{"id":4532,"date":"2025-07-27T21:39:06","date_gmt":"2025-07-28T01:39:06","guid":{"rendered":"https:\/\/www.indigoconsulting.ca\/?p=4532"},"modified":"2025-10-01T22:18:19","modified_gmt":"2025-10-02T02:18:19","slug":"strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation","status":"publish","type":"post","link":"https:\/\/www.indigoconsulting.ca\/fr\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/","title":{"rendered":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4532\" class=\"elementor elementor-4532\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3994dbe elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"3994dbe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c74ce08 e-con-full e-flex e-con e-child\" data-id=\"c74ce08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a21ea87 elementor-widget elementor-widget-text-editor\" data-id=\"a21ea87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.indigoconsulting.ca\/fr\/\"><strong>Home<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db8bf33 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"db8bf33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92f0d16 elementor-widget elementor-widget-text-editor\" data-id=\"92f0d16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.indigoconsulting.ca\/fr\/solutions\/resources\/\">Ressources<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afde50e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"afde50e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcca44c elementor-widget elementor-widget-text-editor\" data-id=\"dcca44c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Resistant MFA Implementation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d657b6 e-grid e-con-boxed e-con e-parent\" data-id=\"3d657b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d81fe91 e-con-full e-flex e-con e-child\" data-id=\"d81fe91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03b7a63 elementor-widget elementor-widget-heading\" data-id=\"03b7a63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Strategies for Overcoming Challenges in Phishing<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-274165c elementor-widget elementor-widget-post-info\" data-id=\"274165c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-15eef53 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>juillet 27, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e58e7ec elementor-widget elementor-widget-text-editor\" data-id=\"e58e7ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Passwords are broken\u2014and traditional MFA is no longer enough. As phishing campaigns grow more sophisticated, organizations need authentication that can\u2019t be tricked, replayed, or intercepted.<\/p><p>\u00a0<\/p><p>This whitepaper explores how to make phishing-resistant MFA a reality. You\u2019ll learn why hardware keys, passkeys, and certificate-based authentication are critical for resilience, and how to overcome the real-world challenges of user adoption, legacy systems, scalability, and recovery.<\/p><p>\u00a0<\/p><p>Packed with actionable strategies\u2014from embedding risk-based authentication to designing secure recovery workflows\u2014it shows security leaders how to strengthen defenses today while building toward a passwordless future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65b07cc elementor-author-box--layout-image-left elementor-author-box--image-valign-top elementor-widget elementor-widget-author-box\" data-id=\"65b07cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/roberson-etienne\/\" class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/09\/Roberson_Etienne-240x300.jpg\" alt=\"Picture of Roberson Etienne\" loading=\"lazy\">\n\t\t\t\t<\/a>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/roberson-etienne\/\">\n\t\t\t\t\t\t<span class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tRoberson Etienne\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>ITIL, LSS, SA, PO\/PM<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51adca8 e-con-full e-flex e-con e-child\" data-id=\"51adca8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c552763 elementor-widget elementor-widget-button\" data-id=\"c552763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Phishing-Restraing-MFA-Implementation_WhitePaper_October2025.pdf\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-download\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download whitepaper<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a5e5c4 elementor-widget elementor-widget-image\" data-id=\"4a5e5c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Phishing-Restraing-MFA-Implementation_WhitePaper_October2025.pdf\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"1251\" src=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Resistant-MFA-Cover.png\" class=\"attachment-full size-full wp-image-4533\" alt=\"Resistant-MFA-Cover\" srcset=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Resistant-MFA-Cover.png 1000w, https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Resistant-MFA-Cover-240x300.png 240w, https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Resistant-MFA-Cover-819x1024.png 819w, https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/10\/Resistant-MFA-Cover-768x961.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation<\/p>","protected":false},"author":20,"featured_media":4535,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[135],"tags":[8,139,136,137,138],"class_list":["post-4532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-white-paper","tag-iam","tag-indigo","tag-mfa","tag-phishing","tag-strategies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation - Indigo Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.indigoconsulting.ca\/fr\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation\" \/>\n<meta property=\"og:description\" content=\"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.indigoconsulting.ca\/fr\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/\" \/>\n<meta property=\"og:site_name\" content=\"Indigo Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-28T01:39:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T02:18:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/07\/RMFA-Thumb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Osagie Evans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Osagie Evans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation - Indigo Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.indigoconsulting.ca\/fr\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/","og_locale":"fr_CA","og_type":"article","og_title":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation","og_description":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation","og_url":"https:\/\/www.indigoconsulting.ca\/fr\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/","og_site_name":"Indigo Consulting","article_published_time":"2025-07-28T01:39:06+00:00","article_modified_time":"2025-10-02T02:18:19+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/07\/RMFA-Thumb.png","type":"image\/png"}],"author":"Osagie Evans","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Osagie Evans","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#article","isPartOf":{"@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/"},"author":{"name":"Osagie Evans","@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/person\/aed0a5518eaae723e19a176bb7531274"},"headline":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation","datePublished":"2025-07-28T01:39:06+00:00","dateModified":"2025-10-02T02:18:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/"},"wordCount":116,"publisher":{"@id":"https:\/\/www.indigoconsulting.ca\/#organization"},"image":{"@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/07\/RMFA-Thumb.png","keywords":["iam","Indigo","MFA","Phishing","Strategies"],"articleSection":["White Paper"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/","url":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/","name":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation - Indigo Consulting","isPartOf":{"@id":"https:\/\/www.indigoconsulting.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#primaryimage"},"image":{"@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/07\/RMFA-Thumb.png","datePublished":"2025-07-28T01:39:06+00:00","dateModified":"2025-10-02T02:18:19+00:00","breadcrumb":{"@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#primaryimage","url":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/07\/RMFA-Thumb.png","contentUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2025\/07\/RMFA-Thumb.png","width":1200,"height":800,"caption":"RMFA-Thumb"},{"@type":"BreadcrumbList","@id":"https:\/\/www.indigoconsulting.ca\/white-paper\/strategies-for-overcoming-challenges-in-phishing-resistant-mfa-implementation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.indigoconsulting.ca\/"},{"@type":"ListItem","position":2,"name":"Strategies for Overcoming Challenges in Phishing \u2013 Resistant MFA Implementation"}]},{"@type":"WebSite","@id":"https:\/\/www.indigoconsulting.ca\/#website","url":"https:\/\/www.indigoconsulting.ca\/","name":"Indigo Consulting","description":"A Leading IAM, Compliance, &amp; IT Consultant","publisher":{"@id":"https:\/\/www.indigoconsulting.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.indigoconsulting.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.indigoconsulting.ca\/#organization","name":"Indigo Consulting","url":"https:\/\/www.indigoconsulting.ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2020\/03\/logo_indigo.png","contentUrl":"https:\/\/www.indigoconsulting.ca\/wp-content\/uploads\/2020\/03\/logo_indigo.png","width":363,"height":109,"caption":"Indigo Consulting"},"image":{"@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/indigo-technologies-canada-inc.\/"]},{"@type":"Person","@id":"https:\/\/www.indigoconsulting.ca\/#\/schema\/person\/aed0a5518eaae723e19a176bb7531274","name":"Osagie Evans","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/3550897f70f086414260f9c1f2b61d2115d4353d6f526f44f0000f084a0e4831?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3550897f70f086414260f9c1f2b61d2115d4353d6f526f44f0000f084a0e4831?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3550897f70f086414260f9c1f2b61d2115d4353d6f526f44f0000f084a0e4831?s=96&d=mm&r=g","caption":"Osagie Evans"},"url":"https:\/\/www.indigoconsulting.ca\/fr\/author\/edosaosagieevans\/"}]}},"_links":{"self":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/posts\/4532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/comments?post=4532"}],"version-history":[{"count":0,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/posts\/4532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/media\/4535"}],"wp:attachment":[{"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/media?parent=4532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/categories?post=4532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.indigoconsulting.ca\/fr\/wp-json\/wp\/v2\/tags?post=4532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}