[{"id":"ci_db6b492e67cc64d6fdc08bdeb16d20bf21cae63737a8c0c22634fd2773d22523","title":"Mecánica de certificados","path":"/es/seguridad/25.2/mecanica-de-certificados","children":[{"id":"ci_1fabf56ad22f6fcf11b79bd0456a3509370d28943ba310bdf040901ac9de1504","title":"Normativa para uso de wildcards","path":"/es/seguridad/25.2/normativa-para-uso-de-wildcards","children":[]}]},{"id":"ci_b9bb9d116dfbeedb6f6174ca558ce5c80299bc9ead87ae694904e9983e94d8a5","title":"Trust center","path":"/es/seguridad/25.2/trust-center","children":[]},{"id":"ci_095baa59b162921a1356d71753601342b6186691f91ba4015c726e1adf32392a","title":"Modelo de seguridad SaaS","path":"/es/seguridad/25.2/modelo-de-seguridad-saas","children":[]}]