{"id":70048,"date":"2024-06-20T03:35:31","date_gmt":"2024-06-20T03:35:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/multi-factor-authentication-services\/"},"modified":"2024-08-19T13:11:56","modified_gmt":"2024-08-19T13:11:56","slug":"multi-factor-authentication-services","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/","title":{"rendered":"Unlocking the Power of Multi Factor Authentication Services: Protect Your Data Now"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Are you looking for \u2063an effective way to keep your data and digital \u2064accounts safe? Multi Factor Authentication Services (MFAS) \u200bis\u200d the answer.\u2063 MFAS provides\u200c a \u2064layer of security\u2062 to \u2063your online accounts by requiring two-factor or multi-factor authentication. By adding an extra layer of security to a user\u2019s account, unauthorized access is made much \u2062more\u2064 difficult and offers businesses \u200bmore \u200dprotection from \u200ddata \u200cbreaches\u200b and hackers.\u200c With the rise \u200cof data breaches, MFAS is \u200bone \u2063of the most important\u200c tools\u2062 businesses \u2063can leverage to \u2063help ensure their data\u200d and accounts are safe and \u200csecure. With its <a href=\"https:\/\/logmeonce.com\/team-password-manager\/\">multi-factor authentication \u2062process<\/a>, users can\u200d log into \u2063digital accounts with more confidence, knowing their\u200b username and password \u200bis fortified by \u200dthe MFAS.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#1_%E2%80%8CUnlocking_the_Benefits_of_Multi%E2%80%8C_Factor_Authentication\" >1. \u200cUnlocking the Benefits of Multi\u200c Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#2_How_%E2%80%8Bto_%E2%80%8BUtilize_%E2%80%8CMulti_Factor_Authentication_for%E2%80%8D_Enhanced_Security\" >2. How \u200bto \u200bUtilize \u200cMulti Factor Authentication for\u200d Enhanced Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#3%E2%80%8D_Why_Multi_Factor_Authentication_%E2%80%8BIs_Essential_for_Businesses\" >3.\u200d Why Multi Factor Authentication \u200bIs Essential for Businesses?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#4_Unlocking%E2%80%8C_the_Full_%E2%80%8CPotential_of_Multi%E2%81%A4_Factor_Authentication_Services\" >4. Unlocking\u200c the Full \u200cPotential of Multi\u2064 Factor Authentication Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#Comparison_of_Multi-Factor_Authentication_Solutions\" >Comparison of Multi-Factor Authentication Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-services\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlocking-the-benefits-of-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_%E2%80%8CUnlocking_the_Benefits_of_Multi%E2%80%8C_Factor_Authentication\"><\/span>1. \u200cUnlocking the Benefits of Multi\u200c Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Multi Factor Authentication (MFA)<\/b> is the latest layer of security to protect your data. \u2062It requires a combination of two or\u2062 more steps using something you know \u2062(e.g.\u2063 a password) and\u2064 something you\u200d have (e.g.\u200c a digital token). MFA is\u200d rapidly becoming more popular and here\u2064 are \u200bsome \u200dof the\u200c reasons why:\u200b<\/p>\n<ul>\n<li>It\u2063 adds a\u200b layer of \u2062complexity, making\u200b it harder for \u200chackers to access \u2063your account.<\/li>\n<li>You receive an alert whenever someone attempts to log into\u2064 your account.<\/li>\n<li>It verifies that \u200byou\u2019re the \u200bone \u200baccessing\u2064 the account,\u200b even when someone else has your login \u2064credentials.<\/li>\n<\/ul>\n<p>The use of \u2063MFA can mean the difference\u200c between preventing a data breach and exposing a business \u2063to fraud and identity theft. \u2064MFA can be\u200b enabled on \u200cmost popular web \u200capplications like email, social\u2063 media, banking, shopping, and accounting.\u2062 Most companies \u200bthat provide one-time \u200cpasswords (OTP) use a two-factor \u2064authentication \u200bmethod\u2062 such\u2064 as SMS or app OTPs. It makes it more difficult\u2062 for \u200daccount-hijackers to gain access to your account as they must\u2064 have \u200daccess to both the original\u200d password \u200band \u2063the device \u200bthat receives \u200dthe \u2063code. Multi Factor Authentication \u200bis becoming a \u2063standard \u200bfor businesses of all sizes as it offers increased \u200dsecurity and reliability.<\/p>\n<h2 id=\"2-how-to-utilize-multi-factor-authentication-for-enhanced-security\"><span class=\"ez-toc-section\" id=\"2_How_%E2%80%8Bto_%E2%80%8BUtilize_%E2%80%8CMulti_Factor_Authentication_for%E2%80%8D_Enhanced_Security\"><\/span>2. How \u200bto \u200bUtilize \u200cMulti Factor Authentication for\u200d Enhanced Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication \u2064(MFA) is a security measure designed \u2064to protect an account\u2062 from unauthorized access by requiring more than one form of authentication. It can add an\u200c extra layer\u2064 of \u2064security to\u2064 your\u2064 online accounts\u2062 and help \u2062protect \u200dagainst \u200btheft and hacks. Here\u2062 are\u200b some ways you can make \u2062use\u200c of multi-factor authentication\u2063 for enhanced \u2063security:<\/p>\n<ul>\n<li><strong>Use a password\u200b manager.<\/strong> \u2063Password \u2063managers can \u2063help you \u2062create and \u2064store secure passwords\u200d that \u2063are difficult to guess. \u200dSince \u2062passwords\u200b are often the weakest\u200c link \u200bin online security, a\u2064 password manager\u200b can help\u2062 you secure your \u200caccounts with longer, \u200dmore\u200d secure passwords for enhanced protection\u200d against \u200bhackers \u200band other malicious actors.<\/li>\n<li><strong>Enable two-factor authentication.<\/strong> Two-factor authentication\u2063 is \u2062a \u200bform of multi-factor authentication, and it requires two steps \u2063to access \u200cyour account. This can mean entering a code sent \u2064to your phone when logging in, or even using your \u2064fingerprint or face recognition to access\u2062 your account. This added step makes it harder for \u200dsomeone to access your \u2063account\u200b if they don\u2019t have access to that additional information.<\/li>\n<li><strong>Use a virtual\u2063 private network (VPN).<\/strong> \u200c A VPN is a form of security that \u200dhelps protect \u2063your \u200bonline accounts\u2062 and data. It \u200broutes your \u2062internet\u2062 traffic through \u2062an\u2064 encrypted tunnel to secure\u200d your privacy, and it \u200bcan be\u2062 used to access \u200bthe\u2063 internet from any location. By\u200c using a \u2062VPN,\u2063 you can securely access your accounts from anywhere, helping to protect them from malicious \u200dactors.<\/li>\n<li><strong>Use strong encryption.<\/strong> \u200cEncryption \u200bis a technique used to\u200d help\u2064 protect data \u2063and \u2063communications from\u2064 unauthorized access.\u200b By using \u2062strong\u200c encryption, you\u200b can ensure that \u200bonly those with the\u200d correct encryption\u200d keys\u2062 can\u200d access your accounts\u2064 or\u200d data.\u2063 This can be an\u200b effective measure against hackers and other malicious \u2064actors, as they won\u2019t be \u2062able to access your \u200bdata if they can\u2019t decrypt\u200d it.<\/li>\n<\/ul>\n<p>These are just some of the \u2064ways you can use multi-factor authentication \u2064for enhanced security. With the \u200cright measures in place, you \u200ccan\u200c keep\u2064 your\u200d online accounts and\u200d data safe\u2063 and secure \u200cfrom malicious \u2062actors.<\/p>\n<h2 id=\"3-why-multi-factor-authentication-is-essential-for-businesses\"><span class=\"ez-toc-section\" id=\"3%E2%80%8D_Why_Multi_Factor_Authentication_%E2%80%8BIs_Essential_for_Businesses\"><\/span>3.\u200d Why Multi Factor Authentication \u200bIs Essential for Businesses?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Safeguarding Corporate\u2063 Data<\/b><\/p>\n<p>Multi-factor \u2063authentication is essential for businesses \u2062as it provides \u200dan additional layer of security for a company\u2019s \u200conline accounts and \u200cdata. \u200dIt helps to protect against unauthorized access \u200cand\u200d possible data\u2062 breaches. This type \u2064of authentication requires a user to provide \u200dtwo \u2062or more pieces \u200cof evidence to \u2063prove\u200d their identity, such as a one-time key,\u2064 biometric data, password, etc. The combination\u200d of different factors helps \u200bto protect the business from hackers and cybercriminals.<\/p>\n<p><b>Simplifying Online Processes<\/b><br \/>\nMulti-factor authentication is also beneficial for\u2064 businesses \u2063as it \u200csimplifies and streamlines\u2064 the\u2062 online access\u200c process. Employees no longer \u2062need \u200bto remember complex passwords or \u2064multiple sets of usernames and\u2062 passwords.\u200c They\u2063 can simply \u2062enter an\u2062 authorized code or\u200d submit their biometric data in order to gain access to the system.\u2063 This is especially helpful in\u200b organizations with multiple departments and locations. It\u200d helps to ensure that\u200b each user has \u200baccess\u2064 only \u2064to the specific data they are authorized to\u200b view.<\/p>\n<h2 id=\"4-unlocking-the-full-potential-of-multi-factor-authentication-services\"><span class=\"ez-toc-section\" id=\"4_Unlocking%E2%80%8C_the_Full_%E2%80%8CPotential_of_Multi%E2%81%A4_Factor_Authentication_Services\"><\/span>4. Unlocking\u200c the Full \u200cPotential of Multi\u2064 Factor Authentication Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Maximizing Access Control<\/b><\/p>\n<p>Multi-factor authentication services allow businesses to\u2062 both protect and control access. With this added layer of security, businesses can be sure that only authorized personnel have access \u200bto their data.\u2062 To \u200breap the \u200dfull\u200c benefits of <a title=\"Centralia MFA\" href=\"https:\/\/logmeonce.com\/resources\/centralia-mfa\/\">multi-factor authentication \u2063services<\/a>,\u2062 careful\u200b planning is essential.<\/p>\n<p>Businesses should\u2064 start by establishing\u200c access criteria\u2062 based on work\u200d locations,\u200c roles, and data access\u200c levels. \u200bAccess\u200b criteria should be regularly updated to ensure that access is appropriate. Next, businesses should\u200c implement a procedure for granting and\u200d revoking access.\u2062 This \u200dwill \u200censure that the access criteria is applied uniformly and that only the necessary\u200d people have \u200daccess.<\/p>\n<p>Finally, it\u2019s also important to periodically audit user access. This\u2063 will allow \u200cbusinesses to ensure that only those \u200cwho \u200cshould have access are \u2063able to access the data. Moreover, auditing will help identify any unauthorized\u2062 users or any\u200d activities that may indicate malicious behavior or data theft.<\/p>\n<p>By closely managing and auditing access controls, businesses \u200ccan\u200b ensure that their data is secure while\u200d also freeing up their staff to work more efficiently.\u2062<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Comparison_of_Multi-Factor_Authentication_Solutions\"><\/span>Comparison of Multi-Factor Authentication Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Key Features<\/th>\n<th>User Base<\/th>\n<th>Security Level<\/th>\n<th>Service Providers<\/th>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication (MFA)<\/td>\n<td>Behavioral biometrics, context-based adaptive authentication<\/td>\n<td>Medium businesses, enterprise users<\/td>\n<td>High<\/td>\n<td>Duo Security, Entrust Identity<\/td>\n<\/tr>\n<tr>\n<td>Passwordless MFA<\/td>\n<td>Email address, physical tokens<\/td>\n<td>Business users, mobile users<\/td>\n<td>Medium<\/td>\n<td>Duo Security, Entrust Identity<\/td>\n<\/tr>\n<tr>\n<td>Single-Factor Authentication<\/td>\n<td>Username and password<\/td>\n<td>Business users, consumers<\/td>\n<td>Low<\/td>\n<td>Duo Security, Entrust Identity<\/td>\n<\/tr>\n<tr>\n<td>Two-Factor Authentication (2FA)<\/td>\n<td>Authentication code, physical hardware tokens<\/td>\n<td>Enterprises, financial institutions<\/td>\n<td>Medium<\/td>\n<td>Duo Security, Entrust Identity<\/td>\n<\/tr>\n<tr>\n<td>Multi-Factor Authenticator<\/td>\n<td>Soft tokens, device types<\/td>\n<td>Business users, privileged users<\/td>\n<td>High<\/td>\n<td>Duo Security, Entrust Identity<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is multi\u2062 factor authentication?<br \/>\nA: Multi factor authentication (MFA)\u200b is \u200ban extra layer of security \u2062used to\u2063 make sure that\u200c only authorized people can access a computer system \u2063or online account. It usually\u200d requires something you know, like a password,\u2064 plus something \u200cyou have,\u2064 like a phone or security token. MFA helps make \u2063sure\u2063 that your account is\u2063 safe and\u200c secure.<\/p>\n<p>Q: What is Multi-Factor Authentication (MFA) and why is it important?<\/p>\n<p>A: Multi-Factor Authentication (MFA) is a security process that requires more than one method of authentication to verify the user&#8217;s identity. This adds an extra layer of protection against security risks such as phishing attacks and security breaches. MFA typically combines something the user knows (like a password) with something the user has (like a mobile device) or something the user is (like a fingerprint or retina scan). This approach to identity verification enhances the level of security and reduces the risk of unauthorized access.<\/p>\n<p>(Source: https:\/\/www.pingidentity.com\/en\/learn\/multi-factor-authentication.html)<\/p>\n<p>Q: What are the different types of authentication factors used in Multi-Factor Authentication?<\/p>\n<p>A: Authentication factors can include something you know (like a password or security question), something you have (like a mobile device or hardware token), or something you are (like a biometric factor such as a fingerprint or retina scan). Multi-Factor Authentication solutions offer a wide range of authentication methods to ensure secure access and protect user identity.<\/p>\n<p>Q: How does risk-based authentication enhance security in Multi-Factor Authentication?<\/p>\n<p>A: Risk-based authentication is a form of adaptive authentication that evaluates contextual factors such as user behavior, location, and device trust to determine the risk level of each authentication attempt. This allows the system to apply additional security measures, such as an extra authentication step or biometric factors, when needed to mitigate potential risks and protect against cyber threats in real time.<\/p>\n<p>(Source: onespan.com)<\/p>\n<p>Q: What are some common Multi-Factor Authentication solutions available for businesses?<\/p>\n<p>A: Some common Multi-Factor Authentication solutions include Duo&#8217;s MFA, RSA SecurID Access, Google Authenticator, and OneSpan Mobile Authenticator. These solutions offer a range of authentication methods, from push notifications to time-based one-time passwords, to secure access to corporate accounts, cloud applications, and digital assets.<\/p>\n<p>Q: How does Adaptive Multi-Factor Authentication improve user experience and security?<\/p>\n<p>A: Adaptive Multi-Factor Authentication dynamically adjusts authentication policies based on contextual user data, providing a frictionless authentication experience for users while maintaining a high level of security. By incorporating factors such as location anomalies and real-time login requests, adaptive authentication solutions can effectively protect against cybersecurity threats and provide secure access to applications and digital experiences.<\/p>\n<p>(<a href=\"https:\/\/www.pingidentity.com\/en.html\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a>: entrust.com)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Conclusion: Secure your vulnerable\u2063 data with \u200cMulti Factor\u200c Authentication\u200c Services\u200d and\u200b make sure it is \u200ckept\u200c out of \u200bthe \u200bwrong hands! \u2064<a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> \u2064is \u2064a great solution\u200b that \u2063offers\u200b a\u2064 FREE account \u200dwith powerful security features\u200d to protect your information. Secure\u200c your data with a reliable \u200bMulti Factor Authentication Service like today and\u2064 don\u2019t let anyone \u200bcompromise your data. \u200bEnsure your data is\u200c kept safe \u200cand secure with LogMeOnce\u2019s powerful Multi \u200dFactor Authentication Services!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Are you looking for \u2063an effective way to keep your data and digital \u2064accounts safe? Multi Factor Authentication Services (MFAS) \u200bis\u200d the answer.\u2063 MFAS provides\u200c a \u2064layer of security\u2062 to \u2063your online accounts by requiring two-factor or multi-factor authentication. By adding an extra layer of security to a user\u2019s account, unauthorized access is made much [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2138,11641,1294,19815,5890,6926,11055,20528,781],"class_list":["post-70048","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-access","tag-services","tag-authentication","tag-factor","tag-identity","tag-management","tag-mfa","tag-multi","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=70048"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70048\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=70048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=70048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=70048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}