{"id":14913,"date":"2023-10-17T20:14:16","date_gmt":"2023-10-18T03:14:16","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=14913"},"modified":"2023-10-23T11:05:30","modified_gmt":"2023-10-23T18:05:30","slug":"securing-couchbase-with-tls-certificates-part-3","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/","title":{"rendered":"Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server (Parte 3 de 3)"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">Entendendo o TLS no Couchbase Server<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Em <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-1\/\">Parte 1<\/a> e <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/\">Parte 2<\/a> Neste guia, explicamos a hist\u00f3ria do TLS, os componentes envolvidos e como ele funciona. Nesta terceira parte final do guia, combinamos tudo isso e aprendemos como o TLS funciona no Couchbase Server.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Certificados do cluster do Couchbase<\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14915 alignright\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_124324412-972x1024.png\" alt=\"\" width=\"466\" height=\"491\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124324412-972x1024.png 972w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124324412-285x300.png 285w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124324412-768x809.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124324412-300x316.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124324412.png 1051w\" sizes=\"auto, (max-width: 466px) 100vw, 466px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">No Couchbase Server, um certificado de cluster vincula tudo a uma ou mais Autoridades de Certifica\u00e7\u00e3o (CAs) confi\u00e1veis; ele n\u00e3o lida diretamente com a criptografia do banco de dados. Em vez disso, ele estabelece uma cadeia de confian\u00e7a para os certificados por n\u00f3 dentro do cluster.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Todas as partes confi\u00e1veis na implanta\u00e7\u00e3o do Couchbase Server devem ter o Certificado do Cluster instalado e confi\u00e1vel. Assim como no exemplo anterior, com o navegador da Web tendo CAs raiz confi\u00e1veis, em uma implanta\u00e7\u00e3o do Couchbase, cada n\u00f3 do Couchbase Server e aplicativo de conex\u00e3o usando um dos SDKs deve confiar no certificado do cluster. Ele tamb\u00e9m \u00e9 importado para clusters adicionais do Couchbase Server que usam o recurso de replica\u00e7\u00e3o entre centros de dados (XDCR) para replicar dados entre os clusters de forma segura.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No Couchbase Capella, nossa oferta de banco de dados como servi\u00e7o (DBaaS), todos os clusters realmente usam a mesma autoridade de certifica\u00e7\u00e3o e, portanto, todos usam o mesmo certificado de cluster. E, a partir do in\u00edcio de 2022, todos os SDKs oficiais do Couchbase lan\u00e7ados desde ent\u00e3o inclu\u00edram, por padr\u00e3o, a confian\u00e7a autom\u00e1tica no Certificado de Cluster do Capella.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Certificados de n\u00f3 para criptografia de rede<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Os Certificados de N\u00f3 e as chaves privadas por n\u00f3 s\u00e3o o principal componente respons\u00e1vel pela criptografia de rede no Couchbase Server. Os certificados de n\u00f3 s\u00e3o criados por uma autoridade de certifica\u00e7\u00e3o (CA) confi\u00e1vel e s\u00e3o assinados pela chave privada da CA (tamb\u00e9m conhecida como a chave privada associada ao certificado\/chave p\u00fablica do cluster).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Este \u00e9 o processo de cria\u00e7\u00e3o de um certificado de n\u00f3 do Couchbase.<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Uma solicita\u00e7\u00e3o de assinatura de certificado (CSR) \u00e9 solicitada \u00e0 autoridade de certifica\u00e7\u00e3o com a chave p\u00fablica de um n\u00f3 incorporado.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">O certificado do n\u00f3 \u00e9 criado, incluindo a chave p\u00fablica do n\u00f3 incorporada, e \u00e9 assinado usando a chave privada do cluster no pr\u00f3prio sistema CA.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">O certificado do n\u00f3 \u00e9 ent\u00e3o fornecido de volta ao solicitante.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-14916\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_130520095-1024x551.png\" alt=\"\" width=\"900\" height=\"484\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130520095-1024x551.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130520095-300x161.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130520095-768x413.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130520095-1320x710.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130520095.png 1379w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Esses certificados facilitam a comunica\u00e7\u00e3o segura entre os n\u00f3s do servidor Couchbase e permitem a conectividade criptografada com n\u00f3s individuais do servidor Couchbase a partir de SDKs. Os principais pontos relacionados aos certificados de n\u00f3 incluem:<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"font-weight: 400;\"><strong>Criptografia n\u00f3 a n\u00f3<\/strong>: Os certificados de n\u00f3 protegem os canais de comunica\u00e7\u00e3o entre os n\u00f3s do servidor Couchbase, protegendo os dados \u00e0 medida que eles trafegam dentro do cluster.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"font-weight: 400;\"><strong>Conectividade do SDK<\/strong>: Quando os SDKs se conectam a n\u00f3s individuais do servidor Couchbase, os certificados de n\u00f3 garantem que a comunica\u00e7\u00e3o seja criptografada, mantendo a confidencialidade dos dados.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"font-weight: 400;\"><strong>Acesso \u00e0 GUI do administrador por HTTPS<\/strong>: Ao utilizar o certificado de n\u00f3, os administradores podem acessar com seguran\u00e7a a interface gr\u00e1fica do usu\u00e1rio (GUI) do Couchbase Server por meio de HTTPS.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14917 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_130550855-1024x852.png\" alt=\"\" width=\"625\" height=\"520\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130550855-1024x852.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130550855-300x250.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130550855-768x639.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130550855-1320x1099.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130550855.png 1397w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Se analisarmos um exemplo de como um SDK faz uma conex\u00e3o criptografada com um n\u00f3 do Couchbase Server, voc\u00ea ver\u00e1 os v\u00e1rios componentes em a\u00e7\u00e3o. Deixei alguns detalhes de fora intencionalmente, para manter a simplicidade.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14918 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_130621931-1024x279.png\" alt=\"\" width=\"900\" height=\"245\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130621931-1024x279.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130621931-300x82.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130621931-768x209.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130621931-1320x359.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130621931.png 1426w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14919 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_130648926-1024x524.png\" alt=\"\" width=\"900\" height=\"461\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130648926-1024x524.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130648926-300x154.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130648926-768x393.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130648926.png 1232w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-14920 aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_130705065-1024x314.png\" alt=\"\" width=\"900\" height=\"276\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130705065-1024x314.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130705065-300x92.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130705065-768x235.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130705065-1536x471.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130705065-1320x404.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130705065.png 1547w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">O SDK executar\u00e1 essas etapas com cada n\u00f3 do Couchbase Server no cluster com o qual estabelece uma conex\u00e3o TLS.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Exemplo de configura\u00e7\u00e3o de TLS no Couchbase Server<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Nesta se\u00e7\u00e3o, configuraremos a criptografia de rede TLS em um cluster de 3 n\u00f3s do Couchbase Server, executando a vers\u00e3o 7.2.0 em hosts Linux. H\u00e1 tamb\u00e9m um quarto host Linux usado como autoridade de certifica\u00e7\u00e3o.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Chave privada do cluster + certificado<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Fa\u00e7a login no host da autoridade de certifica\u00e7\u00e3o, pois \u00e9 aqui que criaremos o certificado do cluster.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trata-se apenas de um host Linux que tem uma vers\u00e3o atual do OpenSSL instalada.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Primeiro, criaremos um arquivo de modelo do Couchbase que ser\u00e1 usado posteriormente para os certificados por n\u00f3.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando (sem sa\u00edda)<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">cat &gt; cbserver.ext &lt;&lt;EOF\r\nbasicConstraints=CA:FALSE\r\nsubjectKeyIdentifier = hash\r\nauthorityKeyIdentifier = keyid,issuer:always\r\nextendedKeyUsage=serverAuth\r\nkeyUsage = digitalSignature,keyEncipherment\r\nEOF<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">A pr\u00f3xima etapa ser\u00e1 criar a chave privada criptografada do cluster, denominada <em>cluster_private.key.<\/em><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Execute o seguinte comando; ser\u00e1 solicitada uma frase secreta para criptografar essa chave.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A chave privada estar\u00e1 no formato PKCS8 (PKCS #8) e ser\u00e1 criptografada com o muito seguro bit 265 <\/span><b>Padr\u00e3o de criptografia avan\u00e7ado<\/b><span style=\"font-weight: 400;\"> (<\/span><b>AES<\/b><span style=\"font-weight: 400;\">).<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:2048 -aes256 -out cluster_private.key<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">.................................................+++++\r\n....+++++\r\nDigite a frase-passe PEM:\r\nVerifying (Verificando) - Enter PEM pass phrase (Digite a frase-passe PEM):<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Voc\u00ea pode validar que se trata de uma chave privada criptografada, observando o in\u00edcio do arquivo.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">head cluster_private.key<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">-----BEGIN ENCRYPTED PRIVATE KEY-----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<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Agora, criaremos o certificado do cluster no formato PEM x.509. No nosso caso, o certificado deve ser autoassinado, o que significa que n\u00e3o ser\u00e1 atestado por nenhuma outra autoridade. Isso significa que ele pode ser criado diretamente, com base na chave privada existente <em>ca.key<\/em>sem a assist\u00eancia de terceiros.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quando criarmos o certificado de cluster, v\u00e1lido por 3650 dias (10 anos), ele ter\u00e1 uma chave p\u00fablica de cluster incorporada ao certificado, que \u00e9 o par correspondente da chave <em>cluster_private.key<\/em> feito anteriormente. Voc\u00ea precisar\u00e1 fornecer a frase secreta que inseriu anteriormente para descriptografar a chave privada desse comando.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl req -new -x509 -days 3650 -sha256 -key cluster_private.key -out cluster_cert.pem -subj \"\/CN=Couchbase Root CA\"<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">Digite a frase secreta para cluster_private.key:<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Agora podemos imprimir o conte\u00fado do novo arquivo de certificado (e tamb\u00e9m ver a chave p\u00fablica).<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl x509 -text -noout -in .\/cluster_cert.pem<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">Certificado:\r\n    Dados:\r\n        Vers\u00e3o: 3 (0x2)\r\n        N\u00famero de s\u00e9rie:\r\n            7e:a6:19:80:11:8c:b2:12:cc:86:91:bd:9b:df:f1:2f:75:ef:50:07\r\n        Algoritmo de assinatura: sha256WithRSAEncryption\r\n        Emissor: CN = Couchbase Root CA\r\n        Validade\r\n            N\u00e3o antes: Jul 26 12:26:06 2023 GMT\r\n            N\u00e3o depois: Jul 23 12:26:06 2033 GMT\r\n        Assunto: CN = Couchbase Root CA\r\n        Informa\u00e7\u00f5es da chave p\u00fablica do assunto:\r\n            Algoritmo de chave p\u00fablica: rsaEncryption\r\n                Chave p\u00fablica RSA: (2048 bits)\r\n                Modulus:\r\n                    00:a6:51:f9:d5:6f:40:06:b3:b5:5b:55:b5:a0:82:\r\n                    2a:73:7a:0d:a8:02:1f:82:24:ed:c7:99:51:0a:d9:\r\n                    f8:09:08:0e:24:e0:34:fe:ef:0f:53:dd:27:19:af:\r\n                    a1:0d:78:14:03:3e:26:2e:c0:44:35:fb:c7:84:57:\r\n                    ad:66:be:95:d4:53:71:8c:24:30:26:46:6e:03:b9:\r\n                    b9:e9:b1:a1:fa:f9:7f:bd:88:f8:03:3e:20:dc:3a:\r\n                    29:dd:0d:2c:a3:0b:8e:22:46:49:ca:56:dc:b7:17:\r\n                    f9:87:12:d2:df:80:b8:35:df:19:4f:0d:f4:b2:9d:\r\n                    02:9e:2c:59:e4:25:98:05:85:cd:e8:64:04:43:1f:\r\n                    79:35:fb:ae:8b:e8:cd:16:24:68:90:9f:32:d5:d3:\r\n                    5f:b0:11:82:3f:a3:7a:83:d8:e2:c5:92:a5:ef:8f:\r\n                    e2:4e:b2:8f:c1:27:04:92:3c:6d:50:88:82:5b:73:\r\n                    e8:17:7b:03:c7:f3:98:71:dd:99:ed:84:f9:37:3a:\r\n                    67:79:d3:fa:6a:a4:2e:69:25:a1:2c:79:39:40:e5:\r\n                    51:2c:57:02:be:c0:d6:43:7f:d5:ce:c9:cb:ee:68:\r\n                    a6:ad:13:17:22:d1:16:8b:08:17:ba:25:80:ce:9a:\r\n                    e8:a5:fc:e9:93:47:c5:a4:70:95:eb:3b:80:39:e7:\r\n                    94:af\r\n                Expoente: 65537 (0x10001)\r\n        Extens\u00f5es X509v3:\r\n            X509v3 Subject Key Identifier:\r\n                18:D1:3E:58:0C:99:3D:6D:D4:EB:1A:D5:2F:43:69:89:8C:C0:A3:87\r\n            Identificador de chave de autoridade X509v3:\r\n                keyid:18:D1:3E:58:0C:99:3D:6D:D4:EB:1A:D5:2F:43:69:89:8C:C0:A3:87\r\n            Restri\u00e7\u00f5es b\u00e1sicas X509v3: cr\u00edtico\r\n                CA:TRUE\r\n    Algoritmo de assinatura: sha256WithRSAEncryption\r\n         3f:af:bb:c9:b9:89:82:78:fe:99:e6:49:fe:7b:8d:c4:67:f4:\r\n         62:ff:f7:6d:46:9f:75:17:9e:56:8c:c4:06:71:95:a1:6c:cd:\r\n         d6:ae:06:dd:3f:28:ce:3b:ea:bb:1b:4b:21:26:6b:85:48:5b:\r\n         43:c8:9c:10:ac:3d:4c:e2:62:69:8d:45:9a:5d:f0:d5:14:b7:\r\n         21:9e:00:9a:53:50:22:42:c7:1f:ad:80:68:dd:f3:69:89:9d:\r\n         68:3e:37:62:69:c1:28:62:5a:08:91:98:96:49:64:8b:cc:01:\r\n         4c:7a:cf:c3:ff:cf:04:86:85:fb:2b:cf:ed:89:6c:15:ba:f7:\r\n         8f:03:cb:af:50:f7:10:35:93:3d:29:09:bf:a5:e3:0b:d2:18:\r\n         a2:7b:84:db:40:8a:b7:42:82:1b:ac:c8:8c:f0:d7:4f:45:de:\r\n         b8:76:80:04:66:9b:3f:ed:e9:23:d5:52:51:9a:f8:cc:ad:1a:\r\n         67:8f:a9:d7:45:3f:2a:07:89:5c:7b:fa:b5:73:f5:b0:4d:8d:\r\n         d2:32:66:20:18:30:2e:d1:3e:cb:02:b3:4b:26:6e:25:20:83:\r\n         f6:5b:a9:e8:fd:e2:d5:90:bc:16:65:6d:f9:de:9c:c0:e4:07:\r\n         00:cb:e9:4b:9c:b4:fa:4c:79:c3:2f:3a:e7:e8:43:75:fc:b7:\r\n         51:a5:16:ce<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Agora temos o certificado do cluster (<em>cluster_cert.pem<\/em>), esse arquivo precisa ser copiado para cada n\u00f3 do Couchbase Server no cluster. Ele tamb\u00e9m precisa ser adicionado a todos os aplicativos em que os SDKs operam, bem como a todos os hosts em que os administradores acessam a interface do usu\u00e1rio, como o laptop de um administrador. N\u00e3o \u00e9 um arquivo confidencial e cont\u00e9m apenas informa\u00e7\u00f5es p\u00fablicas.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Chave privada do n\u00f3 + CSR<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As etapas desta se\u00e7\u00e3o precisar\u00e3o ser repetidas para cada n\u00f3 do Couchbase Server:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Fa\u00e7a login no n\u00f3 do servidor Couchbase.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Execute os seguintes comandos em um diret\u00f3rio tempor\u00e1rio, inacess\u00edvel a outros usu\u00e1rios do sistema.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Primeiro, vamos criar a chave privada do n\u00f3 node1 em um formato PKCS1 (PKCS #1)\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:2048 -out cbnode1_private.key<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">...................................................................................+++++\r\n....+++++<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Em seguida, vamos criar a Solicita\u00e7\u00e3o de Assinatura de Certificado (CSR) para o Node1, usando o comando <em>n\u00f31<\/em> chave privada. Lembre-se de que uma chave p\u00fablica ser\u00e1 incorporada \u00e0 CSR.\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando (sem sa\u00edda)<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl req -new -key cbnode1_private.key -out cbnode1.csr -subj \"\/CN=Couchbase Server\"<\/pre>\n<p><span style=\"background-color: #ffffff; font-size: 19px;\">Essa CSR e sua chave p\u00fablica incorporada agora podem ser visualizadas e verificadas.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl req -text -noout -verify -in .\/cbnode1.csr<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">verificar OK\r\nSolicita\u00e7\u00e3o de certificado:\r\n    Dados:\r\n        Vers\u00e3o: 1 (0x0)\r\n        Subject (Assunto): CN = Servidor Couchbase\r\n        Informa\u00e7\u00f5es da chave p\u00fablica do assunto:\r\n            Algoritmo de chave p\u00fablica: rsaEncryption\r\n                Chave p\u00fablica RSA: (2048 bits)\r\n                Modulus:\r\n                    00:c6:a3:bd:7e:84:eb:8b:00:47:74:61:f6:68:3f:\r\n                    d7:65:e8:90:7b:cd:ee:47:dd:d0:c4:26:5e:52:10:\r\n                    8c:9e:55:68:dc:c7:01:06:f5:27:82:9a:40:2d:0a:\r\n                    2a:a0:ef:d1:9d:ba:ee:cd:cc:1c:3b:b0:52:ab:bd:\r\n                    03:98:eb:70:9c:53:02:8f:93:05:d9:79:3b:ee:ad:\r\n                    86:dc:49:e2:8d:88:70:d4:80:ad:16:f2:ca:9e:20:\r\n                    82:5c:52:51:7a:6b:e5:82:85:a9:d3:55:4b:61:70:\r\n                    46:34:30:2c:72:8a:49:3f:a5:2e:59:37:58:49:45:\r\n                    ca:63:99:61:c5:14:ff:9b:83:86:45:37:95:54:46:\r\n                    66:68:f3:cc:55:ac:2e:49:17:7d:f8:2f:4d:df:ea:\r\n                    f5:76:f5:b6:72:d6:93:ad:73:6c:64:da:6a:30:5c:\r\n                    8b:c0:d8:94:df:fc:4e:e8:ad:8c:34:40:e9:87:93:\r\n                    99:97:ed:3b:b5:e8:85:19:29:3c:20:d6:3a:0a:46:\r\n                    6e:b4:c3:4b:ca:80:82:05:2b:59:62:6b:99:c9:93:\r\n                    5f:11:f5:96:e1:1c:8c:c3:cd:3c:60:31:0b:40:fc:\r\n                    a6:2f:fc:40:15:71:d7:e5:c6:b0:5c:3c:4b:64:4e:\r\n                    3d:b7:48:e9:59:31:6d:b3:1e:9f:07:9b:5a:bc:bb:\r\n                    cd:df\r\n                Expoente: 65537 (0x10001)\r\n        Atributos:\r\n            a0:00\r\n    Algoritmo de assinatura: sha256WithRSAEncryption\r\n         5d:70:22:cd:a9:1b:dc:97:d3:1f:49:e7:d5:ef:4c:c9:f8:5b:\r\n         8e:65:b3:a1:ac:b4:19:cb:ff:3a:39:bc:b8:d2:21:a9:ac:2d:\r\n         b3:78:83:fa:26:8d:b3:26:20:83:12:a6:fd:93:23:dc:4f:ee:\r\n         59:2f:64:bd:03:03:51:92:28:e5:55:7d:63:a4:4a:48:80:05:\r\n         01:90:5b:ac:8d:37:d0:7a:80:a5:49:5b:63:b0:44:fd:5d:aa:\r\n         fc:9e:1c:16:78:2b:79:bb:a9:a3:a4:f8:8d:02:db:27:e0:40:\r\n         95:61:fd:2f:f5:e2:67:f5:19:4c:75:77:38:28:ab:c5:70:06:\r\n         c0:14:7c:82:e1:6a:cd:72:bb:f1:98:a5:79:1e:81:94:ca:3d:\r\n         74:62:ef:48:85:d6:79:c9:26:0c:39:a8:50:7a:f0:40:1c:b4:\r\n         5a:c6:2b:06:11:c8:63:7e:a8:0f:0b:0f:92:e3:35:6d:ab:44:\r\n         37:08:b8:7e:4b:4e:f0:14:12:5c:f0:b3:c3:a5:c0:bd:72:dd:\r\n         2e:43:ff:0b:7d:12:f9:46:40:87:16:06:14:00:d6:c4:1f:ae:\r\n         d8:94:ff:cf:06:dc:72:20:ef:8f:5a:b2:0b:a6:cf:69:87:48:\r\n         33:ac:b3:06:a2:5b:d0:16:9f:a0:3b:1d:dc:89:2a:0b:fa:1f:\r\n         fa:3c:22:ed<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Agora, copie o arquivo CSR, <\/span><em>cbnode1.csr<\/em><span style=\"font-weight: 400;\">para o sistema CA. Ele cont\u00e9m apenas informa\u00e7\u00f5es p\u00fablicas e n\u00e3o \u00e9 sens\u00edvel.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Criar certificados de n\u00f3<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Fa\u00e7a login no sistema da CA. Agora voc\u00ea deve ter arquivos CSR para cada n\u00f3 do Couchbase Server no cluster localizado no sistema da CA, <\/span><em>cbnode1.csr<\/em><span style=\"font-weight: 400;\">, <\/span><em>cbnode2.csr,<\/em><span style=\"font-weight: 400;\"> etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Para cada n\u00f3 do Couchbase Server, voc\u00ea precisar\u00e1 criar um arquivo de modelo. O arquivo de modelo criado anteriormente, <em>cbserver.ext<\/em>O comando \"Couchbase Server\", ser\u00e1 personalizado para cada n\u00f3. Execute esse comando para cada n\u00f3 do Couchbase Server, substituindo o nome do host DNS do n\u00f3 do Couchbase Server e o nome do arquivo, conforme necess\u00e1rio. Isso definir\u00e1 o Nome Alternativo do Assunto (SAN) para corresponder ao nome do n\u00f3 do Couchbase Server.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Se estiver usando nomes de host para o Couchbase Server, execute este comando:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando (sem sa\u00edda)<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">cp cbserver.ext cbnode1.ext &amp;&amp; echo \"subjectAltName = DNS:node1.cb.acme.com\" &gt;&gt; cbnode1.ext<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Como alternativa, se estiver usando endere\u00e7os IP sem nomes de host para o Couchbase Server, execute isso:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando (sem sa\u00edda)<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">cp cbserver.ext cbnode1.ext &amp;&amp; echo \"subjectAltName = IP:172.17.0.2\" &gt;&gt; cbnode1.ext<\/pre>\n<p><span style=\"background-color: #ffffff; font-size: 19px;\">Agora voc\u00ea deve ter arquivos de modelo para cada n\u00f3 do Couchbase Server no cluster, <em>cbnode1.ext, cbnode2.ext, cbnode3.ext,<\/em> etc.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Agora vamos gerar os certificados, v\u00e1lidos por 3 meses, para cada n\u00f3 do Couchbase Server. Eles estar\u00e3o em um formato PEM x.509. Execute esse comando para cada n\u00f3, alterando os nomes dos arquivos. Cada vez que isso for executado, voc\u00ea ser\u00e1 solicitado a fornecer a senha da CA usada para criptografar o <em>cluster_private.key<\/em> anteriormente.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">openssl x509 -CA cluster_cert.pem -CAkey cluster_private.key -CAcreateserial -days 90 -req -in cbnode1.csr -out node1_cert.pem -extfile cbnode1.ext<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">Assinatura ok\r\nsubject=CN = Servidor Couchbase\r\nObten\u00e7\u00e3o da chave privada da CA\r\nDigite a frase secreta para cluster_private.key:<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Copie cada arquivo de certificado da autoridade de certifica\u00e7\u00e3o para cada n\u00f3 do Couchbase Server a que pertencem. Por exemplo, copie <\/span><em>node1_cert.pem<\/em><span style=\"font-weight: 400;\"> no Couchbase Server Node 1 e <\/span><em>node2_cert.pem<\/em><span style=\"font-weight: 400;\"> no Couchbase Server Node 2.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Carregar os certificados no servidor Couchbase<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Essas etapas precisar\u00e3o ser executadas em cada n\u00f3 do Couchbase Server<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fa\u00e7a login no n\u00f3 do servidor Couchbase e voc\u00ea dever\u00e1 ter uma pasta com tr\u00eas arquivos.\u00a0<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Certificado de cluster, <\/span><b>cluster_cert.pem<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Certificado (p\u00fablico) do n\u00f3, <\/span><b>node1_cert.pem<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Chave privada do n\u00f3, <\/span><b>cbnode1_private.key<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Voc\u00ea n\u00e3o precisa mais do arquivo CSR criado anteriormente.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Agora voc\u00ea precisa mover os arquivos para o local correto, com a conven\u00e7\u00e3o de nomenclatura correta para o Couchbase Server. Observe que o mesmo nome de arquivo de destino \u00e9 usado em cada n\u00f3 do Couchbase Server, mas cada n\u00f3 tem arquivos exclusivos para os arquivos <em>chain.pem<\/em> e <em>pkey.key<\/em>.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">mkdir \/opt\/couchbase\/var\/lib\/couchbase\/inbox\r\nmkdir \/opt\/couchbase\/var\/lib\/couchbase\/inbox\/CA\r\nmv cluster_cert.pem \/opt\/couchbase\/var\/lib\/couchbase\/inbox\/CA\/ca.pem\r\nmv node1_cert.pem \/opt\/couchbase\/var\/lib\/couchbase\/inbox\/chain.pem\r\nmv cbnode1_private.key \/opt\/couchbase\/var\/lib\/couchbase\/inbox\/pkey.key\r\nchown couchbase:couchbase \/opt\/couchbase\/var\/lib\/couchbase\/inbox\/pkey.key<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Agora todos os arquivos corretos est\u00e3o prontos para serem importados para a configura\u00e7\u00e3o do Couchbase Server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Comece carregando o certificado do cluster:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">curl -X POST https:\/\/localhost:8091\/node\/controller\/loadTrustedCAs -u Administrator:password<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">[{\"id\":1,\"loadTimestamp\":\"2023-07-26T15:51:33.000Z\",\"subject\":\"CN=Couchbase Root CA\",\"notBefore\":\"2023-07-26T12:26:06.000Z\",\"notAfter\":\"2033-07-23T12:26:06.000Z\",\"type\":\"uploaded\",\"pem\":\"-----BEGIN CERTIFICATE-----\\nMIIDGTCCAgGgAwIBAgIUfqYZgBGMshLMhpG9m9\/xL3XvUAcwDQYJKoZIhvcNAQEL\\nBQAwHDEaMBgGA1UEAwwRQ291Y2hiYXNlIFJvb3QgQ0EwHhcNMjMwNzI2MTIyNjA2\\nWhcNMzMwNzIzMTIyNjA2WjAcMRowGAYDVQQDDBFDb3VjaGJhc2UgUm9vdCBDQTCC\\nASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKZR+dVvQAaztVtVtaCCKnN6\\nDagCH4Ik7ceZUQrZ+AkIDiTgNP7vD1PdJxmvoQ14FAM+Ji7ARDX7x4RXrWa+ldRT\\ncYwkMCZGbgO5uemxofr5f72I+AM+INw6Kd0NLKMLjiJGScpW3LcX+YcS0t+AuDXf\\nGU8N9LKdAp4sWeQlmAWFzehkBEMfeTX7rovozRYkaJCfMtXTX7ARgj+jeoPY4sWS\\npe+P4k6yj8EnBJI8bVCIgltz6Bd7A8fzmHHdme2E+Tc6Z3nT+mqkLmkloSx5OUDl\\nUSxXAr7A1kN\/1c7Jy+5opq0TFyLRFosIF7olgM6a6KX86ZNHxaRwles7gDnnlK8C\\nAwEAAaNTMFEwHQYDVR0OBBYEFBjRPlgMmT1t1Osa1S9DaYmMwKOHMB8GA1UdIwQY\\nMBaAFBjRPlgMmT1t1Osa1S9DaYmMwKOHMA8GA1UdEwEB\/wQFMAMBAf8wDQYJKoZI\\nhvcNAQELBQADggEBAD+vu8m5iYJ4\/pnmSf57jcRn9GL\/921Gn3UXnlaMxAZxlaFs\\nzdauBt0\/KM476rsbSyEma4VIW0PInBCsPUziYmmNRZpd8NUUtyGeAJpTUCJCxx+t\\ngGjd82mJnWg+N2JpwShiWgiRmJZJZIvMAUx6z8P\/zwSGhfsrz+2JbBW6948Dy69Q\\n9xA1kz0pCb+l4wvSGKJ7hNtAirdCghusyIzw109F3rh2gARmmz\/t6SPVUlGa+Myt\\nGmePqddFPyoHiVx7+rVz9bBNjdIyZiAY----END CERTIFICATE-----\\n\\n\",\"loadHost\":\"127.0.0.1\", \"loadFile\":\"\/opt\/couchbase\/va<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Em seguida, carregue o certificado e a chave privada do n\u00f3 e observe que nenhum aviso \u00e9 impresso:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Comando<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">curl -X POST https:\/\/localhost:8091\/node\/controller\/reloadCertificate -u Administrator:password<\/pre>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Sa\u00edda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">{\"warnings\":[]}<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-14921\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_130752861-1024x709.png\" alt=\"\" width=\"900\" height=\"623\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130752861-1024x709.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130752861-300x208.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130752861-768x531.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130752861-1320x913.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_130752861.png 1399w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Agora voc\u00ea pode usar conex\u00f5es TLS com o cluster do Couchbase Server.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Confian\u00e7a no certificado do cluster<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">Laptop do administrador<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Fa\u00e7a login no laptop de um administrador. Neste caso, estou usando um Mac, mas etapas semelhantes podem ser executadas em m\u00e1quinas Windows e Linux.\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Comando no MacOS (sem sa\u00edda)<\/span><\/td>\n<\/tr>\n<tr>\n<td>\n<pre class=\"nums:false lang:default decode:true\">sudo security add-trusted-cert -d -r trustRoot -k \"\/Library\/Keychains\/System.keychain\" \"\/tmp\/cluster_cert.pem\"<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><span style=\"font-weight: 400;\">SDK de aplicativos<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Usaremos um aplicativo Java para nos conectarmos ao Couchbase Server e, neste exemplo, apontaremos o aplicativo para o certificado do cluster. Outra op\u00e7\u00e3o seria usar o armazenamento de confian\u00e7a cacerts da JVM, pois o SDK confiar\u00e1 automaticamente em todas as CAs definidas l\u00e1. Cada linguagem de programa\u00e7\u00e3o ter\u00e1 sua pr\u00f3pria maneira preferida de confiar em um certificado de CA.\u00a0<\/span><\/p>\n<pre class=\"nums:false lang:default decode:true\">String connectionString = \"couchbases:\/\/example.com\" +\r\n    \"?security.trustCertificate=\/path\/to\/cluster_cert.pem\";\r\nCluster cluster = Cluster.connect(connectionString, nome de usu\u00e1rio, senha);<\/pre>\n<p><span style=\"font-weight: 400;\">Carregamento do endere\u00e7o padr\u00e3o criptografado da interface do usu\u00e1rio para um dos nomes de host do seu n\u00f3 a partir de um laptop de administrador. Isso deve ser carregado sem nenhum aviso: <\/span><a href=\"https:\/\/node1.cb.acme.com:18091\/\"><span style=\"font-weight: 400;\">https:\/\/node1.cb.acme.com:18091\/<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Da mesma forma, voc\u00ea pode fazer conex\u00f5es criptografadas por TLS do seu aplicativo para o banco de dados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lembre-se de criar e implementar novas chaves\/certos por n\u00f3 antes da expira\u00e7\u00e3o de 90 dias, seguindo essas etapas novamente.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">T\u00f3picos avan\u00e7ados de TLS<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Embora as etapas fornecidas at\u00e9 agora sirvam para a maioria dos aplicativos, h\u00e1 alguns recursos adicionais oferecidos no Couchbase Server para requisitos mais complexos. Eles s\u00e3o abordados no blog <\/span><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/enterprise-security-enhancements-couchbase-71\/\"><span style=\"font-weight: 400;\">Chaves privadas criptografadas e multi-CA, aprimoramentos de seguran\u00e7a empresarial no Couchbase Server 7.1<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">V\u00e1rias autoridades de certifica\u00e7\u00e3o no Couchbase Server<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Em vez de incluir um \u00fanico certificado como o certificado de cluster (<em>cluster_cert.pem<\/em> \/ <em>ca.pem<\/em>), v\u00e1rios certificados podem ser concatenados em um arquivo. Essa \u00e9 uma \u00f3tima op\u00e7\u00e3o para ter Autoridades de Certifica\u00e7\u00e3o redundantes ou para realizar a migra\u00e7\u00e3o de uma Autoridade de Certifica\u00e7\u00e3o para outra sem nenhum tempo de inatividade.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Chaves privadas de n\u00f3 criptografadas<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Assim como fizemos com a chave privada do cluster, a chave privada (<em>pkey.key<\/em>) que reside em cada n\u00f3 do Couchbase Server tamb\u00e9m pode ser opcionalmente criptografado com uma frase secreta para que s\u00f3 possa ser lido por pessoas e sistemas que tenham a autoridade correta para faz\u00ea-lo.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclus\u00e3o<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Os certificados TLS e sua configura\u00e7\u00e3o adequada s\u00e3o fundamentais para estabelecer comunica\u00e7\u00f5es seguras no Couchbase Server. Compreender a fun\u00e7\u00e3o dos certificados de cluster, a import\u00e2ncia dos certificados de n\u00f3 e o envolvimento das Autoridades de Certifica\u00e7\u00e3o (CAs) permite que os administradores implementem medidas de seguran\u00e7a robustas. Al\u00e9m disso, familiarizar-se com os nomes alternativos de assunto (SAN) aumenta a flexibilidade na implementa\u00e7\u00e3o de certificados em v\u00e1rios dom\u00ednios ou subdom\u00ednios. Ao seguir as diretrizes apresentadas neste guia, os administradores podem fortalecer a seguran\u00e7a de suas implanta\u00e7\u00f5es do Couchbase e proteger os dados confidenciais contra acesso n\u00e3o autorizado.<\/span><\/p>\n<p>Obrigado por acompanhar esta s\u00e9rie, esperamos que tenha gostado da visita guiada.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-1\/\">Parte 1 - Os componentes do TLS<\/a><\/li>\n<li><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-2\/\">Parte 2 - Intera\u00e7\u00e3o de componentes<\/a><\/li>\n<li><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/\">Parte 3 - Implementa\u00e7\u00e3o do TLS do Couchbase<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Entendendo o TLS no Couchbase Server Na Parte 1 e na Parte 2 deste guia, explicamos a hist\u00f3ria do TLS, os componentes envolvidos e como ele funciona. Nesta terceira parte final do guia, combinamos tudo isso [...]<\/p>","protected":false},"author":1864,"featured_media":14914,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815,2225,1816,1813,2201],"tags":[2001,9262],"ppma_author":[8928],"class_list":["post-14913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","category-cloud","category-couchbase-server","category-security","category-tools-sdks","tag-certificate-authority","tag-tls-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v26.1.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3) - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"In this section we\u2019ll setup TLS network encryption on a 3 node Couchbase Server cluster, running version 7.2.0 on Linux hosts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3)\" \/>\n<meta property=\"og:description\" content=\"In this section we\u2019ll setup TLS network encryption on a 3 node Couchbase Server cluster, running version 7.2.0 on Linux hosts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-18T03:14:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T18:05:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_124053342.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"701\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ian McCloy, Director Product Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian McCloy, Director Product Management\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/\"},\"author\":{\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\"},\"headline\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3)\",\"datePublished\":\"2023-10-18T03:14:16+00:00\",\"dateModified\":\"2023-10-23T18:05:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/\"},\"wordCount\":1780,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png\",\"keywords\":[\"Certificate Authority\",\"TLS encryption\"],\"articleSection\":[\"Best Practices and Tutorials\",\"Couchbase Capella\",\"Couchbase Server\",\"Security\",\"Tools &amp; SDKs\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/\",\"name\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3) - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png\",\"datePublished\":\"2023-10-18T03:14:16+00:00\",\"dateModified\":\"2023-10-23T18:05:30+00:00\",\"description\":\"In this section we\u2019ll setup TLS network encryption on a 3 node Couchbase Server cluster, running version 7.2.0 on Linux hosts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png\",\"width\":1396,\"height\":701,\"caption\":\"TLS security guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\",\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"caption\":\"Ian McCloy, Director Product Management, Couchbase\"},\"description\":\"Ian McCloy is the Director of the Platform and Security Product Management Group for Couchbase and lives in the United Kingdom. His dedicated team is responsible for the Reliability, Availability, Serviceability and Security architecture of Couchbase Server and the SaaS Database, Capella. This team also own cloud-native platforms like the Couchbase Kubernetes Autonomous Operator. Ian has a vast range of experience as a Software Engineer, Technical Support Engineer, Quality Assurance Engineer and Systems Administrator. Ian has led global technical teams for the majority of his 20 year professional career and holds several patents in the areas of information security, virtualisation and hardware design. https:\/\/www.linkedin.com\/in\/ianmccloy\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ianmccloy\/\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/ian-mccloycouchbase-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server (Parte 3 de 3) - The Couchbase Blog","description":"Nesta se\u00e7\u00e3o, configuraremos a criptografia de rede TLS em um cluster de 3 n\u00f3s do Couchbase Server, executando a vers\u00e3o 7.2.0 em hosts Linux.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/","og_locale":"pt_BR","og_type":"article","og_title":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3)","og_description":"In this section we\u2019ll setup TLS network encryption on a 3 node Couchbase Server cluster, running version 7.2.0 on Linux hosts.","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/securing-couchbase-with-tls-certificates-part-3\/","og_site_name":"The Couchbase Blog","article_published_time":"2023-10-18T03:14:16+00:00","article_modified_time":"2023-10-23T18:05:30+00:00","og_image":[{"width":1396,"height":701,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/09\/image_2023-09-27_124053342.png","type":"image\/png"}],"author":"Ian McCloy, Director Product Management","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ian McCloy, Director Product Management","Est. reading time":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/"},"author":{"name":"Ian McCloy, Director Product Management, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19"},"headline":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3)","datePublished":"2023-10-18T03:14:16+00:00","dateModified":"2023-10-23T18:05:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/"},"wordCount":1780,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png","keywords":["Certificate Authority","TLS encryption"],"articleSection":["Best Practices and Tutorials","Couchbase Capella","Couchbase Server","Security","Tools &amp; SDKs"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/","url":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/","name":"Protegendo a comunica\u00e7\u00e3o com certificados TLS: Um guia definitivo para o Couchbase Server (Parte 3 de 3) - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png","datePublished":"2023-10-18T03:14:16+00:00","dateModified":"2023-10-23T18:05:30+00:00","description":"Nesta se\u00e7\u00e3o, configuraremos a criptografia de rede TLS em um cluster de 3 n\u00f3s do Couchbase Server, executando a vers\u00e3o 7.2.0 em hosts Linux.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/09\/image_2023-09-27_124053342.png","width":1396,"height":701,"caption":"TLS security guide"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/securing-couchbase-with-tls-certificates-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 3 of 3)"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19","name":"Ian McCloy, diretor de gerenciamento de produtos, Couchbase","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f","url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","caption":"Ian McCloy, Director Product Management, Couchbase"},"description":"Ian McCloy \u00e9 diretor do grupo de gerenciamento de produtos de plataforma e seguran\u00e7a da Couchbase e mora no Reino Unido. Sua equipe dedicada \u00e9 respons\u00e1vel pela arquitetura de confiabilidade, disponibilidade, capacidade de servi\u00e7o e seguran\u00e7a do Couchbase Server e do banco de dados SaaS, Capella. Essa equipe tamb\u00e9m \u00e9 propriet\u00e1ria de plataformas nativas da nuvem, como o Operador Aut\u00f4nomo Kubernetes do Couchbase. Ian tem uma vasta experi\u00eancia como engenheiro de software, engenheiro de suporte t\u00e9cnico, engenheiro de garantia de qualidade e administrador de sistemas. Ian liderou equipes t\u00e9cnicas globais durante a maior parte de sua carreira profissional de 20 anos e possui v\u00e1rias patentes nas \u00e1reas de seguran\u00e7a da informa\u00e7\u00e3o, virtualiza\u00e7\u00e3o e design de hardware. https:\/\/www.linkedin.com\/in\/ianmccloy\/","sameAs":["https:\/\/www.linkedin.com\/in\/ianmccloy\/"],"url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/ian-mccloycouchbase-com\/"}]}},"authors":[{"term_id":8928,"user_id":1864,"is_guest":0,"slug":"ian-mccloycouchbase-com","display_name":"Ian McCloy, Director Product Management","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","author_category":"","last_name":"McCloy, Director Product Management","first_name":"Ian","job_title":"","user_url":"","description":"Ian McCloy \u00e9 diretor do grupo de gerenciamento de produtos de plataforma e seguran\u00e7a da Couchbase e mora no Reino Unido.  Sua equipe dedicada \u00e9 respons\u00e1vel pela arquitetura de confiabilidade, disponibilidade, capacidade de servi\u00e7o e seguran\u00e7a do Couchbase Server e do banco de dados SaaS, Capella.  Essa equipe tamb\u00e9m \u00e9 propriet\u00e1ria de plataformas nativas da nuvem, como o Operador Aut\u00f4nomo Kubernetes do Couchbase.  Ian tem uma vasta experi\u00eancia como engenheiro de software, engenheiro de suporte t\u00e9cnico, engenheiro de garantia de qualidade e administrador de sistemas. Ian liderou equipes t\u00e9cnicas globais durante a maior parte de sua carreira profissional de 20 anos e det\u00e9m v\u00e1rias patentes nas \u00e1reas de seguran\u00e7a da informa\u00e7\u00e3o, virtualiza\u00e7\u00e3o e design de hardware. https:\/\/www.linkedin.com\/in\/ianmccloy\/"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/14913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/1864"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=14913"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/14913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/14914"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=14913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=14913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=14913"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=14913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}