{"id":74619,"date":"2024-06-20T23:37:10","date_gmt":"2024-06-20T23:37:10","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/15\/per-user-mfa-vs-conditional-access\/"},"modified":"2024-10-11T14:22:55","modified_gmt":"2024-10-11T14:22:55","slug":"per-user-mfa-vs-conditional-access","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/","title":{"rendered":"Per-User MFA Vs Conditional Access"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Maintaining digital security is a priority for businesses and individuals alike. Per-User Multifactor Authentication (MFA) and Conditional Access are\u2063 two key\u200d factors for safeguarding \u2062user\u2063 accounts. These two potential solutions may\u200b seem similar, but they are in fact\u2063 quite different. Per-User MFA Vs Conditional Access: understanding the key differences between the two can \u2063help you decide which is the \u2063best option for the\u200d security of your personal and business accounts. MFA and Conditional Access are powerful \u200dsecurity measures that provide\u200d multi-level authentication processes and restrict access to a user\u2019s account depending \u200don certain criteria such as IP \u200baddress or device being used. Both <a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">strategies offer optimum user security<\/a> and are effective in protecting accounts from malicious\u2063 access. Even though these solutions\u200b are both centered on user account security, there are some fundamental differences to consider.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#1_Invest_in_Safety_Per-User_MFA_vs_Conditional_Access\" >1. Invest in Safety: Per-User MFA vs Conditional Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#2_Strengthen_Your_Security_with_the_Right_MFA_Solution\" >2. Strengthen Your Security with the Right MFA Solution<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#3_Protect_the_System_and_Your_Users_with_MFA\" >3. Protect the System and Your Users with MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#4_Ensure_Business_%E2%81%A2Continuity_with_Per-User_MFA_vs_Conditional_Access_Solutions\" >4. Ensure Business \u2062Continuity with Per-User MFA vs Conditional Access Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#Per-User_MFA_vs_Conditional_Access_Key_Differences\" >Per-User MFA vs Conditional Access: Key Differences<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/per-user-mfa-vs-conditional-access\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-invest-in-safety-per-user-mfa-vs-conditional-access\"><span class=\"ez-toc-section\" id=\"1_Invest_in_Safety_Per-User_MFA_vs_Conditional_Access\"><\/span>1. Invest in Safety: Per-User MFA vs Conditional Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Secure Your Users With Multifactor Authentication<\/b><\/p>\n<p>Authentication is more important than ever to secure your business. Multi-factor authentication \u200b(MFA) can defend your accounts from threats like phishing, \u2064malware,\u200b and other cyberattacks. MFA requires an additional step for users to access\u200d their data or accounts. It ensures that only authorized individuals can get access to sensitive information.<\/p>\n<p>With per-user MFA, users can set their own security preferences, allowing for a more personalized\u2064 and tailor-fit security experience. Each user can configure their own MFA setting \u2062and verification method. Common MFA \u200cverification methods include:<\/p>\n<ul>\n<li>One-time passwords (OTP)<\/li>\n<li>Fingerprint\u200d scanning<\/li>\n<li>Security questions\u2062<\/li>\n<li>Voice recognition<\/li>\n<\/ul>\n<p>By using per-user \u2064MFA and giving users control of their own settings, they remain engaged in the security process and become more likely to protect their accounts. An added benefit of per-user MFA is that you can quickly and easily manage user access. This allows you \u2063to quickly revoke access to accounts and reassign resources as needed.<\/p>\n<p>Alternatively, you may opt to protect your data by using Conditional Access. This security solution combines access policies with identity protection to protect your business against malicious activity. With\u2064 Conditional\u2063 Access, you \u200dgain \u200ban additional layer of security by setting conditions\u2062 that must be met for users to access data or accounts. In most\u200b cases, \u2062this includes verifying the user\u2019s identity, authentication method, and device. By setting conditions, you can better manage your users\u2019 access and quickly and easily implement security protocols as needed.<\/p>\n<h2 id=\"2-strengthen-your-security-with-the-right-mfa-solution\"><span class=\"ez-toc-section\" id=\"2_Strengthen_Your_Security_with_the_Right_MFA_Solution\"><\/span>2. Strengthen Your Security with the Right MFA Solution<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Are You Utilizing Multi-Factor Authentication\u200d (MFA)?<\/strong><\/p>\n<p>MFA is an important layer of security for any organization and is crucial in preventing unauthorized access. MFA adds an additional layer of authentication, \u200bsignificantly reducing the risk of cyberattacks, particularly from malicious actors.<\/p>\n<p>With MFA enabled, a \u200buser is required \u2063to provide proof of identity from more than one source \u2064before they are granted access. \u2062This could take\u2062 the form of\u200d something the user knows, such as a username or password, or something the user has, such as a token\u2064 or mobile device. Top MFA solutions \u2062incorporate multiple forms of authentication to\u200c ensure optimal security.<\/p>\n<p><strong>Selecting the Right MFA Solution \u2064for Your Business<\/strong><\/p>\n<p>When selecting an MFA\u200c solution for your business, there are a number of factors to consider. You want to ensure it meets the security \u200cneeds of your organization and provides convenient solutions for users. Here are some tips to help you find the perfect fit:<\/p>\n<ul>\n<li>Determine which authentication methods (e.g. SMS, email, biometrics,\u200c knowledge-based\u200b authentication) are the\u2064 most \u200dpractical,\u200d secure, and user-friendly<\/li>\n<li>Run tests to ensure \u200cyour MFA solution is reliable and functions optimally in all scenarios<\/li>\n<li>Make sure the MFA solution is compatible\u2064 with existing systems\u2062 and devices in use<\/li>\n<li>Choose a solution that will provide ongoing maintenance\u2063 and support<\/li>\n<li>Ensure the provider is able to offer long-term scalability and ongoing\u200d security updates<\/li>\n<\/ul>\n<p>By taking these steps, you\u2019ll be well on your way to finding \u2063an MFA solution that\u2063 meets the needs of your organization and \u2062offers strong protection for your digital assets.<\/p>\n<h2 id=\"3-protect-the-system-and-your-users-with-mfa\"><span class=\"ez-toc-section\" id=\"3_Protect_the_System_and_Your_Users_with_MFA\"><\/span>3. Protect the System and Your Users with MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA) provides additional\u2064 security safeguards for \u2064digital systems and users. MFA helps protect against cyberattacks, as user accounts cannot be hacked with just \u2062a password. Instead, a user must use additional individual steps to verify \u200dtheir identity, such\u200b as providing a code, answering \u2064a security question, or using a biometric identification tool such as facial recognition.<\/p>\n<p>By deploying a multi-factor authentication system, organisations can:<\/p>\n<ul>\n<li>Ensure users are who they \u200csay they are<\/li>\n<li><strong>Strengthen cyber security<\/strong><\/li>\n<li>Authenticate user profiles more securely<\/li>\n<li>Provide easy and reliable user\u2062 authentication<\/li>\n<\/ul>\n<p>Organisations \u200dof all sizes should implement a multi-factor authentication system \u2062to protect\u200c their system\u200b and users. MFA is both \u200csecure and easy to use, making it an essential component \u2064for any security system.<\/p>\n<h2 id=\"4-ensure-business-continuity-with-per-user-mfa-vs-conditional-access-solutions\"><span class=\"ez-toc-section\" id=\"4_Ensure_Business_%E2%81%A2Continuity_with_Per-User_MFA_vs_Conditional_Access_Solutions\"><\/span>4. Ensure Business \u2062Continuity with Per-User MFA vs Conditional Access Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Managing security access levels is essential\u2063 for controlling employee access to corporate\u200d resources. While traditional security solutions can provide basic protection, they cannot guarantee the safety and integrity of corporate \u2063data. By using Per-User Multi-Factor Authentication (MFA) or Conditional Access Solutions (CAS), organizations can ensure their\u2062 data is safe and secure from unauthorized access.\u2063 Both options provide organizations \u200dwith robust security capabilities to keep their data protected and maintain business continuity\u2062 on the digital front.<\/p>\n<p>Per-User MFA provides users with a second layer of authentication for their accounts. This authentication\u2063 is provided through \u200da physical device or biometrics which are used to verify the user\u2019s identity. The user\u2019s identity and \u200ccredentials are verified through the MFA solution to protect against potential online threats. CAS solutions help organizations control who has access to what, when, and for how long. With \u200dCAS, organizations \u200bcan set up access policies like two-factor authentication and provide users with the necessary privileges based on their\u200c role and their access needs.<\/p>\n<ul>\n<li><b>Per-User MFA<\/b> requires users to be authenticated with a physical device or biometrics for additional security.<\/li>\n<li><b>CAS Solutions<\/b> allow organizations to\u2064 set up access policies such as two-factor authentication and control who has access to certain data, as well as \u2063when and for how\u200c long.<\/li>\n<\/ul>\n<p>Per-User MFA and Conditional Access are both important security measures that aim to protect user accounts and data within Azure Active Directory. Per-User MFA utilizes Multi-Factor Authentication (MFA) to provide an additional layer of security for individual users when accessing cloud applications. This helps to enhance the security posture of organizations by requiring users to verify their identities through authentication contexts such as hardware tokens or phone sign-on.<\/p>\n<p>On the other hand, Conditional Access policies allow for granular control over access to cloud applications based on factors like user location, device compliance, and risk level. By setting up specific rules and conditions, organizations can ensure that only legitimate users with proper authentication credentials can access sensitive data. Additionally, the use of conditional policies helps to protect against security vulnerabilities and phishing attacks by implementing advanced security controls and measures. Sources: Microsoft Azure Documentation<\/p>\n<p><span style=\"font-size: revert; color: initial;\">Per-User MFA and Conditional Access are both important tools in the realm of security and access control within organizations. Per-User MFA, also known as Multi-Factor Authentication, provides an extra layer of security by requiring users to verify their identity using multiple factors such as passwords, biometrics, or security tokens. This helps to protect against unauthorized access to sensitive data and applications. On the other hand, Conditional Access allows organizations to set policies based on various factors such as user sign-in logs, device platforms, IP addresses, and more. These policies help to control access to systems and ensure that only authorized users can access critical resources. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">When comparing the two, it is important to consider the level of protection offered by each. Per-User MFA provides individual level security by requiring each user to authenticate themselves, while Conditional Access offers broader access control decisions based on a variety of conditions. Additionally, Per-User MFA is often recommended for higher-risk scenarios where strong authentication is needed, while Conditional Access can be set up based on risk-based criteria to provide targeted protection. <\/span><span style=\"color: initial; font-size: revert;\">Overall, both Per-User MFA and Conditional Access play important roles in securing organizations&#8217; data and systems. By implementing these tools effectively and understanding their differences, organizations can enhance their security posture and protect against potential threats.\u00a0<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">In the realm of authentication and security measures, organizations have the option to choose between Per-User MFA and Conditional Access as methods of safeguarding their data and resources. Per-User MFA, also known as Azure AD Multi-Factor Authentication, adds an extra layer of protection by requiring users to provide multiple forms of verification before gaining access to cloud applications. This can involve factors such as app passwords, phone sign-in, or authentication tokens. On the other hand, Conditional Access allows for more granular control over access policies based on factors like user status, device trust level, or location. By setting up Conditional Access Policies, organizations can ensure that only authorized users on trusted devices are able to access sensitive information. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Security Defaults play a key role in enhancing security measures by enforcing strong authentication requirements across an organization. In cases where legacy applications or authentication protocols are still in use, Conditional Access MFA can help bridge the gap by providing a more modern approach to security. Additionally, the use of multifactor authentication options, such as Require Multi-Factor Authentication, can further strengthen security measures and protect against potential threats like password spray attacks. <\/span><span style=\"font-size: revert; color: initial;\">It is important for organizations to consider the various factors and options available when selecting the most appropriate authentication method for their needs. By understanding the benefits and differences between Per-User MFA and Conditional Access, organizations can implement the necessary security measures to safeguard their data and resources effectively.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a critical security measure that helps protect cloud applications and prevent unauthorized access to sensitive data. Azure AD MFA, a legacy authentication protocol, offers layers of authentication for users, making it a recommended security setting for organizations using cloud apps like Office 365. To enable MFA, users can select user roles in Azure MFA and configure service settings to add an additional authentication step during the registration process. Azure Active Directory Multi-Factor Authentication also provides advanced security measures, such as proof of security and security score, to shield against security vulnerabilities. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">On the other hand, Conditional Access Policies allow organizations to tailor access controls based on user roles, platforms, locations, and conditional access conditions. Role-based CA policies, like risk-based Conditional Access, can help mitigate security risks by enforcing MFA status and providing insightful reports for administrators. Overall, implementing both Per-User MFA and Conditional Access Policies can enhance the security posture of an organization by providing essential tools, accurate reports, and a comprehensive approach to authentication. Source: Microsoft Azure documentation<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Per-User_MFA_vs_Conditional_Access_Key_Differences\"><\/span>Per-User MFA vs Conditional Access: Key Differences<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th><\/th>\n<th>Per-User MFA<\/th>\n<th>Conditional Access<\/th>\n<\/tr>\n<tr>\n<td>Security Measure<\/td>\n<td>Multi-Factor Authentication<\/td>\n<td>Access Control Policies<\/td>\n<\/tr>\n<tr>\n<td>Authentication<\/td>\n<td>User-specific authentication steps<\/td>\n<td>Access control based on criteria<\/td>\n<\/tr>\n<tr>\n<td>Implementation<\/td>\n<td>Additional layer for individual users<\/td>\n<td>Granular control over access policies<\/td>\n<\/tr>\n<tr>\n<td>Use Cases<\/td>\n<td>High-risk scenarios requiring strong authentication<\/td>\n<td>Targeted protection based on risk factors<\/td>\n<\/tr>\n<tr>\n<td>Benefits<\/td>\n<td>Enhanced individual account security<\/td>\n<td>Control over user access and data protection<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What\u200c is Per-User MFA \u200cand Conditional Access?<br \/>\nA:\u200d Per-User MFA and Conditional \u200bAccess are a way for businesses to make sure their digital information is secure. Per-User\u2064 MFA stands for Multi-Factor Authentication and requires users to\u200b provide an extra layer of security when\u2063 they log in. Conditional Access adds additional security by controlling which\u2063 users can access what information.<\/p>\n<p>Q: How are\u2063 Per-User MFA and Conditional Access used?<br \/>\nA: \u200dPer-User MFA requires users to enter\u200c two or more \u200csteps when logging in, such as a \u200bpassword plus a one-time code sent via email or text. \u2062Conditional Access can be set \u2064so that only certain users will be able\u200d to access certain \u200dareas of an organization\u2019s digital information.<\/p>\n<p>Q: What are the\u200c benefits of using Per-User MFA and Conditional Access?<br \/>\nA: Using \u2062Per-User MFA and Conditional Access can help protect a business\u2019s important data by making it harder for \u2062unauthorized users to access\u2062 it. It also means that businesses can set restrictions on what certain users can access, as well as provide a higher level of security for sensitive areas of their information.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"00d1c240-6096-48dc-8e67-f1e11a3139f6\" data-message-model-slug=\"gpt-4o-mini\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Evaluating the advantages and disadvantages of Per-User MFA and Conditional Access will help you determine the best approach for your organization. You can safeguard critical business data through a multi-layered security strategy without sacrificing user experience. Enhance your security further by creating a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account to implement two-factor authentication (2FA) with per-user multi-factor authentication (MFA) and leverage Conditional Access policies for comprehensive endpoint protection. LogMeOnce&#8217;s per-user MFA and Conditional Access policies deliver robust, layered security for every user, effectively shielding your organization from threats like phishing, malware, and more.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>When comparing Per-User MFA and Conditional Access, it&#8217;s essential to understand their unique benefits. For added security, create a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring. Enhance your online security with MFA and Conditional Access features today!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[4019,21820,935,20803,21821,1294],"class_list":["post-74619","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-accesscontrol","tag-conditionalaccess","tag-cybersecurity","tag-multifactorauth","tag-per-usermfa","tag-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/74619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=74619"}],"version-history":[{"count":4,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/74619\/revisions"}],"predecessor-version":[{"id":230234,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/74619\/revisions\/230234"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=74619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=74619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=74619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}