{"id":14907,"date":"2023-09-25T12:49:01","date_gmt":"2023-09-25T19:49:01","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=14907"},"modified":"2023-10-18T03:04:29","modified_gmt":"2023-10-18T10:04:29","slug":"securing-couchbase-with-tls-certificates-part-2","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/","title":{"rendered":"Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server (Parte 2 de 3)"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Na parte 1 desta s\u00e9rie de 3 partes, aprendemos sobre <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-1\/\">os componentes do TLS<\/a>Na parte 2, veremos como os componentes do TLS interagem entre si.  Em <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/\">Parte 3<\/a> Neste guia, veremos como os componentes s\u00e3o usados no Couchbase Server.<\/span><\/p>\n<h2>Processo de assinatura de certificados<\/h2>\n<p><span style=\"font-weight: 400\">Se voc\u00ea estiver gerenciando sua pr\u00f3pria autoridade de certifica\u00e7\u00e3o interna ou usando um fornecedor comercial estabelecido, como DigiCert, GlobalSign ou GoDaddy, o primeiro est\u00e1gio \u00e9 gerar uma solicita\u00e7\u00e3o de assinatura de certificado. Sempre que um novo certificado ou um certificado de substitui\u00e7\u00e3o precisa ser emitido, a entidade que solicita o certificado gera um par de chaves que consiste em uma chave privada e uma chave p\u00fablica, normalmente usando o pacote OpenSSL. Em um cluster do Couchbase Server, a entidade seria um n\u00f3 individual do Couchbase Server. A chave privada \u00e9 mantida em seguran\u00e7a pela entidade, enquanto a chave p\u00fablica \u00e9 inclu\u00edda em uma solicita\u00e7\u00e3o de assinatura de certificado (CSR) que \u00e9 enviada \u00e0 CA. Normalmente, isso \u00e9 realizado com uma CA intermedi\u00e1ria e n\u00e3o com uma CA raiz.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14909 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133711822-1024x540.png\" alt=\"\" width=\"900\" height=\"475\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-1024x540.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-300x158.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-768x405.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-1536x809.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822-1320x696.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133711822.png 1983w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Ao receber a CSR, a CA verifica a identidade da entidade empregando v\u00e1rios m\u00e9todos de valida\u00e7\u00e3o, como valida\u00e7\u00e3o de dom\u00ednio ou valida\u00e7\u00e3o de organiza\u00e7\u00e3o. Depois que a identidade \u00e9 confirmada, a CA gera uma assinatura digital usando sua chave privada, que vincula a chave p\u00fablica da entidade \u00e0s suas informa\u00e7\u00f5es de identidade. Esse certificado assinado \u00e9 ent\u00e3o devolvido \u00e0 entidade.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Valida\u00e7\u00e3o de certificados<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Para validar um certificado, a parte confi\u00e1vel (por exemplo, um navegador da Web) precisa garantir que o certificado seja genu\u00edno e emitido por uma CA confi\u00e1vel. Esse processo envolve uma s\u00e9rie de etapas, incluindo os quatro est\u00e1gios a seguir.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">\u00c2ncora de confian\u00e7a<\/span><\/h3>\n<h3 style=\"margin-bottom: 31.5938px\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14910 alignright\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133740385-1024x903.png\" alt=\"\" width=\"315\" height=\"278\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385-1024x903.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385-300x265.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385-768x677.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133740385.png 1092w\" sizes=\"auto, (max-width: 315px) 100vw, 315px\" \/><\/h3>\n<p><span style=\"font-weight: 400\">A parte confi\u00e1vel, por exemplo, um navegador da Web, possui um conjunto pr\u00e9-instalado de certificados raiz confi\u00e1veis, tamb\u00e9m conhecidos como \u00e2ncoras de confian\u00e7a. Esses certificados pertencem a CAs conhecidas e cont\u00eam suas chaves p\u00fablicas, o que serve como base de confian\u00e7a.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Quando um cliente ou servidor recebe um certificado durante o handshake SSL\/TLS, ele verifica se a assinatura digital do certificado pode ser validada por qualquer uma das \u00e2ncoras de confian\u00e7a instaladas no sistema. Se a cadeia de certificados puder ser rastreada at\u00e9 uma \u00e2ncora de confian\u00e7a, o certificado \u00e9 considerado genu\u00edno e a conex\u00e3o TLS prossegue com confian\u00e7a.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Caminho de certifica\u00e7\u00e3o<\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14911 alignright\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133815995-1024x926.png\" alt=\"\" width=\"284\" height=\"257\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995-1024x926.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995-300x271.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995-768x694.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133815995.png 1033w\" sizes=\"auto, (max-width: 284px) 100vw, 284px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Ao estabelecer uma conex\u00e3o criptografada TLS, a parte confi\u00e1vel (navegador da Web) examina o caminho de certifica\u00e7\u00e3o do certificado, que inclui uma cadeia de certificados que come\u00e7a com o certificado emitido e vai at\u00e9 uma \u00e2ncora de confian\u00e7a. Cada certificado na cadeia \u00e9 assinado pelo certificado subsequente, chegando, por fim, a uma \u00e2ncora de confian\u00e7a.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Verifica\u00e7\u00e3o de assinatura<\/span><\/h3>\n<p><span style=\"font-weight: 400\">A parte confi\u00e1vel (navegador da Web) usa a chave p\u00fablica de cada certificado no caminho da certifica\u00e7\u00e3o para verificar a assinatura digital do pr\u00f3ximo certificado. Esse processo continua at\u00e9 que a \u00e2ncora de confian\u00e7a seja alcan\u00e7ada.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A assinatura digital \u00e9 um valor criptogr\u00e1fico criado pela AC usando sua chave privada, vinculando o conte\u00fado do certificado \u00e0 identidade da AC. O cliente usa a chave p\u00fablica da CA para descriptografar a assinatura digital e, se a descriptografia corresponder ao conte\u00fado do certificado, a assinatura ser\u00e1 considerada v\u00e1lida. Essa valida\u00e7\u00e3o confirma que o certificado n\u00e3o foi adulterado e foi de fato emitido pela autoridade de certifica\u00e7\u00e3o confi\u00e1vel.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Verifica\u00e7\u00f5es de confian\u00e7a e expira\u00e7\u00e3o<\/span><\/h3>\n<p><span style=\"font-weight: 400\">A parte confi\u00e1vel verifica se a \u00e2ncora de confian\u00e7a est\u00e1 inclu\u00edda em seus certificados raiz confi\u00e1veis pr\u00e9-instalados. Ela tamb\u00e9m verifica a data de expira\u00e7\u00e3o de cada certificado para garantir que ele ainda seja v\u00e1lido.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14912 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133838529-1024x439.png\" alt=\"\" width=\"900\" height=\"386\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-1024x439.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-300x129.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-768x330.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-1536x659.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529-1320x567.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133838529.png 1892w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Se todo o caminho de certifica\u00e7\u00e3o for validado com \u00eaxito e a \u00e2ncora de confian\u00e7a for confi\u00e1vel, a parte confi\u00e1vel considera o certificado genu\u00edno e prossegue com a conex\u00e3o segura. Com o Couchbase Server 7.2.x, essa cadeia pode ter 10 certificados.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Neste exemplo, as autoridades de certifica\u00e7\u00e3o raiz confi\u00e1veis integradas no navegador da Web s\u00e3o apenas nomes inventados, mas voc\u00ea pode ver uma lista real. As CAs confi\u00e1veis pr\u00e9-autorizadas do Firefox s\u00e3o <a href=\"https:\/\/wiki.mozilla.org\/CA\/Included_Certificates\">vinculado a partir de seu wiki<\/a><\/span><span style=\"font-weight: 400\">. Se o seu certificado for gerado por uma CA que n\u00e3o seja emitida por uma das CAs confi\u00e1veis integradas, primeiro ser\u00e1 necess\u00e1rio adicionar o certificado p\u00fablico da CA como uma entidade confi\u00e1vel ao seu sistema operacional e navegador antes de poder usar os certificados emitidos por essa CA.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Agora que j\u00e1 vimos os componentes envolvidos no TLS e como eles funcionam, na parte 3, veremos <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/\">Como o TLS funciona no Couchbase Server<\/a>.<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-1\/\">Parte 1 - Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Na parte 1 desta s\u00e9rie de 3 partes, aprendemos sobre os componentes do TLS; na parte 2, veremos como os componentes do TLS interagem entre si.  Na Parte 3 deste guia, veremos como os componentes [...]<\/p>","protected":false},"author":1864,"featured_media":14908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1814,1815,1813],"tags":[2001,2002,9262],"ppma_author":[8928],"class_list":["post-14907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-design","category-best-practices-and-tutorials","category-security","tag-certificate-authority","tag-self-signed-certificate","tag-tls-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3) - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)\" \/>\n<meta property=\"og:description\" content=\"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-25T19:49:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T10:04:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133631038.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1870\" \/>\n\t<meta property=\"og:image:height\" content=\"931\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ian McCloy, Director Product Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian McCloy, Director Product Management\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\"},\"author\":{\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\"},\"headline\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)\",\"datePublished\":\"2023-09-25T19:49:01+00:00\",\"dateModified\":\"2023-10-18T10:04:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\"},\"wordCount\":735,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"keywords\":[\"Certificate Authority\",\"self signed certificate\",\"TLS encryption\"],\"articleSection\":[\"Application Design\",\"Best Practices and Tutorials\",\"Security\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\",\"name\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3) - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"datePublished\":\"2023-09-25T19:49:01+00:00\",\"dateModified\":\"2023-10-18T10:04:29+00:00\",\"description\":\"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png\",\"width\":1870,\"height\":931},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\",\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"caption\":\"Ian McCloy, Director Product Management, Couchbase\"},\"description\":\"Ian McCloy is the Director of the Platform and Security Product Management Group for Couchbase and lives in the United Kingdom. His dedicated team is responsible for the Reliability, Availability, Serviceability and Security architecture of Couchbase Server and the SaaS Database, Capella. This team also own cloud-native platforms like the Couchbase Kubernetes Autonomous Operator. Ian has a vast range of experience as a Software Engineer, Technical Support Engineer, Quality Assurance Engineer and Systems Administrator. Ian has led global technical teams for the majority of his 20 year professional career and holds several patents in the areas of information security, virtualisation and hardware design. https:\/\/www.linkedin.com\/in\/ianmccloy\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ianmccloy\/\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/ian-mccloycouchbase-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server (Parte 2 de 3) - The Couchbase Blog","description":"Se voc\u00ea estiver gerenciando sua pr\u00f3pria autoridade de certifica\u00e7\u00e3o interna ou usando um fornecedor comercial estabelecido, como DigiCert, GlobalSign ou GoDaddy, a primeira etapa \u00e9 gerar uma solicita\u00e7\u00e3o de assinatura de certificado.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/","og_locale":"pt_BR","og_type":"article","og_title":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)","og_description":"Whether you are managing your own in-house Certificate Authority, or using an established commercial vendor such as DigiCert, GlobalSign or GoDaddy the first stage is to generate a Certificate Signing Request.","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/","og_site_name":"The Couchbase Blog","article_published_time":"2023-09-25T19:49:01+00:00","article_modified_time":"2023-10-18T10:04:29+00:00","og_image":[{"width":1870,"height":931,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-25_133631038.png","type":"image\/png"}],"author":"Ian McCloy, Director Product Management","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ian McCloy, Director Product Management","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/"},"author":{"name":"Ian McCloy, Director Product Management, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19"},"headline":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)","datePublished":"2023-09-25T19:49:01+00:00","dateModified":"2023-10-18T10:04:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/"},"wordCount":735,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","keywords":["Certificate Authority","self signed certificate","TLS encryption"],"articleSection":["Application Design","Best Practices and Tutorials","Security"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/","url":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/","name":"Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server (Parte 2 de 3) - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","datePublished":"2023-09-25T19:49:01+00:00","dateModified":"2023-10-18T10:04:29+00:00","description":"Se voc\u00ea estiver gerenciando sua pr\u00f3pria autoridade de certifica\u00e7\u00e3o interna ou usando um fornecedor comercial estabelecido, como DigiCert, GlobalSign ou GoDaddy, a primeira etapa \u00e9 gerar uma solicita\u00e7\u00e3o de assinatura de certificado.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-25_133631038.png","width":1870,"height":931},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 2 of 3)"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19","name":"Ian McCloy, diretor de gerenciamento de produtos, Couchbase","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f","url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","caption":"Ian McCloy, Director Product Management, Couchbase"},"description":"Ian McCloy \u00e9 diretor do grupo de gerenciamento de produtos de plataforma e seguran\u00e7a da Couchbase e mora no Reino Unido. Sua equipe dedicada \u00e9 respons\u00e1vel pela arquitetura de confiabilidade, disponibilidade, capacidade de servi\u00e7o e seguran\u00e7a do Couchbase Server e do banco de dados SaaS, Capella. Essa equipe tamb\u00e9m \u00e9 propriet\u00e1ria de plataformas nativas da nuvem, como o Operador Aut\u00f4nomo Kubernetes do Couchbase. Ian tem uma vasta experi\u00eancia como engenheiro de software, engenheiro de suporte t\u00e9cnico, engenheiro de garantia de qualidade e administrador de sistemas. Ian liderou equipes t\u00e9cnicas globais durante a maior parte de sua carreira profissional de 20 anos e possui v\u00e1rias patentes nas \u00e1reas de seguran\u00e7a da informa\u00e7\u00e3o, virtualiza\u00e7\u00e3o e design de hardware. https:\/\/www.linkedin.com\/in\/ianmccloy\/","sameAs":["https:\/\/www.linkedin.com\/in\/ianmccloy\/"],"url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/ian-mccloycouchbase-com\/"}]}},"authors":[{"term_id":8928,"user_id":1864,"is_guest":0,"slug":"ian-mccloycouchbase-com","display_name":"Ian McCloy, Director Product Management","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","first_name":"Ian","last_name":"McCloy, Director Product Management","user_url":"","author_category":"","description":"Ian McCloy \u00e9 diretor do grupo de gerenciamento de produtos de plataforma e seguran\u00e7a da Couchbase e mora no Reino Unido.  Sua equipe dedicada \u00e9 respons\u00e1vel pela arquitetura de confiabilidade, disponibilidade, capacidade de servi\u00e7o e seguran\u00e7a do Couchbase Server e do banco de dados SaaS, Capella.  Essa equipe tamb\u00e9m \u00e9 propriet\u00e1ria de plataformas nativas da nuvem, como o Operador Aut\u00f4nomo Kubernetes do Couchbase.  Ian tem uma vasta experi\u00eancia como engenheiro de software, engenheiro de suporte t\u00e9cnico, engenheiro de garantia de qualidade e administrador de sistemas. Ian liderou equipes t\u00e9cnicas globais durante a maior parte de sua carreira profissional de 20 anos e det\u00e9m v\u00e1rias patentes nas \u00e1reas de seguran\u00e7a da informa\u00e7\u00e3o, virtualiza\u00e7\u00e3o e design de hardware. https:\/\/www.linkedin.com\/in\/ianmccloy\/"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/14907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/1864"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=14907"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/14907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/14908"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=14907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=14907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=14907"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=14907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}