{"id":71938,"date":"2024-06-20T11:52:11","date_gmt":"2024-06-20T11:52:11","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/active-directory-multi-factor-authentication\/"},"modified":"2024-08-07T18:41:55","modified_gmt":"2024-08-07T18:41:55","slug":"active-directory-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/","title":{"rendered":"Active Directory Multi Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2064Active Directory \u200dMulti Factor Authentication (MFA) \u2064is the latest \u2062security measure \u2064that businesses are turning to for protecting their confidential data and systems. It is an advanced security system that requires authentication\u2063 from two or more independent sources before \u200cgranting access to a network or \u200cwebsite. Traditional passwords\u200c and\u200b physical keys are no longer enough to protect data from\u200d hackers, so businesses must now deploy \u200bmultifactorial authentication systems. MFA adds an extra layer of protection \u200cby utilizing multiple authentication methods such as \u200cSMS, telephone, hardware tokens, or \u200bbiometrics. This added\u200d security helps\u2062 protect businesses \u200dfrom cyber-attacks and data breaches. \u2062Utilizing Active Directory Multi \u200cFactor Authentication can go a long way in\u2062 protecting \u2064sensitive data and the technology involved for businesses.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#1_Unlocking%E2%80%8D_the_Power_%E2%80%8Dof_%E2%81%A4Active_Directory_Multi-Factor_Authentication\" >1. Unlocking\u200d the Power \u200dof \u2064Active Directory Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#2%E2%80%8B_Strengthening_Your_Network_Security_with_MFA\" >2.\u200b Strengthening Your Network Security with MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#3_%E2%81%A4Improving_User_%E2%80%8BConvenience_and_Security_with_AD_MFA\" >3. \u2064Improving User \u200bConvenience and Security with AD MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#4_%E2%80%8DReaping_the_Benefits_of_Active_Directory_Multi-Factor_Authentication\" >4. \u200dReaping the Benefits of Active Directory Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#Benefits_of_Active_Directory_Multi-Factor_Authentication\" >Benefits of Active Directory Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlocking-the-power-of-active-directory-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Unlocking%E2%80%8D_the_Power_%E2%80%8Dof_%E2%81%A4Active_Directory_Multi-Factor_Authentication\"><\/span>1. Unlocking\u200d the Power \u200dof \u2064Active Directory Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Secure\u200d Your IT Infrastructure \u2063with Multi-factor Authentication<\/b><\/p>\n<p>Nowadays, most businesses\u200b rely heavily on IT infrastructure\u200d to run their\u2063 operations smoothly.\u2063 But \u2064many of these systems are vulnerable to\u2063 external\u200c attacks from cyber-criminals. To\u2064 protect your IT \u2063infrastructure, you must incorporate\u200d a \u200b<a href=\"https:\/\/logmeonce.com\/how-secure-is-logmeonce\/\">multi-factor authentication<\/a><a href=\"https:\/\/logmeonce.com\/free-mobile-security\/\"> system<\/a> into your active directory environment. Multi-factor authentication (MFA) uses \u200cmultiple pieces \u2064of evidence to prove \u2062who you are, boosting\u2063 the security of your systems.<\/p>\n<p>MFA is a comprehensive solution for authentication\u2064 security and comes with several advantages. It not only requires user authentication\u2062 every time \u200cthey \u2063sign in, but also verifies that\u2064 the user is\u200b the same person each time. It can also be used to set up unique access policies. For example,\u200d you can set up a policy that requires two-factor authentication when \u200cusers\u200d attempt to view sensitive\u2063 data. Additionally,\u200b MFA can be used\u2062 to detect suspicious activity and unauthorized \u2064access \u200cattempts\u200c to your systems. This added layer of security can protect your\u2063 organization from potential\u2063 data breaches and security threats.<\/p>\n<h2 id=\"2-strengthening-your-network-security-with-mfa\"><span class=\"ez-toc-section\" id=\"2%E2%80%8B_Strengthening_Your_Network_Security_with_MFA\"><\/span>2.\u200b Strengthening Your Network Security with MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>How Multifactor Authentication Works<\/b><\/p>\n<p>The core goal of multifactor authentication (MFA) is to make sure that only \u200byou can access your network\u2014no one else. To \u2064do this,\u200c MFA systems have two or\u2062 more methods for verifying your identity, such \u2063as a \u2062password, a \u200dcode sent \u2063to your phone, \u2064a \u2063biometric, \u200bor a hardware token. Each \u200clayer of \u2063security makes it harder for a hacker or intruder to access your network.<\/p>\n<p><b>MFA\u2019s Benefits for Your Security<\/b><\/p>\n<p>MFA \u200bis an\u2064 important \u2063part of any effective\u2062 security system. \u2063Having multiple steps for\u200b authentication \u200cmeans that an intruder is much less likely \u2062to be \u200dable to gain access, \u200bbecause they need to \u2063know multiple pieces of information. This means it\u2019s \u2063easier \u2062to\u200d detect \u2062suspicious activity and \u2064block any potential threats before \u200dthey can\u200c do \u200cdamage.\u2062 And as \u200dan added bonus, using MFA\u2064 can greatly reduce the likelihood of identity theft or fraud \u200don your network.<\/p>\n<ul>\n<li>MFA uses two or more methods for verifying your identity.<\/li>\n<li>MFA greatly reduces the likelihood of identity theft and fraud.<\/li>\n<li>MFA\u2063 makes \u2064it easier to detect potential threats before they can do damage.<\/li>\n<\/ul>\n<h2 id=\"3-improving-user-convenience-and-security-with-ad-mfa\"><span class=\"ez-toc-section\" id=\"3_%E2%81%A4Improving_User_%E2%80%8BConvenience_and_Security_with_AD_MFA\"><\/span>3. \u2064Improving User \u200bConvenience and Security with AD MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In the age of \u200bdigital transformation, ensuring user convenience and security is key. One way to do this is \u2062to \u200dadopt Multi-Factor Authentication (MFA) for online\u200b accounts, such as banking applications\u200d or social media. \u2062AD MFA is an approach to authentication\u2064 which helps provide improved convenience and security.<\/p>\n<p>AD MFA \u200crequires \u2062that users provide two or more pieces of evidence, commonly \u200dreferred to as factors, usually a combination \u2064of something the user knows (like a password),\u2062 something they have (like a smartphone\u2064 or token), and\/or something they are (like a biometric feature). This\u200d <a title=\"Active Directory Multi Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/active-directory-multi-factor-authentication\/\">strong authentication method increases user \u2063security<\/a>, without compromising \u2064on convenience. Using AD MFA, users can:<\/p>\n<ul>\n<li><strong>Verify their\u200b identity\u200d quickly\u2063 and securely<\/strong><\/li>\n<li><strong>Enable single sign-on to\u2064 multiple applications<\/strong><\/li>\n<li><strong>Receive notifications for suspicious activity<\/strong><\/li>\n<\/ul>\n<p>AD MFA\u2062 offers\u2063 users the peace of mind that their digital identity is\u200b secure and safeguarded. By providing a secure authentication process for online accounts, AD MFA ensures increased user convenience and\u2064 security.<\/p>\n<h2 id=\"4-reaping-the-benefits-of-active-directory-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_%E2%80%8DReaping_the_Benefits_of_Active_Directory_Multi-Factor_Authentication\"><\/span>4. \u200dReaping the Benefits of Active Directory Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Secure Access \u2064to Data \u2064 <\/b><br \/>\nActive Directory Multi-Factor \u2064Authentication (AD MFA) offers an additional layer\u2063 of\u2062 security to\u2064 protect access\u2062 to data and \u200dsystems. When enabled, it requires identity authentication with two \u2064or more \u200cunique\u200b credentials. Depending on the user\u2019s privileges, this\u200d can include \u2062combinations of passwords, PINs, biometrics, \u2062physical \u200dtokens\u200d and smart cards.<\/p>\n<p><b>Multiple Benefits for Your Organization <\/b><br \/>\nAD \u2064MFA delivers multiple benefits to businesses of \u200dall sizes:<\/p>\n<ul>\n<li>Enhanced security:\u200c It adds\u2064 another layer\u200c of authentication that reduces the risk of a data breach or malicious\u2063 attack by requiring users to verify their identity with\u200d multiple sources.<\/li>\n<li>Improved usability: Users can use\u200b their existing \u200ccredentials along with AD MFA to instantly access the resources they \u2063need.<\/li>\n<li>Reduced\u2062 costs: By preventing unauthorized access to the system, AD MFA reduces businesses\u2019 costs \u200cassociated with cyber breaches and other security \u2062incidents.<\/li>\n<\/ul>\n<p>AD MFA can \u2064also help organizations comply with industry\u2062 regulations related to data security and \u200bprivacy.<\/p>\n<p>Multi-factor authentication (MFA) has become a critical component of access management in corporate networks, especially as employees increasingly use mobile devices to access resources. Unified endpoint management solutions provide a method of authentication that goes beyond just a username and password, requiring secondary authentication through additional methods such as software tokens or Azure Active Directory. This hybrid solution allows for secure access to cloud platforms while maintaining control over user accounts and credentials. However, implementing MFA may come with additional costs, such as mobile device management or an all-in-one DNS management service, so cost management is essential.<\/p>\n<p>As organizations strive to strengthen their security posture, they turn to MFA to enhance privileged access security and protect against security threats. Cloud Security Plus offers risk assessment and file security features, while Azure Multi-Factor <a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/privileged-access-workstations\/privileged-access-access-model\" target=\"_blank\" rel=\"noopener nofollow\">Authentication<\/a> ensures that only authorized users can access applications and data. Conditional access policies and cloud-native identity platforms help manage user identities and enforce compliance with security standards.<\/p>\n<p>Through the use of RADIUS endpoints and servers, organizations can set up secure connections for remote access and device control, with granular controls over application access and peripheral devices. Admin tools provide real-time status updates and incident communication, allowing for efficient address configuration and IP management. In addition, Unified SIEM solutions offer deeper visibility into security events and help organizations track and respond to security incidents effectively.<\/p>\n<p>Overall, MFA plays a crucial role in securing enterprise networks and ensuring a consistent and secure employee experience. Organizations that prioritize security and invest in advanced authentication methods will be better equipped to defend against cyber threats and maintain a strong security posture.<\/p>\n<p>In today&#8217;s digital landscape, ensuring the security of corporate networks and access management is of utmost importance. With the rise of mobile devices and the need for unified endpoint management, companies need a reliable method of authentication to protect their resources and data from unauthorized access. This is where Multi-Factor Authentication (MFA) comes into play. MFA adds an extra layer of security by requiring users to provide secondary authentication in addition to their usual credentials, such as a password or PIN. By implementing MFA, organizations can enhance their identity governance, access control, and overall security posture.<\/p>\n<p>One of the key benefits of Active Directory Multi-Factor Authentication is the ability to choose from a variety of authentication methods to suit your organization&#8217;s needs. From software tokens to Azure Active Directory integration, MFA offers a flexible and customizable solution for securing access to resources. By utilizing Azure AD MFA, companies can benefit from a hybrid solution that leverages the cloud platform&#8217;s robust security features while still maintaining control over their on-premises network. This not only enhances security but also simplifies user account management and reduces the risk of unauthorized access.<\/p>\n<p>Furthermore, Active Directory Multi-Factor Authentication provides additional cost management benefits by offering a comprehensive solution that combines MFA with mobile device management, all-in-one DNS management services, and efficient account management tools. By consolidating these features into a single management platform, organizations can streamline their security operations and ensure that all endpoints are protected against potential threats. Additionally, with features such as patch management, Agile project management, and alert management, companies can stay ahead of security risks and respond to incidents in real time.<\/p>\n<p>Azure Multi-Factor Authentication is another key component of Active Directory MFA that offers a secure and seamless authentication process for users. By utilizing strong authentication factors and privileged access security, Azure MFA helps protect enterprises from security breaches and unauthorized access attempts. With features such as RADIUS endpoints, conditional access policies, and cloud-native identity platforms, Azure MFA provides a robust security solution that can adapt to the ever-evolving threats in today&#8217;s digital landscape.<\/p>\n<p>In conclusion, Active Directory Multi-Factor Authentication is a powerful security solution that offers businesses a comprehensive approach to securing their networks and resources. By leveraging advanced authentication methods, robust security features, and cloud integration, organizations can enhance their security posture and protect their sensitive data from unauthorized access. With Azure Multi-Factor Authentication and seamless integration with Azure AD, companies can take advantage of a secure and efficient authentication process that enhances user experience while mitigating security risks. By investing in Active Directory MFA, businesses can safeguard their assets, streamline their security operations, and prioritize the protection of their valuable resources.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Active_Directory_Multi-Factor_Authentication\"><\/span>Benefits of Active Directory Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Key Feature<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Reduces the risk of data breaches by requiring multiple sources for identity authentication.<\/td>\n<\/tr>\n<tr>\n<td>Improved Usability<\/td>\n<td>Users can access resources instantly using existing credentials along with AD MFA.<\/td>\n<\/tr>\n<tr>\n<td>Reduced Costs<\/td>\n<td>Prevents unauthorized access, minimizing expenses related to cyber breaches and security incidents.<\/td>\n<\/tr>\n<tr>\n<td>Flexible Authentication Methods<\/td>\n<td>Offers a variety of authentication options tailored to meet organizational needs, such as software tokens and biometrics.<\/td>\n<\/tr>\n<tr>\n<td>Seamless Azure Integration<\/td>\n<td>Utilizes Azure MFA for a hybrid solution that combines cloud security features with on-premises network control.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Active Directory Multi-Factor Authentication?<br \/>\nA: Active Directory Multi-Factor Authentication is a method of authentication that requires users to provide two or more verification factors to access a corporate network or resources. This additional layer of security helps protect user accounts and credentials from unauthorized access.<br \/>\nSources: Microsoft Azure Active Directory, TechTarget<\/p>\n<p>Q: What are some common methods of authentication used in Multi-Factor Authentication?<br \/>\nA: Common methods of authentication in Multi-Factor Authentication include software tokens, SMS text verification, push notifications, hardware keys, and one-time passwords. These methods provide an extra layer of security beyond just a username and password. Sources: Microsoft Azure Active Directory, Duo Security<\/p>\n<p>Q: How does Multi-Factor Authentication enhance security posture for enterprises?<br \/>\nA: Multi-Factor Authentication strengthens security posture by adding an extra layer of protection to user accounts and credentials. By requiring multiple verification factors, it helps prevent unauthorized access and reduces the risk of data breaches and cyberattacks. Sources: TechTarget, Microsoft Azure Active Directory<\/p>\n<p>Q: What is the role of Azure Active Directory in Multi-Factor Authentication?<br \/>\nA: Azure Active Directory (Azure AD) is a cloud-based identity and access management platform that provides Multi-Factor Authentication capabilities for users accessing resources on cloud platforms. It helps enforce security policies and control access to resources across hybrid environments.<br \/>\nSources: Microsoft Azure Active Directory, TechTarget<\/p>\n<p>Q: Are there any additional costs associated with implementing Multi-Factor Authentication?<br \/>\nA: While some Multi-Factor Authentication solutions may have additional costs for licensing and implementation, the added security and protection for enterprise user accounts and data can result in long-term cost savings by reducing the risk of security breaches and associated costs.<br \/>\nSources: TechTarget, Microsoft Azure Active Directory<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>By implementing an Active Directory Multi-Factor Authentication (MFA) process, you can quickly and easily enhance your online security. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> offers a FREE and secure account that effectively manages your Active Directory MFA, ensuring your data remains protected. With LogMeOnce, you can enjoy a safe and seamless digital experience. Create your free account today and gain peace of mind with advanced, secure Active Directory MFA.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2064Active Directory \u200dMulti Factor Authentication (MFA) \u2064is the latest \u2062security measure \u2064that businesses are turning to for protecting their confidential data and systems. It is an advanced security system that requires authentication\u2063 from two or more independent sources before \u200cgranting access to a network or \u200cwebsite. Traditional passwords\u200c and\u200b physical keys are no longer enough [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[935,1299,1294,10933,907],"class_list":["post-71938","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-cybersecurity","tag-active-directory","tag-authentication","tag-multi-factor-authentication","tag-network-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=71938"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71938\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=71938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=71938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=71938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}