{"id":68583,"date":"2024-06-19T19:52:31","date_gmt":"2024-06-19T19:52:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/where-to-find-two-factor-authentication-code\/"},"modified":"2024-06-19T19:52:31","modified_gmt":"2024-06-19T19:52:31","slug":"where-to-find-two-factor-authentication-code","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/","title":{"rendered":"Where To Find Two Factor Authentication Code?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2064 Online security is\u200d an \u200cimportant\u200b concern for \u200beveryone \u200cthese days.\u2064 With countless\u2063 online accounts to\u2064 manage, it\u2019s no \u200cwonder people are \u200dstarting to take their password \u2063protection to the next \u200blevel. Two-Factor \u2064Authentication \u200dis \u2063one \u2063such measure that is\u2063 meant\u200d to\u2063 secure online\u200d accounts. Knowing \u200dwhere to find a two\u2062 factor \u2064authentication \u200dcode is\u200d essential\u200d for \u2063account security. To\u2064 make online accounts even more secure \u2063than with a\u2063 password, two-factor authentication adds an extra layer of security. It \u2063requires the use \u200dof \u2063a random code, \u2064known as \u2064a\u200d two factor\u2062 authentication\u200c code to gain access to an account. This code can be found \u2064using a \u200dvariety of \u2063methods such \u200das \u2062using an authentication application\u200d on your smartphone or\u200c receiving them via\u200d e-mail or SMS. By using two factor authentication, users\u2062 can rest assured that\u200b their\u200d accounts are protected from unauthorized \u200baccess. Keywords: \u200c\u201dTwo Factor Authentication Code\u201d, \u201cAuthentication Application\u201d.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#1_Unlocking_Two_Factor%E2%81%A2_Authentication_with_Ease\" >1) Unlocking Two Factor\u2062 Authentication with Ease<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#2%E2%81%A4_Discovering_the_Secrets_of_Two_Factor_Verification\" >2)\u2064 Discovering the Secrets of Two Factor Verification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#3_Securing_Your_Account_%E2%81%A2with_Two_Factor_Authentication\" >3) Securing Your Account \u2062with Two Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#4_Getting_the_%E2%80%8C2FA_Code_Quickly_and_Easily\" >4) Getting the \u200c2FA Code Quickly and Easily<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#Summary_of_Security_and_Authentication_Methods\" >Summary of Security and Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlocking-two-factor-authentication-with-ease\"><span class=\"ez-toc-section\" id=\"1_Unlocking_Two_Factor%E2%81%A2_Authentication_with_Ease\"><\/span>1) Unlocking Two Factor\u2062 Authentication with Ease<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Two \u2062factor \u2063authentication (2FA)\u2062 is an \u200dimportant tool\u2063 for modern online safety.<\/strong> \u200b It adds an extra layer of security to your accounts \u2064by requiring\u2063 two \u2064independent\u200d pieces of information\u2064 before you can access it.\u2064 This usually comes in the \u2063form of something you\u2064 know, like a password, plus something you have, like\u200d a\u2063 phone or \u2063a hardware token.\u2064 It makes \u2063it much\u200d more difficult for hackers\u2064 to get access \u200bto your accounts.<\/p>\n<p>However, two factor authentication \u2062is\u200d not always convenient. Getting access to your accounts can involve\u200d an extra step\u200b that might \u200btake longer \u200cthan \u2062you \u200dwant, or \u2063the \u2064method you need (like a physical token) \u200cmay not be available. That\u2019s why many companies today \u2062are offering simple and\u200c secure ways to\u2064 unlock 2FA with ease.<\/p>\n<ul>\n<li>Trusted devices \u200ballow for \u200cquick access to your \u2063account.<\/li>\n<li>Biometrics\u200b are making \u200cit easier to \u2064login \u200bwithout \u2062a token.<\/li>\n<li>One \u2063time passwords \u2062are sent via \u2062text\u2064 message\u2064 or \u200cemail.<\/li>\n<\/ul>\n<p>By setting up\u2063 trusted devices,\u200c you can quickly access your account without the\u2064 need to enter your passwords again. This \u200cis especially\u200b useful\u200d for companies \u2062that require regular \u2064access to accounts or use two \u200bfactor authentication for internal networks. Biometric scanners, such as \u200dfingerprint\u200b and facial recognition, are \u200bbeing used\u200c more and more, allowing you to unlock your accounts with just \u2062a touch. Finally, one time passwords are becoming \u200bmore popular. These are sent via text\u200d message or \u200bemail and must be used within \u200ba certain \u2064period \u2062of time \u2062in order to get access to\u2062 your account. All \u200cof\u2063 these methods are \u2064user-friendly and provide an extra layer of security to\u200b your\u200c accounts.<\/p>\n<h2 id=\"2-discovering-the-secrets-of-two-factor-verification\"><span class=\"ez-toc-section\" id=\"2%E2%81%A4_Discovering_the_Secrets_of_Two_Factor_Verification\"><\/span>2)\u2064 Discovering the Secrets of Two Factor Verification<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Two Factor Verification: A Closer Look<\/b><\/p>\n<p>Two factor verification (2FA) \u200bis \u2064becoming a more popular\u200b security\u2062 tool for protecting your accounts\u2064 and devices from hackers and \u200cdata-theft. But what is it \u200dand how \u2063can you\u2062 use it to\u2062 safeguard your sensitive information?<\/p>\n<p>Put simply, 2FA requires two\u200d elements for successful \u2062access to \u2062a given account: \u200dsomething you have (like a device) and something you know (like a\u2062 password). Unlike single factor authentication\u200d (which only requires one password or key),\u200c 2FA adds another layer\u2063 of protection. To\u2064 access an \u2063account, \u200byou\u2019ll \u2062need \u2062both\u2064 a \u200bpassword and a unique \u2063code that is sent\u200d to \u2063a device that\u200d you \u200calready have.\u2063<\/p>\n<p>Here are some of the advantages\u200d 2FA offers:<\/p>\n<ul>\n<li>Increased\u200d security:\u2062 2FA protects your \u2064accounts \u200bfrom\u2063 unauthorized \u2062access, even if someone \u200bobtains your \u2064password.<\/li>\n<li>Non-physical access: \u2063Because you no longer need\u2064 physical access to a machine, 2FA allows quick access to an account from any device.<\/li>\n<li>Portability: You \u200ccan easily set\u2063 up 2FA\u200d on \u2062multiple devices\u2064 and link them to one account.<\/li>\n<\/ul>\n<p>If you are looking to add\u2064 an extra layer\u2063 of \u200bsecurity to your \u200conline accounts, 2FA is a great option to\u200b consider. It requires minimal effort \u200dand adds\u2062 a significant boost to your overall security.<\/p>\n<h2 id=\"3-securing-your-account-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_Securing_Your_Account_%E2%81%A2with_Two_Factor_Authentication\"><\/span>3) Securing Your Account \u2062with Two Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These days,\u200d it\u2019s almost \u200dessential to secure your accounts with \u200dtwo\u2064 factor\u200c authentication. To\u200c make \u2064sure\u200b your\u2064 online accounts are extra\u2064 secure, two\u2064 factor authentication adds an \u2064extra layer of protection. It works by requiring two pieces of information to login to your account.\u2064 It could\u2064 be a combination of your password and a \u2063code from an authenticator app, or one\u2062 time\u200c password, or a verification \u2063email \u200cor text message. Here are some of the benefits\u2064 of using \u200dtwo factor\u2064 authentication:<\/p>\n<ul>\n<li>It \u2064adds an extra layer of security that makes it \u200bharder\u2064 for hackers to \u2062break into your account.<\/li>\n<li>Even\u2064 if someone\u200d gets \u2063your \u200busername and password, they won\u2019t be able to access\u2064 your account\u200b without the\u2064 additional factor.<\/li>\n<li>Two-factor \u200dauthentication\u200b can\u2063 be used to\u200c prevent \u200baccount takeover.<\/li>\n<\/ul>\n<p>Two-factor authentication can also help protect your personal\u200b information from being used for\u200d malicious purposes. Even if your \u200cpassword is \u2064compromised, your account is still secure with\u200b two-factor authentication.\u200b So, it\u2019s\u200c worth taking the\u200d time\u200b to implement two-factor authentication\u2062 on your accounts.<\/p>\n<h2 id=\"4-getting-the-2fa-code-quickly-and-easily\"><span class=\"ez-toc-section\" id=\"4_Getting_the_%E2%80%8C2FA_Code_Quickly_and_Easily\"><\/span>4) Getting the \u200c2FA Code Quickly and Easily<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>After setting \u200bup two-factor \u200cauthentication (2FA) \u200don a device \u200cor account, it\u2019s critical to access the code quickly and efficiently.\u2062 Here\u200d are four tips for retrieving your 2FA code \u200cmore easily:<\/p>\n<ul>\n<li><strong>Streamline the process:<\/strong> As \u200dyou\u2064 set up 2FA on your device, \u200dlook \u200bout for options that\u2063 can expedite \u2063the retrieval\u2062 process. Some\u200b providers\u2063 let you\u2063 add\u200c specific\u2064 contacts who can access the code, set up a\u2064 question-and-answer \u200dsequence to curb \u200dfraudulent input, \u200cor\u200b even store code snippets to your calendar.<\/li>\n<li><strong>Store your code:<\/strong> If sent \u2063by \u2063email or SMS, \u200bcopy your 2FA code and store \u200dit somewhere\u2062 safe and accessible, such as a\u2063 secure\u2064 cloud \u2063drive or encrypted \u200bpassword manager. You \u200bcan also \u200dtake a \u2062screenshot and store that somewhere safe.<\/li>\n<li><strong>Implement shortcuts:<\/strong> Services like Google Authenticator Allow you to store multiple 2FA\u2062 codes\u2062 on a \u2062single page, plus shorten\u2063 the reentry \u2062process. You can\u200c also <a href=\"https:\/\/logmeonce.com\/how-secure-is-logmeonce\/\">enable\u200c push notifications<\/a>, which sends the code directly\u2062 to your smartphone.<\/li>\n<li><strong>Account\u2063 for emergency access:<\/strong> Sometimes there\u200d can be technical issues,\u200c such as \u200b<a href=\"https:\/\/logmeonce.com\/how-logmeonce-works\/\">bad signal\u200c strength<\/a>, or\u200b urgent requests \u2062for access when you don\u2019t have your device on you. Be \u2064prepared for these occasions by having a back-up number or \u2064email\u2064 for quick 2FA access.<\/li>\n<\/ul>\n<p>Using these tips, you can be sure that you get \u2063your 2FA code \u2062when you need it the most, and\u2064 live confidently in a \u2064secure digital world.<\/p>\n<p>Two-factor authentication (2FA) is a crucial security feature that adds an extra layer of protection to your online accounts. When setting up 2FA, you will need a security code, also known as a login code or temporary password, in addition to your regular password combination. This code is typically a six-digit code that is sent to you via SMS, email, or generated by an authenticator app such as Google Authenticator or Duo Mobile. If you ever lose access to your primary authentication method, there are backup methods available such as using backup codes or contacting customer service for assistance.<\/p>\n<p>Mobile services like Tap Security offer time-based one-time passwords (TOTP) through QR codes that can be scanned by authenticator apps for added security. Onscreen instructions and confirmation codes are also used to verify your identity when logging in. Additionally, some services may send the authentication code to your mobile phone number as an extra security measure to prevent phone number-based hacks. It is recommended to regularly update your security settings, such as enabling notification settings and reviewing your profile information to ensure your account is protected. By utilizing these various authentication methods and security features, you can better safeguard your online accounts from unauthorized access.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Summary_of_Security_and_Authentication_Methods\"><\/span>Summary of Security and Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Concept<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Profile Icon<\/td>\n<td>Unique visual representation of a user profile.<\/td>\n<\/tr>\n<tr>\n<td>Faster Service<\/td>\n<td>Enhanced speed in providing services to users.<\/td>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Using more than one method to verify a user&#8217;s identity.<\/td>\n<\/tr>\n<tr>\n<td>6-Digit Authentication Code<\/td>\n<td>A 6-digit code used for authentication purposes.<\/td>\n<\/tr>\n<tr>\n<td>Backup Code<\/td>\n<td>An additional code for accessing accounts in case of emergency.<\/td>\n<\/tr>\n<tr>\n<td>Two-Factor Authentication<\/td>\n<td>Using two different methods to verify a user&#8217;s identity.<\/td>\n<\/tr>\n<tr>\n<td>Mobile Settings<\/td>\n<td>Settings related to mobile devices and apps.<\/td>\n<\/tr>\n<tr>\n<td>Profile Photo<\/td>\n<td>Image representing the user&#8217;s profile.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What \u200dis two factor \u2064authentication?<br \/>\nA: Two factor authentication (also\u200b known \u2063as 2FA)\u2062 is \u2063an extra\u2062 layer of security used to help protect online accounts from \u200bhackers. It requires two separate methods of verifying your identity before you \u200dcan gain access to\u200c your\u2064 account, such as a \u200dpassword \u200band an authentication\u2063 code from a unique device \u2063like your phone, tablet,\u2062 or computer.<\/p>\n<p>Q: How can I find my\u200b two factor authentication code?<br \/>\nA: To find\u2063 your authentication code, \u2064you\u2019ll need to open the \u2064app associated with your\u200c account \u2013 usually the\u2063 Google Authenticator app, or an app provided \u2062by the website or\u200d service you\u2019re using. When \u2063you open the app, \u200cyou\u2019ll\u200d see \u2063a code that changes every\u2062 few seconds. This code \u200dis\u200b your two factor authentication code.<\/p>\n<p>Q: Where can I find my two-factor authentication code?<br \/>\nA: You can find your two-factor authentication code from various sources such as your mobile device, email address, or through a code generator app on your smartphone. The code is typically a 6-digit verification code that adds an extra layer of security to your login process.<\/p>\n<p>Q: What are backup codes in two-factor authentication?<br \/>\nA: Backup codes are additional methods of authentication that can be used in case you are unable to receive your primary verification code. These codes are usually single-use and can be saved in a secure location for future use.<\/p>\n<p>Q: How can I set up two-factor authentication on my Android device?<br \/>\nA: To set up two-factor authentication on your Android device, you can navigate to your security settings and enable 2-Step Verification. This feature will prompt you to enter a verification code each time you log in to your account for added security.<\/p>\n<p>Q: Can I receive my two-factor authentication code via SMS text message?<br \/>\nA: Yes, you can opt to receive your two-factor authentication code via SMS text message to your mobile phone. This method is commonly used for quick and convenient access to your verification code.<\/p>\n<p>Q: What is the purpose of a physical security key in two-factor authentication?<br \/>\nA: A physical security key is a hardware device that provides an additional layer of security for your accounts. It is often used in conjunction with other authentication methods to ensure the highest level of protection against unauthorized access.<\/p>\n<p>Q: How can I disable two-factor authentication if needed?<br \/>\nA: You can disable two-factor authentication by navigating to your security settings and locating the Disable button for 2-Step Verification. This process may vary depending on the platform or service you are using, so it is recommended to follow the on-screen instructions carefully.<\/p>\n<p><a href=\"http:\/\/myaccount.google.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Sources<\/a>:<br \/>\n&#8211; Google Support: support.google.com<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we explored\u2064 the\u2064 various methods\u200d for \u2064finding two-factor \u2062authentication codes, it \u2064is clear that creating a\u200b free LogMeOnce account is \u200bthe most\u2064 efficient way to ensure secure\u200d logins. LogMeOnce \u2063account provides you with the necessary codes to unlock accounts with two-factor authentication,\u2064 while also protecting your passwords with the most\u200c advanced \u200bsecurity\u200c methods. \u200cWith <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can easily and quickly locate two-factor authentication codes \u2063so\u200d you can \u2064ensure that your\u2063 information remains \u200bprotected. \u2062Make sure \u2062to take\u200d advantage\u200b of LogMeOnce\u2019s free account to find your two<a title=\"Where To Find Two Factor Authentication Code\" href=\"https:\/\/logmeonce.com\/resources\/where-to-find-two-factor-authentication-code\/\">-factor\u200d authentication codes today<\/a> \u200dfor optimal online security and protection -\u200b it\u2019s the answer to \u200dthe question of \u201cwhere to\u200d find Two Factor Authentication code\u201d!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2064 Online security is\u200d an \u200cimportant\u200b concern for \u200beveryone \u200cthese days.\u2064 With countless\u2063 online accounts to\u2064 manage, it\u2019s no \u200cwonder people are \u200dstarting to take their password \u2063protection to the next \u200blevel. Two-Factor \u2064Authentication \u200dis \u2063one \u2063such measure that is\u2063 meant\u200d to\u2063 secure online\u200d accounts. Knowing \u200dwhere to find a two\u2062 factor \u2064authentication \u200dcode is\u200d [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[4906,5775,970,781,1788],"class_list":["post-68583","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-code","tag-internet-safety","tag-online-protection","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68583"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68583\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}