{"id":65305,"date":"2024-06-19T02:08:37","date_gmt":"2024-06-19T02:08:37","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/09\/whats-two-factor-authentication\/"},"modified":"2024-08-19T13:01:49","modified_gmt":"2024-08-19T13:01:49","slug":"whats-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/","title":{"rendered":"What&#8217;s Two Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>What\u2019s Two Factor \u200cAuthentication? It\u2019s an important \u200csecurity layer for personal\u200c data, websites, and accounts. Two-factor authentication \u200dadds an extra layer of protection for keeping\u200d your data safe from online \u200cthreats. \u2064It\u2019s becoming increasingly more common to be\u200d asked for Two-factor authentication as\u2062 an option when signing into accounts or websites. Just enter a password or PIN in \u200bcombination with a \u2064code that\u200d is sent to\u200d your phone or\u200d other device to gain access. It\u2019s \u2062like having an extra layer of security on top of \u2063your account, which makes\u2063 it\u2064 harder for criminals to break in and access your data without your \u200cauthorization. This article will cover key elements of What\u2019s Two Factor Authentication and provide insight on strengthening your security online with this powerful tool.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/#1_Unlock_the_Key_%E2%80%8Dto_Security_with_Two-Factor_Authentication\" >1. Unlock the Key \u200dto Security with Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/#2_Strengthen%E2%81%A3_Your_Online_Accounts%E2%80%8C_with_2FA\" >2. Strengthen\u2063 Your Online Accounts\u200c with 2FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/#3_What_is_%E2%80%8BTwo-Factor%E2%80%8B_Authentication\" >3. What is \u200bTwo-Factor\u200b Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/#4_Enjoy_Added_Peace_of_Mind_with_2FA\" >4. Enjoy Added Peace of Mind with 2FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlock-the-key-to-security-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Unlock_the_Key_%E2%80%8Dto_Security_with_Two-Factor_Authentication\"><\/span>1. Unlock the Key \u200dto Security with Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication\u2062 (2FA) is \u200can important tool \u200dfor <a title=\"What'S Two Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/whats-two-factor-authentication\/\">giving \u2062people greater control<\/a> over their security. 2FA offers an \u2063added layer of\u200d protection that requires both a \u200cusername\u2063 and password, as well as a second factor\u2063 such as\u2062 a code sent via SMS, a code \u2063from an authenticator app, or biometric authentication.<\/p>\n<p><b>Benefits of 2FA<\/b><\/p>\n<ul>\n<li>2FA makes it\u2063 more difficult for hackers to access \u200byour account.<\/li>\n<li>It\u2062 protects your online accounts by verifying your identity.<\/li>\n<li>Reduces \u200cthe chance of your accounts \u200bbeing compromised.<\/li>\n<li>Boosts your online data security \u2062and privacy.<\/li>\n<\/ul>\n<p>Setting \u2063up 2FA is easy, and it provides an \u200dimportant safeguard against identity theft, data breaches \u200c, and\u2064 other forms \u2063of cybercrime. Having \u200c2FA makes it\u2064 more difficult for malicious\u200c actors \u200dto take over your accounts, as any attempts\u200d to do so will require access to your second authentication \u2063factor. It\u2019s also important to remember \u200cto keep your authentication codes secure and updated.<\/p>\n<h2 id=\"2-strengthen-your-online-accounts-with-2fa\"><span class=\"ez-toc-section\" id=\"2_Strengthen%E2%81%A3_Your_Online_Accounts%E2%80%8C_with_2FA\"><\/span>2. Strengthen\u2063 Your Online Accounts\u200c with 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Enable 2FA or Two-Factor Authentication<\/b><\/p>\n<p>Two-factor authentication (2FA) is a\u2062 powerful security measure for your online <a href=\"https:\/\/www.twilio.com\/authy\/features\" target=\"_blank\" rel=\"noopener nofollow\">accounts<\/a>. It\u2064 provides an extra layer \u2064of verification that can help protect your account from unauthorized access\u2062 due to a stolen password. For example, if an attacker were to steal \u200cyour password, 2FA would require \u2062them to enter an additional code \u2064sent to \u2062your phone or email before they\u200b can access your account.<\/p>\n<p>It\u2019s \u2064simple to set up 2FA \u200dfor your online accounts:<\/p>\n<ul>\n<li>Get an authenticator app such as Google Authenticator or Authy.<\/li>\n<li>Verify the\u200d process \u2062by entering the code provided\u200b by the\u200d app when \u200dprompted.<\/li>\n<li>Log \u200bin using\u2064 your email address\u2064 or user ID and a password, plus\u200c the \u2064code provided.<\/li>\n<\/ul>\n<p>2FA is a great way \u2064to strengthen your online security, \u200cso\u200b don\u2019t be afraid to give it a try! It only takes a\u2064 few minutes \u200cto confirm your identity \u2063and \u200bprovide that extra peace of mind when logging into your\u200b accounts.<\/p>\n<h2 id=\"3-what-is-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_What_is_%E2%80%8BTwo-Factor%E2%80%8B_Authentication\"><\/span>3. What is \u200bTwo-Factor\u200b Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is a multi-layered security\u200d measure that\u2064 provides an additional layer of security for online accounts.\u2063 By \u2063implementing \u20622FA, users make it \u2062more \u2064difficult for hackers or\u2063 attackers to \u2064gain access to their accounts.<\/p>\n<p>There are several \u200dtypes of two-factor\u2062 authentication available, and \u200bthe most commonly\u2062 seen are:<\/p>\n<ul>\n<li><strong>Phone \u200cVerification:<\/strong> This is the \u2062most popular form of two-factor authentication. A one-time, \u200cunique code is sent to the user\u2019s phone upon sign-in to help verify \u2064their\u2062 identity.<\/li>\n<li><strong>Email Verification:<\/strong> Similar to phone verification, \u2064an email is sent to\u200d the user whenever they \u2063need to verify their account and confirm \u200dtheir identity.<\/li>\n<li><strong>Security Keys:<\/strong> \u2064 Security\u200d keys are unique pieces of authentication hardware \u2064that \u200ccan \u2062be used\u2062 to help prove identity and\u2063 access an account. Security keys\u200c typically come in the\u200c form of a USB stick or\u200b NFC-enabled \u2063tag that\u200b must\u200c be physically inserted \u2063into\u2064 a device before access \u2063is granted.<\/li>\n<\/ul>\n<p>By using two-factor authentication,\u2063 users can \u2064create \u2064an extra layer\u200c of\u200b protection against hackers\u2062 or attackers trying to gain\u2063 access to private accounts, data, or financial information.<\/p>\n<h2 id=\"4-enjoy-added-peace-of-mind-with-2fa\"><span class=\"ez-toc-section\" id=\"4_Enjoy_Added_Peace_of_Mind_with_2FA\"><\/span>4. Enjoy Added Peace of Mind with 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Authentication through two-factor authentication is an excellent preventive security measure that \u2062adds an extra layer of protection to important accounts. 2FA, also known \u200cas two-step verification, requires two \u2062different \u2062factors to confirm your identity, like \u200da code texted to your\u200d phone\u2064 and an actual password. \u200cHere are \u200dfour benefits\u2064 you can enjoy with 2FA:<\/p>\n<ul>\n<li><strong>Enhanced Security<\/strong> \u2013 2FA enables you\u200c to authenticate\u2062 your identity in \u200btwo different ways, thus making it\u2063 harder for attackers to access\u2064 your accounts. This\u2062 layer of security \u200bhelps keep your data and activities safe.<\/li>\n<li><strong>Added Convenience<\/strong> \u2013 Enabling 2FA\u2063 on \u2063your\u2064 accounts allows you to access them \u2063without having to remember\u200d long passwords. \u200dThe two-step \u200bprocess \u2062makes it simpler and more secure for you to log in.<\/li>\n<li><strong>Easier Account Recovery<\/strong> \u2013 If you forget your password, you can easily recover your\u2063 accounts with the \u200chelp of the\u2063 second\u2064 factor. This\u200b further ensures that you have \u2063full control over your accounts.<\/li>\n<li><strong>Peace of Mind<\/strong> \u2064\u2013 Knowing that \u200dyour accounts are secure with the help of 2FA gives you the peace\u200d of mind to focus on more \u200cimportant activities and enjoy your online \u2063experience with confidence.<\/li>\n<\/ul>\n<p>2FA is an \u2062important \u200bsecurity feature\u2064 that should\u2064 not be ignored. Once \u2064you have enabled\u200c it, you can relax knowing that your accounts\u2063 are \u200dwell protected.<\/p>\n<p>Two-factor authentication, also known as multi-factor authentication, is a form of authentication that requires two or more authentication factors for a user to gain access to an account or system. These authentication factors can include something the user knows (such as a password or security questions), something the user has (such as a physical device or token), or something the user is (such as a fingerprint or retinal scan).<\/p>\n<p>Two-factor authentication adds an extra layer of security beyond traditional passwords, helping to protect against various security risks such as man-in-the-middle attacks, brute force attacks, and social engineering attacks. It can be implemented through various methods such as time-based one-time passwords, push-based authentication, SMS passcodes, and biometric authentication.<\/p>\n<p>Two-factor authentication is commonly used in industries such as financial services, where the security of user identities and access to accounts is crucial. It is also increasingly being adopted by third-party applications and services to protect sensitive information and prevent unauthorized access. The deployment of hardware tokens, USB tokens, and software tokens has made it easier for individuals and organizations to implement multi-factor authentication systems.<\/p>\n<p>However, despite its benefits, two-factor authentication can also introduce additional challenges such as deployment costs, maintenance costs, and conflicts with business applications. Some companies may encounter additional support costs or the need for dedicated hardware devices and client software. Nonetheless, the adoption of two-factor authentication continues to grow as organizations strive to improve their security and protect against modern threats. References: Multi-factor authentication<\/p>\n<p>Two-factor authentication (2FA) is a crucial security measure that adds an extra layer of protection to the login process by requiring users to provide two separate forms of verification before gaining access to their accounts. This method is often employed to enhance security solutions and mitigate the risk of unauthorized access to sensitive information. Examples of factors used in the 2FA process include possession factors, such as mobile devices or physical tokens, and knowledge factors, like passwords or security codes.<\/p>\n<p>The use of 2FA helps to strengthen the level of security for remote access to various platforms and applications, ensuring that only authorized users can log in. In addition to enhancing security, 2FA also helps to prevent human error and common threats such as password theft or credential stuffing attacks. It provides an added layer of protection against cyber threats and unauthorized access attempts. Sources: Worldwide Secure Access Service Edge 2020 Hype Cycle &#8211; Gartner Research&#8221; (2017) and &#8220;Two-factor authentication for centuries &#8211; the Guardian<\/p>\n<p>Two-factor authentication, also known as multi-factor authentication, is a security process that requires users to provide two different authentication factors to verify their identity before gaining access to a system. These factors can include something the user knows (such as a password), something the user has (such as a smartphone or USB token), or something the user is (such as a fingerprint or other biometric trait). Two-factor authentication provides an additional layer of security beyond just a password, making it harder for unauthorized users to access sensitive information.<\/p>\n<p>This extra step in the authentication process helps protect against common forms of cyber attacks, such as phishing and password theft. Many organizations and service providers now implement two-factor authentication as a standard security measure to enhance the protection of sensitive data and reduce the risk of unauthorized access. Sources: Two-Factor Authentication: What It Is and Why You Should Use It<\/p>\n<p>Two-factor authentication, also known as multi-factor authentication, is a security process that requires users to provide two different authentication factors to verify their identity before accessing a system or account. This could involve something they know, such as a password, and something they have, such as a physical security token or a fingerprint reader. Two-factor authentication adds an extra layer of security beyond just a password, making it more difficult for unauthorized users to gain access. This method is commonly used by banks, email account providers, and other online services to protect sensitive information.<\/p>\n<p>It helps to prevent unauthorized access to accounts even if login credentials, like passwords, are compromised. Two-factor authentication methods include SMS-based verification, authentication tokens, and biometric authentication. It is considered a key best practice for securing online accounts and protecting data from cyberattacks. Sources: What is Two-Factor Authentication (2FA)?&#8221; Gemalto<\/p>\n<p>Two-factor authentication (2FA) is a form of multi-factor authentication that enhances security by requiring users to provide two different authentication factors before gaining access to a system. These factors can include something the user knows (such as a password), something they have (like a smart card or a mobile device), or something they are (such as a fingerprint or facial recognition). By combining these different factors, 2FA offers an additional layer of security beyond just a password.<\/p>\n<p>It helps protect against various security threats, including phishing attacks, password theft, and unauthorized access to accounts. Implementing 2FA can improve the overall security posture of an organization and enhance user experience by providing an extra level of protection for sensitive information. Adaptive authentication solutions are becoming increasingly popular, utilizing factors such as behavioral biometrics, location factors, and risk-based authentication to dynamically adjust security measures based on the context of the authentication request. Overall, 2FA plays a crucial role in bolstering cybersecurity defenses and safeguarding digital identities in an increasingly interconnected world (Raza, 2017).<\/p>\n<p>Two-factor authentication, also known as multi-factor authentication, is a type of authentication mechanism that requires users to provide two different types of verification before granting access to a system or account. This additional layer of security helps protect sensitive information from unauthorized access and minimizes the risk of security breaches. Some common factors used in two-factor authentication include something the user knows, like a password or PIN; something the user possesses, like a physical token or a smartphone; and something the user is, such as a fingerprint or facial recognition. By using multiple factors for authentication, two-factor authentication helps reduce the likelihood of unauthorized access and provides an extra level of security for users. Sources: Two-factor authentication<\/p>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is two-factor authentication?<br \/>\nA: Two-factor \u200dauthentication (2FA)\u200c is a way of verifying someone\u2019s identity \u200cby using two different \u2062forms of identification. This \u2063extra layer of security helps keep your information safe\u2063 by\u2064 making it \u200bharder \u2062for hackers and criminals to access accounts. With 2FA, you usually\u2064 have to input two pieces of information, such as\u200c a \u200bpassword and a unique code sent to your \u200cphone or email.<\/p>\n<p>Q: What is Two-Factor Authentication (2FA)?<br \/>\nA: Two-factor authentication (2FA) is a form of multi-factor authentication that adds an extra layer of security to the user authentication process. It requires users to provide two different factors of authentication before granting access to their accounts or systems.<\/p>\n<p>Q: What are the different factors of authentication in Two-Factor Authentication?<br \/>\nA: The factors of authentication in 2FA can include something you know (like a password or PIN code), something you have (like a mobile phone or hardware token), or something you are (like a fingerprint scan or facial recognition).<\/p>\n<p>Q: How does Two-Factor Authentication improve security?<br \/>\nA: Two-factor authentication enhances security by reducing the risk of unauthorized access. Even if a hacker manages to obtain a user&#8217;s password, they would still need the second factor (e.g., a verification code sent to the user&#8217;s mobile phone) to successfully log in.<\/p>\n<p>Q: What are some common methods used in Two-Factor Authentication?<br \/>\nA: Common methods of 2FA include SMS codes, mobile authenticator apps, security tokens, biometric scans, and push notifications.<\/p>\n<p>Q: What are some security concerns related to Two-Factor Authentication?<br \/>\nA: While 2FA adds an extra layer of security, it is not foolproof. Users should be vigilant against phishing attacks, social engineering tactics, and malware that can bypass or compromise the authentication process.<\/p>\n<p>Q: What are some examples of companies or services that offer Two-Factor Authentication?<br \/>\nA: Companies like Google, Facebook, Apple, Microsoft, and financial institutions often incorporate 2FA to protect user accounts and data.<\/p>\n<p>Q: How can users enable Two-Factor Authentication on their accounts?<br \/>\nA: Users can typically enable 2FA in the security settings of their accounts by following the onscreen instructions and choosing their preferred authentication method.<\/p>\n<p>Sources: Department of Homeland Security, The Guardian, Duo Mobile, 2017.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication is \u2064a worthwhile investment for anyone looking to secure their online presence. LogMeOnce\u2019s FREE \u200caccount makes setting \u200dup \u2062your\u200d Two-factor Authentication easy, so why wait? Create\u2063 your \u2064FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce\u2063<\/a> account \u200btoday and begin reaping the benefits of Two Factor \u200bAuthentication \u2013 stronger security for your online\u200b accounts, and peace\u2062 of mind for you. \u2062Have confidence in knowing that your \u200donline security is protected with Two Factor Authentication and LogMeOnce.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>What\u2019s Two Factor \u200cAuthentication? It\u2019s an important \u200csecurity layer for personal\u200c data, websites, and accounts. Two-factor authentication \u200dadds an extra layer of protection for keeping\u200d your data safe from online \u200cthreats. \u2064It\u2019s becoming increasingly more common to be\u200d asked for Two-factor authentication as\u2062 an option when signing into accounts or websites. Just enter a password [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2006,19823,1740,980,781,1788],"class_list":["post-65305","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-protection","tag-authentication-process","tag-cyber-security","tag-password-management","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=65305"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65305\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=65305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=65305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=65305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}