{"id":67480,"date":"2024-06-19T14:48:31","date_gmt":"2024-06-19T14:48:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/10\/single-sign-on-security\/"},"modified":"2024-08-19T13:08:54","modified_gmt":"2024-08-19T13:08:54","slug":"single-sign-on-security","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/","title":{"rendered":"Single Sign On Security"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Single Sign On\u200d (SSO)\u200b security enables easier access control and identity management for businesses and individuals. SSO \u200dsecurity improves the user experience by reducing\u200b the need for multiple\u2063 usernames\u2063 and passwords \u200dand \u200dproviding a secure\u2063 access\u200b point\u2062 for multiple applications. For companies, \u200cSSO security offers \u2062added \u2064layers of protection for their data and users. It\u2019s no wonder\u2064 that SSO security \u200dis becoming \u2063increasingly\u200d popular for businesses and individuals. With\u2063 the \u200cadvent of \u2064cloud technology, SSO security\u2064 has become even \u200cmore important \u200cfor companies, offering greater control and protection \u200dfrom cyber threats. With SSO security, businesses\u2063 can protect their sensitive data, while providing users \u2063with easy and\u2064 secure\u2064 access\u2063 to the\u2062 applications they need.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#1_What%E2%80%8D_is_Single_Sign_On_Security\" >1. What\u200d is Single Sign On Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#2_Benefits_%E2%81%A4of_Using_Single_Sign_On_Security\" >2. Benefits \u2064of Using Single Sign On Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#3%E2%80%8B_How_to_Secure%E2%80%8D_Your_Single_%E2%80%8CSign_On\" >3.\u200b How to Secure\u200d Your Single \u200cSign On<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#4_Dont_Miss_Out_on_%E2%80%8CSingle_Sign_On_Security\" >4. Don\u2019t Miss Out on \u200cSingle Sign On Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#Benefits_of_Single_Sign-On_SSO_Security\" >Benefits of Single Sign-On (SSO) Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/single-sign-on-security\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-single-sign-on-security\"><span class=\"ez-toc-section\" id=\"1_What%E2%80%8D_is_Single_Sign_On_Security\"><\/span>1. What\u200d is Single Sign On Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Single Sign-On (SSO) security is \u2064a type of authentication \u2062feature that allows users to use \u200cone set of login credentials to access multiple services, applications, and websites. This\u2063 means that instead \u200dof having \u200cto remember and \u2062manage multiple\u2064 usernames and passwords, users\u2063 need\u2064 only \u2062remember \u2064one set of credentials, while still benefiting from the security\u200b that comes with all\u2062 the \u200cintegrated services.<\/p>\n<p>With SSO users\u200c can take advantage of\u2062 a \u200cvariety of features.<\/p>\n<ul>\n<li>It \u2064centralizes authentication and allows users to seamlessly\u200d switch \u2064between \u2062applications, services, and websites.<\/li>\n<li>It eliminates the need \u200cto remember and enter multiple passwords, making\u200c the user \u2063experience more user-friendly.<\/li>\n<li>It enhances security by implementing additional layers of protection such \u200bas\u200c two-factor authentication.<\/li>\n<li>It can be used for single sign on with multiple applications through the use of security tokens or API calls.<\/li>\n<\/ul>\n<p>SSO is an\u2062 important security feature that\u2062 can \u200chelp protect your \u2062data and make it easier for users to access \u2062the services \u200dthey need. It is important\u200d to ensure that the system you choose is secure and\u2064 reliable, as this \u2064will help\u2064 protect your business and your \u200ccustomers.<\/p>\n<h2 id=\"2-benefits-of-using-single-sign-on-security\"><span class=\"ez-toc-section\" id=\"2_Benefits_%E2%81%A4of_Using_Single_Sign_On_Security\"><\/span>2. Benefits \u2064of Using Single Sign On Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Single Sign-On \u200b(SSO) security is\u200d becoming increasingly\u2063 popular among organizations for its convenience and overall improved security system.\u200c SSO \u2062authentication means that only\u200d one username and password need to \u2064be\u200d remembered\u2063 to access\u200b all the various\u2062 applications and services\u2064 associated with \u2062an account. Here are some of the other \u2063benefits of using a single\u200d sign-on security system:<\/p>\n<ul>\n<li><b>Complete User Identity Management:<\/b> One of the main advantages \u2064of SSO \u200bis that\u200b it simplifies\u200d user identity \u200cmanagement.\u200b This means \u2062that \u200ball information\u200c related \u2062to user \u200cidentity, such as a user\u2019s email\u200d address, is stored in \u2064a single location. This makes it \u2063easier to manage user authentication, password resetting, and other security-related processes.<\/li>\n<li><b>User Authentication:<\/b> By using \u200cSSO,\u200b the user only has to remember one username \u2062and\u2062 password \u2062in order \u2064to access all the necessary \u2064applications and services associated with \u2063their account. This makes the process of authentication \u200dmuch simpler and more secure.<\/li>\n<li><b>Improved Security:<\/b> By relying on two-factor authentication and other advanced\u2064 security measures, SSO offers a\u200b much higher level \u200cof security\u2063 than traditional \u2063security systems. This makes it \u2064much harder for hackers and other malicious actors to gain access\u200c to confidential information.<\/li>\n<\/ul>\n<p>Additionally, SSO\u2062 also reduces the number of\u2064 support calls\u200d as users \u2064no longer need to contact support\u2062 staff to \u200creset their passwords. This\u200c makes it easier\u200d and more\u200c efficient for the organization to manage user\u200b access. \u2062SSO also makes \u200dit easier\u2062 to track user access to applications \u2064and services, \u2062providing greater visibility into user \u200dactivity.<\/p>\n<h2 id=\"3-how-to-secure-your-single-sign-on\"><span class=\"ez-toc-section\" id=\"3%E2%80%8B_How_to_Secure%E2%80%8D_Your_Single_%E2%80%8CSign_On\"><\/span>3.\u200b How to Secure\u200d Your Single \u200cSign On<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As more businesses \u2063move to the cloud, single sign on is becoming\u2064 increasingly\u200b important. For \u2064companies, SSOs create\u200d a unified way to access\u2064 multiple accounts, quickly\u200d and securely. For users, they simplify the\u2062 process of accessing accounts and reduce the risk of forgetting your username and password. \u200dBut with SSOs comes a risk\u2064 \u2013 if \u200bthe \u200csystem is breached, access is granted to every account. \u2062To help secure\u2063 your SSO, \u2064here are some important tips:<\/p>\n<ul>\n<li><b>Enable Multi-Factor Authentication \u200d(MFA)<\/b>: MFA requires \u200bthe \u2062user to provide more than one type of credentials to complete the authentication process.\u2064 This usually includes something the user\u2062 knows (a \u2062password) and\u200d something the user has (an authentication \u200bcode sent via \u200btext message, for example).<\/li>\n<li><b>Regularly \u200cAudit Access \u200bRights<\/b>: Monitor \u200dwho\u200b has access to and \u2062is using the SSO \u2063system, and ensure that\u200c each user\u200d has only the access rights\u2063 they need. Make sure to remove any unused or\u2062 unnecessary accounts as well.<\/li>\n<li><b>Set Strong Passwords<\/b>: \u2063Encourage users to\u200d set strong passwords and \u2062consider \u2063implementing a strict password\u2063 policy. The password should \u200binclude at least 8 characters and\u200b contain both\u2062 uppercase and lowercase letters, numbers, and symbols.<\/li>\n<li><b>Update and Patch \u2062Your Systems Regularly<\/b>: Patching systems quickly will help to prevent security breaches. \u200dTo stay up to date with\u200b patches, set up\u200c an automated system \u2064to install\u2063 them \u200bregularly.<\/li>\n<li><b>Evaluate \u200cThird-Party\u200d Tools<\/b>: It\u2019s important\u200b to assess third-party SSO tools before\u2064 implementing them into your organization\u2019s\u200b systems. Make \u2063sure\u2064 the vendor\u2019s security measures are \u2063up \u2062to your \u2062standards.<\/li>\n<\/ul>\n<p>With \u200dthe right steps, you can keep your SSO system \u2064safe and secure. Make sure to educate your users about the importance of SSO security, and be sure to keep all your systems \u200bup-to-date.<\/p>\n<h2 id=\"4-dont-miss-out-on-single-sign-on-security\"><span class=\"ez-toc-section\" id=\"4_Dont_Miss_Out_on_%E2%80%8CSingle_Sign_On_Security\"><\/span>4. Don\u2019t Miss Out on \u200cSingle Sign On Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Single Sign On (SSO) is\u200c an online \u2063authentication system\u200b that allows\u2064 users to log into one centralized service with a single set\u200d of credentials. It provides a secure and convenient way to \u200daccess multiple applications \u200dwhile eliminating the need\u200b to remember various passwords. SSO\u200d also \u2062guards against \u200dinsider\u200d threats \u2062and data\u200d breaches,\u2064 so it\u2019s worth considering for your business.<\/p>\n<p>Here are some \u200bof the \u2064benefits of implementing a Single Sign On system:<\/p>\n<ul>\n<li><b>Added efficiency:<\/b> SSO helps reduce the time\u200c it takes employees \u200dto log in, allowing them to focus\u2064 more on their \u200cwork rather than\u200d typing \u2062in passwords.<\/li>\n<li><b>Privacy protection:<\/b> Users simply need\u2063 to remember\u2062 a \u2062single password, \u2064eliminating the \u2064risk of forgetting multiple passwords\u2064 and \u2063giving them increased privacy.<\/li>\n<li><b>Easy\u2064 integration:<\/b> SSO is \u200dcompatible with \u2064most software, making it easy to\u200d set \u2062up and improving your business\u2019 functionality.<\/li>\n<\/ul>\n<p>Businesses of \u2062all sizes can\u2062 benefit from Single Sign \u200dOn\u2063 technology. \u200bImplementing a\u2063 secure\u2064 authentication system allows you \u2063to easily manage access to multiple resources while ensuring your\u200c data remains \u200dsecure. Don\u2019t miss out on the security and efficiency\u200d this technology \u2063provides. \u200b<\/p>\n<p><a href=\"https:\/\/duo.com\/product\/multi-factor-authentication-mfa\/authentication-methods\/duo-push\" target=\"_blank\" rel=\"noopener nofollow\">Single sign-on<\/a> (SSO) security is a crucial aspect of identity and access management in today&#8217;s digital landscape. With the increasing number and complexity of applications and services that individuals and enterprises rely on, the need for secure and streamlined authentication processes has become more important than ever. SSO solutions like OpenID Connect and Active Directory Federation Services allow users to access multiple applications with a single set of credentials provided by an identity provider. This eliminates the need for users to remember multiple passwords, reducing the risk of password-related security vulnerabilities such as weak passwords, brute force attacks, and password reuse.<\/p>\n<p>By implementing SSO solutions, organizations can enhance their security posture by enforcing strong authentication mechanisms, such as multifactor authentication and risk-based authentication, to ensure secure access to resources and protect against potential security risks. Additionally, SSO solutions enable organizations to establish trust relationships with service providers, control access permissions, and comply with regulatory requirements, ultimately improving overall security practices and protocols. Sources: IBM Security, Cloudflare Zero Trust.<\/p>\n<p>Single Sign-On (SSO) security is a crucial aspect of modern digital identity management that ensures users can securely access multiple applications and services with just one set of login credentials. By utilizing SSO solutions, organizations can streamline the login process for users while maintaining a high level of security to protect sensitive data and resources. Authentication Token, user credentials, and Identity Provider are essential components of SSO security that help verify the identity of users and grant them access to the appropriate resources.<\/p>\n<p>One of the key benefits of SSO security is the ability to use federated identity management systems, such as OpenID Connect, to establish trust relationships between Identity Providers and service providers. This allows users to authenticate using their existing credentials, such as their email address or credentials from an Active Directory, while enabling secure access to connected applications. By centralizing access management through a single sign-on solution, organizations can reduce security risks associated with managing multiple sets of user credentials and prevent unauthorized access to sensitive data.<\/p>\n<p>In addition to streamlining the login process and improving security posture, SSO security also enhances user experience by eliminating the need for separate logins for each application or service. With the use of multifactor authentication and additional authentication factors, such as facial recognition or one-time passwords, organizations can add an extra layer of security to protect against potential risks like brute force attacks or weak passwords. By implementing robust security practices and protocols, organizations can ensure that users are accessing resources securely and that their data remains protected from cyber threats.<\/p>\n<p>Furthermore, SSO security allows organizations to enforce consistent security policies across a wide range of applications and services, reducing the reliance on passwords and strengthening password security with password managers or passwordless authentication methods. By utilizing industry standards like SAML 2.0 and Role-Based Access Control, organizations can manage access permissions and privileges effectively, ensuring that users only have access to the resources they need and complying with regulatory requirements.<\/p>\n<p>Overall, Single Sign-On security offers a comprehensive solution for managing user access rights and improving security practices within an organization. By establishing trust relationships, implementing additional authentication factors, and enforcing consistent security policies, organizations can enhance their security posture and protect against potential risks like malicious login attempts or unauthorized access. With the advancement of SSO solutions and adherence to best security practices, organizations can ensure that their digital services remain secure and accessible to users while maintaining compliance with regulatory requirements.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Single_Sign-On_SSO_Security\"><\/span>Benefits of Single Sign-On (SSO) Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefit<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Efficiency<\/td>\n<td>Reduces login time for users, allowing more focus on work<\/td>\n<\/tr>\n<tr>\n<td>Privacy Protection<\/td>\n<td>Eliminates the need to remember multiple passwords, enhances privacy<\/td>\n<\/tr>\n<tr>\n<td>Easy Integration<\/td>\n<td>Compatible with most software, easy to set up and improves functionality<\/td>\n<\/tr>\n<tr>\n<td>Improved Security<\/td>\n<td>Enforces strong authentication mechanisms, reduces security vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td>User Experience<\/td>\n<td>Streamlines login process, enhances user experience with seamless access<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Single Sign-On (SSO) and how does it work in terms of security?<br \/>\nA: Single Sign-On (SSO) is a security process that allows users to access multiple applications with a single set of login credentials. This eliminates the need for users to remember multiple passwords for different services, thus enhancing user experience and productivity. In terms of security, SSO utilizes authentication tokens and user credentials to verify the identity of the user. This process involves an Identity Provider (IdP), such as Active Directory or a cloud service, which authenticates the user and provides access to various applications or services through a secure access management system.<br \/>\n(Source: IBM Security)<\/p>\n<p>Q: What are the potential security risks associated with Single Sign-On solutions?<br \/>\nA: While Single Sign-On solutions offer convenience and efficiency, they also come with certain security risks. Some of these risks include the potential for compromised user credentials, security vulnerabilities in the SSO system, and the possibility of unauthorized access to sensitive data. Additionally, relying solely on a single authentication factor, such as a password, can create a major security risk. To mitigate these risks, organizations should implement additional authentication factors, such as multifactor authentication, to strengthen the security posture of their SSO system. (Source: Cybersecurity Insiders)<\/p>\n<p>Q: What are some best practices for securing Single Sign-On implementations?<br \/>\nA: To ensure the security of Single Sign-On implementations, organizations should adopt a comprehensive approach that includes implementing strong security policies, leveraging secure authentication protocols like SAML 2.0, and enforcing password security best practices. Additionally, organizations should regularly update their security protocols and ensure compliance with regulatory standards to safeguard user data and prevent security breaches. By following these best practices, organizations can enhance the security of their SSO system and protect against potential security threats. (Source: Cloudflare)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-tqldo-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-tqldo-1n7m0yu\">\n<div class=\"flex flex-col text-sm md:pb-9\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-5\" data-scroll-anchor=\"true\">\n<div class=\"py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-5 juice:lg:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"fa87c618-804a-4d19-a31d-2d3fd2cd217f\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Achieve peace of mind with single sign-on security through <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, a trusted provider of secure credential solutions. Our platform offers users robust functionality and heightened security with a simple setup process. Benefit from strong authentication and passwordless login options, all available for free. Safeguard your digital identity today by signing up with LogMeOnce, a leading company in the field of single sign-on security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover the importance of Single Sign-On security for your online accounts. Learn how to streamline access with SSO while ensuring protection against identity theft. If you need to create a secure account, consider using LogMeOnce for free, featuring Auto-login and Dark Web Monitoring. Optimize your online safety effortlessly!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19736],"tags":[1294,1740,1739,3604,781,8032,18379],"class_list":["post-67480","post","type-post","status-publish","format-standard","hentry","category-single-sign-on","tag-authentication","tag-cyber-security","tag-data-security","tag-identity-management","tag-security","tag-single-sign-on","tag-user-access-control"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/67480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=67480"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/67480\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=67480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=67480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=67480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}