{"id":22731,"date":"2022-09-09T00:15:58","date_gmt":"2022-09-09T00:15:58","guid":{"rendered":"https:\/\/thecloud.group\/?p=22731"},"modified":"2022-10-07T11:52:18","modified_gmt":"2022-10-07T11:52:18","slug":"tokens-de-seguridad-como-funcionan","status":"publish","type":"post","link":"https:\/\/thecloud.group\/en\/tokens-de-seguridad-como-funcionan\/","title":{"rendered":"Tokens de Seguridad \u00bfC\u00f3mo funcionan?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22731\" class=\"elementor elementor-22731\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-753608fa elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"753608fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56e2c1c3\" data-id=\"56e2c1c3\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e6d9f1 elementor-widget elementor-widget-image\" data-id=\"7e6d9f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/elementor\/thumbs\/logo-pd8scx7e21qrxkwrdlcuh7c8eeq4vmzqsjri81k6ps.png\" title=\"logo\" alt=\"logo\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-69e500a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69e500a3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-dabe67a\" data-id=\"dabe67a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-cbb6ee8\" data-id=\"cbb6ee8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47b8ac8 elementor-widget elementor-widget-heading\" data-id=\"47b8ac8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Tokens de Seguridad \u00bfC\u00f3mo funcionan?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1dde7e38\" data-id=\"1dde7e38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-47f35f90 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47f35f90\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-44efda02\" data-id=\"44efda02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4d7b4ccf\" data-id=\"4d7b4ccf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1bbf3c99\" data-id=\"1bbf3c99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-679224e2\" data-id=\"679224e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-11dfcd91 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11dfcd91\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a134096\" data-id=\"7a134096\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a9e8bfc elementor-widget elementor-widget-text-editor\" data-id=\"1a9e8bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Los <a href=\"https:\/\/www.bbva.com\/es\/que-es-un-token-y-para-que-sirve\/\">t<\/a><a href=\"https:\/\/www.bbva.com\/es\/que-es-un-token-y-para-que-sirve\/\">okens de seguridad<\/a> son una gran soluci\u00f3n en el mundo de las criptomonedas, proporcionan una capa adicional de protecci\u00f3n para los usuarios al actuar como un dispositivo de autenticaci\u00f3n f\u00edsica o digital. En este blog, leeremos sobre los diferentes tipos de tokens de seguridad y c\u00f3mo funcionan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4fbdca elementor-widget elementor-widget-heading\" data-id=\"e4fbdca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comencemos definiendo qu\u00e9 es un token de seguridad:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1e994448 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e994448\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2226113a\" data-id=\"2226113a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e5cde7 elementor-widget elementor-widget-text-editor\" data-id=\"4e5cde7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un token de seguridad es un dispositivo f\u00edsico o digital que brinda a los usuarios autenticaci\u00f3n de dos factores (<a href=\"https:\/\/ciberprotector.com\/guias\/como-y-donde-obtener-el-codigo-2fa-de-ciberprotector\/#:~:text=%C2%BFQue%20es%20el%20doble%20factor,por%20CiberProtector%20para%20poder%20acceder.\">2FA<\/a>) para verificar su identidad durante el proceso de inicio de sesi\u00f3n.Se utilizan m\u00e1s com\u00fanmente para acceder a redes inform\u00e1ticas, pero tambi\u00e9n pueden asegurar el acceso f\u00edsico a edificios y actuar como firmas electr\u00f3nicas para documentos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62faa2d elementor-widget elementor-widget-heading\" data-id=\"62faa2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo funcionan?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1204891 elementor-widget elementor-widget-text-editor\" data-id=\"1204891\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Estos tokens dan una autentificaci\u00f3n que permite acceder a cualquier sistema a trav\u00e9s de un dispositivo que genera una contrase\u00f1a, desde una tarjeta inteligente a una clave o una tarjeta de identificaci\u00f3n por radiofrecuencia, lo excelente de los tokens es que siempre tendr\u00e1s una contrase\u00f1a nueva generada para iniciar sesi\u00f3n en una computadora o red privada.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7221f7d0\" data-id=\"7221f7d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e87e761 elementor-widget elementor-widget-image\" data-id=\"3e87e761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"612\" height=\"388\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg\" class=\"elementor-animation-hang attachment-large size-large wp-image-22733\" alt=\"Tokens de Seguridad\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg 612w, https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan-300x190.jpg 300w, https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan-18x12.jpg 18w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-789f6775 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"789f6775\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dd7e8cc\" data-id=\"dd7e8cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2e4dda elementor-widget elementor-widget-text-editor\" data-id=\"f2e4dda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La tecnolog\u00eda de token de seguridad se basa en el uso de un dispositivo que genera n\u00fameros aleatorios, los cifra y los env\u00eda a un servidor junto con la informaci\u00f3n de autenticaci\u00f3n del usuario. Luego, el servidor env\u00eda una respuesta cifrada que solo el dispositivo puede descifrar. El dispositivo se reutiliza para cada autenticaci\u00f3n, por lo que el servidor no tiene que almacenar ning\u00fan nombre de usuario o contrase\u00f1a, con el objetivo de hacer que el sistema sea menos vulnerable a los piratas inform\u00e1ticos.<\/p><p>Al d\u00eda de hoy existen varios tipos de token de seguridad, aqu\u00ed te mencionaremos y explicaremos los principales:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7993c495\" data-id=\"7993c495\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f35c27 elementor-widget elementor-widget-image\" data-id=\"9f35c27\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"612\" height=\"408\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan2.jpg\" class=\"elementor-animation-hang attachment-2048x2048 size-2048x2048 wp-image-22736\" alt=\"\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan2.jpg 612w, https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan2-300x200.jpg 300w, https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan2-18x12.jpg 18w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-35ae422 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35ae422\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-30ae2f4\" data-id=\"30ae2f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b449d5d elementor-widget elementor-widget-text-editor\" data-id=\"b449d5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Tokens Conectados:<\/strong> Este es un objetivo f\u00edsico que se conecta a un ordenador, este dispositivo lo que hace es leer el token conectado y da o niega el acceso.<\/li><li><strong>Fichas sin contacto:<\/strong> Establecer una conexi\u00f3n l\u00f3gica a una computadora sin la necesidad de una conexi\u00f3n f\u00edsica es de lo que se tratan los tokens sin contacto. Al poder conectarse de forma inal\u00e1mbrica al sistema, estos tokens tienen la capacidad de otorgar o denegar el acceso seg\u00fan sea necesario. Un gran ejemplo de esto ser\u00eda Bluetooth, que a menudo se usa para crear una conexi\u00f3n con un token sin contacto.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-54523d9\" data-id=\"54523d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08d497a elementor-widget elementor-widget-text-editor\" data-id=\"08d497a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Token Desconectados:<\/strong> El token de seguridad aqu\u00ed no tiene que conectarse a ning\u00fan tipo de dispositivo, lo que sucede es que el dispositivo genera un <a href=\"https:\/\/www.bancosantander.es\/glosario\/otp\">OTP<\/a> como credencial. Luego una app env\u00eda un mensaje de texto a tel\u00e9fono que este registrado para luego ingresar e iniciar sesi\u00f3n luego ambos dispositivos se vinculan y dan acceso.<\/li><li><strong>Tokens de software de inicio de sesi\u00f3n \u00fanicos:<\/strong> Los tokens de software SSO act\u00faan como bibliotecarios digitales. Recuerdan informaci\u00f3n importante, como un nombre de usuario o contrase\u00f1a, para las personas que usan m\u00faltiples sistemas inform\u00e1ticos y servicios de red. De esta manera, estas personas pueden iniciar sesi\u00f3n en cada sistema sin tener que recordar varios nombres de usuario y contrase\u00f1as.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-02cc16b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02cc16b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-43317b9\" data-id=\"43317b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-034465c elementor-widget elementor-widget-image\" data-id=\"034465c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;0.4&quot;,&quot;sizes&quot;:[]},&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"612\" height=\"408\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan1.jpg\" class=\"elementor-animation-hang attachment-large size-large wp-image-22734\" alt=\"\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan1.jpg 612w, https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan1-300x200.jpg 300w, https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan1-18x12.jpg 18w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a01351c\" data-id=\"a01351c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82a5dab elementor-widget elementor-widget-text-editor\" data-id=\"82a5dab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p>Como todo tipo de tecnolog\u00eda, los token ofrecen tanto ventajas como desventajas, aqu\u00ed te dejamos algunas.<\/p><p>Aunque las contrase\u00f1as y los ID de usuario han existido por m\u00e1s tiempo y siguen siendo la forma de autenticaci\u00f3n m\u00e1s utilizada, los tokens de seguridad son una mejor opci\u00f3n cuando se trata de proteger redes y sistemas digitales. \u00a0La desventaja de usar contrase\u00f1as e ID de usuario es que los hacker han perfeccionado sus m\u00e9todos y herramientas por lo que algunas veces pueden descifrarlos f\u00e1cilmente. Otra forma en que las contrase\u00f1as pueden verse comprometidas es si hay una violaci\u00f3n de datos que expone este tipo de informaci\u00f3n.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f1d2e6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1d2e6b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-772c084\" data-id=\"772c084\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d73def elementor-widget elementor-widget-spacer\" data-id=\"6d73def\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1653d7 elementor-widget elementor-widget-text-editor\" data-id=\"a1653d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Con toda esta informaci\u00f3n, esperamos que te haya quedado claro como funcionan los tokens de seguridad, recuerda que el <a href=\"https:\/\/thecloud.group\/\">The Cloud Group<\/a> desarrollamos <a href=\"https:\/\/thecloud.group\/desarrollo-de-aplicaciones-moviles\/\">aplicaciones m\u00f3viles<\/a> adaptables a Tokens o que dan c\u00f3digos \u00fanicos que pueden fusionarse con otras aplicaciones, cont\u00e1ctanos para darte toda la informaci\u00f3n que necesitas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-304f616\" data-id=\"304f616\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c02594d elementor-widget elementor-widget-video\" data-id=\"c02594d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/zY-QAgf0QJA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bf9f70 elementor-widget elementor-widget-heading\" data-id=\"3bf9f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/thecloud.group\/desarrollo-de-aplicaciones-moviles\/\">\u00a1Creamos tu propia app para Android o iOS!<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Today there are many web applications that can be used without having to download anything. While there are people who prefer to use native applications, today&#039;s browsers are powerful enough to run even operating systems from a few years ago. In other words, many web applications will work perfectly from the same browser. In addition, they have the benefit that they can serve without problems on Windows, Linux, macOS, even on iOS and Android. For this reason, many developers will prefer to create a web application in order to support their users in a faster way and without having to invest so much resources and time.<\/p>","protected":false},"author":20,"featured_media":22733,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[792],"class_list":["post-22731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","tag-tokens-de-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tokens de Seguridad \u00bfC\u00f3mo funcionan? | The Cloud Group<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecloud.group\/en\/tokens-de-seguridad-como-funcionan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tokens de Seguridad \u00bfC\u00f3mo funcionan? | The Cloud Group\" \/>\n<meta property=\"og:description\" content=\"Hoy en d\u00eda hay much\u00edsimas aplicaciones web que se pueden utilizar sin tener que descargar nada. Si bien hay personas que prefieren utilizar aplicaciones nativas, los navegadores de hoy en d\u00eda son lo suficientemente poderosos para ejecutar hasta sistemas operativos de hace unos a\u00f1os. En otras palabras, muchas aplicaciones web van a funcionar perfectamente desde el mismo navegador. Adem\u00e1s, tienen el beneficio de que pueden servir sin problemas en Windows, Linux, macOS, incluso en iOS y Android. Por esta raz\u00f3n, muchos desarrolladores van a preferir crear una aplicaci\u00f3n web con el fin de prestarle soporte a sus usuarios de una forma m\u00e1s r\u00e1pida y sin tener que invertir tantos recursos y tiempo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecloud.group\/en\/tokens-de-seguridad-como-funcionan\/\" \/>\n<meta property=\"og:site_name\" content=\"The Cloud Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thecloudgroupglobal\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-09T00:15:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-07T11:52:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paula Franco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paula Franco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/\"},\"author\":{\"name\":\"Paula Franco\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/9292d905a1c98ea7345e5e71a5fe341f\"},\"headline\":\"Tokens de Seguridad \u00bfC\u00f3mo funcionan?\",\"datePublished\":\"2022-09-09T00:15:58+00:00\",\"dateModified\":\"2022-10-07T11:52:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/\"},\"wordCount\":734,\"publisher\":{\"@id\":\"https:\/\/thecloud.group\/#organization\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg\",\"keywords\":[\"Tokens de Seguridad\"],\"articleSection\":[\"Sin categor\u00eda\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/\",\"url\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/\",\"name\":\"Tokens de Seguridad \u00bfC\u00f3mo funcionan? | The Cloud Group\",\"isPartOf\":{\"@id\":\"https:\/\/thecloud.group\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg\",\"datePublished\":\"2022-09-09T00:15:58+00:00\",\"dateModified\":\"2022-10-07T11:52:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage\",\"url\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg\",\"contentUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg\",\"width\":612,\"height\":388,\"caption\":\"Tokens de Seguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thecloud.group\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tokens de Seguridad \u00bfC\u00f3mo funcionan?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thecloud.group\/#website\",\"url\":\"https:\/\/thecloud.group\/\",\"name\":\"The Cloud Group\",\"description\":\"|\u00a0Holding Internacional de Servicios\",\"publisher\":{\"@id\":\"https:\/\/thecloud.group\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thecloud.group\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thecloud.group\/#organization\",\"name\":\"The Cloud Group - Holding International de Servicios\",\"url\":\"https:\/\/thecloud.group\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png\",\"contentUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png\",\"width\":300,\"height\":190,\"caption\":\"The Cloud Group - Holding International de Servicios\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/thecloudgroupglobal\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/9292d905a1c98ea7345e5e71a5fe341f\",\"name\":\"Paula Franco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8622dc6801e07daa51e09fd706fb55b2bdf9cada1ade4ab996fb3b4549e9214c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8622dc6801e07daa51e09fd706fb55b2bdf9cada1ade4ab996fb3b4549e9214c?s=96&d=mm&r=g\",\"caption\":\"Paula Franco\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tokens de Seguridad \u00bfC\u00f3mo funcionan? | The Cloud Group","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecloud.group\/en\/tokens-de-seguridad-como-funcionan\/","og_locale":"en_US","og_type":"article","og_title":"Tokens de Seguridad \u00bfC\u00f3mo funcionan? | The Cloud Group","og_description":"Hoy en d\u00eda hay much\u00edsimas aplicaciones web que se pueden utilizar sin tener que descargar nada. Si bien hay personas que prefieren utilizar aplicaciones nativas, los navegadores de hoy en d\u00eda son lo suficientemente poderosos para ejecutar hasta sistemas operativos de hace unos a\u00f1os. En otras palabras, muchas aplicaciones web van a funcionar perfectamente desde el mismo navegador. Adem\u00e1s, tienen el beneficio de que pueden servir sin problemas en Windows, Linux, macOS, incluso en iOS y Android. Por esta raz\u00f3n, muchos desarrolladores van a preferir crear una aplicaci\u00f3n web con el fin de prestarle soporte a sus usuarios de una forma m\u00e1s r\u00e1pida y sin tener que invertir tantos recursos y tiempo.","og_url":"https:\/\/thecloud.group\/en\/tokens-de-seguridad-como-funcionan\/","og_site_name":"The Cloud Group","article_publisher":"https:\/\/www.facebook.com\/thecloudgroupglobal","article_published_time":"2022-09-09T00:15:58+00:00","article_modified_time":"2022-10-07T11:52:18+00:00","og_image":[{"width":612,"height":388,"url":"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg","type":"image\/jpeg"}],"author":"Paula Franco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Paula Franco","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#article","isPartOf":{"@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/"},"author":{"name":"Paula Franco","@id":"https:\/\/thecloud.group\/#\/schema\/person\/9292d905a1c98ea7345e5e71a5fe341f"},"headline":"Tokens de Seguridad \u00bfC\u00f3mo funcionan?","datePublished":"2022-09-09T00:15:58+00:00","dateModified":"2022-10-07T11:52:18+00:00","mainEntityOfPage":{"@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/"},"wordCount":734,"publisher":{"@id":"https:\/\/thecloud.group\/#organization"},"image":{"@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage"},"thumbnailUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg","keywords":["Tokens de Seguridad"],"articleSection":["Sin categor\u00eda"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/","url":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/","name":"Tokens de Seguridad \u00bfC\u00f3mo funcionan? | The Cloud Group","isPartOf":{"@id":"https:\/\/thecloud.group\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage"},"image":{"@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage"},"thumbnailUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg","datePublished":"2022-09-09T00:15:58+00:00","dateModified":"2022-10-07T11:52:18+00:00","breadcrumb":{"@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#primaryimage","url":"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg","contentUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2022\/09\/Tokens-de-Seguridad-Como-funcionan.jpg","width":612,"height":388,"caption":"Tokens de Seguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/thecloud.group\/tokens-de-seguridad-como-funcionan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecloud.group\/"},{"@type":"ListItem","position":2,"name":"Tokens de Seguridad \u00bfC\u00f3mo funcionan?"}]},{"@type":"WebSite","@id":"https:\/\/thecloud.group\/#website","url":"https:\/\/thecloud.group\/","name":"The Cloud Group","description":"|\u00a0Holding Internacional de Servicios","publisher":{"@id":"https:\/\/thecloud.group\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecloud.group\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/thecloud.group\/#organization","name":"The Cloud Group - Holding International de Servicios","url":"https:\/\/thecloud.group\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecloud.group\/#\/schema\/logo\/image\/","url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png","contentUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png","width":300,"height":190,"caption":"The Cloud Group - Holding International de Servicios"},"image":{"@id":"https:\/\/thecloud.group\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/thecloudgroupglobal"]},{"@type":"Person","@id":"https:\/\/thecloud.group\/#\/schema\/person\/9292d905a1c98ea7345e5e71a5fe341f","name":"Paula Franco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecloud.group\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8622dc6801e07daa51e09fd706fb55b2bdf9cada1ade4ab996fb3b4549e9214c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8622dc6801e07daa51e09fd706fb55b2bdf9cada1ade4ab996fb3b4549e9214c?s=96&d=mm&r=g","caption":"Paula Franco"}}]}},"_links":{"self":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts\/22731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/comments?post=22731"}],"version-history":[{"count":23,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts\/22731\/revisions"}],"predecessor-version":[{"id":23031,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts\/22731\/revisions\/23031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/media\/22733"}],"wp:attachment":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/media?parent=22731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/categories?post=22731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/tags?post=22731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}