{"id":67229,"date":"2024-06-19T12:38:56","date_gmt":"2024-06-19T12:38:56","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/10\/how-to-implement-single-sign-on-using-active-directory\/"},"modified":"2024-08-20T13:40:14","modified_gmt":"2024-08-20T13:40:14","slug":"how-to-implement-single-sign-on-using-active-directory","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/","title":{"rendered":"How To Implement Single Sign On Using Active Directory"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2062For \u2064businesses\u200d looking \u200dfor a secure and cost-effective way to manage user authentication, implementing single sign on authentication using Active Directory can \u2064be an easy \u200dsolution. Single sign-on \u200butilizing \u200bActive \u200dDirectory provides businesses with a single, \u200dsecure login that\u2063 gives access to different applications and systems, and promotes easy \u200band <a href=\"https:\/\/logmeonce.com\/team-password-manager\/\">organized user account management<\/a>. In \u2064this \u2064article we will discuss how to use single\u2063 sign on authentication with Active Directory, including the benefits, drawbacks, and pricing of this\u2064 process. Through this article, we\u200d will provide the necessary information businesses need to\u2062 decide if single sign on authentication with\u200c Active Directory is the right \u200bchoice for\u200b their user authentication needs. Keywords: \u200csingle sign on, Active Directory, authentication.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#1_Get_Started_%E2%81%A4With_Single_Sign_%E2%81%A4On_Using_Active_Directory\" >1. Get Started \u2064With Single Sign \u2064On Using Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#2%E2%80%8D_Learn_the_Benefits_of_Single_Sign_On_with_Active_Directory\" >2.\u200d Learn the Benefits of Single Sign On with Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#3_Step-by-Step%E2%81%A2_Guide_for_Implementing_SSO_With_%E2%81%A4Active_Directory\" >3. Step-by-Step\u2062 Guide for Implementing SSO With \u2064Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#4_Stay_Secure_While_Utilizing_Active_Directory_for%E2%81%A3_Single_Sign_On\" >4. Stay Secure While Utilizing Active Directory for\u2063 Single Sign On<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#Benefits_of_Single_Sign-On_with_Active_Directory\" >Benefits of Single Sign-On with Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-get-started-with-single-sign-on-using-active-directory\"><span class=\"ez-toc-section\" id=\"1_Get_Started_%E2%81%A4With_Single_Sign_%E2%81%A4On_Using_Active_Directory\"><\/span>1. Get Started \u2064With Single Sign \u2064On Using Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>What is Single Sign On?<\/b><\/p>\n<p>Single \u2064Sign On, also referred to as SSO, is a \u2063secure authentication method that <a href=\"https:\/\/logmeonce.com\/schedule-login\/\">involves digitally \u200dstoring credentials<\/a> across multiple applications. This provides users with\u2064 a single\u200b set of credentials to access multiple applications and websites.<\/p>\n<p><b>How to ?<\/b><\/p>\n<ul>\n<li>First, you need to\u2062 have \u2064Active Directory (AD) set \u2063up within \u200cyour organization.\u200b This will \u200binclude \u2064setting up an AD domain\u2063 controller, networking infrastructure, and configuring \u200bpermissions.<\/li>\n<li>Next, you need to configure your directory server \u200dfor Single Sign On (SSO). Depending on \u200dyour platform,\u200d this configuration may vary. Ensure that the respective framework supports \u2062SSO.<\/li>\n<li>You can then install and configure the SSO application into your organisation\u2019s \u2064Active Directory. The SSO application will then manage the users\u2019 access and help you\u200c control\u2062 which applications or websites \u200bthe users can access.<\/li>\n<li>Finally, you need \u2064to set up access control policies such as password\u2063 complexity,\u2063 user lockout and session timeout so that user \u200caccess is secure.<\/li>\n<\/ul>\n<p>Once\u2064 the setup is complete, the SSO application will help streamline the authentication process for\u200c the users by reducing the number of passwords\u200c they need to remember.<\/p>\n<h2 id=\"2-learn-the-benefits-of-single-sign-on-with-active-directory\"><span class=\"ez-toc-section\" id=\"2%E2%80%8D_Learn_the_Benefits_of_Single_Sign_On_with_Active_Directory\"><\/span>2.\u200d Learn the Benefits of Single Sign On with Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Keep Your Active Directory Safe and\u200c Secure<\/b><\/p>\n<p>Single Sign On (SSO) \u200cwith Active Directory is an\u200c easy and \u2063efficient \u2062way to secure your entire domain. This authentication \u200dprocess uses a single\u2062 set of \u200ccredentials to provide secure access\u200d to multiple connected systems. Your users can log in\u2062 with a single username and password, and you can enjoy the security benefits of having fewer passwords floating around. Plus, you can control who has \u200daccess to what, allowing\u200d you to quickly and accurately track \u200cany\u200d permission changes. \u2062<\/p>\n<p><b>Maintain Easy Accessibility<\/b><\/p>\n<p>Single Sign On\u200d simplifies \u2063user access\u2062 to \u200cyour \u200bentire domain. It eliminates the hassle \u200dof remembering multiple passwords and the security risks that come with it. Your users \u200ccan easily access all the \u2062applications they need with \u200cjust one\u200d username and\u200b password. Furthermore, Active\u200b Directory integration\u200d ensures that your users will have secure access which can be \u200bmonitored, maintained, and managed centrally. \u200cThis makes it easier for \u200dyou to manage your entire Active Directory infrastructure. \u200d<\/p>\n<ul>\n<li>No need \u200dto remember multiple passwords<\/li>\n<li>Secure access to multiple connected systems<\/li>\n<li>Centralized monitoring,\u2063 maintenance, and management of Active Directory infrastructure<\/li>\n<li>Quickly and accurately track permission changes<\/li>\n<\/ul>\n<h2 id=\"3-step-by-step-guide-for-implementing-sso-with-active-directory\"><span class=\"ez-toc-section\" id=\"3_Step-by-Step%E2%81%A2_Guide_for_Implementing_SSO_With_%E2%81%A4Active_Directory\"><\/span>3. Step-by-Step\u2062 Guide for Implementing SSO With \u2064Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Step 1: Configure \u200cActive Directory<\/b><\/p>\n<p>The \u2064first\u2063 step \u2064in implementing single sign-on (SSO) with Active Directory\u200b is to configure the\u2062 active directory\u2063 servers. This involves setting up the necessary\u2064 accounts, assigning the\u2062 correct permissions, and\u200c linking existing\u200c applications to the directory. Additionally, you\u2019ll\u2063 need to ensure that the \u200dnetwork\u200b settings and\u200c security protocol are properly\u2064 configured.<\/p>\n<p><b>Step 2: Install SSO Software<\/b><\/p>\n<p>Once \u2064the active directory settings have been configured, the next step is to \u2064install the SSO software. Depending on the specific SSO solution you are\u2062 using, \u2062you\u200b may need to\u200d configure\u2062 and install the following components:<\/p>\n<ul>\n<li>Web server<\/li>\n<li>SSO service<\/li>\n<li>Database server<\/li>\n<li>SSO-enabled application<\/li>\n<\/ul>\n<p>These components must\u200d be correctly installed and\u2063 configured for the SSO solution to \u2063function properly. \u200bAdditionally, you need to set up\u2063 the appropriate API calls so\u2063 that applications can communicate with the SSO service.\u200b After installation is complete, you will need to add the details, such as \u2062usernames and passwords, into the SSO solution. Finally, \u200byou will need to \u2063test the SSO service\u200c to ensure it\u200d is working correctly.<\/p>\n<h2 id=\"4-stay-secure-while-utilizing-active-directory-for-single-sign-on\"><span class=\"ez-toc-section\" id=\"4_Stay_Secure_While_Utilizing_Active_Directory_for%E2%81%A3_Single_Sign_On\"><\/span>4. Stay Secure While Utilizing Active Directory for\u2063 Single Sign On<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Maximize\u2064 Security with Active Directory SSO<\/b><\/p>\n<p>Active Directory (AD) is the go-to\u2064 for single sign-on (SSO) capabilities. \u2064Many organizations are jumping onboard\u200d and taking \u200badvantage \u2064of this technology to\u200c streamline the authentication process and provide users easy, secure access to\u2062 computing \u200cresources. But\u2064 there are some considerations you should take when deploying AD SSO. \u200bHere are four tips to help you\u2064 stay secure.<\/p>\n<ul>\n<li>Leverage Multi-Factor\u2064 Authentication\u2064 (MFA)<\/li>\n<li>Prioritize\u2064 User Access Level<\/li>\n<li>Enable Alerts<\/li>\n<li>Train Your Team<\/li>\n<\/ul>\n<p>MFA should always be enabled when deploying AD SSO. \u2064Utilizing a two<a title=\"How To Implement Single Sign On Using Active Directory\" href=\"https:\/\/logmeonce.com\/resources\/how-to-implement-single-sign-on-using-active-directory\/\">-step verification process prevents malicious \u2062actors<\/a> from gaining access to\u2063 your systems by requiring a\u200b unique,\u200c personal code, or token, in order to authenticate the user.<\/p>\n<p>Additionally, users should \u200bbe granted access to a certain resources \u200cand data according\u200d to their\u2063 role and access privileges. This helps ensure users only access information they need and prevents \u200daccidental (or\u2063 malicious) data breaches. An alert system is also useful to ensure improper user access and data breach attempts\u200b can be swiftly addressed by the \u2062IT team. Lastly,\u200d it\u2019s\u2062 critical to provide users with \u2063adequate training on how to properly use and\u200c secure AD\u2062 SSO\u200b capabilities.<\/p>\n<p>Implementing Single Sign-On (SSO) using Active Directory involves several key components and steps. Firstly, an organization must have an identity provider (IdP) such as Active Directory Federation Services (ADFS) set up to authenticate users. The service provider (SP) is the system or application that users are trying to access, which can include cloud applications or on-premise applications. SAML 2.0 is the authentication protocol commonly used for SSO. Party Trusts are established between the IdP and SP to enable secure communication.<\/p>\n<p>During the SSO process, a user enters their email address and is redirected to the IdP for authentication. Once a successful authentication is achieved, the user is granted access to the SP without the need to re-enter credentials. This streamlined authentication process is a simple solution for users, eliminating the need to remember multiple sets of credentials.<\/p>\n<p>Identity governance and management play a crucial role in SSO, ensuring only authorized users have access to specific resources. Claim rules are defined within ADFS to determine what information is passed between the IdP and SP during authentication. Additionally, the use of signing certificates and encryption helps secure the authentication process.<\/p>\n<p>Overall, implementing SSO using Active Directory streamlines access to cloud and on-premise applications, enhances security, and simplifies the user experience. It is a vital component of modern identity solutions for enterprise customers. Sources: Microsoft Docs, SSO Best Practices.<\/p>\n<p>In today&#8217;s digital age, where multiple usernames and passwords are required to access various applications and systems, the need for a secure and seamless authentication process has become more important than ever. This is where Single Sign-On (SSO) using Active Directory comes into play. By integrating your identity provider with a service provider through Active Directory Federation Services (AD FS) and implementing the Security Assertion Markup Language (SAML 2.0), organizations can streamline the authentication process for their users, providing them with a convenient and secure way to access cloud applications using their existing domain credentials.<\/p>\n<p>Realizing the importance of simplifying access control for enterprise customers, Microsoft has developed AD FS, a service that enables organizations to establish trust relationships between their Active Directory domain and external identity providers. By configuring Claims-based authentication and setting up relying party trusts within AD FS, organizations can ensure that only authenticated users are granted access to cloud applications. With the help of AD FS, organizations can also enforce additional authentication factors such as multi-factor authentication or password vaulting to enhance the security of their cloud identity.<\/p>\n<p>One of the key components of implementing SSO using Active Directory is the configuration of claim rules. Claim rules define how the attributes of a user are passed from the identity provider to the service provider during the authentication process. By configuring claim rules within AD FS, organizations can ensure that the necessary user information, such as email address or group membership, is properly mapped and shared with the service provider. This seamless exchange of information helps in providing a personalized user experience, as users are automatically logged in to cloud applications without having to enter their credentials multiple times.<\/p>\n<p>Furthermore, organizations can also take advantage of integration tools provided by AD FS to simplify the setup and management of SSO configurations. By using native tools such as the AD FS Management Console or PowerShell cmdlets, Application Administrators can easily configure SAML-based SSO for cloud applications without the need for additional complexity. Additionally, organizations can generate signing certificates to establish trust relationships with service providers, ensuring that only validated requests are accepted. By leveraging these configuration tools, organizations can streamline the deployment of SSO solutions and increase user adoption rates for cloud services.<\/p>\n<p>In conclusion, implementing SSO using Active Directory is a simple solution for organizations looking to enhance their identity management practices and provide users with a secure and convenient way to access cloud applications. By leveraging AD FS and SAML 2.0, organizations can establish trust relationships with external identity providers, configure claim rules to share user attributes, and utilize integration tools to simplify the setup process. With SSO capabilities in place, organizations can ensure that their users have seamless access to cloud applications while maintaining the highest level of security and compliance.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Single_Sign-On_with_Active_Directory\"><\/span>Benefits of Single Sign-On with Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefit<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Using SSO with Active Directory provides secure access to multiple systems with a single set of credentials.<\/td>\n<\/tr>\n<tr>\n<td>Simplified Access<\/td>\n<td>Users can easily access various applications with one username and password, reducing the hassle of multiple logins.<\/td>\n<\/tr>\n<tr>\n<td>Centralized Management<\/td>\n<td>Active Directory integration allows for centralized monitoring, maintenance, and management of user access.<\/td>\n<\/tr>\n<tr>\n<td>Track Permission Changes<\/td>\n<td>Easily track and manage user access permissions to ensure data security and compliance.<\/td>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Implementing MFA adds an extra layer of security to prevent unauthorized access to systems.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Single Sign On (SSO) and how is it implemented using Active Directory?<br \/>\nA: Single Sign-On (SSO) is a method that allows users to securely authenticate themselves once and access multiple applications without having to re-enter their credentials. In the context of Active Directory, SSO can be implemented using Active Directory Federation Services (AD FS) which supports the Security Assertion Markup Language (SAML) 2.0 standard to enable SSO between identity providers and service providers.<\/p>\n<p>Q: What is the role of Active Directory Federation Services (AD FS) in implementing SSO?<br \/>\nA: AD FS acts as the identity provider in the SSO setup, serving as the intermediary between the user and the service provider. It establishes trust relationships with external identity providers and service providers through the use of Claims-based authentication and facilitates the secure exchange of authentication and authorization data.<\/p>\n<p>Q: How are Party Trusts utilized in the implementation of SSO using Active Directory?<br \/>\nA: Party Trusts in AD FS are used to establish trust relationships between AD FS and external identity providers or service providers. By defining the settings such as relying party identifiers, encryption certificates, and claim rules, Party Trusts enable seamless authentication and authorization processes between different entities.<\/p>\n<p>Q: What is the significance of SAML 2.0 in the context of SSO using Active Directory?<br \/>\nA: SAML 2.0, a widely adopted authentication protocol, plays a crucial role in enabling secure communication and data exchange between identity providers and service providers in an SSO scenario. It defines the format of SAML assertions that contain user authentication information and permissions, facilitating seamless and secure access to cloud applications.<\/p>\n<p>Q: How does AD FS handle successful authentication in the SSO process?<br \/>\nA: When a user attempts to access a cloud application, AD FS initiates the authentication process and verifies the user&#8217;s identity based on the configured authentication settings. Upon successful authentication, AD FS issues a SAML token containing the necessary claims and assertions to the service provider, granting the user access to the application.<\/p>\n<p>Q: What are the key components involved in implementing SSO using Active Directory?<br \/>\nA: The key components include configuring AD FS, establishing trust relationships with external identity providers and service providers, defining claim rules, setting up SAML-based SSO profiles, and integrating with cloud applications and services. These components collectively enable a seamless SSO experience for users accessing various resources.<\/p>\n<p>Q: How can organizations benefit from implementing SSO using Active Directory?<br \/>\nA: Implementing SSO using Active Directory offers organizations a simple and secure solution for managing user identities and access to cloud applications. It enhances identity management, streamlines authentication processes, reduces the risk of password-related security incidents, and improves user experience by eliminating the need for multiple logins.<\/p>\n<p>Q: What are some best practices for ensuring a successful implementation of SSO using Active Directory?<br \/>\nA: Best practices include closely following the guidelines and recommendations provided by Microsoft for configuring AD FS, carefully setting up trust relationships and claim rules, regularly monitoring the SSO configuration for any potential issues, and conducting thorough testing to ensure seamless functionality across different devices and platforms.<\/p>\n<p>Q: Are there any certification programs or training courses available for professionals seeking to specialize in SSO implementation using Active Directory?<br \/>\nA: Yes, Microsoft offers certifications like the &#8220;Access Administrator Associate&#8221; certification that cover topics related to identity and access management, including SSO implementation using Active Directory. Additionally, there are online training courses and resources available to help professionals enhance their skills in deploying and managing SSO solutions.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>For businesses that strive to decrease their security risk and \u2062save hassle, Single \u2063Sign On using Active Directory is a must. Don\u2019t\u2063 get overwhelmed;\u200b the key \u2064is to find the perfect solution and \u2062implementation\u2064 process.\u2064 <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> provides a powerful\u200b and easy-to-use SSO\u200c experience. Create a FREE \u2062LogMeOnce account to get started on implementing Single \u2064Sign On Using Active Directory\u2064 today, and gain better password \u200dmanagement and improved security for all your login credentials. With LogMeOnce, \u2062you can easily implement \u2064and control Single\u200c Sign On \u2064Using Active Directory\u2063 with the security needed \u2063to protect your\u2064 business today.\u2063<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2062For \u2064businesses\u200d looking \u200dfor a secure and cost-effective way to manage user authentication, implementing single sign on authentication using Active Directory can \u2064be an easy \u200dsolution. Single sign-on \u200butilizing \u200bActive \u200dDirectory provides businesses with a single, \u200dsecure login that\u2063 gives access to different applications and systems, and promotes easy \u200band organized user account management. In [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19736],"tags":[1299,1294,781,8032,6502],"class_list":["post-67229","post","type-post","status-publish","format-standard","hentry","category-single-sign-on","tag-active-directory","tag-authentication","tag-security","tag-single-sign-on","tag-sso-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/67229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=67229"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/67229\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=67229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=67229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=67229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}