{"id":68094,"date":"2024-06-19T17:23:59","date_gmt":"2024-06-19T17:23:59","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/two-factor-authentication-remote-desktop-gateway\/"},"modified":"2024-08-19T13:17:38","modified_gmt":"2024-08-19T13:17:38","slug":"two-factor-authentication-remote-desktop-gateway","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/","title":{"rendered":"Two Factor Authentication Remote Desktop Gateway"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Two Factor Authentication (2FA)\u200b is a \u200bkey security measure that is increasingly being adopted to protect Remote Desktop\u200b Gateways (RDGs) from unauthorized access. In simple \u200bterms, 2FA adds an extra layer \u200bof security\u200c for RDGs by\u2064 requiring users\u200d to have two forms of \u200bauthentication when logging in \u2013 usually, something that they know \u2064(e.g. a username and password) and\u200d something they possess, such as a mobile\u2062 device. This makes it much harder\u2064 for hackers to gain access\u200c to a RDG as they would need both pieces of information to\u200b authenticate. By implementing 2FA for remote access, organizations can significantly\u2064 reduce the\u2062 chances of malicious \u200dattacks and ensure their data remains safe.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#1_What_is_Two%E2%80%8D_Factor_Authentication_for_a_Remote_Desktop_Gateway\" >1. What is Two\u200d Factor Authentication for a Remote Desktop Gateway?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#2_Benefits_%E2%80%8Cof_Two_Factor_Authentication_for_RDP_Security\" >2. Benefits \u200cof Two Factor Authentication for RDP Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#3_Simple_Methods_%E2%81%A4for_Implementing_Two%E2%81%A2_Factor_Authentication\" >3. Simple Methods \u2064for Implementing Two\u2062 Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#4_How_to_Configure%E2%81%A4_Remote_Desktop_Gateway_for_Two_Factor_Authentication\" >4. How to Configure\u2064 Remote Desktop Gateway for Two Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#Benefits_of_Two_Factor_Authentication_for_RDP_Security\" >Benefits of Two Factor Authentication for RDP Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-remote-desktop-gateway\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication-for-a-remote-desktop-gateway\"><span class=\"ez-toc-section\" id=\"1_What_is_Two%E2%80%8D_Factor_Authentication_for_a_Remote_Desktop_Gateway\"><\/span>1. What is Two\u200d Factor Authentication for a Remote Desktop Gateway?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two factor authentication (also known as\u2063 2FA) is \u200da \u200csecure method of protecting data and \u200cother \u200bdigital assets by\u200b requiring two factors of authentication from the user. It\u2063 is often \u2062used with remote desktop gateways,\u200c which \u200dallow\u2063 users to access their work computer remotely\u200b over the \u200binternet.<\/p>\n<ul>\n<li><strong>Username and Password<\/strong>. The first \u2064factor is the use of a username and password to gain access.\u200c The username\u200c and\u200c password should be \u200chard to guess and only known to the user.<\/li>\n<li><strong>Second Authentication Factor<\/strong>. The second factor of authentication is usually\u2064 a unique one-time\u200c code or\u200c a biometric such as a\u2062 fingerprint\u200d scan. This will\u200b ensure that \u200bonly the \u200cuser \u2013 and not a malicious\u200b hacker \u2013 can \u2062access the system.<\/li>\n<\/ul>\n<p>Two factor \u2064authentication not only increases security, but also gives peace of mind\u200d that a user\u2019s data is safe and secure even\u2062 when accessing it remotely \u2062over the internet. While two \u2063factor authentication does offer advantages,\u200d it also \u200ccomes\u2064 with\u200c a few downsides such as the additional setup time and cost \u2062involved. \u2063In the\u2064 long run however, these can be \u200doutweighed by the\u200b benefits it \u2062brings.<\/p>\n<h2 id=\"2-benefits-of-two-factor-authentication-for-rdp-security\"><span class=\"ez-toc-section\" id=\"2_Benefits_%E2%80%8Cof_Two_Factor_Authentication_for_RDP_Security\"><\/span>2. Benefits \u200cof Two Factor Authentication for RDP Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b> Reduced Risk of Authentication-Based Breaches<\/b><\/p>\n<p>Two Factor Authentication (2FA) can help\u200d significantly reduce\u200b the risk \u200dof authentication-based security breaches such as remote desktop protocol (RDP) attacks. 2FA requires users\u2063 to authenticate their identity in \u200dmultiple steps,\u2063 adding \u200dan \u2064extra layer of security. This layer ensures that access is\u200b restricted to authorized users only, preventing malicious\u2064 actors from accessing\u2062 private data.<\/p>\n<p>In addition, 2FA allows organizations to \u2064easily \u2062manage user \u2063security. \u200dOrganizations can control which users can access the system, assign different levels of access to individuals, and set expiration\u2062 dates on user logins. All of these features help prevent malicious actors from gaining\u200b access to sensitive information through RDP.<\/p>\n<p><b>Improved \u200dSystem Performance <\/b><\/p>\n<p>Two Factor Authentication can \u2063also have a positive impact on system performance. \u2063Traditionally, <a href=\"https:\/\/logmeonce.com\/consumer-password-manager-and-password-recovery\/pricing-and-comparison\/\">authentication processes \u2063involve complex methods<\/a> such as creating \u2062passwords and \u200ctyping \u2063in data. However, 2FA \u2062eliminates the need for manual \u2063processes, making\u2064 authentication much faster and more secure.<\/p>\n<p>2FA also\u200d allows for a more streamlined user experience. When\u2064 users sign in, they\u200c can\u200b do so with just two simple\u2063 steps, rather\u2063 than having to remember\u200d complicated passwords or navigate through multiple screens. This makes the authentication process \u2064much easier for users, making it\u200c simpler to access the system without impacting performance.<\/p>\n<h2 id=\"3-simple-methods-for-implementing-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_Simple_Methods_%E2%81%A4for_Implementing_Two%E2%81%A2_Factor_Authentication\"><\/span>3. Simple Methods \u2064for Implementing Two\u2062 Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In \u200ctoday\u2019s\u2063 digital world, \u2063it\u2019s \u2064essential to\u2062 ensure your personal\u200d and business data is kept secure. Two\u200c factor\u2062 authentication\u2064 (2FA) \u2062can be a powerful tool in your\u200c security arsenal, providing\u2062 an extra layer \u2063of protection beyond the traditional \u2064security measures like passwords.\u2063 Here are \u200dthree\u2063 of the easiest methods you can use to\u200c implement two factor authentication:<\/p>\n<ul>\n<li><strong>Authentication App<\/strong> -\u200b With \u2063an authentication app, you can\u200c generate a one-time passcode to be used to unlock an\u200c account.\u200d This is \u200boften the \u2064preferred \u2063option for businesses, as it\u2019s relatively inexpensive and \u2063easy to \u2064use.<\/li>\n<li><strong>SMS<\/strong> \u2013 You can use SMS for two-factor authentication, in \u2063which a\u2063 code to\u2062 unlock the account is sent \u2063to\u2063 you\u200c in\u200c a\u2062 text message. \u200dSMS is often used by many\u200b businesses due to its \u200bconvenience\u200c and affordability.<\/li>\n<li><strong>Biometric<\/strong> \u2063- Biometrics, such as fingerprint\u200b or facial\u2063 recognition, can also be used to \u200bimplement two factor authentication. This is \u200bthe\u200d most secure method, as your physical\u2064 being is \u200bused to \u2062authenticate the account.<\/li>\n<\/ul>\n<p>No matter which method you choose \u2064for two-factor authentication, one\u2064 thing is certain:\u200b it\u2019s much more secure than relying on passwords alone. Implementing two \u200dfactor\u2062 authentication can\u200b be simple and\u200c cost-effective and will give you greater \u2063peace of mind when it comes to the\u2062 security of your data.<\/p>\n<h2 id=\"4-how-to-configure-remote-desktop-gateway-for-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_How_to_Configure%E2%81%A4_Remote_Desktop_Gateway_for_Two_Factor_Authentication\"><\/span>4. How to Configure\u2064 Remote Desktop Gateway for Two Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Setting Up Two-Factor Authentication with\u200c Remote \u200bDesktop Gateway<\/b><\/p>\n<p>Secure Remote Desktop Gateway\u2064 (RD Gateway) access\u200b is a must-have for ensuring the safety \u200dof your\u200b network.\u2064 This\u200c guide will show you how to add two-factor authentication when using RD Gateway. Two-factor authentication adds\u200d an \u2062additional layer of security to your network, as it requires a second credentials code or \u200cpassword in order\u200c to \u200daccess\u200d your network.<\/p>\n<p>To set up two-factor authentication on Remote Desktop\u200c Gateway:<\/p>\n<ul>\n<li>\u200c Gather a mobile\u200c device or other device that supports two-factor authentication.\u2062<\/li>\n<li>\u200b Input the credentials for your chosen device into your Remote Desktop Connection Manager.<\/li>\n<li>Generate a 5, 6, or personal-defined digit code every time you need to access your system.<\/li>\n<li>Enter the code\u2062 generated into the \u2063Remote Desktop Connection Manager and you\u200d will be granted access.<\/li>\n<\/ul>\n<p>Once you \u200bsuccessfully connect to your \u2063network you can rest assured that it \u200dis \u200bsafe from outside intrusion. \u2062The two-factor authentication process creates a secure and reliable connection that is\u2062 nearly impossible \u200dto penetrate. By\u200c utilizing two-factor authentication with your Remote Desktop\u2064 Gateway you can keep\u2064 your sensitive data and systems away from malicious third-parties.<\/p>\n<p>Two-factor <a href=\"https:\/\/github.com\/MicrosoftDocs\/windowsserverdocs\/issues\/new\" target=\"_blank\" rel=\"noopener nofollow\">authentication<\/a> for Remote Desktop Gateway is a crucial security measure that helps to protect against unauthorized access to a network. Multi-factor authentication is a method of authentication that requires the user to provide two different types of credentials before gaining access to a system or application. In the case of Remote Desktop Services, this typically involves a combination of something the user knows, such as a password, and something the user has, such as a hardware token or a one-time passcode generated by a mobile authenticator app.<\/p>\n<p>One of the most common ways to implement two-factor authentication for Remote Desktop Gateway is to use a RADIUS client to communicate with a central server that handles authentication requests. The RADIUS server can be configured to require multi-factor authentication for remote users connecting to the network through the gateway. This means that users must provide both their login credentials and a second factor of authentication, such as a passcode generated by a mobile app or a hardware token.<\/p>\n<p>Another important aspect of implementing two-factor authentication for Remote Desktop Gateway is defining the Connection Request Policy. This policy determines the conditions under which users are allowed to connect to the network through the gateway. By configuring the Connection Request Policy to require multi-factor authentication, organizations can ensure that only authorized users with secure access to the network are allowed to establish remote connections.<\/p>\n<p>Additionally, organizations can enhance the security of their Remote Desktop Gateway by using a third-party authentication provider, such as Duo Security or Rublon MFA, to provide an additional layer of security for remote connections. These providers offer comprehensive solutions for implementing multi-factor authentication, including push notifications, one-time passwords, and hardware tokens, to ensure that only authorized users are able to access network resources securely. By integrating these solutions with Remote Desktop Gateway, organizations can strengthen their security processes and protect against unauthorized access by malicious actors.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Two_Factor_Authentication_for_RDP_Security\"><\/span>Benefits of Two Factor Authentication for RDP Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefits<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Reduced Risk of Breaches<\/td>\n<td>2FA reduces the risk of authentication-based breaches such as RDP attacks by adding an extra layer of security.<\/td>\n<\/tr>\n<tr>\n<td>Improved System Performance<\/td>\n<td>2FA eliminates manual processes, making authentication faster and easier for users.<\/td>\n<\/tr>\n<tr>\n<td>Enhanced User Security<\/td>\n<td>2FA ensures access is restricted to authorized users only, preventing unauthorized access to sensitive data.<\/td>\n<\/tr>\n<tr>\n<td>Streamlined User Experience<\/td>\n<td>2FA simplifies the authentication process, making it easier for users to access the system without impacting performance.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Two Factor Authentication Remote Desktop Gateway?<br \/>\nA: Two Factor Authentication Remote Desktop Gateway is a secure access method for Remote Desktop Services that requires users to provide two forms of authentication before accessing resources. This authentication method adds an extra layer of security beyond just login credentials.<\/p>\n<p>Q: How does Two Factor Authentication Remote Desktop Gateway work?<br \/>\nA: Two Factor Authentication Remote Desktop Gateway typically involves using a primary authentication method (such as password authentication) in combination with a second-factor authentication method (such as push notifications, hardware tokens, or passcode authentication) to verify the identity of the user. This ensures that only authorized users can access the remote desktop server.<\/p>\n<p>Q: What are some common second-factor authentication methods used in Two Factor Authentication Remote Desktop Gateway?<br \/>\nA: Common second-factor authentication methods used in Two Factor Authentication Remote Desktop Gateway include push notifications, hardware tokens, passcode authentication, and one-time passwords sent to a user&#8217;s phone or email. These methods provide an additional layer of security to ensure secure access.<\/p>\n<p>Q: What is the role of a RADIUS server in Two Factor Authentication Remote Desktop Gateway?<br \/>\nA: In Two Factor Authentication Remote Desktop Gateway, a RADIUS server acts as a central authentication source that processes authentication requests for remote users. It helps to secure authentication by verifying the identity of users before granting access to the remote desktop server.<\/p>\n<p>Q: How can organizations implement Two Factor Authentication Remote Desktop Gateway?<br \/>\nA: Organizations can implement Two Factor Authentication Remote Desktop Gateway by configuring connection authorization policies, setting up multi-factor authentication methods, and integrating with identity solutions such as Duo Security or Rublon MFA for Remote Desktop Gateway. This helps to enhance security processes and ensure secure access for users.<\/p>\n<p>Q: What are some benefits of using Two Factor Authentication Remote Desktop Gateway?<br \/>\nA: Some benefits of using Two Factor Authentication Remote Desktop Gateway include enhanced security, secure authentication for remote users, access control for network resources, and compliance with security policies. It helps to protect against unauthorized access and ensures secure connection to the remote desktop server. (Source: microsoft.com)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-szcwd-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-szcwd-1n7m0yu\">\n<div class=\"flex flex-col text-sm md:pb-9\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-53\" data-scroll-anchor=\"true\">\n<div class=\"py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-5 juice:lg:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"243404f3-a5d3-4e8f-b800-2e45f8dd9f24\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Enhance remote desktop security with reliable two-factor authentication. Our solution for remote desktop gateway is user-friendly and includes a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account option. Sign up with us today to ensure your remote desktops are protected from unauthorized access and potential threats. As the leading provider of two-factor authentication for remote desktops, offering secure vault and password generation features, we&#8217;re your perfect choice for heightened security needs!<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover how Two Factor Authentication enhances security on Remote Desktop Gateway. If setting up accounts for Remote Desktop, consider creating a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring for robust security. Protect your Remote Desktop Gateway with advanced authentication today!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2316,907,931,19817,1788,6779],"class_list":["post-68094","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication-methods","tag-network-security","tag-online-security","tag-remote-desktop-gateway","tag-two-factor-authentication","tag-vpn"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68094"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68094\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}