{"id":69988,"date":"2024-06-20T02:59:49","date_gmt":"2024-06-20T02:59:49","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/how-does-mfa-token-work\/"},"modified":"2024-07-01T06:05:34","modified_gmt":"2024-07-01T06:05:34","slug":"how-does-mfa-token-work","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/","title":{"rendered":"How Does MFA Token Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>MFA Token is transforming \u200cthe\u2063 way people\u2063 access \u200dtheir digital accounts in a secure way. It is a \u200cnew authentication method that uses a \u200bcombination of private keys\u2064 and passwords \u2062to authenticate users \u2063when they login online. So, how does MFA Token\u200b work? MFA Token works by using <a href=\"https:\/\/logmeonce.com\/schedule-login\/\">multi-factor authentication<\/a>. This \u2062involves the use of a primary credential such as a username \u200band password,\u200b and a secondary \u2062credential\u200d such as \u200ba biometric, OTP \u200ccode, or other authentication\u200d elements such as an RSA\u2064 token. This \u200dway, \u2063the user is ensured \u2064to have \u2064their accounts protected with \u200bthe highest levels of security. \u200bMulti-factor authentication helps \u2063to \u200censure that\u2062 the user has\u200b a secure login even if\u200d one of\u200d the two sets\u200d of credentials is \u200bleaked.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#1%E2%80%8B_What_is%E2%81%A3_MFA_Token\" >1.\u200b What is\u2063 MFA Token?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#2_%E2%80%8DHow_Does_MFA%E2%81%A3_Token_Protect_Data\" >2. \u200dHow Does MFA\u2063 Token Protect Data?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#3_Benefits_%E2%81%A2of_MFA_Token_Security\" >3. Benefits \u2062of MFA Token Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#4_Get_Started_with_MFA%E2%81%A2_Token%E2%80%8D_Technology_Today\" >4. Get Started with MFA\u2062 Token\u200d Technology Today<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#Data_Security_Measures_Table\" >Data Security Measures Table<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-does-mfa-token-work\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-mfa-token\"><span class=\"ez-toc-section\" id=\"1%E2%80%8B_What_is%E2%81%A3_MFA_Token\"><\/span>1.\u200b What is\u2063 MFA Token?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>A Multifactor Authentication (MFA) token is an additional layer of security used \u2063to authenticate\u200b a user before they\u200b can access an online account.<\/b> \u200c It takes the form of either a physical or\u200c software-based\u200b device\u200c and \u2063requires a system user to provide two different factors before they can\u2062 successfully \u200baccess a computer system or \u2062application.<\/p>\n<p>The two factors of authentication are \u200dsomething the \u2064user knows, such \u200bas a password or a PIN, plus something the \u200cuser \u2062possesses, \u2063such as \u2064an MFA token\u2064 or a smartphone. \u200dThe actual MFA token itself \u2063can be either \u2064a hardware token,\u2064 which \u2063looks like a USB drive,\u200b or\u200c a virtual token, \u2062which is\u200d stored on a smartphone or\u200d computer. Both types of tokens generate a unique code that the user\u2064 must\u200c then \u200denter along with their regular login credentials. This ensures that it is indeed \u200cthe legitimate user who is accessing the \u200bsystem, \u2063and\u200d not\u200b an impostor.\u200c \u200dMFA \u200dtokens will also expire after a certain time period so users \u2064must \u200cto continually authenticate themselves with a new MFA token code.<\/p>\n<h2 id=\"2-how-does-mfa-token-protect-data\"><span class=\"ez-toc-section\" id=\"2_%E2%80%8DHow_Does_MFA%E2%81%A3_Token_Protect_Data\"><\/span>2. \u200dHow Does MFA\u2063 Token Protect Data?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication (MFA) \u200ctokens are a great way to keep your data secure. Here\u2019s how it works \u200d- MFA token consists of a\u200b personal device, such as \u2063a phone or a tablet, and a code generated by the device. This code \u200cis\u2064 then used to authenticate the\u200d user\u2019s \u2063identity when they access data.\u200c The\u2064 personal device, or token, adds\u2064 an extra layer \u2063of \u200dsecurity,\u2062 making \u200dit much more difficult for hackers and other \u200cmalicious entities to access your private\u2064 data.<\/p>\n<p>The added layer of\u2062 protection\u200d offered\u2063 by\u200c MFA tokens makes\u200c it \u2062virtually impossible for hackers \u200dto access your private\u200b data without\u200d going \u2063through the extra steps\u2064 required to authenticate themselves. Even if a hacker managed\u2063 to get through\u200b the initial \u2063authentication process, it would still be nearly impossible for them\u200b to \u200baccess the actual data, as\u200b the personal device would be required as an extra security measure. \u2062In\u2064 addition,\u2062 MFA tokens are better than traditional passwords since they are \u2062constantly changing,\u200d making \u200bit much harder for hackers\u200b to \u200bguess them.<\/p>\n<ul>\n<li>MFA \u2063tokens consist of a personal device \u2062and a generated code to authenticate user\u2019s \u2063identity<\/li>\n<li><b>The extra\u200c layer of security makes it almost impossible for malicious entities to access your data<\/b><\/li>\n<li>MFA tokens are better than\u200c traditional\u200c passwords\u200c as they\u200c are constantly \u200bchanging<\/li>\n<\/ul>\n<h2 id=\"3-benefits-of-mfa-token-security\"><span class=\"ez-toc-section\" id=\"3_Benefits_%E2%81%A2of_MFA_Token_Security\"><\/span>3. Benefits \u2062of MFA Token Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>MFA (Multi-Factor Authentication) token security \u2063is an \u200binvaluable\u2062 security tool, providing \u200dusers with an extra layer \u200dof security and privacy. Here\u2062 are the main benefits of utilising MFA token \u200dsecurity.<\/p>\n<ul>\n<li><strong>Protection From Unauthorised Access<\/strong> \u2013 MFA token security helps to prevent unauthorised users from\u2063 accessing a system. This \u2063can be achieved by\u2064 using \u200dtwo-step authentication where a user must enter a code in \u200baddition to their\u200b password. This extra layer of authentication\u200b is invaluable in reducing the risk of \u200bunauthorised access.<\/li>\n<li><strong>Reliability and Consistency<\/strong> \u2013 MFA token security\u200b is \u2064reliable and consistent. By using a token or biometric\u2064 authentication, users can\u200b be confident that there \u200cwill be \u2064no inconsistencies in the use\u200c of \u200cthe system or unintended \u2063access by\u200b unauthorised users.<\/li>\n<li><strong>Better User Tracking and Logging<\/strong> \u2013 Using an \u2064MFA token\u200b security system\u200b is\u2062 a great way to ensure that \u2064user\u2064 tracking\u2063 and logging \u200dis improved. This \u200dis invaluable\u200c for businesses that\u2063 need to monitor access \u200cto their systems,\u200b as it helps to\u2062 ensure \u2062better security and accuracy.<\/li>\n<\/ul>\n<p>Overall, \u2063MFA token security provides\u2063 users with\u2062 an \u200bextra layer of security and\u2063 privacy, protecting data from\u2064 unauthorised access. The \u2064reliability of the system \u2062is also\u2064 incredibly beneficial, offering \u200busers\u2064 consistent and accurate\u200b access to a\u2062 system. This\u200d is coupled with improved user tracking and\u2063 logging, making it \u200ban \u2063invaluable \u200dsecurity feature.<\/p>\n<h2 id=\"4-get-started-with-mfa-token-technology-today\"><span class=\"ez-toc-section\" id=\"4_Get_Started_with_MFA%E2%81%A2_Token%E2%80%8D_Technology_Today\"><\/span>4. Get Started with MFA\u2062 Token\u200d Technology Today<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you\u2019re looking to get started with MFA token technology, there\u2064 are a few simple\u2062 steps that you\u200c can \u2063take right away. Multifactor authentication (MFA) token technology \u200bprovides an additional layer of security for your digital accounts, so you can feel \u2063confident that your\u200c data will\u200d stay safe.<\/p>\n<p>Here\u2019s how \u200bto \u200bget started today:<\/p>\n<ul>\n<li><strong>Choose a Provider:<\/strong> Select a trusted MFA technology provider \u200dthat \u200bcan \u2062help you set up and manage \u2062your authentication security.<\/li>\n<li><strong>Set Up \u200bToken:<\/strong> Follow\u200c the instructions from\u2064 your provider to install\u200c the token on\u200c your computer, and \u2063to assign the <a title=\"Passpoint Secure Username And Password\" href=\"https:\/\/logmeonce.com\/resources\/passpoint-secure-username-and-password\/\">correct authentication settings<\/a>.<\/li>\n<li><strong>Test\u2062 the Token:<\/strong> Before you \u200dstart\u200d using the token, try it out by logging\u2064 into a test account or by running \u2064a \u200ddemo. This makes sure that the token is \u200dworking \u200dproperly.<\/li>\n<li><strong>Use the Token:<\/strong> \u200bNow that you have the token set\u200d up and\u200b tested, you can\u2063 use it to add an extra layer \u200bof security for your\u200b digital accounts.<\/li>\n<\/ul>\n<p>By following these steps, \u2062you can get\u200d started\u200b with token authentication \u2063and make sure your data \u200bstay protected.<\/p>\n<p>Multi-factor authentication (MFA) token works by providing an additional layer of security to user authentication. This system requires users to provide multiple forms of identification in order to access their accounts or sensitive information. These forms can include possession factors such as security tokens or physical devices, knowledge factors like personal security questions or common passwords, or biometric verification methods like retinal scans or keystroke dynamics. By incorporating multiple authentication factors, MFA token systems greatly enhance security and protect against phishing attacks, brute-force attacks, and other cyber threats. This technology is widely used in online transactions, digital initiatives, and corporate networks to ensure the identity of users and prevent unauthorized access. Overall, MFA token systems offer a robust and reliable form of authentication that helps safeguard personal and sensitive information from potential threats.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Two-factor authentication, authentication for centuries, authentication proofs, authentication requirements, drawback of authentication including&#8221;, Department of Homeland Security (2017).<\/p>\n<p>Multi-factor authentication (MFA) token works by adding an extra layer of protection to the authentication process. This can include possession factor authentication such as using a physical token like a USB device or a soft token stored on a mobile phone. The user must possess the token in order to access the system, adding an additional level of security. Tokens can also be used for access requests, with different types of tokens available such as access tokens or authentication tokens. By using a combination of letters, PIN codes, verification codes, or biometric data, the correct combination must be entered for access to be granted. This strong authentication method helps prevent cyber attacks and unauthorized access. Additionally, there are different types of tokens available such as hardware authentication tokens or digital certificates that can be used in conjunction with the authentication token process.<br \/>\nSources:<br \/>\n&#8211; Duo Mobile. (n.d.). Retrieved from guide.duo.com<\/p>\n<p>Multi-factor authentication (MFA) token works by requiring additional layers of security beyond just a username and password to verify a user&#8217;s identity. The authentication process involves the use of a token, which can be a physical device like a USB stick or a mobile app that generates one-time codes. This token is used to confirm the user&#8217;s identity during authentication attempts, adding an extra level of security to the process. The token type can vary depending on the business rules and the specific authentication mechanism used, such as biometric components or behavioral biometrics. In a true multi-factor authentication system, multiple factors are required, such as something the user knows (password), something they have (token), and something they are (biometric trait). This added security helps protect against unauthorized access and ensures that only authorized users can access sensitive information or perform transactions. MFA tokens can also be used for additional security measures, such as time-based access or transaction authorization, to further enhance security protocols.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\" target=\"_blank\" rel=\"noopener nofollow\">Sources<\/a>:<br \/>\n&#8211; &#8220;What is multi-factor authentication (MFA)?&#8221; TechTarget, searchsecurity.techtarget.com<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_Security_Measures_Table\"><\/span>Data Security Measures Table<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Data Security Measure<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Uses multiple factors for secure authentication<\/td>\n<\/tr>\n<tr>\n<td>Token-Based Authentication<\/td>\n<td>Authentication using a physical or digital token<\/td>\n<\/tr>\n<tr>\n<td>Biometric Device Components<\/td>\n<td>Uses physical characteristics for authentication<\/td>\n<\/tr>\n<tr>\n<td>Facial Authentication<\/td>\n<td>Authenticates users based on facial features<\/td>\n<\/tr>\n<tr>\n<td>Strong Customer Authentication<\/td>\n<td>Enhanced authentication process for online transactions<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is an MFA Token?<br \/>\nA: An\u200d MFA Token is\u2062 a \u200ctype of security technology that helps\u200b make sure\u200c you\u2019re you. \u200cIt uses a \u200dcode that\u200d changes\u2063 over time, generated by an\u200c app\u2062 on\u200b your \u200cphone\u200c or another device, in addition to your \u2064regular username and password to make sure only you have access \u2064to\u200d your account.<\/p>\n<p>Q: How does it work?<br \/>\nA: When you try\u2063 to log into a website or other account,\u200b an MFA Token sends a code that \u2063the\u2064 website verifies against\u200b a code stored on your device. If\u2064 the codes match, your identity is\u200c confirmed and you \u2064can go ahead and access\u2062 your account.<\/p>\n<p>Q: Why do\u2064 I need \u200ban MFA Token?\u200d<br \/>\nA: MFA \u2063Tokens are\u2063 an extra\u200c layer of\u2064 security for your accounts and help protect them against\u2062 malicious hackers \u2063and other cyber threats. They \u2064help ensure that \u200donly you can access your account,\u200b and make it \u200dmuch harder for someone else to get access. \u200d<\/p>\n<p>Q:\u200b How do\u200b I get an MFA Token? \u200b<br \/>\nA: Most websites\u2063 and accounts that offer an MFA Token will provide you with\u200c instructions on how to set it up. You will need a device like\u200c a smartphone or tablet with internet access to set up your MFA Token. Once you have it \u2064set\u2063 up, you can use the code to access your\u200b account\u200c anytime you need it.<\/p>\n<p>Q: What is a Multi-Factor Authentication (MFA) token and how does it work?<br \/>\nA: A Multi-Factor Authentication (MFA) token is a form of authentication that requires users to provide two or more forms of verification before granting access to a system or application. This can include something the user knows (such as a password), something the user has (such as a mobile device or smart card), or something the user is (such as a fingerprint scan). MFA tokens generate one-time passwords that are used during the login process to verify the user&#8217;s identity. This adds an additional layer of security to the authentication process, helping to prevent unauthorized access.<\/p>\n<p>Sources: &#8220;Two-factor authentication, adaptive authentication solutions&#8221;<\/p>\n<p>Q: What are some common types of MFA tokens?<br \/>\nA: Common types of MFA tokens include software tokens, connected tokens, disconnected tokens, and hardware devices. Software tokens are typically installed on a mobile device, while hardware devices can include USB tokens or smart cards. These tokens generate authentication codes that are used during the login process to verify the user&#8217;s identity and provide an additional layer of security.<\/p>\n<p>Sources: &#8220;Multi-Factor Authentication Methods&#8221;<\/p>\n<p>Q: How do MFA tokens help prevent unauthorized access?<br \/>\nA: MFA tokens add an additional authentication factor to the login process, making it more difficult for bad actors to gain access to systems or applications. By requiring users to provide multiple forms of verification, such as a password and a one-time password generated by an MFA token, organizations can significantly reduce the risk of unauthorized access.<\/p>\n<p>Sources: &#8220;Risk-Based Authentication&#8221;<\/p>\n<p>Q: What is the difference between two-factor authentication and multi-factor authentication?<br \/>\nA: Two-factor authentication requires users to provide two forms of verification, typically something they know (such as a password) and something they have (such as a mobile device). Multi-factor authentication goes a step further by requiring users to provide two or more forms of verification, which can include something they are (such as a fingerprint scan). This added layer of security enhances the protection against unauthorized access.<\/p>\n<p>Sources: &#8220;Two-factor authentication, Adaptive authentication solutions&#8221;<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Are \u2062you still trying\u200b to figure out \u201cHow Does MFA Token Work\u201d? Then you should try creating a\u200b FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>\u2064 \u200baccount \u2013 it\u2019s a secure authentication solution, perfect \u200dfor \u200dverifying user\u2063 identity. With \u200dreliable Multi-Factor Authentication \u200c(MFA) and 2-Factor Authentication (2FA) tokens, \u2062makes it easier than ever for\u200d users to securely log on to multiple websites \u2064using \u200ba single authentication process. Create \u200byour FREE LogMeOnce account today and find out how easy Multi-Factor Authentication can be!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>MFA Token is transforming \u200cthe\u2063 way people\u2063 access \u200dtheir digital accounts in a secure way. It is a \u200cnew authentication method that uses a \u200bcombination of private keys\u2064 and passwords \u2062to authenticate users \u2063when they login online. So, how does MFA Token\u200b work? MFA Token works by using multi-factor authentication. This \u2062involves the use of [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1294,20641,10933,781,16914],"class_list":["post-69988","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication","tag-mfa-token","tag-multi-factor-authentication","tag-security","tag-user-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69988"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69988\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}