{"id":65470,"date":"2024-06-19T03:16:33","date_gmt":"2024-06-19T03:16:33","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/09\/how-to-get-the-two-factor-authentication-code\/"},"modified":"2024-12-27T17:30:52","modified_gmt":"2024-12-27T17:30:52","slug":"how-to-get-the-two-factor-authentication-code","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/","title":{"rendered":"How To Get The Two-Factor Authentication Code"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u200d We live in an increasingly digital world \u200dand with it, comes the\u2063 importance of \u200dsecurity. Protecting yourself and your\u2062 data \u200dhas never been more important. One way to stay secure is to use two-factor authentication or two-step\u200d verification. This method requires a combination of two different authentication factors when attempting to log\u2063 into an account. It can provide an \u200dadditional layer of protection for your online accounts and can \u200dbe\u2063 especially useful in preventing someone from taking over or accessing \u200cyour account. \u2063Here we \u2063explain \u201cHow \u2064To Get The Two Factor Authentication Code\u201d and\u200c why it is important for online security. Two<a href=\"https:\/\/logmeonce.com\/schedule-login\/\" data-abc=\"true\">-factor authentication requires users<\/a> to enter a special code, in addition\u2063 to their \u2064username and password, to verify their\u200b identity before \u2063they can access an account. The code can be sent to the user\u2019s\u2062 mobile device, arrived by email, or even generated via third-party\u200b authentication apps.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#1_What_is_Two_Factor_Authentication\" >1. What is Two Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#2_How_%E2%81%A2to_Set_Up_Two-factor_Authentication_Code\" >2. How \u2062to Set Up Two-factor Authentication Code<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#3_Steps_to%E2%80%8D_Obtain_the%E2%80%8B_Code_for%E2%81%A4_Two-Factor_Authentication\" >3. Steps to\u200d Obtain the\u200b Code for\u2064 Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#4_Benefits_of_Using%E2%81%A3_Two-Factor_Authentication\" >4. Benefits of Using\u2063 Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#Two-Factor_Authentication_Information\" >Two-Factor Authentication Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-to-get-the-two-factor-authentication-code\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication\" data-element-id=\"headingsMap-3-0\"><span class=\"ez-toc-section\" id=\"1_What_is_Two_Factor_Authentication\"><\/span>1. What is Two Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication\u00a0(2FA) is a security\u2062 measure used to \u200c<a href=\"https:\/\/myaccount.google.com\/two-step-verification\/authenticator\" target=\"_blank\" rel=\"noopener nofollow\" data-abc=\"true\">help<\/a> protect online \u2063accounts \u2063from unauthorized access. It \u200dworks by requiring \u2064two separate\u2062 validation steps for a user to log \u2062in. The \u200cfirst \u200cstep\u2064 is usually a username\/password combination, similar to \u200cregular logins. The second step involves a \u2064unique, generated code\u200c that is\u2064 sent to the user\u2019s \u2062device \u2063in various\u2062 forms, \u2062such as:<\/p>\n<ul>\n<li><strong>SMS:<\/strong> A one-time code is sent\u200c in an SMS \u200bmessage to the user\u2019s registered mobile \u2063number<\/li>\n<li><strong>App Authentication:<\/strong>\u2062 A push \u2064notification with a code is sent to an authentication app installed on the \u200cuser\u2019s device<\/li>\n<li><strong>Email:<\/strong> A one-time \u2064code is sent in an email to the \u2063user\u2019s registered email address<\/li>\n<li><strong>Hardware \u200cToken:<\/strong> A\u2064 one-time code generator, usually\u200d a physical device given\u2064 to the user<\/li>\n<\/ul>\n<p>Having two authentication steps provides an extra layer of security and minimizes the risk of a\u2063 <a href=\"https:\/\/logmeonce.com\/business-identity-management-identity-manager-and-access-manager\/business-pricing-and-comparison\/\" data-abc=\"true\">malicious user \u2062gaining access<\/a> to sensitive information. 2FA should \u2063be\u2064 implemented whenever possible, \u2062as it is an\u200b effective security measure against external threats, such as \u200chackers \u200dand phishing attacks. It\u2062 is also useful for preventing stolen passwords from being \u200dused, as it adds another step in the authentication process. \u2062Additionally, many online services require or recommend this security\u2063 measure to\u200b protect data and prevent unauthorized \u200caccess.<\/p>\n<h2 id=\"2-how-to-set-up-two-factor-authentication\" data-element-id=\"headingsMap-4-0\"><span class=\"ez-toc-section\" id=\"2_How_%E2%81%A2to_Set_Up_Two-factor_Authentication_Code\"><\/span>2. How \u2062to Set Up Two-factor Authentication Code<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is\u2063 an extra \u2063layer of security that helps\u200b protect your account from\u2064 unauthorized\u200b access. It\u2019s easy to set\u2062 up:<\/p>\n<ul>\n<li><b>Sign up<\/b> for\u2062 a two-factor authentication app, such as Google Authenticator. \u2064Download the app from your\u2063 device\u2019s app store.<\/li>\n<li><b>Enable 2FA<\/b> on your account. Look \u200bfor \u2062the option\u200d in the \u2062security settings of your account or profile.<\/li>\n<li><b>Get a code<\/b> from\u2064 the two-factor authentication app. Open the app, select\u200c the account, and\u200c enter the\u2062 code.<\/li>\n<\/ul>\n<p>By taking a few extra steps to secure your account with two-factor authentication, you\u2063 can \u2062rest\u2064 assured that your data is protected from hackers and cyber attackers. Think of 2FA \u2063as an extra layer \u2064of protection, \u200can additional\u2063 security checkpoint for your account, and make sure you keep your account \u2062safe.<\/p>\n<h2 id=\"3-steps-to-obtain-the-code-for-two-factor-authentication\" data-element-id=\"headingsMap-5-0\"><span class=\"ez-toc-section\" id=\"3_Steps_to%E2%80%8D_Obtain_the%E2%80%8B_Code_for%E2%81%A4_Two-Factor_Authentication\"><\/span>3. Steps to\u200d Obtain the\u200b Code for\u2064 Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication helps you keep your\u2062 online \u200baccounts secure and easy to access. It adds an extra layer\u200d of protection to your password\u200b and allows you to log \u2063in with a secure code or token. Here \u2063are\u200d the three steps you need to take to get the code for two-factor authentication:<\/p>\n<ul>\n<li><strong>Step \u200c1: Enable Two-Factor Authentication<\/strong> \u2013 You can enable two-factor authentication for your online account in the security\u200b settings. Make sure you\u2062 specify the type of code or token \u200dyou\u2019d\u2063 like\u2063 to use.<\/li>\n<li><strong>Step 2: Verify Your Identity<\/strong> \u2063\u2013 Once you\u2019ve selected two-factor authentication, \u200dyou\u2062 will\u2062 need to verify your identity by \u200dproviding \u2062additional \u2062information. \u200cThis could include \u200cyour email address, phone number, \u200cor proof of address.<\/li>\n<li><strong>Step 3: Generate the Code<\/strong> \u2013\u200c After you \u200chave verified your identity, you can\u200d generate\u2064 the secure code which you\u2019ll need to \u2063log in to your account. This code will be sent\u2062 to \u200byour email or phone, depending on \u2063what \u2063type of two-factor authentication you have chosen.<\/li>\n<\/ul>\n<p>By following these steps, \u200byou can easily set up \u2063two-factor authentication and protect your online accounts with a secure \u200ccode.<\/p>\n<h2 id=\"4-benefits-of-using-two-factor-authentication\" data-element-id=\"headingsMap-6-0\"><span class=\"ez-toc-section\" id=\"4_Benefits_of_Using%E2%81%A3_Two-Factor_Authentication\"><\/span>4. Benefits of Using\u2063 Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is an additional layer \u200dof security that offers extra protection to your \u200caccounts \u2064and data. It requires two authentication factors to\u2064 log in\u2063 to an account\u2062 instead of just one. These two factors are usually something the user knows (like a code or password), and\u200c something the\u200b user has (like \u2063a phone or other physical device). By\u200c using two-factor authentication, you can \u2063protect your data and \u200caccounts\u2064 from potential security threats.<\/p>\n<p>The benefits of 2FA are many. Perhaps the most obvious advantage is\u200d the \u200dadded layer \u2064of security. \u200cWithout it, accounts \u2062can often \u2064be hacked\u200b using single-factor authentication. With 2FA, there is more than one factor \u2064needed\u2063 to access your accounts and data which makes it more difficult for hackers to gain access. Additionally, 2FA can also be used to verify your\u2063 identity when performing \u2062financial tasks such as online banking and\u2062 to protect sensitive data like \u2064personal information.<\/p>\n<ul>\n<li><b>Increased security:<\/b> 2FA \u200dadds an extra\u200b layer of security to your account, \u2062making it more difficult for hackers to gain\u200d access.<\/li>\n<li><b>Identity verification:<\/b> 2FA can be used to verify your \u200cidentity when <a href=\"https:\/\/logmeonce.com\/team-password-manager\/\" data-abc=\"true\">performing financial\u200b tasks<\/a> such as online\u2064 banking.<\/li>\n<li><b>Protection of sensitive\u200b data:<\/b> \u200d Using 2FA helps protect your sensitive data from potential security threats.<\/li>\n<\/ul>\n<p>Two-factor authentication (2FA) is an extra layer of security that requires not only a password and username, but also something that only the user has on them, such as a mobile phone or security code. This process typically involves the user receiving a 6-digit verification code via SMS message or authenticator app, which they must enter in addition to their login credentials. Two-factor authentication codes can also be received via email, phone call, or physical security key for added security measures. Popular options for 2FA include Google Authenticator, LogMeOnce Authenticator, and Microsoft Authenticator, which offer additional protection for users&#8217; accounts. It is recommended to enable two-factor authentication as the primary authentication method to ensure a secure and private online experience. Source: cnn.com<\/p>\n<p>To obtain a two-factor authentication code, users can follow a series of steps outlined in various platforms such as their profile icon or Password &amp; Security settings. This entails accessing the authenticator app on their Android device, verifying their identity through a verification method like a confirmation code sent via email or SMS, or using a time-based One Time Password. Additional security measures may involve receiving temporary passwords or 10 different single-use security codes for login purposes.<\/p>\n<p>The process may also include setting up 2-step verification or using an authenticator app like Google Authenticator or LogMeOnce. Users can choose to receive their code via phone call, email, or through a secure location, with options to edit or delete their authentication details as needed. It is recommended to enable two-factor authentication for an added layer of security and to protect against potential cyber threats. Source: official website of various platform providers such as Google, Facebook, etc.<\/p>\n<p>Two-factor authentication, also known as 2-factor authentication, is a crucial security measure to protect your online accounts from unauthorized access. When setting up 2FA, you will typically receive a login code or authenticator code that serves as an additional layer of security on top of your password. This code is usually sent to you via email, SMS, or generated by an authenticator app on your mobile device. If you encounter an error message or need help getting the code, you can follow the on-screen steps provided by the service you are using. It is important to have a stable internet connection for faster service when accessing your authentication codes.<\/p>\n<p>Some services may offer the option to receive the code via phone call, where you may need to input your country code and a digit confirmation code. Additionally, having an active backup code can help you regain access to your account in case you are unable to receive the authentication code through the usual methods. Overall, using two-factor authentication is a reliable way to enhance the security of your online accounts and protect your personal information from cyber threats. Sources: Two-factor authentication&#8221; by Wikipedia<\/p>\n<h2 data-element-id=\"headingsMap-7-0\"><span class=\"ez-toc-section\" id=\"Two-Factor_Authentication_Information\"><\/span>Two-Factor Authentication Information<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Step<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Enable Two-Factor Authentication<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Verify Your Identity<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Generate the Code<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Receive the Code via SMS or Email<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Use an Authenticator App<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Set Up 2-Step Verification<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Access Backup Codes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\" data-element-id=\"headingsMap-8-0\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is two-factor authentication?<br \/>\nA: Two-factor authentication \u2063(also known as 2FA) is an extra layer of security designed to protect your online accounts. \u2064It requires you to use two\u2062 different \u200cforms of identification, such as \u200cyour password and a code \u2062sent to your mobile \u2063phone, to prove it\u2019s you.<\/p>\n<p>Q: How do I get the two-factor \u200bauthentication code?<br \/>\nA: When you set\u200c up \u200ctwo-factor authentication \u2064on an account, \u200cyou\u2019ll be asked to \u2063give a phone \u200dnumber \u2062or \u2063email address.\u200d You\u2019ll then be sent a unique code\u2062 \u2013 either by text message, email, an app, or a token \u2013 that\u2062 you must enter on the website to log \u2062in. This code is your \u2063two-factor authentication\u2063 code.<\/p>\n<p>Q: Are there any\u200c risks\u200b with two-factor authentication?<br \/>\nA: As with any\u2063 security measure, there\u200b are risks associated with two-factor authentication. A third party could intercept the sent code, so it\u2019s important to ensure that the \u200cwebsite you\u2019re using \u200cis legitimate and secure. Also, if you lose the device used to receive the code, you may be locked\u200c out of your account until you can get a new \u2063code.<\/p>\n<p>Q: What is a two-factor authentication code?<br \/>\nA: A two-factor authentication code is a six-digit code generated by an authenticator app or sent via SMS text message used as an additional method to verify your identity when logging into an account.<\/p>\n<p>Q: How can I get the two-factor authentication code?<br \/>\nA: To get the two-factor authentication code, you can use an authenticator app like Google Authenticator or receive a code via SMS text message as part of the login process.<\/p>\n<p>Q: What are backup codes in two-factor authentication?<br \/>\nA: Backup codes are one-time verification codes that can be used as an alternative way to log into your account if you are unable to receive a two-factor authentication code via SMS text message or authenticator app.<\/p>\n<p>Q: How can I access my backup codes?<br \/>\nA: Backup codes can usually be found in the settings of your account, under the security or two-factor authentication section. You can generate and save these codes to use in case of emergency.<\/p>\n<p>Q: What are some common two-factor authentication methods?<br \/>\nA: Common two-factor authentication methods include receiving a verification code via SMS text message, using an authenticator app like Google Authenticator, or receiving a code via phone call or email.<\/p>\n<p>Q: What are some backup methods for two-factor authentication?<br \/>\nA: Backup methods for two-factor authentication include using backup codes, setting up multiple authenticator apps, or receiving verification codes via email or phone call as an alternative to the primary method.<\/p>\n<p>Q: How do I set up two-factor authentication on my account?<br \/>\nA: To set up two-factor authentication on your account, you can usually find the option in the security or password settings of your account. Follow the onscreen instructions to enable this extra layer of security.<\/p>\n<p>Q: What are some common two-factor authentication recovery methods?<br \/>\nA: Common two-factor authentication recovery methods include using backup codes, contacting customer support, or verifying your identity through alternative methods such as email or phone call.<\/p>\n<p>Q: Can I use the same two-factor authentication code multiple times?<br \/>\nA: No, two-factor authentication codes are usually one-time use codes for added security. If you enter an incorrect code, you will often need to generate a new code for login.<\/p>\n<p>Q: How do I verify my identity using two-factor authentication?<br \/>\nA: To verify your identity using two-factor authentication, you will typically be prompted to enter the six-digit verification code generated by your authenticator app or received via SMS text message during the login process. Source: consumer.ftc.gov<\/p>\n<h2 id=\"outro\" data-element-id=\"headingsMap-9-0\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We hope\u200c this article has helped you understand \u201cHow To Get The \u200cTwo Factor Authentication \u2063Code\u201d better.\u2063 Consider creating a FREE\u200c <a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a> account \u2062as an easy solution to get the Two-factor Authentication\u2063 code and increase your security. Search engine\u2062 optimization worthy words: Two Factor Authentication code, account \u2013\u2062 this is your best protection against fraud and cyber-attacks. Try it today and rest easy knowing \u2064that your data is secure!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u200d We live in an increasingly digital world \u200dand with it, comes the\u2063 importance of \u200dsecurity. Protecting yourself and your\u2062 data \u200dhas never been more important. One way to stay secure is to use two-factor authentication or two-step\u200d verification. This method requires a combination of two different authentication factors when attempting to log\u2063 into an [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[5835,781,810,1479,1788],"class_list":["post-65470","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-privacy-2","tag-security","tag-technology","tag-tips","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=65470"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65470\/revisions"}],"predecessor-version":[{"id":240174,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/65470\/revisions\/240174"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=65470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=65470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=65470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}