{"id":68781,"date":"2024-06-19T20:27:15","date_gmt":"2024-06-19T20:27:15","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/how-does-the-two-factor-authentication-work\/"},"modified":"2024-08-19T12:59:09","modified_gmt":"2024-08-19T12:59:09","slug":"how-does-the-two-factor-authentication-work","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/","title":{"rendered":"How Does The Two Factor Authentication Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Do you want to make\u2063 sure your\u2064 bank accounts, email logins and other sensitive accounts \u200care \u200dsecure?\u200d Two-factor authentication \u200b(2FA) is the answer to keep away any unauthorized access \u2064or data \u200btheft. \u2064How does \u200bthe\u2063 two \u200dfactor authentication work? It\u2064 requires authentication \u2064from\u2063 two different \u200bsources in \u2062order to gain access. This two-step \u2062verification mechanism \u2063provides an additional layer of security, making it much harder for malicious actors \u200cto gain access to your data. In \u200dthis\u200b article, we\u2019ll discuss in \u2062detail \u2063how \u2064two-factor authentication works, its pros\u2064 and cons \u200dand the \u2064best practices \u2063to make sure your \u2064data\u2062 is safe.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#1_What_%E2%81%A2Is_Two-Factor_Authentication\" >1. What \u2062Is Two-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#2_How_Does_Two-Factor%E2%80%8D_Authentication_Help_Keep_Your_Information_Secure\" >2. How Does Two-Factor\u200d Authentication Help Keep Your Information Secure?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#3%E2%80%8D_Unlocking_the_Benefits_of_Two-Factor_%E2%81%A3Authentication\" >3.\u200d Unlocking the Benefits of Two-Factor \u2063Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#4_Simplifying_Security_%E2%81%A3with_Two-Factor_Authentication\" >4. Simplifying Security \u2063with Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#Multi-Factor_Authentication_Concepts\" >Multi-Factor Authentication Concepts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_%E2%81%A2Is_Two-Factor_Authentication\"><\/span>1. What \u2062Is Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Two-factor\u2063 authentication<\/strong> (2FA) \u200cis \u2062an extra layer of \u2062protection for your online accounts. \u200cThis process helps secure your\u2062 account by verifying\u2064 that it\u2063 is really\u200b you who is trying to access it.\u2063 It does this by \u200brequiring\u2063 two forms of\u200c authentication: something you know (like\u2062 a password) and\u200c something you have (like\u200d a \u200dphone). \u2062<\/p>\n<p>2FA adds an extra \u2063layer of security\u200c to passwords and typically relies on two\u2062 of \u2062the \u200cfollowing\u2062 three factors: something you \u200cknow (like\u2062 a password or PIN number), \u2062something \u200dyou have\u2063 (like a device or token), or something\u200c you are (like a fingerprint or facial recognition). This means it\u2019s\u2062 much harder for \u2063a hacker\u2062 to get into\u200d your account,\u2062 since they would \u2064need \u2062to have \u200daccess to both your password and your device.\u200b<\/p>\n<ul>\n<li>2FA adds an extra \u200dlayer of\u2062 security to your online accounts<\/li>\n<li>It typically relies on two of three factors: something you know, have, or \u200dare<\/li>\n<li>It makes it harder \u2063for \u2062hackers to get into your account<\/li>\n<\/ul>\n<h2 id=\"2-how-does-two-factor-authentication-help-keep-your-information-secure\"><span class=\"ez-toc-section\" id=\"2_How_Does_Two-Factor%E2%80%8D_Authentication_Help_Keep_Your_Information_Secure\"><\/span>2. How Does Two-Factor\u200d Authentication Help Keep Your Information Secure?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor\u2064 authentication (2FA) is an important security tool \u200bthat\u200c helps protect you from malicious and fraudulent activities. It provides an\u2063 extra layer\u200d of security to ensure that only authorized users \u200baccess your information. Here\u2063 are some of the ways two-factor \u2062authentication\u200b helps secure your data:<\/p>\n<ul>\n<li><strong>Enhanced \u2063Identity\u2064 Verification:<\/strong> 2FA \u2063requires two means of \u2064authentication, so unauthorized users \u2064don\u2019t have\u2063 access \u2064to your accounts. You confirm\u200d your identity by\u2063 verifying two\u2062 factors: something\u2063 you know (password) and something you have (like your cellphone).<\/li>\n<li><strong>Protection Against Phishing:<\/strong> \u2063 Phishing is when cybercriminals try to \u2063obtain sensitive information from \u200bunsuspecting victims. 2FA requires two pieces of \u2064data input to \u200dlogin, so phishing \u200battacks are less likely to \u200dbe successful.<\/li>\n<li><strong>Faster\u200d Response \u2063to Suspicious Activity:<\/strong> \u200c 2FA also <a href=\"https:\/\/logmeonce.com\/enterprise-password-management\/\">helps identify \u2063suspicious activity quickly<\/a>. For instance, \u2062an unexpected\u2063 login or \u200blocation could\u2063 trigger an alert, allowing\u2064 the user \u2063or service provider to \u200dtake action to\u200c protect the account.<\/li>\n<\/ul>\n<p>Two-factor authentication is an essential \u200dsecurity measure that protects your data from malicious and fraudulent activities. It requires two pieces of data to login, adding an extra\u200b layer of security \u200dfor your information. It also <a title=\"How Does The Two Factor Authentication Work\" href=\"https:\/\/logmeonce.com\/resources\/how-does-the-two-factor-authentication-work\/\">helps detect suspicious activity quickly<\/a>, allowing you to take action to protect yourself\u2062 and your\u2064 accounts.<\/p>\n<h2 id=\"3-unlocking-the-benefits-of-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3%E2%80%8D_Unlocking_the_Benefits_of_Two-Factor_%E2%81%A3Authentication\"><\/span>3.\u200d Unlocking the Benefits of Two-Factor \u2063Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>1. What is Two-Factor Authentication?<\/b><br \/>\nTwo-Factor Authentication (2FA) is an extra \u200clayer of security designed \u2062to protect the account\u2064 access of users of web-based\u200c services\u200c and applications. It requires \u2062providing two unique pieces\u2063 of\u2063 information: the user\u2019s username and password, plus a\u2064 specific one-time generated code.\u200c This\u200b code \u2064is sent to the \u2063user\u2019s phone or email \u200dand must be input \u2064into\u200d the website or application in order to successfully\u200c gain access.<\/p>\n<p><b>2. Advantages of using 2FA <\/b><br \/>\n2FA \u200dcan provide\u200c additional\u2063 security and peace of \u2062mind to users of\u2062 online services and applications:<\/p>\n<ul>\n<li>Provides an extra layer \u200dof \u2062security, making it harder for \u200chackers \u200cto access accounts.<\/li>\n<li>Speeds up account access, as it \u200celiminates the need to remember \u200bmultiple passwords.<\/li>\n<li>Allows users to be notified in real-time of any suspicious activity related\u2062 to their account.<\/li>\n<li>Helps protect users from identity fraud,\u200d as it \u200dmakes it more\u2063 difficult \u2063for someone to gain access to their account.<\/li>\n<li>Allows \u200dusers\u2062 to retrieve access to \u200dtheir account, even if they \u2064have forgotten \u200ctheir password.<\/li>\n<\/ul>\n<p>Using 2FA can be\u200d the extra level of security to protect users\u2019 accounts and personal information. It\u2064 can help prevent identity\u2064 theft, \u2062financial\u200b theft, and\u2064 the spread of malware. Implementing 2FA is\u200d an \u2063easy and\u2064 highly \u200drecommended way\u200d to help\u2062 keep user \u2062data\u2064 safe.<\/p>\n<h2 id=\"4-simplifying-security-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_Simplifying_Security_%E2%81%A3with_Two-Factor_Authentication\"><\/span>4. Simplifying Security \u2063with Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-Factor Authentication\u200c (2FA) is the simplest\u2062 and most secure \u2064way\u2062 to secure your online \u2064accounts and data. \u200cIt adds an extra layer of \u200bprotection for your accounts by requiring a second\u200b verification step to verify access. By\u200b using\u2063 two-factor authentication, your accounts can \u200bbe fortified against identity theft\u2064 and other\u2063 malicious attacks.\u2064 Here are some of its \u2064benefits:<\/p>\n<ul>\n<li><strong>Added Protection:<\/strong> 2FA adds an additional layer of protection against hackers \u2063and other malicious activities.<\/li>\n<li><strong>Convenience:<\/strong> It\u2019s easy \u2063to use, and doesn\u2019t require any additional steps on\u2063 the user\u2019s part.<\/li>\n<li><strong>Secure Storage:<\/strong> With \u20632FA,\u2063 your login information is\u200d stored \u2064on a secure server, which helps minimize the \u200drisk of\u2063 theft.<\/li>\n<\/ul>\n<p>Two-factor authentication offers \u2064great\u2064 security benefits while \u200csimplifying account access. It combines a password with the use of \u200ba mobile device, email,\u200c or other authentication \u200dmethod, giving you full control over who\u2063 has \u200caccess to \u2063your accounts.\u2062 Even if your \u200cpassword\u2062 is compromised,\u200d 2FA can\u200c stop hackers \u2063from gaining access.<\/p>\n<p>Two-factor authentication (2FA) is a form of multi-factor authentication that adds an extra layer of security to the traditional password method. It typically involves the user providing two different forms of identification before being granted access to a system or account. This can include something the user knows, such as a password or security question, and something they have, like a physical device or verification code sent to their email or mobile phone. By combining these factors of authentication, two-factor authentication ensures a more secure method of verifying a user&#8217;s identity. Some common forms of 2FA include SMS-based verification, authenticator applications, and hardware tokens. This additional security measure helps protect sensitive systems and data from unauthorized access due to human error or hacking attempts. Popular products like Duo Security and Google&#8217;s Titan Security Key offer reliable 2FA solutions for businesses and individuals looking to enhance their security protocols. With the increasing prevalence of cyber threats and data breaches, implementing two-factor authentication has become an essential step in safeguarding online accounts and services. Sources: Duo Security, Google Cloud Security.<\/p>\n<p>Two-factor authentication, also known as two-step verification, is an authentication method that adds an extra layer of security to the traditional password authentication process. This method requires users to provide two forms of identification in order to access their accounts, typically a strong password combined with a personal identification such as a security code sent to their email address or generated by an authentication app. Multi-factor authentication goes even further by adding additional verification factors such as fingerprint scans, iris scanning, or behavioral biometrics to further enhance security.<\/p>\n<p>When a user attempts to authenticate their identity, they are required to enter both factors before gaining access to their account. This can help prevent unauthorized access even if someone has obtained the user&#8217;s password. Two-factor authentication methods vary, but often involve a combination of something the user knows (such as a password) and something the user has (such as a security token or mobile device).<\/p>\n<p>Common forms of two-factor authentication include SMS-based two-factor authentication, where a security code is sent to the user&#8217;s phone, or the use of physical security tokens that generate unique codes for each authentication attempt. Adaptive authentication solutions also use factors such as the user&#8217;s location or behavior patterns to assess the risk level of each authentication attempt and adjust the level of security accordingly.<\/p>\n<p>In today&#8217;s digital age, with increasing security threats and data breaches, implementing two-factor authentication is crucial for protecting sensitive information and preventing unauthorized access to accounts. Many online banking services, major sites, and social media platforms now offer two-factor authentication as a standard security measure to protect user identities and thwart potential hackers. By adding this extra layer of security, users can better safeguard their personal data and reduce the likelihood of falling victim to phishing attacks or other security threats.<\/p>\n<p>Sources:<br \/>\n&#8211; Microsoft. (n.d.). Two-step verification. support.microsoft.com<\/p>\n<p>Two-factor authentication (2FA) is a type of multi-factor authentication that adds an extra layer of security to the authentication process. When using 2FA, users are required to provide two different types of authentication factors before they can access a system or service. These factors can include something the user knows (like a password), something the user has (like a bank card or physical token), or something the user is (like a fingerprint or iris scan). By requiring multiple factors for authentication, 2FA helps protect against unauthorized access even if one factor is compromised. This can help prevent common security issues like weak passwords or phishing attacks. In addition, 2FA can improve the user experience by providing a more secure and streamlined authentication process.<\/p>\n<p><a href=\"https:\/\/www.twilio.com\/en-us\/user-authentication-identity\/verify\" target=\"_blank\" rel=\"noopener nofollow\">Sources<\/a>:<br \/>\ncybersecurity.ucdavis.edu<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Multi-Factor_Authentication_Concepts\"><\/span>Multi-Factor Authentication Concepts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<td>Multi-factor Authentication<\/td>\n<\/tr>\n<tr>\n<th>Security Feature<\/th>\n<td>Biometric Authentication<\/td>\n<\/tr>\n<tr>\n<th>Access Control<\/th>\n<td>Risk-based Authentication<\/td>\n<\/tr>\n<tr>\n<th>Protection Method<\/th>\n<td>Password Manager<\/td>\n<\/tr>\n<tr>\n<th>Authentication Tool<\/th>\n<td>Authentication Device<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What\u200c is \u2063two-factor authentication?<br \/>\nA: Two-factor authentication is\u2063 an additional\u200c layer of security\u200d that combines something \u2064you know,\u2063 like\u2064 a \u2063password, with\u200d something you have, like your \u2062phone or \u2064a special code.<\/p>\n<p>Q: How does two-factor authentication\u200b work?<br \/>\nA: When you try to log in to\u200d an account, the \u200dwebsite\u2062 will first ask you \u2063to enter your username and password. \u2062Then, the website\u2064 will send \u2063a code, unique to you, to your phone or other device. You will then need to input this\u200c code \u200cinto the website to complete the two-factor authentication process and \u2063log \u200din to your account. \u2063<\/p>\n<p>Q: Is two-factor authentication \u2064safe?<br \/>\nA: \u200dYes! Two-factor authentication\u200b adds \u2062an extra layer\u2063 of security, making\u2062 it harder for someone to gain access \u200dto your account without your permission. That\u2019s why many \u200cwebsites and apps\u2063 are now using two-factor authentication \u200dto keep users safe.<\/p>\n<p>Q: What is Two Factor Authentication (2FA) and how does it work?<br \/>\nA: Two Factor Authentication (2FA) is a security process that requires two different authentication factors before granting access to a system or account. The two factors typically fall into three categories: something you know (like a password or PIN code), something you have (like a security token or authenticator app), or something you are (like a fingerprint or facial scan).<\/p>\n<p>Q: What are some common authentication factors used in Two Factor Authentication?<br \/>\nA: Common authentication factors used in Two Factor Authentication include passwords, PIN codes, security tokens, authenticator apps, biometric data (such as fingerprint or facial scans), and one-time passwords.<\/p>\n<p>Q: How does the Authenticator app work in Two Factor Authentication?<br \/>\nA: Authenticator apps generate one-time codes that are used as the second factor in the authentication process. These codes are time-based and must be entered along with your password to gain access to your account.<\/p>\n<p>Q: What is the difference between traditional passwords and Two Factor Authentication?<br \/>\nA: Traditional passwords rely solely on something you know, like a login credentials, while Two Factor Authentication adds an extra layer of security by requiring an additional authentication factor, such as a code sent to your phone or a biometric scan.<\/p>\n<p>Q: What are some examples of additional factors used in Two Factor Authentication?<br \/>\nA: Additional factors used in Two Factor Authentication include security tokens, hardware devices, security keys, SMS codes, email authentication options, and biometric identifiers.<\/p>\n<p>Q: How does Two Factor Authentication help enhance security?<br \/>\nA: Two Factor Authentication helps enhance security by making it more difficult for unauthorized users to access accounts, as they would need both the correct login credentials and access to the additional authentication factor.<\/p>\n<p>Q: What are some of the common methods of Two Factor Authentication?<br \/>\nA: Common methods of Two Factor Authentication include SMS-based codes, authenticator apps, biometric scans, security tokens, and email authentication options.<\/p>\n<p>Q: How can users set up Two Factor Authentication for their accounts?<br \/>\nA: Users can typically set up Two Factor Authentication through the security settings of their accounts, where they can choose the type of authentication factor they want to use and follow the steps to enable it.<\/p>\n<p>Q: What are some security risks that Two Factor Authentication can help mitigate?<br \/>\nA: Two Factor Authentication can help mitigate security risks such as password theft, phishing scams, social engineering attacks, brute force attacks, and man-in-the-middle attacks by adding an extra layer of security to the authentication process.<\/p>\n<p>Source: safetydetective.com<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that you know how two-factor authentication \u2064works, why not sign up \u2064for a\u2063 free LogMeOnce \u200baccount\u2064 and\u2064 experience the security and convenience of two-factor authentication\u2062 for\u2064 yourself? LogMeOnce not only\u2063 provides an easy-to-implement two-factor authentication solution, but \u200calso offers other\u200c advanced \u2062security features. So why wait? Sign up for a free <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account \u2064today and\u2064 make sure your \u200daccounts are\u2064 safe\u200c and secure \u200bfrom any cyber \u2062attack with two-factor authentication security. Seize the moment \u2063and experience two-factor authentification for\u2064 yourself so\u200b you can make\u200b sure your\u200c accounts are \u200csecure\u200d with this \u2064two factor authentication\u2064 process.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Do you want to make\u2063 sure your\u2064 bank accounts, email logins and other sensitive accounts \u200care \u200dsecure?\u200d Two-factor authentication \u200b(2FA) is the answer to keep away any unauthorized access \u2064or data \u200btheft. \u2064How does \u200bthe\u2063 two \u200dfactor authentication work? It\u2064 requires authentication \u2064from\u2063 two different \u200bsources in \u2062order to gain access. This two-step \u2062verification mechanism [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2316,15986,811,781,1788],"class_list":["post-68781","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication-methods","tag-authentication-protocols","tag-online-safety","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68781"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68781\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}