{"id":72824,"date":"2024-06-20T15:56:22","date_gmt":"2024-06-20T15:56:22","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/14\/aws-root-mfa-reset\/"},"modified":"2024-08-19T12:57:40","modified_gmt":"2024-08-19T12:57:40","slug":"aws-root-mfa-reset","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/","title":{"rendered":"Aws Root MFA Reset"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Forgot your Amazon Web Services (AWS) Root MFA \u200bReset? Don\u2019t worry, you \u2062can get it back\u200d in no time! AWS Root MFA Reset is an important \u2063security feature that requires users to authenticate their access to AWS services\u2064 with an additional layer of security, \u200bsuch \u200cas a one-time \u2064password. This step-by-step guide will \u2064help \u200byou troubleshoot and rebuild \u2062your Root MFA\u200d Reset, so that you can regain access\u2063 to your AWS account. \u2063By \u200dunderstanding \u200cthe concepts of authentication protocols, security policies, \u200dand user management, you will be able\u2062 to reset your Root MFA Reset quickly and easily. \u2063With this guide, even if you are \u2064not tech-savvy, \u2063you can effectively reset your AWS Root MFA Reset and regain access to your services.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#1_Easily_Reset_Your_AWS_Root_MFA_Code\" >1. Easily Reset Your AWS Root MFA Code<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#2_How_to_Keep_Your_AWS%E2%80%8D_Account_Secure\" >2. How to Keep Your AWS\u200d Account Secure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#3%E2%81%A4_Leverage%E2%81%A2_Multi-Factor%E2%80%8B_Authentication_with%E2%81%A2_AWS_Root_MFA\" >3.\u2064 Leverage\u2062 Multi-Factor\u200b Authentication with\u2062 AWS Root MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#4_Steps_to_Make_Sure_You%E2%80%8D_Reset_AWS%E2%80%8D_Root_MFA_Correctly\" >4. Steps to Make Sure You\u200d Reset AWS\u200d Root MFA Correctly<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#Steps_for_AWS_Root_MFA_Reset\" >Steps for AWS Root MFA Reset<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-easily-reset-your-aws-root-mfa-code\"><span class=\"ez-toc-section\" id=\"1_Easily_Reset_Your_AWS_Root_MFA_Code\"><\/span>1. Easily Reset Your AWS Root MFA Code<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Forgetting \u2063your AWS root MFA code \u200bcan\u2063 be the most frustrating experience. Don\u2019t worry \u2013 there\u2019s a \u200cquick and \u200deasy process to reset\u2063 it!<\/b><\/p>\n<ul>\n<li>Start by\u2063 logging\u2063 into AWS \u2063with your root user\u200d account.<\/li>\n<li>Then proceed to \u201cMy Security Credentials\u201d from either the dropdown menu or the Security Credentials page.<\/li>\n<li>Under the Security Status\u2063 &amp; Settings tab, \u200dyou\u2019ll find the option to \u201cDeactivate MFA\u201d.<\/li>\n<li>After clicking this, you also have to enter a\u200c special security code associated with your \u2064MFA device.<\/li>\n<\/ul>\n<p><b>Once\u2062 you\u2019ve successfully entered the code, you can start setting up your \u2063MFA setting again. Simply fill\u200d in the required parameters, a\u200d new MFA code will \u2062then be issued.<\/b> To\u2062 link it to your account, you \u2063can \u2064use either the\u200d AWS\u2064 Virtual MFA app\u2062 or the Amazon MFA hardware device. When you\u2019ve successfully connected the new device to the account, you\u2019re all good \u200cto\u200d go \u2013 the\u200c MFA code can\u200d now be \u200bused like before.<\/p>\n<h2 id=\"2-how-to-keep-your-aws-account-secure\"><span class=\"ez-toc-section\" id=\"2_How_to_Keep_Your_AWS%E2%80%8D_Account_Secure\"><\/span>2. How to Keep Your AWS\u200d Account Secure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you \u200cwork\u200d with your Amazon Web Services account, there\u200c are some best practices that you \u2064can follow to keep your account secure.<\/p>\n<ul>\n<li><strong>Set up Multi-factor authentication (MFA)<\/strong> This is a great way to protect \u200cyour access to your account. MFA requires a code from another \u200csource, \u200bsuch as a physical token,\u200c or your mobile device, before \u2063granting access.<\/li>\n<li><strong>Use IAM \u200busers and groups<\/strong> \u2013 You should create an\u200b individual \u2064identity for each user accessing the AWS account. \u200dThis overcomes the problem of a single set of credentials needed for every user.<\/li>\n<li><strong>Create \u200croles for users \u2062 <\/strong> \u2013 You should create roles to\u2063 control user privileges. This\u200b allows \u2062ease\u2064 of control and limits user access.<\/li>\n<li><strong>Limit access to your data <\/strong> \u2013 You \u200bshould use policies to lock down\u200c access to your \u2064sensitive data. This can help prevent malicious users from accessing \u2062confidential data.<\/li>\n<\/ul>\n<p>You can also use\u200b security tools such as \u2064CloudTrail and AWS Security \u2063Hub\u2064 to monitor and protect your AWS account \u200bfrom potential\u2064 threats. By\u2062 following best practices \u2064for AWS \u2064security, \u2063you can keep your account \u2063safe\u2062 from \u200dunwanted\u200d intrusions.<\/p>\n<h2 id=\"3-leverage-multi-factor-authentication-with-aws-root-mfa\"><span class=\"ez-toc-section\" id=\"3%E2%81%A4_Leverage%E2%81%A2_Multi-Factor%E2%80%8B_Authentication_with%E2%81%A2_AWS_Root_MFA\"><\/span>3.\u2064 Leverage\u2062 Multi-Factor\u200b Authentication with\u2062 AWS Root MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi-factor\u2064 authentication with \u2062AWS Root MFA<\/strong><\/p>\n<p>Multi-factor\u2063 authentication (MFA) is an important security measure\u200c in\u200d AWS cloud security. Implementing \u200dMFA\u200d solutions helps\u200d to protect cloud resources from unauthorized access.<\/p>\n<p>When it\u200c comes to MFA, AWS Root MFA \u2062(Multi-Factor\u200b Authentication) provides a secure and cost-effective option. It can\u200c be used to authenticate users both within \u200band \u200boutside of AWS environments.<\/p>\n<p>AWS Root MFA leverages two-factor authentication, where users must present two forms of credentials \u200cbefore accessing the\u200b AWS\u2064 resources. This might include a password and a code generated by a third-party authenticator. It helps add an extra layer of security, making it harder\u200c for hackers \u200bto access the resources.<\/p>\n<p>AWS Root MFA also\u200b offers users the ability \u200dto set up specific conditions for authentication. This can enable users to set parameters such \u2062as\u2062 a \u200ctime limit for the authentication code, or they can add\u200d an extra layer of security to specific accounts.<\/p>\n<p>Through its <a href=\"https:\/\/logmeonce.com\/password-manager\/\">multi-factor authentication capabilities<\/a>, AWS \u200dRoot MFA helps secure cloud \u2064resources against unauthorized access and malicious activity. It adds an additional layer of protection to\u2064 cloud resources, while also allowing users to <a href=\"https:\/\/logmeonce.com\/passwordless-photo-login\/\">set custom authentication\u200c conditions\u200d based<\/a> \u2064on their requirements.<\/p>\n<h2 id=\"4-steps-to-make-sure-you-reset-aws-root-mfa-correctly\"><span class=\"ez-toc-section\" id=\"4_Steps_to_Make_Sure_You%E2%80%8D_Reset_AWS%E2%80%8D_Root_MFA_Correctly\"><\/span>4. Steps to Make Sure You\u200d Reset AWS\u200d Root MFA Correctly<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Step 1: Gather Necessary Information<\/b><\/p>\n<p>Before you can reset the MFA for the AWS root account,\u200b you need to have a few pieces of information available. Make \u2063sure you\u200c have\u2064 the root user \u200caccess \u200ckey ID, Temporary security\u2062 credentials, and\u2062 <a title=\"Aws Root MFA Reset\" href=\"https:\/\/logmeonce.com\/resources\/aws-root-mfa-reset\/\">multi-factor authentication device serial number<\/a>. Without these, \u200dthe reset cannot begin.<\/p>\n<p><b>Step\u200c 2: Log in to Your AWS Account<\/b><\/p>\n<p>After gathering \u200cthe \u200bnecessary \u200cinformation, you need to\u2062 log in to your AWS account. This can be \u200bdone through the\u2062 web-based console, AWS\u200b CLI, or AWS API.\u200c Once you\u2064 have logged in, go to the Security \u2062Credentials page.<\/p>\n<p><b>Step 3: Activate\u200b the \u200cMFA<\/b><\/p>\n<p>When you\u2019re on the Security Credentials page, select \u200bthe \u2063MFA dropdown from the menu \u200dand\u2063 select\u2062 the Activate MFA option. You will be prompted to enter the temporary \u200csecurity \u200bcredentials from\u2063 step 1 along with the\u200b MFA device serial\u200c number.<\/p>\n<p><b>Step 4: Set Up New MFA<\/b><\/p>\n<p>Once you have activated the MFA, you can now set up \u200ba new Multi-Factor\u200d Authentication (MFA). This can be done either through the Virtual device or the hardware device. Select the \u200ddevice you\u2063 want to use and create\u2064 the MFA. Make sure \u2064to note down \u200cthe six-digit \u200bcode\u200d provided during the \u200csetup process.<\/p>\n<p><b>Step 5: Test MFA Reset<\/b><\/p>\n<p>Now that you have set \u200bup the MFA, you need to test it out. Return \u2062to the\u200b Security Credentials \u200dpage and\u2064 select the Verify MFA \u2063option. Enter the MFA code you noted down in step \u20644\u200c and click verify. If the code is valid, it means that you have successfully\u2064 reset the MFA for the AWS root account. \u200b<\/p>\n<p>AWS Root MFA Reset is a crucial process that helps ensure the security of the AWS environment by requiring multiple factors of authentication for the root user. The process involves various steps including setting up root user credentials, configuring performance cookies, advertising cookies, and functional cookies for enhanced user experience. Users can also modify their cookie preferences and privacy preferences to control the data shared with advertising partners and third-party providers.<\/p>\n<p>The Multi-factor authentication adds an extra layer of security by prompting for an additional security check, such as a code from a virtual authenticator application or a phone keypad. The process also involves managing IAM users, access keys, and permissions to maintain a secure and compliant environment. It is important for administrators to follow the recommended password policies, credential management practices, and security industry standards to prevent unauthorized access and data breaches. For more details and guidance on AWS Root MFA Reset, users can refer to the official AWS User Guide and the IAM Identity Center.<\/p>\n<p>The AWS Root MFA Reset process allows the root user to reset the Multi-factor Authentication (MFA) settings for their account. The root user password is required to initiate this process, along with relevant content on the AWS Management Console. The navigation bar on the console guides the user through the steps, including choosing Security credentials and setting up alternative factors for authentication. The root user email address is used for account-specific IAM user sign-in, and non-essential cookies may be utilized for authentication purposes.<\/p>\n<p>The AWS Identity and Access Management (IAM) page displays configuration options for security settings and device form for users. For added security, the IAM Identity Center offers additional assistance and authentication device options such as Authy 2-Factor Authentication. Security administrators can monitor root user activity and receive alerts for approval on certain actions. Overall, the AWS Root MFA Reset process enhances security measures and ensures secure access to AWS resources. Sources: AWS official documentation and IAM Identity Center guidelines.<\/p>\n<p>The AWS Root MFA Reset process involves a series of steps and considerations to ensure the security of user accounts and access to resources within the AWS Management Console. Users can choose to enable Multi-factor authentication (MFA) for added security, especially when accessing the Root user account or using root user access keys. This extra layer of verification helps protect account-specific IAM user sign-ins and prevents unauthorized access to sensitive information. In case of a forgotten MFA device or need for account recovery, users can follow the designated password recovery flow and alternate account recovery methods to regain access.<\/p>\n<p>It is crucial for administrators with access to account root user privileges to adhere to security best practices and regularly review security policies and permissions to maintain a secure environment. It is recommended to utilize MFA-compatible applications and always keep contact information updated for easy verification and account recovery. The AWS Security Hub provides additional resources and tools for bolstering security measures and protecting against potential threats. In summary, implementing MFA for the Root user and adhering to security protocols are essential for maintaining a secure and reliable AWS environment. Sources: AWS official documentation<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Steps_for_AWS_Root_MFA_Reset\"><\/span>Steps for AWS Root MFA Reset<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr style=\"background-color: #f2f2f2;\">\n<th style=\"font-weight: bold; font-size: 18px;\">Step<\/th>\n<th style=\"font-weight: bold; font-size: 18px;\">Description<\/th>\n<\/tr>\n<tr style=\"background-color: #ccefff;\">\n<td style=\"text-align: center;\">1<\/td>\n<td>Log in to AWS with root user account<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">2<\/td>\n<td>Access &#8220;My Security Credentials&#8221;<\/td>\n<\/tr>\n<tr style=\"background-color: #ccefff;\">\n<td style=\"text-align: center;\">3<\/td>\n<td>Deactivate current MFA<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">4<\/td>\n<td>Enter security code from MFA device<\/td>\n<\/tr>\n<tr style=\"background-color: #ccefff;\">\n<td style=\"text-align: center;\">5<\/td>\n<td>Setup new MFA parameters<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">6<\/td>\n<td>Link new MFA device<\/td>\n<\/tr>\n<tr style=\"background-color: #ccefff;\">\n<td style=\"text-align: center;\">7<\/td>\n<td>Test MFA setup<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">8<\/td>\n<td>Verify successful MFA reset<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What Is AWS Root MFA Reset?<br \/>\nA: AWS\u2062 Root Multi-Factor Authentication (MFA) Reset is a \u200dsecurity feature from Amazon Web Services that helps protect users \u2063from unauthorized access to\u200d their account. It \u200crequires two or \u200cmore pieces of evidence (e.g., passwords, codes, biometrics) to authenticate a user before granting them access to their AWS account.\u200d By resetting root MFA, an account owner can regain \u2062control of their account in\u2063 the event that they lose\u2062 access.<\/p>\n<p>Q: Why \u2063Should I Use AWS Root\u200b MFA Reset?<br \/>\nA: AWS Root MFA Reset helps to secure your AWS account by requiring \u2062the authentication of multiple\u200b pieces of evidence before allowing access. This helps to \u2064prevent any unwanted access or unauthorized activity on your \u200cAWS account.\u200b By resetting \u2063root \u2064MFA, you \u200dcan also ensure that only\u2063 authorized personnel have access\u200c to the account in case of a forgotten password or lost authentication device.<\/p>\n<p>Q: How Do I Reset\u200c AWS Root MFA?<br \/>\nA: To reset root MFA, \u200dyou first need to \u200clog\u200c into \u200bthe AWS Management Console. \u200bFrom there, select \u201cMy Security Credentials\u201d and enter the\u2063 \u201cMulti-Factor Authentication\u201d section.\u2063 Then, \u200dclick on \u2063\u201dManage MFA.\u201d From there, you can click\u200c \u201cReset MFA\u201d to regain access to\u2063 your account. You may \u200bbe \u200dasked to confirm \u200cyour \u200didentity before resetting your MFA.<\/p>\n<p><span style=\"font-size: revert; color: initial;\">Q: How can I reset my AWS Root MFA (Multi-Factor Authentication)?<\/span><\/p>\n<p>A: You can reset your AWS Root MFA by navigating to the AWS Management Console, choosing &#8220;Security credentials&#8221; in the navigation pane, selecting &#8220;Assign MFA,&#8221; and following the on-screen instructions to set up a new authentication device. Source: AWS Documentation<\/p>\n<p>Q: What are the factors of authentication for resetting AWS Root MFA?<br \/>\nA: The factors of authentication for resetting AWS Root MFA include using an authentication device such as a mobile phone or a hardware security key. Source: AWS Documentation<\/p>\n<p>Q: Can I reset my AWS Root MFA without access to my email inbox?<br \/>\nA: No, in order to reset your AWS Root MFA, you will need access to your email inbox to receive the six-digit verification code for email address verification. Source: AWS Documentation<\/p>\n<p>Q: How can I recover my AWS Root MFA if I lose my authentication device?<br \/>\nA: If you lose your authentication device for AWS Root MFA, you can request assistance from AWS Support for additional guidance and alternative authentication factors. Source: AWS Documentation<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Don\u2019t forget to create \u2062a free LogMeOnce account\u200c to ensure your Aws Root MFA Reset will be easier to manage and\u200c secure. A LogMeOnce account with its multi-factor authentication\u200b system \u200dwill help you\u200d rest assured that\u200d your Aws Root\u2063 MFA \u2064Reset data\u200b is\u2062 <a href=\"https:\/\/logmeonce.com\/\">safe from any malicious activity<\/a>. With LogMeOnce, \u2064managing your Aws Root MFA Reset accounts can be taken care\u200b of with \u200cease and serenity. Take advantage of today\u2019s secure authentication protocols for Aws Root MFA Reset and keep your accounts clean\u2062 and your data safe.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Forgot your Amazon Web Services (AWS) Root MFA \u200bReset? Don\u2019t worry, you \u2062can get it back\u200d in no time! AWS Root MFA Reset is an important \u2063security feature that requires users to authenticate their access to AWS services\u2064 with an additional layer of security, \u200bsuch \u200cas a one-time \u2064password. This step-by-step guide will \u2064help \u200byou [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[7232,1294,11055,1321,5748,781],"class_list":["post-72824","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-aws-2","tag-authentication","tag-mfa","tag-reset","tag-root","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/72824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=72824"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/72824\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=72824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=72824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=72824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}