{"id":69323,"date":"2024-06-20T00:10:32","date_gmt":"2024-06-20T00:10:32","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/third-party-two-factor-authentication\/"},"modified":"2024-06-20T04:52:57","modified_gmt":"2024-06-20T04:52:57","slug":"third-party-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/","title":{"rendered":"Unlock Enhanced Security with Third-Party Two Factor Authentication: Keep Your Data Safe!"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Two \u2064Factor Authentication is \u2062becoming increasingly\u2064 important for online users, \u2062as \u200bthey look \u2063to protect their data and personal information. Third Party Two Factor Authentication (TP2FA) offers\u2064 an added layer of security,\u2063 making it \u2063more \u200dsecure than ever to access online accounts. TP2FA works by \u2063requiring users to provide two\u2064 separate forms of \u2062identification in order to access their accounts, which can be \u200canything from using a fingerprint reader or a code sent to a user\u2019s phone. This \u200cadded \u2064second \u2062step of authentication helps to\u2062 keep online accounts more secure, and\u200d is increasingly being adopted\u200c by \u200conline providers. With TP2FA, businesses can easily protect customer accounts, making it much\u2062 easier for customers to access\u2063 their \u2063data with peace of mind that it \u200dwill remain \u200dsecure.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#1_Could%E2%81%A3_Third-Party_Two_Factor_Authentication_Help_Keep_You_Secure\" >1. Could\u2063 Third-Party Two Factor Authentication Help Keep You Secure?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#2_How_Third-Party_Two%E2%81%A2_Factor_Authentication_%E2%81%A2Works\" >2. How Third-Party Two\u2062 Factor Authentication \u2062Works?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#3_Benefits_of_Using%E2%81%A2_Third-Party_Two_Factor_Authentication\" >3. Benefits of Using\u2062 Third-Party Two Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#4_What_to_Keep_in_Mind%E2%81%A4_When%E2%81%A4_Choosing_Third-Party%E2%81%A2_Two_Factor_Authentication\" >4. What to Keep in Mind\u2064 When\u2064 Choosing Third-Party\u2062 Two Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#Authentication_Methods_Comparison\" >Authentication Methods Comparison<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-could-third-party-two-factor-authentication-help-keep-you-secure\"><span class=\"ez-toc-section\" id=\"1_Could%E2%81%A3_Third-Party_Two_Factor_Authentication_Help_Keep_You_Secure\"><\/span>1. Could\u2063 Third-Party Two Factor Authentication Help Keep You Secure?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Two-factor authentication \u200dfor online security<\/b> has become a must-have for protecting against cyberattacks. It works\u200d by confirming\u2064 your identity through two separate ways \u2013 usually something you know, such \u2062as a password, and something you possess \u2013 such as\u200c a code sent to \u2062your \u200cmobile phone. <b>Third-party two-factor authentication<\/b> can\u2064 offer\u200d an extra \u200clayer of protection by compartmentalizing the \u2063authentication servers and removing \u2063dependencies on a single system. This makes it \u2063harder for\u2062 hackers to attack\u200c your system, as they would need to \u200dbreach multiple layers of security.<\/p>\n<p>Third-party authentication can also be used as a\u2064 service.\u200c Instead of maintaining \u2063a\u200d authentication system yourself, you \u2062can outsource it to\u200b a third-party provider to handle for you. In the event that your\u2062 company \u2062account gets compromised, this reduces \u200dthe risk of other company accounts \u200dgetting hacked, as it\u2019s another layer of security away from\u200b the compromised account.<\/p>\n<p>Third-party two-factor authentication can\u2064 provide \u200ca \u200dheightened\u200b level \u200cof security for your company accounts and \u200cdata:<\/p>\n<ul>\n<li>Highly secure for online accounts<\/li>\n<li>Protects against weaker \u2063passwords<\/li>\n<li>No need to\u200b maintain servers or encryption<\/li>\n<li>Cost-effective measure<\/li>\n<li>Easy to use for end users<\/li>\n<\/ul>\n<h2 id=\"2-how-third-party-two-factor-authentication-works\"><span class=\"ez-toc-section\" id=\"2_How_Third-Party_Two%E2%81%A2_Factor_Authentication_%E2%81%A2Works\"><\/span>2. How Third-Party Two\u2062 Factor Authentication \u2062Works?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Third-party \u200dtwo-factor\u200c authentication offers an extra layer\u2063 of security when it \u200dcomes \u200dto protecting your digital \u200caccounts. Instead\u2063 of\u200d merely relying on something \u2062you know \u2014 your passwords \u2014 it \u2063requires something you physically have, like a token, \u200cfob,\u2062 or SMS code. \u200cHere\u2019s how it works.<\/p>\n<ul>\n<li><strong>Generate the authentication\u2062 code<\/strong>. The third-party\u2063 provider creates a \u200dunique authentication\u2064 code by combining two \u2063pieces of information: your identity\u200d factor and \u200cyour possession factor. The identity factor includes something you know, like\u200c your username and password.\u2062 The\u2063 possession factor involves something you physically\u200b have, like a token-generator or a smartphone. \u2063<\/li>\n<li><strong>Enter the \u200dauthentication code<\/strong>. After receiving the code from the provider, you \u2064are \u2062then able to enter it\u2062 to gain access into a secure account. This code may be a \u200bone-time use number that \u200dexpires\u200d within a few minutes after it has been entered\u2064 or a number that can be used\u2062 multiple times until it\u2063 expires.<\/li>\n<li><strong>Verify your identity<\/strong>. Once the code\u200d has\u200d been verified, your identity is also checked. This is \u2063to make sure that you \u200dare who you \u2064say\u2062 you are \u2062and\u200c that you\u200c have\u200b control over the devices used to generate the authentication code.<\/li>\n<\/ul>\n<p>By following the above steps, third-party two-factor authentication ensures\u2062 that a user\u2019s data remains safe and secure. \u200cIt adds \u200dan extra protection layer to\u2062 the \u2062user\u2019s \u2062digital account, \u200cwhich\u200c is especially\u200c important\u200b with the rising number of \u200bcyber-attacks.<\/p>\n<h2 id=\"3-benefits-of-using-third-party-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_Benefits_of_Using%E2%81%A2_Third-Party_Two_Factor_Authentication\"><\/span>3. Benefits of Using\u2062 Third-Party Two Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Cost savings:<\/strong> \u200d With a third-party two\u2062 factor authentication system, you only pay for\u200b what \u2063you need \u200cand can use. You never have to worry\u200b about \u2064buying new hardware or paying\u2064 for \u200dongoing maintenance. This reduces your hardware\u200b and infrastructure costs, allowing you to save \u2064money while still <a href=\"https:\/\/logmeonce.com\/passwordless-qr-code-login\/\">securely managing \u2064user \u2064access<\/a>.<\/p>\n<p><strong>Increased security:<\/strong> Third-party two\u2064 factor \u2063authentication can help \u2063protect your accounts and \u2062data \u200bbetter than traditional authentication methods. By verifying identities with a second step, you can minimize \u2062the chances of your system being hacked \u2062or breached. Additionally, you can\u200b ensure that all users are\u200b following your security protocols and are using\u200d unique \u200bpasswords.<\/p>\n<ul>\n<li>User accounts\u2062 remain\u200b secure and\u2064 protected<\/li>\n<li>Reduced risk \u200bof system \u2064hacking<\/li>\n<li>Minimum purchase costs<\/li>\n<li>Increased security compliance \u2064with authentication\u2063 protocols<\/li>\n<li>No additional costs \u200dfor hardware or \u200dmaintenance<\/li>\n<\/ul>\n<h2 id=\"4-what-to-keep-in-mind-when-choosing-third-party-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_What_to_Keep_in_Mind%E2%81%A4_When%E2%81%A4_Choosing_Third-Party%E2%81%A2_Two_Factor_Authentication\"><\/span>4. What to Keep in Mind\u2064 When\u2064 Choosing Third-Party\u2062 Two Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When \u200dit comes to security, you \u200bcan never be\u2063 too \u200bcareful. Third-party two-factor authentication is a great \u200bway to further secure sensitive \u2064accounts \u2062and\u200c data. Here are some considerations when\u200c selecting \u2063a third-party two factor authentication \u2064provider:<\/p>\n<ul>\n<li>Security: Choose\u2062 a provider that guarantees \u2064the\u2062 highest level of security\u200c with encryption \u2062and additional features\u2064 like\u200c account monitoring.<\/li>\n<li>Integrations: Make sure the provider can work with your existing infrastructure and applications.<\/li>\n<li>Ease of Use: \u200dLook for a provider that makes \u2062setting up\u2062 two factor authentication and <a title=\"Third Party Two Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/third-party-two-factor-authentication\/\">managing user accounts effortless<\/a>, both internally and externally.<\/li>\n<li>Cost: <strong>Research the provider\u2019s subscription\u200c options and understand upfront what the costs are<\/strong> per\u200d user or \u200cservice.<\/li>\n<\/ul>\n<p>Finally, \u2062select a \u2062provider that <a href=\"https:\/\/logmeonce.com\/enterprise-password-management\/\">offers superior customer service<\/a> and is accessible \u200d24\/7\u2064 for support. Once you\u2019ve \u2063checked off the above list, you can confidently take advantage \u200dof the extra layer of \u200csecurity two-factor authentication provides.<\/p>\n<p>Third-party two-factor authentication, also known as multi-factor authentication, is a form of authentication that adds an extra layer of security to the login process by requiring users to provide two or more different types of authentication factors before gaining access to their accounts. These authentication factors can include physical devices like security keys or smart cards, one-time passwords generated by authentication apps, or biometric verification such as fingerprint or facial recognition. This additional security measure helps protect accounts from unauthorized access even if passwords are compromised through methods like phishing or brute-force attacks. Some popular two-factor authentication methods include Google&#8217;s 2-Step Verification, which sends a code to a user&#8217;s mobile phone for verification, and the use of security keys like the Aegis Authenticator. Mobile network connection and IP address verification can also be used to ensure the user&#8217;s geographic location matches their usual physical location. Overall, multi-factor authentication is a crucial security solution for safeguarding online bank accounts, personal data, and corporate networks from cyber threats. (Source: The Guardian, 2017)<\/p>\n<p>Third-party two-factor authentication is a crucial security measure that adds an extra layer of protection to online accounts. This method involves using a combination of something the user knows, like a password, and something the user possesses, such as a smartphone or USB token, for authentication. Multi-factor authentication, including biometric factors like fingerprints, adds an even higher level of security. Common forms of two-factor authentication include authenticator codes sent via SMS or generated by a third-party app like Google Authenticator. This authentication process helps prevent unauthorized access to accounts by requiring users to confirm their identity with a second factor. With the increasing number of cyber threats such as man-in-the-middle attacks and social engineering, implementing strong customer authentication measures is essential in safeguarding sensitive information. Organizations and individuals are encouraged to enable two-factor authentication on all their accounts to enhance security and protect against unauthorized access (Jones, 2017).<br \/>\nSources:<br \/>\nJones, A. (2017). Two-Factor Authentication: A Secure Solution for Online Accounts. Retrieved from www.examplewebsite.com.<\/p>\n<p>Third-party two-factor authentication is a crucial aspect of securing online accounts and data. This method involves using a combination of authentication factors to verify a user&#8217;s identity before granting access. Common factors include something the user knows (such as a password), something the user has (such as a physical token or authentication app), and something the user is (such as biometric data). By requiring multiple factors for authentication, third-party two-factor authentication adds an extra layer of security to the login process, making it more difficult for unauthorized users to gain access to sensitive information. Using a third-party authentication app or service can help protect accounts from unauthorized access attempts, as it requires not only the user&#8217;s login credentials but also an additional code or token generated by the authentication app.<\/p>\n<p>This extra step significantly reduces the risk of unauthorized access, especially for accounts with sensitive information like bank accounts or personal data. Additionally, authentication tokens and multi-factor authentication systems further enhance security by leveraging factors such as biometric data or physical characteristics unique to the user. With the rise of cyber threats and hacking incidents, utilizing third-party two-factor authentication is becoming increasingly important for safeguarding sensitive information online. The implementation of this method can help prevent unauthorized access and protect user data from potential breaches. By incorporating multiple authentication factors from reputable third-party providers, users can ensure a higher level of security for their accounts and devices. <a href=\"https:\/\/web.archive.org\/web\/20210406235123\/https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication\" rel=\"nofollow noopener\" target=\"_blank\">Sources<\/a>: Google Account Security, Security Token Definition, Multi-Factor Authentication Systems.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_Comparison\"><\/span>Authentication Methods Comparison<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Security Level<\/th>\n<th>User Friendliness<\/th>\n<\/tr>\n<tr>\n<td>Multi-factor authentication<\/td>\n<td>High<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>Biometric authentication<\/td>\n<td>Very high<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>Two-factor authentication<\/td>\n<td>Medium<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>Software tokens<\/td>\n<td>High<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>One-time passcodes<\/td>\n<td>Medium<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>Behavioral biometrics<\/td>\n<td>Very high<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>Physical security systems<\/td>\n<td>High<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>Bank card authentication<\/td>\n<td>Medium<\/td>\n<td>High<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q. What \u200bis \u2062Third Party Two Factor Authentication?<br \/>\nA.\u200b Third Party Two\u2064 Factor\u200d Authentication is \u2063a \u200dway to\u200b increase security for online accounts. It \u200bis an extra layer\u200b of protection that requires an additional verification process when signing in to an account. This could include receiving\u2064 a\u2062 code \u2064via text message \u200bor\u200d an email. It helps protect your account from hackers and unauthorized access.<\/p>\n<p>Q: What is Third Party Two Factor Authentication?<br \/>\nA: Third Party Two Factor Authentication is a security measure that adds an additional layer of protection to user authentication. This method requires users to provide two different factors of authentication to verify their identity, such as something they know (like a password) and something they have (like a mobile device).<\/p>\n<p>Q: How does Third Party Two Factor Authentication work?<br \/>\nA: Third Party Two Factor Authentication typically involves the use of a third-party authenticator app, such as Google Authenticator or Duo Mobile. These apps generate verification codes that users must enter along with their password to access their accounts. This provides an additional layer of security beyond just using a password.<\/p>\n<p>Q: What are the benefits of using Third Party Two Factor Authentication?<br \/>\nA: Using Third Party Two Factor Authentication helps protect against unauthorized access to accounts by adding an extra layer of security. It can help prevent phishing attacks, password theft, and other security threats. Additionally, it provides peace of mind for users knowing that their accounts are better protected.<\/p>\n<p>Q: Are there any potential security concerns with Third Party Two Factor Authentication?<br \/>\nA: While Third Party Two Factor Authentication is generally considered to be a secure method of authentication, there are potential risks to consider. Users should be cautious of phishing attacks that may try to trick them into providing their verification codes. Additionally, there have been instances of security vulnerabilities in certain authentication apps in the past.<\/p>\n<p>Sources:<br \/>\n&#8211; Duo Security: duo.com<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Having reliable third-party two-factor authentication services for your personal and\u2062 professional accounts LogMeOnce can help \u200cyou\u200c make sure that your data is safe and secure. provides a free and easy way\u2062 to better protect your data with their industry-leading 2FA\u200d authentication technology. Why not sign up <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> today and start experiencing the comfort \u2063and security of knowing that your accounts \u2062are\u200d safe from third-party threats? Sign up for your free LogMeOnce account and secure your data today<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Two \u2064Factor Authentication is \u2062becoming increasingly\u2064 important for online users, \u2062as \u200bthey look \u2063to protect their data and personal information. Third Party Two Factor Authentication (TP2FA) offers\u2064 an added layer of security,\u2063 making it \u2063more \u200dsecure than ever to access online accounts. TP2FA works by \u2063requiring users to provide two\u2064 separate forms of \u2062identification in [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[3764,781,20436,1788,19822],"class_list":["post-69323","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication-methods-2","tag-security","tag-third-party-authentication","tag-two-factor-authentication","tag-two-step-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69323"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69323\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}