{"id":2279,"date":"2016-06-22T05:09:48","date_gmt":"2016-06-22T05:09:47","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=2279"},"modified":"2025-06-13T23:06:19","modified_gmt":"2025-06-14T06:06:19","slug":"securing-couchbase-using-lets-encrypt-x-509-certificates","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-using-lets-encrypt-x-509-certificates\/","title":{"rendered":"Protecci\u00f3n del servidor Couchbase mediante certificados Let's Encrypt x.509"},"content":{"rendered":"<h2>Resumen<\/h2>\n<p>Asegurar los datos y el acceso a los datos de las aplicaciones es un paso importante para asegurar el entorno de las aplicaciones cliente y la protecci\u00f3n de las bases de datos en entornos de cualquier tama\u00f1o. Uno de los m\u00e9todos m\u00e1s sencillos para asegurar los datos es la ruta de acceso desde la aplicaci\u00f3n al servidor de base de datos. Algunas bases de datos emplean esquemas cerrados para asegurar las comunicaciones del cliente para las conexiones de sesi\u00f3n a la base de datos, pero el servidor Couchbase emplea certificados TLS para asegurar las comunicaciones. Este proceso puede resultar complejo para los no iniciados, pero Let's Encrypt, una nueva autoridad de certificaci\u00f3n gratuita, pretende cambiar esta situaci\u00f3n y poner la tecnolog\u00eda de seguridad al alcance de todos.<\/p>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<h2>Cifremos<\/h2>\n<p>Empezar a utilizar Let's Encrypt (abreviado LE) requiere un conocimiento m\u00ednimo de las arquitecturas de certificados, pero s\u00ed un conocimiento pr\u00e1ctico de los sistemas Unix o Windows. LE emplea un enfoque automatizado para la creaci\u00f3n y gesti\u00f3n de certificados a trav\u00e9s de la especificaci\u00f3n de protocolo IETF denominada \"Automated Certificate Management Environment\" (ACME). ACME proporciona un mayor paradigma de seguridad a trav\u00e9s de la automatizaci\u00f3n. Algunas de las ventajas de este enfoque se muestran a continuaci\u00f3n:<\/p>\n<ul>\n<li>Creaci\u00f3n, renovaci\u00f3n y revocaci\u00f3n automatizadas de certificados<\/li>\n<li>Validaci\u00f3n del nombre de dominio\/propietario<\/li>\n<li>Certificados con firma cruzada<\/li>\n<li>Basado en ACME<\/li>\n<li>Extensible<\/li>\n<\/ul>\n<p>Para obtener m\u00e1s informaci\u00f3n sobre Let's Encrypt, visite su p\u00e1gina web en <a href=\"https:\/\/letsencrypt.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/letsencrypt.org\/<\/a> y si quieres saber directamente a la tecnolog\u00eda este enlace <a href=\"https:\/\/letsencrypt.org\/how-it-works\/\" target=\"_blank\" rel=\"noopener\">https:\/\/letsencrypt.org\/how-it-works\/<\/a> tiene m\u00e1s detalles.<\/p>\n<p>Ahora, empecemos a crear certificados LE y a usarlos con Couchbase.<\/p>\n<\/div>\n<\/div>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<h2>Protecci\u00f3n de Couchbase<\/h2>\n<p>&nbsp;<\/p>\n<p>La creaci\u00f3n de certificados con LE para su uso con cualquier aplicaci\u00f3n es f\u00e1cil y para el servidor Couchbase es tan simple como emitir unos pocos comandos. Hay requisitos previos que deben entenderse antes de empezar. Se discuten en la documentaci\u00f3n actual de Couchbase Server y en el sitio web de LE.<\/p>\n<ul>\n<li>Recursos de Couchbase<br \/>\n<a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/4.5\/security\/security-comm-encryption.html\" target=\"_blank\" rel=\"noopener\">https:\/\/developer.couchbase.com\/documentation\/server\/4.5\/security\/security-comm-encryption.html <\/a><br \/>\n<a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/current\/security\/security-x509certsintro.html\">https:\/\/developer.couchbase.com\/documentation\/server\/current\/security\/security-x509certsintro.html<\/a><\/li>\n<\/ul>\n<ul>\n<li>LetsEncrypt.com<\/li>\n<\/ul>\n<p class=\"Style1\"><a href=\"https:\/\/letsencrypt.org\/getting-started\/\" target=\"_blank\" rel=\"noopener\">https:\/\/letsencrypt.org\/getting-started\/<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<h2>Crear certificados con CertBot<\/h2>\n<p>Antes de crear e instalar los certificados es necesario obtener la herramienta automatizada LE llamada CertBot.<\/p>\n<h3>Requisitos previos<\/h3>\n<p>Para instalar CertBot, la herramienta automatizada de certificados de Let's Encrypt, hay dos maneras.<\/p>\n<ol>\n<li>De su proveedor de SO: Visite <a href=\"https:\/\/certbot.eff.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/certbot.eff.org\/<\/a> y elija su sistema operativo<\/li>\n<li>A trav\u00e9s de GitHub: requiere tener \"git\" instalado<\/li>\n<\/ol>\n<p>Una vez que haya instalado CertBot estar\u00e1 listo para empezar a crear certificados.<\/p>\n<hr \/>\n<p>Nota: Hay algunas advertencias como el despliegue en la nube o en un sistema no en el borde. Presta atenci\u00f3n a tu conexi\u00f3n al cliente o a internet cuando decidas topolog\u00edas de red y servidor con Let's Encrypt.<\/p>\n<hr \/>\n<\/div>\n<\/div>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<p>Los siguientes pasos se utilizaron con instancias en Amazon AWS para crear certificados para su uso con Couchbase Server. Sus pasos deben ser similares, pero proporcionamos estos pasos como un ejemplo.<\/p>\n<p>&nbsp;<\/p>\n<p>1. Ejecute certbot desde la l\u00ednea de comandos la primera vez con la opci\u00f3n '-h':<\/p>\n<pre class=\"pre codeblock language-bash\"><code class=\"language-bash hljs\">     <span class=\"token comment\"><span class=\"hljs-comment\"># cd certbot\/<\/span><\/span>\r\n     <span class=\"token comment\"><span class=\"hljs-comment\"># .\/certbot-auto -h<\/span><\/span>\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>2. Inicie el cuadro de di\u00e1logo de creaci\u00f3n de certificados en modo manual para la creaci\u00f3n guiada por instrucciones.<\/p>\n<pre class=\"pre codeblock language-bash\"><code class=\"language-bash hljs\">     <span class=\"token comment\"><span class=\"hljs-comment\"># .\/certbot-auto certonly -manual -standalone<\/span><\/span>\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>3. Aceptar la licencia<\/p>\n<p>4. Reconocer c\u00f3mo validar que el dominio es suyo (servidor web o servidor pythons aut\u00f3nomo incorporado).<\/p>\n<p>5. proporcionar un nombre de host DNS p\u00fablico v\u00e1lido<\/p>\n<p>6. proporcionar una direcci\u00f3n de correo electr\u00f3nico v\u00e1lida<\/p>\n<p>Figura: Ejemplo de nombre de host v\u00e1lido<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3357\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2016\/06\/valid_example_hostname.png\" alt=\" valid_example_hostname\" width=\"295\" height=\"60\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/valid_example_hostname.png 295w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/valid_example_hostname-20x4.png 20w\" sizes=\"auto, (max-width: 295px) 100vw, 295px\" \/><\/p>\n<p>La captura de pantalla anterior es de las pantallas de configuraci\u00f3n utilizadas durante la configuraci\u00f3n de la solicitud.<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"pre codeblock language-bash\"><code class=\"language-bash hljs\">      <span class=\"token comment\"><span class=\"hljs-comment\"># certbot-auto certonly --email info@DOMAIN.com      \\<\/span><\/span>\r\n        --agree-tos manual --renew-by-default              \\\r\n        --authenticator standalone<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Si la creaci\u00f3n del certificado se ha realizado correctamente, ver\u00e1 un mensaje como el siguiente:<\/p>\n<pre class=\"pre codeblock language-bash\"><code class=\"language-bash hljs\">IMPORTANT NOTES:\r\n - Congratulations<span class=\"token operator\">!<\/span> Your certificate and chain have been saved at\r\n   \/etc\/letsencrypt\/live\/yourdomain.com\/fullchain.pem. Your cert will\r\n   expire on <span class=\"token operator\">&lt;<\/span><span class=\"hljs-number\">30<\/span> days later<span class=\"token operator\">&gt;<\/span>. To obtain a new version of the certificate <span class=\"token keyword\"><span class=\"hljs-keyword\">en<\/span><\/span>\r\n   the future, simply run CertBot again.\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Para asegurarse de que los certificados se han guardado correctamente, puede listar el contenido del directorio de la siguiente manera:<\/p>\n<pre class=\"pre codeblock language-bash\"><code class=\"language-bash hljs\">      <span class=\"token function\">ls<\/span> <span class=\"hljs-operator\">-l<\/span> etc\/letsencrypt\/live\/yourdomain.com\/<\/code><\/pre>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<h3>Configuraci\u00f3n del nombre alternativo del sujeto del certificado (SAN)<\/h3>\n<p>Es probable que el certificado tenga m\u00e1s de un nombre. Puede a\u00f1adir nombres adicionales a un certificado, lo que tambi\u00e9n se denomina Subject Alternative Name (SAN). A continuaci\u00f3n se muestra un ejemplo de creaci\u00f3n de un certificado para varios dominios utilizando SAN:<\/p>\n<pre class=\"pre codeblock language-bash\"><code class=\"language-bash hljs\">      certbot-auto certonly --email info@DOMAIN.com --agree-tos manual --renew-by-default \/\r\n      <span class=\"hljs-operator\">-d<\/span> www.DOMAIN.com       \/\r\n      <span class=\"hljs-operator\">-d<\/span> DOMAIN.com <span class=\"hljs-operator\">-d<\/span> autoconfig.DOMAIN.com \/\r\n      <span class=\"hljs-operator\">-d<\/span> www.DOMAIN2.com \/\r\n      <span class=\"hljs-operator\">-d<\/span> DOMAIN2.com \/\r\n      <span class=\"hljs-operator\">-d<\/span> autoconfig.DOMAIN2.com --authenticator standalone<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Una vez satisfecho con la creaci\u00f3n y preparaci\u00f3n de su certificado es el momento de a\u00f1adir certificados a Couchbase Server.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<h2>Despliegue de certificados en Couchbase<\/h2>\n<h2>Preparaci\u00f3n<\/h2>\n<p>Una vez que la creaci\u00f3n del certificado se ha completado con \u00e9xito, debe utilizar un conjunto de herramientas de l\u00ednea de comandos para asegurarse de que Couchbase puede acceder a los certificados. La descripci\u00f3n completa se encuentra en el enlace de la documentaci\u00f3n del servidor Couchbase que se muestra y en los p\u00e1rrafos siguientes se proporcionar\u00e1 un ejemplo de configuraci\u00f3n.<\/p>\n<p><a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/current\/security\/security-x509certsintro.html\">https:\/\/developer.couchbase.com\/documentation\/server\/current\/security\/security-x509certsintro.html<\/a><\/p>\n<p>Para que los certificados de LE puedan utilizarse para el cifrado, es necesario que proporcione el certificado \"ra\u00edz de CA\" de LE. El siguiente enlace proporciona un diagrama y una descripci\u00f3n de la jerarqu\u00eda sobre la CA.<\/p>\n<p><a href=\"https:\/\/letsencrypt.org\/certificates\/\" target=\"_blank\" rel=\"noopener\">https:\/\/letsencrypt.org\/certificates\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Aqu\u00ed se muestra el diagrama CA propiamente dicho: <a href=\"https:\/\/letsencrypt.org\/certs\/isrg-keys.png\" target=\"_blank\" rel=\"noopener\">https:\/\/letsencrypt.org\/certs\/isrg-keys.png<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Importar certificados<\/h2>\n<p>La importaci\u00f3n de certificados al servidor Couchbase debe hacerse en cada nodo. Adem\u00e1s, se utiliza un directorio especial llamado \"inbox\" en el directorio del servidor Couchbase para almacenar los certificados. Tenga especial cuidado al ejecutar los comandos como root para no da\u00f1ar nada en el directorio del servidor Couchbase. Aseg\u00farese de que el propietario y el grupo se establecen en \"couchbase\" para el directorio \"inbox\" y todos los archivos en su interior.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Este procedimiento debe completarse en cada nodo. Cada nodo tambi\u00e9n debe tener un nombre de host DNS direccionable o utilizar un proxy inverso como NGinX u otro m\u00e9todo. Para m\u00e1s informaci\u00f3n vaya a https:\/\/www.letsencrypt.com\/documentation o consulte las siguientes gu\u00edas: https:\/\/github.com\/certbot\/certbot\/wiki\/Links<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p>1.    Descargar el certificado CA-Root<br \/>\na.    Utilice su navegador para guardar el texto que se muestra aqu\u00ed:<br \/>\nI. https:\/\/www.identrust.com\/certificates\/trustid\/root-download-x3.html a un archivo de texto plano como: lets-encrypt-x3-rootCA.pem<br \/>\nb.    Formatee la clave dentro del archivo como se indica a continuaci\u00f3n y gu\u00e1rdela como texto sin formato (no RTF ni ninguna otra cosa)<br \/>\nI.    --COMENZAR CERTIFICADO--<br \/>\n--FIN DEL CERTIFICADO--<br \/>\n2.    Crear el directorio \"Inbox\" de Couchbase Server<br \/>\na. mkdir \/opt\/couchbase\/var\/lib\/couchbase\/inbox<br \/>\n3.    Cambia los permisos de \"root\" a \"couchbase\".<br \/>\na. chown couchbase:couchbase -R \/opt\/couchbase\/var\/lib\/couchbase\/inbox<br \/>\n4.    Haz de la \"bandeja de entrada\" tu directorio de trabajo actual<br \/>\na. cd \/opt\/couchbase\/var\/lib\/couchbase\/inbox<br \/>\n5.    Copiar los certificados creados con Let's Encrypt a la bandeja de entrada<br \/>\na. cp \/etc\/letsencrypt\/live\/tu.dominio.com\/cert1.pem .<br \/>\nb. cp \/etc\/letsencrypt\/live\/tu.dominio.com\/plave1.pem .<br \/>\nc. cp \/etc\/letsencrypt\/live\/tu.dominio.com\/fullchain.pem chain.pem<br \/>\n6.    Convertir la clave privada a RSA<br \/>\na. openssl rsa -in pkey.pem &gt; pkey.key<br \/>\n7.    Importar los diferentes certificados a Couchbase Server<br \/>\na.    Importar el certificado ROOT-CA a Couchbase<br \/>\nI.    \/opt\/couchbase\/bin\/couchbase-cli ssl-manage -c localhost -upload-cluster-ca=lets-encrypt-x3-rootCA.pem -u  -p<br \/>\nb.    Importar la clave privada convertida a RSA en el nodo.<br \/>\nI.    \/opt\/couchbase\/bin\/couchbase-cli ssl-manage -c localhost -set-node-certificate -u  -p<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"textblock textblock--centered content-block-item\">\n<div class=\"textblock__content\">\n<h2>Probar la configuraci\u00f3n<\/h2>\n<p>Para probar si la configuraci\u00f3n est\u00e1 funcionando, abra un navegador web como FireFox, I.E. o Chrome versi\u00f3n 50.x a la URL del servidor a trav\u00e9s de HTTPS as\u00ed:<\/p>\n<p>https:\/\/myurl.com:18091\/<\/p>\n<p>&nbsp;<\/p>\n<p>Ver\u00e1 una imagen como la siguiente en la barra de direcciones, lo que significa que la interfaz de usuario ya est\u00e1 protegida.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3358\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2016\/06\/hopto_org.png\" alt=\" hopto_org\" width=\"422\" height=\"42\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/hopto_org.png 422w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/hopto_org-300x30.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/hopto_org-20x2.png 20w\" sizes=\"auto, (max-width: 422px) 100vw, 422px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Es el mismo puerto que se utiliza en el nivel de aplicaci\u00f3n para proteger las comunicaciones entre la aplicaci\u00f3n y el servidor.<\/p>\n<p>&nbsp;<\/p>\n<p>Si necesitas ayuda adicional con los certificados x.509 puedes consultar la documentaci\u00f3n de Couchbase 4.5 aqu\u00ed: <a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/4.5\/admin\/admin-intro.html\" target=\"_blank\" rel=\"noopener\">https:\/\/developer.couchbase.com\/documentation\/server\/4.5\/admin\/admin-intro.html<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Tambi\u00e9n puede enviar un correo electr\u00f3nico a <a href=\"mailto:austin.gonyou@couchbase.com?subject=%5BBlog%20Post%20Question%5D%20RE%3A%20Securing%20Couchbase%20&amp;body=Hi%20Austin%2C%0A%20%20I%27d%20like%20to%20ask%20a%20question%20about%20securing%20Couchbase!\" target=\"_blank\" rel=\"noopener\">austin.gonyou@couchbase.com<\/a> o <a href=\"mailto:Don.Pinto@couchbase.com?subject=Securing%20Couchbase%20with%20x509%20Certificates&amp;body=I%27d%20like%20to%20ask%20a%20question%20about%20securing%20Couchbase%20with%20x509%20certificates!\" target=\"_blank\" rel=\"noopener\">Don.Pinto@couchbase.com<\/a><\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Summary Securing data and access to data for application data is an important step in securing your environment for client applications and database protection in any sized environment. One of the simplest methods to secure data is the access path [&hellip;]<\/p>","protected":false},"author":50,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815,1816,1813],"tags":[1640,1660,9262,1658],"ppma_author":[9024],"class_list":["post-2279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","category-couchbase-server","category-security","tag-couchbase-4-5","tag-ssl","tag-tls-encryption","tag-x-509-certificates"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates - The Couchbase Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates\" \/>\n<meta property=\"og:description\" content=\"Summary Securing data and access to data for application data is an important step in securing your environment for client applications and database protection in any sized environment. One of the simplest methods to secure data is the access path [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-22T05:09:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-14T06:06:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/valid_example_hostname.png\" \/>\n\t<meta property=\"og:image:width\" content=\"295\" \/>\n\t<meta property=\"og:image:height\" content=\"60\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Austin Gonyou, Solutions Engineer, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Austin Gonyou, Solutions Engineer, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\"},\"author\":{\"name\":\"Austin Gonyou, Solutions Engineer, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/2af7d073b54a8723d45b386488b6c23d\"},\"headline\":\"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates\",\"datePublished\":\"2016-06-22T05:09:47+00:00\",\"dateModified\":\"2025-06-14T06:06:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\"},\"wordCount\":1204,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"keywords\":[\"Couchbase 4.5\",\"SSL\",\"TLS encryption\",\"x.509 certificates\"],\"articleSection\":[\"Best Practices and Tutorials\",\"Couchbase Server\",\"Security\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\",\"name\":\"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2016-06-22T05:09:47+00:00\",\"dateModified\":\"2025-06-14T06:06:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/2af7d073b54a8723d45b386488b6c23d\",\"name\":\"Austin Gonyou, Solutions Engineer, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/a39ad9071c4f649bd25a834bc382587c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d245d5b88af47043c834d9fc35101db4840440c89169a9a6b2460ceec055a7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d245d5b88af47043c834d9fc35101db4840440c89169a9a6b2460ceec055a7bc?s=96&d=mm&r=g\",\"caption\":\"Austin Gonyou, Solutions Engineer, Couchbase\"},\"description\":\"Austin Gonyou is a Solutions Engineer at Couchbase from past 4 years. Austin brings technical solutions about Couchbase NoSQL Document Database server and mobile conversations facilitated by inside, mid-level, and enterprise sales staff for our prospects and customers.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/austin-gonyou\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates - The Couchbase Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-using-lets-encrypt-x-509-certificates\/","og_locale":"es_MX","og_type":"article","og_title":"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates","og_description":"Summary Securing data and access to data for application data is an important step in securing your environment for client applications and database protection in any sized environment. One of the simplest methods to secure data is the access path [&hellip;]","og_url":"https:\/\/www.couchbase.com\/blog\/es\/securing-couchbase-using-lets-encrypt-x-509-certificates\/","og_site_name":"The Couchbase Blog","article_published_time":"2016-06-22T05:09:47+00:00","article_modified_time":"2025-06-14T06:06:19+00:00","og_image":[{"width":295,"height":60,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2016\/06\/valid_example_hostname.png","type":"image\/png"}],"author":"Austin Gonyou, Solutions Engineer, Couchbase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Austin Gonyou, Solutions Engineer, Couchbase","Est. reading time":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/"},"author":{"name":"Austin Gonyou, Solutions Engineer, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/2af7d073b54a8723d45b386488b6c23d"},"headline":"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates","datePublished":"2016-06-22T05:09:47+00:00","dateModified":"2025-06-14T06:06:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/"},"wordCount":1204,"commentCount":1,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","keywords":["Couchbase 4.5","SSL","TLS encryption","x.509 certificates"],"articleSection":["Best Practices and Tutorials","Couchbase Server","Security"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/","url":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/","name":"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2016-06-22T05:09:47+00:00","dateModified":"2025-06-14T06:06:19+00:00","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-using-lets-encrypt-x-509-certificates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Couchbase Server using Let\u2019s Encrypt x.509 Certificates"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/2af7d073b54a8723d45b386488b6c23d","name":"Austin Gonyou, Ingeniero de soluciones, Couchbase","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/a39ad9071c4f649bd25a834bc382587c","url":"https:\/\/secure.gravatar.com\/avatar\/d245d5b88af47043c834d9fc35101db4840440c89169a9a6b2460ceec055a7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d245d5b88af47043c834d9fc35101db4840440c89169a9a6b2460ceec055a7bc?s=96&d=mm&r=g","caption":"Austin Gonyou, Solutions Engineer, Couchbase"},"description":"Austin Gonyou is a Solutions Engineer at Couchbase from past 4 years. Austin brings technical solutions about Couchbase NoSQL Document Database server and mobile conversations facilitated by inside, mid-level, and enterprise sales staff for our prospects and customers.","url":"https:\/\/www.couchbase.com\/blog\/es\/author\/austin-gonyou\/"}]}},"authors":[{"term_id":9024,"user_id":50,"is_guest":0,"slug":"austin-gonyou","display_name":"Austin Gonyou, Solutions Engineer, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/d245d5b88af47043c834d9fc35101db4840440c89169a9a6b2460ceec055a7bc?s=96&d=mm&r=g","author_category":"","last_name":"Gonyou","first_name":"Austin","job_title":"","user_url":"","description":"Austin Gonyou es Ingeniero de Soluciones en Couchbase desde hace 4 a\u00f1os.\r\nAustin aporta soluciones t\u00e9cnicas sobre el servidor de bases de datos de documentos NoSQL de Couchbase y conversaciones m\u00f3viles facilitadas por personal de ventas interno, de nivel medio y empresarial para nuestros clientes potenciales y clientes."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/2279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=2279"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/2279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=2279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=2279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=2279"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=2279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}