{"id":62440,"date":"2022-05-02T11:45:00","date_gmt":"2022-05-02T15:45:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=62440"},"modified":"2024-01-26T15:27:28","modified_gmt":"2024-01-26T20:27:28","slug":"conditional-access-policies-examples","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples","title":{"rendered":"Examples of Conditional Access Policies"},"content":{"rendered":"\n<p>Think back to the last fraudulent call or email that made it past your spam filter. How could you tell it was fake? Maybe they called at a weird hour, or the name in the email address didn\u2019t match the signature, or you didn\u2019t recognize the area code. Or maybe your car doesn\u2019t actually have an extended warranty.&nbsp;<\/p>\n\n\n\n<p>Whatever the reason, your spam filter didn\u2019t catch the fraud, but you did. Why?<\/p>\n\n\n\n<p>Humans are great at picking up on contextual clues. Computers don\u2019t do so on their own; they have to be programmed to recognize them.<\/p>\n\n\n\n<p>That\u2019s how <a href=\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\">conditional access policies<\/a> work. They use a set of contextual clues \u2014 like what locations and devices are considered \u201cnormal\u201d for a login \u2014 to apply the appropriate amount of <em>contextual <\/em>security to a login attempt. This means more security for suspicious attempts, and less friction for typical and expected ones. Essentially, conditional access automates the human intuition that enables you to spot suspicious activity and applies it to the authentication process.<\/p>\n\n\n\n<p>Let\u2019s dive deeper into how they work and explore some of the most common examples and use cases of conditional access policies.&nbsp;<\/p>\n\n\n\n<figure class=\"image is-16by9\">\n<iframe class=\"has-ratio\" width=\"300\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/NxCxIy0KZ10?rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Conditional Access Policies Work&nbsp;<\/strong><\/h2>\n\n\n\n<p>Conditional access policies use contextual information to apply the most appropriate level of security to a login attempt. Typically, conditional access policies increase security measures for suspicious or irregular login attempts and decrease security measures for routine and trustworthy login attempts. This makes conditional access essential for striking a balance between security and the user experience: it reduces friction where it\u2019s safe to do so and boosts security with intelligently applied policies.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/jumpcloud.com\/use-cases\/zero-trust\">Zero Trust security<\/a> model, which assumes that all devices, users, networks, and resources are untrustworthy until verified, underlines all conditional access policies. Users and groups are thus required to verify their identities by meeting specific conditions over and above their credentials that grant access.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Are Some Examples of Conditional Access Policies?<\/strong><\/h2>\n\n\n\n<p>In their simplest form, conditional access policies consist of an if\/then statement in the format:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><code><em>If<\/em> Condition A is met, <em>then<\/em> complete Action A, <em>else<\/em> Action B.<\/code> <\/p>\n\n\n\n<p>Let\u2019s explore some of the conditions and actions that appear in conditional access policies to form a blueprint for how they\u2019re commonly built.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Common Conditions<\/h3>\n\n\n\n<p>Conditional access policies can check a login attempt against several conditions. These conditions are flexible and have a wide range of options; the following are common conditions for examining the security of a login attempt.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Correct username and password input. <\/strong>While no longer the most secure form of authentication, passwords can be the first step in an MFA-based login.<\/li>\n\n\n\n<li><strong>Location of login.<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Login is from a device associated with the user.<\/strong><\/li>\n\n\n\n<li><strong>Device complies with company standards.<\/strong><\/li>\n\n\n\n<li><strong>Network complies with company standards.<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Common Actions&nbsp;<\/h3>\n\n\n\n<p>The actions in conditional access policies specify how to proceed based on the conditions above. Actions typically either improve or reduce security measures, based on the security of the login attempt conditions. Some of the most common actions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Present a <a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a> challenge.&nbsp;<\/li>\n\n\n\n<li>Bypass an MFA challenge.<\/li>\n\n\n\n<li>Deny access.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Conditional Access Policy Examples<\/h3>\n\n\n\n<p>By combining conditions and actions in the if\/then\/else template above, you can create policies like:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>If<\/em> employees log in with a device that\u2019s assigned to them <em>and <\/em>on a company-compliant network, <em>then<\/em> they may bypass MFA.<\/li>\n\n\n\n<li><em>If <\/em>employees log in with a device that\u2019s assigned to them <em>and <\/em>not on a compliant network, <em>then <\/em>they must complete an MFA challenge.<\/li>\n<\/ul>\n\n\n\n<p>Note that you can apply policies to some groups and not others. For example, an organization might choose to never apply a policy that bypasses MFA to users in its super admin group.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Common Conditional Access Use Cases<\/strong><\/h2>\n\n\n\n<p>In general, conditional access policies deliver simultaneous security and usability wins. More specifically, companies use them to uphold certain security and usability standards, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prohibiting unapproved devices from accessing resources.<\/li>\n\n\n\n<li>Preventing employees from accessing resources from untrustworthy networks, like public Wi-Fi.<\/li>\n\n\n\n<li>Improving the user experience by reducing friction in predictable and secure environments. This can include home Wi-Fi networks for a better remote work experience.<\/li>\n\n\n\n<li>Securely streamlining the experience for specific users and groups, like executives who require resource access via their phone.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>JumpCloud\u2019s Revolutionary Approach to Conditional Access&nbsp;<\/strong><\/h2>\n\n\n\n<p>JumpCloud empowers IT admins to implement conditional access policies with the flexibility to choose from a wide range of conditions and actions. This allows admins to create a holistic security policy by combining trust elements.&nbsp;<\/p>\n\n\n\n<p>JumpCloud can also automatically apply certain policies to ensure security: for example, if more than one policy is applied to certain users and groups, JumpCloud will automatically enforce the strictest ones. Admins can also configure a global policy that&#8217;s enforced in the event that no policy applies to a user. This is an essential tool to ensure baseline security coverage for the organization by default.&nbsp;<\/p>\n\n\n\n<p>These conditional access policies can be enforced through all IT environments regardless of what client apps, operating system, or vendor they use. And it\u2019s all managed through JumpCloud\u2019s cloud directory platform, keeping identity, device, network, and conditional access policy management all in one place.&nbsp;<\/p>\n\n\n\n<p>Intrigued? <a href=\"https:\/\/console.jumpcloud.com\/signup\">Try JumpCloud today!<\/a> With your trial of JumpCloud, you can evaluate our full platform with access to all Premium features.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies. <\/p>\n","protected":false},"author":144,"featured_media":62442,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2337],"tags":[2441,2432,2373],"collection":[2775],"platform":[],"funnel_stage":[3016],"coauthors":[2532],"class_list":["post-62440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-remote-work","tag-conditional-access","tag-policy","tag-security","collection-security","funnel_stage-top-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Examples of Conditional Access Policies - JumpCloud<\/title>\n<meta name=\"description\" content=\"Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Examples of Conditional Access Policies\" \/>\n<meta property=\"og:description\" content=\"Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-02T15:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T20:27:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kate Lake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Lake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\"},\"author\":{\"name\":\"Kate Lake\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\"},\"headline\":\"Examples of Conditional Access Policies\",\"datePublished\":\"2022-05-02T15:45:00+00:00\",\"dateModified\":\"2024-01-26T20:27:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\"},\"wordCount\":888,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg\",\"keywords\":[\"conditional access\",\"policy\",\"security\"],\"articleSection\":[\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\",\"url\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\",\"name\":\"Examples of Conditional Access Policies - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg\",\"datePublished\":\"2022-05-02T15:45:00+00:00\",\"dateModified\":\"2024-01-26T20:27:28+00:00\",\"description\":\"Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg\",\"width\":600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Examples of Conditional Access Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\",\"name\":\"Kate Lake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/9ceeca19dca9b2f6b29a66242a65eaa4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d93b584313756c3e2fdf64c2be327f74620b15e42b1777bda70b410382563640?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d93b584313756c3e2fdf64c2be327f74620b15e42b1777bda70b410382563640?s=96&d=mm&r=g\",\"caption\":\"Kate Lake\"},\"description\":\"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Examples of Conditional Access Policies - JumpCloud","description":"Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples","og_locale":"en_US","og_type":"article","og_title":"Examples of Conditional Access Policies","og_description":"Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.","og_url":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples","og_site_name":"JumpCloud","article_published_time":"2022-05-02T15:45:00+00:00","article_modified_time":"2024-01-26T20:27:28+00:00","og_image":[{"width":600,"height":900,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg","type":"image\/jpeg"}],"author":"Kate Lake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kate Lake","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples"},"author":{"name":"Kate Lake","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78"},"headline":"Examples of Conditional Access Policies","datePublished":"2022-05-02T15:45:00+00:00","dateModified":"2024-01-26T20:27:28+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples"},"wordCount":888,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg","keywords":["conditional access","policy","security"],"articleSection":["Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples","url":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples","name":"Examples of Conditional Access Policies - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg","datePublished":"2022-05-02T15:45:00+00:00","dateModified":"2024-01-26T20:27:28+00:00","description":"Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/05\/examples-conditional-access-policies.jpg","width":600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/conditional-access-policies-examples#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Examples of Conditional Access Policies"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78","name":"Kate Lake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/9ceeca19dca9b2f6b29a66242a65eaa4","url":"https:\/\/secure.gravatar.com\/avatar\/d93b584313756c3e2fdf64c2be327f74620b15e42b1777bda70b410382563640?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d93b584313756c3e2fdf64c2be327f74620b15e42b1777bda70b410382563640?s=96&d=mm&r=g","caption":"Kate Lake"},"description":"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/62440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=62440"}],"version-history":[{"count":2,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/62440\/revisions"}],"predecessor-version":[{"id":104140,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/62440\/revisions\/104140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/62442"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=62440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=62440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=62440"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=62440"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=62440"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=62440"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=62440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}