{"id":71600,"date":"2024-06-20T09:52:14","date_gmt":"2024-06-20T09:52:14","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/remote-desktop-2fa\/"},"modified":"2024-08-05T17:21:36","modified_gmt":"2024-08-05T17:21:36","slug":"remote-desktop-2fa","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/","title":{"rendered":"Remote Desktop 2FA"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Are you having difficulties accessing your\u2062 remote desktop? If so, Remote\u200d Desktop 2FA \u2064(Two Factor Authentication) might be your best\u2063 bet to ensure secure remote access. This two-step security process\u2062 is becoming increasingly popular\u200d method to protect \u200dconfidential information. \u2064A Remote\u200c Desktop 2FA consists of \u200ctwo \u2062separate \u2062authentication methods working together to verify user identity. It can \u2064be used \u2063in combination with other authentication methods, such as\u200d passwords or security keys. This article will explore\u200b the importance of two-factor authentication\u200d for remote \u200bdesktop access, and provide practical advice on \u200csetting up and using \u200cRemote Desktop\u2064 2FA.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#1_Keep%E2%81%A3_Your_Remote_Desktop_Secure_with%E2%81%A4_Two-Factor%E2%81%A2_Authentication\" >1. Keep\u2063 Your Remote Desktop Secure with\u2064 Two-Factor\u2062 Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#2_How_to_Enable%E2%81%A4_2FA_on%E2%81%A4_Your%E2%81%A2_Remote_Desktop\" >2. How to Enable\u2064 2FA on\u2064 Your\u2062 Remote Desktop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#3_Protecting_Your_Remote_Desktop_from_Unauthorized_Access\" >3. Protecting Your Remote Desktop from Unauthorized Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#4_Enjoy_%E2%80%8BMore_Secure_Remote_Access_with_Two-Factor_Authentication\" >4. Enjoy \u200bMore Secure Remote Access with Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#Benefits_of_Remote_Desktop_2FA\" >Benefits of Remote Desktop 2FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/remote-desktop-2fa\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-keep-your-remote-desktop-secure-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Keep%E2%81%A3_Your_Remote_Desktop_Secure_with%E2%81%A4_Two-Factor%E2%81%A2_Authentication\"><\/span>1. Keep\u2063 Your Remote Desktop Secure with\u2064 Two-Factor\u2062 Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In the age of digital \u2063everything, one of\u200d the ways to protect your\u2064 network \u2062is to implement \u200dtwo-factor authentication in your remote desktop (RDP)\u2062 setup. Two-factor authentication (2FA) adds an extra layer of security to your RDP sessions. With 2FA, you can\u2062 rest assured that no one can access the data stored on \u200byour RDP session \u200dwithout your \u200dpermission.<\/p>\n<p>Here are\u2062 some of the \u200bkey ways \u200c2FA \u200chelps keep your remote desktop secure:<\/p>\n<ul>\n<li><strong>It requires\u200c an \u2062extra \u2064step for authentication.<\/strong> \u200d 2FA generally involves \u200cconfirming your identity through a combination \u2063of two different pieces of \u200dinformation. This\u2064 is usually a password and\u200d a \u200btemporary authentication code that is sent to \u2062a\u2063 device you\u2019ve already\u200d confirmed.<\/li>\n<li><strong>It confirms \u200cidentity.<\/strong> 2FA \u200censures that only you or someone you \u2064have\u200d authorized can access your \u200ddata. This\u2064 means that even if someone\u2062 did manage to gain \u200caccess\u2064 to your password, they wouldn\u2019t be able to get into your RDP session.<\/li>\n<li><strong>It protects your data.<\/strong> 2FA makes it harder for someone to gain access to your data without your \u200bpermission. Plus, it\u2062 is \u2064an easy way to secure your RDP session\u2064 without\u200c sacrificing \u2064performance or convenience.<\/li>\n<\/ul>\n<p>By \u200cimplementing two-factor authentication in your RDP setup, you can help ensure that your data\u200c and network are more secure. It is a simple and effective way to add an \u2064extra \u200blayer of protection to your RDP sessions.<\/p>\n<h2 id=\"2-how-to-enable-2fa-on-your-remote-desktop\"><span class=\"ez-toc-section\" id=\"2_How_to_Enable%E2%81%A4_2FA_on%E2%81%A4_Your%E2%81%A2_Remote_Desktop\"><\/span>2. How to Enable\u2064 2FA on\u2064 Your\u2062 Remote Desktop<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Enabling two-factor authentication (2FA) \u200dfor a remote desktop is a great way to\u2062 protect your \u2064access from unauthorised users.\u200c Not \u200donly does it\u200d help secure information, but \u2063it also helps you be \u2063more productive, \u200band secure\u200c peace of mind.<\/p>\n<p>The following\u200b are \u2062steps to enable 2FA \u2064on\u2063 your remote\u200c desktop:<\/p>\n<ul>\n<li><b>Download a two-factor authentication (2FA) app.<\/b> Before \u2063anything else, you \u200cshould get \u200ca \u2062two-factor authentication (2FA) app\u2062 such as Google Authenticator.\u200c Make sure that it has been downloaded and is \u200cready to \u2064be used.<\/li>\n<li><b>Enable 2FA in your remote \u2063desktop settings.<\/b> Access your\u200c remote desktop\u2019s settings and look \u200bfor the two-factor authentication (2FA) \u2064settings. If it \u2062is available, enable it and follow the instructions.<\/li>\n<li><b>Configure your 2FA app.<\/b> \u2063Once\u2063 2FA is \u2063enabled, use your 2FA app to configure \u200dit.\u200b Follow the instructions within\u200b the app so \u200dthat it \u2064can be linked with the remote\u200d desktop.<\/li>\n<li><b>Test your 2FA.<\/b> Test \u200bout your 2FA by logging \u2064into the remote desktop \u2013 \u200bor if you already set it up, by trying to login with a different device. Verify that 2FA is working properly.<\/li>\n<\/ul>\n<p>By following\u2064 the above steps, you will be able to \u2064securely enable two-factor authentication (2FA) for\u200d your\u200c remote desktop. As an added\u2062 layer of security, this \u200bcan protect you and your data from any malicious activities.<\/p>\n<h2 id=\"3-protecting-your-remote-desktop-from-unauthorized-access\"><span class=\"ez-toc-section\" id=\"3_Protecting_Your_Remote_Desktop_from_Unauthorized_Access\"><\/span>3. Protecting Your Remote Desktop from Unauthorized Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Securing a \u2064Remote Desktop Server<\/b><\/p>\n<p>Locking down unauthorized access to \u2064a system always needs to be the top\u200b priority for \u2063any administrator, especially in \u200ca remote desktop environment. Here are three essential steps \u2062to ensure a \u2064remote desktop is \u2064secure:<\/p>\n<ul>\n<li>Enforce strong passwords: Make sure passwords are at \u2063least 8 characters and contain a mix of uppercase and lower letters, numbers, and special characters.<\/li>\n<li>Disable App \u200bSharing: Prevent users from sharing applications by modifying \u200cthe <a href=\"https:\/\/logmeonce.com\/team-password-manager\/\">terminals services group policy<\/a>.<\/li>\n<li>Use Multi-factor Authentication: \u200bInclude \u200cadditional security measures such as biometrics, or \u200cuse \u200dSSO \u2064(single sign-on) protocols to provide\u2064 an extra\u2062 layer of authentication.<\/li>\n<\/ul>\n<p>Secure\u200c encryption\u200b standards are \u200balso\u2063 essential in protecting data exchanges, including TLS, SSH, and IPsec. \u200cThese protocols \u200bencrypt data during transmission, preventing\u2063 eavesdroppers from monitoring\u2063 communications. Additionally, you should disable any unnecessary features on the remote desktop server \u2064to minimize attack surfaces. This includes uninstalling applications\u200c and services that are not necessary for the\u2063 server\u200b to operate. By following these recommendations, you can protect your\u2064 Remote Desktop from unauthorized\u2063 access.<\/p>\n<h2 id=\"4-enjoy-more-secure-remote-access-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_Enjoy_%E2%80%8BMore_Secure_Remote_Access_with_Two-Factor_Authentication\"><\/span>4. Enjoy \u200bMore Secure Remote Access with Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to security, two-factor authentication is one of\u200c the best extra layers of protection you can have. This security solution is\u200c a great\u200c way to ensure that your remote access \u200cis \u2063more secure and can help reduce\u2064 the chances\u200c of unwanted activity. \u2063Here are some of the benefits of\u200c two-factor authentication:<\/p>\n<ul>\n<li><strong>Enhanced security<\/strong>: Two-factor authentication gives\u2062 your remote access an extra layer of security, making it more difficult for criminals to gain access to your data.<\/li>\n<li><strong>Greater convenience<\/strong>: Using two-factor\u200b authentication\u2064 eliminates the need for\u2064 multiple passwords or keys. You can easily log in with one authentication code and gain \u2062access to your home or business \u200bfrom wherever you are.<\/li>\n<li><strong>More\u2064 reliable authentication<\/strong>:\u2064 With two-factor\u2062 authentication,\u2064 your access codes\u200d are generated \u200cusing random\u200d number generators that are virtually impossible\u2062 to guess. This ensures that only\u2062 authorized personnel can access \u200dyour data.<\/li>\n<\/ul>\n<p>Two-factor authentication is also \u200cvery \u200dsimple to use. It \u200crequires no additional hardware or software, and you \u2064don\u2019t\u2063 have to remember complex passwords. All you need to \u2063do is enter in the unique authentication code that you receive via\u2062 SMS \u2063or\u200d email to access\u200b your\u200d account. This\u200b makes it much\u2064 easier \u2063to securely access your data from any device, anywhere in the\u200c world.<\/p>\n<p>Remote Desktop 2FA, or Remote Desktop Two-Factor Authentication, is a security process that adds an extra layer of protection to remote access to desktop services. This method requires users to provide two different authentication factors before gaining access to the system. Common factors include passwords, smart cards, or biometric data. With the rise of remote work and the increasing reliance on mobile devices, implementing 2FA has become crucial to secure access.<\/p>\n<p>Popular 2FA solutions like Duo Authentication offer additional security measures such as push notifications and time-sensitive authentication codes for an added layer of protection. By integrating 2FA with Remote Desktop Services, organizations can ensure secure access for remote users and safeguard against major security risks. With detailed configuration options and straightforward steps, Remote Desktop 2FA provides a powerful way to enhance security for enterprises operating across multiple server operating systems and devices. Sources: Duo Security, Rublon Multi-Factor Authentication.<\/p>\n<p>Remote Desktop 2FA, also known as Remote Desktop Two-Factor Authentication, is a vital security measure that adds an extra layer of protection to Remote Desktop Services, ensuring secure access to server operating systems and desktop connections. With the increasing number of remote users and the rise of mobile devices in the workplace, it has become crucial to implement 2FA to prevent unauthorized access and protect sensitive information. One popular method of 2FA is using Duo Authentication, a trusted provider that offers multifactor authentication solutions for enhanced security.<\/p>\n<p><a href=\"https:\/\/help.duo.com\/s\/article\/8187\" target=\"_blank\" rel=\"noopener nofollow\">Duo Authentication<\/a> provides a seamless and user-friendly experience by offering multiple authentication factors such as Duo Push, Mobile Push, and One-Time Passwords. By enabling 2-Factor Authentication for Remote Desktop Gateway, users are required to verify their identity through a second-factor authentication method, such as a push notification on their mobile device, before gaining access to the remote desktop. This additional layer of security significantly reduces the risk of unauthorized access and protects against potential security threats.<\/p>\n<p>To implement Remote Desktop 2FA with Duo Authentication, detailed instructions are provided to guide users through the configuration process. Users can download the Duo Mobile app on their mobile devices and follow step-by-step instructions to complete the setup. By integrating Duo two-factor authentication into Remote Desktop Services, users can rest assured that their login credentials are protected by multiple layers of security.<\/p>\n<p>One of the key benefits of using Duo Authentication for Remote Desktop 2FA is the phishing-resistant nature of the authentication prompts. Duo&#8217;s cloud service ensures that authentication requests are legitimate and secure, providing peace of mind for users accessing remote connections. With Duo 2FA, remote workers can securely log in to their remote sessions and perform their tasks without worrying about major security risks or unauthorized access.<\/p>\n<p>In addition to Duo Authentication, other third-party authentication providers such as Rublon Multi-Factor Authentication and Azure MFA offer advanced security features for remote desktop connections. These providers offer a range of authenticators, including hardware tokens and time-based OTP Authenticator apps, to enhance the security of remote access. By choosing the right authentication provider and following the detailed instructions for configuration, users can protect their remote connections and ensure a secure user experience.<\/p>\n<p>Overall, implementing Remote Desktop 2FA with Duo Authentication provides a powerful way to secure remote desktop connections and protect sensitive information from unauthorized access. By adding an extra layer of security through multifactor authentication, users can mitigate the risks associated with remote access and ensure that their data remains protected. With detailed instructions and a user-friendly experience, Remote Desktop 2FA with Duo Authentication is an essential security measure for modern software teams and remote workers.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Remote_Desktop_2FA\"><\/span>Benefits of Remote Desktop 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefits<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Provides an extra layer of protection for remote access, making it harder for unauthorized users to gain entry.<\/td>\n<\/tr>\n<tr>\n<td>Greater Convenience<\/td>\n<td>Eliminates the need for multiple passwords or keys, allowing easy logins for users.<\/td>\n<\/tr>\n<tr>\n<td>More Reliable Authentication<\/td>\n<td>Generates secure access codes that are virtually impossible to guess, ensuring only authorized personnel can access data.<\/td>\n<\/tr>\n<tr>\n<td>Phishing Resistance<\/td>\n<td>Authentication prompts are resistant to phishing attacks, providing secure verification for users.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Remote Desktop 2FA?<br \/>\nA: Remote Desktop 2FA, or Remote Desktop 2-Factor Authentication, adds an extra layer of security to the Remote Desktop Services by requiring users to provide two forms of authentication before accessing the server operating systems remotely. This can help prevent unauthorized access and protect sensitive data.<\/p>\n<p>Q: How does Remote Desktop 2FA work with Active Directory?<br \/>\nA: Remote Desktop 2FA can be integrated with Active Directory, allowing for seamless authentication using domain credentials. Users can log in to the remote desktop gateway using their Active Directory credentials and then complete the second factor of authentication using a mobile device or hardware token.<\/p>\n<p>Q: What are some common forms of authentication used in Remote Desktop 2FA?<br \/>\nA: Common forms of authentication used in Remote Desktop 2FA include Duo Authentication, smart cards, Duo Push notifications, One-Time Passwords (OTPs), Time-Based One-Time Passwords (TOTPs), and FIDO security keys.<\/p>\n<p>Q: How do remote users benefit from Remote Desktop 2FA?<br \/>\nA: Remote users benefit from Remote Desktop 2FA by having an additional layer of security when accessing remote desktop connections. This helps protect their sensitive data and ensures a secure access experience.<\/p>\n<p>Q: What are some major security risks that Remote Desktop 2FA mitigates?<br \/>\nA: Remote Desktop 2FA helps mitigate major security risks such as unauthorized access by requiring an additional authentication factor, phishing attacks by using time-sensitive authentication codes, and ensuring secure access for remote workers with multifactor authentication.<\/p>\n<p>Q: How can organizations implement Remote Desktop 2FA for secure access?<br \/>\nA: Organizations can implement Remote Desktop 2FA by following step-by-step instructions provided by authentication providers such as Duo Security, Rublon Multi-Factor Authentication, and Okta MFA Credential Provider. This ensures successful two-factor authentication for remote connections.<br \/>\n(Source: Duo Security)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The best way to protect Remote Desktop \u200dfrom\u200c unauthorized access and malicious activity is to utilize two-factor authentication for Remote Desktop. Use \u2062LogMeOnce to create a powerful and \u200bFREE account for greater security with two-factor authentication for\u2062 Remote Desktop. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> makes it effortless to use Remote Desktop 2FA to secure your digital data and protect\u2063 your assets from \u200dunapproved access. \u2064Get the most \u2062out of your \u2064Remote Desktop security by signing up for a FREE LogMeOnce account today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Are you having difficulties accessing your\u2062 remote desktop? If so, Remote\u200d Desktop 2FA \u2064(Two Factor Authentication) might be your best\u2063 bet to ensure secure remote access. This two-step security process\u2062 is becoming increasingly popular\u200d method to protect \u200dconfidential information. \u2064A Remote\u200c Desktop 2FA consists of \u200ctwo \u2062separate \u2062authentication methods working together to verify user identity. [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1149,1294,1740,8166,7594,6898,1788],"class_list":["post-71600","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-2fa","tag-authentication","tag-cyber-security","tag-desktop","tag-remote","tag-remote-working","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=71600"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71600\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=71600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=71600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=71600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}