{"id":3933,"date":"2019-03-25T19:33:45","date_gmt":"2019-03-25T16:33:45","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3933"},"modified":"2025-08-11T22:12:41","modified_gmt":"2025-08-11T19:12:41","slug":"keycloak-multi-factor-authentication-hardware-tokens","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/keycloak-multi-factor-authentication-hardware-tokens\/","title":{"rendered":"Keycloak Multi-Factor Authentication With Hardware Tokens"},"content":{"rendered":"\n<p>Nowadays, when hackers constantly look for vulnerabilities, while more and more aspects of life are being digitized, cyber security is of utmost importance and every app developer has to pay special attention to access management.<br><\/p>\n\n\n\n<p><a href=\"https:\/\/www.keycloak.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Keycloak<\/a> is one of the most ingenious solutions created with app developers in mind. It provides an elegant and easy way <g class=\"gr_ gr_4 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace\" id=\"4\" data-gr-id=\"4\">for<\/g> securing modern applications and services.<br><\/p>\n\n\n\n<p>With Keycloak comes an easy to roll out Multi-Factor Authentication (MFA) with one-time passwords (OTP). By default, Keycloak multi-factor authentication supports time-based OTP (TOTP) delivered via an <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">authenticator app<\/a> only.<br><\/p>\n\n\n\n<p>But for those who want to add an extra layer of security for their users, there is a perfect solution \u2014 reprogrammable token Protectimus Slim NFC. This token is, basically, programmed to be utilized as a replacement for the mobile authentication app.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/www.protectimus.com\/token\/slim\/\" style=\"background-color:#269400\" target=\"_blank\" rel=\"noreferrer noopener\">Buy hardware token for Keycloak MFA<\/a><\/div>\n\n\n\n<p>Below we provide detailed instructions on:<\/p>\n\n\n<p><a name=\"Keycloak multi-factor authentication configuration\"><\/a><\/p>\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#Keycloak multi-factor authentication configuration\">how to configure Keycloak MFA<\/a><\/li>\n\n\n\n<li><a href=\"#Keycloak two-factor authentication with hardware tokens\">how your users will set up their hardware Keycloak token Protectimus Slim NFC<\/a><\/li>\n\n\n\n<li><a href=\"#Keycloak OTP via SMS, email, hard tokens, chatbots\">how to run Keycloak 2FA with other ways of authentication (SMS, email, hardware tokens, chatbots)<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keycloak multi-factor authentication configuration<\/strong><\/h2>\n\n\n\n<p>Configuring Keycloak multi-factor <g class=\"gr_ gr_11 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace\" id=\"11\" data-gr-id=\"11\">authentica<\/g>tion is very easy and won\u2019t take a lot of your time. Basically, all you need to do is enforce both your existing users and your new users to use one time passwords.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enforcing existing user:<\/h3>\n\n\n\n<p>Go to your Keycloak admin area, find \u201cUsers\u201d in the sidebar menu and select a user from your list. Then navigate to the \u201cDetails\u201d tab and select \u201cConfigure OTP\u201d in the \u201cRequired User Actions\u201d section:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5027 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-existing-users-1.png\" alt=\"Keycloak multi-factor authentication configuration - enforcing existing user\" width=\"719\" height=\"441\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-existing-users-1.png 719w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-existing-users-1-300x184.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-existing-users-1-610x374.png 610w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enforcing new users:<\/h3>\n\n\n\n<p>Select \u201cAuthentication\u201d in the sidebar menu in the Keycloak admin area, then find the \u201cRequired action\u201d tab, in the top row (\u201cConfigure OTP\u201d) check \u201cDefault action\u201d.<\/p>\n\n\n<p><a name=\"Keycloak two-factor authentication with hardware tokens\"><\/a><\/p>\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"221\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-new-users.png\" alt=\"Keycloak multi-factor authentication configuration - enforcing new users\" class=\"wp-image-3935\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-new-users.png 650w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-new-users-300x102.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-multi-factor-authentication-configuration-enforcing-new-users-610x207.png 610w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keycloak two-factor authentication with hardware tokens<\/strong><\/h2>\n\n\n\n<p>To hook up <a href=\"https:\/\/www.protectimus.com\/token\/slim\/\" title=\"\">Protectimus Slim NFC<\/a> to Keycloak the following OTP Policies have to be applied: SHA1, TOTP, 30 or 60 seconds period.<br><\/p>\n\n\n\n<p>Find the \u201cOTP Policy\u201d tab in your \u201cAuthentication\u201d section in the Keycloak admin area and adjust the required parameters as follows, don\u2019t forget to click the \u201cSave\u201d button:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5026 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-1.png\" alt=\"Keycloak two-factor authentication with hardware tokens setup\" width=\"711\" height=\"367\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-1.png 711w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-1-300x155.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-1-610x315.png 610w\" sizes=\"auto, (max-width: 711px) 100vw, 711px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Now your users will be able to follow these simple steps to add Protectimus Slim as the second factor when logging into your apps or services:<br><\/p>\n\n\n\n<p>1. Download <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.protectimus.totpburner.nfc&amp;hl=en_US\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus TOTP Burner<\/a> application.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"205\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-Protectimus-TOTP-Burner-app-download.png\" alt=\"Keycloak multi-factor authentication with hardware token: set up Protectimus Slim NFC - download Protectimus TOTP Burner\" class=\"wp-image-3937\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-Protectimus-TOTP-Burner-app-download.png 688w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-Protectimus-TOTP-Burner-app-download-300x89.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-Protectimus-TOTP-Burner-app-download-610x182.png 610w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>2. Launch our application, click \u201cBurn the seed\u201d, then select the \u201cScan the QR code\u201d option:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"409\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step1-step2.png\" alt=\"Keycloak multi-factor authentication with hardware token: set up Protectimus Slim NFC - burn the seed, scan the QR code\" class=\"wp-image-3938\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step1-step2.png 609w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step1-step2-300x201.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step1-step2-140x94.png 140w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>3. After completing the usual login process with username and password the user will have to set up the Mobile Authenticator. This is where they will get the QR code:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5024 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-QR-code-1.png\" alt=\"Keycloak multi-factor authentication with hardware token: set up Protectimus Slim NFC - find QR code\" width=\"710\" height=\"352\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-QR-code-1.png 710w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-QR-code-1-300x149.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-QR-code-1-610x302.png 610w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>4. After the code scanning is done the user needs to turn the token on, place it within the mobile\u2019s NFC antenna range and click \u201cContinue\u201d:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"353\" height=\"397\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step3.png\" alt=\"Keycloak multi-factor authentication with hardware token: set up Protectimus Slim NFC - burning seed\" class=\"wp-image-3940\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step3.png 353w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-TOTP-Burner-step3-267x300.png 267w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>5. After the application provides the confirmation message, Protectimus Slim NFC can be used with your Keycloak protected application or service using Keycloak multi-factor authentication:<\/p>\n\n\n<p><a name=\"Keycloak OTP via SMS, email, hard tokens, chatbots\"><\/a><\/p>\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"718\" height=\"140\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-one-time-code-entry-field.png\" alt=\"Keycloak multi-factor authentication with hardware token: set up Protectimus Slim NFC - One-time code entry field\" class=\"wp-image-3941\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-one-time-code-entry-field.png 718w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-one-time-code-entry-field-300x58.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/03\/Keycloak-two-factor-authentication-hardware-tokens-setup-one-time-code-entry-field-610x119.png 610w\" sizes=\"auto, (max-width: 718px) 100vw, 718px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keycloak OTP via SMS, email, hard tokens, chatbots<\/strong><\/h2>\n\n\n\n<p>Out of the box, Keycloak is an awesome solution for managing security and access. But integrating it with <a href=\"https:\/\/www.protectimus.com\/how-it-works\">Protectimus multifactor authentication service<\/a> will expand your protection options, provide more features and make your apps and services truly bulletproof.<br><\/p>\n\n\n\n<p>With Protectimus you will be able to add any <a href=\"https:\/\/www.protectimus.com\/tokens\">MFA method<\/a> you wish: Keycloak two-factor authentication via email, hardware tokens with hardcoded keys (these are cheaper than the reprogrammable ones), Keycloak 2fa SMS, and even capability to deliver OTP via chatbots in various messengers.<br><\/p>\n\n\n\n<p>But what\u2019s more important, you\u2019ll get a set of advanced Protectimus 2-factor authentication security features. Let\u2019s take a closer look at the most important <a href=\"https:\/\/www.protectimus.com\/features\">features Protectimus authentication solution has to offer<\/a>.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data signing (CWYS \u2014 Confirm What You See)<br><\/h3>\n\n\n\n<p>This is a very effective way to protect sensitive data from phishing software, Trojans and various other harmful software injections aimed to steal one-time passwords.<br><\/p>\n\n\n\n<p><a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">CWYS data signing feature<\/a> generates OTPs in reliance <g class=\"gr_ gr_8 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace\" id=\"8\" data-gr-id=\"8\">with<\/g> the actions the user is performing. This way, the generated OTP can only be used to sanction the one specific operation, which the user was doing when the OTP was generated. Even in a highly unlikely <g class=\"gr_ gr_9 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep\" id=\"9\" data-gr-id=\"9\">case<\/g> the password is somehow intercepted, the criminals can&#8217;t use it to confirm an unauthorized operation, it simply won\u2019t work.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Geographic filters<br><\/h3>\n\n\n\n<p>By implementing this ingenious filter you can both allow and block entry to users from particular countries of your choosing.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Time-based filters<br><\/h3>\n\n\n\n<p>This feature is great for granting access to corporate environments. With it, you can allow users access only at certain hours, for example \u2014 working hours. This way the corporate portal is protected against unauthorized access much better.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Adaptive authentication<br><\/h3>\n\n\n\n<p>This smart feature is great for those who need to constantly log in and out of a system and the access rules are not extremely strict, where some amount of trust is allowed. With this feature on, Protectimus will analyze the users\u2019 environment (OS and language, browser name and current version, resolution of their screen, the presence of certain plugins etc) and will request OTP only if there\u2019s a significant mismatch.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Role-based access policies<br><\/h3>\n\n\n\n<p>This allows for creating different groups of users and assigning different access protocols for these groups in the same Protectimus account. So you can have one type of access protection for end-users and a completely different one for administrators, for example.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Users self-service<br><\/h3>\n\n\n\n<p>By allowing users to handle their own tokens you take the extra work-load off the system administrator and save your funds.<br><\/p>\n\n\n\n<p>As you can see, integrating Protectimus multifactor authentication service with Keycloak allows for a much more versatile approach to protecting and managing access to your apps and services.<br><\/p>\n\n\n\n<p>Protectimus is available both as an On-Premise Platform and a Cloud Service, the integration is done via API.<br><\/p>\n\n\n\n<p>The pricing will pleasantly surprise you, for example, you can have up to 10 users completely free of charge. To learn more about Protectimus pricing plans go <a href=\"https:\/\/www.protectimus.com\/pricing\">here<\/a>.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read also:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">Office 365 MFA Hardware Token<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">Man In The Middle Attack Prevention And Detection<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/byod-security-rules\/\">10 Basic BYOD Security Rules<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">4 Reasons Two-Factor Authentication Isn\u2019t a Panacea<\/a><\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Nowadays, when hackers constantly look for vulnerabilities, while more and more aspects of life are being digitized, cyber security is of utmost importance and every app developer has to pay special attention to access management. Keycloak is one of the most ingenious solutions created with app developers in mind. It provides an elegant and easy [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15],"tags":[1350,120,194,335,421,139,99],"class_list":["post-3933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","tag-keycloak-en","tag-multifactor-authentication","tag-protectimus-en","tag-protectimus-slim-nfc-en","tag-setup-guides","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3933"}],"version-history":[{"count":18,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3933\/revisions"}],"predecessor-version":[{"id":9120,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3933\/revisions\/9120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5022"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}