{"id":69722,"date":"2024-06-20T01:34:41","date_gmt":"2024-06-20T01:34:41","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/mfa-enabled-vs-enforced\/"},"modified":"2024-06-25T00:26:07","modified_gmt":"2024-06-25T00:26:07","slug":"mfa-enabled-vs-enforced","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/","title":{"rendered":"MFA Enabled Vs Enforced"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Are you considering more secure authentication methods for your organization? One way to increase \u200csecurity \u2064is to utilize multi-factor\u200c authentication (MFA). The two main choices of MFA are enabled vs enforced. With MFA \u2063enabled, \u2063users can choose to\u2062 authenticate with MFA, \u200bwhile with MFA enforced, users\u200d are required\u2064 to authenticate with MFA. This article looks into the differences between \u201cMFA enabled vs enforced\u201d and \u200dthe pros \u200band \u2062cons of each.\u2063 Multi-factor authentication\u200c is an important security \u2063measure \u2064for\u200b organizations to consider, and understanding \u2062the \u2062difference \u2064between MFA enabled and forced is an essential step \u200cin this\u2064 process. Keywords: MFA security, multi-factor authentication.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#1_Understanding_Multi-factor_Authentication_%E2%81%A4What_is_MFA_Enabled_and_Enforced\" >1. Understanding Multi-factor Authentication: \u2064What is MFA Enabled and Enforced?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#2_%E2%80%8DPros_and_Cons_of_MFA_Enabled\" >2. \u200dPros and Cons of MFA Enabled<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#3_%E2%81%A4Pros_and_Cons_of_MFA_Enforced\" >3. \u2064Pros and Cons of MFA Enforced<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#Pros\" >Pros<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#Cons\" >Cons<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#4_Making_the_Choice_Choosing%E2%81%A3_the_%E2%81%A3Right_MFA_for_Your_Needs\" >4. Making the Choice: Choosing\u2063 the \u2063Right MFA for Your Needs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#Multi-Factor_Authentication_Comparison\" >Multi-Factor Authentication Comparison<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-understanding-multi-factor-authentication-what-is-mfa-enabled-and-enforced\"><span class=\"ez-toc-section\" id=\"1_Understanding_Multi-factor_Authentication_%E2%81%A4What_is_MFA_Enabled_and_Enforced\"><\/span>1. Understanding Multi-factor Authentication: \u2064What is MFA Enabled and Enforced?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>What Is \u2063MFA \u200bEnabled?<\/b><\/p>\n<p>Multi-factor\u2063 authentication (MFA) is a security \u200csystem that requires users to present \u2064more than \u200cone \u200cpiece of identity verification when logging into a\u200b system or website. \u2062This could\u2063 include entering \u2063a code sent to a user\u2019s email or phone, \u200cscanning a QR code from \u200can authenticator app, entering\u200b a one-time password, or using hardware tokens.<\/p>\n<p>MFA \u2062enabled means \u2063that organizations make MFA\u200b available\u2063 for its users to\u2063 use, as \u200ban \u200doptional security measure. This way, \u2062users who worry about their data\u2064 and account\u200d security can\u200c opt-in for an\u2063 extra layer\u200d of \u200bprotection and\u2064 feel\u2064 more secure.<\/p>\n<p><b>What Is MFA\u2062 Enforced?<\/b><\/p>\n<p>MFA\u2063 enforced means that\u200c organizations have selected\u2062 MFA as \u200cthe only access control method, meaning that all users will need to use\u200b MFA\u200b to\u200b access \u2062the system or website. This \u2063further\u2064 increases the\u2062 security of the system as it enables\u200b enhanced user\u2062 authentication for all \u200bits members.<\/p>\n<p>Enforcing MFA has the \u200dfollowing benefits:<\/p>\n<ul>\n<li>Increased fraud protection\u200d \u2013 By limiting user access and requiring multiple verification steps, \u200cit becomes much harder\u2064 to impersonate an authorized user.<\/li>\n<li>Increased auditability \u2013 \u2062The security system can log every access \u2064made to a system and \u200dcan identify \u2064which one \u2062was \u2062denied due \u2062to MFA.<\/li>\n<li>Easy\u200b compliance \u2013 MFA compliant systems\u2062 make it easier for \u200dbusinesses to conform to \u2064regulatory frameworks \u2064such as PCI DSS and GDPR.\u2064<\/li>\n<\/ul>\n<h2 id=\"2-pros-and-cons-of-mfa-enabled\"><span class=\"ez-toc-section\" id=\"2_%E2%80%8DPros_and_Cons_of_MFA_Enabled\"><\/span>2. \u200dPros and Cons of MFA Enabled<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multifactor\u2062 authentication\u200b (MFA)\u200d is a security protocol\u2062 designed to add an extra layer of protection \u200dto user accounts. \u200bBy requiring more \u2064than one authentication step, it makes it more difficult for unauthorized individuals \u200cto gain access. Here\u2019s a look \u200bat the \u2064advantages\u2063 and \u200ddisadvantages \u2063of MFA enabled accounts.<\/p>\n<p><b>Pros:<\/b><\/p>\n<ul>\n<li>Increased privacy and security:\u00a0MFA adds an additional layer of protection to\u200c your accounts, making it \u2063harder for hackers to gain access and steal data.<\/li>\n<li>Convenience:\u00a0MFA \u200bcan be set \u2062up\u200c to require only one \u2064authentication step for \u2064quick, secure\u200b access to\u200c your \u200daccounts.<\/li>\n<li>Easy setup:\u00a0MFA\u2064 protocols are \u2064simple to implement\u200c and\u200c can\u2063 be deployed quickly and \u200ceasily.<\/li>\n<\/ul>\n<p><b>Cons:<\/b><\/p>\n<ul>\n<li>Time consuming:\u00a0Requiring \u200bmore \u200cthan one <a title=\"MFA Enabled Vs Enforced\" href=\"https:\/\/logmeonce.com\/resources\/mfa-enabled-vs-enforced\/\">authentication step takes additional time<\/a>, which \u2062can be inconvenient\u2063 for users.<\/li>\n<li>Costly:\u00a0The additional security protocols needed for\u200b MFA can require significant upfront investment\u2063 and ongoing maintenance\u2062 costs.<\/li>\n<li>Complicated:\u00a0MFA requires \u200dsome technical know-how to properly implement and users may need additional support when \u200dsetting up the protocols.<\/li>\n<\/ul>\n<p>Overall, MFA is \u200ba\u2064 great way\u2062 to increase security for user accounts, but there \u200dare also some downsides to consider. \u2064It\u2019s important to weigh the pros\u2064 and cons before making\u200b a decision\u200b to enable MFA on your accounts.<\/p>\n<h2 id=\"3-pros-and-cons-of-mfa-enforced\"><span class=\"ez-toc-section\" id=\"3_%E2%81%A4Pros_and_Cons_of_MFA_Enforced\"><\/span>3. \u2064Pros and Cons of MFA Enforced<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor \u2063authentication \u200c(MFA) is not a new security system but it has recently\u200c become \u2064a \u200cpopular \u2064tool for adding \u2062an extra layer of security to\u2062 protect sensitive data. While there are many advantages to using MFA, it\u2019s important to understand the potential drawbacks as \u2064well:<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Pros\"><\/span><strong>Pros<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>Provides an additional layer of\u200d protection\u2063 against cyber intrusions<\/li>\n<li>Reduces\u2064 the risk of account takeovers by third-parties<\/li>\n<li>Hinders hackers\u200c from accessing valuable information<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Cons\"><\/span><strong>Cons<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>May lead to\u2063 false \u200bpositives that result in users being blocked \u2063from their \u200daccounts<\/li>\n<li>Can be more difficult for\u2063 users to\u200b manage, \u200bresulting in\u200d difficulties using the system<\/li>\n<li>Costs more to implement,\u2064 which can be\u2064 a challenge\u200d for small businesses<\/li>\n<\/ul>\n<p>Overall, MFA is a powerful security system that can provide additional protection for networks and user accounts, but it may not\u200c be the best fit for\u2062 everyone. It\u2019s important to understand the\u2064 potential\u2064 pros and cons before\u200b implementing \u200cMFA \u200dfor your\u2062 organization.<\/p>\n<h2 id=\"4-making-the-choice-choosing-the-right-mfa-for-your-needs\"><span class=\"ez-toc-section\" id=\"4_Making_the_Choice_Choosing%E2%81%A3_the_%E2%81%A3Right_MFA_for_Your_Needs\"><\/span>4. Making the Choice: Choosing\u2063 the \u2063Right MFA for Your Needs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Choosing the \u2063right MFA program \u2064can be a daunting process, but with the right information and\u200c research, you can make the best decision for your goals. Whether you\u2019re looking for \u200btraditional, hybrid, or online programs,\u200c there \u2063are a \u200dfew key factors to consider when\u2062 evaluating a program:<\/p>\n<ul>\n<li><b>Accreditation.<\/b> Look for a \u200dprogram \u200cthat is accredited by a nationally or <a href=\"https:\/\/logmeonce.com\/consumer-password-manager-and-password-recovery\/pricing-and-comparison\/\">regionally\u200d recognized accrediting agency<\/a> like the National Association of Schools of Art and Design (NASAD). This ensures that coursework meets certain \u200cstandards of quality.<\/li>\n<li><b>Program format.<\/b> Academic\u200b and studio-based \u200bcomponents are central \u2062to \u2062the MFA \u200cdegree\u2064 experience, but they aren\u2019t the only ones. Look for a program\u200d that offers internships, \u200cmentorships, and other\u2063 experiential learning opportunities.<\/li>\n<li><b>Credentials.<\/b> \u2064 Successful \u2064completion of an \u2062MFA will qualify you for certain \u2064credentials. Check to see if the \u200dprogram\u2063 is\u2064 eligible \u200cfor licensure\u2062 in your desired field.<\/li>\n<\/ul>\n<p>You should also explore options \u200bfor financial aid\u2064 and scholarships.\u200c Many \u200dcolleges and universities\u2062 offer programs specifically \u2062for master\u2019s\u2063 degree students, and professional organizations\u200b and\u200c foundations have opportunities as \u200bwell. Be sure to read any fine print\u200b to make\u2062 sure you understand how the\u200b award works\u2062 before\u2062 sending in your application. Finally,\u200b talk to your\u200b potential faculty advisors and students who\u2019ve already gone through\u2063 the program. They can give you invaluable advice\u200c about the \u200bprogram\u2019s coursework,\u200b course\u2062 sequencing, \u200dand graduation requirements.<\/p>\n<p>Multi-factor authentication (MFA) is an essential aspect of online security, particularly in high-risk cloud environments. Azure AD offers MFA as part of its security strategy, with options for enabling or enforcing MFA for user accounts. Enabled MFA allows users to use app passwords and prompts for the authentication process, while enforced MFA requires multi-factor authentication for all sign-ins. With a P2 license, users can access more advanced security measures and strict authentication policies. Conditional access policies can be set based on factors such as user location and device compliance, enhancing security for critical scenarios. Cloud Identity Premium also offers enhanced security features, such as auditing tools and comprehensive reports on authentication events. This comprehensive solution aligns with the commitment to security in the tech industry, providing valuable asset protection for businesses using cloud services like Azure and AWS. (<a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/howto-mfa-userstates\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>: Microsoft Azure, AWS Security)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Multi-Factor_Authentication_Comparison\"><\/span>Multi-Factor Authentication Comparison<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Security Measure<\/th>\n<th>Implementation<\/th>\n<th>Effectiveness<\/th>\n<th>Usage<\/th>\n<\/tr>\n<tr>\n<td>Security defaults<\/td>\n<td>Enabled by default<\/td>\n<td>High<\/td>\n<td>Automatic<\/td>\n<\/tr>\n<tr>\n<td>Office 365 MFA<\/td>\n<td>Enabled through admin center<\/td>\n<td>Medium<\/td>\n<td>Manual<\/td>\n<\/tr>\n<tr>\n<td>Azure AD MFA<\/td>\n<td>Risk-based Conditional Access<\/td>\n<td>High<\/td>\n<td>Manual<\/td>\n<\/tr>\n<tr>\n<td>2-Step Verification<\/td>\n<td>Two-step verification codes<\/td>\n<td>Medium<\/td>\n<td>Manual<\/td>\n<\/tr>\n<tr>\n<td>Conditional Access<\/td>\n<td>Control over access<\/td>\n<td>High<\/td>\n<td>Manual<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is the difference between \u2063MFA Enabled \u200cand\u2064 Enforced? \u2064<br \/>\nA: Multi-factor\u2064 authentication (MFA) Enabled means you have the option to enable MFA but \u2062are not required to do \u200cso. It\u2019s up to the user to \u2063take an extra step and activate the\u2062 extra\u2063 layer of security. MFA Enforced requires \u2063all users to \u2063use MFA before\u2064 gaining access. The extra layer\u200d of security\u200d is pre-set \u200cand must \u2063be used in order\u2064 to\u2063 access the system.<\/p>\n<p>Q: What is the difference between MFA Enabled and MFA Enforced in Azure AD?<br \/>\nA: MFA Enabled means that multi-factor authentication (MFA) is available but optional for users, while MFA Enforced requires users to complete the MFA registration process and use an additional authentication factor to access resources. (Source: Microsoft Azure AD)<\/p>\n<p>Q: What are the benefits of using Azure AD MFA?<br \/>\nA: Azure AD MFA adds an extra layer of security by verifying the identities of individual users, reducing the risk of unauthorized access and protecting online accounts. (Source: Microsoft Azure AD)<\/p>\n<p>Q: How does Azure Multi-Factor Authentication enhance security?<br \/>\nA: Azure MFA increases the level of authentication by prompting users to verify their identity using multiple factors, such as a security key, facial recognition, or a one-time code. This helps prevent operational damage caused by unauthorized users gaining access. (Source: Microsoft Azure MFA)<\/p>\n<p>Q: What are the differences between legacy authentication protocols and modern authentication protocols?<br \/>\nA: Legacy authentication protocols allow connections to be made using basic authentication methods, while modern authentication protocols provide advanced security controls and measures for protecting digital assets. (Source: Microsoft)<\/p>\n<p>Q: What is Conditional Access in Azure AD?<br \/>\nA: Conditional Access is a powerful tool that allows administrators to control user authentication and access policies based on user status, location, time frame, and the risk level of cloud apps being accessed. (Source: Microsoft Azure AD)<\/p>\n<p>Q: How does Azure Active Directory Multi-Factor Authentication protect against Abnormal Authentication Activity?<br \/>\nA: Azure AD MFA helps detect anomalies in user logins and can trigger additional authentication steps to verify user identities and prevent cyber attacks, such as fatigue attacks or confusion scenarios. (Source: Microsoft Azure AD)<\/p>\n<p>Q: What is Cloud MFA and how does it enhance security for cloud-based applications?<br \/>\nA: Cloud MFA provides an array of authentication methods, such as push notifications or authenticator notifications, to ensure secure access to critical assets and prevent unauthorized access in cloud computing environments. (Source: Microsoft)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting\u200b up an extra \u2062layer of\u200d security\u2063 has never been easier. Try creating a FREE LogMeOnce account to access the added benefits\u2064 of both MFA Enabled and\u200c Enforced Security. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> will help you be better protected from threats\u2062 like cyberattacks, data\u200c breaches, and \u2062more.\u200c Ensuring your data is \u2064secure has never been simpler. \u200dMake \u200dsure to enjoy\u200b the\u2063 enhanced safety provided through multi-factor\u200b authentication \u2064today \u2013 it\u2019s absolutely essential \u200dfor protecting \u200dyour \u2064data in an era\u200b of increased MFA Enabled Vs Enforced security.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Are you considering more secure authentication methods for your organization? One way to increase \u200csecurity \u2064is to utilize multi-factor\u200c authentication (MFA). The two main choices of MFA are enabled vs enforced. With MFA \u2063enabled, \u2063users can choose to\u2062 authenticate with MFA, \u200bwhile with MFA enforced, users\u200d are required\u2064 to authenticate with MFA. This article looks [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[13951,1294,20560,11055,10933,781,1784],"class_list":["post-69722","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-enabled","tag-authentication","tag-enforced","tag-mfa","tag-multi-factor-authentication","tag-security","tag-web-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69722"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69722\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}