{"id":6673,"date":"2021-11-30T12:34:04","date_gmt":"2021-11-30T12:34:04","guid":{"rendered":"https:\/\/research.reading.ac.uk\/act\/?post_type=kbe_knowledgebase&#038;p=6673"},"modified":"2026-02-06T14:34:36","modified_gmt":"2026-02-06T14:34:36","slug":"nx-authorization-code","status":"publish","type":"kbe_knowledgebase","link":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/","title":{"rendered":"NX authorization code"},"content":{"rendered":"<p><strong>When accessing the NX remote desktop service at <a href=\"https:\/\/nx.reading.ac.uk:4443\" target=\"_new\" rel=\"noopener noreferrer\" data-start=\"48\" data-end=\"102\">nx.reading.ac.uk:4443<\/a> from off-campus, you may be prompted to enter a one-time \u201cAuthorization Code.\u201d This code is either generated by an authentication app (if configured) or sent to your University of Reading (UoR) email address.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h4><b><span data-contrast=\"auto\">In this article, you will find key instructions on how to:<\/span><\/b><\/h4>\n<ul>\n<li><span data-contrast=\"auto\">Section 1: Check if you need to apply for access.<\/span><\/li>\n<li><span data-contrast=\"auto\">Section 2: Login to NX using a one-time authentication code emailed to your UoR email address.<\/span><\/li>\n<li><span data-contrast=\"auto\">Section 3: Set up your authenticator app (optional, but recommended for experienced users).<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1><span data-contrast=\"none\">1. Determine if you need to apply for access<\/span><\/h1>\n<p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] bg-[#FCECC1] dark:bg-[#64572A] transition-colors duration-100 ease-in-out\">Off-campus access to NX requires prior registration.<\/span> If you&#8217;re not registered, after entering your UoR credentials <span data-contrast=\"auto\">and they are verified<\/span>, you&#8217;ll receive an error message similar to:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6674 colorbox-6673\" src=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/AuthFailed.jpg\" alt=\"Authentication Failed\" width=\"240\" height=\"39\" \/><\/p>\n<p class=\"\" data-start=\"693\" data-end=\"811\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">If you&#8217;ve entered your password correctly but still see this message, you need to request access.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Submit a ticket to the Digital Technology Services (DTS) to be added to the arc-remote-users group, which grants access to Linux\/ARC remote services, including NX.<\/span><\/p>\n<p class=\"\" data-start=\"813\" data-end=\"986\"><strong data-start=\"813\" data-end=\"827\">Important:<\/strong> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Use your UoR email address or the self-service portal to submit your request.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">This ensures we can verify the authenticity of your application.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Additional verification steps may be necessary in some cases.<\/span><\/p>\n<p class=\"\" data-start=\"988\" data-end=\"1066\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">When connecting from the UoR campus network, via VPN, or through arc-ssh.reading.ac.uk, only your UoR password is required\u2014no additional authentication is needed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h1><span data-contrast=\"none\"> 2. Logging in using one-time email codes<\/span><\/h1>\n<p><b><span data-contrast=\"auto\">After successfully entering your UoR password, you&#8217;ll be prompted for an authorization code, like in the following example:<\/span><\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6676 size-medium colorbox-6673\" src=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/NXAuthCode-1-300x104.jpg\" alt=\"\" width=\"300\" height=\"104\" srcset=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/NXAuthCode-1-300x104.jpg 300w, https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/NXAuthCode-1.jpg 557w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p class=\"\" data-start=\"1118\" data-end=\"1236\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">If you haven&#8217;t set up an authenticator app, a 6-digit code will be sent to your university email with the subject line: <\/span><strong data-start=\"0\" data-end=\"46\" data-is-last-node=\"\" data-is-only-node=\"\">arc-remote.reading.ac.uk off-campus access<\/strong><\/p>\n<p class=\"\" data-start=\"1320\" data-end=\"1335\"><strong data-start=\"1320\" data-end=\"1335\">To proceed:<\/strong><\/p>\n<ol data-start=\"1337\" data-end=\"1504\">\n<li class=\"\" data-start=\"1337\" data-end=\"1379\">\n<p class=\"\" data-start=\"1340\" data-end=\"1379\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Open the email and locate the 6-digit code.<\/span><\/p>\n<\/li>\n<li class=\"\" data-start=\"1380\" data-end=\"1422\">\n<p class=\"\" data-start=\"1383\" data-end=\"1422\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Enter this code into the \u201cAuthentication code\u201d field.<\/span><\/p>\n<\/li>\n<li class=\"\" data-start=\"1423\" data-end=\"1504\">\n<p class=\"\" data-start=\"1426\" data-end=\"1504\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">If the code is mistyped or expires, a new code will be sent automatically.<\/span><\/p>\n<\/li>\n<\/ol>\n<p class=\"\" data-start=\"1506\" data-end=\"1674\"><strong data-start=\"1506\" data-end=\"1515\">Note:<\/strong> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">The code is valid only for the current authentication attempt and <strong>expires after 60 seconds<\/strong>.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Ensure your email client is open and ready to receive the code to avoid delays.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">If the code expires, you&#8217;ll need to restart the login process to receive a new code.<\/span><\/p>\n<p><span data-contrast=\"auto\">New users of UoR Linux systems can stop here and just use the email codes to login. However, we recommend that all users, once they have some experience in using our systems, set up a more robust method for two-factor authentication. The method of authentication following in the next section will replace the email code authentication.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h1><span data-contrast=\"none\">3. Setting up Google Authenticator (Recommended)<\/span><\/h1>\n<p class=\"\" data-start=\"1734\" data-end=\"1852\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">For a more reliable and efficient authentication method, we recommend setting up an authenticator app on your mobile phone, such as Microsoft Authenticator <span data-contrast=\"auto\">(this is preferred because it is already used with other UoR services) <\/span> or Google Authenticator.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Once configured, these apps generate time-based codes, eliminating the need for email-based authentication.<\/span><\/p>\n<p data-start=\"1734\" data-end=\"1852\"><span data-contrast=\"auto\"><strong>We recommend to replace email codes with Google Authenticator codes<\/strong> because email is not a reliable way to deliver the authentication code on time. There is a risk you might not be able to login when there is some delay with your email delivery. Note the authentication code for NX is the same as the one as used by arc-ssh so if you have already setup arc-ssh you just use those codes.<\/span><\/p>\n<p><span data-contrast=\"auto\">Some additional information: <\/span><span data-contrast=\"auto\">The general idea of Google Authenticator is as follows: A secret key is placed in a file on the server. On the ACT systems using this method of authentication the file is located at \/var\/authenticator\/&lt;UoR username&gt;\/.google_authenticator. The secret key is also transferred to your mobile device when you scan the QR code (you can also achieve this by copying the secret key by hand, or by using the URL to have the QR code displayed in a web browser), and it is stored in the authenticator app. The secret key plus the current time is used to generate time based verification codes. Comparing those verification codes confirms the identity of the device used to authenticate the connection.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p class=\"\" data-start=\"2035\" data-end=\"2058\"><strong data-start=\"2035\" data-end=\"2058\">Setup Instructions:<\/strong><\/p>\n<ol data-start=\"2060\" data-end=\"2270\">\n<li class=\"\" data-start=\"2060\" data-end=\"2102\">\n<p class=\"\" data-start=\"2063\" data-end=\"2102\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Install the Microsoft Authenticator or Google Authenticator app on your mobile device (both apps are compatible and the setup instructions are the same in both cases).<\/span><\/p>\n<\/li>\n<li class=\"\" data-start=\"2103\" data-end=\"2145\">\n<p class=\"\" data-start=\"2106\" data-end=\"2145\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Log in to the NX service and open a terminal window. Alternatively, you can also follow the same process on arc-ssh.<\/span><\/p>\n<\/li>\n<li class=\"\" data-start=\"2146\" data-end=\"2188\">\n<p class=\"\" data-start=\"2149\" data-end=\"2188\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Run the setup script \/usr\/local\/bin\/google-authenticator to generate a QR code (see the example below).<\/span><\/p>\n<\/li>\n<li class=\"\" data-start=\"2189\" data-end=\"2270\">\n<p class=\"\" data-start=\"2192\" data-end=\"2270\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Scan the QR code using your authenticator app to link your account.<\/span><\/p>\n<\/li>\n<\/ol>\n<p class=\"\" data-start=\"2272\" data-end=\"2392\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Once set up, your authenticator app will generate 6-digit codes required for future logins.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">This method is also compatible with arc-ssh.reading.ac.uk,\u00a0allowing for a unified authentication approach across our remotely accessible servers.<\/span><\/p>\n<h5><strong>EXAMPLE:<\/strong><\/h5>\n<p><span data-contrast=\"auto\">We initially login to https:\/\/nx.reading.ac.uk:4443 using the email code as the two-factor authentication method. Once we are connected, we run the script which replaces the email codes with Google Authenticator codes in a mate terminal, as follows:\u00a0 \u00a0 \u00a0<\/span><\/p>\n<pre class=\"lang:default decode:true\">ab123456@nxnode3:~$ \/usr\/local\/bin\/google-authenticator \r\nWarning: pasting the following URL into your browser exposes the OTP secret to Google:\r\nhttps:\/\/www.google.com\/chart?chs=200x200&amp;chld=M|0&amp;cht=qr&amp;chl=otpauth:\/\/totp\/ab123456@arc-remote.reading.ac.uk%3Fsecret%3DFOO3L3KAPLYPSA7WG3D6YSJBAA%26issuer%3Darc-remote.reading.ac.uk<\/pre>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-6678 colorbox-6673\" src=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/NXQR-275x300.jpg\" alt=\"NX QR code\" width=\"275\" height=\"300\" srcset=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/NXQR-275x300.jpg 275w, https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2021\/11\/NXQR.jpg 369w\" sizes=\"auto, (max-width: 275px) 100vw, 275px\" \/><\/p>\n<pre>Your new secret key is: FOO3L3KAPLYPSA7WG3D6YSJBAA\r\nYour verification code is 843654\r\nYour emergency scratch codes are:\r\n27275024\r\n33549668\r\n50127586\r\n91900156\r\n28478521<\/pre>\n<p><span data-contrast=\"auto\">It makes sense to save a copy of the <\/span><span data-contrast=\"auto\">emergency\u00a0 <\/span><span data-contrast=\"auto\">scratch codes. You can use them in case you are not able to login with the standard, time based, verification codes.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The URL, the QR code and the secret key contains the same secret, they should not be revealed, printed or stored in a file.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">If you have problems with the QR code displayed in the text console, you can use the provided URL, or you can copy the secret key as text.<\/span><\/b><span data-contrast=\"auto\"> The configuration script is modified to store the Authenticator files in custom shared location, not in your shared home directory. This way, the secret used for off-campus authentication is more secure, and also setting it up on NX or arc-ssh will not affect how you login to other UoR services. <\/span><\/p>\n<p><span data-contrast=\"auto\">Note that every time you run the script, a new secret code is created and the old one is overwritten. That means that each time you run the script, you need to scan the QR code again.\u00a0\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If you want to revert to using email codes, you will need to remove the file <\/span><span data-contrast=\"auto\"><span class=\"lang:default highlight:0 decode:true crayon-inline\">\/var\/authenticator\/&lt;UoR login&gt;\/.google_authenticator<\/span>.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When accessing the NX remote desktop service at nx.reading.ac.uk:4443 from off-campus, you may be prompted to enter a one-time \u201cAuthorization Code.\u201d This code is either generated by an authentication app (if configured) or sent to your University of Reading (UoR) email address.    &nbsp;  In this article, you will find key instructions<\/p>\n","protected":false},"author":364,"featured_media":536,"template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","_links_to":"","_links_to_target":""},"kbe_taxonomy":[101,81,80],"kbe_tags":[],"class_list":["post-6673","kbe_knowledgebase","type-kbe_knowledgebase","status-publish","has-post-thumbnail","hentry","kbe_taxonomy-linux-desktop","kbe_taxonomy-related-articles","kbe_taxonomy-user-guides"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NX authorization code - Academic Computing Team<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NX authorization code - Academic Computing Team\" \/>\n<meta property=\"og:description\" content=\"When accessing the NX remote desktop service at nx.reading.ac.uk:4443 from off-campus, you may be prompted to enter a one-time \u201cAuthorization Code.\u201d This code is either generated by an authentication app (if configured) or sent to your University of Reading (UoR) email address.  &nbsp; In this article, you will find key instructions\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/\" \/>\n<meta property=\"og:site_name\" content=\"Academic Computing Team\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-06T14:34:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/07\/NMLogo-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"256\" \/>\n\t<meta property=\"og:image:height\" content=\"256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/\",\"name\":\"NX authorization code - Academic Computing Team\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#website\"},\"datePublished\":\"2021-11-30T12:34:04+00:00\",\"dateModified\":\"2026-02-06T14:34:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/act\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledgebase\",\"item\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NX authorization code\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/\",\"name\":\"Academic Computing Team\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/act\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#organization\",\"name\":\"University of Reading\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png\",\"contentUrl\":\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png\",\"width\":512,\"height\":512,\"caption\":\"University of Reading\"},\"image\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NX authorization code - Academic Computing Team","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/","og_locale":"en_GB","og_type":"article","og_title":"NX authorization code - Academic Computing Team","og_description":"When accessing the NX remote desktop service at nx.reading.ac.uk:4443 from off-campus, you may be prompted to enter a one-time \u201cAuthorization Code.\u201d This code is either generated by an authentication app (if configured) or sent to your University of Reading (UoR) email address.  &nbsp; In this article, you will find key instructions","og_url":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/","og_site_name":"Academic Computing Team","article_modified_time":"2026-02-06T14:34:36+00:00","og_image":[{"width":256,"height":256,"url":"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/07\/NMLogo-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/","url":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/","name":"NX authorization code - Academic Computing Team","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/act\/#website"},"datePublished":"2021-11-30T12:34:04+00:00","dateModified":"2026-02-06T14:34:36+00:00","breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/nx-authorization-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/act\/"},{"@type":"ListItem","position":2,"name":"Knowledgebase","item":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/"},{"@type":"ListItem","position":3,"name":"NX authorization code"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/act\/#website","url":"https:\/\/research.reading.ac.uk\/act\/","name":"Academic Computing Team","description":"","publisher":{"@id":"https:\/\/research.reading.ac.uk\/act\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/act\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/research.reading.ac.uk\/act\/#organization","name":"University of Reading","url":"https:\/\/research.reading.ac.uk\/act\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/","url":"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png","contentUrl":"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png","width":512,"height":512,"caption":"University of Reading"},"image":{"@id":"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase\/6673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/types\/kbe_knowledgebase"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/users\/364"}],"version-history":[{"count":11,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase\/6673\/revisions"}],"predecessor-version":[{"id":7800,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase\/6673\/revisions\/7800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/media\/536"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/media?parent=6673"}],"wp:term":[{"taxonomy":"kbe_taxonomy","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_taxonomy?post=6673"},{"taxonomy":"kbe_tags","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_tags?post=6673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}