{"id":6966,"date":"2017-07-20T09:55:49","date_gmt":"2017-07-20T08:55:49","guid":{"rendered":"https:\/\/tugesto.com\/blog\/?p=6966"},"modified":"2024-05-20T09:45:06","modified_gmt":"2024-05-20T07:45:06","slug":"protocolo-ssl-tls-conexion-segura","status":"publish","type":"post","link":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/","title":{"rendered":"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6966\" class=\"elementor elementor-6966\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29994e9d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29994e9d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-105acaa\" data-id=\"105acaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2dd7af3d elementor-widget elementor-widget-text-editor\" data-id=\"2dd7af3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #4c4f54;\">Los protocolos criptogr\u00e1ficos <strong>proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n<\/strong>, asegurando las comunicaciones, generalmente, entre un servidor y un cliente. Actualmente, SSL en la versi\u00f3n 3.0 es el est\u00e1ndar en cuanto a seguridad de las comunicaciones.<\/span><\/p><p><a href=\"http:\/\/tugesto.com\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-14765 size-full\" src=\"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2020\/01\/asesoria_online_tugesto.jpg\" alt=\"Ahorra tiempo y dinero con nuestra gesti\u00f3n online\" width=\"800\" height=\"241\" srcset=\"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2020\/01\/asesoria_online_tugesto.jpg 800w, https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2020\/01\/asesoria_online_tugesto-300x90.jpg 300w, https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2020\/01\/asesoria_online_tugesto-768x231.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p><h2><span style=\"color: #4c4f54;\">Protocolo SSL<\/span><\/h2><p><span style=\"color: #4c4f54;\">Originalmente <\/span><strong><span style=\"color: #4c4f54;\">desarrollado por<\/span> <span style=\"color: #ff6600;\"><a href=\"https:\/\/netscape-esp.uptodown.com\/windows\" target=\"_blank\" rel=\"noopener\">Netscape<\/a><\/span><\/strong>, <span style=\"color: #4c4f54;\">fue introducido en 1995 al publicar la versi\u00f3n 2.0 siendo r\u00e1pidamente reemplazado por la 3.0 en 1996 al encontrar un gran n\u00famero de vulnerabilidades. La versi\u00f3n 1.0 nunca se lanz\u00f3 para uso p\u00fablico.<\/span><\/p><h2><span style=\"color: #4c4f54;\">TLS<\/span><\/h2><p><span style=\"color: #4c4f54;\">Aparece en 1999 como <strong>una mejora de SSL<\/strong>, teniendo como base la versi\u00f3n 3.0 de dicho protocolo. TLS est\u00e1 en la versi\u00f3n 1.2 teniendo como borrador la 1.3.<\/span><\/p><p><span style=\"color: #4c4f54;\">Los cambios entre SSL 3.0 y TLS 1.0 no son muy grandes, pero s\u00ed lo suficiente para que no puedan interoperar. <strong>Utilizar TLS 1.0 es como utilizar SSL 3.0.<\/strong><\/span><\/p><h2><span style=\"color: #4c4f54;\">\u00bfSabes c\u00f3mo establecer una conexi\u00f3n segura con protocolos criptogr\u00e1ficos?<\/span><\/h2><p><span style=\"color: #4c4f54;\">Hay dos formas en las que un programa puede iniciar una conexi\u00f3n fiable con un servidor:<\/span><\/p><ol><li><span style=\"color: #4c4f54;\"><em><strong>Usando un puerto<\/strong><\/em>: conectarse a un puerto espec\u00edfico significa que se va a utilizar una conexi\u00f3n segura. Por ejemplo, el puerto 443, https (conexi\u00f3n segura para web), 993 para IMAP, etc. Estos puertos est\u00e1n configurados en el servidor para n<strong>egociar una conexi\u00f3n segura en primera instancia y luego hacer que se solicite<\/strong>.<\/span><\/li><li><span style=\"color: #4c4f54;\"><em><strong>Usando un protocolo<\/strong><\/em>: estas conexiones primero hacen una conexi\u00f3n insegura, <strong>s\u00f3lo establece una conexi\u00f3n segura si el negociado entre el cliente y el servidor se ha logrado con \u00e9xito<\/strong>. Si por alguna raz\u00f3n la conexi\u00f3n falla, se corta la conexi\u00f3n.<\/span><\/li><\/ol><h3><span style=\"color: #4c4f54;\">Entre los protocolos criptogr\u00e1ficos TLS o SSL, \u00bfcon cu\u00e1l nos debemos quedar?<\/span><\/h3><p><span style=\"color: #4c4f54;\">Si est\u00e1s configurando un servidor tendr\u00e1s que instalar un software que soporte la \u00faltima versi\u00f3n de TLS y configurarlo de forma correcta. Esto har\u00e1 que las conexiones de tus usuarios sean lo m\u00e1s seguras posibles.<\/span><\/p><p><span style=\"color: #4c4f54;\">Adem\u00e1s, si utilizas un certificado de seguridad a\u00fan lo ser\u00e1n m\u00e1s. Hay que evitar el uso de SSL v3 y utilizar m\u00e9todos de cifrado fuertes.<\/span><\/p><p><span style=\"color: #4c4f54;\">Si estas configurando un programa (cliente de correo) y tienes la opci\u00f3n de conectarte de forma segura con cualquiera de los dos protocolos criptogr\u00e1ficos, SSL y TLS, eres libre de utilizarlo, mientras est\u00e9 disponible en tu servidor. Aunque actualmente el \u00fanico protocolo seguro es TLS 1.2.<\/span><\/p><p><strong><span style=\"color: #4c4f54;\">En<\/span> <a href=\"https:\/\/tugesto.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff6600;\">tugesto<\/span><\/a> <span style=\"color: #4c4f54;\">trabajamos siempre bajo conexiones seguras<\/span><\/strong><span style=\"color: #4c4f54;\">. La informaci\u00f3n recibida y expedida por los usuarios se mantiene bajo un protocolo fiable. As\u00ed, el proceso de comunicaci\u00f3n e interacci\u00f3n entre las partes se establece mediante conexi\u00f3n segura, ofreciendo control y confidencialidad a los datos de nuestros usuarios.<\/span><\/p><h4><span style=\"color: #4c4f54;\">\u00a1Apostamos por la tecnolog\u00eda e implantaci\u00f3n de la digitalizaci\u00f3n en todas las empresas!<\/span><\/h4><p><a href=\"http:\/\/tugesto.com\/software-lopd\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone wp-image-20889 size-full\" src=\"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2021\/09\/incorpora-un-delegado-proteccion-datos-informate.png\" alt=\"contrata-dpo\" width=\"800\" height=\"241\" srcset=\"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2021\/09\/incorpora-un-delegado-proteccion-datos-informate.png 800w, https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2021\/09\/incorpora-un-delegado-proteccion-datos-informate-300x90.png 300w, https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2021\/09\/incorpora-un-delegado-proteccion-datos-informate-768x231.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando las comunicaciones, generalmente, entre un servidor y un cliente. Actualmente, SSL en la versi\u00f3n 3.0 es el est\u00e1ndar en cuanto a seguridad de las comunicaciones. Protocolo SSL Originalmente desarrollado por Netscape, fue introducido en 1995 al publicar la versi\u00f3n 2.0 siendo r\u00e1pidamente reemplazado por [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":6971,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","content-type":"","footnotes":""},"categories":[144],"tags":[36,38],"ppma_author":[1499],"class_list":["post-6966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-idi","tag-autonomos","tag-pymes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura | tugesto<\/title>\n<meta name=\"description\" content=\"Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando comunicaciones entre servidor-cliente\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura | tugesto\" \/>\n<meta property=\"og:description\" content=\"Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando comunicaciones entre servidor-cliente\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog: \u00a1Aprende a emprender! | tugesto\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tugesto\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-20T08:55:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-20T07:45:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2017\/07\/conexion-segura.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"329\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jose Buils\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jose Buils\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/\"},\"author\":{\"name\":\"Jose Buils\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#\\\/schema\\\/person\\\/829bb01727edd86bdd1ddd4e14963375\"},\"headline\":\"Protocolos criptogr\u00e1ficos SSL\\\/TLS: conexi\u00f3n segura\",\"datePublished\":\"2017-07-20T08:55:49+00:00\",\"dateModified\":\"2024-05-20T07:45:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/\"},\"wordCount\":465,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/conexion-segura.jpg\",\"keywords\":[\"aut\u00f3nomos\",\"pymes\"],\"articleSection\":[\"I+D+i\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/\",\"url\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/\",\"name\":\"Protocolos criptogr\u00e1ficos SSL\\\/TLS: conexi\u00f3n segura | tugesto\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/conexion-segura.jpg\",\"datePublished\":\"2017-07-20T08:55:49+00:00\",\"dateModified\":\"2024-05-20T07:45:06+00:00\",\"description\":\"Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando comunicaciones entre servidor-cliente\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#primaryimage\",\"url\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/conexion-segura.jpg\",\"contentUrl\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/conexion-segura.jpg\",\"width\":700,\"height\":329,\"caption\":\"Hoy hablamos de la conexi\u00f3n segura SSL\\\/TLS que aportan los protocolos criptogr\u00e1ficos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/protocolo-ssl-tls-conexion-segura\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I+D+i\",\"item\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/category\\\/idi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protocolos criptogr\u00e1ficos SSL\\\/TLS: conexi\u00f3n segura\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/\",\"name\":\"Blog tugesto\",\"description\":\"\ud83d\udcda Blog especializado para aut\u00f3nomos y pymes. Encuentra semanalmente nuevos posts, recursos y gu\u00edas. La ayuda que necesitas para tu negocio.\",\"publisher\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#organization\",\"name\":\"tugesto\",\"url\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/logo_tugesto.png\",\"contentUrl\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/logo_tugesto.png\",\"width\":190,\"height\":63,\"caption\":\"tugesto\"},\"image\":{\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/tugesto\\\/\",\"https:\\\/\\\/www.instagram.com\\\/tugesto_online\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/#\\\/schema\\\/person\\\/829bb01727edd86bdd1ddd4e14963375\",\"name\":\"Jose Buils\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/jose-buils.png359335f05c20630fe0c01f7d0491d27d\",\"url\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/jose-buils.png\",\"contentUrl\":\"https:\\\/\\\/tugesto.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/jose-buils.png\",\"caption\":\"Jose Buils\"},\"description\":\"Responsable departamento IT\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura | tugesto","description":"Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando comunicaciones entre servidor-cliente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/","og_locale":"es_ES","og_type":"article","og_title":"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura | tugesto","og_description":"Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando comunicaciones entre servidor-cliente","og_url":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/","og_site_name":"Blog: \u00a1Aprende a emprender! | tugesto","article_publisher":"https:\/\/www.facebook.com\/tugesto\/","article_published_time":"2017-07-20T08:55:49+00:00","article_modified_time":"2024-05-20T07:45:06+00:00","og_image":[{"width":700,"height":329,"url":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2017\/07\/conexion-segura.jpg","type":"image\/jpeg"}],"author":"Jose Buils","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Jose Buils","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#article","isPartOf":{"@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/"},"author":{"name":"Jose Buils","@id":"https:\/\/tugesto.com\/blog\/#\/schema\/person\/829bb01727edd86bdd1ddd4e14963375"},"headline":"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura","datePublished":"2017-07-20T08:55:49+00:00","dateModified":"2024-05-20T07:45:06+00:00","mainEntityOfPage":{"@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/"},"wordCount":465,"commentCount":0,"publisher":{"@id":"https:\/\/tugesto.com\/blog\/#organization"},"image":{"@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#primaryimage"},"thumbnailUrl":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2017\/07\/conexion-segura.jpg","keywords":["aut\u00f3nomos","pymes"],"articleSection":["I+D+i"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/","url":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/","name":"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura | tugesto","isPartOf":{"@id":"https:\/\/tugesto.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#primaryimage"},"image":{"@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#primaryimage"},"thumbnailUrl":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2017\/07\/conexion-segura.jpg","datePublished":"2017-07-20T08:55:49+00:00","dateModified":"2024-05-20T07:45:06+00:00","description":"Los protocolos criptogr\u00e1ficos proporcionan autentificaci\u00f3n y cifrado de la informaci\u00f3n, asegurando comunicaciones entre servidor-cliente","breadcrumb":{"@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#primaryimage","url":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2017\/07\/conexion-segura.jpg","contentUrl":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2017\/07\/conexion-segura.jpg","width":700,"height":329,"caption":"Hoy hablamos de la conexi\u00f3n segura SSL\/TLS que aportan los protocolos criptogr\u00e1ficos"},{"@type":"BreadcrumbList","@id":"https:\/\/tugesto.com\/blog\/protocolo-ssl-tls-conexion-segura\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tugesto.com\/blog\/"},{"@type":"ListItem","position":2,"name":"I+D+i","item":"https:\/\/tugesto.com\/blog\/category\/idi\/"},{"@type":"ListItem","position":3,"name":"Protocolos criptogr\u00e1ficos SSL\/TLS: conexi\u00f3n segura"}]},{"@type":"WebSite","@id":"https:\/\/tugesto.com\/blog\/#website","url":"https:\/\/tugesto.com\/blog\/","name":"Blog tugesto","description":"\ud83d\udcda Blog especializado para aut\u00f3nomos y pymes. Encuentra semanalmente nuevos posts, recursos y gu\u00edas. La ayuda que necesitas para tu negocio.","publisher":{"@id":"https:\/\/tugesto.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tugesto.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/tugesto.com\/blog\/#organization","name":"tugesto","url":"https:\/\/tugesto.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tugesto.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2019\/06\/logo_tugesto.png","contentUrl":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2019\/06\/logo_tugesto.png","width":190,"height":63,"caption":"tugesto"},"image":{"@id":"https:\/\/tugesto.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tugesto\/","https:\/\/www.instagram.com\/tugesto_online\/"]},{"@type":"Person","@id":"https:\/\/tugesto.com\/blog\/#\/schema\/person\/829bb01727edd86bdd1ddd4e14963375","name":"Jose Buils","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2024\/05\/jose-buils.png359335f05c20630fe0c01f7d0491d27d","url":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2024\/05\/jose-buils.png","contentUrl":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2024\/05\/jose-buils.png","caption":"Jose Buils"},"description":"Responsable departamento IT"}]}},"authors":[{"term_id":1499,"user_id":13,"is_guest":0,"slug":"jose-buils","display_name":"Jose Buils","avatar_url":{"url":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2024\/05\/jose-buils.png","url2x":"https:\/\/tugesto.com\/blog\/wp-content\/uploads\/2024\/05\/jose-buils.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/posts\/6966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/comments?post=6966"}],"version-history":[{"count":11,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/posts\/6966\/revisions"}],"predecessor-version":[{"id":35643,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/posts\/6966\/revisions\/35643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/media\/6971"}],"wp:attachment":[{"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/media?parent=6966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/categories?post=6966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/tags?post=6966"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/tugesto.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=6966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}