{"id":13637,"date":"2025-08-12T19:55:52","date_gmt":"2025-08-12T16:55:52","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13637"},"modified":"2025-08-12T19:55:52","modified_gmt":"2025-08-12T16:55:52","slug":"passkey-enterprise-readiness-pros-cons","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/passkey-enterprise-readiness-pros-cons\/13637\/","title":{"rendered":"Ge\u00e7i\u015f anahtarlar\u0131 kurumsal kullan\u0131ma haz\u0131r m\u0131?"},"content":{"rendered":"<p>Her b\u00fcy\u00fck teknoloji devi, kimlik av\u0131 ve kimlik bilgisi s\u0131z\u0131nt\u0131lar\u0131n\u0131 sona erdirebilecek etkili, kullan\u0131\u015fl\u0131 bir parola ikamesi olarak ge\u00e7i\u015f anahtarlar\u0131n\u0131 tan\u0131t\u0131yor. Temel fikir olduk\u00e7a basit; cihaz\u0131n\u0131zdaki \u00f6zel bir donan\u0131m mod\u00fcl\u00fcnde g\u00fcvenli bir \u015fekilde saklanan kriptografik bir anahtarla hesab\u0131n\u0131za giri\u015f yap\u0131yorsunuz ve bu anahtar\u0131n kilidini biyometri veya PIN ile a\u00e7\u0131yorsunuz. Ev kullan\u0131c\u0131lar\u0131 i\u00e7in ge\u00e7erli ge\u00e7i\u015f anahtarlar\u0131n\u0131n durumunu; <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/full-guide-to-passkeys-in-2025-part-1\/13507\/\" target=\"_blank\" rel=\"noopener\">terminoloji ve temel kullan\u0131m<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/full-guide-to-passkeys-in-2025-part-2\/13522\/\" target=\"_blank\" rel=\"noopener\">daha karma\u015f\u0131k senaryolar<\/a> olmak \u00fczere iki ayr\u0131 makalede ayr\u0131nt\u0131larla ele alm\u0131\u015ft\u0131k. Ancak i\u015fletmelerin siber g\u00fcvenlik konusunda tamamen farkl\u0131 gereksinimleri ve yakla\u015f\u0131mlar\u0131 vard\u0131r. Peki, kurumsal bir ortamda ge\u00e7i\u015f anahtarlar\u0131 ve <a href=\"https:\/\/tr.wikipedia.org\/wiki\/WebAuthn\" target=\"_blank\" rel=\"nofollow noopener\">FIDO2 WebAuthn<\/a> ne kadar iyi?<\/p>\n<h2>\u015eirketlerin ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7me nedenleri<\/h2>\n<p>Her b\u00fcy\u00fck \u00f6l\u00e7ekli ge\u00e7i\u015fte oldu\u011fu gibi, ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7i\u015f yapmak i\u00e7in de sa\u011flam bir i\u015f gerek\u00e7esi gerekir. Ka\u011f\u0131t \u00fczerinde, ge\u00e7i\u015f anahtarlar\u0131 ayn\u0131 anda bir\u00e7ok acil sorunu \u00e7\u00f6zmektedir:<\/p>\n<ul>\n<li>\u00c7al\u0131nan ger\u00e7ek kimlik bilgilerinin neden oldu\u011fu g\u00fcvenlik ihlali riskini azalt\u0131r. Kimlik av\u0131na kar\u015f\u0131 koruma sa\u011flamas\u0131, ge\u00e7i\u015f anahtarlar\u0131n\u0131n reklam\u0131 yap\u0131lan en \u00f6nemli avantaj\u0131d\u0131r.<\/li>\n<li>Deneme yan\u0131lma ve kimlik bilgisi doldurma gibi di\u011fer kimlik sald\u0131r\u0131lar\u0131na kar\u015f\u0131 savunmalar\u0131 g\u00fc\u00e7lendirir.<\/li>\n<li>Uyumluluk konusunda yard\u0131m eder. Bir\u00e7ok sekt\u00f6rde, d\u00fczenleyiciler \u00e7al\u0131\u015fanlar i\u00e7in sa\u011flam kimlik do\u011frulama y\u00f6ntemlerinin kullan\u0131lmas\u0131n\u0131 zorunlu k\u0131lar ve ge\u00e7i\u015f anahtarlar\u0131 genellikle bu niteliklere sahiptir.<\/li>\n<li>Maliyetleri azalt\u0131r. Bir \u015firket diz\u00fcst\u00fc bilgisayarlarda veya ak\u0131ll\u0131 telefonlarda saklanan ge\u00e7i\u015f anahtarlar\u0131n\u0131 tercih ederse, USB cihazlar\u0131n\u0131n, ak\u0131ll\u0131 kartlar\u0131n ve bunlarla ilgili y\u00f6netim ve lojisti\u011fin ekstra masraf\u0131 olmadan y\u00fcksek d\u00fczeyde g\u00fcvenlik elde edebilir.<\/li>\n<li>\u00c7al\u0131\u015fan verimlili\u011fini art\u0131r\u0131r. Sorunsuz, verimli bir kimlik do\u011frulama s\u00fcreci her \u00e7al\u0131\u015fana g\u00fcnl\u00fck zaman kazand\u0131r\u0131r ve ba\u015far\u0131s\u0131z oturum a\u00e7ma giri\u015fimlerini azalt\u0131r. Ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7i\u015f genellikle evrensel olarak nefret edilen d\u00fczenli parola de\u011fi\u015fikliklerinden kurtulmakla el ele gider.<\/li>\n<li>Unutulan parolalar ve kilitli hesaplarla ilgili destek taleplerinin say\u0131s\u0131n\u0131 azaltarak yard\u0131m masas\u0131n\u0131n i\u015f y\u00fck\u00fcn\u00fc hafifletir. (Elbette bunun yerine, ge\u00e7i\u015f anahtarlar\u0131 i\u00e7eren kay\u0131p cihazlar gibi ba\u015fka t\u00fcr sorunlar da ortaya \u00e7\u0131kmaktad\u0131r).<\/li>\n<\/ul>\n<h2>Ge\u00e7i\u015f anahtarlar\u0131n\u0131n kullan\u0131m\u0131 ne kadar yayg\u0131n?<\/h2>\n<p>Bir <a href=\"https:\/\/fidoalliance.org\/new-fido-alliance-research-shows-87-percent-us-uk-workforces-are-deploying-passkeys-for-employee-sign-ins\/\" target=\"_blank\" rel=\"nofollow noopener\">FIDO Alliance raporuna<\/a> g\u00f6re, ABD ve Birle\u015fik Krall\u0131k\u2019ta ankete kat\u0131lan kurulu\u015flar\u0131n <strong>%87<\/strong>\u2018si ya halihaz\u0131rda ge\u00e7i\u015f anahtarlar\u0131n\u0131 kullanmaya ba\u015flad\u0131 ya da \u015fu anda ge\u00e7i\u015f yapma s\u00fcrecinde. Ancak rapora daha yak\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, bu etkileyici rakam\u0131n hesap eri\u015fimi i\u00e7in ak\u0131ll\u0131 kartlar ve USB tokenlar\u0131 gibi tan\u0131d\u0131k kurumsal se\u00e7enekleri de i\u00e7erdi\u011fi ortaya \u00e7\u0131k\u0131yor. Bunlardan baz\u0131lar\u0131 ger\u00e7ekten de WebAuthn ve ge\u00e7i\u015f anahtarlar\u0131na dayan\u0131yor olsa da, sorunlar\u0131 yok de\u011fil. Olduk\u00e7a pahal\u0131lar ve BT ve siber g\u00fcvenlik ekipleri \u00fczerinde fiziksel token ve kartlar\u0131n y\u00f6netimi ile ilgili; d\u00fczenleme, teslimat, de\u011fi\u015ftirme, iptal etme vb., s\u00fcrekli bir y\u00fck olu\u015fturuyorlar. Ak\u0131ll\u0131 telefonlara ve hatta bulut senkronizasyonuna dayal\u0131 olarak yo\u011fun bir \u015fekilde tan\u0131t\u0131lan \u00e7\u00f6z\u00fcmlere gelince, kat\u0131l\u0131mc\u0131lar\u0131n %63\u2019\u00fc bu t\u00fcr teknolojileri kulland\u0131\u011f\u0131n\u0131 bildirmi\u015f, ancak bunlar\u0131n tam olarak ne \u00f6l\u00e7\u00fcde benimsendi\u011fi belirsizli\u011fini korumakta.<\/p>\n<p>\u0130\u015fg\u00fcc\u00fcn\u00fcn tamam\u0131n\u0131 yeni teknolojiye ge\u00e7iren \u015firketlerin say\u0131s\u0131 \u00e7ok az. Bu s\u00fcre\u00e7 hem organizasyonel a\u00e7\u0131dan zorlay\u0131c\u0131 hem de pahal\u0131 olabiliyor. \u00c7o\u011fu zaman da\u011f\u0131t\u0131m a\u015famal\u0131 olarak yap\u0131l\u0131yor. Pilot stratejiler farkl\u0131l\u0131k g\u00f6sterse de, \u015firketler genellikle IP\u2019ye eri\u015fimi olan \u00e7al\u0131\u015fanlarla (%39), BT sistem y\u00f6neticileriyle (%39) ve C-suite y\u00f6neticileriyle (%34) ba\u015fl\u0131yor.<\/p>\n<h2>Ge\u00e7i\u015f anahtar\u0131n\u0131n benimsenmesinin \u00f6n\u00fcndeki potansiyel engeller<\/h2>\n<p>Bir kurulu\u015f ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7meye karar verdi\u011finde, ka\u00e7\u0131n\u0131lmaz olarak bir dizi teknik zorlukla kar\u015f\u0131la\u015facakt\u0131r. Sadece bunlar bile ba\u015fl\u0131 ba\u015f\u0131na bir makale konusu olabilir. Ancak bu yaz\u0131 i\u00e7in en belirgin konulara de\u011finelim:<\/p>\n<ul>\n<li>Eski ve yal\u0131t\u0131lm\u0131\u015f BT sistemleri \u2013 \u00f6zellikle \u015firket i\u00e7i Active Directory \u2013 kullan\u0131l\u0131rken ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7i\u015fin zorlu\u011fu (ve bazen tamamen imkans\u0131zl\u0131\u011f\u0131)<\/li>\n<li>Apple, Google ve Microsoft ekosistemlerinde ge\u00e7i\u015f anahtar\u0131 depolama yakla\u015f\u0131mlar\u0131n\u0131n par\u00e7alara ayr\u0131lmas\u0131 ve farkl\u0131 cihazlarda tek bir ge\u00e7i\u015f anahtar\u0131 kullan\u0131m\u0131n\u0131n zorla\u015fmas\u0131<\/li>\n<li>\u015eirket ki\u015fisel cihazlar\u0131n kullan\u0131m\u0131na izin veriyorsa (BYOD) veya aksine Bluetooth\u2019u yasaklamak gibi kat\u0131 yasaklara sahipse ek y\u00f6netim zorluklar\u0131<\/li>\n<li>Token sat\u0131n alma veya kiralama ve fiziksel cihazlar\u0131n y\u00f6netimi i\u00e7in devam eden maliyetler<\/li>\n<li>Y\u00fcksek g\u00fcvenceli do\u011frulama senaryolar\u0131 i\u00e7in senkronize edilemeyen donan\u0131m anahtarlar\u0131n\u0131n \u00f6zel gereksinimi (ve o zaman bile, hepsi uygun de\u011fildir \u2013 <a href=\"https:\/\/media.fidoalliance.org\/wp-content\/uploads\/2022\/03\/FIDO-White-Paper-Choosing-FIDO-Authenticators-for-Enterprise-Use-Cases-RD10-2022.03.01.pdf\" target=\"_blank\" rel=\"nofollow noopener\">FIDO Alliance<\/a> bu konuda \u00f6zel \u00f6neriler sunar)<\/li>\n<li>\u00c7al\u0131\u015fanlar\u0131 e\u011fitme ve biyometri kullan\u0131m\u0131 konusundaki endi\u015felerini giderme gereklili\u011fi<\/li>\n<li>Par\u00e7alanma, eski sistemler ve kay\u0131p cihazlarla ilgili sorunlar\u0131 ele almak i\u00e7in BT, siber g\u00fcvenlik ve yard\u0131m masas\u0131 i\u00e7in yeni, ayr\u0131nt\u0131l\u0131 ilkeler olu\u015fturma gereklili\u011fi (i\u015fe alma ve i\u015ften \u00e7\u0131karma prosed\u00fcrleriyle ilgili sorunlar dahil)<\/li>\n<\/ul>\n<h2>D\u00fczenleyiciler ge\u00e7i\u015f anahtarlar\u0131 hakk\u0131nda ne diyor?<\/h2>\n<p>T\u00fcm bu zorluklara ra\u011fmen, bir d\u00fczenleyici kurum taraf\u0131ndan talep edilmesi halinde, baz\u0131 kurulu\u015flar i\u00e7in ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7i\u015f ka\u00e7\u0131n\u0131lmaz bir sonu\u00e7 olabilir. Ba\u015fl\u0131ca ulusal ve sekt\u00f6rel d\u00fczenleyiciler genellikle do\u011frudan ya da dolayl\u0131 olarak ge\u00e7i\u015f anahtarlar\u0131n\u0131 desteklemektedir:<\/p>\n<p><a href=\"https:\/\/pages.nist.gov\/800-63-4\/\" target=\"_blank\" rel=\"nofollow noopener\">NIST SP 800-63<\/a> Dijital Kimlik Y\u00f6nergeleri, Kimlik Do\u011frulay\u0131c\u0131 G\u00fcvence Seviyesi 2 i\u00e7in \u201csenkronize edilebilir kimlik do\u011frulay\u0131c\u0131lar\u0131n\u201d (a\u00e7\u0131k\u00e7a ge\u00e7i\u015f anahtarlar\u0131n\u0131 ima eden bir tan\u0131m) ve Kimlik Do\u011frulay\u0131c\u0131 G\u00fcvence Seviyesi 3 i\u00e7in cihaza ba\u011fl\u0131 kimlik do\u011frulay\u0131c\u0131lar\u0131n kullan\u0131lmas\u0131na izin verir. Bu nedenle, ge\u00e7i\u015f anahtarlar\u0131n\u0131n kullan\u0131m\u0131 ISO 27001, HIPAA ve SOC 2 denetimleri s\u0131ras\u0131nda kutular\u0131 g\u00fcvenle kontrol eder.<\/p>\n<p>PCI G\u00fcvenlik Standartlar\u0131 Konseyi, DSS 4.0.1\u2019e ili\u015fkin yorumunda <a href=\"https:\/\/www.pcisecuritystandards.org\/faq\/articles\/Frequently_Asked_Question\/are-passkeys-synced-across-devices-implemented-according-to-the-fido2-requirements-acceptable-for-use-as-phishing-resistant-authentication-to-meet-pci-dss-requirement-8-4-2\/\" target=\"_blank\" rel=\"nofollow noopener\">FIDO2<\/a>\u2018yi \u201ckimlik av\u0131na kar\u015f\u0131 dayan\u0131kl\u0131 kimlik do\u011frulama\u201d kriterlerini kar\u015f\u0131layan bir teknoloji olarak a\u00e7\u0131k\u00e7a belirtmektedir.<\/p>\n<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32015L2366\" target=\"_blank\" rel=\"nofollow noopener\">AB \u00d6deme Hizmetleri Direktifi 2 <\/a>(PSD2) teknolojiden ba\u011f\u0131ms\u0131z bir \u015fekilde yaz\u0131lm\u0131\u015ft\u0131r. Bununla birlikte, G\u00fc\u00e7l\u00fc M\u00fc\u015fteri Kimlik Do\u011frulamas\u0131 (SCA) ve \u00f6nemli finansal i\u015flemler i\u00e7in A\u00e7\u0131k Anahtar Altyap\u0131s\u0131 tabanl\u0131 cihazlar\u0131n kullan\u0131lmas\u0131n\u0131n yan\u0131 s\u0131ra \u00f6deme verilerinin i\u015flem imzas\u0131yla dinamik olarak ili\u015fkilendirilmesini gerektirir. Ge\u00e7i\u015f anahtarlar\u0131 bu gereksinimleri destekler.<\/p>\n<p>Avrupa direktifleri <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32022R2554&amp;from=FR\" target=\"_blank\" rel=\"nofollow noopener\">DORA<\/a> ve <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"nofollow noopener\">NIS2<\/a> de teknolojiden ba\u011f\u0131ms\u0131zd\u0131r ve genellikle yaln\u0131zca \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulaman\u0131n uygulanmas\u0131n\u0131 gerektirir ki bu, ge\u00e7i\u015f anahtarlar\u0131n\u0131n kesinlikle kar\u015f\u0131lad\u0131\u011f\u0131 bir gerekliliktir.<\/p>\n<p>K\u0131sacas\u0131, \u00f6zellikle ge\u00e7i\u015f anahtarlar\u0131n\u0131 se\u00e7mek mevzuata uyumluluk i\u00e7in zorunlu de\u011fildir, ancak bir\u00e7ok kurulu\u015f bunun en uygun maliyetli yol oldu\u011funu d\u00fc\u015f\u00fcnmektedir. Ge\u00e7i\u015f anahtarlar\u0131n\u0131n lehine olan fakt\u00f6rler aras\u0131nda, bulut hizmetlerinin ve SaaS\u2019\u0131n yayg\u0131n kullan\u0131m\u0131, m\u00fc\u015fteriye y\u00f6nelik web siteleri ve uygulamalar i\u00e7in ge\u00e7i\u015f anahtarlar\u0131n\u0131n s\u00fcrekli olarak kullan\u0131ma sunulmas\u0131 ve iyi y\u00f6netilen kurumsal bilgisayar ve ak\u0131ll\u0131 telefon filosu say\u0131labilir.<\/p>\n<h2>Ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7i\u015f i\u00e7in kurumsal yol haritas\u0131<\/h2>\n<ol>\n<li>\u0130\u015flevler aras\u0131 bir ekip olu\u015fturun. Buna BT, siber g\u00fcvenlik, BT sistemlerinin i\u015f sahipleri, teknik destek, \u0130K ve i\u00e7 ileti\u015fim dahildir.<\/li>\n<li>Kimlik do\u011frulama sistemlerinizi ve y\u00f6ntemlerinizi envanterleyin. WebAuthn\/FIDO2\u2019nin halihaz\u0131rda desteklendi\u011fi, hangi sistemlerin y\u00fckseltilebilece\u011fi, \u00e7oklu oturum a\u00e7ma (SSO) entegrasyonunun uygulanabilece\u011fi, yeni kimlik do\u011frulama y\u00f6ntemlerini sistemlerinizin destekledi\u011fi y\u00f6ntemlere \u00e7evirmek i\u00e7in \u00f6zel bir hizmetin olu\u015fturulmas\u0131 gereken ve g\u00fc\u00e7lendirilmi\u015f SOC izleme alt\u0131nda parolalar\u0131 kullanmaya devam etmeniz gereken yerleri belirleyin.<\/li>\n<li>Ge\u00e7i\u015f anahtar\u0131 stratejinizi tan\u0131mlay\u0131n. Donan\u0131m g\u00fcvenlik anahtarlar\u0131n\u0131 m\u0131 yoksa ak\u0131ll\u0131 telefonlarda ve diz\u00fcst\u00fc bilgisayarlarda saklanan ge\u00e7i\u015f anahtarlar\u0131n\u0131 m\u0131 kullanaca\u011f\u0131n\u0131za karar verin. Birincil oturum a\u00e7ma y\u00f6ntemlerinizi ve ge\u00e7ici eri\u015fim \u015fifreleri (TAP) gibi acil durum eri\u015fim se\u00e7eneklerini planlay\u0131n ve yap\u0131land\u0131r\u0131n.<\/li>\n<li>Kurumsal bilgi g\u00fcvenli\u011fi ilkelerinizi ge\u00e7i\u015f anahtarlar\u0131n\u0131n benimsenmesini yans\u0131tacak \u015fekilde g\u00fcncelleyin. Ayr\u0131nt\u0131l\u0131 kay\u0131t ve kurtarma kurallar\u0131 olu\u015fturun. Ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7i\u015fin s\u00f6z konusu olmad\u0131\u011f\u0131 durumlar i\u00e7in ileti\u015fim kurallar\u0131n\u0131 olu\u015fturun (\u00f6rne\u011fin, kullan\u0131c\u0131n\u0131n ge\u00e7i\u015f anahtar\u0131 deste\u011fi olmayan eski bir cihaza g\u00fcvenmesi gerekti\u011fi vb. durumlar i\u00e7in). Zorunlu cihaz \u015fifreleme, biyometri kullan\u0131m\u0131 ve birle\u015fik u\u00e7 nokta y\u00f6netimi veya kurumsal mobilite y\u00f6netimi cihaz sa\u011fl\u0131k kontrolleri gibi g\u00fcvenli ge\u00e7i\u015f anahtar\u0131 depolamas\u0131 sa\u011flamak i\u00e7in yard\u0131mc\u0131 \u00f6nlemler geli\u015ftirin.<\/li>\n<li>Farkl\u0131 sistemler ve kullan\u0131c\u0131 gruplar\u0131 i\u00e7in kullan\u0131ma sunma s\u0131ras\u0131n\u0131 planlay\u0131n. Sorunlar\u0131 ad\u0131m ad\u0131m belirlemek ve d\u00fczeltmek i\u00e7in uzun bir zaman \u00e7izelgesi belirleyin.<\/li>\n<li>Entra ID ve Google Workspace gibi eri\u015fim y\u00f6netimi sistemlerinde ge\u00e7i\u015f anahtarlar\u0131n\u0131 etkinle\u015ftirin ve izin verilen cihazlar\u0131 yap\u0131land\u0131r\u0131n.<\/li>\n<li>K\u00fc\u00e7\u00fck bir kullan\u0131c\u0131 grubuyla ba\u015flayarak bir pilot uygulama ba\u015flat\u0131n. Geri bildirim toplay\u0131n ve talimatlar\u0131n\u0131z\u0131 ve yakla\u015f\u0131m\u0131n\u0131z\u0131 iyile\u015ftirin.<\/li>\n<li>SSO ve di\u011fer y\u00f6ntemleri kullanarak ge\u00e7i\u015f anahtarlar\u0131n\u0131 yerel olarak desteklemeyen sistemleri kademeli olarak birle\u015ftirin.<\/li>\n<li>\u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 e\u011fitin. Kullan\u0131c\u0131lara a\u00e7\u0131k talimatlar vererek ve ge\u00e7i\u015fi h\u0131zland\u0131rmak i\u00e7in her ekipte \u201c\u015fampiyonlar\u201d ile \u00e7al\u0131\u015farak bir ge\u00e7i\u015f anahtar\u0131 benimseme sald\u0131r\u0131 kampanyas\u0131 ba\u015flat\u0131n.<\/li>\n<li>\u0130lerlemeyi takip edin ve s\u00fcre\u00e7leri iyile\u015ftirin. Kullan\u0131m \u00f6l\u00e7\u00fcmlerini, oturum a\u00e7ma hatalar\u0131n\u0131 ve destek taleplerini analiz edin. Eri\u015fim ve kurtarma politikalar\u0131n\u0131 buna g\u00f6re ayarlay\u0131n.<\/li>\n<li>Kullan\u0131mlar\u0131 tek haneli oranlara d\u00fc\u015fen eski kimlik do\u011frulama y\u00f6ntemlerini a\u015famal\u0131 olarak kald\u0131r\u0131n. Her \u015feyden \u00f6nce, k\u0131sa mesaj ve e-posta gibi g\u00fcvenli olmayan ileti\u015fim kanallar\u0131 arac\u0131l\u0131\u011f\u0131yla g\u00f6nderilen tek seferlik kodlar\u0131 ortadan kald\u0131r\u0131n.<\/li>\n<\/ol>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>D\u00fczenlemeler ve geli\u015fen tehdit ortam\u0131, \u015firketleri daha esnek \u00e7al\u0131\u015fan kimlik do\u011frulama bi\u00e7imlerini benimsemeye itiyor. Ge\u00e7i\u015f anahtarlar\u0131 geleneksel parolalar i\u00e7in uygun maliyetli ve basit bir alternatif mi? <\/p>\n","protected":false},"author":2722,"featured_media":13638,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1624,1195,2791,1564,1656,1074,1575,2653,2435,1525,561,2798,878],"class_list":{"0":"post-13637","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-2fa","10":"tag-bulut","11":"tag-gecis-anahtarlari","12":"tag-hesaplar","13":"tag-isletme","14":"tag-kimlik-avi","15":"tag-kimlik-dogrulama","16":"tag-kimlik-guvenligi","17":"tag-mfa","18":"tag-parolalar","19":"tag-sifreler","20":"tag-sso","21":"tag-teknoloji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/passkey-enterprise-readiness-pros-cons\/13637\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/passkey-enterprise-readiness-pros-cons\/29336\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/passkey-enterprise-readiness-pros-cons\/24451\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/passkey-enterprise-readiness-pros-cons\/12631\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/passkey-enterprise-readiness-pros-cons\/29284\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/passkey-enterprise-readiness-pros-cons\/28379\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/passkey-enterprise-readiness-pros-cons\/31240\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/passkey-enterprise-readiness-pros-cons\/29903\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/passkey-enterprise-readiness-pros-cons\/40189\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/passkey-enterprise-readiness-pros-cons\/53986\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/passkey-enterprise-readiness-pros-cons\/23040\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/passkey-enterprise-readiness-pros-cons\/32509\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/passkey-enterprise-readiness-pros-cons\/29448\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/passkey-enterprise-readiness-pros-cons\/35204\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/passkey-enterprise-readiness-pros-cons\/34848\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/gecis-anahtarlari\/","name":"ge\u00e7i\u015f anahtarlar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13637"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13637\/revisions"}],"predecessor-version":[{"id":13640,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13637\/revisions\/13640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13638"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}