{"id":68445,"date":"2024-06-19T19:28:15","date_gmt":"2024-06-19T19:28:15","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/what-is-two-factor-authentication\/"},"modified":"2024-12-28T08:27:56","modified_gmt":"2024-12-28T08:27:56","slug":"what-is-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/","title":{"rendered":"What Is Two-Factor Authentication?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u200dWhat is Two-Factor Authentication? This <a title=\"What Is Two-Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/\" data-abc=\"true\">security\u200d measure helps protect online account information<\/a> \u200bby providing an\u2064 extra layer of security beyond \u2063a \u2063password. With \u200ba \u2064two-factor authentication\u2062 (2FA) system,\u200b users\u200c must provide two pieces of evidence to gain\u200d access\u2062 to an online account. This \u200dsecond piece of\u2062 evidence could be \u2064something like an OTP (One-Time Password) \u200bsent to a user\u2019s \u200bcellphone or a \u2063biometric scan, such as a \u2063fingerprint. This system ensures that \u200deven if a hacker gets access to a \u200duser\u2019s \u2063password, they will still \u200dnot be able to access \u2063their\u200d account.\u2063 Two-Factor Authentication \u2063is \u2063becoming\u200d increasingly\u2064 popular with businesses and individuals\u2063 looking for intelligent cyber-security solutions. As a\u200c result, it is \u200dimportant to understand what two-factor authentication \u2062is and how it\u200c works in order to use it to its\u200c fullest potential.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#1_What_%E2%80%8Dis%E2%81%A4_Two-Factor_Authentication\" >1. What \u200dis\u2064 Two-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#2_How_Does_Two-Factor_Authentication_Work\" >2. How Does Two-Factor Authentication Work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#3_Do_You_Need_%E2%81%A3Two-Factor%E2%80%8B_Authentication\" >3. Do You Need \u2063Two-Factor\u200b Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#4_Learn_How_to_Enable_Two-Factor%E2%80%8C_Authentication_for%E2%80%8D_Extra%E2%80%8D_Security\" >4. Learn How to Enable Two-Factor\u200c Authentication for\u200d Extra\u200d Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#Authentication_Methods_Overview\" >Authentication Methods Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication\" data-element-id=\"headingsMap-3-0\"><span class=\"ez-toc-section\" id=\"1_What_%E2%80%8Dis%E2%81%A4_Two-Factor_Authentication\"><\/span>1. What \u200dis\u2064 Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication \u2063is an \u200dimportant \u2064security feature\u200d designed to keep your online accounts and information safe.<br \/>\n<b>How Does it Work?<\/b> \u200cTwo-factor\u2064 authentication typically requires two different\u2063 forms of identification \u2062from the user\u200c to verify their identity. The\u2064 two steps may \u200binclude a \u200bcombination\u200d of\u200d passwords, security questions, pins, security tokens, or biometric readings\u200c such as fingerprints\u200b or retinal scans.<br \/>\n<b>Why is it \u2062Important?<\/b> It helps prevent unauthorized access\u200b to \u2062your accounts, even if\u200d someone were to\u200b guess\u200c your password. Having two-factor authentication in place makes \u200bit more \u2064difficult \u2063for unauthorized individuals\u2062 or\u2064 malicious\u200b groups to gain access \u2063and compromise your security. By \u200dadding another\u2064 layer \u2064of protection, it reduces the risk\u2064 of online identity theft, \u2064financial \u2062fraud, \u2064and other malicious activity.<\/p>\n<ul>\n<li>Two-factor authentication requires two different\u2062 forms of identification<\/li>\n<li>Combines passwords, \u200csecurity questions, pins, tokens, and \u2064biometrics<\/li>\n<li>Helps prevent unauthorized access and malicious activity<\/li>\n<li>Reduces the risk of online identity theft and financial fraud<\/li>\n<\/ul>\n<p>\u200c<br \/>\nIt\u2019s \u2062important to remember that two-factor authentication isn\u2019t foolproof. It\u2019s not designed to stop\u200b sophisticated \u200chacking operations; rather, it adds an \u200cextra\u2064 layer of \u200dsecurity\u200d and \u2062can prevent other more commonplace threats and risks. When \u200benabled, two-factor authentication\u2063 should make it more difficult for a hacker to \u200cgain access, however,\u2063 it\u2019s still\u2063 a good idea to always practice basic online security hygiene and be aware of \u2062the potential security risks.<\/p>\n<h2 id=\"2-how-does-two-factor-authentication-work\" data-element-id=\"headingsMap-4-0\"><span class=\"ez-toc-section\" id=\"2_How_Does_Two-Factor_Authentication_Work\"><\/span>2. How Does Two-Factor Authentication Work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b> Two-factor authentication<\/b> is\u200c a\u2064 security measure that requires two\u2064 different\u200b methods of identification \u2062when logging into \u200da website or using an application. It is designed to\u2064 prevent unauthorized users from \u2062accessing\u200c sensitive\u200c data \u2063stored \u200dwithin the system. Here\u2019s how two-factor\u200d authentication\u200c works:<\/p>\n<ul>\n<li>A user begins the \u200bauthentication \u2064process by entering a \u200dusername \u200band password,\u2062 the first\u200b \u201cfactor\u201d<\/li>\n<li>The \u200dsecond factor requires the user to\u200d authenticate their \u200bidentity by using \u2063a separate piece of information,\u2063 such as a\u2064 code sent to their phone, email address, or\u2063 authentication app<\/li>\n<li>Once\u2063 the user completes both authentication steps, they are\u200c given access \u2064to \u2062the system<\/li>\n<\/ul>\n<p>Two-factor \u200cauthentication \u200bprovides an\u200b additional layer of security\u200d to \u2063protect \u200cthe user\u2019s\u200c data\u200c and \u2062identity. It \u2064can be used to secure accounts used at home or in \u200dan office\u2064 environment, or to access corporate servers. \u200dIt is also used to \u2062verify a\u200b user\u2019s \u200cidentity \u2062when making\u200b online \u2062payments\u2062 or\u2063 buying products. Two-factor authentication ensures that even \u200dif \u2063a user\u2019s \u2062password is \u2062compromised, their\u2062 accounts and data remain secure.<\/p>\n<h2 id=\"3-do-you-need-two-factor-authentication\" data-element-id=\"headingsMap-5-0\"><span class=\"ez-toc-section\" id=\"3_Do_You_Need_%E2%81%A3Two-Factor%E2%80%8B_Authentication\"><\/span>3. Do You Need \u2063Two-Factor\u200b Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>What is Two-Factor Authentication?<\/b><br \/>\nTwo-factor authentication (2FA) adds an extra layer\u2062 of\u200b security to your online\u2062 profiles and \u2063accounts. It requires \u2062two \u2064pieces of information \u2063to \u2064sign in. Generally, this is your username\/password combination along with an additional factor \u200dlike a code sent via SMS, \u200da code generated by an app \u200don your \u200dphone, or an\u2063 emailed code.<\/p>\n<p>For most people, the\u2062 simple\u2063 answer is\u2062 yes.\u2062 Here are some reasons\u2062 why you should strongly consider using 2FA:<\/p>\n<ul>\n<li>You want extra\u2064 security to protect your\u200c accounts,\u200b data, identity, and financial\u2062 information.<\/li>\n<li>You \u200duse a \u2064cloud storage service or website where sensitive data\u2064 is stored.<\/li>\n<li>You\u2019re \u2063transferring large amounts of money electronically.<\/li>\n<li>You\u2019re using a\u200b system\u200d where large numbers of \u2062people have access to\u200c the\u2062 same account.<\/li>\n<\/ul>\n<p>Two-factor authentication is\u2062 an\u2062 effective way to secure your online accounts and prevent unauthorized access. So, if \u200bthe additional \u2063effort\u200c of two-factor authentication is worth the\u2062 added peace of mind it can provide,\u2064 then you should set it up if you can.<\/p>\n<h2 id=\"4-learn-how-to-enable-two-factor-authentication-for-extra-security\" data-element-id=\"headingsMap-6-0\"><span class=\"ez-toc-section\" id=\"4_Learn_How_to_Enable_Two-Factor%E2%80%8C_Authentication_for%E2%80%8D_Extra%E2%80%8D_Security\"><\/span>4. Learn How to Enable Two-Factor\u200c Authentication for\u200d Extra\u200d Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor \u2063authentication (2FA) is an excellent way to\u200d improve the\u2064 security\u200b of your\u2062 online accounts. It requires you to\u2064 provide additional\u200b information, such\u200c as a \u200done-time \u200bcode, when logging in to your\u2064 account. It provides\u200c an extra \u2064layer of\u200c protection, helping to stop\u2064 hackers\u2062 from gaining access to your accounts and data. \u2064Here\u2019s how you\u2062 can \u2064enable two-factor authentication:<\/p>\n<ul>\n<li>Find\u2063 out\u2064 if your account offers a two-factor authentication option and, if\u2062 so, how to enable it. Most\u2062 sites now offer \u20622FA as \u2063an option, and some even require it.<\/li>\n<li>Gather the things\u2064 you\u2019ll need to \u2064set\u200b up \u200btwo-factor authentication. This usually includes a secondary \u2063device such as a mobile phone or an app\u200d on your computer. \u200cAdditionally, you may need\u200d access codes, often sent\u2064 via text message or email.<\/li>\n<li>Go through the steps to enable two-factor authentication. This\u2064 could include \u2062going into your account\u2019s security settings, \u2063setting up app-generated codes, or \u200bproviding a\u200c code sent to \u2063your device.<\/li>\n<\/ul>\n<p><strong>Keep\u2062 in mind \u200dthat \u200ctwo-factor authentication\u2062 only works if you use it. If you turn it off or lose \u2063access to the device \u2064on which two-factor authentication is enabled, \u200bthen you could\u200d be at risk of \u2062someone \u200dgain access to your account.\u2064 Stay\u200b vigilant \u2063and keep the two-factor \u2062authentication \u2062activated for maximum security.<\/strong><\/p>\n<p>Two-factor authentication, also known as multi-factor authentication, is a security measure that requires users to provide two different forms of identification before gaining access to a system or account. This could include something the user knows, such as a password, and something the user has, like a smartphone or authentication token. By requiring both personal identification and a physical device to complete the authentication process, two-factor authentication significantly enhances the level of security and reduces the risk of unauthorized access. The process typically involves an authentication attempt, where the user must verify their identity through a two-step verification process, such as entering a code sent to their mobile device or inserting a USB port into their computer. Factors of authentication can include possession factors (e.g., a physical device), knowledge factors (e.g., a password or pin code), and inherence factors (e.g., fingerprint or iris scanning). Multi-factor authentication can be achieved through a variety of methods, such as adaptive authentication that adjusts the level of security based on the user&#8217;s behavior, time-based one-time passwords, and biometric factors like fingerprint scans or facial recognition. Organizations, including financial institutions and online service providers, are increasingly implementing two-factor authentication to protect against cyber threats and security breaches. This combination of authenticators helps create a strong defense against attacks on login credentials, ensuring that only legitimate users can access sensitive data and resources. By incorporating two-factor authentication into their security protocols, businesses can strike a balance between convenience for users and robust protection against external threats. To further enhance security, companies can also utilize risk-based authentication that evaluates the risk level of each login attempt and implements additional security measures as needed. It is important for organizations to stay informed on the latest authentication tools and methods to safeguard against potential vulnerabilities and mitigate the risk of unauthorized access to digital resources. Building layers of security, such as using password managers, temporary passwords, and backup codes, in conjunction with two-factor authentication, can help reduce attack surfaces and strengthen overall security measures. As cyber criminals and hackers continue to evolve their tactics, it is crucial for businesses to implement strong authentication processes to protect sensitive data and minimize the impact of potential security breaches. <a href=\"https:\/\/www.twilio.com\/en-us\/user-authentication-identity\/verify\" target=\"_blank\" rel=\"noopener nofollow\" data-abc=\"true\">Source<\/a>: Duo Security, Two-Factor Authentication Guide, duo.com<\/p>\n<h2 data-element-id=\"headingsMap-7-0\"><span class=\"ez-toc-section\" id=\"Authentication_Methods_Overview\"><\/span>Authentication Methods Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Authenticates users with more than one factor like something you know, have, or are.<\/td>\n<\/tr>\n<tr>\n<td>Two-Factor Authentication<\/td>\n<td>Requires users to provide two different factors of authentication to access an account or system.<\/td>\n<\/tr>\n<tr>\n<td>Smart Card<\/td>\n<td>Physical card that stores digital certificates for secure authentication.<\/td>\n<\/tr>\n<tr>\n<td>Fingerprint Reader<\/td>\n<td>Verifies identity by scanning and matching fingerprint patterns.<\/td>\n<\/tr>\n<tr>\n<td>Time Factor<\/td>\n<td>Authentication method that is time-sensitive, requiring verification within a set timeframe.<\/td>\n<\/tr>\n<tr>\n<td>Facial Scans<\/td>\n<td>Biometric authentication that uses facial recognition technology to verify identity.<\/td>\n<\/tr>\n<tr>\n<td>Push-based Authentication<\/td>\n<td>Sends push notifications to a user&#8217;s device for secure authentication.<\/td>\n<\/tr>\n<tr>\n<td>Soft Tokens<\/td>\n<td>Software-based tokens that generate one-time codes for authentication purposes.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\" data-element-id=\"headingsMap-8-0\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q. What is Two-Factor Authentication?<br \/>\nA. Two-Factor Authentication\u2063 (2FA) is \u2063a way of making sure that someone accessing an account,\u200c such as an online banking\u200c account, \u2064is really who they say they are. \u2062It\u200d is an\u200c extra layer of security added to your account. It involves using two\u200b different things to \u2063prove your identity,\u200c such as a code sent to \u2063your email \u2062or a \u200bspecial key. This \u200cmakes it much harder for people to\u2063 gain unauthorized access\u2064 to your accounts. Two-Factor Authentication helps keep your accounts and \u200cinformation safe\u200c and secure.<\/p>\n<p>Q: What is Two-Factor Authentication (2FA)?<br \/>\nA: Two-Factor Authentication (2FA) is a security process that requires users to provide two different authentication factors to verify their identity before gaining access to an account or system. This adds an extra layer of security beyond just a password.<\/p>\n<p>Q: What are the authentication factors involved in Two-Factor Authentication?<br \/>\nA: The authentication factors involved in Two-Factor Authentication can include something the user knows (such as a password), something the user has (such as a security key or mobile device), or something the user is (such as a biometric scan like a fingerprint or facial recognition).<\/p>\n<p>Q: How does Two-Factor Authentication enhance security compared to traditional passwords?<br \/>\nA: Two-Factor Authentication enhances security by requiring an additional authentication factor beyond just a password. This helps protect against various threats such as phishing attacks, social engineering attacks, and password breaches.<\/p>\n<p>Q: What are some common forms of authentication used in Two-Factor Authentication?<br \/>\nA: Common forms of authentication used in Two-Factor Authentication include one-time passcodes, security keys, biometric scans, push notifications, email or SMS codes, and authenticator apps.<\/p>\n<p>Q: What are some examples of Two-Factor Authentication methods?<br \/>\nA: Some examples of Two-Factor Authentication methods include using a security key and entering a security code sent to a mobile device, or using a biometric scan along with entering a password.<\/p>\n<p>Q: How can Two-Factor Authentication be implemented in different types of systems or applications?<br \/>\nA: Two-Factor Authentication can be implemented in various ways, such as using a mobile authenticator app, hardware tokens, biometric authentication, or push notifications to verify user identities.<\/p>\n<p>Q: What are the benefits of using Two-Factor Authentication for access management?<br \/>\nA: Two-Factor Authentication enhances access management by providing an additional security layer that helps prevent unauthorized access to accounts or systems, especially for remote access or sensitive information.<\/p>\n<p>Q: What are some common threats that Two-Factor Authentication helps protect against?<br \/>\nA: Two-Factor Authentication helps protect against common threats such as phishing attacks, man-in-the-middle attacks, brute-force attacks, social engineering attacks, and unauthorized access attempts.<\/p>\n<p>Q: How does Two-Factor Authentication help organizations meet compliance requirements for security standards?<br \/>\nA: Two-Factor Authentication helps organizations meet compliance requirements by adding an additional security measure to protect sensitive data and ensure proper identity verification for user access.<\/p>\n<p>Q: Can Two-Factor Authentication be used for personal devices and online accounts?<br \/>\nA: Yes, Two-Factor Authentication can be used for personal devices like smartphones or laptops, as well as online accounts for email, social media, banking, and other sensitive systems to enhance security.<\/p>\n<p>(Source: Duo Security &#8211; A Guide to Two-Factor Authentication &#8211; duo.com)<\/p>\n<h2 id=\"outro\" data-element-id=\"headingsMap-9-0\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication is a great way \u200dfor users to \u200bkeep their data secure. Create a free LogMeOnce account and\u2064 take\u2064 your security to the next \u200dlevel. With two-factor authentication, you\u200d can be sure that \u200dyour data is safe\u200d and secure. Adding two-factor authentication\u200d is \u2062an \u2062effective \u2064way\u200d to protect yourself\u2063 online. Make sure\u200c your online accounts are \u2062safe\u200d by\u2062 creating\u2064 a \u200dfree\u00a0<a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a>\u2063 account today and taking \u2064advantage \u2064of\u200d two-factor authentication security measures.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u200dWhat is Two-Factor Authentication? This security\u200d measure helps protect online account information \u200bby providing an\u2064 extra layer of security beyond \u2063a \u2063password. With \u200ba \u2064two-factor authentication\u2062 (2FA) system,\u200b users\u200c must provide two pieces of evidence to gain\u200d access\u2062 to an online account. This \u200dsecond piece of\u2062 evidence could be \u2064something like an OTP (One-Time Password) [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[811,817,11183,781,1788],"class_list":["post-68445","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-online-safety","tag-password-protection","tag-safety-measures","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68445"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68445\/revisions"}],"predecessor-version":[{"id":240595,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68445\/revisions\/240595"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}