{"id":4124,"date":"2017-10-30T08:03:07","date_gmt":"2017-10-30T15:03:07","guid":{"rendered":"http:\/\/www.couchbase.com\/blog\/?p=4124"},"modified":"2025-06-13T23:14:59","modified_gmt":"2025-06-14T06:14:59","slug":"secure-nosql-data-couchbase-role-based-access-control","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/secure-nosql-data-couchbase-role-based-access-control\/","title":{"rendered":"Proteja seus dados NoSQL com o controle de acesso baseado em fun\u00e7\u00e3o do Couchbase"},"content":{"rendered":"<p>Em um mundo em que os vazamentos de dados est\u00e3o se tornando cada vez mais comuns, a necessidade de proteger o banco de dados e os aplicativos da Web torna-se cada vez mais importante. Eu, como muitos outros desenvolvedores, trabalhei com bancos de dados relacionais, como MySQL e Oracle, em que as permiss\u00f5es de controle de acesso podiam ser colocadas nos bancos de dados e nas tabelas dentro deles. Agora, com o <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/\" target=\"_blank\" rel=\"noopener\">Couchbase<\/a> 5.0, esse mesmo controle de granula\u00e7\u00e3o fina pode ser aplicado em clusters, buckets e muito mais.<\/p>\n<p>Veremos alguns exemplos de como o controle de acesso baseado em fun\u00e7\u00e3o (RBAC) do Couchbase Server pode ser usado para bloquear o banco de dados e proteg\u00ea-lo melhor dos usu\u00e1rios mal-intencionados que tentam explor\u00e1-lo.<\/p>\n<p><!--more--><\/p>\n<p>Sejamos claros desde o in\u00edcio: ter contas com controle de acesso no seu banco de dados n\u00e3o ser\u00e1 uma solu\u00e7\u00e3o definitiva quando se trata de proteger seus dados. Voc\u00ea ainda deve seguir as pr\u00e1ticas recomendadas quando se trata de projetar seu aplicativo Web, mas ter o controle de acesso no n\u00edvel do banco de dados ajudar\u00e1 significativamente a sua causa.<\/p>\n<p>Com o RBAC do Couchbase Server, \u00e9 poss\u00edvel ter qualquer n\u00famero de contas que possam ser usadas para acessar o banco de dados.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4125 size-large\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2017\/10\/couchbase-rbac-accounts-1024x336.png\" alt=\"Couchbase Role-Based Access Control Accounts\" width=\"900\" height=\"295\" \/><\/p>\n<p>Essas contas ter\u00e3o privil\u00e9gios como leitura, grava\u00e7\u00e3o, execu\u00e7\u00e3o, gerenciamento e descarga.<\/p>\n<p>Vamos brincar com a cria\u00e7\u00e3o de uma conta e descobrir o que acontece quando temos e n\u00e3o temos os privil\u00e9gios corretos para realizar determinadas tarefas.<\/p>\n<h2>Cria\u00e7\u00e3o de um novo usu\u00e1rio para o Couchbase Server<\/h2>\n<p>Supondo que voc\u00ea j\u00e1 tenha obtido uma c\u00f3pia do Couchbase Server 5.0 ou mais recente, fa\u00e7a login no cluster ou na inst\u00e2ncia usando seu nome de usu\u00e1rio e senha de administrador.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4126 size-large\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2017\/10\/couchbase-admin-login-1024x189.png\" alt=\"Couchbase Server Admin Login\" width=\"900\" height=\"166\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login-1024x189.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login-300x55.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login-768x142.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login-1536x284.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login-20x4.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login-1320x244.png 1320w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-admin-login.png 2048w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>O nome de usu\u00e1rio e a senha administrativos n\u00e3o v\u00e3o desaparecer agora que o controle de acesso baseado em fun\u00e7\u00e3o est\u00e1 dispon\u00edvel. Pense nele como o usu\u00e1rio raiz do cluster do banco de dados.<\/p>\n<p>Depois de fazer login, localize a se\u00e7\u00e3o <strong>Seguran\u00e7a<\/strong> e selecione <strong>ADICIONAR USU\u00c1RIO<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4127 size-full\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2017\/10\/couchbase-rbac-new-user.gif\" alt=\"Couchbase Create New RBAC User\" width=\"1425\" height=\"649\" \/><\/p>\n<p>Ao adicionar um usu\u00e1rio, certifique-se de escolher uma combina\u00e7\u00e3o forte de nome de usu\u00e1rio e senha.<\/p>\n<p>H\u00e1 v\u00e1rias fun\u00e7\u00f5es para escolher ao criar um novo usu\u00e1rio. Por enquanto, escolha a fun\u00e7\u00e3o <strong>Leitor de dados<\/strong> da fun\u00e7\u00e3o <strong>Fun\u00e7\u00f5es de dados<\/strong> se\u00e7\u00e3o. Estamos fazendo isso porque queremos ver o que acontece quando tentamos usar uma conta de usu\u00e1rio com poucas permiss\u00f5es. Para obter o m\u00e1ximo de seguran\u00e7a, certifique-se de atribuir apenas os Buckets necess\u00e1rios ao usu\u00e1rio e n\u00e3o use a se\u00e7\u00e3o <strong>todos [*]<\/strong> op\u00e7\u00e3o.<\/p>\n<p>Agora vamos dar uma olhada na tentativa de usar essa nova conta com o Couchbase.<\/p>\n<h2>Execu\u00e7\u00e3o de tarefas com o shell do Couchbase<\/h2>\n<p>Ao instalar o Couchbase, voc\u00ea recebe o Couchbase Shell, que \u00e9 uma ferramenta CLI que pode fazer v\u00e1rias coisas com o banco de dados.<\/p>\n<p>Se estiver usando um Mac, execute o seguinte comando:<\/p>\n<pre class=\"lang:default decode:true\">\/Applications\/Couchbase Server.app\/Contents\/Resources\/couchbase-core\/bin\/cbq -u username -p password<\/pre>\n<p>O comando acima iniciar\u00e1 o Couchase Shell (CBQ) usando o nome de usu\u00e1rio e a senha especificados. Certifique-se de usar o nome de usu\u00e1rio e a senha do usu\u00e1rio RBAC que voc\u00ea criou anteriormente.<\/p>\n<p>Se voc\u00ea estiver usando o Microsoft Windows, o CBQ dever\u00e1 estar localizado no seguinte local:<\/p>\n<pre class=\"lang:default decode:true\">C:\\Program Files\\Couchbase\\Server\\bin\\cbq.exe -u username -p password<\/pre>\n<p>Da mesma forma, se estiver usando Linux, verifique se h\u00e1 CBQ aqui:<\/p>\n<pre class=\"lang:default decode:true\">\/opt\/couchbase\/bin\/cbq -u username -p password<\/pre>\n<p>Se voc\u00ea quiser saber mais sobre o Couchbase Shell, d\u00ea uma olhada na se\u00e7\u00e3o <a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/current\/n1ql\/n1ql-intro\/cbq.html\" target=\"_blank\" rel=\"noopener\">documenta\u00e7\u00e3o oficial<\/a>.<\/p>\n<p>Com uma conex\u00e3o bem-sucedida ao Couchbase Server usando o CBQ, vamos tentar executar uma consulta:<\/p>\n<pre class=\"lang:default decode:true\">SELECT * FROM `default`;<\/pre>\n<p>\u00c9 claro que estamos supondo que voc\u00ea tenha um Bucket chamado\u00a0<strong>padr\u00e3o<\/strong> e seu usu\u00e1rio tem acesso a ele. Lembre-se de que s\u00f3 temos o\u00a0<strong>Leitor de dados<\/strong> em nosso usu\u00e1rio, e n\u00e3o uma das fun\u00e7\u00f5es <strong>Fun\u00e7\u00f5es de consulta<\/strong>. Isso significa que voc\u00ea provavelmente receber\u00e1 um erro parecido com o seguinte:<\/p>\n<pre class=\"lang:default decode:true\">{\r\n    \"requestID\": \"aca002c6-58d5-4754-9e33-325eef47f46b\",\r\n    \"signature\": {\r\n        \"*\": \"*\"\r\n    },\r\n    \"results\": [\r\n    ],\r\n    \"errors\": [\r\n        {\r\n            \"code\": 13014,\r\n            \"msg\": \"User does not have credentials to run SELECT queries on the default bucket. Add role query_select on default to allow the query to run.\"\r\n        }\r\n    ],\r\n    \"status\": \"stopped\",\r\n    \"metrics\": {\r\n        \"elapsedTime\": \"1.703462ms\",\r\n        \"executionTime\": \"1.690334ms\",\r\n        \"resultCount\": 0,\r\n        \"resultSize\": 0,\r\n        \"errorCount\": 1\r\n    }\r\n}<\/pre>\n<p>Isso \u00e9 \u00f3timo porque n\u00e3o queremos que nosso usu\u00e1rio possa executar consultas. O <strong>Fun\u00e7\u00f5es de dados<\/strong> Os privil\u00e9gios s\u00e3o apenas para opera\u00e7\u00f5es de valor-chave, n\u00e3o para N1QL.<\/p>\n<p>Volte ao Painel de controle administrativo do Couchbase e altere as fun\u00e7\u00f5es do usu\u00e1rio. Desta vez, d\u00ea ao usu\u00e1rio a fun\u00e7\u00e3o\u00a0<strong>Sele\u00e7\u00e3o de consulta<\/strong> fun\u00e7\u00e3o de\u00a0<strong>Fun\u00e7\u00f5es de consulta<\/strong>. Se voc\u00ea tentar executar a consulta novamente no CBQ, ela dever\u00e1 ser bem-sucedida.<\/p>\n<h2>Inclus\u00e3o de controles de acesso baseados em fun\u00e7\u00e3o em um aplicativo<\/h2>\n<p>Em algum momento, voc\u00ea precisar\u00e1 criar um aplicativo da Web que se comunique com o Couchbase usando um dos v\u00e1rios SDKs do Couchbase. A partir do Couchbase 5.0, um usu\u00e1rio RBAC deve estar dispon\u00edvel e o SDK deve se autenticar com ele, caso contr\u00e1rio, ocorrer\u00e1 um erro ao tentar abrir um Bucket.<\/p>\n<p>Se voc\u00ea for um desenvolvedor do Node.js, poder\u00e1 fazer algo parecido com isto:<\/p>\n<pre class=\"lang:default decode:true\">var cluster = new Couchbase.Cluster(\"couchbase:\/\/host\");\r\ncluster.authenticate(\"username\", \"password\");\r\nvar bucket = cluster.openBucket(\"default\");<\/pre>\n<p>Observe que o <code>openBucket<\/code> n\u00e3o recebe mais uma senha do Bucket. Em vez disso, estamos contando com a fun\u00e7\u00e3o <code>autenticar<\/code> e nossos controles de acesso.<\/p>\n<p>Cada um dos SDKs segue uma abordagem muito semelhante \u00e0 autentica\u00e7\u00e3o. Para obter mais informa\u00e7\u00f5es, consulte a documenta\u00e7\u00e3o do SDK na se\u00e7\u00e3o <a href=\"https:\/\/www.couchbase.com\/blog\/pt\/developers\/\" target=\"_blank\" rel=\"noopener\">Portal do desenvolvedor do Couchbase<\/a>.<\/p>\n<h2>Conclus\u00e3o<\/h2>\n<p>A capacidade de definir privil\u00e9gios com base em clusters, Buckets e at\u00e9 mesmo servi\u00e7os \u00e9 uma grande vit\u00f3ria quando se trata de proteger seu banco de dados NoSQL. Ao dar aos usu\u00e1rios o m\u00ednimo necess\u00e1rio para que eles funcionem, voc\u00ea est\u00e1 ajudando a eliminar a possibilidade de vazamento de dados ou de alguma outra atividade mal-intencionada.<\/p>","protected":false},"excerpt":{"rendered":"<p>In a world where data leaks are becoming increasingly common, the need to harden the database and web applications becomes ever so important. I, like many other developers, came from working with relational databases such as MySQL and Oracle, where [&hellip;]<\/p>","protected":false},"author":63,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815,1816,1813],"tags":[1903,1962],"ppma_author":[9032],"class_list":["post-4124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","category-couchbase-server","category-security","tag-rbac","tag-role-based-access-control"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure Your NoSQL Data with Couchbase Role-Based Access Control<\/title>\n<meta name=\"description\" content=\"Learn how to define an access control configuration in Couchbase Server to protect your cluster, buckets, and data from being accessed without permission.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/secure-nosql-data-couchbase-role-based-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Your NoSQL Data with Couchbase Role-Based Access Control\" \/>\n<meta property=\"og:description\" content=\"Learn how to define an access control configuration in Couchbase Server to protect your cluster, buckets, and data from being accessed without permission.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/secure-nosql-data-couchbase-role-based-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/thepolyglotdeveloper\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-30T15:03:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-14T06:14:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-rbac-accounts.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"673\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nic Raboy, Developer Advocate, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nraboy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nic Raboy, Developer Advocate, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/\"},\"author\":{\"name\":\"Nic Raboy, Developer Advocate, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/bb545ebe83bb2d12f91095811d0a72e1\"},\"headline\":\"Secure Your NoSQL Data with Couchbase Role-Based Access Control\",\"datePublished\":\"2017-10-30T15:03:07+00:00\",\"dateModified\":\"2025-06-14T06:14:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/\"},\"wordCount\":819,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"keywords\":[\"RBAC\",\"Role Based Access Control (RBAC)\"],\"articleSection\":[\"Best Practices and Tutorials\",\"Couchbase Server\",\"Security\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/\",\"name\":\"Secure Your NoSQL Data with Couchbase Role-Based Access Control\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2017-10-30T15:03:07+00:00\",\"dateModified\":\"2025-06-14T06:14:59+00:00\",\"description\":\"Learn how to define an access control configuration in Couchbase Server to protect your cluster, buckets, and data from being accessed without permission.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Your NoSQL Data with Couchbase Role-Based Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/bb545ebe83bb2d12f91095811d0a72e1\",\"name\":\"Nic Raboy, Developer Advocate, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/8863514d8bed0cf6080f23db40e00354\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bedeb68368d4681aca4c74fe5f697f0c423b80d498ec50fd915ba018b72c101f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bedeb68368d4681aca4c74fe5f697f0c423b80d498ec50fd915ba018b72c101f?s=96&d=mm&r=g\",\"caption\":\"Nic Raboy, Developer Advocate, Couchbase\"},\"description\":\"Nic Raboy is an advocate of modern web and mobile development technologies. He has experience in Java, JavaScript, Golang and a variety of frameworks such as Angular, NativeScript, and Apache Cordova. Nic writes about his development experiences related to making web and mobile development easier to understand.\",\"sameAs\":[\"https:\/\/www.thepolyglotdeveloper.com\",\"https:\/\/www.facebook.com\/thepolyglotdeveloper\",\"https:\/\/x.com\/nraboy\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/nic-raboy-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Proteja seus dados NoSQL com o controle de acesso baseado em fun\u00e7\u00e3o do Couchbase","description":"Saiba como definir uma configura\u00e7\u00e3o de controle de acesso no Couchbase Server para proteger o cluster, os buckets e os dados de serem acessados sem permiss\u00e3o.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/secure-nosql-data-couchbase-role-based-access-control\/","og_locale":"pt_BR","og_type":"article","og_title":"Secure Your NoSQL Data with Couchbase Role-Based Access Control","og_description":"Learn how to define an access control configuration in Couchbase Server to protect your cluster, buckets, and data from being accessed without permission.","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/secure-nosql-data-couchbase-role-based-access-control\/","og_site_name":"The Couchbase Blog","article_author":"https:\/\/www.facebook.com\/thepolyglotdeveloper","article_published_time":"2017-10-30T15:03:07+00:00","article_modified_time":"2025-06-14T06:14:59+00:00","og_image":[{"width":2048,"height":673,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2017\/10\/couchbase-rbac-accounts.png","type":"image\/png"}],"author":"Nic Raboy, Developer Advocate, Couchbase","twitter_card":"summary_large_image","twitter_creator":"@nraboy","twitter_misc":{"Written by":"Nic Raboy, Developer Advocate, Couchbase","Est. reading time":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/"},"author":{"name":"Nic Raboy, Developer Advocate, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/bb545ebe83bb2d12f91095811d0a72e1"},"headline":"Secure Your NoSQL Data with Couchbase Role-Based Access Control","datePublished":"2017-10-30T15:03:07+00:00","dateModified":"2025-06-14T06:14:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/"},"wordCount":819,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","keywords":["RBAC","Role Based Access Control (RBAC)"],"articleSection":["Best Practices and Tutorials","Couchbase Server","Security"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/","url":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/","name":"Proteja seus dados NoSQL com o controle de acesso baseado em fun\u00e7\u00e3o do Couchbase","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2017-10-30T15:03:07+00:00","dateModified":"2025-06-14T06:14:59+00:00","description":"Saiba como definir uma configura\u00e7\u00e3o de controle de acesso no Couchbase Server para proteger o cluster, os buckets e os dados de serem acessados sem permiss\u00e3o.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/secure-nosql-data-couchbase-role-based-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure Your NoSQL Data with Couchbase Role-Based Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/bb545ebe83bb2d12f91095811d0a72e1","name":"Nic Raboy, defensor dos desenvolvedores, Couchbase","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/8863514d8bed0cf6080f23db40e00354","url":"https:\/\/secure.gravatar.com\/avatar\/bedeb68368d4681aca4c74fe5f697f0c423b80d498ec50fd915ba018b72c101f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bedeb68368d4681aca4c74fe5f697f0c423b80d498ec50fd915ba018b72c101f?s=96&d=mm&r=g","caption":"Nic Raboy, Developer Advocate, Couchbase"},"description":"Nic Raboy \u00e9 um defensor das modernas tecnologias de desenvolvimento m\u00f3vel e da Web. Ele tem experi\u00eancia em Java, JavaScript, Golang e uma variedade de estruturas, como Angular, NativeScript e Apache Cordova. Nic escreve sobre suas experi\u00eancias de desenvolvimento relacionadas a tornar o desenvolvimento m\u00f3vel e da Web mais f\u00e1cil de entender.","sameAs":["https:\/\/www.thepolyglotdeveloper.com","https:\/\/www.facebook.com\/thepolyglotdeveloper","https:\/\/x.com\/nraboy"],"url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/nic-raboy-2\/"}]}},"authors":[{"term_id":9032,"user_id":63,"is_guest":0,"slug":"nic-raboy-2","display_name":"Nic Raboy, Developer Advocate, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/bedeb68368d4681aca4c74fe5f697f0c423b80d498ec50fd915ba018b72c101f?s=96&d=mm&r=g","author_category":"","last_name":"Raboy","first_name":"Nic","job_title":"","user_url":"https:\/\/www.thepolyglotdeveloper.com","description":"Nic Raboy \u00e9 um defensor das modernas tecnologias de desenvolvimento m\u00f3vel e da Web. Ele tem experi\u00eancia em Java, JavaScript, Golang e uma variedade de estruturas, como Angular, NativeScript e Apache Cordova. Nic escreve sobre suas experi\u00eancias de desenvolvimento relacionadas a tornar o desenvolvimento m\u00f3vel e da Web mais f\u00e1cil de entender."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/4124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=4124"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/4124\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=4124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=4124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=4124"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=4124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}