{"id":3886,"date":"2022-08-02T11:09:56","date_gmt":"2022-08-02T08:09:56","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3886"},"modified":"2025-08-11T22:10:33","modified_gmt":"2025-08-11T19:10:33","slug":"hardware-token-azure-mfa","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/","title":{"rendered":"Hardware Tokens for Azure MFA"},"content":{"rendered":"\n<p>There are currently two ways to implement an Azure hardware token for Azure Multi-Factor Authentication:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>With classic OATH tokens for Azure MFA with hard-coded secret keys, such as<a href=\"https:\/\/www.protectimus.com\/token\/two\/\" title=\"\"> Protectimus Two<\/a>. To make use of one of these you\u2019ll need Azure AD Premium P1 or P2 license.<\/li>\n\n\n\n<li>With a programmable hardware token for Azure MFA <a href=\"https:\/\/www.protectimus.com\/token\/slim\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Protectimus Slim NFC<\/a>  or <a href=\"https:\/\/www.protectimus.com\/token\/flex\/\" title=\"\">Protectimus Flex<\/a> which is a replacement for an authentication app from Microsoft. This Azure cloud MFA hardware token does not require a premium subscription account.<\/li>\n<\/ul>\n\n\n\n<p>In this article, we will describe how to set up both types of hardware tokens for Azure token-based authentication. All three devices can be bought <a href=\"https:\/\/www.protectimus.com\/tokens\/?ref=Azure-MFA-token-article-link\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">here<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-28206b41 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.protectimus.com\/tokens\/\" target=\"_blank\" rel=\"noreferrer noopener\">Buy hardware token for Azure MFA<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Classic OATH hardware tokens for Azure MFA &#8211; how to set up<\/strong><\/h2>\n\n\n\n<p>Currently, Azure AD supports tokens with passwords not longer than 128 characters and password life-span of 30 and 60 seconds. <a href=\"https:\/\/www.protectimus.com\/token\/two\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Protectimus Two<\/a> hardware OTP tokens fit these requirements.<\/p>\n\n\n\n<p>Once you choose and receive the Azure MFA OATH token you prefer you need to register your token with Azure. Below is the step-by-step guide on this simple process:<\/p>\n\n\n\n<p><strong>Step 1<\/strong>. Prepare a CSV file that includes your UPN (<a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/secauthn\/user-name-formats\" target=\"_blank\">user principal name<\/a>), the serial number of the hardware token Azure MFA, the seed (secret key), time interval, make and model of the Azure AD MFA hardware token. Make sure to include a header row, the result should look something like this: <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5854 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/csv-file-for-oath-tokens-in-azure-mfa.png\" alt=\"How to add OATH tokens to Azure MFA\" width=\"632\" height=\"67\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/csv-file-for-oath-tokens-in-azure-mfa.png 632w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/csv-file-for-oath-tokens-in-azure-mfa-300x32.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/csv-file-for-oath-tokens-in-azure-mfa-610x65.png 610w\" sizes=\"auto, (max-width: 632px) 100vw, 632px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Step 2<\/strong>. Once the CSV file is created and properly formatted it has to be imported. Go to <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/aad.portal.azure.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Azure Portal<\/a> and browse to Azure Active Directory, then to Security and to Multi-Factor Authentication. On the MFA page choose <a href=\"https:\/\/aad.portal.azure.com\/?l=en.en-us#blade\/Microsoft_AAD_IAM\/MultifactorAuthenticationMenuBlade\/HardwareTokens\/fromProviders\/\">OATH tokens<\/a> and click the \u201cUpload\u201d button. Upload your CSV file; the upload process might take a few minutes.<br><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5834 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-hardware-token-setup-step2-2.png\" alt=\"Azure two-factor authentication hardware tokens setup\" width=\"970\" height=\"474\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-hardware-token-setup-step2-2.png 970w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-hardware-token-setup-step2-2-300x147.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-hardware-token-setup-step2-2-768x375.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-hardware-token-setup-step2-2-610x298.png 610w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Step 3<\/strong>. Click the \u201cRefresh\u201d button. If the CSV file was uploaded successfully you will see a list of your Azure AD hardware tokens, if the file had an error you will be notified on the same page:<br><\/p>\n\n\n\n<p>File uploaded successfully:<br><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5835 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1.png\" alt=\"Azure Multi Factor authentication Oath hardware tokens setup\" width=\"1588\" height=\"378\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1.png 1588w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1-300x71.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1-1024x244.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1-768x183.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1-1536x366.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-1-1-610x145.png 610w\" sizes=\"auto, (max-width: 1588px) 100vw, 1588px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>File uploaded with errors:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5836 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2.png\" alt=\"Azure 2-factor authentication OATH hardware tokens\" width=\"1600\" height=\"369\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2.png 1600w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2-300x69.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2-1024x236.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2-768x177.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2-1536x354.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-MFA-OATH-token-setup-step3-2-610x141.png 610w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Step 4.<\/strong> Now you need to activate your Azure multi-factor authentication hardware token. If you have multiple tokens, you should activate them one by one. Click the \u201cActivate\u201d button at the lattermost column on the right and enter the password generated by the corresponding Azure MFA token. After that, click the \u201cVerify\u201d button.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5838 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1.png\" alt=\"Azure OATH tokens setup\" width=\"1622\" height=\"926\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1.png 1622w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1-300x171.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1-1024x585.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1-768x438.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1-1536x877.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Azure-multi-factor-authentication-activate-OATH-token-step4-1-610x348.png 610w\" sizes=\"auto, (max-width: 1622px) 100vw, 1622px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Step 5. <\/strong>Once the MFA server accepts your one-time password you will get a message confirming the activation of the Microsoft Azure token you selected from the list and there should appear a check mark in the corresponding \u201cActivated\u201d column. Now your token is successfully activated and can be used to log in.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5840 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1.png\" alt=\"OATH tokens for Azure MFA setup - activated\" width=\"1621\" height=\"363\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1.png 1621w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1-300x67.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1-1024x229.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1-768x172.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1-1536x344.png 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/OATH-hardware-tokens-Azure-MFA-setup-step5-1-610x137.png 610w\" sizes=\"auto, (max-width: 1621px) 100vw, 1621px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Step 6.<\/strong> 2FA settings in the user account.<\/p>\n\n\n\n<p>OATH tokens will be automatically set as a main 2FA method. <\/p>\n\n\n\n<p><strong>NOTE!<\/strong> If any other 2-factor authentication method is registered for a user, they can use several two-factor authentication methods at once. For example, I activated a 2FA app Protectimus SMART as a 2FA methos, in this case, both one-time passwords from hardware token and 2FA app will work when I enter any of them in this field:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"458\" height=\"407\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-7.png\" alt=\"Azure MFA OATH token setup - step 7\" class=\"wp-image-8182\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-7.png 458w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-7-300x267.png 300w\" sizes=\"auto, (max-width: 458px) 100vw, 458px\" \/><\/a><\/figure><\/div>\n\n\n<p>If you want to use only a hardware OATH token for Azure 2-factor authentication, login to your account and deactivate other two-factor authentication methods.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to your account settings page at&nbsp;<a href=\"https:\/\/myaccount.microsoft.com\/?ref=MeControl\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/myaccount.microsoft.com\/?ref=MeControl<\/a><\/li>\n\n\n\n<li>Navigate to the&nbsp;<strong>Security Info<\/strong>&nbsp;tab.<\/li>\n\n\n\n<li>Delete two-factor authentication methods you don&#8217;t need.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"354\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8-1024x354.png\" alt=\"Azure MFA OATH token setup - step 8\" class=\"wp-image-8183\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8-1024x354.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8-300x104.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8-768x265.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8-610x211.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2022\/08\/oath-tokens-to-azure-mfa-step-8.png 1335w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<\/p>\n<h2 class=\"wp-block-heading\"><strong>Programmable hardware tokens for Azure MFA <\/strong><\/h2>\n<p>\n\n\n\n<\/p>\n<p>As has already been mentioned above &#8211; to use a classic Microsoft Azure MFA hardware token you need to have a premium subscription. But we know that not everyone is ready to pay 6 euros per month per one user. If you are not ready to pay too, programmable hardware tokens <a href=\"https:\/\/www.protectimus.com\/token\/slim\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Slim NFC<\/a> or <a href=\"https:\/\/www.protectimus.com\/flex\/?ref=Azure-MFA-token-article-link\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Flex<\/a> is the way to go for you. These tokens are recognized as authentication apps by the Azure MFA system, so you do not need a premium license to use them.<\/p>\n<p>\n\n\n\n<\/p>\n<p>Adding Protectimus Slim NFC or Protectimus Flex as a recognized second factor of authentication to your Azure MFA is pretty straightforward. All you need to do is log into the <a href=\"https:\/\/account.activedirectory.windowsazure.com\/Proofup.aspx\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">MFA setup page<\/a>, configure the authentication to recognize your Azure authentication token and program the device itself to be used for Azure MFA. The whole process takes mere minutes and is described in detail <a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">here<\/a>.<\/p>\n<p>\n\n\n\n<\/p>\n<h2 class=\"wp-block-heading\"><strong>Common questions<\/strong><\/h2>\n<p>\n\n\n\n<p><\/p>\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>1. What about time-drift support in Azure MFA?<\/strong><\/strong><p><\/p>\n<p class=\"schema-faq-answer\">Microsoft does not provide any exact info on time drift with Azure MFA, but the implementation has been said to be based on RFC 6238 which suggests that the time drift is indeed supported. Azure MFA allows one-time passwords within a time range of 900 seconds, this means time drift support is not really necessary. But if you&#8217;d like to keep time drift issue under control, use Protectimus Slim NFC or Protectimus Flex tokens, which have a time synchronization feature now. The time is resynchronized when a secret key is flashed to the token.<\/p>\n<p><\/p>\n<\/div>\n<div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>2. Why hardware token is better for Azure MFA than 2FA apps, SMS, and phone calls?<\/strong><\/strong><p><\/p>\n<p class=\"schema-faq-answer\">A hardware token is by far the most bulletproof protection you can get for your data stored on a cloud. Such a device generates secure passwords without and needs no network connection whatsoever. With a hardware token you have an impenetrable wall between your data and anyone who tries to steal it. There\u2019s simply no way for hackers to infect the device or intercept the generated codes. And if a hardware token is stolen or lost you most probably will notice it immediately, whereas with an infected app or intercepted SMS you might not know any damage is done before it\u2019s too late.<\/p>\n<p><\/p>\n<\/div>\n<div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>3. Can I order hardware token with my company logo?<\/strong><\/strong><p><\/p>\n<p class=\"schema-faq-answer\">If you want Protectimus Slim NFC you can have the device branded even if your order is as small as one token. With Protectimus TWO custom branding is offered for orders over 1000 devices.<\/p>\n<p><\/p>\n<\/div>\n<div class=\"schema-faq-section\"><strong class=\"schema-faq-question\"><strong>4. Does Protectimus Slim NFC support multiple secret keys (seeds)?<\/strong><\/strong><p><\/p>\n<p class=\"schema-faq-answer\">No, this token allows for one seed at a time. But Protectimus Slim NFC can be programmed to work for a different resource once you stop using the one you initially programmed it for.<\/p>\n<p><\/p>\n<\/div>\n<\/div>\n<p>\n\n\n<\/p>\n\n\n<\/p>\n<h2 class=\"wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n<p>\n\n\n\n<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">Office 365 MFA Hardware Token<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/program-protectimus-slim-nfc\/\">How to Program Protectimus Slim NFC Token<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/why-universities-choose-hardware-tokens\/\">Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">4 Reasons Two-Factor Authentication Isn\u2019t a Panacea<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/windows-computer-safety-tips\/\">Windows Computer Safety Tips<\/a><\/li>\n<\/ul>\n<p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>There are currently two ways to implement an Azure hardware token for Azure Multi-Factor Authentication: In this article, we will describe how to set up both types of hardware tokens for Azure token-based authentication. All three devices can be bought here. Classic OATH hardware tokens for Azure MFA &#8211; how to set up Currently, Azure [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":4238,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,329],"tags":[1048,1302,335,1286,421,139],"class_list":["post-3886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-setup-guides","tag-azure-mfa-en","tag-protectimus-crystal-en","tag-protectimus-slim-nfc-en","tag-protectimus-two-en","tag-setup-guides","tag-tokens"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3886"}],"version-history":[{"count":38,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3886\/revisions"}],"predecessor-version":[{"id":9118,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3886\/revisions\/9118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4238"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}