{"id":14907,"date":"2023-09-25T12:49:01","date_gmt":"2023-09-25T19:49:01","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=14907"},"modified":"2023-10-18T03:04:29","modified_gmt":"2023-10-18T10:04:29","slug":"securing-couchbase-with-tls-certificates-part-2","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-2\/","title":{"rendered":"Asegurando la Comunicaci\u00f3n con Certificados TLS: Una gu\u00eda definitiva para Couchbase Server (Parte 2 de 3)"},"content":{"rendered":"<p><span style=\"font-weight: 400\">En la parte 1 de esta serie de 3 partes aprendimos sobre <a href=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-1\/\">los componentes de TLS<\/a>En la parte 2 veremos c\u00f3mo interact\u00faan entre s\u00ed los componentes de TLS.  En <a href=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-3\/\">Parte 3<\/a> de esta gu\u00eda, veremos c\u00f3mo se utilizan los componentes en Couchbase Server.<\/span><\/p>\n<h2>Proceso de firma de certificados<\/h2>\n<p><span style=\"font-weight: 400\">Tanto si gestiona su propia autoridad de certificaci\u00f3n interna como si recurre a un proveedor comercial establecido, como DigiCert, GlobalSign o GoDaddy, la primera etapa consiste en generar una solicitud de firma de certificado. Cada vez que un nuevo certificado o un certificado de reemplazo necesita ser emitido, la entidad que solicita el certificado genera un par de claves que consiste en una clave privada y una clave p\u00fablica ellos mismos, normalmente utilizando el paquete OpenSSL. En un Cluster de Servidores Couchbase la entidad ser\u00eda un Nodo de Servidor Couchbase individual. La entidad guarda la clave privada de forma segura, mientras que la clave p\u00fablica se incluye en una solicitud de firma de certificado (CSR) que se env\u00eda a la CA. Normalmente esto se realiza con una CA intermedia, no con una CA ra\u00edz.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14909 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133711822-1024x540.png\" alt=\"\" width=\"900\" height=\"475\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-1024x540.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-300x158.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-768x405.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-1536x809.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-1320x696.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822.png 1983w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Al recibir la CSR, la CA verifica la identidad de la entidad empleando diversos m\u00e9todos de validaci\u00f3n, como la validaci\u00f3n del dominio o la validaci\u00f3n de la organizaci\u00f3n. Una vez confirmada la identidad, la CA genera una firma digital utilizando su clave privada, que vincula la clave p\u00fablica de la entidad con su informaci\u00f3n de identidad. Este certificado firmado se devuelve a la entidad.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Validaci\u00f3n de certificados<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Para validar un certificado, la parte que conf\u00eda en \u00e9l (por ejemplo, un navegador web) debe asegurarse de que el certificado es aut\u00e9ntico y ha sido emitido por una CA de confianza. Este proceso implica una serie de pasos, que incluyen las cuatro etapas siguientes.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Ancla de confianza<\/span><\/h3>\n<h3 style=\"margin-bottom: 31.5938px\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14910 alignright\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133740385-1024x903.png\" alt=\"\" width=\"315\" height=\"278\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385-1024x903.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385-300x265.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385-768x677.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385.png 1092w\" sizes=\"auto, (max-width: 315px) 100vw, 315px\" \/><\/h3>\n<p><span style=\"font-weight: 400\">La parte que conf\u00eda, por ejemplo un navegador web, posee un conjunto preinstalado de certificados ra\u00edz de confianza, tambi\u00e9n conocidos como anclas de confianza. Estos certificados pertenecen a CA conocidas y contienen sus claves p\u00fablicas, lo que sirve como base de la confianza.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cuando un cliente o servidor recibe un certificado durante el intercambio SSL\/TLS, comprueba si la firma digital del certificado puede ser validada por alguna de las anclas de confianza instaladas en el sistema. Si la cadena del certificado se puede rastrear hasta un anclaje de confianza, el certificado se considera aut\u00e9ntico y la conexi\u00f3n TLS prosigue con confianza.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Ruta de certificaci\u00f3n<\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14911 alignright\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133815995-1024x926.png\" alt=\"\" width=\"284\" height=\"257\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995-1024x926.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995-300x271.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995-768x694.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995.png 1033w\" sizes=\"auto, (max-width: 284px) 100vw, 284px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Al establecer una conexi\u00f3n cifrada TLS, la parte que conf\u00eda (navegador web) examina la ruta de certificaci\u00f3n del certificado, que incluye una cadena de certificados que comienza con el certificado emitido y llega hasta un anclaje de confianza. Cada certificado de la cadena est\u00e1 firmado por el certificado subsiguiente, llegando finalmente a un anclaje de confianza.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Verificaci\u00f3n de firmas<\/span><\/h3>\n<p><span style=\"font-weight: 400\">La parte que conf\u00eda (navegador web) utiliza la clave p\u00fablica de cada certificado de la ruta de certificaci\u00f3n para verificar la firma digital del siguiente certificado. Este proceso contin\u00faa hasta que se alcanza el anclaje de confianza.<\/span><\/p>\n<p><span style=\"font-weight: 400\">La firma digital es un valor criptogr\u00e1fico creado por la CA utilizando su clave privada, que vincula el contenido del certificado a la identidad de la CA. El cliente utiliza la clave p\u00fablica de la CA para descifrar la firma digital, y si el descifrado coincide con el contenido del certificado, la firma se considera v\u00e1lida. Esta validaci\u00f3n confirma que el certificado no ha sido manipulado y que ha sido emitido por la CA de confianza.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Controles de confianza y caducidad<\/span><\/h3>\n<p><span style=\"font-weight: 400\">La parte que conf\u00eda comprueba si el anclaje de confianza est\u00e1 incluido en sus certificados ra\u00edz de confianza preinstalados. Tambi\u00e9n comprueba la fecha de caducidad de cada certificado para asegurarse de que sigue siendo v\u00e1lido.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14912 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133838529-1024x439.png\" alt=\"\" width=\"900\" height=\"386\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-1024x439.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-300x129.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-768x330.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-1536x659.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-1320x567.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529.png 1892w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Si toda la ruta de certificaci\u00f3n se valida correctamente, y el ancla de confianza es de confianza, la parte que conf\u00eda considera que el certificado es genuino y procede con la conexi\u00f3n segura. Con Couchbase Server 7.2.x esta cadena puede tener 10 certificados de profundidad.<\/span><\/p>\n<p><span style=\"font-weight: 400\">En este ejemplo, las autoridades de certificaci\u00f3n ra\u00edz de confianza incorporadas en el navegador web son nombres inventados, pero puede consultar una lista real. Las CA de confianza preautorizadas de Firefox son <a href=\"https:\/\/wiki.mozilla.org\/CA\/Included_Certificates\">enlazado desde su wiki<\/a><\/span><span style=\"font-weight: 400\">. Si su certificado ha sido generado por una CA que no ha sido emitida por una de las CA de confianza integradas, primero tendr\u00e1 que a\u00f1adir el certificado p\u00fablico de la CA como entidad de confianza a su sistema operativo y navegador antes de poder utilizar los certificados emitidos por esa CA.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Ahora que hemos visto los componentes que intervienen en TLS y c\u00f3mo funcionan, en la parte 3 veremos <a href=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-3\/\">c\u00f3mo funciona TLS en Couchbase Server<\/a>.<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-1\/\">Parte 1 - Asegurando la Comunicaci\u00f3n con Certificados TLS: Una gu\u00eda definitiva para Couchbase Server<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>In part 1 of this 3 part series we learned about the components of TLS, in part 2 we will see how the TLS components interact with each other.\u00a0 In Part 3 of this guide, we&#8217;ll see how the components [&hellip;]<\/p>","protected":false},"author":1864,"featured_media":14908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1814,1815,1813],"tags":[2001,2002,9262],"ppma_author":[8928],"class_list":["post-14907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-design","category-best-practices-and-tutorials","category-security","tag-certificate-authority","tag-self-signed-certificate","tag-tls-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3) - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)\" \/>\n<meta property=\"og:description\" content=\"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-25T19:49:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T10:04:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133631038.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1870\" \/>\n\t<meta property=\"og:image:height\" content=\"931\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ian McCloy, Director Product Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian McCloy, Director Product Management\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\"},\"author\":{\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\"},\"headline\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)\",\"datePublished\":\"2023-09-25T19:49:01+00:00\",\"dateModified\":\"2023-10-18T10:04:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\"},\"wordCount\":735,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"keywords\":[\"Certificate Authority\",\"self signed certificate\",\"TLS encryption\"],\"articleSection\":[\"Application Design\",\"Best Practices and Tutorials\",\"Security\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\",\"name\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3) - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"datePublished\":\"2023-09-25T19:49:01+00:00\",\"dateModified\":\"2023-10-18T10:04:29+00:00\",\"description\":\"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"width\":1870,\"height\":931},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\",\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"caption\":\"Ian McCloy, Director Product Management, Couchbase\"},\"description\":\"Ian McCloy is the Director of the Platform and Security Product Management Group for Couchbase and lives in the United Kingdom. His dedicated team is responsible for the Reliability, Availability, Serviceability and Security architecture of Couchbase Server and the SaaS Database, Capella. This team also own cloud-native platforms like the Couchbase Kubernetes Autonomous Operator. Ian has a vast range of experience as a Software Engineer, Technical Support Engineer, Quality Assurance Engineer and Systems Administrator. Ian has led global technical teams for the majority of his 20 year professional career and holds several patents in the areas of information security, virtualisation and hardware design. https:\/\/www.linkedin.com\/in\/ianmccloy\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ianmccloy\/\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/ian-mccloycouchbase-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3) - The Couchbase Blog","description":"Tanto si gestiona su propia autoridad de certificaci\u00f3n interna como si utiliza un proveedor comercial establecido como DigiCert, GlobalSign o GoDaddy, la primera etapa consiste en generar una solicitud de firma de certificado.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-2\/","og_locale":"es_MX","og_type":"article","og_title":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)","og_description":"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.","og_url":"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-with-tls-certificates-part-2\/","og_site_name":"The Couchbase Blog","article_published_time":"2023-09-25T19:49:01+00:00","article_modified_time":"2023-10-18T10:04:29+00:00","og_image":[{"width":1870,"height":931,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133631038.png","type":"image\/png"}],"author":"Ian McCloy, Director Product Management","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ian McCloy, Director Product Management","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/"},"author":{"name":"Ian McCloy, Director Product Management, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19"},"headline":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)","datePublished":"2023-09-25T19:49:01+00:00","dateModified":"2023-10-18T10:04:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/"},"wordCount":735,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","keywords":["Certificate Authority","self signed certificate","TLS encryption"],"articleSection":["Application Design","Best Practices and Tutorials","Security"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/","url":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/","name":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3) - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","datePublished":"2023-09-25T19:49:01+00:00","dateModified":"2023-10-18T10:04:29+00:00","description":"Tanto si gestiona su propia autoridad de certificaci\u00f3n interna como si utiliza un proveedor comercial establecido como DigiCert, GlobalSign o GoDaddy, la primera etapa consiste en generar una solicitud de firma de certificado.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","width":1870,"height":931},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19","name":"Ian McCloy, Director de Gesti\u00f3n de Productos, Couchbase","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f","url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","caption":"Ian McCloy, Director Product Management, Couchbase"},"description":"Ian McCloy es el Director del Grupo de Gesti\u00f3n de Productos de Plataforma y Seguridad de Couchbase y vive en el Reino Unido. Su equipo dedicado es responsable de la arquitectura de Fiabilidad, Disponibilidad, Capacidad de Servicio y Seguridad de Couchbase Server y la Base de Datos SaaS, Capella. Este equipo tambi\u00e9n es propietario de plataformas nativas de la nube como el Operador Aut\u00f3nomo Couchbase Kubernetes. Ian tiene una amplia experiencia como Ingeniero de Software, Ingeniero de Soporte T\u00e9cnico, Ingeniero de Garant\u00eda de Calidad y Administrador de Sistemas. Ian ha dirigido equipos t\u00e9cnicos globales durante la mayor parte de sus 20 a\u00f1os de carrera profesional y es titular de varias patentes en las \u00e1reas de seguridad de la informaci\u00f3n, virtualizaci\u00f3n y dise\u00f1o de hardware. https:\/\/www.linkedin.com\/in\/ianmccloy\/","sameAs":["https:\/\/www.linkedin.com\/in\/ianmccloy\/"],"url":"https:\/\/www.couchbase.com\/blog\/es\/author\/ian-mccloycouchbase-com\/"}]}},"authors":[{"term_id":8928,"user_id":1864,"is_guest":0,"slug":"ian-mccloycouchbase-com","display_name":"Ian McCloy, Director Product Management","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","author_category":"","last_name":"McCloy, Director Product Management","first_name":"Ian","job_title":"","user_url":"","description":"Ian McCloy es el Director del Grupo de Gesti\u00f3n de Productos de Plataforma y Seguridad de Couchbase y vive en el Reino Unido.  Su equipo dedicado es responsable de la arquitectura de Fiabilidad, Disponibilidad, Capacidad de Servicio y Seguridad de Couchbase Server y la Base de Datos SaaS, Capella.  Este equipo tambi\u00e9n es propietario de plataformas nativas de la nube como el Operador Aut\u00f3nomo Couchbase Kubernetes.  Ian tiene una amplia experiencia como Ingeniero de Software, Ingeniero de Soporte T\u00e9cnico, Ingeniero de Control de Calidad y Administrador de Sistemas. Ian ha dirigido equipos t\u00e9cnicos globales durante la mayor parte de sus 20 a\u00f1os de carrera profesional y es titular de varias patentes en las \u00e1reas de seguridad de la informaci\u00f3n, virtualizaci\u00f3n y dise\u00f1o de hardware. https:\/\/www.linkedin.com\/in\/ianmccloy\/"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/14907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/1864"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=14907"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/14907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/14908"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=14907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=14907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=14907"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=14907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}