The best way to learn about settings is to navigate to certbot’s website and read specific installation instructions. In most cases, certbot requires root access or administrator level functionality for authentication.
The installation is usually carried out through the secure shell Encryption Protocol SSH, which allows the transfer of files over an insecure network. Popular SSH clients are Mac OS X terminals and windows putty. According to the certificate installation settings and site requirements, there are many ways to install let’s encrypt DV certificates on the site. The certbot website will guide the installation process based on specific server settings. As mentioned earlier, if you choose to enable this option on the web host, you can also automatically install certificates through the web host. Since each web host is different, refer to the host documentation for setting instructions.
Wildcard certificates must be installed using the DNS plug-in. For more information, please check the certbot documentation. If you don’t have server software (such as Apache or nginx) and are not interested in getting it, the stand-alone plug-in method is a good option. The plug-in must bind to web server port 80 (HTTP) or 443 (SSL) to authenticate the domain, so you may need to disable the port from the server in advance. If both are used to load the site, but neither is available, certbot may have an error. The process of closing and opening ports varies depending on the production software, refer to the specific documentation provided as needed.
Make sure certbot is installed and port 80 or 443 is available, and then enter the following command in the SSH client. The command is slightly different, depending on the port used\/\/ For Port 80
certbot certonly –standalone –preferred-challenges http -d example. com
\/\/For Port 443
certbot certonly –standalone –preferred-challenges tls-sni -d example. com
After decomposition, certonly will get the certificate (renewed under certain circumstances) or not install the certificate. – Standalone instructs certbot to run a stand-alone Web server for authentication, – preferred challenges specifies the posts certbot will use, and specifies the domain name that requests -d SSL certificates.
After executing the command, you will be prompted to enter your email address and accept the terms of use. Upon completion, you will receive a message and certificate location notifying you that the process is complete. If you have the ability to modify the contents of the Webroot plug-in server, you can choose to use the Webroot method. The Webroot method that installs the certificate places the authentication file in a specific location on the web server. This method is convenient because there is no need to switch ports and worry about interrupting the site during installation. To use the weblot plug-in, hide directories, especially \/. It may be important to configure the server for the files in the well-known folder.
On the SSH client, run the following command to install the Webroot method: certbot certonly –webroot -w \/var\/www\/example -d www.example. com -d example. com
Certonly command to get the certificate – weblot will tell certbot what method we are using. Then, you must include the file path, including – W or – Webroot path, and the file path containing the top-level directory of the files provided by the web server- webroot-path \/var\/www\/htm
L is the regular web root path. For more information, please check the certbot documentation. Certificate location all keys and issued certificates can be found in \/ etc \/ letsentrypt \/ Live \/ $domain, and will be updated when updated. The following is a list of files in the certificate. Privkey. PEM – the private key is stored here and kept confidential to certbot developers. However, you must keep the server accessible so that only the root user can access it. Fullchain. PEM – if all certificates are stored here and there are multiple certificates, the first certificate is the server certificate. Cert.pem – this includes a single server certificate. Chain. PEM – all intermediate certificates and certificates required to validate the server are stored here. To view the contents of the files in the directory, check LS \/ etc \/ letsentype \/ Live \/ example on the SSH client. Use the com command to display the list. Certificate renewal the goal of certbot is to ensure that all installed certificates have expired, and then try to renew as easily as possible. The following command checks multiple certificates and always considers whether they expire. certbot renew
Renew all certificates valid for less than 30 days. Without the risk of updating in advance, you can run as often as you want. If there are multiple domain names and you only want to renew one of them, this command using certonly will execute trick. certbot certonly -n -d example. com -d www.example. com
Note: certbot recommends including – N or – noninteractive to prevent blocking user input. Conclusion SSL certificate installation is a necessary security measure for all WordPress sites. Let’s encrypt and certbot provide a quick, free way to protect domains and websites using HTTPS and SSL certificates. For more information, check out the extensive certbot documentation and community forums. Did let’s encrypt successfully install the free SSL certificate? Why install SSL certificates? Please share your experience in the comments below.