{"id":4951,"date":"2018-04-04T04:58:33","date_gmt":"2018-04-04T11:58:33","guid":{"rendered":"http:\/\/www.couchbase.com\/blog\/?p=4951"},"modified":"2023-07-11T21:13:18","modified_gmt":"2023-07-12T04:13:18","slug":"x-509-certificate-based-authentication","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/x-509-certificate-based-authentication\/","title":{"rendered":"Autenticaci\u00f3n con certificados X.509"},"content":{"rendered":"<p><span style=\"font-weight: 400\">La seguridad de los datos es un aspecto importante de toda plataforma de datos moderna. Con las arquitecturas basadas en microservicios convirti\u00e9ndose en un patr\u00f3n com\u00fan en todas las aplicaciones a gran escala, los mecanismos de autenticaci\u00f3n basados en contrase\u00f1as existentes para la autenticaci\u00f3n de usuarios son dif\u00edciles de gestionar a escala, por no hablar del hecho de que las contrase\u00f1as son dif\u00edciles de recordar o podr\u00edan ser descifradas. Como remedio, Couchbase Server 5.0 introdujo la autenticaci\u00f3n por certificado X.509.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><a href=\"https:\/\/www.couchbase.com\/blog\/es\/couchbase-server-5-5\/\">Servidor Couchbase 5.5<\/a> a\u00f1ade\u00a0<\/span><a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/5.5\/security\/security-certs-auth.html\"><span style=\"font-weight: 400\">otras mejoras<\/span><\/a><span style=\"font-weight: 400\">\u00a0para soportar todos los servicios e interfaces incluyendo N1QL, Indexaci\u00f3n, XDCR, B\u00fasqueda, e incluso la Web UI de Couchbase y los endpoints REST.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">\u00bfQu\u00e9 es la autenticaci\u00f3n basada en certificados?<\/span><\/h3>\n<p><span style=\"font-weight: 400\">En pocas palabras, la \"autenticaci\u00f3n\" es el proceso de verificar que un usuario es quien dice ser.  En el mundo de la tecnolog\u00eda esto puede conseguirse de varias maneras. La autenticaci\u00f3n basada en certificados permite a los usuarios acceder de forma segura a un servidor intercambiando un certificado digital en lugar de un nombre de usuario y una contrase\u00f1a. <\/span><span style=\"font-weight: 400\">Esto significa que el cliente no est\u00e1 enviando un nombre de usuario o contrase\u00f1a al servidor que ayuda en <\/span><span style=\"font-weight: 400\">evitar el phishing, el registro de pulsaciones y los ataques de intermediario (MITM), entre otros problemas habituales de la autenticaci\u00f3n basada en contrase\u00f1as.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4952 size-full aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.05.png\" alt=\"\" width=\"492\" height=\"278\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.05.png 492w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.05-300x170.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.05-20x11.png 20w\" sizes=\"auto, (max-width: 492px) 100vw, 492px\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Intercambio TLS cliente-servidor que ilustra la autenticaci\u00f3n mutua<\/span><\/p>\n<p><span style=\"font-weight: 400\">La autenticaci\u00f3n basada en certificados se construye aprovechando el est\u00e1ndar X.509 de infraestructura de clave p\u00fablica (PKI). La autenticaci\u00f3n por certificado ofrece una mayor seguridad al autenticar mutuamente tanto al cliente, utilizando una parte de confianza (la Autoridad de Certificaci\u00f3n (CA)) como al servidor durante el handshake TLS. Dado que el certificado est\u00e1 firmado, s\u00f3lo es posible conectarse al servidor real, y gestionar de forma centralizada los certificados utilizando la CA para su rotaci\u00f3n o revocaci\u00f3n. <\/span><\/p>\n<h3><span style=\"font-weight: 400\">Identificaci\u00f3n del usuario en un certificado<\/span><\/h3>\n<p><span style=\"font-weight: 400\">Si te est\u00e1s preguntando c\u00f3mo funciona la autenticaci\u00f3n de certificados x509, tiene que tener m\u00faltiples campos como fecha de caducidad, nombre CN, nombre san, etc. Dependiendo de su organizaci\u00f3n y sus pol\u00edticas, se utilizar\u00e1n diferentes campos para codificar el nombre\/id de usuario.  Por ejemplo:<\/span><\/p>\n<pre class=\"nums:false lang:default decode:true\">Certificate:\r\n    Data:\r\n        Version: 3 (0x2)\r\n        Serial Number: 2 (0x2)\r\n        Signature Algorithm: sha1WithRSAEncryption\r\n        Issuer: O=www.freelan.org, OU=freelan\r\n        Validity\r\n            Not Before: Apr 27 10:54:40 2012 GMT\r\n            Not After : Apr 25 10:54:40 2022 GMT\r\n        Subject: OU=freelan, CN=couchbase-bob\/emailAddress=bob@freelan.org\r\n        Subject Public Key Info:\r\n            Public Key Algorithm: rsaEncryption\r\n                Public-Key: (4096 bit)\r\n                Modulus:\r\n                \u2026\r\n                \u2026<\/pre>\n<p><span style=\"font-weight: 400\">Para identificar al usuario, Couchbase est\u00e1 configurado para analizar uno o m\u00e1s campos y extraer el usuario. Para ello se utiliza una ruta, un prefijo y un delimitador. La direcci\u00f3n <\/span><b>ruta<\/b><span style=\"font-weight: 400\"> describe de qu\u00e9 parte del certificado debe obtenerse el nombre de usuario, la opci\u00f3n <\/span><b>prefijo<\/b><span style=\"font-weight: 400\"> elimina el principio del nombre de usuario y el delimitador termina el nombre de usuario.  En el ejemplo anterior, para extraer un usuario llamado \"<\/span><b>bob<\/b><span style=\"font-weight: 400\">\" que utilizar\u00edas:<\/span><\/p>\n<pre class=\"nums:false lang:default decode:true\">\"path\": \"subject.CN\"\r\n\"prefix\": \"couchbase-\"\r\n\"delimiter\": \"\/\"<\/pre>\n<p><span style=\"font-weight: 400\">Hay un l\u00edmite m\u00e1ximo de 10 expresiones de ruta en Couchbase, sin que dos expresiones tengan los mismos campos de ruta y prefijo, y es obligatorio especificar todos los campos en la expresi\u00f3n. Couchbase prueba cada expresi\u00f3n de ruta en el certificado una por una en el orden especificado, y utiliza la primera que puede extraer con \u00e9xito una cadena de nombre de usuario no vac\u00eda. Si todas las expresiones de ruta no pueden extraer la cadena de usuario, los esfuerzos de autenticaci\u00f3n con certificados X.509 tambi\u00e9n fallar\u00e1n.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Configuraci\u00f3n de Couchbase Server<\/span><\/h3>\n<p><span style=\"font-weight: 400\">En Couchb<\/span>ase Server 5.5, la autenticaci\u00f3n basada en certificados est\u00e1 desactivada por defecto, confiando en su lugar en los m\u00e9todos de autenticaci\u00f3n local usuario\/pass o LDAP\/PAM.<\/p>\n<p><span style=\"font-weight: 400\">Cuando \"Require Client Certificate\" est\u00e1 en \"Enable\", Couchbase Server aceptar\u00e1 el certificado suministrado e intentar\u00e1 autenticarse bas\u00e1ndose en \u00e9l. Si falla, Couchbase Server recurrir\u00e1 a los m\u00e9todos de autenticaci\u00f3n usuario\/pass o LDAP\/PAM. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Cuando \"Req<\/span>uire Client Certificate\" est\u00e1 configurado como \"Obligatorio\", se debe proporcionar un certificado X.509 o, de lo contrario, la autenticaci\u00f3n fallar\u00e1.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4953 size-full aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.10.png\" alt=\"\" width=\"645\" height=\"287\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.10.png 645w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.10-300x133.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.10-20x9.png 20w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Estos ajustes tambi\u00e9n pueden suministrarse a trav\u00e9s de la CLI o la API REST.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Autorizar al usuario<\/span><\/h3>\n<p><span style=\"font-weight: 400\">Una vez que un usuario se ha \"autenticado\" (es quien dice ser), a\u00fan necesita ser \"autorizado\", que es el proceso de determinar qu\u00e9 puede hacer.<\/span><\/p>\n<p><span style=\"font-weight: 400\">En Couchbase Server esto se hace mediante <\/span><a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/5.5\/security\/security-authorization.html\"><span style=\"font-weight: 400\">asignar una o varias funciones a cada usuario<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Configuraci\u00f3n de clientes para la autenticaci\u00f3n basada en certificados<\/span><\/h3>\n<p><i><span style=\"font-weight: 400\">La funci\u00f3n de autenticaci\u00f3n basada en certificados X.509 es compatible con todos los clientes SDK. Sin embargo, s\u00f3lo las versiones m\u00e1s recientes la admiten, por lo que debe consultar las notas de la versi\u00f3n de su SDK.<\/span><\/i><i><span style=\"font-weight: 400\">.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">X.509 es el est\u00e1ndar oficial para certificados de clave p\u00fablica y SSL\/TLS se basa en este est\u00e1ndar. En su cliente, debe utilizar un certificado x.509 v\u00e1lido generado y firmado por la misma autoridad de certificaci\u00f3n (CA) ra\u00edz que el servidor.<\/span><\/p>\n<p><span style=\"font-weight: 400\">La mayor\u00eda de los navegadores web soportan la autenticaci\u00f3n de cliente desde los primeros d\u00edas de TLS. Puedes configurar el certificado del cliente en el almac\u00e9n de certificados de tu navegador y \u00a1listo!<\/span><\/p>\n<p><span style=\"font-weight: 400\">Todas las herramientas de Couchbase como couchbase-cli, y el shell N1QL tambi\u00e9n se est\u00e1n actualizando para soportar la autenticaci\u00f3n X.509.<\/span><\/p>\n<h3><b>Conclusi\u00f3n<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Aunque es un poco laborioso configurar este tipo de autenticaci\u00f3n, es muy seguro y m\u00e1s sencillo de gestionar a escala.  Por favor, <\/span><a href=\"https:\/\/www.couchbase.com\/blog\/es\/downloads\/\"><span style=\"font-weight: 400\">descargar Couchbase Server 5.5<\/span><\/a><span style=\"font-weight: 400\">\u00a0para probarlo.  Esperamos sus comentarios.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Data security is an important aspect of every modern data platform. With micro-service based architectures becoming more of a common pattern across every high-scale app, existing password based authentication mechanisms for user authentication is hard to manage at scale, let [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1816,1813],"tags":[2258,2182],"ppma_author":[8969],"class_list":["post-4951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-couchbase-server","category-security","tag-5-5","tag-devbuild"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How x509 Client Certificate Authentication Works | Couchbase<\/title>\n<meta name=\"description\" content=\"What is certificate-based authentication? It is built by leveraging the X.509 public key infrastructure (PKI) standard to secure authentication at scale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/x-509-certificate-based-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authentication With X.509 Certificates\" \/>\n<meta property=\"og:description\" content=\"What is certificate-based authentication? It is built by leveraging the X.509 public key infrastructure (PKI) standard to secure authentication at scale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/x-509-certificate-based-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-04T11:58:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T04:13:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.05.png\" \/>\n<meta name=\"author\" content=\"Perry Krug\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Perry Krug\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/\"},\"author\":{\"name\":\"Perry Krug\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/person\\\/d75b855801e89467ae2cfe0caef39a15\"},\"headline\":\"Authentication With X.509 Certificates\",\"datePublished\":\"2018-04-04T11:58:33+00:00\",\"dateModified\":\"2023-07-12T04:13:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/\"},\"wordCount\":759,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"keywords\":[\"5.5\",\"devbuild\"],\"articleSection\":[\"Couchbase Server\",\"Security\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/\",\"name\":\"How x509 Client Certificate Authentication Works | Couchbase\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2018-04-04T11:58:33+00:00\",\"dateModified\":\"2023-07-12T04:13:18+00:00\",\"description\":\"What is certificate-based authentication? It is built by leveraging the X.509 public key infrastructure (PKI) standard to secure authentication at scale.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/x-509-certificate-based-authentication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authentication With X.509 Certificates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/admin-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/person\\\/d75b855801e89467ae2cfe0caef39a15\",\"name\":\"Perry Krug\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g07fdef12afbaed73ed2879a6d989ae12\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g\",\"caption\":\"Perry Krug\"},\"description\":\"Perry Krug is the Head of Developer Experience at Couchbase. He has been with Couchbase for over 13 years and has been working with high-performance caching and database systems for over 17.\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/es\\\/author\\\/perry-krug\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How x509 Client Certificate Authentication Works | Couchbase","description":"\u00bfQu\u00e9 es la autenticaci\u00f3n basada en certificados? Se construye aprovechando el est\u00e1ndar de infraestructura de clave p\u00fablica X.509 (PKI) para asegurar la autenticaci\u00f3n a escala.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/x-509-certificate-based-authentication\/","og_locale":"es_MX","og_type":"article","og_title":"Authentication With X.509 Certificates","og_description":"What is certificate-based authentication? It is built by leveraging the X.509 public key infrastructure (PKI) standard to secure authentication at scale.","og_url":"https:\/\/www.couchbase.com\/blog\/es\/x-509-certificate-based-authentication\/","og_site_name":"The Couchbase Blog","article_published_time":"2018-04-04T11:58:33+00:00","article_modified_time":"2023-07-12T04:13:18+00:00","og_image":[{"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-04-at-12.51.05.png","type":"","width":"","height":""}],"author":"Perry Krug","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Perry Krug","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/"},"author":{"name":"Perry Krug","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/d75b855801e89467ae2cfe0caef39a15"},"headline":"Authentication With X.509 Certificates","datePublished":"2018-04-04T11:58:33+00:00","dateModified":"2023-07-12T04:13:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/"},"wordCount":759,"commentCount":2,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","keywords":["5.5","devbuild"],"articleSection":["Couchbase Server","Security"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/","url":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/","name":"How x509 Client Certificate Authentication Works | Couchbase","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2018-04-04T11:58:33+00:00","dateModified":"2023-07-12T04:13:18+00:00","description":"\u00bfQu\u00e9 es la autenticaci\u00f3n basada en certificados? Se construye aprovechando el est\u00e1ndar de infraestructura de clave p\u00fablica X.509 (PKI) para asegurar la autenticaci\u00f3n a escala.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/x-509-certificate-based-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Authentication With X.509 Certificates"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/d75b855801e89467ae2cfe0caef39a15","name":"Perry Krug","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g07fdef12afbaed73ed2879a6d989ae12","url":"https:\/\/secure.gravatar.com\/avatar\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g","caption":"Perry Krug"},"description":"Perry Krug es el director de Experiencia de Desarrolladores en Couchbase. Lleva m\u00e1s de 13 a\u00f1os en Couchbase y lleva m\u00e1s de 17 trabajando con sistemas de almacenamiento en cach\u00e9 y bases de datos de alto rendimiento.","url":"https:\/\/www.couchbase.com\/blog\/es\/author\/perry-krug\/"}]}},"acf":[],"authors":[{"term_id":8969,"user_id":24,"is_guest":0,"slug":"perry-krug","display_name":"Perry Krug","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/d526d9acbd39623c0a9c0443617ab51bc75b0d8118706229ff946cea1a223257?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/4951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=4951"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/4951\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=4951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=4951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=4951"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=4951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}