{"id":67734,"date":"2024-06-19T15:54:50","date_gmt":"2024-06-19T15:54:50","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/remote-desktop-two-factor-authentication\/"},"modified":"2024-06-27T17:52:05","modified_gmt":"2024-06-27T17:52:05","slug":"remote-desktop-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/","title":{"rendered":"Remote Desktop Two Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2064 What \u2064if\u2063 you could sign\u2064 into your\u200c business accounts with just two pieces of information? Remote \u2063Desktop\u2062 Two Factor Authentication (RD2FA) makes this a reality. RD2FA \u200dis a \u200bpowerful yet simple security\u200d solution that provides users with an\u200d extra layer\u200c of security \u2063when \u200caccessing corporate \u200cnetworks. By requiring\u200b users\u2062 to \u200denter \u200ba\u2064 unique two-factor authentication code\u2062 in \u2062addition to their username and \u2063password,\u2062 RD2FA adds an \u2062extra layer of security to protect against\u2064 unauthorized \u2062access or cyber-attacks.\u2062 With RD2FA,\u2064 you can rest \u2062assured\u2063 that \u2062all your business accounts\u2063 are safeguarded, with reduced risk of accounts \u2063being accessed maliciously.\u2063 With RD2FA, users can enjoy the benefits of additional security without having to sacrifice convenience.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#1_Enjoy_Secure_Remote_Access_with_%E2%81%A4Two-Factor_Authentication\" >1. Enjoy Secure Remote Access with \u2064Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#2_What_is_Remote_Desktop_Two-Factor_Authentication\" >2. What is Remote Desktop Two-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#3_Why_Two-Factor_Authentication_is_Necessary_%E2%80%8Dfor_Remote_Access\" >3. Why Two-Factor Authentication is Necessary \u200dfor Remote Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#4_How_to_Authenticate_Remotely_with_Two-Factor_Authentication\" >4. How to Authenticate Remotely with Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#Benefits_of_Remote_Desktop_Two-Factor_Authentication\" >Benefits of Remote Desktop Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-enjoy-secure-remote-access-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Enjoy_Secure_Remote_Access_with_%E2%81%A4Two-Factor_Authentication\"><\/span>1. Enjoy Secure Remote Access with \u2064Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it \u2062comes to secure remote access, two-factor authentication\u2062 is essential. Two-factor authentication makes it much more difficult for someone\u200d to access your data without \u2062your permission. Here are some of\u200b the advantages\u2064 to\u2063 using two-factor authentication for secure remote \u200daccess:<\/p>\n<ul>\n<li><strong>Increased\u2063 Security:<\/strong> Two-factor authentication requires both\u200c something you know, like\u2062 a password or PIN, \u2062as well\u2062 as something \u2064you \u2062have,\u200c like a mobile device or hardware\u2064 token. \u200bThis significantly reduces the risk of someone accessing your data without your \u2062permission.<\/li>\n<li><strong>Greater Convenience:<\/strong> With two-factor authentication,\u200d users are able to\u2063 securely\u2062 access data from any location. This\u200c saves\u2064 time and \u200cincreases the productivity \u2064of \u200busers who need to access \u200dtheir \u200cdata remotely.<\/li>\n<li><strong>Added Privacy:<\/strong> Two-factor authentication \u2063also \u2062ensures\u200b that data is kept safe and secure. It prevents unauthorized\u200b parties\u2063 from accessing\u200b sensitive information which ensures \u2064that your data is kept private.<\/li>\n<\/ul>\n<p>Two-factor authentication is \u2063essential for secure remote access. It \u200cadds an\u200d extra layer of security to\u200b any system, which makes\u200d it \u200bmuch harder for \u200bunauthorized parties to gain\u2063 access\u200d to your data. With \u200ctwo-factor \u2064authentication, you can enjoy the \u200cconvenience and privacy that secure remote access provides.<\/p>\n<h2 id=\"2-what-is-remote-desktop-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_What_is_Remote_Desktop_Two-Factor_Authentication\"><\/span>2. What is Remote Desktop Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Two-Factor Authentication<\/strong> is a security measure that \u200drequires\u2064 the user \u2064to provide two\u200c different \u2062pieces of \u2064evidence to verify their identity\u200c with a\u2064 remote desktop. This additional layer of \u2062<a href=\"https:\/\/logmeonce.com\/passwordless-qr-code-login\/\">protection helps safeguard important data<\/a> and applications\u2064 from unauthorized\u2062 access.<\/p>\n<p>Using \u2064two-factor\u200d authentication, users must provide \u200cboth something they \u2064know (e.g., \u200ba username and \u2064password) and something they\u2064 have \u2062(e.g., \u200da\u2062 token or key fob that generates a single-use\u2064 code). This way of authenticating ensures\u2063 that the user is who they\u200d claim to \u200cbe.<\/p>\n<p>Some of the\u200b main benefits of using two-factor \u2063authentication include:<\/p>\n<ul>\n<li>Increased control \u2063over access to corporate networks<\/li>\n<li>Enhanced protection against cyberattacks and \u2063other threats<\/li>\n<li>Simplified compliance with industry regulations<\/li>\n<\/ul>\n<p>It is also important\u2063 to note that two-factor authentication \u200ccan be used for both remote \u2063and\u200d on-premise work \u2063environments for\u2063 additional security.<\/p>\n<h2 id=\"3-why-two-factor-authentication-is-necessary-for-remote-access\"><span class=\"ez-toc-section\" id=\"3_Why_Two-Factor_Authentication_is_Necessary_%E2%80%8Dfor_Remote_Access\"><\/span>3. Why Two-Factor Authentication is Necessary \u200dfor Remote Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Modern businesses and \u200borganizations have to carefully \u200csecure their\u2063 data\u2062 and\u200d systems, and two-factor authentication is\u200b one\u200b of the most effective \u200ctools to use \u2064for this purpose. Two-factor authentication for remote \u200baccess\u200c is necessary in\u2064 order\u200b to provide an additional layer\u2062 of security and \u200dprotect \u2062user\u200c accounts \u2062or\u2062 devices from \u200chackers and unauthorized\u2062 access.<\/p>\n<p>Here are the \u2064key benefits of two-factor authentication for remote access:<\/p>\n<ul>\n<li><strong>Increased Security:<\/strong> It adds\u200d an extra\u200c layer of security\u200c to \u200duser accounts \u2063or devices since\u2063 a passcode (from \u200da physical \u200dfob or phone) is\u200d required in\u2064 addition to entering\u2064 a \u2063username and password.<\/li>\n<li><strong>Stop Unauthorized Access:<\/strong> It can prevent hackers \u200dfrom\u200d gaining access\u200c to \u2063accounts or devices by verifying the \u200didentity of the person who is trying to access \u200cthem.<\/li>\n<li><strong>Easy \u200bSet-up:<\/strong> \u200bTwo-factor authentication can\u200d be easily set up \u2062and managed with a few clicks, making it a great way\u2063 to secure remote\u200b access.<\/li>\n<\/ul>\n<p>The importance of two-factor\u200b authentication for\u200c remote access cannot be underestimated. It \u200cis a\u200d simple but \u2064effective tool to \u2063help protect organizations and businesses from potential\u200c security\u200b risks and \u200cbreaches. \u2063By implementing \u200da two-factor authentication system, organizations will be better equipped to \u200dsafeguard their data and systems.<\/p>\n<h2 id=\"4-how-to-authenticate-remotely-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_How_to_Authenticate_Remotely_with_Two-Factor_Authentication\"><\/span>4. How to Authenticate Remotely with Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor \u2063authentication\u2064 is a secure way \u2064to verify\u2063 your identity \u2062when logging into \u200ba \u200bwebsite or\u200c application. It involves entering both a\u2064 password and\u200d a verification \u2064code \u200dsent to you via email, \u200dtext message, or\u200b an authentication app. \u2063This additional \u2063layer\u2064 of security helps\u2064 protect you from hackers or\u2064 other \u2063malicious actors. Here\u2019s how to\u2064 use two-factor authentication to authenticate remotely:<\/p>\n<ul>\n<li><b>Step 1:<\/b> Log \u2062into the\u2062 website or application with your\u2062 email \u2064address and password.<\/li>\n<li><b>Step 2:<\/b> Enter the \u2062verification code that was\u2063 sent\u2063 to you.<\/li>\n<li><b>Step\u200d 3:<\/b> Click \u200dthe \u201cConfirm\u2063 Code\u201d button and you will\u2064 be successfully authenticated.<\/li>\n<\/ul>\n<p>If the security\u200c code \u2062sent to you doesn\u2019t work, you \u2062can\u2062 easily request a new one. Just click the \u201cRequest New \u2064Code\u201d link and\u2064 a\u2062 new code will be sent to \u200byou. It\u2019s\u200d that easy!<\/p>\n<p>Remote desktop two-factor <a href=\"https:\/\/help.duo.com\/s\/article\/8187\" target=\"_blank\" rel=\"noopener nofollow\">authentication<\/a> is an essential security measure that involves using two different factors to verify a user&#8217;s identity before granting access to a remote desktop gateway. This can include using a security key and a mobile app, such as Duo Authentication, to provide an additional layer of security beyond just a username and password. Two-factor authentication methods like Duo Push or generating a 6-digit code help ensure secure access to remote desktop services on server operating systems.<\/p>\n<p>By requiring users to go through multiple layers of security before logging in, organizations can better protect their systems from unauthorized access and phishing attacks. Additionally, alternative authentication methods like Time-Based One-Time Passwords or using third-party authenticator apps can further enhance the security of remote desktop connections. Overall, implementing two-factor authentication for remote desktop access is a powerful way to safeguard sensitive information and prevent unauthorized access to critical systems. (Source: Duo Security, Rublon Multi-Factor Authentication)<\/p>\n<p>In today&#8217;s digital age, security is more important than ever. As technology advances, hackers and cybercriminals are constantly finding new ways to gain unauthorized access to sensitive information. One powerful way to combat this threat is through the use of Remote Desktop Two Factor Authentication. This security measure adds an extra layer of protection to remote desktop connections, ensuring that only authorized users can access valuable data.<\/p>\n<p>Multi-factor authentication, also known as 2-factor authentication, requires users to provide two different forms of verification before gaining access to a system. This can be a combination of something they know (like a password) and something they have (like a security key or mobile app). One popular method of 2-factor authentication is Duo Authentication, which provides a secure and easy-to-use way to protect remote desktop connections. Users can receive a 6-digit code on their mobile device or simply push a button on the Duo mobile app to verify their identity.<\/p>\n<p>Duo Security offers a range of authentication methods to suit different security needs. For example, users can choose to receive authentication requests via Duo Push notifications, SMS messages, or phone calls. This flexibility allows organizations to tailor their security policies to fit their specific requirements. Additionally, Duo provides detailed instructions for deployment, ensuring a smooth and successful implementation process.<\/p>\n<p>One key benefit of Remote Desktop Two Factor Authentication is the added protection it offers against phishing attacks. By requiring a second form of authentication, even if a hacker obtains a user&#8217;s password, they still won&#8217;t be able to access the system without the second-factor authentication. This extra layer of security can prevent unauthorized users from gaining access to sensitive information and help protect against potential data breaches.<\/p>\n<p>Overall, Remote Desktop Two Factor Authentication is a crucial security measure for organizations looking to secure their remote desktop connections. By implementing multi-factor authentication, organizations can protect valuable data and prevent unauthorized access to their systems. With options for applications, configuration options, and additional security measures, Remote Desktop Two Factor Authentication provides a powerful and effective way to enhance security in today&#8217;s digital landscape.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Remote_Desktop_Two-Factor_Authentication\"><\/span>Benefits of Remote Desktop Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Advantage<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Increased Security<\/td>\n<td>Requires two forms of verification for access<\/td>\n<\/tr>\n<tr>\n<td>Convenience<\/td>\n<td>Securely access data from any location<\/td>\n<\/tr>\n<tr>\n<td>Privacy<\/td>\n<td>Prevents unauthorized access to sensitive information<\/td>\n<\/tr>\n<tr>\n<td>Control<\/td>\n<td>Enhanced control over access to corporate networks<\/td>\n<\/tr>\n<tr>\n<td>Protection<\/td>\n<td>Defense against cyberattacks and threats<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What\u2064 is two\u2064 factor authentication on a remote desktop?<br \/>\nA: Two factor authentication is an extra layer of security for your remote \u2062desktop.\u2063 It adds an extra step to your login\u2064 process so that somebody cannot access your\u2063 remote desktop without both \u200byour username\u200b and \u200bpassword and \u2063a\u200d second step of authentication, such as \u2063a one-time\u2063 code sent to your phone.<\/p>\n<p>Q: What is Remote Desktop Two Factor Authentication?<br \/>\nA: Remote Desktop Two Factor Authentication, also known as multi-factor authentication, adds an extra layer of security to the traditional username and password login process by requiring users to provide two different authentication factors. This greatly enhances security by requiring something the user knows (such as a password) and something the user has (such as a security key or mobile device).<\/p>\n<p>Q: How does Remote Desktop Two Factor Authentication work?<br \/>\nA: Remote Desktop Two Factor Authentication typically involves the user logging in with their standard credentials and then being prompted for a second form of authentication, such as a 6-digit code generated by a mobile app like Duo Mobile. The user must then enter this code on the login screen to complete the authentication process and gain access to the remote desktop connection.<\/p>\n<p>Q: What are some popular Remote Desktop Two Factor Authentication solutions?<br \/>\nA: Some popular Remote Desktop Two Factor Authentication solutions include Duo Authentication, Rublon Multi-Factor Authentication, and Azure Multi-Factor Authentication. These solutions offer a variety of authentication methods, such as Duo Push notifications, SMS passcodes, and Time-based One-Time Passwords.<\/p>\n<p>Q: What are the benefits of using Remote Desktop Two Factor Authentication?<br \/>\nA: The main benefit of using Remote Desktop Two Factor Authentication is enhanced security. By requiring users to provide two different authentication factors, organizations can better protect sensitive data and prevent unauthorized access to their systems. Additionally, Remote Desktop Two Factor Authentication helps guard against phishing attacks and other forms of cyber threats.<\/p>\n<p>Q: How can I deploy Remote Desktop Two Factor Authentication in my organization?<br \/>\nA: Deploying Remote Desktop Two Factor Authentication typically involves installing the necessary software or applications on the target machines, configuring the authentication policies, and enrolling users in the authentication system. Detailed instructions for deployment can usually be found in the documentation provided by the authentication solution provider, such as the Duo Knowledge Base or Rublon MFA guides.<\/p>\n<p>Q: What are some additional security measures that can be used in conjunction with Remote Desktop Two Factor Authentication?<br \/>\nA: In addition to Remote Desktop Two Factor Authentication, organizations can implement other security measures such as Firewall configurations, FIDO security keys, and Client application restrictions. These additional layers of security help to further protect against unauthorized access and ensure secure remote desktop connections.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Overall, \u200dRemote\u200b Desktop Two Factor Authentication\u200c is a great step\u200b toward \u200bkeeping your\u200b computer and data secure. \u200dTo\u2063 make sure\u200c you\u2019re equipped with the\u200c most reliable and secure authentication, \u2064create a FREE LogMeOnce account. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> is the \u2062superior solution\u200c when \u200dit \u2063comes to two-factor authentication for <a href=\"https:\/\/logmeonce.com\/two-factor-authentication\/\">secure \u200bremote desktop access<\/a>,\u200c ensuring user \u2062safety every step of\u200c the way. Don\u2019t miss \u200dout on this\u2064 essential feature to keep your remote desktop secure from malicious actors with two-factor \u2064authentication using \u200dLogMeOnce.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2064 What \u2064if\u2063 you could sign\u2064 into your\u200c business accounts with just two pieces of information? Remote \u2063Desktop\u2062 Two Factor Authentication (RD2FA) makes this a reality. RD2FA \u200dis a \u200bpowerful yet simple security\u200d solution that provides users with an\u200d extra layer\u200c of security \u2063when \u200caccessing corporate \u200cnetworks. By requiring\u200b users\u2062 to \u200denter \u200ba\u2064 unique two-factor [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1294,1793,7425,781,1788],"class_list":["post-67734","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication","tag-identity-verification","tag-remote-desktop","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/67734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=67734"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/67734\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=67734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=67734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=67734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}