{"id":68268,"date":"2024-06-19T17:52:06","date_gmt":"2024-06-19T17:52:06","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/workday-two-factor-authentication\/"},"modified":"2024-12-28T10:28:43","modified_gmt":"2024-12-28T10:28:43","slug":"workday-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/","title":{"rendered":"Workday Two Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2062Staying safe\u200b while\u200d accessing your online\u200c accounts is essential in this\u200b digital age. \u2064With increasing\u200c levels\u2062 of\u200c cybercrime, security measures must \u2063be taken to \u200dprotect your data. One of \u200dthe most\u2062 efficient of these is known as Workday Two Factor Authentication, or 2FA. 2FA offers \u2064an extra layer of security when accessing Workday accounts, so you can feel\u2063 confident that your data\u2064 is \u200bsecure. Not only\u2063 is \u200dthis two-step\u2062 verification process \u200cmore secure, \u2062it is also simpler\u2064 and\u2064 faster to set\u200b up, \u200callowing you the peace\u200b of \u2062mind that comes with\u2064 reliable security without compromising \u200dspeed.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#1_Get_Improved_%E2%80%8BSecurity_with_Workday_Two_Factor%E2%81%A3_Authentication\" >1. Get Improved \u200bSecurity with Workday Two Factor\u2063 Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#2_Protect_%E2%80%8DYour%E2%81%A2_Data%E2%81%A4_with_2-Step_Authentication\" >2. Protect \u200dYour\u2062 Data\u2064 with 2-Step Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#3_Safeguard_Your_Business_with_Enhanced_Protection\" >3. Safeguard Your Business with Enhanced Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#4_Take_Control_of_Your_Workday_Security_Today\" >4. Take Control of Your Workday Security Today!<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#Enhancing_Security_with_Workday_Two_Factor_Authentication_2FA\" >Enhancing Security with Workday Two Factor Authentication (2FA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-get-improved-security-with-workday-two-factor-authentication\" data-element-id=\"headingsMap-3-0\"><span class=\"ez-toc-section\" id=\"1_Get_Improved_%E2%80%8BSecurity_with_Workday_Two_Factor%E2%81%A3_Authentication\"><\/span>1. Get Improved \u200bSecurity with Workday Two Factor\u2063 Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Enhanced Security with \u200cWorkday\u2062 Two Factor Authentication:<\/strong><\/p>\n<p>Workday Two Factor Authentication (2FA) \u2063is\u2063 an important security \u200bmeasure \u200bthat\u200d can protect your business from cyberattacks and unauthorized access to data. 2FA \u2062requires two pieces of information to \u200cbe provided in order \u2062to login; \u200ba typical \u200busername and password combination together with a unique authentication code sent to the user. This extra\u2063 step\u200c in \u200bthe login \u200bprocess\u200c adds an\u200d extra layer of security to your system, making it virtually impossible for criminals to access your system.<\/p>\n<p>2FA \u2063is easy to set up\u200c and\u200b can be done in a matter of minutes. It\u2062 saves\u2064 time by eliminating the need to remember\u2064 multiple passwords and provides a secure way to login. Here are some\u2062 key benefits of using\u2064 2FA:<\/p>\n<ul>\n<li>Uses secure \u2064technology to protect your data and logins.<\/li>\n<li>Provides an extra layer of security and prevents hackers \u2062from \u200baccessing your \u200dsystem.<\/li>\n<li>Eliminates the need to\u2063 remember multiple \u2062passwords.<\/li>\n<li>Can\u2064 be \u200dused on \u200ba range\u200c of\u2062 devices\u2062 such as\u200d laptops, smartphones,\u2064 and \u200dtablets.<\/li>\n<li>Ideal for \u2063businesses\u2064 of all sizes \u2064to protect valuable \u2064data.<\/li>\n<\/ul>\n<p>Using \u2063Workday Two\u200c Factor Authentication\u2064 is an important step in protecting your business from cyberthreats. It is quick and easy\u200d to\u2063 set up, \u200bprovides an extra\u200b layer of security, and \u2063can save you time \u2063by \u2063eliminating\u2062 the need to remember \u200cmultiple passwords.<\/p>\n<h2 id=\"2-protect-your-data-with-2-step-authentication\" data-element-id=\"headingsMap-4-0\"><span class=\"ez-toc-section\" id=\"2_Protect_%E2%80%8DYour%E2%81%A2_Data%E2%81%A4_with_2-Step_Authentication\"><\/span>2. Protect \u200dYour\u2062 Data\u2064 with 2-Step Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Data security is essential in our digital world. Protection\u2063 from online threats \u200ccan be achieved \u2063by implementing 2-Step Authentication to your online\u200c accounts.<\/p>\n<p>2-Step\u200b Authentication means that you\u2019ll need two different \u200band complementary pieces of information to access your accounts. Perhaps the most common\u2062 example \u200dof 2-Step Authentication is the\u2064 process of\u200b immediately\u2063 receiving\u2063 an SMS\u2062 code to your phone\u200d after\u200b you enter your username and password. Here\u2019s\u2062 how\u2062 it\u2062 works:<\/p>\n<ul>\n<li>You\u2062 first supply\u2062 a\u2062 username and password.<\/li>\n<li>You then receive\u2064 a one-time code.<\/li>\n<li>You \u200buse the code to get access to your account.<\/li>\n<\/ul>\n<p>The extra\u2062 step of verifying your identity \u200cthrough\u2062 2-Step \u200cAuthentication is much \u2063harder to hack, \u2062and therefore it\u2019s a \u200dgreat way to ensure the safety of your \u200ccritical data. These days, \u200cmost popular web services have \u200badded 2-Step Authentication. Take some time\u200d to set \u2062up this feature \u2063on yours \u2063and protect your accounts\u2062 with the\u2063 peace of \u200cmind that\u200c it\u2019s as\u200c secure as possible.<\/p>\n<h2 id=\"3-safeguard-your-business-with-enhanced-protection\" data-element-id=\"headingsMap-5-0\"><span class=\"ez-toc-section\" id=\"3_Safeguard_Your_Business_with_Enhanced_Protection\"><\/span>3. Safeguard Your Business with Enhanced Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Guarding Your \u2064Business with Top-Tier Protection<\/b><\/p>\n<p>In order \u2064to\u200c keep your business secure\u200b and safe, it\u2019s important to\u2064 invest in top-level protection. Nowadays, there are many \u2062entrepreneurs and companies that are targets \u2062of\u200d malicious attacks, which \u200bis why \u200cit\u2019s \u2062paramount that \u2062your business \u200bis kept safe with enhanced \u200bprotection. \u200dHere are a \u200dfew tips\u2062 to\u2063 ensure this:<\/p>\n<ul>\n<li>Implement\u200b heightened authentication measures. By using multi-factor\u2063 authentication, your business is\u200d provided \u200cwith an extra layer of protection \u2064that will help prevent unauthorized access.<\/li>\n<li>Develop strong passwords. As cyberattacks become more sophisticated, businesses can be overwhelmed if they are relying\u200b on\u2062 outdated passwords. To avoid\u200d this,\u200b passwords\u200b should contain a combination of upper and lowercase letters, numbers, and special characters.<\/li>\n<li>Monitor your networks and systems. Regularly maintaining and \u2064monitoring\u2062 your business\u2019 networks and systems \u2063is key to\u200c protecting the company\u2064 from any external threats that may occur.<\/li>\n<\/ul>\n<p>Businesses should also\u200b back up their \u2062data \u200bfrequently to ensure that if \u2063a \u2064cyberattack or technical error occurs, the data \u200dwill still \u2062be intact. Additionally,\u200d all employees should also be \u2064educated on online \u200csafety\u200b and security protocols \u200dso they know the proper procedures to take when necessary. By following these simple steps, businesses can feel confident that their data will\u2064 remain\u2064 secure.<\/p>\n<h2 id=\"4-take-control-of-your-workday-security-today\" data-element-id=\"headingsMap-6-0\"><span class=\"ez-toc-section\" id=\"4_Take_Control_of_Your_Workday_Security_Today\"><\/span>4. Take Control of Your Workday Security Today!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Facilitate Compliance \u200cwith Security Protocols<\/strong><\/p>\n<p>It is essential to take control of your\u200b workday \u2062security leading with compliance initiatives throughout your workplace. Leverage the company\u2062 policies \u2064and\u200d procedures as means to\u2064 <a href=\"https:\/\/logmeonce.com\/how-logmeonce-works\/\" data-abc=\"true\">operationalize \u200bcore security \u2063objectives<\/a> \u200blike data privacy and \u200caccess control. Engage stakeholders throughout the process and\u200b provide adequate training to ensure every employee is on \u2064the same \u200bpage \u2063when it comes\u2064 to established security protocols. Some examples\u200b of \u200bsecurity protocols that should be implemented include:<\/p>\n<ul>\n<li>Create policies for employee\u200d access credentials, passwords,\u200b and email.<\/li>\n<li>Set up protocols for the sharing of confidential information.<\/li>\n<li>Develop a strategy to securely store\u200c and access data \u2062both internally \u200dand \u2064externally.<\/li>\n<li>\u200cPut in place \u2064a system to continuously monitor the\u2064 workplace for\u200c potential security threats.<\/li>\n<\/ul>\n<p><strong>Enact\u200b Best \u2062Practices for Cybersecurity<\/strong><\/p>\n<p>To further protect your\u2063 workplace environment, <a title=\"Workday Two Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/workday-two-factor-authentication\/\" data-abc=\"true\">establish regular \u200dcyber security testing<\/a> and best practices \u2064such as \u2064the \u200cfollowing:<\/p>\n<ul>\n<li>\u2062 Conduct \u200congoing monitoring \u2062of networks \u200band systems.<\/li>\n<li>\u2063 Implement strong authentication methods to\u200c confirm user identities.<\/li>\n<li>Arm your\u200b team with data risks and\u200b security\u200c threats regularly.<\/li>\n<li>\u2062Practice \u200dproper file management and deletion techniques.<\/li>\n<li>Be vigilant in identifying unsafe websites and \u200demails.<\/li>\n<\/ul>\n<p>By establishing secure procedures and adapting \u2063best\u200b practices, you and\u2063 your team can take \u2064control of your\u200c workday \u200bsecurity,\u2064 ensuring maximum safety and security\u2063 for the \u2064workplace.\u200b<\/p>\n<p>Workday offers a robust multi-factor authentication (MFA) system to ensure the security of user accounts and access to sensitive information. This system involves the use of mobile devices and authentication apps such as Duo Security to provide an extra layer of security beyond just a password. Workday&#8217;s step-up authentication feature allows for conditional authentication policies based on factors such as device health indicators and login methods. This approach to security posture is vital in today&#8217;s digital landscape, where cyber threats are constantly evolving.<\/p>\n<p>By enabling 2-Factor Authentication (MFA) and following security guidelines, users can ensure that their access to <a href=\"https:\/\/www.workday.com\/en-gb\/homepage.html\" target=\"_blank\" rel=\"noopener nofollow\" data-abc=\"true\">Workday<\/a> and other enterprise applications is secure. Additionally, the use of strong authentication techniques and security protections helps to safeguard customer data and maintain a trusted access environment. With a focus on user access, security posture management, and security protocols, Workday&#8217;s two-factor authentication system is a valuable tool for organizations looking to enhance their security measures. Sources: Workday website, Duo Security website.<\/p>\n<p>Workday&#8217;s Two Factor Authentication (2FA) is a security feature that adds an extra layer of protection to your login process. With 2FA, users are required to provide two different authentication factors before gaining access to their account. This helps to prevent unauthorized access and protect sensitive information from potential security threats. Two factor authentication is a type of multi-factor authentication, which means it uses multiple methods to verify a user&#8217;s identity.<\/p>\n<p>To set up Two Factor Authentication in Workday, users can enable the option through their security settings. This can typically be done through a user&#8217;s profile settings in Workday. Once enabled, users may be prompted to download an authentication app such as Duo&#8217;s MFA, Authy 2-Factor authentication app, or the miniorange Authenticator app. These apps generate unique security codes that users must enter along with their password to authenticate their identity. Additionally, users can set up conditional authentication policies to further enhance security, such as requiring authentication from specific devices or under certain conditions.<\/p>\n<p>Once Two Factor Authentication is set up, users will be required to complete the second-factor authentication step each time they log in to Workday. This typically involves entering a security code from their authentication app in addition to their password. The security code prompt respects the authentication rule set by the user or administrator, ensuring a secure login process. Two Factor Authentication helps to ensure secure access to Workday and other enterprise cloud applications, protecting sensitive data and reducing the risk of unauthorized access.<\/p>\n<h2 data-element-id=\"headingsMap-7-0\"><span class=\"ez-toc-section\" id=\"Enhancing_Security_with_Workday_Two_Factor_Authentication_2FA\"><\/span>Enhancing Security with Workday Two Factor Authentication (2FA)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Key Benefits<\/th>\n<th>Details<\/th>\n<\/tr>\n<tr>\n<td>Improved Security<\/td>\n<td>2FA adds an extra layer of protection to your accounts<\/td>\n<\/tr>\n<tr>\n<td>Efficient Setup<\/td>\n<td>Quick and simple to enable, saving time and hassle<\/td>\n<\/tr>\n<tr>\n<td>Multi-Device Usage<\/td>\n<td>Compatible with laptops, smartphones, and tablets<\/td>\n<\/tr>\n<tr>\n<td>Business Protection<\/td>\n<td>Ideal for businesses of all sizes to safeguard valuable data<\/td>\n<\/tr>\n<tr>\n<td>Enhanced Compliance<\/td>\n<td>Meets security protocols and ensures workplace protection<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\" data-element-id=\"headingsMap-8-0\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Workday Two Factor Authentication?<br \/>\nA: Workday Two Factor Authentication, also known as 2-Factor Authentication (2FA), is a security feature that requires users to provide two different forms of verification before accessing their Workday accounts. This extra layer of security helps to protect sensitive information and prevent unauthorized access.<\/p>\n<p>Q: How does Workday Two Factor Authentication work?<br \/>\nA: Workday Two Factor Authentication typically involves something the user knows (such as a password) and something the user has (such as a security code generated by an authentication app on their mobile device). This combination of factors makes it more difficult for hackers to gain access to user accounts.<\/p>\n<p>Q: What are the benefits of implementing Workday Two Factor Authentication?<br \/>\nA: Workday Two Factor Authentication enhances security by reducing the risk of unauthorized access to sensitive data. It also helps to protect user accounts from password theft and phishing attacks. Additionally, it can help organizations comply with security regulations and standards.<\/p>\n<p>Q: How can users enable Workday Two Factor Authentication?<br \/>\nA: Users can enable Workday Two Factor Authentication by accessing their security settings within the Workday platform. They can then follow a step-by-step guide to set up their authentication apps and configure their authentication rules.<\/p>\n<p>Q: What are some recommended authentication apps for Workday Two Factor Authentication?<br \/>\nA: Some recommended authentication apps for Workday Two Factor Authentication include Duo&#8217;s MFA, Authy 2-Factor authentication app, and miniorange Authenticator app. These apps provide secure and convenient ways for users to generate security codes for authentication.<\/p>\n<p>Q: How does Workday&#8217;s step-up authentication enhance security?<br \/>\nA: Workday&#8217;s step-up authentication is a feature that prompts users to provide additional verification (such as a security code) when accessing certain sensitive areas or performing specific actions within the platform. This helps to prevent unauthorized access and protect critical business applications.<br \/>\n(Source: workday.com)<\/p>\n<h2 id=\"outro\" data-element-id=\"headingsMap-9-0\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-hvhgv-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-hvhgv-1n7m0yu\">\n<div class=\"flex flex-col text-sm md:pb-9\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-85\" data-scroll-anchor=\"true\">\n<div class=\"py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-5 juice:lg:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"6f16932a-b006-4e0b-9346-29290d67f278\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>If you&#8217;re seeking a reliable two-factor authentication solution for Workday that&#8217;s both secure and user-friendly, consider the free account offered by LogMeOnce. With LogMeOnce&#8217;s robust two-factor authentication, secure sign-in processes, and enterprise-grade encryption, you can trust that your Workday account remains protected. By utilizing <a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce&#8217;s<\/a> free account, you can easily enhance your authentication security with additional layers of protection, ensuring your Workday experience is always secure. Benefit from LogMeOnce&#8217;s strong encryption to keep your Workday Two Factor Authentication safe and secure at all times.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover the importance of Workday Two Factor Authentication for enhancing workplace security. Learn how to set it up easily and ensure your sensitive data stays safe. Consider creating a FREE LogMeOnce account with Auto-login, SSO, and Identity Theft Protection for comprehensive protection. Safeguard your Workday account today!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[935,7185,1294,781,3028],"class_list":["post-68268","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-cybersecurity","tag-workday","tag-authentication","tag-security","tag-two-factor"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68268"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68268\/revisions"}],"predecessor-version":[{"id":240640,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68268\/revisions\/240640"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}