{"id":19848,"date":"2023-04-13T09:12:18","date_gmt":"2023-04-13T13:12:18","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=19848"},"modified":"2025-07-03T01:10:37","modified_gmt":"2025-07-03T05:10:37","slug":"biometric-authentication-and-cloud-erp","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/","title":{"rendered":"Biometric Authentication and Cloud ERP"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Enterprise resource planning (ERP) and service resource planning (SRP) software play a crucial role in many organizations. As cloud computing grows, several businesses are shifting to cloud-based SRP systems. While that shift has many advantages, it also introduces some identity management concerns.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like any cloud service, cloud ERP requires fast, reliable verification of users\u2019 identities. Usernames and passwords are the most familiar of these authentication steps, but they fall short of modern ERP needs. Using a biometric authenticator instead can help businesses make the most of these systems.<\/span><\/p>\n<h2><b>The Rise of Cloud-Based SRP<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">ERP solutions provide a single point to monitor and control business processes, from customer management to inventories to HR. Moving these all-in-one platforms to the cloud was a natural next step as cloud services became more reliable and business data volumes expanded.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, <\/span><span style=\"font-weight: 400;\">62.7% of ERP users<\/span><span style=\"font-weight: 400;\"> use a cloud-based system. Of those still using on-premise ERP, 40.9% cite a need for more knowledge about cloud offerings as their primary reason for avoiding them. Consequently, as cloud computing as a category grows and more people become familiar with these solutions, it\u2019s safe to assume more ERP adopters will move to the cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As these adoption trends highlight, cloud-based SRP is quickly becoming the standard. ERP providers must carefully consider how they handle identity management as it does, since this is often a more prevalent concern in the cloud than with on-prem solutions.<\/span><\/p>\n<h2><b>Why Cloud ERP Needs Biometric Authenticators<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Biometric authenticators are the ideal solution for identity and access management (IAM) in cloud ERP systems. That\u2019s due to three primary reasons \u2014 biometrics\u2019 security, efficiency and potential for error reduction.<\/span><\/p>\n<h3><b>Securing Remote Access<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Biometric authentication\u2019s security is the most critical reason cloud ERP solutions should embrace it. Remote accessibility is one of the key advantages of cloud ERP over on-prem alternatives, but supporting remote access introduces security concerns. Organizations must ensure authorized users are who they say they are \u2014 passwords alone are insufficient in that regard.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stolen credentials were <\/span><span style=\"font-weight: 400;\">the most common attack variety<\/span><span style=\"font-weight: 400;\"> behind data breaches in 2022, accounting for roughly 40% of incidents. Many users have weak, easily brute-forced passwords that are easier to remember, but even secure passwords are vulnerable to credential stuffing and phishing attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Biometric authenticators have the obvious advantage of being impervious to theft. Cybercriminals can\u2019t steal a fingerprint or face, nor can they brute-force through biometric scans. As a result, they offer far more security, making them ideal for authenticating remote users.<\/span><\/p>\n<h3><b>Improving Efficiency<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Another advantage of biometric authenticators for cloud-based SRP is they\u2019re more efficient than other authentication methods. Cloud ERP systems typically replace <\/span><span style=\"font-weight: 400;\">three to five software systems<\/span><span style=\"font-weight: 400;\"> \u2014 sometimes more \u2014 so efficiency is a big selling point. Conventional login methods don\u2019t support that efficiency, stopping teams from getting all they can from these solutions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typing in a username and password takes time, especially if the password is as long and complex as it should be. Multi-factor authentication makes these login processes even more time-consuming, though it\u2019s an important security step. Biometric authentication is almost immediate, helping users balance security and efficiency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More efficient login processes mean remote users can access critical or time-sensitive ERP workflows with minimal disruption and frustration. They can then respond to significant organizational changes faster or simply maintain more responsive workflows to accomplish more in less time.<\/span><\/p>\n<h3><b>Reducing Errors<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Using biometrics for identity management in cloud ERP also minimizes the risks of human error. In a conventional login system, secure credentials are prone to more mistakes, but biometric authentication doesn\u2019t have that problem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Longer passwords are harder to remember, especially if users use unique ones. As a result, employees may input the wrong credentials or make typos, barring them from accessing their accounts. In a best-case scenario, these errors make the login process longer and more frustrating, but in some cases, they may create false security alerts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today\u2019s biometric technologies can keep false positives to <\/span><span style=\"font-weight: 400;\">one in 10,000 cases<\/span><span style=\"font-weight: 400;\"> and false negatives to one in 100,000. That reliability makes it unlikely that people will get locked out of their accounts, ensuring security teams can focus on real issues and maintain their efficiency.<\/span><\/p>\n<h2><b>Cloud ERP Identity Management Best Practices<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Biometrics\u2019 security, reliability and efficiency make it the optimal IAM solution for cloud ERP software. However, if ERP providers and their customers want to make the most of it, there are some things to keep in mind.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As helpful as they are, biometric authenticators can be expensive to implement. The solution to this issue may also lie in the cloud. Cloud-based biometric solutions are more easily scalable to organizations\u2019 needs than device-based alternatives, so they\u2019re often more cost-effective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud-based biometrics may also improve login efficiency. Mobile devices may have limited hardware capabilities, so using a cloud solution to process requests instead ensures these constraints don\u2019t slow the process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations should also reveal how they or their security partners store biometric data. Unlike passwords, biometrics can\u2019t change in the event of a beach, so it\u2019s essential to keep this data in secure environments. Implementing zero-trust security for these databases and enabling continuous monitoring through AI is a must.<\/span><\/p>\n<h2><b>Biometric Authenticators Are Essential for Cloud ERP<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cloud-based SRP systems provide many benefits over their on-premise counterparts. Their IAM solutions should offer similar advantages \u2014 biometric authentication does just that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Biometrics is secure, reliable and efficient, all of which are characteristics a remotely accessible ERP platform needs. As cloud ERP grows and more organizations realize these benefits, biometrics will emerge as the IAM technology of choice.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise resource planning (ERP) and service resource planning (SRP) software play a crucial role in many organizations. As cloud computing<\/p>\n","protected":false},"author":398,"featured_media":18203,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-19848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":"","_faq_content":"","_structured_meta_data":"","_tl_dr_content":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Authentication and Cloud ERP - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Authentication and Cloud ERP - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Enterprise resource planning (ERP) and service resource planning (SRP) software play a crucial role in many organizations. As cloud computing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-13T13:12:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T05:10:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/12\/Five-ways-biometric-technology-impacts-our-everyday-life.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/096f016d9382e10b1098a3bb69abe26b\"},\"headline\":\"Biometric Authentication and Cloud ERP\",\"datePublished\":\"2023-04-13T13:12:18+00:00\",\"dateModified\":\"2025-07-03T05:10:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\"},\"wordCount\":926,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\",\"name\":\"Biometric Authentication and Cloud ERP - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2023-04-13T13:12:18+00:00\",\"dateModified\":\"2025-07-03T05:10:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Authentication and Cloud ERP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/096f016d9382e10b1098a3bb69abe26b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Authentication and Cloud ERP - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Authentication and Cloud ERP - Digital Transformation of Government Services","og_description":"Enterprise resource planning (ERP) and service resource planning (SRP) software play a crucial role in many organizations. As cloud computing","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2023-04-13T13:12:18+00:00","article_modified_time":"2025-07-03T05:10:37+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/12\/Five-ways-biometric-technology-impacts-our-everyday-life.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/096f016d9382e10b1098a3bb69abe26b"},"headline":"Biometric Authentication and Cloud ERP","datePublished":"2023-04-13T13:12:18+00:00","dateModified":"2025-07-03T05:10:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/"},"wordCount":926,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/","name":"Biometric Authentication and Cloud ERP - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2023-04-13T13:12:18+00:00","dateModified":"2025-07-03T05:10:37+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-and-cloud-erp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Authentication and Cloud ERP"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/096f016d9382e10b1098a3bb69abe26b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19848"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=19848"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19848\/revisions"}],"predecessor-version":[{"id":22177,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19848\/revisions\/22177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/18203"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=19848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=19848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=19848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}