{"id":65003,"date":"2024-06-19T00:58:31","date_gmt":"2024-06-19T00:58:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/08\/which-is-an-example-of-two-factor-authentication\/"},"modified":"2024-07-21T14:58:13","modified_gmt":"2024-07-21T14:58:13","slug":"which-is-an-example-of-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/","title":{"rendered":"Which Is An Example Of Two Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2063 Two factor authentication has become increasingly important \u200bin today\u2019s \u2063digital world. It is a critical\u2064 layer\u200d of\u200c security designed to protect \u200busers\u2019 private data \u200dand information. But what is two factor authentication and\u200c which is an example\u2064 of two factor authentication? Two \u2064factor authentication (2FA) is \u2063a process where two independent \u2063pieces \u2063of\u2063 evidence (or factors) are required to verify the identity \u200dof the user. \u2064For example, secure\u200c online accounts use \u2064two factor\u200b authentication by combining something \u200da user knows (such\u200b as \u200ca username\u2063 and password) with something a user \u200dhas (such as a smartphone). By having two independent \u2063pieces of evidence, it \u2063makes \u2063it \u200cmuch more difficult for anyone to access the account without \u200bpermission.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#1%E2%81%A2_What_Is%E2%80%8B_Two_Factor%E2%80%8B_Authentication\" >1.\u2062 What Is\u200b Two Factor\u200b Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#2%E2%80%8B_Which_Is_An_Example_Of_Two_Factor_Authentication_Examples_of_%E2%80%8BTwo_%E2%81%A3Factor_%E2%80%8BAuthentication\" >2.\u200b Which Is An Example Of Two Factor Authentication: Examples of \u200bTwo \u2063Factor \u200bAuthentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#3_How_Can%E2%81%A3_Two_Factor_Authentication_%E2%81%A4Increase_Your_%E2%81%A2Security\" >3. How Can\u2063 Two Factor Authentication \u2064Increase Your \u2062Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#4_%E2%80%8CTake%E2%81%A2_Action_Protect_Yourself_With_Two_Factor_%E2%80%8CAuthentication\" >4. \u200cTake\u2062 Action: Protect Yourself With Two Factor \u200cAuthentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#Benefits_of_Two-Factor_Authentication\" >Benefits of Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/which-is-an-example-of-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1%E2%81%A2_What_Is%E2%80%8B_Two_Factor%E2%80%8B_Authentication\"><\/span>1.\u2062 What Is\u200b Two Factor\u200b Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor\u2062 authentication \u2063is\u2064 an authentication method that involves two separate forms \u2063of identification. It\u2062 is designed to\u2062 add\u2064 an extra layer\u2063 of security \u200dfor online\u200d accounts\u2063 and help\u200d keep \u200dhackers\u2064 out. 2FA\u200c requires two pieces of evidence (or \u201cfactors\u201d) to establish a user\u2019s identity. These factors include: something\u200d you know \u200b(like a \u2062password or PIN), \u200dsomething you\u200b have (like an\u200c code sent to\u200b your \u2063cell\u200d phone), \u2064or something you are (like a fingerprint \u200bor retina \u2064scan).<\/p>\n<p>When you use 2FA, you are asked to provide \u2064two\u200c pieces of information to verify\u2062 your account. For example, you\u2064 may enter your\u2062 password\u200d and then\u200b be prompted to enter an authentication code sent to your cell phone.\u2063 Once both pieces\u200b of information are successfully validated, you will be granted access to the\u200d account. 2FA can also be\u200b used\u2063 in\u2064 combination with secure online transactions such as shopping, banking, \u2062and transferring \u200cfunds.\u200d Because it requires two independent factors, it \u200dis incredibly secure and\u200c is\u200c becoming\u2062 the standard \u200dfor online \u200csecurity.<\/p>\n<h2 id=\"2-examples-of-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"2%E2%80%8B_Which_Is_An_Example_Of_Two_Factor_Authentication_Examples_of_%E2%80%8BTwo_%E2%81%A3Factor_%E2%80%8BAuthentication\"><\/span>2.\u200b Which Is An Example Of Two Factor Authentication: Examples of \u200bTwo \u2063Factor \u200bAuthentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication is a great way to\u200c keep your online\u200d accounts safe and secure. It relies\u2063 on\u200c something you\u2062 know \u2062(like a password) and\u200b something you \u2063have (like \u2064a phone or \u200dyour finger). Here are \u200ba few examples \u200dof\u2062 two-factor authentication.<\/p>\n<ul>\n<li><strong>Text message authentication<\/strong>: With\u200b this method, \u2064after you enter your \u2064password\u200c and username, a second\u200b authentication message\u200d is\u2063 sent to your phone. \u2063This \u2063message is \u200ca \u2064one-time code you \u2062must\u2064 enter \u2062into\u2062 the website\u200b to \u2064proceed.<\/li>\n<li><strong>Biometric authentication<\/strong>: Rather \u2064than entering a \u2063code\u2062 or \u200btoken \u2063provided \u2062by the website\u2064 or app, you \u2064use biometric \u2062factors\u200c such \u200bas face\u200d scans,\u200d fingerprint scans,\u200c or voice recognition in order to gain access to your account.<\/li>\n<li><strong>Security\u200d key authentication<\/strong>: \u200dThis\u2062 method requires a\u200c physical security key, like\u2064 a USB\u200b drive. \u200bWhen logging in, you insert the security key \u2063into\u200c your device and must \u2062press a button or\u2063 turn the key after entering your password \u2063to \u2063finish the authentication process.<\/li>\n<\/ul>\n<p>Of course, there are other \u200cforms\u200b of \u200dtwo-factor authentication \u200davailable. Depending \u2064on your \u2062online \u2063needs,\u200d they can be extremely helpful in keeping\u2064 your accounts safe. While it may \u200btake a few extra\u200d steps, the extra security is well worth the \u200deffort.<\/p>\n<h2 id=\"3-how-can-two-factor-authentication-increase-your-security\"><span class=\"ez-toc-section\" id=\"3_How_Can%E2%81%A3_Two_Factor_Authentication_%E2%81%A4Increase_Your_%E2%81%A2Security\"><\/span>3. How Can\u2063 Two Factor Authentication \u2064Increase Your \u2062Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two \u2062Factor Authentication (2FA) \u2063is an effective\u2064 way to increase your security, adding an extra layer of\u200c protection to your credentials. It makes \u200dit more difficult for hackers\u2062 or malicious\u200d attackers \u2062to access your accounts, \u200dby requiring a secondary authentication\u200d code. By requiring two verification factors, it reduces the \u2062risk that your accounts\u2064 and \u2063personal\u200c information is\u200c accessed \u2064by people who don\u2019t have permission to do so.<\/p>\n<p>The\u2063 great thing \u200babout 2FA is that \u2062it \u2064works \u2063with almost all popular services.\u200c Email providers, social media accounts, cloud \u200bstorage\u2063 services \u200d- in almost \u200call of these\u200c cases, you\u2019re able to \u200bset up \u2062two-factor authentication. You\u2019ll need to \u2062enter\u200b the additional\u2063 security \u2062code \u200cwhen you \u200clog in to your account from a new\u200b device or \u200blocation. These\u2064 codes are unique \u2064each time you log in, \u200band can also \u200dbe \u2064sent via \u200btext messages or\u200c authenticator apps for added convenience.<\/p>\n<p>There\u2064 are several benefits\u2063 to using two-factor authentication. It gives\u2064 you the peace of mind that your accounts\u200d are more secure, and it also adds an extra layer of\u200d protection\u200d against phishing attempts. Furthermore,\u2062 it is \u2064generally\u2063 easy \u2064to set up and\u200d maintain, and it is \u200bbecoming more commonplace these \u2063days, with popular services like \u2063Google \u2063and\u200d Microsoft \u2063offering 2FA support for \u200ctheir \u200bcustomers.\u2062<\/p>\n<ul>\n<li>Adds an extra layer of security to your credentials<\/li>\n<li>Works with most\u2063 popular \u2064services<\/li>\n<li>Additional\u200c authentication code required to log in to\u2062 your account<\/li>\n<li>Codes\u200d can be \u2062sent\u2063 via\u200c text message \u2062or\u2064 authenticator\u200d app<\/li>\n<li>Gives you \u200bpeace of \u2063mind<\/li>\n<li>Additional protection \u200dagainst phishing \u200dattempts<\/li>\n<li>Easy\u2064 to\u2064 set \u2062up and\u200b maintain<\/li>\n<li>Supported by popular services \u2062like Google and \u2062Microsoft<\/li>\n<\/ul>\n<h2 id=\"4-take-action-protect-yourself-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_%E2%80%8CTake%E2%81%A2_Action_Protect_Yourself_With_Two_Factor_%E2%80%8CAuthentication\"><\/span>4. \u200cTake\u2062 Action: Protect Yourself With Two Factor \u200cAuthentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Do you\u200d want to protect yourself against \u200bhacks? Two-factor authentication (2FA) is \u200da simple yet \u2064powerful way\u2062 to protect your accounts. 2FA requires you\u2064 to \u200center \u2062two pieces of\u2063 information before you\u2019re able to log \u2064in. This makes \u200bit much more \u200cdifficult for hackers to\u2062 access your data.<\/p>\n<p>There \u2063are \u200bseveral ways to set up 2FA. Here \u200dare \u2063the best ways\u200b you can protect yourself with \u2064two-factor authentication:<\/p>\n<ul>\n<li><strong>SMS verification: <\/strong>This \u200cis\u200b where you\u2063 receive\u2063 an SMS with \u2062a\u2062 code \u2062that you must enter for authentication.<\/li>\n<li><strong>Email verification: <\/strong>You will \u2062receive an email with a code that you must enter for authentication.<\/li>\n<li><strong>Authentication app: <\/strong>This is a special app \u2064that\u200d generates a code that you must enter \u200cfor authentication.<\/li>\n<li><strong>Physical tokens: <\/strong>These \u2062are hardware devices that generate a code \u200bthat you must enter\u2062 for authentication.<\/li>\n<\/ul>\n<p>2FA is one of the \u2062easiest \u2062and most effective \u200cways to protect \u200byourself online. \u200bIt takes only\u2064 a\u2064 few minutes to set up, and it\u2019s well worth\u200b the effort. \u200dSo don\u2019t wait, start protecting yourself with two-factor authentication today!<\/p>\n<p id=\"qa\"><strong>Strengthening Security with Multi-Factor Authentication (MFA)<\/strong><\/p>\n<p>Multi-factor authentication (MFA) is a crucial security measure to protect sensitive information and prevent unauthorized access to accounts. Various factors, such as mobile phones, physical devices, and verification codes, are used in combination to verify a user&#8217;s identity.<\/p>\n<p>This layered approach adds an extra layer of protection beyond just using a username and password. In fact, the use of MFA has been shown to significantly reduce the risk of unauthorized access and data breaches. According to a study by the Federal Trade Commission, two-factor authentication methods, such as time-based one-time passwords and hardware tokens, are effective in enhancing security for online services and financial transactions.<\/p>\n<p>Additionally, the deployment of hardware tokens and client-side software certificates can further enhance the security of authentication processes. It is important for businesses and individuals to implement strong customer authentication practices, as the costs for maintenance and support for MFA systems are minimal compared to the potential risks associated with data breaches. By investing in effective security solutions such as MFA, organizations can protect their networks, data, and online accounts from cyber threats.<\/p>\n<p>(Federal Trade Commission, 2017)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Two-Factor_Authentication\"><\/span>Benefits of Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefit<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Provides an extra layer of protection for online accounts<\/td>\n<\/tr>\n<tr>\n<td>Reduced Risk<\/td>\n<td>Decreases the likelihood of unauthorized access and data breaches<\/td>\n<\/tr>\n<tr>\n<td>Convenience<\/td>\n<td>Easy to set up and use for added security<\/td>\n<\/tr>\n<tr>\n<td>Phishing Protection<\/td>\n<td>Additional defense against phishing attempts<\/td>\n<\/tr>\n<tr>\n<td>Supported Services<\/td>\n<td>Can be used with popular services like Google and Microsoft<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is two \u200cfactor authentication?\u200c<br \/>\nA: Two factor authentication is a way of verifying your identity by \u2062using \u200btwo \u2062different types of information. \u2062This might include your password and a special code, your fingerprint and a pin number, or something else.<\/p>\n<p>Q:\u2063 What\u2062 is an example\u2064 of two factor \u200bauthentication?<br \/>\nA: An \u200bexample of \u2063two factor authentication is using a username and password,\u2062 as well as \u200da special code sent to \u2063your phone \u200dor\u2064 email address. This combination of two factors makes it much harder for someone to get access\u200d to\u200d your account.<\/p>\n<p>Q: What is multi-factor authentication?<br \/>\nA: Multi-factor authentication (MFA) is a form of authentication that requires users to provide more than one verification method before gaining access to a system or application. This typically involves something the user knows (such as a password), something the user has (such as a physical token or mobile device), or something the user is (such as a fingerprint or facial recognition).<\/p>\n<p>Q: How does multi-factor authentication enhance security?<br \/>\nA: Multi-factor authentication provides an additional layer of security beyond traditional passwords, making it more difficult for unauthorized users to gain access to sensitive information. By requiring multiple factors of authentication, MFA helps mitigate the risks of phishing attacks, social engineering attacks, and other security threats.<\/p>\n<p>Q: What are some common factors of authentication used in MFA?<br \/>\nA: Common factors of authentication used in multi-factor authentication include something the user knows (such as a password or PIN code), something the user has (such as a smartphone or security token), and something the user is (such as a fingerprint or facial recognition).<\/p>\n<p>Q: What are the different types of multi-factor authentication methods?<br \/>\nA: Multi-factor authentication methods can include two-factor authentication, three-factor authentication, risk-based authentication, adaptive authentication, and passwordless authentication. Each method offers varying levels of security based on the specific authentication factors used.<\/p>\n<p>Q: How does multi-factor authentication impact user experience?<br \/>\nA: While multi-factor authentication adds an extra step to the login process, it ultimately enhances security and protects user identities. By choosing secure methods such as SMS codes, push-based authentication, or biometric identifiers, organizations can provide a seamless and user-friendly authentication experience.<\/p>\n<p>Q: What are some security concerns related to multi-factor authentication?<br \/>\nA: Security concerns related to multi-factor authentication include the risk of man-in-the-middle attacks, unauthorized access to authentication tokens, and potential vulnerabilities in authentication mechanisms. Organizations must carefully consider the deployment of MFA solutions to address these security risks effectively.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;What Is Multi-factor Authentication (MFA)?&#8221; by IBM Security<br \/>\n&#8211; &#8220;The Ultimate Guide to Multi-factor Authentication&#8221; by Duo Security<br \/>\n&#8211; &#8220;Multi-factor Authentication: A Beginner&#8217;s Guide&#8221; by The Guardian<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Running into trouble with two factor authentication? Don\u2019t \u200bworry! \u2013 a \u200bstrong two-factor authentication\u2062 provider \u2013\u2063 is\u200d here to help. Creating\u200d an \u200caccount is easy \u2064and free! With their\u200b reliable\u2064 two-factor authentication\u2063 system,\u200c you\u200d can easily protect your \u2063account with multiple security layers.\u200b So\u2064 don\u2019t keep your important data vulnerable \u2064and create a free LogMeOnce\u2064 account today to enjoy \u200cthe benefits\u2062 of\u2062 secure two-factor authentication and \u2062keep \u200cyour data safe\u2063 from\u2063 prying \u200beyes! With \u200ctwo factor \u2063authentication and \u200b<a href=\"https:\/\/logmeonce.com\/\" target=\"_blank\" rel=\"noopener\">LogMeOnce Password Manager<\/a>, you \u200bcan rest assured\u200b that \u200byour information is well-protected.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2063 Two factor authentication has become increasingly important \u200bin today\u2019s \u2063digital world. It is a critical\u2064 layer\u200d of\u200c security designed to protect \u200busers\u2019 private data \u200dand information. But what is two factor authentication and\u200c which is an example\u2064 of two factor authentication? Two \u2064factor authentication (2FA) is \u2063a process where two independent \u2063pieces \u2063of\u2063 evidence [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2317,1294,1793,781,1788],"class_list":["post-65003","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-access-control","tag-authentication","tag-identity-verification","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=65003"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65003\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=65003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=65003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=65003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}