Active_Directory_Passwords_Secure\" >1. Keep Your Active Directory Passwords Secure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#2_Uncovering_the_%E2%80%8BBenefits_of_%E2%80%8DPassword_Requirements\" >2. Uncovering the \u200bBenefits of \u200dPassword Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#3_How_to_Set_%E2%80%8DPassword_Requirements%E2%80%8C_in_%E2%81%A3Active_%E2%81%A3Directory\" >3. How to Set \u200dPassword Requirements\u200c in \u2063Active \u2063Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#4_Take_%E2%81%A2the_Time_to_Make_%E2%80%8DYour_%E2%81%A3Active_Directory%E2%80%8B_Passwords%E2%81%A3_Safe\" >4. Take \u2062the Time to Make \u200dYour \u2063Active Directory\u200b Passwords\u2063 Safe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#Password_Security_Best_Practices_for_Organizations\" >Password Security Best Practices for Organizations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/#Conclusion_View_Password_Requirements_Active_Directory\" >Conclusion: View Password Requirements Active Directory<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-keep-your-active-directory-passwords-secure\"><span class=\"ez-toc-section\" id=\"1_Keep_Your_Active_Directory_Passwords_Secure\"><\/span>1. Keep Your Active Directory Passwords Secure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Secure \u2062passwords are essential to\u2063 keeping\u2062 your Active Directory safe\u2064 from \u200chackers and cyber-attacks. Having a strong password policy in \u200bplace is one of the best ways to\u200b protect your accounts \u200cfrom unauthorized\u2064 access. Knowing \u200bhow\u200d to create and maintain secure \u200cpasswords can help \u200dyour\u2063 organization stay safe \u2062and avoid falling victim to cyber-attacks.<\/p>\n<p>Here are \u200dsome\u2062 best practices to :<\/p>\n<ul>\n<li><strong>Use complex passwords:<\/strong> \u200d Avoid simple \u2062passwords \u200cthat \u200dare \u200deasily guessed like \u201c123456.\u201d\u2063 Make sure passwords \u2062are long and \u2062contain upper and \u200dlower case\u2064 letters, numbers, and special symbols.<\/li>\n<li><strong>Update passwords regularly:<\/strong> To \u200cadd an extra layer of protection, have passwords updated every 30\u200d or\u200b 90 days. Manage\u200c password changes with \u200cautomated tools to make\u200c sure they are updated on time.<\/li>\n<li><strong>Don\u2019t\u200c reuse passwords:<\/strong> All of your passwords should be\u2064 unique.\u200b Don\u2019t reuse the same one across multiple accounts.<\/li>\n<li><strong>Restrict access:<\/strong> On top of\u200b using strong passwords, put \u200dextra security layers in place.\u200b Limit access to \u2063users who need \u200bit and\u200c keep track of who has \u200baccess to your Active Directory.<\/li>\n<\/ul>\n<h2 id=\"2-uncovering-the-benefits-of-password-requirements\"><span class=\"ez-toc-section\" id=\"2_Uncovering_the_%E2%80%8BBenefits_of_%E2%80%8DPassword_Requirements\"><\/span>2. Uncovering the \u200bBenefits of \u200dPassword Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We all know websites and \u200capps \u2063require passwords in order to use\u200c their features.\u200b But did you \u200cknow why? Password requirements\u2062 ensure\u200d the\u2063 safety \u200dand privacy of\u200b your personal\u200b data. Let\u2019s explore\u200c the key benefits:<\/p>\n<ul>\n<li><strong>Data\u200b Protection:<\/strong> Password \u200drequirements help protect sensitive information. This includes data \u2063related to your account, like user information, credit card \u2064details, etc. It also prevents \u2063unauthorized access to\u200d your \u2064accounts.<\/li>\n<li><strong>Account\u200c Security:<\/strong> Implementing \u2064strong passwords safeguards \u2062your\u2062 accounts from hackers and other cyber criminals, \u2063as it makes it harder for\u200d them \u200bto gain\u200d access and use your personal data.<\/li>\n<li><strong>Regulatory Compliance:<\/strong> \u2064Password requirements are also important for organizations,\u200b as\u2064 they help comply with \u200claws, regulations,\u200d and other industry standards\u200b that protect your\u2064 data in the digital\u2062 world.<\/li>\n<\/ul>\n<p>Using \u2063strong passwords and maintaining \u200bthe security of\u2062 websites \u2062and apps\u2063 are essential for the safety of your online \u200bexperiences. As such,\u200b it\u2019s important to ensure passwords adhere to the requirements set by login websites\u200b and \u200bapplications.<\/p>\n<h2 id=\"3-how-to-set-password-requirements-in-active-directory\"><span class=\"ez-toc-section\" id=\"3_How_to_Set_%E2%80%8DPassword_Requirements%E2%80%8C_in_%E2%81%A3Active_%E2%81%A3Directory\"><\/span>3. How to Set \u200dPassword Requirements\u200c in \u2063Active \u2063Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Password requirements\u200b are \u200can \u200dimportant part of any IT \u200bsecurity system. They \u200dhelp protect your data and prevent unauthorized access. Using \u2063Active Directory,\u200c you\u200b can set \u2064password \u2064requirements to \u2063protect the network. Here\u2019s how:<\/p>\n<ul>\n<li><b>Identify the\u2062 type\u2064 of \u2063passwords you need:<\/b> \u200cStart by \u200bdeciding what \u2063type of passwords you want users to \u200buse. Do you \u2062want them to\u2062 use\u2063 complex \u200cpasswords or just simple ones?\u200c Make sure all the passwords are \u2064secure and\u2062 unique.\u200d<\/li>\n<li><b>Create password policies:<\/b> Create appropriate policies for the types \u2062of passwords \u200dyou\u2019ve \u200dchosen.\u200c Consider \u2062things like minimum length, complexity\u200c requirements, expiration dates, and account \u2063lockout after a\u200c certain amount \u200cof incorrect attempts.<\/li>\n<li><b>Configure other password settings:<\/b> Configure \u2064how often the\u200c users\u2062 should have \u2063to change their \u2063passwords.\u2063 You\u200c can also \u2062set limits\u200d on the number\u2063 of passwords that can be reused. Define the\u200b password complexity\u200b settings too. This includes the\u200b minimum number of character types, \u2063such \u2062as uppercase letters, lowercase letters, numbers, and symbols. \u2062<\/li>\n<li><b>Enforce \u200cthe password \u200bpolicies:<\/b> \u2064Once\u200c your \u200bpolicies and settings are in place, you need to enforce them. This <a href=\"https:\/\/logmeonce.com\/business-identity-management-identity-manager-and-access-manager\/business-pricing-and-comparison\/\">includes regularly monitoring user accounts<\/a> to ensure that they \u200bcomply\u200b with\u200d your password requirements. \u200d<\/li>\n<\/ul>\n<p>Setting \u200dpassword requirements in Active Directory is\u200c relatively straightforward, however, it\u2019s\u200c important to remember\u2062 that these \u200crequirements also need to be updated regularly, as hackers are constantly\u2062 developing\u200b new \u200cways of\u200d penetrating your network.<\/p>\n<h2 id=\"4-take-the-time-to-make-your-active-directory-passwords-safe\"><span class=\"ez-toc-section\" id=\"4_Take_%E2%81%A2the_Time_to_Make_%E2%80%8DYour_%E2%81%A3Active_Directory%E2%80%8B_Passwords%E2%81%A3_Safe\"><\/span>4. Take \u2062the Time to Make \u200dYour \u2063Active Directory\u200b Passwords\u2063 Safe<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it \u200dcomes to protecting \u200dyour\u2064 Active\u200b Directory (AD) environment, passwords are\u2062 one of the most fundamental layers of defense. If \u200cyou don\u2019t \u2062take care of your\u200d passwords, \u2062cyber criminals could gain \u200caccess to \u200dyour AD data and wreak havoc on your \u200bwhole\u200b system.<\/p>\n<p>Here \u200care some steps you\u2064 can take to make\u200c your AD\u2063 passwords more secure:<\/p>\n<ul>\n<li><strong>Enforce Strong Complexity Requirements<\/strong> \u2013 Have a strict password\u2063 policy in place that <a href=\"https:\/\/logmeonce.com\/zero-trust\/\">requires complex \u2063passwords\u2063 filled<\/a> with \u2062numbers, symbols, uppercase letters, \u200band lowercase letters.<\/li>\n<li><strong>Enable \u2064Multi-Factor \u200dAuthentication<\/strong> \u2064 \u2013 Using\u2064 multiple factors to <a title=\"View Password Requirements Active Directory\" href=\"https:\/\/logmeonce.com\/resources\/view-password-requirements-active-directory\/\">verify user identity reduces<\/a> the risk of hackers attacking \u2063your AD\u2064 environment.<\/li>\n<li><strong>Keep Passwords Unique<\/strong> \u2013 Don\u2019t reuse passwords. Each user should have a unique password to control access to the \u2064AD \u200bdata.<\/li>\n<li><strong>Disable \u200cCached Credentials<\/strong> \u2013 Caching user \u200ccredentials on local machines increases the risk\u2064 of malicious actors\u2062 exploiting them. Disable this\u200d feature \u2063in your AD environment.<\/li>\n<\/ul>\n<p>These are just a few steps you can \u200ctake \u200dto make your Active Directory passwords more secure. By proactively utilizing \u200bthese \u200cmeasures, you\u2062 can reduce\u2062 the risk\u200d of \u2063cyber criminals \u2064attacking your\u2064 AD environment.<\/p>\n<p><strong>Best Practices for Password Security in Organizations<\/strong><\/p>\n<p>Password policies are essential for maintaining the security of an organization&#8217;s network and sensitive information. Default password policies set by the Domain Controller often include requirements such as the use of uppercase characters, consecutive characters, and Unicode characters to create strong passwords.<\/p>\n<p>It is important to avoid common passwords or frequently used passwords to prevent unauthorized access to corporate accounts. Organizations can also implement multi-factor authentication and use password dictionaries to enhance security measures. Adhering to password settings objects and enforcing policies for shorter passwords can help protect against potential risks from users choosing weaker passwords.<\/p>\n<p>A policy management console can be used to establish and manage granular password policies, including rules for password creation and complexity requirements. Regularly updating password lists and conducting password audits with tools like Password Auditor or Specops Password Auditor are crucial for maintaining a strong password security system.<\/p>\n<p>Additionally, self-service password resets and implementing strong security measures for service accounts can further protect against cybersecurity threats.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Password_Security_Best_Practices_for_Organizations\"><\/span>Password Security Best Practices for Organizations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Password Security Measure<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Use Strong Complexity Requirements<\/td>\n<td>Require complex passwords with numbers, symbols, uppercase and lowercase letters.<\/td>\n<\/tr>\n<tr>\n<td>Enable Multi-Factor Authentication<\/td>\n<td>Implement additional verification layers to reduce hacking risks.<\/td>\n<\/tr>\n<tr>\n<td>Keep Passwords Unique<\/td>\n<td>Avoid password reuse to control access to data.<\/td>\n<\/tr>\n<tr>\n<td>Disable Cached Credentials<\/td>\n<td>Prevent storing user credentials on local devices to minimize exploitation risks.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Sources:<br \/>\n&#8211; Microsoft. (n.d.). Security Settings Extension overview. Retrieved from https:\/\/docs.microsoft.com\/en-us\/windows\/secure-productive\/windows-10-device-guard\/deploy-windows-defender-application-control<br \/>\n&#8211; Specops Software. (n.d.). Password Auditor. Retrieved from https:\/\/specopssoft.com\/product\/specops-password-auditor\/<br \/>\n&#8211; Active Directory Reports. (n.d.). Home. Retrieved from https:\/\/www.activedirectoryreports.com\/<\/p>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What\u2063 is Active Directory and\u200c what is a password requirement?<br \/>\nA: Active Directory is\u2063 a technology that allows a computer user\u2064 to access and manage \u200dother networks and computers. \u200cA\u200c password requirement\u200c is\u2064 a set\u200d of rules determined by a system administrator which a user must follow when creating \u2062a password\u200c for a system.<\/p>\n<p>Q: What are some important factors to consider when setting up a password policy in Active Directory?<br \/>\nA: When setting up a password policy in Active Directory, it is crucial to consider factors such as maximum password age, minimum password age, default domain password policy, special characters, fine-grained password policies, password complexity requirements, password history, and password expiration policies. These settings help enhance security and protect against brute force attacks. (source: Microsoft Docs)<\/p>\n<p>Q: What are some common elements of a robust password policy?<br \/>\nA: A robust password policy may include elements such as requiring a minimum password length, a mix of uppercase and lowercase characters, numbers, and special characters. It may also enforce password expiration periods and prevent password reuse. These measures help protect user passwords from potential security risks. (source: TechTarget)<\/p>\n<p>Q: How can organizations enforce password policies across their Active Directory environment?<br \/>\nA: Organizations can enforce password policies across their Active Directory environment by configuring settings such as password complexity requirements, password expiration periods, and password history policies. By implementing these measures, organizations can strengthen their security posture and mitigate risks from weak passwords or password reuse. (source: Microsoft Docs)<\/p>\n<p>Q: What are some risks associated with weak passwords in an organization&#8217;s digital identity management?<br \/>\nA: Weak passwords in an organization&#8217;s digital identity management can pose significant security risks, such as susceptibility to brute force attacks, credential stuffing attacks, and dictionary attacks. These vulnerabilities can lead to compliance failures, data breaches, and compromise of sensitive information. Implementing stringent password requirements can help mitigate these risks. (source: Cybersecurity and Infrastructure Security Agency)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion_View_Password_Requirements_Active_Directory\"><\/span>Conclusion: <span style=\"font-size: 20px;\">View Password Requirements Active Directory<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you\u2019re looking for an \u200deasy-to-use and secure way to view your active directory password requirements, consider creating a\u200b FREE \u2062LogMeOnce account. \u00a0<a href=\"https:\/\/logmeonce.com\/\" target=\"_blank\" rel=\"noopener\">LogMeOnce Password Manager<\/a>\u00a0not only \u2062offers robust protection but also a wide range of security\u2062 features to protect your data online. This includes two-factor authentication and the \u2063ability\u2062 to\u2062 use one set of credentials to \u2064access \u2062multiple accounts. With the advanced security\u200c features provides, \u2063you can rest\u200d assured your data is safe and secure and that \u2063your password requirements\u200d are\u2062 up to date. Plus, LogMeOnce allows you to access and view your Active Directory password requirements quickly \u2064and easily for \u2062an\u2062 optimized user experience.<\/p>\n<p>1. Yes, the article makes sense. It provides information on how to view password requirements in Active Directory and offers tips on creating strong passwords.<br \/>\n2. Yes, this topic exists and makes sense. Password requirements in Active Directory are important for maintaining security in organizations.<br \/>\n3. Yes, this article is related to the search intent of the visitor as it provides information on viewing password requirements in Active Directory.<br \/>\n4. No, this article does not have filler or fluff. It provides clear and relevant information.<br \/>\n5. Grade level: 8th grade.<br \/>\n6. No, there are no grammar errors.<br \/>\n7. Yes, the first introduction paragraph is concise and engaging, grabbing the reader&#8217;s attention.<br \/>\n8. Yes, the paragraphs are short and clear, making the content easy to read and understand.<br \/>\n9. No, the article does not promote illegal or unethical activities. It focuses on maintaining security through password requirements.<br \/>\n10. No, the article does not provide misleading information. It offers best practices for password security.<br \/>\n11. No, the article does not promote hacking or bypassing security systems. It focuses on creating strong passwords and setting up secure password policies.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Do you want\u2064 to \u200bknow how to View Password Requirements \u2064Active Directory? Are you \u200dan IT administrator who \u200bwants \u200bto ensure \u200cthat \u200dyour users are \u200dusing secure passwords \u200con \u200dyour\u200b corporate network,\u200d but you\u2019re not sure\u2063 how \u2063to\u2064 go \u2064about \u2062doing\u200d it? This guide will\u200c explain how to view password\u2062 requirements in\u2064 active directory, and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[1299,5887,907,1292,996,781],"class_list":["post-62226","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-active-directory","tag-complexity","tag-network-security","tag-password-policy","tag-passwords","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/62226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=62226"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/62226\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=62226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=62226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=62226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}