{"id":98356,"date":"2024-07-17T12:04:43","date_gmt":"2024-07-17T10:04:43","guid":{"rendered":"https:\/\/firstcolo.net\/glossary\/authentication\/"},"modified":"2026-03-12T23:54:21","modified_gmt":"2026-03-12T22:54:21","slug":"authentication","status":"publish","type":"glossary","link":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/","title":{"rendered":"Authentication"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"98356\" class=\"elementor elementor-98356 elementor-54970\" data-elementor-post-type=\"glossary\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1596e3c7 e-flex e-con-boxed e-con e-parent\" data-id=\"1596e3c7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-15305f3 e-con-full e-flex e-con e-child\" data-id=\"15305f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a0d552c e-con-full e-flex e-con e-child\" data-id=\"a0d552c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-69624bb e-con-full e-flex e-con e-child\" data-id=\"69624bb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-deaf4c2 e-con-full e-flex e-con e-child\" data-id=\"deaf4c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16b4894 elementor-widget elementor-widget-heading\" data-id=\"16b4894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is Authentication?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30368df elementor-widget elementor-widget-text-editor\" data-id=\"30368df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAuthentication is the process that verifies whether the information a person or entity provides about themselves is truthful. There are various methods for this. The sensitivity of the affected data and digital resources should determine which method users employ to confirm their identity.  \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62792cd6 e-flex e-con-boxed e-con e-parent\" data-id=\"62792cd6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1635c99a elementor-widget elementor-widget-heading\" data-id=\"1635c99a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Categories for Authentication<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d5d9723 elementor-widget elementor-widget-heading\" data-id=\"1d5d9723\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Knowledge Factors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-573d68d5 elementor-widget elementor-widget-text-editor\" data-id=\"573d68d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>These include information that the user knows, for example:<\/p><ul><li>Passwords<\/li><li>One-time passcodes (OTPs)<\/li><li>Answers to security questions<\/li><li>Personal identification numbers (PINs)<\/li><\/ul><p><strong>Advantage<\/strong>: Easy to implement.<\/p><p><strong>Disadvantage<\/strong>: Users can forget the information or it can be stolen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-777dbd5 elementor-widget elementor-widget-heading\" data-id=\"777dbd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Possession Factors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6c7f7e elementor-widget elementor-widget-text-editor\" data-id=\"f6c7f7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>These include objects that the user possesses:<\/p><ul><li>Key fobs<\/li><li>Smart cards<\/li><li>Mobile devices<\/li><li>Hardware tokens<\/li><\/ul><p><strong>Advantage<\/strong>: Cannot be stolen remotely.<\/p><p><strong>Disadvantage<\/strong>: An alternative is required in case of defect or loss.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f217d2 elementor-widget elementor-widget-heading\" data-id=\"6f217d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Inherence Factors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21dddb7d elementor-widget elementor-widget-text-editor\" data-id=\"21dddb7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>These refer to physical or behavioral characteristics of the user:<\/p><ul><li>Fingerprint<\/li><li>Voice recognition<\/li><li>Iris scan<\/li><li>Facial recognition<\/li><li>Handwriting<\/li><\/ul><p><strong>Advantage<\/strong>: Unforgettable.<\/p><p><strong>Disadvantage<\/strong>: May only work with specific devices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-342f366 elementor-widget elementor-widget-heading\" data-id=\"342f366\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Authentication Methods<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f45369 elementor-widget elementor-widget-text-editor\" data-id=\"7f45369\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>There are various methods and technologies for authenticating users. Two different objectives must be balanced: On the one hand, sensitive data should be protected as effectively as possible. On the other hand, user-friendliness plays a role, as users should not have to overcome unnecessary hurdles.  <\/p><p>The most common methods include:<\/p><ul><li><strong>Single-Factor Authentication<\/strong> (SFA): Only a single factor is used here.<\/li><li><strong>Two-Factor Authentication<\/strong> (<a href=\"https:\/\/www.firstcolo.net\/glossar\/2fa\" target=\"_blank\" rel=\"noopener\">2FA<\/a>): This method combines two factors from different categories.<\/li><li><strong>Multi-Factor Authentication<\/strong> (<a href=\"https:\/\/www.firstcolo.net\/glossar\/mfa\" target=\"_blank\" rel=\"noopener\">MFA<\/a>): The user must use multiple factors to identify themselves. This further increases security. <\/li><li><strong>Passwordless<\/strong>: Methods that do not require passwords to confirm identity.<\/li><li><strong>Risk-based<\/strong>: Verification is performed based on a risk analysis that grants or denies access depending on the determined risk.<\/li><li><strong>Certificate-based<\/strong>: Digital certificates confirm possession of a private key, allowing users to verify their identity with it.<\/li><li><strong>Token-based<\/strong>: Users receive a token after verification that allows access to specific resources for a limited time.<\/li><li><strong>Single Sign-On<\/strong> (SSO): Here, users can log in to multiple applications and services with a single set of credentials.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10664375 e-con-full e-flex e-con e-child\" data-id=\"10664375\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-498f1a5e elementor-widget elementor-widget-button\" data-id=\"498f1a5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Home<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-590ea87e elementor-widget elementor-widget-button\" data-id=\"590ea87e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/firstcolo.net\/en\/knowledge\/glossary\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Glossary<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Authentication? Authentication is the process that verifies whether the information a person or entity provides about themselves is truthful. There are various methods for this. The sensitivity of the affected data and digital resources should determine which method users employ to confirm their identity. Information Categories for Authentication Knowledge Factors These include information [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":97354,"menu_order":0,"template":"","meta":{"content-type":"","footnotes":""},"glossary-categories":[],"glossary-tags":[],"class_list":["post-98356","glossary","type-glossary","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Authentication? | firstcolo Glossary<\/title>\n<meta name=\"description\" content=\"Authentication is the process of verifying whether the information a person or entity provides about themselves is truthful.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authentication\" \/>\n<meta property=\"og:description\" content=\"Authentication is the process of verifying whether the information a person or entity provides about themselves is truthful.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"firstcolo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FirstColo.GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T22:54:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@firstcolo\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/\",\"url\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/\",\"name\":\"What is Authentication? | firstcolo Glossary\",\"isPartOf\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"datePublished\":\"2024-07-17T10:04:43+00:00\",\"dateModified\":\"2026-03-12T22:54:21+00:00\",\"description\":\"Authentication is the process of verifying whether the information a person or entity provides about themselves is truthful.\",\"breadcrumb\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#primaryimage\",\"url\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"contentUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"width\":1500,\"height\":1000,\"caption\":\"firstcolo Glossary\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\/\/firstcolo.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/firstcolo.net\/en\/#website\",\"url\":\"https:\/\/firstcolo.net\/en\/\",\"name\":\"firstcolo\",\"description\":\"firstcolo.net\",\"publisher\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/firstcolo.net\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/firstcolo.net\/en\/#organization\",\"name\":\"firstcolo\",\"url\":\"https:\/\/firstcolo.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg\",\"contentUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg\",\"width\":118,\"height\":23,\"caption\":\"firstcolo\"},\"image\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/FirstColo.GmbH\",\"https:\/\/x.com\/firstcolo\",\"https:\/\/www.instagram.com\/accounts\/login\/?next=httpswww.instagram.comfirstcolo&is_from_rle\",\"https:\/\/www.linkedin.com\/company\/firstcolo\/posts\/?feedView=all\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Authentication? | firstcolo Glossary","description":"Authentication is the process of verifying whether the information a person or entity provides about themselves is truthful.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/","og_locale":"en_US","og_type":"article","og_title":"Authentication","og_description":"Authentication is the process of verifying whether the information a person or entity provides about themselves is truthful.","og_url":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/","og_site_name":"firstcolo","article_publisher":"https:\/\/www.facebook.com\/FirstColo.GmbH","article_modified_time":"2026-03-12T22:54:21+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@firstcolo","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/","url":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/","name":"What is Authentication? | firstcolo Glossary","isPartOf":{"@id":"https:\/\/firstcolo.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#primaryimage"},"image":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","datePublished":"2024-07-17T10:04:43+00:00","dateModified":"2026-03-12T22:54:21+00:00","description":"Authentication is the process of verifying whether the information a person or entity provides about themselves is truthful.","breadcrumb":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/firstcolo.net\/en\/glossary\/authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#primaryimage","url":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","contentUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","width":1500,"height":1000,"caption":"firstcolo Glossary"},{"@type":"BreadcrumbList","@id":"https:\/\/firstcolo.net\/en\/glossary\/authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/firstcolo.net\/en\/"},{"@type":"ListItem","position":2,"name":"Authentication"}]},{"@type":"WebSite","@id":"https:\/\/firstcolo.net\/en\/#website","url":"https:\/\/firstcolo.net\/en\/","name":"firstcolo","description":"firstcolo.net","publisher":{"@id":"https:\/\/firstcolo.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/firstcolo.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/firstcolo.net\/en\/#organization","name":"firstcolo","url":"https:\/\/firstcolo.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg","contentUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg","width":118,"height":23,"caption":"firstcolo"},"image":{"@id":"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FirstColo.GmbH","https:\/\/x.com\/firstcolo","https:\/\/www.instagram.com\/accounts\/login\/?next=httpswww.instagram.comfirstcolo&is_from_rle","https:\/\/www.linkedin.com\/company\/firstcolo\/posts\/?feedView=all"]}]}},"_links":{"self":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":1,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98356\/revisions"}],"predecessor-version":[{"id":98357,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98356\/revisions\/98357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/media\/97354"}],"wp:attachment":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/media?parent=98356"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary-categories?post=98356"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary-tags?post=98356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}