{"id":13658,"date":"2025-08-15T15:59:34","date_gmt":"2025-08-15T12:59:34","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13658"},"modified":"2025-08-25T11:28:39","modified_gmt":"2025-08-25T08:28:39","slug":"passkey-enterprise-issues-and-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/passkey-enterprise-issues-and-threats\/13658\/","title":{"rendered":"Kurumsal ge\u00e7i\u015f anahtar\u0131 uygulamalar\u0131: N\u00fcanslar ve zorluklar"},"content":{"rendered":"<p>Ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7mek kurulu\u015flara; etkili \u00e7al\u0131\u015fan kimlik do\u011frulama, art\u0131r\u0131lm\u0131\u015f \u00fcretkenlik ve yasal uyumluluk i\u00e7in uygun maliyetli bir yol vaat ediyor. Bu i\u015f \u00e7\u00f6z\u00fcm\u00fcn\u00fcn t\u00fcm art\u0131lar\u0131n\u0131 ve eksilerini <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/passkey-enterprise-readiness-pros-cons\/13637\/\" target=\"_blank\" rel=\"noopener\">ayr\u0131 bir makalede<\/a> ayr\u0131nt\u0131l\u0131 \u015fekilde ele ald\u0131k. Ancak, ge\u00e7i\u015fin ba\u015far\u0131s\u0131 ve hatta uygulanabilirli\u011fi, kurumsal sistemdeki \u00e7ok say\u0131da teknik ayr\u0131nt\u0131lara ve uygulama \u00f6zelliklerine ba\u011fl\u0131d\u0131r.<\/p>\n<h2>Kimlik y\u00f6netim sistemlerinde ge\u00e7i\u015f anahtar\u0131 deste\u011fi<\/h2>\n<p>Organizasyonel engelleri a\u015fmadan ve ilkeleri belirlemeden \u00f6nce, temel BT sistemlerinizin ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7meye haz\u0131r olup olmad\u0131\u011f\u0131n\u0131 belirlemeniz gerekir.<\/p>\n<p>Microsoft Entra ID (Azure AD), ge\u00e7i\u015f anahtarlar\u0131n\u0131 <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/how-to-enable-passkey-fido2\" target=\"_blank\" rel=\"nofollow noopener\">tamamen destekler<\/a> ve y\u00f6neticilerin bunlar\u0131 birincil oturum a\u00e7ma y\u00f6ntemi olarak ayarlamas\u0131na olanak tan\u0131r. \u015eirket i\u00e7i kaynaklarla hibrit da\u011f\u0131t\u0131mlar i\u00e7in Entra ID, Active Directory etki alan\u0131 denetleyicinizin i\u015fleyebilece\u011fi <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/howto-authentication-passwordless-security-key-on-premises\" target=\"_blank\" rel=\"nofollow noopener\">Kerberos biletleri (TGT\u2019ler)<\/a> olu\u015fturabilir.<\/p>\n<p>Ancak Microsoft; RDP, VDI veya yaln\u0131zca \u015firket i\u00e7i AD oturum a\u00e7ma i\u015flemleri i\u00e7in hen\u00fcz yerel ge\u00e7i\u015f anahtar\u0131 deste\u011fi sunmamaktad\u0131r. Bu t\u00fcr tokenlar, geleneksel PIV (ak\u0131ll\u0131 kartlar) teknolojisini ve FIDO2 (ge\u00e7i\u015f anahtarlar\u0131) teknolojisini <a href=\"https:\/\/www.keytos.io\/blog\/passwordless\/how-to-go-passwordless-in-azure-with-azure-cba\" target=\"_blank\" rel=\"nofollow noopener\">ayn\u0131 anda destekleyebilir<\/a>. Bu senaryolar i\u00e7in <a href=\"https:\/\/rublon.com\/blog\/authenticate-local-windows-logins-using-fido-security-keys\/\" target=\"_blank\" rel=\"nofollow noopener\">\u00fc\u00e7\u00fcnc\u00fc taraf \u00e7\u00f6z\u00fcmleri<\/a> de mevcuttur, ancak bunlar\u0131n kullan\u0131m\u0131n\u0131n genel g\u00fcvenlik durumunuz ve mevzuata uygunlu\u011funuz \u00fczerinde nas\u0131l bir etkisi olaca\u011f\u0131n\u0131 de\u011ferlendirmeniz gerekir.<\/p>\n<p>Google Workspace ve Google Cloud kullan\u0131c\u0131lar\u0131 i\u00e7in sevindirici haber, bunlar\u0131n <a href=\"https:\/\/workspace.google.com\/blog\/product-announcements\/major-security-innovation-passkeys\" target=\"_blank\" rel=\"nofollow noopener\">tam ge\u00e7i\u015f anahtar\u0131 deste\u011fi<\/a> sunmas\u0131d\u0131r.<\/p>\n<p>Okta, Ping, Cisco Duo ve RSA IDplus gibi pop\u00fcler kimlik y\u00f6netim sistemleri de FIDO2 ve t\u00fcm \u00f6nemli ge\u00e7i\u015f anahtarlar\u0131n\u0131 desteklemektedir.<\/p>\n<h2>\u0130stemci cihazlarda ge\u00e7i\u015f anahtar\u0131 deste\u011fi<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/full-guide-to-passkeys-in-2025-part-1\/13507\/\" target=\"_blank\" rel=\"noopener\">Konuyla ilgili detayl\u0131 bir yaz\u0131m\u0131z<\/a> var. Google, Apple ve Microsoft\u2019un t\u00fcm modern i\u015fletim sistemleri ge\u00e7i\u015f anahtarlar\u0131n\u0131 destekler. Ancak, \u015firketiniz Linux kullan\u0131yorsa, muhtemelen ek ara\u00e7lara ihtiyac\u0131n\u0131z olacakt\u0131r ve genel destek hala s\u0131n\u0131rl\u0131d\u0131r.<\/p>\n<p>Ayr\u0131ca, t\u00fcm b\u00fcy\u00fck i\u015fletim sistemlerinde y\u00fczeysel olarak tam destek gibi g\u00f6r\u00fcnse de, ge\u00e7i\u015f anahtarlar\u0131n\u0131n saklanma bi\u00e7iminde \u00e7ok fazla \u00e7e\u015fitlilik vard\u0131r ve bu da uyumluluk sorunlar\u0131na yol a\u00e7abilir. Windows bilgisayarlar ve Android ak\u0131ll\u0131 telefonlar gibi birka\u00e7 sistemin bir arada kullan\u0131lmas\u0131 en sorunlu durumlard\u0131r. Bir cihazda ge\u00e7i\u015f anahtar\u0131 olu\u015fturduktan sonra ba\u015fka bir cihazda bu anahtara eri\u015femedi\u011finizi fark edebilirsiniz. Cihaz filosunu s\u0131k\u0131 bir \u015fekilde y\u00f6neten \u015firketler i\u00e7in bu sorunu \u00e7\u00f6zmenin birka\u00e7 yolu vard\u0131r. \u00d6rne\u011fin, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n kulland\u0131klar\u0131 her \u015firket cihaz\u0131 i\u00e7in ayr\u0131 bir ge\u00e7i\u015f anahtar\u0131 olu\u015fturmalar\u0131n\u0131 sa\u011flayabilirsiniz. Bu, ba\u015flang\u0131\u00e7ta biraz daha fazla kurulum gerektirir zira \u00e7al\u0131\u015fanlar, her cihazda ayn\u0131 ge\u00e7i\u015f anahtar\u0131 olu\u015fturma i\u015flemini ger\u00e7ekle\u015ftirmelidir. Ancak, bu i\u015flem tamamland\u0131ktan sonra oturum a\u00e7mak \u00e7ok az zaman al\u0131r. Ayr\u0131ca, herhangi bir cihaz\u0131 kaybetmeleri durumunda, i\u015f verilerine tamamen eri\u015femez hale gelmezler.<\/p>\n<p>Di\u011fer bir se\u00e7enek ise, \u015firket taraf\u0131ndan onaylanm\u0131\u015f bir parola y\u00f6neticisi kullanarak t\u00fcm \u00e7al\u0131\u015fanlar\u0131n cihazlar\u0131nda ge\u00e7i\u015f anahtarlar\u0131n\u0131 depolamak ve senkronize etmektir. Bu, i\u015fletim sistemi ge\u00e7i\u015f anahtarlar\u0131n\u0131 yerel olarak depolayamad\u0131\u011f\u0131 i\u00e7in Linux bilgisayarlar\u0131 kullanan \u015firketler i\u00e7in de bir zorunluluktur. \u00d6nemli bir uyar\u0131: Bu yakla\u015f\u0131m, yasal uyumluluk denetimlerinde baz\u0131 karma\u015f\u0131kl\u0131klar yaratabilir.<\/p>\n<p>Senkronizasyon ve \u00e7oklu platformlarla neredeyse hi\u00e7 sorun ya\u015famayaca\u011f\u0131n\u0131z bir \u00e7\u00f6z\u00fcm ar\u0131yorsan\u0131z, YubiKey gibi donan\u0131m ge\u00e7i\u015f anahtarlar\u0131 en uygun se\u00e7enek olacakt\u0131r. Ancak, bunlar\u0131n kurulumu ve y\u00f6netimi \u00f6nemli \u00f6l\u00e7\u00fcde daha pahal\u0131 olabilir.<\/p>\n<h2>\u0130\u015f uygulamalar\u0131nda ge\u00e7i\u015f anahtar\u0131 deste\u011fi<\/h2>\n<p>Ge\u00e7i\u015f anahtarlar\u0131n\u0131 i\u015f uygulamalar\u0131n\u0131za dahil etmenin ideal senaryosu, t\u00fcm uygulamalar\u0131n\u0131z\u0131n tek oturum a\u00e7ma (SSO) ile oturum a\u00e7mas\u0131d\u0131r. Bu \u015fekilde, Entra ID veya Okta gibi kurumsal SSO \u00e7\u00f6z\u00fcm\u00fcn\u00fczde yaln\u0131zca ge\u00e7i\u015f anahtar\u0131 deste\u011fini uygulaman\u0131z yeterlidir. Ancak, baz\u0131 kritik i\u015f uygulamalar\u0131n\u0131z SSO\u2019yu desteklemiyorsa veya bu destek s\u00f6zle\u015fmenizin bir par\u00e7as\u0131 de\u011filse (maalesef bu durum bazen olabilir), kullan\u0131c\u0131lar\u0131n her bir sisteme oturum a\u00e7abilmesi i\u00e7in ayr\u0131 ge\u00e7i\u015f anahtarlar\u0131 olu\u015fturman\u0131z gerekir. Donan\u0131m tokenleri 25 ila 100 ge\u00e7i\u015f anahtar\u0131 depolayabilir, bu nedenle buradaki ek maliyetiniz y\u00f6netim taraf\u0131nda olacakt\u0131r.<\/p>\n<p>Ge\u00e7i\u015f anahtarlar\u0131n\u0131 tam olarak destekleyen pop\u00fcler i\u015f sistemleri aras\u0131nda <a href=\"https:\/\/helpx.adobe.com\/manage-account\/using\/secure-sign-in-with-passkey.html\" target=\"_blank\" rel=\"nofollow noopener\">Adobe Creative Cloud<\/a>, <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_credentials_mfa_enable_fido.html\" target=\"_blank\" rel=\"nofollow noopener\">AWS<\/a>, <a href=\"https:\/\/docs.github.com\/en\/authentication\/authenticating-with-a-passkey\/about-passkeys\" target=\"_blank\" rel=\"nofollow noopener\">GitHub<\/a>, <a href=\"https:\/\/workspace.google.com\/blog\/product-announcements\/major-security-innovation-passkeys\" target=\"_blank\" rel=\"nofollow noopener\">Google Workspace<\/a>, <a href=\"https:\/\/product.hubspot.com\/blog\/passkeys-the-future-of-login-at-hubspot\" target=\"_blank\" rel=\"nofollow noopener\">HubSpot<\/a>, <a href=\"https:\/\/learn.microsoft.com\/tr-tr\/entra\/identity\/authentication\/how-to-enable-passkey-fido2\" target=\"_blank\" rel=\"nofollow noopener\">Office 365<\/a>, <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=xcloud.mfa_supported_verification_methods_securitykey.htm&amp;type=5\" target=\"_blank\" rel=\"nofollow noopener\">Salesforce<\/a> ve <a href=\"https:\/\/www.zoho.com\/accounts\/oneauth\/\" target=\"_blank\" rel=\"nofollow noopener\">Zoho<\/a> bulunur. Baz\u0131 <a href=\"https:\/\/community.sap.com\/t5\/crm-and-cx-blog-posts-by-sap\/password-less-registration-and-login-process-with-sap-cdc-part-2\/ba-p\/13572269\" target=\"_blank\" rel=\"nofollow noopener\">SAP sistemleri<\/a> de ge\u00e7i\u015f anahtarlar\u0131n\u0131 destekler.<\/p>\n<h2>\u00c7al\u0131\u015fanlar\u0131n haz\u0131r olmas\u0131<\/h2>\n<p>Ge\u00e7i\u015f anahtarlar\u0131n\u0131 kullan\u0131ma sunmak, senaryo ne olursa olsun ekibinizin h\u0131zlanmas\u0131n\u0131 sa\u011flamak anlam\u0131na gelir. Yeni arabirimleri anlamaya \u00e7al\u0131\u015f\u0131rken kafalar\u0131n\u0131n kar\u0131\u015fmas\u0131n\u0131 istemezsiniz. Ama\u00e7, herkesin her bir cihazda ge\u00e7i\u015f anahtarlar\u0131n\u0131 kullan\u0131rken kendini g\u00fcvende hissetmesidir. \u0130\u015fte \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n anlamas\u0131 gereken temel konular.<\/p>\n<ul>\n<li>Ge\u00e7i\u015f anahtarlar\u0131 neden parolalardan \u00fcst\u00fcnd\u00fcr? \u00c7ok daha g\u00fcvenlidirler, oturum a\u00e7mak i\u00e7in daha h\u0131zl\u0131d\u0131rlar ve d\u00fczenli olarak de\u011fi\u015ftirilmeleri gerekmez.<\/li>\n<li>Biyometrik veriler ge\u00e7i\u015f anahtarlar\u0131 ile nas\u0131l \u00e7al\u0131\u015f\u0131r? Biyometrik veriler cihazdan asla \u00e7\u0131kmaz ve i\u015fveren taraf\u0131ndan saklanmaz veya i\u015flenmez.<\/li>\n<li>\u0130lk ge\u00e7i\u015f anahtarlar\u0131 nas\u0131l al\u0131n\u0131r? \u00d6rne\u011fin Microsoft\u2019un Ge\u00e7ici Eri\u015fim Ge\u00e7i\u015fi \u00f6zelli\u011fi vard\u0131r ve \u00fc\u00e7\u00fcnc\u00fc taraf IAM sistemleri genellikle bir ilk kat\u0131l\u0131m ba\u011flant\u0131s\u0131 g\u00f6nderir; yine de s\u00fcrecin kapsaml\u0131 bir \u015fekilde belgelenmesi gerekir.<\/li>\n<li>Cihazlar\u0131 ge\u00e7i\u015f anahtarlar\u0131n\u0131 tan\u0131mad\u0131\u011f\u0131nda ne yapmak gerekir?<\/li>\n<li>Cihazlar\u0131n\u0131 kaybetmeleri durumunda ne yapmalar\u0131 gerekir? Kendi ge\u00e7i\u015f anahtar\u0131na sahip ba\u015fka bir cihazdan oturum a\u00e7abilirler veya belki de b\u00f6yle bir acil durum i\u00e7in kendilerine kapal\u0131 bir zarf i\u00e7inde verilen bir OTP kullanabilirler.<\/li>\n<li>Di\u011fer bilgisayarlardan (\u015firket ilkeleri izin veriyorsa) i\u015f sistemlerine nas\u0131l giri\u015f yap\u0131l\u0131r?<\/li>\n<li>Ge\u00e7i\u015f anahtar\u0131 ile ilgili bir kimlik av\u0131 giri\u015fimi nas\u0131l g\u00f6r\u00fcnebilir?<\/li>\n<\/ul>\n<h2>Ge\u00e7i\u015f anahtarlar\u0131 sihirli de\u011fnek de\u011fildir<\/h2>\n<p>Ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7mek, siber g\u00fcvenlik ekibinizin kimlik tehditlerini risk listesinden \u00e7\u0131karabilece\u011fi anlam\u0131na gelmez. Elbette, sald\u0131rganlar i\u00e7in i\u015fler zorla\u015f\u0131r, ancak yine de a\u015fa\u011f\u0131dakileri yapabilirler:<\/p>\n<ul>\n<li>Ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7memi\u015f sistemleri hedef alma<\/li>\n<li>Halen parola ve OTP gibi yedek oturum a\u00e7ma y\u00f6ntemlerine sahip sistemlere y\u00f6nelme<\/li>\n<li>Bilgi h\u0131rs\u0131zlar\u0131n\u0131n bula\u015ft\u0131\u011f\u0131 cihazlardan kimlik do\u011frulama tokenlar\u0131n\u0131 \u00e7alma<\/li>\n<li>Ge\u00e7i\u015f anahtar\u0131 korumalar\u0131n\u0131 atlamak i\u00e7in \u00f6zel teknikler kullanma<\/li>\n<\/ul>\n<p>Ge\u00e7i\u015f anahtar\u0131n\u0131n kendisini ele ge\u00e7irmek imkans\u0131z olsa da, sald\u0131rganlar sahte web altyap\u0131s\u0131 kurarak bir kurban\u0131 kurumsal bir hizmette k\u00f6t\u00fc ama\u00e7l\u0131 bir oturumu do\u011frulamas\u0131 ve onaylamas\u0131 i\u00e7in kand\u0131rabilir.<\/p>\n<p>Bu t\u00fcr bir <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-aitm-in-spearphishing-attacks\/51919\/\" target=\"_blank\" rel=\"noopener nofollow\">AiTM sald\u0131r\u0131s\u0131n\u0131n<\/a> yak\u0131n tarihli bir \u00f6rne\u011fi <a href=\"https:\/\/expel.com\/blog\/poisonseed-downgrading-fido-key-authentications-to-fetch-user-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">ABD\u2019de belgelenmi\u015ftir<\/a>. Bu olayda, kurban kurumsal bir hizmet i\u00e7in sahte bir kimlik do\u011frulama sayfas\u0131na \u00e7ekilmi\u015f, sald\u0131rganlar \u00f6nce kullan\u0131c\u0131 ad\u0131 ve parolalar\u0131n\u0131 ele ge\u00e7irmi\u015f, ard\u0131ndan da bir QR kodu taratarak oturum onay\u0131n\u0131 alm\u0131\u015ft\u0131r. <a href=\"https:\/\/expel.com\/blog\/an-important-update-and-apology-on-our-poisonseed-blog\/\" target=\"_blank\" rel=\"nofollow noopener\">Bu olayda<\/a>, g\u00fcvenlik ilkeleri do\u011fru \u015fekilde yap\u0131land\u0131r\u0131lm\u0131\u015ft\u0131, bu nedenle bu QR kodunun taranmas\u0131 ba\u015far\u0131l\u0131 bir kimlik do\u011frulamas\u0131na yol a\u00e7mad\u0131. Ancak ge\u00e7i\u015f anahtarlar\u0131yla b\u00f6yle bir mekanizma uyguland\u0131\u011f\u0131ndan, sald\u0131rganlar bir yerde yanl\u0131\u015f yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131n\u0131 ve kimlik do\u011frulaman\u0131n ger\u00e7ekle\u015ftirildi\u011fi cihaz ile anahtar\u0131n sakland\u0131\u011f\u0131 cihaz\u0131n fiziksel yak\u0131nl\u0131\u011f\u0131n\u0131n kontrol edilmedi\u011fini umarlar.<\/p>\n<p>Sonu\u00e7 olarak, ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7mek ayr\u0131nt\u0131l\u0131 ilke yap\u0131land\u0131rmas\u0131 gerektirir. Bu, hem kimlik do\u011frulama ilkelerini (bir ge\u00e7i\u015f anahtar\u0131 mevcut oldu\u011funda parolalar\u0131n devre d\u0131\u015f\u0131 b\u0131rak\u0131lmas\u0131 veya bilinmeyen sat\u0131c\u0131lardan fiziksel tokenlar\u0131n yasaklanmas\u0131 gibi) hem de izleme ilkelerini (\u015f\u00fcpheli konumlardan ge\u00e7i\u015f anahtar\u0131 kay\u0131tlar\u0131n\u0131n veya cihazlar aras\u0131 senaryolar\u0131n kaydedilmesi gibi) i\u00e7erir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Ge\u00e7i\u015f anahtarlar\u0131n\u0131 destekleyen kurumsal sistemleri, uyumluluk eksikliklerini ve neden yak\u0131n zamanda parolalara veda etmeyece\u011fimizi derinlemesine inceliyoruz.<\/p>\n","protected":false},"author":2722,"featured_media":13661,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1624,1195,2791,1564,1274,1074,1575,2653,2435,1525,561,2798,878],"class_list":{"0":"post-13658","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-2fa","10":"tag-bulut","11":"tag-gecis-anahtarlari","12":"tag-hesaplar","13":"tag-is","14":"tag-kimlik-avi","15":"tag-kimlik-dogrulama","16":"tag-kimlik-guvenligi","17":"tag-mfa","18":"tag-parolalar","19":"tag-sifreler","20":"tag-sso","21":"tag-teknoloji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/passkey-enterprise-issues-and-threats\/13658\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/passkey-enterprise-issues-and-threats\/29347\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/24461\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/12670\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/passkey-enterprise-issues-and-threats\/29295\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/28400\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/passkey-enterprise-issues-and-threats\/31269\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/passkey-enterprise-issues-and-threats\/29972\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/passkey-enterprise-issues-and-threats\/40208\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/54003\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/passkey-enterprise-issues-and-threats\/23063\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/passkey-enterprise-issues-and-threats\/24090\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/passkey-enterprise-issues-and-threats\/32527\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/passkey-enterprise-issues-and-threats\/29511\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/passkey-enterprise-issues-and-threats\/35213\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/passkey-enterprise-issues-and-threats\/34859\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/gecis-anahtarlari\/","name":"ge\u00e7i\u015f anahtarlar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13658"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13658\/revisions"}],"predecessor-version":[{"id":13703,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13658\/revisions\/13703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13661"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}