{"id":50766,"date":"2025-09-26T00:01:47","date_gmt":"2025-09-26T00:01:47","guid":{"rendered":"https:\/\/mihcm.com\/?p=50766"},"modified":"2025-09-18T06:29:41","modified_gmt":"2025-09-18T06:29:41","slug":"hris-login-what-employers-and-employees-need-to-know","status":"publish","type":"post","link":"https:\/\/mihcm.com\/id\/resources\/blog\/hris-login-what-employers-and-employees-need-to-know\/","title":{"rendered":"HRIS login: What employers and employees need to know"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"50766\" class=\"elementor elementor-50766\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-58f76c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58f76c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d444822\" data-id=\"d444822\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a69bfc5 elementor-widget elementor-widget-text-editor\" data-id=\"a69bfc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The HRIS login is the gateway for employers, employees, and IT teams to access human resources information system modules. It verifies user identity, grants secure access to personnel data, payroll functions, benefits details, and reporting dashboards.<\/p><p>Employers rely on the HRIS login to streamline administrative tasks and delegate permissions. Employees use the login to manage personal profiles and request time off. IT and security teams oversee authentication settings, monitor event logs, and enforce policy compliance.<\/p><p>A robust HRIS login flow prevents unauthorised entry and ensures compliance with privacy standards across distributed workforces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80b965e elementor-widget elementor-widget-heading\" data-id=\"80b965e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is an HRIS login? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71c430a elementor-widget elementor-widget-text-editor\" data-id=\"71c430a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An HRIS login refers to the authentication sequence that grants access to an organisation\u2019s human resources information system. Users enter a unique user ID or employee number followed by a password, which the system validates against its user directory.<\/p><p>Successful verification triggers session initiation, loading personalised dashboards and self-service features. The login mechanism supports role-based access control, ensuring managers, HR administrators, and staff see only approved modules.<\/p><p>This secure entry point maintains data integrity for core HR processes like employee onboarding, time tracking, and benefits enrolment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fbe497 elementor-widget elementor-widget-heading\" data-id=\"4fbe497\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why secure login matters <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-182ece4 elementor-widget elementor-widget-text-editor\" data-id=\"182ece4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protecting employee information and payroll records is vital for compliance with data security regulations such as GDPR, HIPAA, and CCPA.<\/p><p>A weak HRIS login exposes personal data to breaches, phishing attempts, and fraudulent access. Strong authentication controls reduce support requests and mitigate risks of internal and external threats.<\/p><p>Implementing robust password policies and real-time threat detection technologies prevents lateral movement by attackers. Adaptive risk scoring can dynamically challenge high-risk logins with stronger verification steps. Centralised monitoring of login attempts helps IT teams detect anomalies in real time.<\/p><p>Organisations can further reinforce HRIS security by integrating multi-factor authentication and SSO for HRIS capabilities. For a deeper dive into overall HRIS fundamentals, refer to our comprehensive guide to human resources information systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-308686c elementor-widget elementor-widget-heading\" data-id=\"308686c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Setting strong password policies <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38e6f82 elementor-widget elementor-widget-text-editor\" data-id=\"38e6f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Setting strong password policies is the foundation of a secure HRIS login. A robust password framework balances complexity and usability, ensuring compliance with industry standards.<\/p><p>Password rules should cover length, character variety, prohibition lists, and expiration. Automated enforcement within MiHCM Lite and Enterprise applies these rules consistently, reducing manual configuration errors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-912edf3 elementor-widget elementor-widget-heading\" data-id=\"912edf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Password complexity and expiration <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-718c9db elementor-widget elementor-widget-text-editor\" data-id=\"718c9db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Minimum length: at least 12 characters to resist brute-force attacks<\/li><li>Character variety: require uppercase, lowercase, numeric, and special symbols<\/li><li>Prohibition lists: block common or previously breached passwords<\/li><li>Password expiration: enforce rotation every 60\u201390 days based on risk profile<\/li><\/ul><p>Regular password rotation reduces the window of exposure for compromised credentials. HR managers can customise expiration intervals in MiHCM Enterprise to align with regulations such as ISO 27001. Automated notifications remind users to update passwords before expiry, avoiding sudden lockouts.<\/p><p>Integration with MiHCM Lite and Enterprise simplifies policy enforcement. Administrators define a global password policy once, and the system synchronises settings across all HR modules. The self-service portal automatically rejects non-compliant passwords and guides employees through creating stronger credentials.<\/p><p>Audit logs capture password changes, failed attempts, and policy violations. HR and IT teams can review these logs via Analytics modules to identify trends. Alerts trigger when multiple incorrect entries occur, indicating potential credential stuffing attacks.<\/p><p>Educating employees on secure password creation and storage is key. Provide guidelines on avoiding reused passwords and discourage credential sharing.<\/p><p>Compliance requirements demand strict control over personal data. Enforce immediate password resets upon suspected compromise.<\/p><p>By adopting a layered authentication framework that starts with a strong password policy, organisations enhance their overall HRIS security posture. Combining these measures with multi-factor authentication and optional SSO for HRIS creates a resilient defence against unauthorised access, keeping employee data safe across the enterprise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71ae992 elementor-widget elementor-widget-heading\" data-id=\"71ae992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementing Multi-Factor Authentication <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e51575c elementor-widget elementor-widget-text-editor\" data-id=\"e51575c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Multi-Factor Authentication (MFA) is essential for reinforcing HRIS login security. By requiring a secondary verification factor\u2014such as a one-time code, biometric scan, or push notification\u2014MFA mitigates risks associated with compromised passwords.<\/p><p>Strong MFA adoption protects personal data, payroll details, and benefits information from unauthorised access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e2871b elementor-widget elementor-widget-heading\" data-id=\"4e2871b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Choosing the right MFA method <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3207053 elementor-widget elementor-widget-text-editor\" data-id=\"3207053\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"overflow-x: scroll; width: 100%;\"><table style=\"border-collapse: collapse; width: 100%; min-width: 700px;\"><thead><tr style=\"background-color: #f4f4f4;\"><th style=\"border: 1px solid #ddd; padding: 10px; text-align: left;\">Method<\/th><th style=\"border: 1px solid #ddd; padding: 10px; text-align: left;\">Security Level<\/th><th style=\"border: 1px solid #ddd; padding: 10px; text-align: left;\">Ease of Use<\/th><th style=\"border: 1px solid #ddd; padding: 10px; text-align: left;\">Catatan<\/th><\/tr><\/thead><tbody><tr style=\"background-color: #fff;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">SMS Codes<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Medium<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">High<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Prone to SIM swapping; convenient<\/td><\/tr><tr style=\"background-color: #f9f9f9;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">Authenticator Apps<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">High<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Medium<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Offline code generation; recommended<\/td><\/tr><tr style=\"background-color: #fff;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">Biometrics<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Very High<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Medium<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Device support required; phishing-resistant<\/td><\/tr><\/tbody><\/table><\/div><p>MFA is mandated by regulatory frameworks. For example, FFIEC guidelines require MFA for financial data. HRIS platforms with built-in MFA simplify audit readiness. Use granular configurations to enforce MFA for privileged roles, such as payroll administrators.<\/p><p>Design user-friendly enrolment processes. Offer backup codes for account recovery and train employees on MFA methods to reduce support tickets.<\/p><p>Implementing adaptive MFA through MiHCM ensures robust protection for sensitive HR data without hindering workflow. Analysts report that MFA reduces unauthorised access attempts by over 90%, making it a cornerstone of modern HRIS security strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-132e4ed elementor-widget elementor-widget-heading\" data-id=\"132e4ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enabling SSO for HRIS <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1e5dd2 elementor-widget elementor-widget-text-editor\" data-id=\"b1e5dd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Single Sign-On (SSO) streamlines HRIS login by allowing users to authenticate once and access multiple applications.<\/p><p>Centralised identity management reduces password fatigue and simplifies user provisioning. For HR managers and IT professionals, SSO for HRIS enhances control over access policies and simplifies compliance reporting<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e448d68 elementor-widget elementor-widget-heading\" data-id=\"e448d68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SSO protocols explained <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc03f93 elementor-widget elementor-widget-text-editor\" data-id=\"cc03f93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>SAML (Security Assertion Markup Language):<\/strong> XML-based protocol for exchanging authentication and authorisation data between identity providers and service providers.<\/li><li><strong>OAuth2:<\/strong> Authorisation framework enabling third-party applications to obtain limited access to user resources via tokens.<\/li><li><strong>OpenID Connect:<\/strong> Layer on top of OAuth2 that adds authentication, supporting mobile and web scenarios.<\/li><\/ul><p>By implementing SSO for HRIS, organisations reduce password resets and support tickets. Employees gain one-click access to payroll, benefits, and talent management tools. IT teams benefit from a unified audit log and compliance reports across all integrated applications.<\/p><p>Combining SSO with adaptive MFA further strengthens defences.<\/p><p>Centralised authentication also improves visibility. Audit logs capture SSO token usage, login attempts, and session durations. Analytics modules in MiHCM Data &amp; AI visualise trends and detect anomalies across federated identities.<\/p><p>Provide employees with clear guidance on SSO navigation. Host quick tutorials within the self-service portal. Emphasise how SSO simplifies password management while preserving security. Configure fallback password-based login for maintenance windows to ensure continuous access to critical HR functions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44ef142 elementor-widget elementor-widget-heading\" data-id=\"44ef142\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Troubleshooting common login issue<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8de4b8d elementor-widget elementor-widget-text-editor\" data-id=\"8de4b8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Even the most secure HRIS login setups can encounter issues. This section outlines common scenarios and recovery options to minimise downtime and support calls.<\/p><ul><li><strong>Forgotten or expired passwords:<\/strong> Employees can initiate a password reset via the self-service portal. After entering their registered email or employee ID, the system sends a time-limited reset link. Administrators customise reset workflows and expiry durations in Security Settings.<\/li><li><strong>Account lockouts:<\/strong> Multiple failed login or MFA attempts trigger automatic lockouts to prevent brute-force attacks. To restore access, users request an unlock via the \u2018Unlock Account\u2019 option. IT teams adjust lockout thresholds and review lockout events in Analytics dashboards.<\/li><li><strong>Lost or replaced MFA devices:<\/strong> Users who lose or replace their smartphone or hardware token can re-enrol new devices. Self-service prompts guide users through secure device registration, requiring existing authenticated sessions or backup codes. Administrators revoke lost-device credentials, ensuring orphaned factors cannot validate HRIS login.<\/li><li><strong>SSO misconfigurations:<\/strong> Common SSO errors include expired certificates, metadata mismatches, and invalid attribute mappings. To troubleshoot, verify IdP metadata URLs and ensure certificate validity. Use the SSO debug log to inspect token exchanges. Updating metadata in both the IdP and HRIS ensures certificate rotations do not disrupt the login flow.<\/li><\/ul><p>Proactive monitoring alerts administrators to repeated login failures, geolocation anomalies, and configuration errors. Automated notifications accelerate resolution and reduce user frustration. Document recovery workflows and provide clear knowledge-based articles within the self-service portal.<\/p><p>By standardising troubleshooting processes, organisations can maintain high availability of HRIS login services. Regularly review error logs, update documentation, and train support staff on recovery workflows. This ensures employees regain access quickly with minimal HR intervention and sustains productivity across payroll, benefits administration, and performance management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a7b9cc elementor-widget elementor-widget-heading\" data-id=\"5a7b9cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best practices for HRIS security <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5683ec9 elementor-widget elementor-widget-text-editor\" data-id=\"5683ec9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Maintaining robust HRIS login security requires a holistic framework. Adopt a layered model that combines strong passwords, multi-factor authentication, SSO, and risk-based adaptive authentication. Continuous monitoring and employee training reinforce these defences.<\/p><div style=\"overflow-x: scroll; width: 100%;\"><table style=\"border-collapse: collapse; width: 100%; min-width: 700px;\"><thead><tr style=\"background-color: #f4f4f4;\"><th style=\"border: 1px solid #ddd; padding: 10px; text-align: left;\">Practice<\/th><th style=\"border: 1px solid #ddd; padding: 10px; text-align: left;\">Deskripsi<\/th><\/tr><\/thead><tbody><tr style=\"background-color: #fff;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">Layered Authentication<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Combine password policies, multi-factor authentication, and SSO for multi-tiered protection.<\/td><\/tr><tr style=\"background-color: #f9f9f9;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">Regular Audits and Access Reviews<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Use Analytics modules to review login logs, validate permissions, and detect unusual activity.<\/td><\/tr><tr style=\"background-color: #fff;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">Adaptive Monitoring<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Leverage MiHCM Data &amp; AI to analyse login patterns and trigger additional verification for anomalies.<\/td><\/tr><tr style=\"background-color: #f9f9f9;\"><td style=\"border: 1px solid #ddd; padding: 10px;\">Employee Training<\/td><td style=\"border: 1px solid #ddd; padding: 10px;\">Conduct phishing simulations, share best practices, and update staff on new security features.<\/td><\/tr><\/tbody><\/table><\/div><p>Train employees on secure login habits. Emphasise the importance of never sharing credentials, recognising phishing attempts, and registering backup authentication factors. Offer short tutorials and regular refresher sessions via the self-service portal to reinforce best practices.<\/p><p>Align security practices with regulatory requirements. For global enterprises, configure region-specific authentication policies to comply with GDPR in Europe or CCPA in California. Maintain documentation of access reviews and risk assessments to satisfy auditors.<\/p><p>Periodically evaluate authentication workflows. Incorporate feedback from employees and auditors. Leverage analytics to adjust threshold settings optimising the balance between risk tolerance and user experience.<\/p><p>Adopting a holistic approach to HRIS login security transforms authentication from a blocking step into an enabler of effective HR operations. With MiHCM platforms, organisations implement industry-leading security practices while maintaining a streamlined login experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The HRIS login is the gateway for employers, employees, and IT teams to access human resources information system modules. It verifies user identity, grants secure access to personnel data, payroll functions, benefits details, and reporting dashboards. Employers rely on the HRIS login to streamline administrative tasks and delegate permissions. Employees use the login to manage [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":50767,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[18],"tags":[],"class_list":["post-50766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/posts\/50766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/comments?post=50766"}],"version-history":[{"count":0,"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/posts\/50766\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/media\/50767"}],"wp:attachment":[{"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/media?parent=50766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/categories?post=50766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mihcm.com\/id\/wp-json\/wp\/v2\/tags?post=50766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}