{"id":69656,"date":"2024-06-20T01:17:36","date_gmt":"2024-06-20T01:17:36","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/how-does-mfa-work\/"},"modified":"2024-08-19T14:15:58","modified_gmt":"2024-08-19T14:15:58","slug":"how-does-mfa-work","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/","title":{"rendered":"How Does MFA Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Multi-factor authentication (MFA) is an incredibly\u200b important security measure for\u200c keeping \u200bdata safe \u200cand \u200dsecure.\u2064 But what is MFA and how does it\u2063 work?\u200b MFA is an \u2062authentication method that requires more\u2063 than one step\u2064 for a user to prove \u200ctheir identity and access\u2064 data. Through \u200bthe use of a combination\u2064 of multiple pieces of information, such as passwords, biometric\u200b data, or electronic \u200dcredentials, MFA can provide an additional layer of security. To understand how \u200bMFA\u200b works,\u2062 and what \u2062it can\u200b do to protect data, it\u2019s\u2063 important to learn more about its various \u2064features. \u2062 This article\u2064 explores \u200dthe\u2064 concept\u2063 of \u2064MFA and its\u200b many benefits and how it is \u200brelevant \u2062to people who make use of the internet. It also\u200d discusses\u2063 the\u2062 different methods that can\u2063 be used to <a title=\"How Does MFA Work\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/\">apply\u200b multi-factor \u2064authentication<\/a> and how it can be used to protect\u200b things like financial data, bank \u200daccounts, and other sensitive \u200dinformation.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#1_What_is_Multi-Factor%E2%80%8C_Authentication\" >1. What is Multi-Factor\u200c Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#2_How_Does_MFA_Make_Your_%E2%81%A4Accounts_%E2%80%8CMore_%E2%80%8BSecure\" >2. How Does MFA Make Your \u2064Accounts \u200cMore \u200bSecure?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#3_What_Kind_of_MFA_Protects%E2%81%A3_Your_Accounts\" >3. What Kind of MFA Protects\u2063 Your Accounts?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#4_How_to%E2%80%8C_Get_Started%E2%80%8B_with_Multi-Factor_%E2%81%A4Authentication\" >4. How to\u200c Get Started\u200b with Multi-Factor \u2064Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#Authentication_Methods_Comparison\" >Authentication Methods Comparison<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-work\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_is_Multi-Factor%E2%80%8C_Authentication\"><\/span>1. What is Multi-Factor\u200c Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication \u200b(MFA) is a\u2064 security system that \u2063requires an extra layer of authentication to secure a user\u2019s access to data. It takes two or more steps to verify\u200d a user\u2019s identity before granting access. This helps ensure that the person trying \u200bto access\u200c the data is actually authorized to\u2063 do\u200c so.<\/p>\n<p>\u2064 MFA \u2062can \u200dbe\u2064 used in a variety\u2064 of ways, including:<\/p>\n<ul>\n<li><b>Text\u2062 message or phone verification:<\/b> \u2063 A user receives a code\u2064 on \u2064their phone that\u200c they \u2062must \u200denter when \u200cattempting to login.<\/li>\n<li><b>On-Premise Token \u200dAuthentication:<\/b> Physical tokens are used that \u2064generate one-time passwords which must\u2063 be\u200b used during the\u2062 authentication process.<\/li>\n<li><b>Biometric\u200c Authentication:<\/b>Uses\u2062 technology such as fingerprint readers, \u2064voice recognition, facial recognition or \u2062retina scanning \u200dto verify \u2063a user\u2019s identity.<\/li>\n<li><b>Software-Based Authentication:<\/b>Users are required to\u2064 enter a special code\u2064 sent\u2064 to\u200d their email or generated by an authentication app\u2064 on their device.<\/li>\n<\/ul>\n<p>MFA provides an extra layer of\u2063 security to \u200dhelp protect users \u200daccounts and data \u200dfrom \u2064unauthorized access. It \u2062is one \u200bof the best ways to protect users from cyber threats \u2062and ensure that only authorized users can access \u200cdata. \u2064<\/p>\n<h2 id=\"2-how-does-mfa-make-your-accounts-more-secure\"><span class=\"ez-toc-section\" id=\"2_How_Does_MFA_Make_Your_%E2%81%A4Accounts_%E2%80%8CMore_%E2%80%8BSecure\"><\/span>2. How Does MFA Make Your \u2064Accounts \u200cMore \u200bSecure?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication \u2063(MFA) \u2063adds an extra layer of security to your account and\u200b it\u200d is a great\u2064 way to keep your sensitive\u2064 data safe. MFA \u2063helps \u200bprotect against\u200d cybercriminals and makes it hard for\u200b them to break into your account. \u2062Here are\u200d some of \u200cthe ways \u200dthat MFA can secure your \u2063accounts:<\/p>\n<p><b>1. Verifying Your \u2062Identity:<\/b><\/p>\n<ul>MFA requires users to \u200cprovide multiple pieces of\u200b information \u200bto verify \u200btheir identity, such as a password and a one-time code that \u2064is sent to their phone or email address. This\u2063 ensures\u200c that\u200b only\u200b someone \u200cwho\u200b has access to all\u2062 the necessary pieces\u200b of information will \u200bbe able\u200d to log\u2063 into\u200c the account.<\/ul>\n<p><b>2. No Shared\u2064 Passwords:<\/b><\/p>\n<ul>\u2062 MFA makes \u200cit \u200dimpossible to share passwords, as the additional authentication step is only available to \u2062the account holder.\u200d This\u200c helps protect your account by ensuring that\u2064 only the\u200b intended user \u200bhas access to it.<\/ul>\n<p><b>3.\u200d Adding Extra\u200b Layers of Security:<\/b><\/p>\n<ul>\u200b MFA can be configured to require \u2063multiple steps of authentication, \u200dsuch as\u2062 additional verification codes\u2064 from \u2063a third-party\u200c application or fingerprint reader. This\u200c adds an extra layer of security\u2064 that can make it almost \u2062impossible for hackers to \u2064access your account.<\/ul>\n<p>Using MFA can significantly increase \u2063your account security and help protect your sensitive data. With \u2062the added protection\u200d of \u2063MFA, you can\u2064 be \u200bsure that your account is safe and secure.<\/p>\n<h2 id=\"3-what-kind-of-mfa-protects-your-accounts\"><span class=\"ez-toc-section\" id=\"3_What_Kind_of_MFA_Protects%E2%81%A3_Your_Accounts\"><\/span>3. What Kind of MFA Protects\u2063 Your Accounts?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>The Benefits of Multi-Factor Authentication<\/b><br \/>\nMulti-factor authentication \u2064(MFA) is \u2062an excellent \u200cway \u2064to \u2062secure your accounts and \u200cprotect \u200cyourself from online threats. It is a process that \u200brequires\u2064 two or more \u2064authentication factors \u200cto \u200bverify \u200dyour\u200c identity. This\u2063 means that \u2063before you \u200dcan access your\u2062 account,\u2063 you \u2062must \u200bprovide \u200ctwo\u200b or \u2063more distinct forms of validation.<\/p>\n<p>The most common\u2064 authentication factors\u200d used\u2064 in \u2062MFA\u200b are something you know (e.g. a password), something \u2064you\u200c have \u2064(e.g. an authentication code or token), and something\u2062 you\u2064 are (e.g. a fingerprint). Each of these factors\u2064 provides an\u2062 additional layer\u200d of protection. For example,\u200c even if \u2064your password is \u2062guessed, someone will \u2062still\u200d need\u2063 to\u2063 have your \u200ctoken or access\u200d your\u200d biometric data to get into your account.<\/p>\n<p><b>Types \u200bof MFA Implementation<\/b><br \/>\nMFA systems \u200bare available in\u2062 a\u200c variety of forms, \u2062including:<\/p>\n<ul>\n<li>Two-Factor Authentication (2FA)<\/li>\n<li>U2F Security Keys<\/li>\n<li>Biometric Authentication<\/li>\n<li>Voice and Facial Recognition<\/li>\n<li>GSM-based Authentication<\/li>\n<li>Device \u2062Trusted\u200c Authentication<\/li>\n<\/ul>\n<p>These methods offer a \u2063range of protection,\u2064 from \u2062basic two-factor \u2064authentication, which only \u200crequires two \u200bdifferent forms of \u200bverification \u200csuch as a\u200c password \u200dand a pin number, to \u200bmore secure methods, such as biometric authentication, \u2062which requires \u200ca\u200b fingerprint or\u200b a retina \u200bscan.<\/p>\n<p>No \u200bsingle \u2062MFA system \u2063is\u200d perfect, but combining two or more\u2063 of these authentication\u200c methods is the best way to protect your accounts from threats. So when it \u2062comes to data \u2064security, it\u2019s always \u2064best\u200b to invest in a wide range of MFA solutions.<\/p>\n<h2 id=\"4-how-to-get-started-with-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_How_to%E2%80%8C_Get_Started%E2%80%8B_with_Multi-Factor_%E2%81%A4Authentication\"><\/span>4. How to\u200c Get Started\u200b with Multi-Factor \u2064Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Getting Started<\/b><\/p>\n<p>The first step in setting\u200d up multi-factor authentication is to pick an authentication provider. The\u200d options vary from \u2062simple to\u200b complex,\u200d so \u2064you\u2019ll \u2064want to consider which is best \u2063for \u200dyour needs. Popular providers include Google Authenticator, Authy, Duo Security, \u2064and\u200b Twilio\u2063 Verify.<\/p>\n<p>Once the \u2064provider is \u2063selected, the next step is\u200c to\u200b set\u2063 up the authentication. This \u2063will\u200d involve verifying your identity, setting up user roles, configuring access controls, \u200cand \u200cconnecting with your existing\u200d accounts and\u2063 data \u2062sources. The provider\u2019s\u200b setup process should \u2062provide clear \u200dinstructions, but it\u2063 is important to \u2062pay \u2062close attention \u2063to ensure any \u200cparticular \u2064security details (like\u2064 a passcode or \u2062PIN) are noted\u200c securely.<\/p>\n<p><b>Using Multi-Factor Authentication<\/b><\/p>\n<p>Now that multi-factor authentication \u200dis configured,\u2063 it\u2019s time\u2063 to start\u200c using it. The provider\u2019s access control settings allow you to\u2064 customize who has access\u200c to your \u200bdata \u200cand\u2063 when. This is an \u2062important step \u200cin \u2064protecting your data from unauthorized access.<\/p>\n<p>When logging \u200din, you\u2019ll enter your \u200cusername or email. \u2064You will then be \u200bprompted to \u200benter \u200ca \u2062separate code\u200b or\u2064 token, \u2063depending on your provider \u200band settings. This two-step \u200bprocess ensures that\u2063 only\u2063 authorized\u2063 users can \u2062gain access to your data.<\/p>\n<p>It is important to <a href=\"https:\/\/logmeonce.com\/business-identity-management-identity-manager-and-access-manager\/business-pricing-and-comparison\/\">regularly review \u2062access \u2062controls<\/a> and other\u2062 security settings to\u2062 ensure that they are secure. Multi-factor authentication helps protect\u200b your data and\u2064 can \u2064offer\u2063 peace of mind \u2013 \u200cso it\u2019s \u200cimportant to \u2062keep it up to date.<\/p>\n<p>Multi-factor authentication (MFA) is a security measure that requires users to provide multiple forms of verification before gaining access to a system or account. This can include factors such as a security token, mobile device, hardware token, or biometric verification like a fingerprint scan. By adding this extra layer of protection, MFA helps prevent unauthorized access to sensitive accounts and data. Weak passwords are a common vulnerability that MFA helps to mitigate, as it provides an additional authentication factor beyond just a password. Factors such as possession (having a physical device) or knowledge (knowing a specific piece of information) can be used in conjunction to verify a user&#8217;s identity. Adaptive authentication takes into account contextual factors like the time of day or the user&#8217;s location to enhance security. While MFA is effective at reducing the risk of security breaches, it is not foolproof and can still be vulnerable to phishing attacks or social engineering tactics. Organizations and individuals are encouraged to implement MFA as part of a comprehensive cybersecurity strategy to protect against the devastating effects of successful cyber attacks. (<a href=\"https:\/\/web.archive.org\/web\/20210406235123\/https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>: RSA, &#8220;The Evolution of Multi-Factor Authentication: From MFA to Adaptive Authentication,&#8221; 2017).<\/p>\n<p>Multi-factor authentication (MFA) is a form of authentication that requires users to provide multiple verification factors before gaining access to a system or application. This added layer of security helps to ensure that only legitimate users are able to access sensitive information. Some common factors of authentication include possession factors (such as a mobile app or soft token), knowledge elements (such as passwords or personal security questions), and inheritance factors (such as a physical object or location factor). Multi-factor authentication can help protect against brute-force attacks and man-in-the-middle attacks, as well as provide additional security for online resources and corporate networks (Cisco Security). With the rise of hacking-related breaches and identity theft incidents, it is more important than ever to implement robust identity and access management solutions, including multi-factor authentication, to protect user identities and prevent unauthorized access to systems and data. By utilizing a combination of different verification methods, such as biometric verification or one-time passcodes sent via SMS, organizations can create a secure and adaptive MFA system that reduces the risk of misuse and unauthorized access (Gartner). Additionally, the use of strong customer authentication, which may include factors such as access to resources or spending habits, can help prevent takeover fraud and secure transactions (Swift).Overall, implementing a multi-factor authentication system is vital for protecting sensitive information and mitigating the risks associated with unauthorized access and identity theft.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_Comparison\"><\/span>Authentication Methods Comparison<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Method<\/th>\n<th>Factors<\/th>\n<th>Security Level<\/th>\n<\/tr>\n<tr>\n<td>Multi-factor authentication<\/td>\n<td>Multiple verification factors<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>Two-factor authentication<\/td>\n<td>Two verification factors<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>Biometric verification methods<\/td>\n<td>Physical attributes<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>OTP-based authentication<\/td>\n<td>One-time passcodes<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>Personal identification<\/td>\n<td>Personal attributes<\/td>\n<td>Low<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is \u2062MFA?<br \/>\nA: \u200bMFA stands\u200b for Multi-Factor Authentication.\u2063 It\u2019s a high \u2063security \u2064system that \u2064requires you \u200cto \u2063verify your identity before\u2063 you can \u2062access things like online accounts, \u2062websites,\u2063 and files.<\/p>\n<p>Q: How\u2064 does MFA work?<br \/>\nA: MFA works by\u200d requiring\u200b more than \u2063one method \u2064of \u200bauthentication for you\u200b to access\u2062 your information. For example,\u2062 you might be\u2062 asked to provide a\u200c PIN number and a fingerprint\u200d scan, or a password along with\u2063 a facial scan. This helps \u200bmake \u200csure\u2063 that only you can access your information.\u200c<\/p>\n<p>Q: Where \u200dis \u200bMFA used?<br \/>\nA: MFA\u200b is \u200dused to\u2062 secure access to accounts and devices. \u2064You may have\u200d used MFA when setting \u2063up an\u200d online bank account or when logging into a secure \u200bwebsite. It\u2019s\u2064 also used in hospitals, offices, and other \u200dsecure places. \u200b<\/p>\n<p>Q: \u2062Is MFA secure?<br \/>\nA: \u200dYes, MFA is a secure way to protect your personal information. Because\u2063 it requires \u200bmultiple \u200bfactors of\u200c authentication, it makes it\u2063 very hard for anyone who isn\u2019t\u2063 you to gain access \u2063to your accounts.<\/p>\n<p>Q: What is multi-factor authentication (MFA) and how does it work?<br \/>\nA: Multi-factor authentication (MFA) is a security process that requires more than one form of verification to allow access to a system, application, or account. This additional layer of security helps protect against unauthorized access by bad actors. MFA typically involves a combination of factors such as something the user knows (knowledge factors like passwords or security questions), something the user has (possession factors like smart cards or mobile phones), and something the user is (biometric factors like fingerprint or retinal scan). By requiring multiple factors for authentication, MFA increases the level of security and makes it more difficult for cyber attackers to gain access to sensitive information.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Multi-factor authentication (MFA)&#8221; &#8211; OWASP<br \/>\n&#8211; &#8220;How does two-factor authentication work?&#8221; &#8211; Norton by Symantec<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that \u2063you understand the benefits \u200bof MFA \u2063and\u200c the\u2063 fundamentals of how it works, why don\u2019t \u2062you make the most\u200b out\u200d of this technology?\u200d Create your FREE\u200c LogMeOnce\u2064 account \u2062today to spend your time in more secure way. With <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can master\u200b the use\u2062 of \u2064strong \u200cmultifactor authentication and make the most out of its features to\u200d protect your\u2064 accounts\u200c with \u2064two-factor\u2063 authentication,\u2062 multi-device authentication,\u200d and\u2063 autofill options to\u2062 make your time online secure. So\u200b don\u2019t \u200cwait, sign \u200bup \u2063to\u2062 \u2063 for free \u200bLogMeOnce today and enjoy\u2064 the peace of mind that comes with using a secure online service to protect your \u200binformation using multifactor authentication! \u200c<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Multi-factor authentication (MFA) is an incredibly\u200b important security measure for\u200c keeping \u200bdata safe \u200cand \u200dsecure.\u2064 But what is MFA and how does it\u2063 work?\u200b MFA is an \u2062authentication method that requires more\u2063 than one step\u2064 for a user to prove \u200ctheir identity and access\u2064 data. Through \u200bthe use of a combination\u2064 of multiple pieces of [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2316,11055,10933,970,781],"class_list":["post-69656","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication-methods","tag-mfa","tag-multi-factor-authentication","tag-online-protection","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69656"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69656\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}