{"id":69538,"date":"2024-06-20T00:39:31","date_gmt":"2024-06-20T00:39:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/azure-mfa-for-remote-desktop\/"},"modified":"2024-06-22T05:31:50","modified_gmt":"2024-06-22T05:31:50","slug":"azure-mfa-for-remote-desktop","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/","title":{"rendered":"Azure MFA For Remote Desktop: Enhance Security and Protect Data"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Azure\u2064 MFA For Remote Desktop can be an\u200b important security measure for organizations to protect\u200b their data and\u2064 networks. It provides a multi-factor authentication experience for users when \u2062connecting\u2064 with a \u200dremote desktop,\u2063 ensuring that access is secure and protected from malicious\u2063 actors. It is an effective way to safeguard access \u200dto corporate \u200bnetworks and applications\u200b against\u200d cyber threats. Using Azure MFA For\u2062 Remote Desktop, organizations\u2063 can significantly improve their security \u2062posture and keep their \u200cdata, networks, and\u2064 applications safe from all\u2062 sorts\u2064 of \u2064malicious attacks. The technology behind Azure MFA For Remote Desktop is advanced, yet user-friendly, making it an ideal solution for businesses looking to secure their data and networks.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#1_Secure_Workplace_%E2%80%8CAccess_with_Azure_%E2%80%8CMFA_for_Remote_Desktop\" >1. Secure Workplace \u200cAccess with Azure \u200cMFA for Remote Desktop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#2_Protect_Your_Business%E2%80%8B_from_%E2%81%A2Cybersecurity_Threats_with%E2%80%8C_Azure_MFA\" >2. Protect Your Business\u200b from \u2062Cybersecurity Threats with\u200c Azure MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#3_Benefits_of_%E2%80%8BIntegrating_Azure_MFA_for%E2%81%A4_Remote_Desktop\" >3. Benefits of \u200bIntegrating Azure MFA for\u2064 Remote Desktop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#4_Streamline_%E2%81%A4Your_Remote_Access_with%E2%80%8B_Azure_MFA_%E2%80%8Cfor_Remote_Desktop\" >4. Streamline \u2064Your Remote Access with\u200b Azure MFA \u200cfor Remote Desktop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#Configuration_Settings_for_Multifactor_Authentication\" >Configuration Settings for Multifactor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/azure-mfa-for-remote-desktop\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-secure-workplace-access-with-azure-mfa-for-remote-desktop\"><span class=\"ez-toc-section\" id=\"1_Secure_Workplace_%E2%80%8CAccess_with_Azure_%E2%80%8CMFA_for_Remote_Desktop\"><\/span>1. Secure Workplace \u200cAccess with Azure \u200cMFA for Remote Desktop<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As more organizations move to a \u2062remote \u2064workforce, \u200bit\u2019s essential to have secure \u200baccess to workplace infrastructure \u200cand data. Azure Multi-Factor Authentication (MFA) is a simple solution \u200cfor secure \u2064remote\u2062 desktop \u200caccess. \u200c<\/p>\n<p>With MFA enabled, all users need to provide two \u2062or more authentication methods to \u2062gain access to their machines. This additional layer of\u2063 security protects \u2062the workplace from\u2064 cybercrime \u2063and data \u200dbreaches, as even if a malicious actor had stolen employees\u2019 access credentials, they would still \u2063be unable \u2064to access their\u200d machines.\u200b<\/p>\n<p><strong>Benefits of \u2064Azure MFA for Remote Desktop include:<\/strong><\/p>\n<ul>\n<li>Increased security over standard\u200b single-factor authentication.<\/li>\n<li>Simple setup and implementation.<\/li>\n<li>High scalability for enterprise deployments.<\/li>\n<li>User experience remains\u2063 smooth and efficient.<\/li>\n<\/ul>\n<h2 id=\"2-protect-your-business-from-cybersecurity-threats-with-azure-mfa\"><span class=\"ez-toc-section\" id=\"2_Protect_Your_Business%E2%80%8B_from_%E2%81%A2Cybersecurity_Threats_with%E2%80%8C_Azure_MFA\"><\/span>2. Protect Your Business\u200b from \u2062Cybersecurity Threats with\u200c Azure MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cyberattacks are becoming increasingly frequent and sophisticated. The \u200dimplementation of advanced security tools such\u200c as Azure \u200bMulti-Factor Authentication (MFA) is essential\u2062 for any business looking to protect its data and applications. Azure MFA\u200c adds a powerful layer of protection to \u200dyour business\u2019s \u200bdigital\u200d infrastructure.<\/p>\n<p>Azure MFA provides an \u2063extra level of security to your\u200c user accounts\u2064 and resources. It\u2019s a versatile solution that can be tailored\u200c to meet \u200cthe security and\u2064 user experience needs of your business. Here are\u200c just a few of the key benefits of Azure MFA:<\/p>\n<ul>\n<li><b>Improved \u200csecurity:<\/b> MFA adds an additional layer of authentication for your users. \u200bThis helps stop nefarious actors from gaining\u2062 access\u2064 to\u2062 sensitive resources and\u200c data.<\/li>\n<li><b>Confidence:<\/b> Your data and \u2063applications \u2064are \u2063protected from malicious threats, giving you \u2064the assurance and confidence that your assets are secure.<\/li>\n<li><b>Deployment:<\/b> Azure MFA can be set up quickly\u200c and \u2063easily, ensuring your\u2062 business is able to quickly and <a href=\"https:\/\/logmeonce.com\/how-secure-is-logmeonce\/\">effectively implement enhanced security measures<\/a>.<\/li>\n<li><b>Flexibility:<\/b> Azure MFA is highly \u2063customizable, allowing you \u200cto\u200b tailor the service to fit \u200bthe\u2062 needs of your business.<\/li>\n<\/ul>\n<h2 id=\"3-benefits-of-integrating-azure-mfa-for-remote-desktop\"><span class=\"ez-toc-section\" id=\"3_Benefits_of_%E2%80%8BIntegrating_Azure_MFA_for%E2%81%A4_Remote_Desktop\"><\/span>3. Benefits of \u200bIntegrating Azure MFA for\u2064 Remote Desktop<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Improved Security<\/b><\/p>\n<p>Azure MFA helps to protect users\u2019 credentials\u200c and \u2064strengthens authentication for logging into Remote Desktop. It also offers an additional layer\u2064 of security by making users go through multiple steps to gain access \u2063to the system, for example using a\u2064 mobile device to approve\u2064 access \u2063or a verification code sent\u2063 via text or \u200cemail.\u2063 These \u2063additional steps \u200bhelp to confirm that \u200dthe\u2063 user is \u2064who\u200d they\u2063 say they are and protect the system from unauthorized access.<\/p>\n<p><b>Ease\u200d Of Use<\/b><\/p>\n<p>Azure MFA is a simple tool for \u200duser \u200dto get access to their \u2063Remote Desktop. It \u2064provides plenty of convenience as\u2064 it eliminates the need\u2064 for cumbersome logins and passwords for\u200c gaining \u200daccess. Users can do it fast and conveniently login using \u2062their mobile device. The technology also allows administrators \u200dto wirelessly manage \u200bterminals, making the entire process of managing its security\u200c even easier.<\/p>\n<h2 id=\"4-streamline-your-remote-access-with-azure-mfa-for-remote-desktop\"><span class=\"ez-toc-section\" id=\"4_Streamline_%E2%81%A4Your_Remote_Access_with%E2%80%8B_Azure_MFA_%E2%80%8Cfor_Remote_Desktop\"><\/span>4. Streamline \u2064Your Remote Access with\u200b Azure MFA \u200cfor Remote Desktop<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Navigating remote access\u2064 has\u200d never been easier with Azure Multi-Factor Authentication (MFA). MFA for Remote Desktop helps streamline the process and enables users to securely \u200baccess their remote servers with a single sign-on. \u200c<\/p>\n<p>Azure MFA for Remote Desktop offers many advantages\u200d for\u2064 organizations, \u200bincluding:<\/p>\n<ul>\n<li><strong>Enhanced Security<\/strong> \u2013 MFA helps increase security and protect your remote desktop against unauthorized access.<\/li>\n<li><strong>Time-Saving<\/strong> \u2013 Say goodbye to the hassle of multiple\u2063 authentication attempts. Azure MFA\u2062 for Remote Desktop simplifies the authentication process.<\/li>\n<li><strong>Cost Savings<\/strong> \u2013 With Azure MFA for Remote \u2064Desktop, you \u2064can\u2062 save\u2063 time and money by eliminating duplicate or poorly configured\u200b authentication solutions.\u2064<\/li>\n<\/ul>\n<p>Azure\u2063 MFA is an \u2062incredibly powerful solution for remote access, and makes it easier than\u2064 ever to protect files, applications, and \u200cnetworks against \u200cunauthorized access. So\u200b streamline your remote access, \u2062and start\u200b taking\u2062 advantage of\u2064 the security and convenience Azure MFA\u2063 for Remote Desktop offers\u200d today.<\/p>\n<p>Azure Multi-Factor Authentication (MFA) for Remote Desktop is a secure solution that offers multifactor authentication for users accessing remote desktop services. It utilizes a self-signed certificate to establish a secure connection and implements a service principal to manage authorization. Connection request policies are defined to grant access based on various criteria such as time of day and network user. RADIUS clients are used to facilitate secure communication between the client and the central server, while connection authorization policies ensure valid connection requests are authenticated using a secondary authentication method. This hybrid solution integrates identity solutions to strengthen security measures by requiring a password combination and key of certificate for authentication. The mechanism for content is regulated by policy and access services, which enforce user compliance with access policies to protect business and on-premises resources.<\/p>\n<p>Sources:<br \/>\n&#8211; Microsoft Azure. \u201cHow Azure AD Multi-Factor Authentication Works.\u201d Microsoft Docs, docs.microsoft.com<\/p>\n<p>Azure Multi-Factor Authentication (MFA) for Remote Desktop is a secure authentication method that grants access to users through a multifactor authentication process. This process involves the use of admin credentials, RADIUS Access-Accept and RADIUS Access-Request messages, and a mobile app for identity verification. The system ensures that only valid connection requests from remote desktop users are allowed access to the network. By using RADIUS servers for multifactor authentication, users can have an added layer of security when accessing business resources remotely. The setup of Azure MFA for Remote Desktop involves configuring RADIUS client authentication, network access policies, and connection settings to ensure a successful authentication flow. By following these steps, users can securely access their target resources within a time period specified by the network administrator.<\/p>\n<p>Source: Microsoft Docs &#8211; Azure MFA for Remote Desktop<\/p>\n<p>Azure Multi-Factor Authentication (MFA) for Remote Desktop is a comprehensive security solution that helps protect remote access to corporate resources. This system relies on a list of comma-delimited keywords to function effectively. The system associates public, RADIUS Access-Accept messages with identity governance, allowing only valid connection requests to be processed through multifactor authentication. This training helps users with multifactor authentication use the Double-click TS GATEWAY AUTHORIZATION POLICY and POLICY properties dialog box to set up the type of network access needed. RADIUS messages facilitate the message exchange between the remote RADIUS server group and the server pool, ensuring secure connections. To forward connection requests, the administrator must input the IP addresses and setup executable using the NPS Extension. Security administrators can set up additional levels of compliance through the use of registry keys and the authentication setup dialog box. Azure&#8217;s cloud-based Multi-Factor Authentication provides an added layer of security for remote desktop connections, ensuring policy details are enforced through the central policy server. By following these steps and utilizing the various settings available within the system, users can securely access remote desktop servers and virtual desktops while complying with authentication measures and security defaults.<\/p>\n<p>Source:<br \/>\n&#8211; Microsoft Azure. (n.d.). Multi-Factor Authentication in Azure Active Directory. Retrieved from docs.microsoft.com<\/p>\n<p>Azure MFA for Remote Desktop provides an extra layer of security for valid connection requests by enforcing multifactor authentication. When a user initiates a request for authentication, the administrator credentials are verified through Windows Server software before the two-step verification process can be completed. Users are required to verify their identity using their cell phone for forwarding connection requests. By right-clicking on connections, users can access servers after signing in with their extension service username and password. The multifactor authentication setup dialog allows for customization of authentication levels and security defaults. Azure&#8217;s cloud-based multifactor authentication ensures secure access to resources with over 91,000 times of usage. The Remote Desktop Deployment with Azure Resource allows for time restrictions and authorization for access based on IP settings and client devices. Additionally, the NPS &#8211; Azure Active Directory integration enhances security by validating the domain controller&#8217;s credentials before granting access to the Remote Desktop Gateway. Advanced troubleshoot options like Authenticator push notifications and user account dial provide additional security measures for a seamless remote desktop experience. (<a href=\"https:\/\/github.com\/login?return_to=https%3A%2F%2Fgithub.com%2FMicrosoftDocs%2Fentra-docs%2Fissues%2Fnew\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>: Microsoft Azure MFA documentation)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Configuration_Settings_for_Multifactor_Authentication\"><\/span>Configuration Settings for Multifactor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Configuration Step<\/th>\n<th>Number of Times<\/th>\n<\/tr>\n<tr>\n<td>Enable multifactor authentication extension<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Set up client health policies<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Enable Remote Desktop Gateway Conditions Day<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Define IP Settings Server settings<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Configure address assignment<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Set up role service for remote session<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Check Active session limit<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>Review logs in Application and Services Logs\\Microsoft\\AzureMfa<\/td>\n<td>1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Azure MFA \u200bFor Remote Desktop?<\/p>\n<p>A: Azure \u200bMFA \u2062For Remote \u200dDesktop is a cloud-based security service that provides extra \u200dprotection for\u200d digital resources. It uses\u200b specialized technology to\u200c verify the identity of each user who logs in\u2064 and authenticate them before allowing them to access data or resources. \u200cThis helps to ensure \u2063that only authorized users can gain access and keep data and resources secure.<\/p>\n<p>Q: What is Azure MFA for Remote Desktop?<br \/>\nA: Azure Multi-Factor Authentication (MFA) for Remote Desktop is a security feature that adds an extra layer of protection to Remote Desktop access by requiring users to provide two or more forms of verification before granting access. This helps secure remote connections to resources such as Azure AD, Active Directory, Remote Desktop Gateway, and Remote Desktop Services.<\/p>\n<p>Q: How does Azure MFA work for Remote Desktop?<br \/>\nA: Azure MFA for Remote Desktop works by integrating with Azure AD and Active Directory to enforce multifactor authentication for remote access. When a user attempts to connect to a Remote Desktop Gateway or Services, Azure MFA prompts them to provide additional verification beyond just a password. This could include a phone verification, push notifications, authentication app, or other authentication factors.<\/p>\n<p>Q: What are the benefits of using Azure MFA for Remote Desktop?<br \/>\nA: Using Azure MFA for Remote Desktop adds an extra layer of security to your network by verifying the identity of users before granting access. This helps prevent unauthorized access to network resources and protects against brute force password attacks. Additionally, Azure MFA can be centrally managed through Azure Active Directory to enforce central policy and access control for remote connections.<\/p>\n<p>Q: How can Azure MFA be set up for Remote Desktop?<br \/>\nA: Setting up Azure MFA for Remote Desktop involves configuring Remote Desktop Gateway or Services to integrate with Azure MFA. This can be done by installing Azure Multi-Factor Authentication Server on the gateway server or using a cloud-based MFA solution from Azure. Detailed setup instructions can be found in the official Azure documentation.<\/p>\n<p>Q: What are some best practices for implementing Azure MFA for Remote Desktop?<br \/>\nA: Best practices for implementing Azure MFA for Remote Desktop include setting up conditional access policies, configuring network policies, and enforcing multifactor authentication for all users with Remote Desktop access. It is also recommended to monitor authentication requests, set timeout settings, and periodically review and update access policies for compliance.<\/p>\n<p>Sources:<br \/>\n&#8211; Microsoft Azure Documentation: Azure Multi-Factor Authentication for Remote Desktop<br \/>\n&#8211; Microsoft Azure Tech Community: Best Practices for Implementing Azure Multi-Factor Authentication<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With Azure MFA providing\u200d strong security protection for Remote Desktop connections, why not take \u200cadvantage\u200c of the even stronger cyber \u200bsafety offered by LogMeOnce? <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> offers FREE accounts \u2062with Azure MFA, which\u2063 provides you with an encrypted, secured, and easy to use solution for remote desktop connections.\u200d Through the use\u200b of and Azure\u2062 MFA, rest easy that your\u2062 data\u2064 is safe\u200c and secure with\u200d every Remote Desktop connection made. \u200cGet the\u200b most out of your\u2063 Azure MFA for\u2063 Remote Desktop access with LogMeOnce today.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Azure\u2064 MFA For Remote Desktop can be an\u200b important security measure for organizations to protect\u200b their data and\u2064 networks. It provides a multi-factor authentication experience for users when \u2062connecting\u2064 with a \u200dremote desktop,\u2063 ensuring that access is secure and protected from malicious\u2063 actors. It is an effective way to safeguard access \u200dto corporate \u200bnetworks and [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[3837,3566,1754,6340,11055,781],"class_list":["post-69538","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-identitymanagement","tag-multifactorauthentication","tag-remotedesktop","tag-azure","tag-mfa","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69538"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69538\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}