{"id":384,"date":"2025-01-28T15:46:46","date_gmt":"2025-01-28T15:46:46","guid":{"rendered":"https:\/\/phishia.fr\/?p=384"},"modified":"2025-11-21T14:57:38","modified_gmt":"2025-11-21T14:57:38","slug":"double-authentication","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/double-authentication\/","title":{"rendered":"Double authentication"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"h.hpt25ft25cbo_l\">What is dual authentication?<\/h2>\n\n\n\n<p>Double authentication, also known as two-factor authentication (2FA) or multi-factor authentication (MFA), is a security mechanism that adds an extra layer of protection to traditional authentication based on a single factor, usually a password. With dual authentication, users must provide two different types of information to verify their identity and access an account or system.<\/p>\n\n\n\n<p>Typically, dual authentication combines something the user knows (such as a password) with something they possess (such as a code generated by an authentication application on a smartphone) or something they are (such as a fingerprint or facial recognition). When a user attempts to log in to an account or system protected by dual authentication, they must provide both their password and a second authentication factor before being allowed access.<\/p>\n\n\n\n<p>Dual authentication is widely used to strengthen the security of online accounts, online banking, messaging applications and other sensitive systems, as it makes it more difficult for hackers to compromise accounts even if they have managed to guess or steal a password. By adding this extra layer of security, dual authentication significantly reduces the risk of security breaches and online fraud.<\/p>\n\n\n\n<p><a href=\"\/en\/contact\/\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.nyncwod3sws6_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.nyncwod3sws6\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.nyncwod3sws6\"><\/a>Why implement dual authentication in my company?<\/h2>\n\n\n\n<p>Implementing dual authentication within your company offers several significant advantages in terms of security and data protection:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.4nlwip2ck5xk\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.4nlwip2ck5xk\"><\/a>Enhanced safety<\/li>\n<\/ol>\n\n\n\n<p>Dual authentication adds an extra layer of security by requiring users to provide two separate authentication factors to access accounts or systems. This makes it more difficult for cybercriminals to compromise accounts even if they have managed to steal login credentials or passwords.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.fagkd5e5cbiv\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.fagkd5e5cbiv\"><\/a>Reducing the risk of security breaches<\/li>\n<\/ol>\n\n\n\n<p>By adding a second authentication step, dual authentication significantly reduces the risk of security breaches and the compromise of sensitive data. Even if a password is compromised, access to the account or system remains protected as long as the second authentication factor is not also compromised.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.hgbsq8iekhrl\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.hgbsq8iekhrl\"><\/a>Compliance with safety standards<\/li>\n<\/ol>\n\n\n\n<p>In many industries, the implementation of robust security measures, such as dual authentication, is a regulatory requirement to ensure the protection of sensitive data and compliance with security standards. By implementing dual authentication, your company can meet these requirements and avoid the potential penalties associated with non-compliance.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.mgnmzi3sguu2\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.mgnmzi3sguu2\"><\/a>Protection of privileged access accounts<\/li>\n<\/ol>\n\n\n\n<p>For accounts with privileged access, such as administrator accounts or accounts with extended authorizations, dual authentication is particularly important to reinforce security and reduce the risk of compromising critical systems.<\/p>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.j5bqxxl16t\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.j5bqxxl16t\"><\/a>Safety awareness<\/li>\n<\/ol>\n\n\n\n<p>Implementing dual authentication can also help raise employee awareness of the importance of information security, and promote a culture of security within the company. This encourages good security practices, such as password protection and vigilance against phishing attempts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.ccdzx8fkpj0v_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.ccdzx8fkpj0v\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/mesures-%c3%a0-prioriser\/double-authentication\/#h.ccdzx8fkpj0v\"><\/a>How can I get support during this process?&nbsp;<\/h2>\n\n\n\n<p>To help you implement dual authentication within your company, consider working with Phishia, a firm specializing in IT security. Our expertise in combating phishing and online attacks will effectively complement the implementation of dual authentication. Thanks to our personalized approach and their innovative solutions, your company will benefit from optimum protection against digital threats. The result is a comprehensive strategy to protect your business against cyber threats.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is dual authentication? Dual authentication, also known as two-factor authentication (2FA) or multi-factor authentication (MFA), is a security mechanism that adds an extra layer of protection to traditional authentication based on a single factor, usually a password. With two-factor authentication, users must [...]<\/p>","protected":false},"author":2,"featured_media":385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-384","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Double Authentification - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/double-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Double Authentification - Phishia\" \/>\n<meta property=\"og:description\" content=\"Qu&rsquo;est-ce que la double authentification ? La double authentification, \u00e9galement connue sous le nom d&rsquo;authentification \u00e0 deux facteurs (2FA) ou d&rsquo;authentification multifactorielle (MFA), est un m\u00e9canisme de s\u00e9curit\u00e9 qui ajoute une couche de protection suppl\u00e9mentaire \u00e0 l&rsquo;authentification traditionnelle bas\u00e9e sur un seul facteur, g\u00e9n\u00e9ralement un mot de passe. Avec la double authentification, les utilisateurs doivent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/double-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T15:46:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T14:57:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-indraprojectsofficial-27742642.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pauline Desmarets\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pauline Desmarets\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/\"},\"author\":{\"name\":\"Pauline Desmarets\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/9206c7bdf32a01c09611a465d7d83c88\"},\"headline\":\"Double Authentification\",\"datePublished\":\"2025-01-28T15:46:46+00:00\",\"dateModified\":\"2025-11-21T14:57:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/\"},\"wordCount\":727,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/pexels-indraprojectsofficial-27742642.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/\",\"name\":\"Double Authentification - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/pexels-indraprojectsofficial-27742642.jpg\",\"datePublished\":\"2025-01-28T15:46:46+00:00\",\"dateModified\":\"2025-11-21T14:57:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/pexels-indraprojectsofficial-27742642.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/pexels-indraprojectsofficial-27742642.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/double-authentification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Double Authentification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/9206c7bdf32a01c09611a465d7d83c88\",\"name\":\"Pauline Desmarets\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Double Authentication - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/double-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Double Authentification - Phishia","og_description":"Qu&rsquo;est-ce que la double authentification ? La double authentification, \u00e9galement connue sous le nom d&rsquo;authentification \u00e0 deux facteurs (2FA) ou d&rsquo;authentification multifactorielle (MFA), est un m\u00e9canisme de s\u00e9curit\u00e9 qui ajoute une couche de protection suppl\u00e9mentaire \u00e0 l&rsquo;authentification traditionnelle bas\u00e9e sur un seul facteur, g\u00e9n\u00e9ralement un mot de passe. Avec la double authentification, les utilisateurs doivent [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/double-authentication\/","og_site_name":"Phishia","article_published_time":"2025-01-28T15:46:46+00:00","article_modified_time":"2025-11-21T14:57:38+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-indraprojectsofficial-27742642.jpg","type":"image\/jpeg"}],"author":"Pauline Desmarets","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pauline Desmarets","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/"},"author":{"name":"Pauline Desmarets","@id":"https:\/\/phishia.fr\/#\/schema\/person\/9206c7bdf32a01c09611a465d7d83c88"},"headline":"Double Authentification","datePublished":"2025-01-28T15:46:46+00:00","dateModified":"2025-11-21T14:57:38+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/"},"wordCount":727,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-indraprojectsofficial-27742642.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/","name":"Double Authentication - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-indraprojectsofficial-27742642.jpg","datePublished":"2025-01-28T15:46:46+00:00","dateModified":"2025-11-21T14:57:38+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-indraprojectsofficial-27742642.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-indraprojectsofficial-27742642.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/double-authentification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"Double Authentification"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/9206c7bdf32a01c09611a465d7d83c88","name":"Pauline Desmarets"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=384"}],"version-history":[{"count":3,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/384\/revisions"}],"predecessor-version":[{"id":2277,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/384\/revisions\/2277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/385"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}