{"id":70680,"date":"2024-06-20T05:56:32","date_gmt":"2024-06-20T05:56:32","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/alternatives-to-multi-factor-authentication\/"},"modified":"2024-07-16T17:06:52","modified_gmt":"2024-07-16T17:06:52","slug":"alternatives-to-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/","title":{"rendered":"Alternatives To Multi Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2064Secure logins are a must\u200d for almost any\u2063 online service and Multi Factor Authentication (MFA) provides\u2064 an extra layer of security. \u200dHowever, not all online \u200bservices and businesses can support \u2062Multi Factor\u2063 Authentication, and for them, Alternatives To Multi Factor Authentication are \u2064necessary. Such\u2062 alternatives include\u2063 passwordless authentication, bio-metric \u200cauthentication, hardware\u200c tokens, and more. With cyber\u2064 threats on the \u200drise, it is important to understand the different Alternatives To Multi Factor \u2063Authentication, \u200dtheir pros\u200b and cons, and how each can help protect \u200bthe data and online\u2062 accounts of businesses and their customers \u2064from malicious\u200c attackers.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#1_What_is_Multi_%E2%80%8DFactor_%E2%80%8BAuthentication\" >1. What is Multi \u200dFactor \u200bAuthentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#2_Exploring_%E2%81%A2Alternatives%E2%80%8B_to_Multi_%E2%80%8DFactor_Authentication\" >2. Exploring \u2062Alternatives\u200b to Multi \u200dFactor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#3_Making_Sure_Your_Data_is_%E2%81%A2Secure%E2%80%8C_With_Alternative_Solutions\" >3. Making Sure Your Data is \u2062Secure\u200c With Alternative Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#4_Alternatives_to_Multi_Factor_Authentication%E2%81%A4_%E2%80%93_Is%E2%80%8D_It_Right_For_You\" >4. Alternatives to Multi Factor Authentication\u2064 \u2013 Is\u200d It Right For You?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#Alternatives_to_Multi_Factor_Authentication\" >Alternatives to Multi Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_is_Multi_%E2%80%8DFactor_%E2%80%8BAuthentication\"><\/span>1. What is Multi \u200dFactor \u200bAuthentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication (MFA) \u200bis an advanced security technique which requires one\u2064 or more verification steps to \u2062authenticate a user\u2019s identity. It is designed to provide a much higher level of \u200csecurity\u200d for digital accounts \u2062or systems than\u2063 is found in \u200c<a href=\"https:\/\/logmeonce.com\/zero-trust\/\">traditional password-based security systems<\/a>. MFA \u2063adds \u200ban extra layer \u2062of \u2064security to help ensure that only the person who\u200b is supposed to have \u200caccess to\u200b a specific account or system\u200b is granted that access.<\/p>\n<p>MFA includes a \u2063combination of at least two of the following authentication factors:<\/p>\n<ul>\n<li><strong>Knowledge:<\/strong> A secret \u200bthe user knows, like a PIN or password.<\/li>\n<li><strong>Possession:<\/strong> Something the \u2062user has in\u2062 their possession, like \u2062a \u2063hardware token or\u2062 an SMS text \u2062message.<\/li>\n<li><strong>Inheritance:<\/strong> Something rooted in the \u2062user, like a \u2062biometric identifier, such as \u200ca fingerprint or facial recognition.<\/li>\n<\/ul>\n<p>In combination, these authentication factors ensure that the only person who\u200c is \u2063authenticated is the legitimate user, even if other pieces of \u200cdata\u2062 have\u200d been\u2064 collected\u200c or \u2064stolen.<\/p>\n<h2 id=\"2-exploring-alternatives-to-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_Exploring_%E2%81%A2Alternatives%E2%80%8B_to_Multi_%E2%80%8DFactor_Authentication\"><\/span>2. Exploring \u2062Alternatives\u200b to Multi \u200dFactor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As the world rapidly advances,\u200d it\u2019s essential to have modern security methods to\u200c protect your valuable information. Multi factor \u2063authentication is one popular way\u200b to do this,\u2063 but there are\u2062 other options available. Here are\u2063 some of the\u200c alternatives to multi\u200d factor authentication that you may\u200c want \u2062to consider.<\/p>\n<ul>\n<li><strong>Biometric\u2062 Authentication:<\/strong> Biometric authentication adds\u200d an \u200cextra \u200blayer of security to logins and verifies users\u2019 identities through physical characteristics. \u200cThese \u2064could include fingerprint scanners, voice recognition, facial recognition, and even\u200d retinal scans.<\/li>\n<li><strong>One Time Passwords:<\/strong> One-time\u2063 passwords (OTPs) are single-use codes used to confirm a user\u2019s identity.\u200c The OTP is \u200dsent to the user\u2019s phone through SMS \u2062or\u2063 email and is only valid for a\u200c limited\u200c period of time.<\/li>\n<li><strong>Security \u200dQuestions:<\/strong> Security questions provide another layer of security when logging into online accounts. These \u200cquestions usually require information that\u200b only the actual user would know, \u200csuch as where they \u2064grew up or\u200c their mother\u2019s maiden name.<\/li>\n<\/ul>\n<p>These authentication\u2063 methods can easily be combined to match\u200c your security needs while\u200b also increasing the overall security of the system. Whichever \u2063method \u200dyou \u2064choose, make sure to update it regularly\u200d to\u2062 stay protected from any\u2064 malicious activities!<\/p>\n<h2 id=\"3-making-sure-your-data-is-secure-with-alternative-solutions\"><span class=\"ez-toc-section\" id=\"3_Making_Sure_Your_Data_is_%E2%81%A2Secure%E2%80%8C_With_Alternative_Solutions\"><\/span>3. Making Sure Your Data is \u2062Secure\u200c With Alternative Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In this\u200b digital age,\u2063 data security is more important than ever.\u200c With the increase in data breaches\u2062 and cyber-attacks, it\u2019s essential for businesses\u2063 and individuals \u2064to invest in the safety\u200d of their information. While digital \u200dencryption\u2063 and traditional security \u2063practices are essential, there are several alternative technologies that can help guarantee \u200cthe safety\u2064 of\u200b valuable data.<\/p>\n<p>When it comes to data security it\u2019s best to have layers of protection:<\/p>\n<ul>\n<li><b>Cloud Encryption:<\/b> The cloud is a powerful tool and can be used to protect sensitive information. Cloud encryption \u200dtakes data \u2063stored on a public cloud and encodes it to prevent malicious \u200dintent.<\/li>\n<li><b>Multi-factor Authentication:<\/b> This\u200d security measure requires the \u200cuser to verify their identity using multiple points. This <a title=\"Alternatives To Multi Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/alternatives-to-multi-factor-authentication\/\">system requires additional \u2063steps<\/a> for the user\u2063 to access any data or accounts that\u200c are protected.<\/li>\n<li><b>Zero-Knowledge Proofs:<\/b> This \u200ctechnology allows users to report they have\u200d proof \u2064of certain\u2063 data without\u2063 actually revealing the\u2064 data itself. This ensures the proof \u200cis not exposed to potential\u2063 harm or \u2063abuse.\u200b<\/li>\n<\/ul>\n<p>These are \u2062just a few \u200calternative \u200csolutions that can aid in making sure\u200d data is secure.<\/p>\n<h2 id=\"4-alternatives-to-multi-factor-authentication-is-it-right-for-you\"><span class=\"ez-toc-section\" id=\"4_Alternatives_to_Multi_Factor_Authentication%E2%81%A4_%E2%80%93_Is%E2%80%8D_It_Right_For_You\"><\/span>4. Alternatives to Multi Factor Authentication\u2064 \u2013 Is\u200d It Right For You?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you\u2019re looking for alternatives\u2064 to multi factor authentication, there are \u200dplenty of options for you. Depending on your budget, security requirements\u200d and user\u2064 experience, \u2064you may want to consider the following:\u2062<\/p>\n<ul>\n<li><strong>Single Sign-on Authentication<\/strong>: \u2064This is an authentication\u2063 approach that allows \u2063users \u2063to\u2064 sign in with a\u200d single set\u2063 of credentials across multiple applications. This is a cost-effective and \u200duser-friendly solution for many businesses.<\/li>\n<li><strong>Two-Factor Authentication<\/strong>: Also known \u2062as\u200c 2FA, this authentication system \u2064requires users to present\u2062 two \u2064pieces of evidence or\u2064 factors for\u200d identity verification. \u200bThis is a more secure approach than single sign-on, and should be considered for businesses with higher security needs.<\/li>\n<li><strong>Passwordless Authentication<\/strong>: This\u200d authentication method\u200c eliminates the need for passwords,\u200c relying instead\u200b on other form of credentials, including\u200c biometrics, SMS, push notifications,\u2063 etc. This is a \u2064secure and\u200c cost-effective \u200doption, but \u200bmay be \u2063less user-friendly\u200c than other authentication solutions.<\/li>\n<\/ul>\n<p>Regardless of which authentication\u2064 system you choose, it\u2019s important to ensure that it meets your security needs and is easy\u200c to \u2063use. \u200cIt\u2019s also important to regularly review and update\u200d your \u200cauthentication system to stay \u2064ahead of potential security threats. Taking the\u200d right \u200dsteps to secure your business \u2063can help reduce\u200d the risk of cyber\u200d attack and protect your valuable data.<\/p>\n<p>Multi-factor authentication (MFA) is a widely used method of <a href=\"https:\/\/asana.com\/resources\/three-concepts-managing-remotely\" target=\"_blank\" rel=\"noopener nofollow\">authentication<\/a> that requires users to provide multiple forms of identification to access their accounts or networks. While traditional MFA methods typically involve using a combination of passwords and one-time passcodes via mobile devices or authenticator apps, there are several alternative authentication methods available. Some of these alternatives include biometrics-based authentication factors such as fingerprint or facial recognition, physical authentication tokens, and risk-based authentication that evaluates the level of security based on various factors such as user behavior or location. Additionally, passwordless solutions, such as the use of biometric factors or hardware security keys, offer more secure and seamless authentication options. These alternative methods provide a layered approach to security and are being increasingly adopted by organizations looking to enhance their security protocols.<\/p>\n<p>In today&#8217;s digital age, the need for secure authentication methods to protect our online accounts and sensitive information is more important than ever. While Multi-Factor Authentication (MFA) has been a popular choice for adding an extra layer of security to login credentials, there are alternative methods that can provide a similar level of protection. One such method is using mobile devices and Authenticator apps as a form of authentication.<\/p>\n<p>Authenticator apps like Google Authenticator and LogMeOnce Authenticator generate one-time passcodes that are used as an additional layer of security when logging into accounts. These apps can be installed on a user&#8217;s primary device, such as a smartphone or tablet, making it a convenient and secure way to access accounts. By using a combination of something the user knows (their password) and something they have (their smartphone with the Authenticator app), this method provides a secure authentication process without the need for physical devices or hardware tokens.<\/p>\n<p>Another alternative to Multi-Factor Authentication is the use of biometric authentication factors, such as fingerprint or facial recognition technology. These biometric factors can be used as a form of authentication to verify a user&#8217;s identity without the need for traditional passwords or physical devices. By analyzing unique physical features like typing patterns, mouse movements, or even facial features, biometric authentication provides a secure and user-friendly way to access accounts and networks.<\/p>\n<p>Biometric authentication factors can be especially beneficial for industries like financial services or online banking, where security is of utmost importance. By utilizing biometric logins, organizations can ensure that only authorized users are granted access to sensitive information, reducing the risk of unauthorized access or malicious intent. Additionally, biometric authentication factors offer a seamless and convenient user experience, making it a promising alternative to traditional password-based authentication methods.<\/p>\n<p>One of the most effective alternatives to Multi-Factor Authentication is risk-based authentication, which assesses the level of security needed for a particular login attempt based on various factors. This method takes into account the user&#8217;s behavior, device information, and access location to determine the level of risk associated with a login attempt. By analyzing this information, organizations can adapt their authentication procedures to ensure the highest level of security for each individual login.<\/p>\n<p>Risk-based authentication can be customized to fit the specific needs of an organization, offering a flexible and adaptive approach to security. By incorporating additional features like time-based one-time passwords or recovery codes, organizations can further enhance the security of their authentication process. This layered approach to security not only improves the user experience but also ensures that sensitive information remains protected from unauthorized access.<\/p>\n<p>While Multi-Factor Authentication has been a go-to authentication standard for many organizations, alternative methods like mobile devices, biometric factors, and risk-based authentication offer promising alternatives that can enhance security measures and improve the user experience. By taking advantage of these secure authentication methods, organizations can protect their online accounts, networks, and sensitive information from unauthorized access and malicious intent. As forward-thinking product managers and security professionals continue to explore new authentication frameworks and technologies, the intersection of technology and security will only continue to evolve, providing more secure and convenient options for authentication in nature.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Alternatives_to_Multi_Factor_Authentication\"><\/span>Alternatives to Multi Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Mobile Device &amp; Authenticator Apps<\/td>\n<td>An additional layer of security with one-time passcodes generated on a smartphone<\/td>\n<\/tr>\n<tr>\n<td>Biometric Authentication<\/td>\n<td>Verifies user&#8217;s identity through physical characteristics like fingerprints or facial recognition<\/td>\n<\/tr>\n<tr>\n<td>Risk-Based Authentication<\/td>\n<td>Assesses security level based on user behavior, device info, and access location<\/td>\n<\/tr>\n<tr>\n<td>Cloud Encryption<\/td>\n<td>Protects sensitive data stored on a public cloud by encoding it<\/td>\n<\/tr>\n<tr>\n<td>Single Sign-on Authentication<\/td>\n<td>Allows users to sign in with a single set of credentials across multiple applications<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Multi \u200cFactor Authentication?<br \/>\nA:\u2064 Multi\u2064 Factor Authentication \u200c(MFA) is a way to add an \u2062extra layer of security to verify a \u200buser\u2019s identity when they access an app or system. It combines something you\u200c know, like a password, with something\u200d you have, like a phone\u200c or security token.<\/p>\n<p>Q: What are some alternatives to Multi-Factor Authentication (MFA)?<br \/>\nA: Some alternatives to Multi-Factor Authentication include Authenticator apps, physical authentication tokens, biometrics-based authentication factors, password managers, hardware devices, Risk-based authentication, and passwordless solutions.<\/p>\n<p>Q: How do Authenticator apps work as an alternative to MFA?<br \/>\nA: Authenticator apps generate one-time passcodes on a user&#8217;s smart device, providing an additional layer of security for accessing accounts and networks. Popular Authenticator apps include Google Authenticator and LogMeOnce Authenticator.<\/p>\n<p>Q: What are some advantages of using biometrics-based authentication factors?<br \/>\nA: Biometrics-based authentication factors use unique physical features of users such as typing patterns, mouse movements, and biometric information like fingerprints or facial recognition to verify user identity, offering a high level of security against unauthorized access.<\/p>\n<p>Q: How does Risk-based authentication enhance security in comparison to traditional methods?<br \/>\nA: Risk-based authentication evaluates various factors such as login times, user location, and device used for access to assess the level of risk in real-time, allowing for a more adaptive and secure authentication process.<\/p>\n<p>Q: What is the significance of a layered approach to security when considering authentication?<br \/>\nA: A layered approach to security involves combining different authentication methods and technologies, such as biometrics, passwords, and physical authentication tokens, to create a more robust and secure authentication framework.<\/p>\n<p>Q: How can businesses benefit from using alternative authentication methods besides traditional password-based authentication?<br \/>\nA: Alternative authentication methods like biometrics, hardware devices, and Risk-based authentication help businesses reduce the risk of unauthorized access, improve user experience, and enhance overall security in the face of evolving cyber threats.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In summary, if you&#8217;re exploring alternatives to multi-factor authentication, consider creating a free <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account. Switching to LogMeOnce for enhanced security is an excellent choice for those prioritizing authentication methods. With LogMeOnce, you gain comprehensive security features hassle-free.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Explore effective alternatives to Multi Factor Authentication with ease. Simplify your security using Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring by signing up for a FREE LogMeOnce account. Discover the best solutions for protecting your accounts today.<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[6588,19795,12803,20847,19822],"class_list":["post-70680","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-biometrics","tag-factor-authentication","tag-passwordless-authentication","tag-token-based-authentication","tag-two-step-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=70680"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70680\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=70680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=70680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=70680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}