{"id":68694,"date":"2024-06-19T19:57:31","date_gmt":"2024-06-19T19:57:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/how-do-i-get-two-factor-authentication\/"},"modified":"2024-08-19T12:59:16","modified_gmt":"2024-08-19T12:59:16","slug":"how-do-i-get-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/","title":{"rendered":"How Do I Get Two Factor Authentication?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Do you \u2062find yourself asking, \u201cHow do I get Two Factor Authentication (2FA)?\u201d 2FA is an important security measure that helps protect your online accounts from\u2063 unauthorized access. It is \u2064an\u2063 extra layer of protection that requires you to verify your identity using \u2064two pieces of information: your passwords and \u200ca one-time verification\u200d code sent to your device \u2063or email address. With two-factor authentication, you have\u2064 peace of\u2063 mind knowing your accounts are secure as you go about your online activities. In this article, you will learn how to set up and\u2064 utilize two-factor authentication to make sure your sensitive information is protected.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#1_What_is_Two_Factor_Authentication\" >1. What is Two Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#2_Benefits_of_Adding_Two_%E2%81%A4Factor_Authentication\" >2. Benefits of Adding Two \u2064Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#3_How_to_Set_Up_Two_Factor_Authentication\" >3. How to Set Up Two Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#4_Tips%E2%81%A4_for_%E2%81%A2Keeping_Your_Account_Safe_with_Two_Factor_Authentication\" >4. Tips\u2064 for \u2062Keeping Your Account Safe with Two Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#Authentication_Methods_and_Security_Solutions\" >Authentication Methods and Security Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-do-i-get-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_is_Two_Factor_Authentication\"><\/span>1. What is Two Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Two Factor Authentication (2FA)<\/b> is an extra\u200d layer of security used to protect \u2062important accounts and data from unauthorized access. It works by adding\u200d an extra layer of security beyond just using traditional \u2064user names and passwords to protect authentication. 2FA requires users to present two pieces of evidence in order to prove their identity or gain access \u2062to important information.<\/p>\n<p>This two-step process\u200d has several key\u2062 benefits:<\/p>\n<ul>\n<li>Increased security \u2013 the more steps \u200cinvolved in authentication, the higher the security.<\/li>\n<li>Reduced risk for fraud \u2013 if\u200b one \u200bfactor\u200b of authentication\u2062 is compromised, the second factor serves as an extra layer of \u2064security.<\/li>\n<li>More reliable than passwords \u2013\u200c passwords can be easily forgotten or stolen, but 2FA adds an\u200b extra \u2062layer of protection.<\/li>\n<\/ul>\n<p>Additionally, Two Factor Authentication (2FA) is becoming <a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">increasingly popular due<\/a> to its ability to provide an extra layer of security\u200c and a better user experience. Nowadays, more and more online services and \u2062websites are beginning to implement 2FA. This \u200badds an extra layer of protection for users, while increasing their\u200b peace of mind.<\/p>\n<h2 id=\"2-benefits-of-adding-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_Benefits_of_Adding_Two_%E2%81%A4Factor_Authentication\"><\/span>2. Benefits of Adding Two \u2064Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is a great tool to boost security for any online account or service. Here are some of the benefits it can offer:<\/p>\n<ul>\n<li><b>Stronger security for your \u200cdata:<\/b> 2FA adds an extra layer of protection to your account, making it much harder for a hacker to gain\u2062 access. Passwords are no longer \u200benough to protect your data \u2013 by \u2063adding a second form of authentication (e.g. a code\u200b sent to your phone or an \u2063authentication app on your phone) you can ensure that your data is kept safe and secure. \u200c<\/li>\n<li><b>Faster and \u200deasier \u200crecovery:<\/b> \u200dIf you ever\u200d forget your password, 2FA makes it easier and faster to recover your account.\u2063 With a two-factor authentication \u2062system in place, you can quickly and easily reset your password without having to go \u200dthrough a long process of identity verification.<\/li>\n<\/ul>\n<p>2FA also adds an extra layer of \u2062peace of mind to the user \u2013 knowing their online data is kept \u2064safe from malicious attacks or\u2062 data breaches. This protection can be the difference between staying safe online \u2064and \u2063becoming a victim of cybercrime.\u2064 Ultimately, utilizing a two-factor authentication system can help protect the \u2064user from potential \u200bonline threats.<\/p>\n<h2 id=\"3-how-to-set-up-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_How_to_Set_Up_Two_Factor_Authentication\"><\/span>3. How to Set Up Two Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is a security protocol that makes it much more difficult for\u2063 malicious users to get\u2063 access to your personal information. With a second layer of security, it is much\u2063 more difficult\u200c for hackers to penetrate your confidential files and accounts. Setting up \u200ctwo-factor authentication is actually very simple, with\u2063 regardless of the device you are using.<\/p>\n<p>Here\u2019s how to set up two-factor authentication on your accounts:<\/p>\n<ul>\n<li>Enable two-factor authentication on whatever \u200bdevice you \u2064are using and for whatever account you\u200c are setting it up. This process is generally very straightforward. Follow the app or account\u2019s\u2064 specific instructions.<\/li>\n<li>Once it\u2019s enabled, you will generally receive a code either via SMS or an authentication app. For example, on iPhone devices, you will usually receive a \u2064text with a code that\u200c you must insert into the app.<\/li>\n<li><b>If\u2062 you\u2063 use a computer, however, you usually just \u200dclick approve within \u2062the browser window that pops up after enabling\u200d 2FA.<\/b><\/li>\n<li>Once\u2063 you\u2019ve entered the authentication code, two-factor authentication will be enabled on your account.<\/li>\n<\/ul>\n<p>You can also adjust the\u200c settings to configure two-factor \u200bauthentication notifications,\u2064 so you can be alerted when certain activities are taking \u2062place. For example, you can receive notifications when someone is attempting to log in\u200c to your account.<\/p>\n<h2 id=\"4-tips-for-keeping-your-account-safe-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_Tips%E2%81%A4_for_%E2%81%A2Keeping_Your_Account_Safe_with_Two_Factor_Authentication\"><\/span>4. Tips\u2064 for \u2062Keeping Your Account Safe with Two Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With two-factor \u2062authentication, it is important to practice good security as it will\u200c protect your online \u2062accounts. Here\u2064 are four tips to ensure your accounts remain secure:<\/p>\n<ul>\n<li><strong>Use\u2064 a mobile\u2062 authenticator.<\/strong> A mobile authenticator is a service that can generate one time passwords and push notifications to\u2063 your phone. This will help protect your accounts from unauthorized \u200daccess by requiring an\u2064 additional verification process.<\/li>\n<li><strong>Set up multiple authentication methods.<\/strong> Setting up multiple\u200c authentication methods such \u200cas texts, emails, authenticator apps, biometrics, etc., \u200cwill help ensure your accounts remain protected. Additionally, you can set \u200cup a recovery code to access your accounts in the event that you lose\u2064 access to\u200b your primary authentication methods.<\/li>\n<\/ul>\n<p><strong>Keep your authentication codes and passwords secure.<\/strong> \u2063You\u200d should never share your authentication \u200bcodes or passwords with anyone else.\u2063 Furthermore, it \u200bis important to use different passwords for each of your accounts. You can use a password manager \u200cto generate and store secure passwords for each of your accounts.<\/p>\n<ul>\n<li><strong>Regularly check for\u2063 suspicious activity.<\/strong> You should\u200b regularly check for any suspicious activity on your accounts and \u2063change your authentication \u200ccodes and password regularly.\u2063 This will help protect your\u200b accounts \u200cfrom unauthorized access.<\/li>\n<\/ul>\n<h2><\/h2>\n<h2><\/h2>\n<p>Two-factor authentication (2FA) is a security process that requires users to provide two different authentication factors to verify their identity. These factors can include something the user knows, such as a password or PIN code, something the user has, such as a security token or smartphone, or something the user is, such as a fingerprint or facial recognition. Common methods of 2FA include verification codes sent via SMS text message, authenticator codes generated by apps like Google Authenticator or Authy, or physical security keys that plug into a USB port.<\/p>\n<p>To enable 2FA on your accounts, you typically need to go to the security settings of the platform or service you&#8217;re using and look for options such as &#8220;Two-step verification,&#8221; &#8220;2-Step Verification,&#8221; or &#8220;Two-Factor Authentication&#8221;. From there, you may be prompted to enter a phone number for SMS-based verification codes, set up an authenticator app for Time-Based One Time Passwords (TOTPs), or register a security key for physical authentication.<\/p>\n<p>It&#8217;s important to note that not all services offer the same 2FA options, so you may need to explore different methods depending on the platform. Additionally, some services may require you to re-enter authentication codes periodically for added security. Keep in mind that while 2FA adds an extra layer of protection against unauthorized access to your accounts, it is not foolproof and can still be bypassed by determined attackers.<\/p>\n<p>Sources:<br \/>\n&#8211; cisa.gov<\/p>\n<p>It is always recommended to consult the official documentation or support resources of the specific service you are looking to secure for detailed instructions on enabling and managing 2FA for your account.<\/p>\n<p>Two-factor authentication, also known as multi-factor authentication, is a security process in which a user provides two different authentication factors to verify themselves before gaining access to an account or system. These factors typically include something the user knows (such as a password or security question) and something the user has (such as a smartphone or smart card). By requiring two factors for authentication, the security of the login process is significantly increased, making it harder for unauthorized users to gain access to sensitive information. Two-factor authentication can be implemented in various ways, including the use of temporary passwords, security codes sent via SMS messages, or biometric authentication methods. In addition to providing an extra layer of security, two-factor authentication can also help protect against identity theft and unauthorized login attempts.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;What is multi-factor authentication (MFA)?&#8221; &#8211; Microsoft<br \/>\n&#8211; &#8220;Two-Factor Authentication: What It Is and How It Works&#8221; &#8211; Duo Security<br \/>\n&#8211; &#8220;Securing your accounts with multiple authentication factors&#8221; &#8211; Google Support<\/p>\n<p>Two-factor authentication is a security process in which a user provides two different authentication factors to verify their identity. This adds an extra layer of security beyond just a traditional password. The factors of authentication can include something the user knows, such as a password or PIN, and something the user has, such as a smartphone or security token. Some methods of authentication include sending a six-digit verification code to the user&#8217;s email or cell phone, or using a biometric factor such as fingerprint or facial recognition. Two-factor authentication is commonly used by financial services, social media companies, and energy companies to protect user accounts and prevent unauthorized access to sensitive information. It is recommended that users enable two-factor authentication on all of their accounts to increase security and protect against external threats. Sources: Optiv Security, TechTarget, Duo Security.<\/p>\n<p>Two-factor authentication is a security process that requires users to provide two different authentication factors before granting access to their accounts. This added layer of security helps protect against unauthorized access to sensitive systems and data. To enable two-factor authentication, users can choose from a variety of methods such as SMS codes, software authenticators, or biometric verification. Some common forms of two-factor authentication include knowledge factors (such as passwords) and possession factors (such as a physical device or smartphone). Additionally, authentication factors can be based on something the user knows, has, or is, providing a more secure way to verify user identities. By implementing two-factor authentication, users can protect their accounts from brute-force attacks and other security threats. It is important to select a reliable and secure two-factor authentication method to ensure the highest level of protection for online accounts. (<a href=\"https:\/\/www.twilio.com\/authy\/features\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>: TechTarget)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_and_Security_Solutions\"><\/span>Authentication Methods and Security Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Passwordless Authentication<\/td>\n<td>Using methods other than passwords for user authentication<\/td>\n<\/tr>\n<tr>\n<td>Two-Factor Authentication<\/td>\n<td>Requires users to provide two different factors to verify their identity<\/td>\n<\/tr>\n<tr>\n<td>Adaptive Authentication<\/td>\n<td>Adjust the authentication process based on risk levels and user behavior<\/td>\n<\/tr>\n<tr>\n<td>Behavioral Biometrics<\/td>\n<td>Authentication based on unique user behavior patterns<\/td>\n<\/tr>\n<tr>\n<td>Third-Party Apps<\/td>\n<td>Using applications from external vendors for authentication purposes<\/td>\n<\/tr>\n<tr>\n<td>Tap Two-Factor Authentication<\/td>\n<td>Authentication method involving tapping on a device for verification<\/td>\n<\/tr>\n<tr>\n<td>HMAC-based One-Time Password<\/td>\n<td>Generating one-time passcodes using a cryptographic hash function<\/td>\n<\/tr>\n<tr>\n<td>SMS-Based Two-Factor Authentication<\/td>\n<td>Verification codes sent via text message for authentication<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: \u200bWhat is Two \u2064Factor Authentication?<br \/>\nA: Two Factor \u2064Authentication (2FA) is a way to help keep your online \u2064accounts secure. It adds an extra layer of protection by\u2064 requiring not only a password, \u200dbut also a unique code when logging into an account.<\/p>\n<p>Q: Why should I use\u2063 2FA?<br \/>\nA: By using 2FA, you can help keep your personal\u200b information and financial accounts safe. You can also help protect yourself from hackers who may try to \u200daccess your sensitive information.<\/p>\n<p>Q: How do I get Two Factor Authentication?<br \/>\nA: \u200bMany websites and online services offer 2FA, and it\u2019s easy to set up. Most times you just need to log into your account settings and choose\u2064 the 2FA option. You may \u2063also need to \u2062download and\u200b install an\u2062 authentication app on your phone or computer to access your 2FA code.<\/p>\n<p>Q: What is two-factor authentication and why do I need it?<\/p>\n<p>A: Two-factor authentication is a security process that requires users to provide two different authentication factors before gaining access to an account or system. This adds an extra layer of security beyond just a password, making it more difficult for unauthorized users to access sensitive information. Common authentication factors include something the user knows (such as a password), something the user has (such as a mobile device or USB token), or something the user is (such as a fingerprint or facial scan).<\/p>\n<p>Sources: Duo Security, Google Security<\/p>\n<p>Q: What are some common two-factor authentication methods?<\/p>\n<p>A: Popular options for two-factor authentication include text message codes, authenticator apps like Duo Mobile or Google Authenticator, hardware tokens, and biometric scans. Some services may also offer email verification or phone calls for authentication. It&#8217;s important to choose a method that suits the level of security needed for your accounts or systems.<\/p>\n<p>Sources: Duo Security, Google Security<\/p>\n<p>Q: How does two-factor authentication protect against security threats?<\/p>\n<p>A: Two-factor authentication helps protect against common threats like phishing attacks, man-in-the-middle attacks, and brute-force login attempts. By requiring a second form of authentication, even if a hacker obtains a user&#8217;s password, they would still need access to the second factor to gain entry. This significantly reduces the risk of unauthorized access to accounts or systems.<\/p>\n<p>Sources: Duo Security, Google Security<\/p>\n<p>Q: Is two-factor authentication mandatory for all accounts?<\/p>\n<p>A: While two-factor authentication is not always mandatory, it is highly recommended for accounts that contain sensitive information or access to important systems. Many companies and online services offer two-factor authentication as an option to users, but it is ultimately up to the individual user to enable and use this extra layer of security.<\/p>\n<p>Sources: Duo Security, Google Security<\/p>\n<p>Q: How do I set up two-factor authentication on my accounts?<\/p>\n<p>A: Setting up two-factor authentication may vary depending on the account or service you are using. Generally, you can enable two-factor authentication in your account settings by selecting the option to add a second form of verification. Follow the onscreen instructions to link your mobile device or other authentication method to your account. Make sure to store backup codes in a safe place in case you lose access to your primary authentication device.<\/p>\n<p>Sources: Duo Security, Google Security<\/p>\n<p>Q: Can two-factor authentication be bypassed?<\/p>\n<p>A: While two-factor authentication greatly enhances security, it is not foolproof and can potentially be bypassed in certain circumstances. For example, if a hacker gains access to both your password and your second factor (such as a physical device or authentication token), they may still be able to access your account. It&#8217;s important to use strong passwords, enable additional security measures, and stay vigilant against potential threats.<\/p>\n<p>Sources: Duo Security, Google Security<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One \u200bof the best ways to get two\u200c factor authentication quickly\u2062 and easily is to create a free LogMeOnce account. With <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can easily and securely \u200cset up two factor\u2062 authentication and protect your important information. Get set up with two factor authentication today and reap the many benefits it offers.\u200c Make sure your\u2062 data is secure with \u2013 the ultimate solution for \u201chow do I get two factor authentication\u201d.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Do you \u2062find yourself asking, \u201cHow do I get Two Factor Authentication (2FA)?\u201d 2FA is an important security measure that helps protect your online accounts from\u2063 unauthorized access. It is \u2064an\u2063 extra layer of protection that requires you to verify your identity using \u2064two pieces of information: your passwords and \u200ca one-time verification\u200d code sent [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2077,975,11014,781,1788],"class_list":["post-68694","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-data-encryption","tag-digital-security","tag-personal-safety","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68694"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68694\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}