{"id":73766,"date":"2024-06-20T20:18:37","date_gmt":"2024-06-20T20:18:37","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/14\/crowdstrike-mfa\/"},"modified":"2024-09-22T08:11:30","modified_gmt":"2024-09-22T08:11:30","slug":"crowdstrike-mfa","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/","title":{"rendered":"Crowdstrike MFA"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u200cCrowdstrike MFA makes user two-factor\u200c authentication easy and secure. \u2063The tool gives businesses\u200b and\u200c individuals more \u2064control over\u200b their \u200cinformation\u2062 security\u200c with a\u200b comprehensive, cloud-based authentication process. This authentication system helps\u200c users to protect\u200b their accounts from unauthorized\u2063 access. By using the Crowdstrike MFA\u200c solution, \u200dbusinesses and individuals\u200d can\u200b ensure that their digital information is secure by\u200b adding an extra layer \u200cof protection. With its \u2063simple \u200csetup, \u2063intuitive design, and strong security, Crowdstrike MFA\u2064 makes\u2062 Authentication simple, secure, and reliable!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/#1%E2%80%8B_Unlock_Your_Security%E2%80%8B_System_with%E2%80%8D_Crowdstrike_Multi-Factor_Authentication\" >1.\u200b Unlock Your Security\u200b System with\u200d Crowdstrike Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/#2_%E2%80%8BHow_Multi-Factor_%E2%80%8DAuthentication_%E2%80%8BCan_Protect_Your_Data\" >2. \u200bHow Multi-Factor \u200dAuthentication \u200bCan Protect Your Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/#3_Advanced_%E2%81%A3Security_Enhanced_with_Crowdstrike_MFA\" >3. Advanced \u2063Security Enhanced with Crowdstrike MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/#4_Benefits_%E2%80%8Bof_Crowdstrike_Multi-Factor_Authentication_Why_Its_the%E2%81%A4_Most_Secure_Solution\" >4. Benefits \u200bof Crowdstrike Multi-Factor Authentication: Why It\u2019s the\u2064 Most Secure Solution<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/#Crowdstrike_Multi-Factor_Authentication_Benefits\" >Crowdstrike Multi-Factor Authentication Benefits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlock-your-security-system-with-crowdstrike-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1%E2%80%8B_Unlock_Your_Security%E2%80%8B_System_with%E2%80%8D_Crowdstrike_Multi-Factor_Authentication\"><\/span>1.\u200b Unlock Your Security\u200b System with\u200d Crowdstrike Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Unlock Your Business\u2019s \u200bSecurity\u200b System with Crowdstrike Multi-Factor Authentication<\/strong><\/p>\n<p>Crowdstrike takes the security of your business\u2019 data \u200dand systems \u200cto the next level\u200d with \u2063their multi-factor \u200cauthentication (MFA) solution. MFA works\u200d by requiring two \u2062or \u200dmore types of authentication, such as\u2063 biometric data \u2062or \u2064real-time authentication, to provide an additional layer of protection.\u200c With\u2062 Crowdstrike,\u200d you\u2019ll enjoy:<\/p>\n<ul>\n<li>An\u200b extra layer\u200c of protection for valuable customer information and \u200dbusiness systems<\/li>\n<li>The ability to manage authentication\u200b requests from different devices,\u200c networks, and locations<\/li>\n<li>A quick and easy setup process<\/li>\n<\/ul>\n<p>Crowdstrike\u2019s \u2064MFA\u200b isn\u2019t limited to\u200b one platform\u200c \u2013 \u2063it\u2019s compatible with all major browsers, endpoints, operating systems, and \u2062more. It also \u200dprovides real-time \u200bmonitoring \u200dand alerting,\u200c making it \u200ceasier to \u2063identify and stop threats before they cause damage. Additionally,\u200d it requires minimal\u200d resources to keep it running smoothly, \u200creducing the need for \u200bcostly\u2062 hardware.<\/p>\n<h2 id=\"2-how-multi-factor-authentication-can-protect-your-data\"><span class=\"ez-toc-section\" id=\"2_%E2%80%8BHow_Multi-Factor_%E2%80%8DAuthentication_%E2%80%8BCan_Protect_Your_Data\"><\/span>2. \u200bHow Multi-Factor \u200dAuthentication \u200bCan Protect Your Data<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication, commonly \u200cknown as MFA, \u200cis a \u200cform of\u200b security measure that \u2064requires not one, but two \u200cor \u200dmore authentication factors in order to \u2064access an account or data. \u2063With layers of \u200csecurity measures, access to\u2063 the data\u2062 is\u2062 safer and less\u2062 vulnerable \u2062to \u200bunauthorized access.\u200b Here are some ways in \u200dwhich \u2063MFA can protect your data:<\/p>\n<ul>\n<li><b>PIN,\u2063 passwords, and\u2063 biometrics:<\/b> An \u200bMFA can \u200dcombine passwords, personal\u200b identification numbers (PINs), and biometrics \u2062such as\u200c fingerprints,\u200b facial\u2063 recognition, and\u2064 voice \u2063recognition to form multiple layers of identification.<\/li>\n<li><b>Verification with multiple devices:<\/b> MFA can also combine verification using multiple devices, such as a smartphone,\u200b wireless devices,\u200c and \u2062a PC, that can\u200d be used\u2063 to access the account.<\/li>\n<li><b>Data encryption:<\/b> MFA also encrypts the\u200c data so that\u2063 it \u2062is protected from any\u2062 outside interference\u200c or manipulation.<\/li>\n<\/ul>\n<p>Using\u2062 an MFA is useful for businesses and individuals\u2064 that need to keep \u2064their\u200c data secure from cyber criminals. With the added layers of security, \u200bthe\u2062 accounts \u200band data \u200dare more secure\u2063 and \u200dless vulnerable to hackers and \u200bother unauthorized access. An MFA can also \u2064be used to regulate access to \u200dthe account, so \u200bthat only authorized\u200c personnel can access the \u2064data.<\/p>\n<h2 id=\"3-advanced-security-enhanced-with-crowdstrike-mfa\"><span class=\"ez-toc-section\" id=\"3_Advanced_%E2%81%A3Security_Enhanced_with_Crowdstrike_MFA\"><\/span>3. Advanced \u2063Security Enhanced with Crowdstrike MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Crowdstrike is \u2063an advanced cyber security\u200d solution\u200b that boosts\u2064 an organisation\u2019s MFA (Multi-Factor\u200c Authentication) protection. Its cutting-edge measures\u2062 help prevent security threats\u200c and \u2063data breaches from happening, safeguarding\u200b businesses and users alike.<\/p>\n<p>A MFA\u2062 credential from Crowdstrike has several\u200c benefits, such as:<\/p>\n<ul>\n<li><strong>Faster authentication<\/strong> \u200c\u2014 Enhanced\u200d authentication\u2063 speed minimises user wait time, allowing \u200dfor \u200bsmoother and quicker transactions.<\/li>\n<li><strong>High \u200bsecurity standards<\/strong> \u2014\u200c Sophisticated algorithms\u2063 and encryption technologies keep <a title=\"Crowdstrike MFA\" href=\"https:\/\/logmeonce.com\/resources\/crowdstrike-mfa\/\">security threat detection\u200d levels high<\/a>.<\/li>\n<li><strong>Easy user enrolment<\/strong> \u2064\u2014\u2064 Smooth \u200cand \u2062simplistic user enrolment \u200dprocess allows\u200c users to quickly sign-up for Crowdstrike\u2019s MFA \u2063credential.<\/li>\n<\/ul>\n<p>Crowdstrike\u2019s\u200d security\u2063 measures present\u200b a comprehensive defence that helps protect organisations and \u2062organisations \u2064from malicious\u200b attacks.\u2063 With its advanced \u2064MFA, \u200dorganisations can ensure their\u2064 data \u2064and\u200b network are\u2063 secure and safe\u200b from malicious \u2063threats.<\/p>\n<h2 id=\"4-benefits-of-crowdstrike-multi-factor-authentication-why-its-the-most-secure-solution\"><span class=\"ez-toc-section\" id=\"4_Benefits_%E2%80%8Bof_Crowdstrike_Multi-Factor_Authentication_Why_Its_the%E2%81%A4_Most_Secure_Solution\"><\/span>4. Benefits \u200bof Crowdstrike Multi-Factor Authentication: Why It\u2019s the\u2064 Most Secure Solution<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Crowdstrike Multi-Factor Authentication: Security Like \u2064Never Before<\/b><\/p>\n<p>Multi-factor authentication\u200d is \u200da huge step up\u200d in terms of \u2063security and \u2064has been gaining traction \u2062in the\u2063 past few years. Crowdstrike MFA provides users \u2064with the best possible security for their accounts reducing the risk of \u200bhacks and\u200b unauthorized\u2064 access. Some of the top benefits \u200cof Crowdstrike MFA are as follows:<\/p>\n<ul>\n<li>Stronger Protection: With Crowdstrike, users get far \u2064more than just a password to guard their information. \u200cBy establishing\u2064 multiple\u200c points of identification, Crowdstrike\u200b ensures that accounts can\u2062 be \u2064protected from unauthorized access.<\/li>\n<li>Customization:\u2064 The\u200d way Crowdstrike MFA is set\u2063 up offers users complete control and \u2062customization over how their accounts \u200care safeguarded. From\u200d easily configuring their\u2064 authentication settings and choosing how to \u200bcontrol access, \u200cusers are in \u2064charge of their security.<\/li>\n<li>Better Authentication:\u200b Crowdstrike\u2062 implements\u2064 stronger \u2063authentication \u2064standards than other MFA solutions out there.\u2063 It \u200cuses sophisticated verification \u200btechniques \u200cincluding two-factor\u2062 authentication, \u2064biometrics, and single sign-on capabilities for superior security.<\/li>\n<\/ul>\n<p>Multi-factor \u2064authentication\u2064 is essential for\u200b businesses \u200blooking to provide a secure infrastructure. Crowdstrike MFA takes the guesswork out of security, allowing companies to be sure their data is always protected.\u200c Its comprehensive suite\u2062 of features and strong authentication \u200bmakes it the most reliable \u200cand secure\u2064 solution\u2062 for businesses today.<\/p>\n<p>CrowdStrike MFA, or Multi-Factor Authentication, offers a range of features and capabilities to enhance security for users accessing applications and resources. The left menu allows users to navigate through various authentication options, including AIAdaptive multi-factor authentication and additional authentication methods. By enforcing phishing-resistant MFA and enhancing signer authentication, CrowdStrike MFA ensures a high level of security for accessing cloud and enterprise applications.<\/p>\n<p>With granular, risk-based access policies and conditional access policies in place, users can rest assured that their hardware and cloud resources are protected. The integration of hardware tokens and generative AI tools adds an extra layer of security to the authentication process. Additionally, CrowdStrike offers support for Identity Threats and provides detailed login control measures to protect against cyber threat activity. Overall, CrowdStrike MFA provides a robust and reliable authentication solution for organizations looking to enhance their security posture. Source: crowdstrike.com<\/p>\n<p>CrowdStrike MFA, or multi-factor authentication, offers a robust set of features and capabilities to enhance security for users accessing their platform. With features such as requests per minute monitoring, user log access blocking, and additional authentication steps, CrowdStrike ensures that only authorized individuals can access sensitive data and systems. By enforcing HYPR&#8217;s phishing-resistant authentication and enhancing signer authentication, CrowdStrike provides a high level of security against unauthorized access. They offer various forms of authentication, including device keys, physical device checks, device posture assessment, and device security settings to protect against device risks.<\/p>\n<p>CrowdStrike also offers a range of resources and tools, such as CrowdStrike University for customer training, Falcon Platform for configuration and support, and a host of authentication solutions like authenticator applications and digital signature-based verification methods. With a focus on adherence to security policies and strong encryption standards, CrowdStrike MFA provides a reliable and secure authentication solution for businesses and organizations. Source: CrowdStrike official website<\/p>\n<p>Crowdstrike MFA (Multi-Factor Authentication) offers a comprehensive set of security features to protect access to applications, resources, and devices. With options such as access block, additional steps for authentication, and enforcement of HYPR&#8217;s phishing-resistant authentication, users can ensure a secure login process. Enhancements to signer authentication and action against compromised devices further strengthen security measures. The CrowdStrike Falcon Platform offers tools such as Crowdstrike Host API and Crowdstrike Falcon Platform Sign for secure access to enterprise applications and resources. Additionally, CrowdStrike University Customer provides training on best practices for secure access management.<\/p>\n<p>Cloud Application Administrator and Cloud Application Gallery enable easy management and access to business-critical applications, while 2-Step Verification and challenging verification factors ensure a robust verification process. Additional features such as session control, dynamic integration with API clients, and cryptographic hardware tokens enhance security measures. CrowdStrike&#8217;s detection-oriented product strategy ensures a strong defense against potential threats. With a focus on access security and authentication, the CrowdStrike MFA solution is a reliable choice for organizations looking to strengthen their security posture. Source: CrowdStrike Official Website<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Crowdstrike_Multi-Factor_Authentication_Benefits\"><\/span>Crowdstrike Multi-Factor Authentication Benefits<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefits<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Provides an extra layer of protection for accounts and data<\/td>\n<\/tr>\n<tr>\n<td>Customization<\/td>\n<td>Users have control over authentication settings for personalized security<\/td>\n<\/tr>\n<tr>\n<td>Better Authentication<\/td>\n<td>Utilizes strong verification techniques for superior security<\/td>\n<\/tr>\n<tr>\n<td>Stronger Protection<\/td>\n<td>Establishes multiple points of identification to prevent unauthorized access<\/td>\n<\/tr>\n<tr>\n<td>Regulated Access<\/td>\n<td>Allows only authorized personnel to access data, enhancing security<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Q&amp;A<\/p>\n<p>Q: \u2064What is\u2064 Crowdstrike MFA? \u200b<br \/>\nA: Crowdstrike MFA stands for Multi-Factor Authentication.\u200b It\u2019s a way of adding an \u200bextra layer \u2064of security to \u200dwebsites and \u2064apps \u2064that \u2064keeps your information\u200b and data safe.\u2062<\/p>\n<p>Q: How does \u200cCrowdstrike\u2063 MFA\u2062 work?<br \/>\nA: Crowdstrike MFA works by \u200brequiring you to\u2063 provide two or\u200d more\u2063 pieces of \u2062information to verify your identity\u200c when logging \u2062in \u200cor making \u2064changes to your\u200b accounts. This can be things\u2062 like\u200d a password, a security\u2063 code, \u2064or using\u2063 a special device\u2062 like a biometric scan.<\/p>\n<p>Q: \u2063Why \u200bis Crowdstrike MFA\u200b important?<br \/>\nA: Using Crowdstrike MFA can help keep your \u200binformation and data safe from cyber criminals \u2063and hackers. It helps\u2062 make sure that\u2063 only you can access your accounts, even \u2064if someone else knows your\u200c username \u200cand \u200cpassword.<\/p>\n<p>Q: What are some key components of CrowdStrike MFA?<br \/>\nA: Some key components of CrowdStrike MFA include policy configuration for user authentication, the verification code sent to the user&#8217;s authenticator app, security policy enforcement at the Domain Controller level, and risk-based authentication using contextual factors and risk scores. Source: CrowdStrike Falcon Platform<\/p>\n<p>Q: How does CrowdStrike MFA protect against unauthorized access?<br \/>\nA: CrowdStrike MFA protects against unauthorized access by providing an extra layer of security beyond just a username and password. By requiring additional authentication steps, such as a verification code or biometric scan, it ensures that only legitimate users can gain access to sensitive information or systems. Source: CrowdStrike Falcon Platform<\/p>\n<p>Q: What are some advantages of using CrowdStrike MFA?<br \/>\nA: Some advantages of using CrowdStrike MFA include enhanced security posture, protection against phishing attacks, adaptive multi-factor authentication based on risk scores, and continuous authentication for ongoing security monitoring. Source: CrowdStrike Falcon Platform<\/p>\n<p>Q: How does CrowdStrike MFA integrate with other CrowdStrike products?<br \/>\nA: CrowdStrike MFA can be integrated with other CrowdStrike products like CrowdStrike Falcon Identity Protection and CrowdStrike Falcon Zero Trust Assessment to provide a comprehensive security solution for enterprise applications and resources. Source: CrowdStrike Falcon Platform<\/p>\n<p>Q: What are some best practices for implementing CrowdStrike MFA?<br \/>\nA: Some best practices for implementing CrowdStrike MFA include enforcing phishing-resistant authentication methods, leveraging risk-based authentication policies, and continuously monitoring device security posture for any potential risks or compromised devices. Source: CrowdStrike Falcon Platform<\/p>\n<p>Q: Can CrowdStrike MFA be used for cloud-based applications?<br \/>\nA: Yes, CrowdStrike MFA can be used for cloud-based applications by integrating with Identity Providers (IdPs) and cloud cost management tools to ensure secure access to business-critical resources in corporate or customer environments. Source: CrowdStrike Falcon Platform<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-[20px] text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"b0ca06b7-e8f3-450f-9a5f-57af0b82c373\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>We\u2019ve seen the importance of Crowdstrike MFA for safeguarding your systems and data. To ensure your business stays secure, consider creating a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account \u2013 an easy-to-use two-factor authentication system that protects your online identity and secures your accounts with Crowdstrike MFA and other multi-factor authentication technologies. With the powerful tools and services offered by LogMeOnce, your business will be well-prepared to handle the growing security threats in today\u2019s technological landscape.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Secure your Crowdstrike account with MFA to protect against cyber threats. If you need to create a Crowdstrike account, sign up for a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring for added security.<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[21623,935,17094,1294,11055],"class_list":["post-73766","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-crowdstrike","tag-cybersecurity","tag-securitysolutions","tag-authentication","tag-mfa"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=73766"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73766\/revisions"}],"predecessor-version":[{"id":226821,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73766\/revisions\/226821"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=73766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=73766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=73766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}