{"id":8098,"date":"2022-05-11T16:38:16","date_gmt":"2022-05-11T13:38:16","guid":{"rendered":"https:\/\/www.inforte.com\/?p=8098"},"modified":"2022-05-11T16:39:42","modified_gmt":"2022-05-11T13:39:42","slug":"ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/","title":{"rendered":"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz?"},"content":{"rendered":"<p>G\u00fcn\u00fcm\u00fczde kurumsal a\u011flar, \u00e7oklu bulutlardaki Windows, Linux ve UNIX sistemleriyle hibrittir ve BT ve BT B\u00f6l\u00fcmleri ekiplerine eri\u015fimi y\u00f6netme gibi g\u00f6z korkutucu bir g\u00f6rev b\u0131rakmaktad\u0131r. Active Directory Bridging, uzun y\u0131llard\u0131r, kullan\u0131c\u0131lar\u0131n kurumsal Active Directory hesaplar\u0131yla Windows olmayan sistemlerde oturum a\u00e7malar\u0131na olanak sa\u011flayarak yard\u0131mc\u0131 olmu\u015ftur.<\/p>\n<p>Ancak Active Directory Bridging&#8217;in de\u011feri bunun \u00e7ok \u00f6tesine ge\u00e7ebilir. Temel bridgingden daha fazla Active Directory \u00f6zelli\u011finden yararlanarak eri\u015fimi daha iyi y\u00f6netebilir ve yanal hareketi \u00f6nleyebilirsiniz.<\/p>\n<p><strong>Active Directory Bridging ve Kimlik Do\u011frulama<\/strong><\/p>\n<p>On ki\u015fiden dokuzu, &#8220;Active Directory Bridging nedir&#8221; sorusunu sordu\u011fumda yan\u0131tlar benzer olmaktad\u0131r:<\/p>\n<p>o Ayr\u0131cal\u0131kl\u0131 Eri\u015fim Y\u00f6netimi (PAM) \u00f6zelli\u011fidir.<\/p>\n<p>o Y\u00f6neticilerin Active Directory hesaplar\u0131n\u0131 kullanarak Linux makinelerinde oturum a\u00e7malar\u0131n\u0131 sa\u011flar.<\/p>\n<p>o PAM rollerini tan\u0131mlarken Active Directory gruplar\u0131ndan yararlanmam\u0131z\u0131 sa\u011flar.<\/p>\n<p>Hepsi do\u011frudur. *NIX sunucular\u0131na sahip bir Active Directory ma\u011fazas\u0131nda, y\u00f6neticileriniz herhangi bir yerde oturum a\u00e7mak i\u00e7in Active Directory kimlik bilgilerini kullanmaktan ve \u00e7oklu oturum a\u00e7ma i\u00e7in Active Directory Kerberos&#8217;tan yararlan\u0131r. Active Directory&#8217;deki merkezi y\u00f6netim sayesinde operasyonel ek y\u00fck\u00fc azalt\u0131r, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 \u00f6nler ve eri\u015fim y\u00f6neti\u015fimi ve kontrol tutars\u0131zl\u0131klar\u0131n\u0131 en aza indirirsiniz. Ayr\u0131ca, y\u00f6neticilerin *NIX sistemlerinde oturum a\u00e7mak i\u00e7in kulland\u0131\u011f\u0131 bir\u00e7ok yerel ayr\u0131cal\u0131kl\u0131 hesab\u0131 ortadan kald\u0131rabilir, bunun yerine tek bir Active Directory hesab\u0131na g\u00fcvenebilir ve b\u00f6ylece sald\u0131r\u0131 y\u00fczeyinizi azaltabilirsiniz.<\/p>\n<p>Active Directory Bridging, Active Directory ID&#8217;lerinin ve parolalar\u0131n\u0131n do\u011frulanmas\u0131ndan \u00e7ok daha fazlas\u0131d\u0131r.<\/p>\n<p>Bu avantajlar, genel olarak, AAA (Kimlik Do\u011frulama, Yetkilendirme ve Hesaplama) \u00e7er\u00e7evesinin Kimlik Do\u011frulama b\u00f6l\u00fcm\u00fc olarak da bilinen, oturum a\u00e7ma s\u0131ras\u0131nda bir kullan\u0131c\u0131y\u0131 kimlik ve parola ile tan\u0131mlamayla e\u015fle\u015fir. \u00c7o\u011fu sat\u0131c\u0131 i\u00e7in AD Bridging&#8217;in durdu\u011fu yer buras\u0131d\u0131r.<\/p>\n<p><strong><br \/>\nActive Directory Bridging, Yetkilendirme ve Muhasebe<\/strong><\/p>\n<p>Kullan\u0131c\u0131y\u0131 tan\u0131mlamak i\u00e7in kimlik do\u011frulama kullanmak yeterli de\u011fildir. Daha sonra, uygunlu\u011fu ara\u015ft\u0131rmam\u0131z veya kan\u0131tlamam\u0131z gerekirse, kullan\u0131c\u0131n\u0131n neler yapabilece\u011fini kontrol etmek i\u00e7in izinleri kullanmal\u0131 ve bu aktiviteyi takip etmeliyiz. Bunlar, AAA \u00e7er\u00e7evesinin Yetkilendirme ve Muhasebe b\u00f6l\u00fcmleridir; \u015fimdi bunlar\u0131 ke\u015ffedece\u011fiz.<\/p>\n<p>Yetki<\/p>\n<p>Kullan\u0131c\u0131lar\u0131n *NIX sistemlerinde yapabileceklerini y\u00f6netmek, yerel i\u015fletim sistemi denetimlerinin ve &#8220;sudo&#8221; haklar\u0131n\u0131n bir birle\u015fimidir. Yerel i\u015fletim sistemi kontrolleri s\u0131n\u0131rl\u0131d\u0131r \u2013 kullan\u0131c\u0131lar ve gruplar i\u00e7in okuma\/yazma\/y\u00fcr\u00fctme izni \u2013 ayr\u0131nt\u0131l\u0131 kontrol yoktur.<\/p>\n<p>Normal bir *NIX kullan\u0131c\u0131s\u0131, ayr\u0131cal\u0131kl\u0131 sistem komutlar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131ramayan s\u0131n\u0131rl\u0131 haklara sahiptir. Yerel sudo program\u0131, talimatlar\u0131n\u0131 her sistemde yap\u0131land\u0131rman\u0131z ve y\u00f6netmeniz gereken yerel bir \/etc\/sudoers dosyas\u0131ndan alarak izinlerin kontroll\u00fc olarak y\u00fckseltilmesini sa\u011flar. Bu model, d\u00fczinelerce veya y\u00fczlerce sisteminiz oldu\u011funda \u00f6l\u00e7eklenmez (binlerce m\u00fc\u015fterimiz oldu\u011funu varsayarsak). \u0130dari y\u00fck\u00fc art\u0131r\u0131r ve toksik kombinasyonlar, g\u00fcvenlik a\u00e7\u0131klar\u0131, a\u015f\u0131r\u0131 ayr\u0131cal\u0131kl\u0131 kullan\u0131c\u0131lar ve ba\u015far\u0131s\u0131z denetimler riskini ortaya \u00e7\u0131kar\u0131r.<\/p>\n<p>AD Bridging ile yerel bir istemci, etki alan\u0131na bir Windows sunucusuna kat\u0131lmak gibi *NIX sunucular\u0131n\u0131 Active Directory&#8217;ye eklemenize olanak tan\u0131r. Yerel \/etc\/sudoer dosyalar\u0131na ba\u011f\u0131ml\u0131l\u0131\u011f\u0131 ortadan kald\u0131rarak, Active Directory&#8217;de merkezi olarak ayr\u0131cal\u0131k y\u00fckseltme (&#8220;Yetkilendirme&#8221;) ilkelerini y\u00f6netmenize olanak tan\u0131yoruz. Bu merkezi y\u00f6netim ayn\u0131 zamanda oturum a\u00e7ma (&#8220;Kimlik Do\u011frulama&#8221;) ve \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA) ilkelerini de kapsar; istemci bunlar\u0131 her sistemde yerel olarak uygular.<\/p>\n<p>Kurulu\u015funuzun Windows ekibini \u00fczmekten ka\u00e7\u0131nmak i\u00e7in bu *NIX ilkelerini di\u011fer Windows merkezli Active Directory ilkelerinden ve yap\u0131land\u0131rmalar\u0131ndan yal\u0131tabilirsiniz.<\/p>\n<p>Muhasebe<\/p>\n<p>Sahneyi hayal edin; devam eden potansiyel bir ihlal var. Birka\u00e7 *NIX sisteminde oturum a\u00e7mal\u0131 ve yerel g\u00fcnl\u00fck dosyalar\u0131nda aceleyle dola\u015fmal\u0131s\u0131n\u0131z. \u00c7ok fazla aksiyon g\u00fcnl\u00fckleri kirletir ve binlerce alakas\u0131z olay\u0131 elemek zahmetli ve hataya a\u00e7\u0131kt\u0131r. &#8220;K\u00f6k&#8221; ile ili\u015fkilendirilen bir\u00e7ok ayr\u0131cal\u0131kl\u0131 etkinlik g\u00f6r\u00fcyorsunuz. Ama kim root olarak giri\u015f yapt\u0131? Sorumluluk yok. Bunu her sistem i\u00e7in tekrarlay\u0131n ve de\u011ferli istihbarat bulana kadar siber sald\u0131rgan verilerinizle birlikte u\u00e7ar gider.<\/p>\n<p>AD Bridging, izinleri g\u00f6revle daha iyi hizalamak i\u00e7in k\u0131s\u0131tlay\u0131c\u0131, ayr\u0131nt\u0131l\u0131 ilkeleri destekler. G\u00fcnl\u00fc\u011fe kaydedilen ayr\u0131cal\u0131kl\u0131 etkinlik farkl\u0131d\u0131r, \u015fifreli de\u011fildir ve merkezi bir arabirim arac\u0131l\u0131\u011f\u0131yla analiz edilmesi kolayd\u0131r. En Az Ayr\u0131cal\u0131k \u0130lkesini uygulayan AD Bridging, hesap verebilirlik i\u00e7in etkinli\u011fi benzersiz bir Active Directory kullan\u0131c\u0131s\u0131na ba\u011flar. Oturum kay\u0131tlar\u0131 ile, herhangi bir zaman aral\u0131\u011f\u0131nda herhangi bir makinede herhangi bir kullan\u0131c\u0131 i\u00e7in ayr\u0131cal\u0131kl\u0131 etkinli\u011fi yeniden oynatabilirsiniz. Ayr\u0131ca, \u00e7al\u0131\u015ft\u0131r\u0131lan uygulamalar veya klavyede yaz\u0131lan komutlar i\u00e7in kay\u0131tlar aras\u0131nda arama yapabilirsiniz.<\/p>\n<p>Daha Geli\u015fmi\u015f AD Bridging i\u00e7in Daha Derin Active Directory Entegrasyonu<\/p>\n<p>Bu yaz\u0131m\u0131zda; Kullan\u0131c\u0131 Kimlik Do\u011frulamas\u0131 etraf\u0131nda temel AD Bridging avantajlar\u0131n\u0131 ve ayr\u0131ca Yetkilendirme ve Denetime ba\u011fl\u0131 ek avantajlar\u0131 tart\u0131\u015ft\u0131k. Ancak faydalar\u0131 burada bitmiyor. Geli\u015fmi\u015f AD K\u00f6pr\u00fcleme ile veri ihlali veya fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 riskini azaltabilir, uyumluluk duru\u015funuzu iyile\u015ftirebilir, maliyeti azaltabilir ve operasyonel verimlili\u011fi daha da art\u0131rabilirsiniz.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>G\u00fcn\u00fcm\u00fczde kurumsal a\u011flar, \u00e7oklu bulutlardaki Windows, Linux ve UNIX sistemleriyle hibrittir ve BT ve BT B\u00f6l\u00fcmleri ekiplerine eri\u015fimi y\u00f6netme gibi g\u00f6z korkutucu bir g\u00f6rev b\u0131rakmaktad\u0131r. Active Directory Bridging, uzun y\u0131llard\u0131r, kullan\u0131c\u0131lar\u0131n kurumsal Active Directory hesaplar\u0131yla Windows olmayan sistemlerde oturum a\u00e7malar\u0131na olanak sa\u011flayarak yard\u0131mc\u0131 olmu\u015ftur. Ancak&#8230;<\/p>","protected":false},"author":2,"featured_media":8099,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[],"class_list":["post-8098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz? - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz? - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"G\u00fcn\u00fcm\u00fczde kurumsal a\u011flar, \u00e7oklu bulutlardaki Windows, Linux ve UNIX sistemleriyle hibrittir ve BT ve BT B\u00f6l\u00fcmleri ekiplerine eri\u015fimi y\u00f6netme gibi g\u00f6z korkutucu bir g\u00f6rev b\u0131rakmaktad\u0131r. Active Directory Bridging, uzun y\u0131llard\u0131r, kullan\u0131c\u0131lar\u0131n kurumsal Active Directory hesaplar\u0131yla Windows olmayan sistemlerde oturum a\u00e7malar\u0131na olanak sa\u011flayarak yard\u0131mc\u0131 olmu\u015ftur. Ancak...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T13:38:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-11T13:39:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz?\",\"datePublished\":\"2022-05-11T13:38:16+00:00\",\"dateModified\":\"2022-05-11T13:39:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\"},\"wordCount\":965,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg\",\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\",\"url\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\",\"name\":\"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz? - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg\",\"datePublished\":\"2022-05-11T13:38:16+00:00\",\"dateModified\":\"2022-05-11T13:39:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg\",\"width\":920,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz? - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/","og_locale":"en_GB","og_type":"article","og_title":"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz? - Inforte Bili\u015fim A.\u015e.","og_description":"G\u00fcn\u00fcm\u00fczde kurumsal a\u011flar, \u00e7oklu bulutlardaki Windows, Linux ve UNIX sistemleriyle hibrittir ve BT ve BT B\u00f6l\u00fcmleri ekiplerine eri\u015fimi y\u00f6netme gibi g\u00f6z korkutucu bir g\u00f6rev b\u0131rakmaktad\u0131r. Active Directory Bridging, uzun y\u0131llard\u0131r, kullan\u0131c\u0131lar\u0131n kurumsal Active Directory hesaplar\u0131yla Windows olmayan sistemlerde oturum a\u00e7malar\u0131na olanak sa\u011flayarak yard\u0131mc\u0131 olmu\u015ftur. Ancak...","og_url":"https:\/\/www.inforte.com\/en\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2022-05-11T13:38:16+00:00","article_modified_time":"2022-05-11T13:39:42+00:00","og_image":[{"width":920,"height":500,"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg","type":"image\/jpeg"}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz?","datePublished":"2022-05-11T13:38:16+00:00","dateModified":"2022-05-11T13:39:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/"},"wordCount":965,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg","articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/","url":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/","name":"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz? - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg","datePublished":"2022-05-11T13:38:16+00:00","dateModified":"2022-05-11T13:39:42+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/hero-CGR-cyber-security.jpg","width":920,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/ad-bridging-yalnizca-kimlik-dogrulama-icin-kullaniyorsaniz-bir-ton-degeri-kaciriyorsunuz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"AD Bridging:Yaln\u0131zca kimlik do\u011frulama i\u00e7in mi kullan\u0131yorsunuz?"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8098"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=8098"}],"version-history":[{"count":4,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8098\/revisions"}],"predecessor-version":[{"id":8103,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8098\/revisions\/8103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media\/8099"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=8098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=8098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=8098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}