How To Redirect HTTP to HTTPS With Certbot


You can get a unfastened TLS/SSL certificates in case you have a server the usage of the Let’s Encrypt CA provider. Let’s Encrypt allows you to use Certbot, a instrument consumer, to protected your HTTP visitors by way of HTTPS, such that even if somebody makes use of http://your-domain, their visitors gets redirected by way of HTTPS. So, how do you employ Certbot to redirect HTTP to HTTPS? Let’s dig in!

Using Certbot to Redirect HTTP to HTTPS

A internet server like Nginx permits HTTP visitors in spite of being configured to encrypt the visitors the usage of the assigned certificates. To protected one of these situation, you must redirect all of the HTTP visitors of your server to tunnel via HTTPS, and that’s conceivable the usage of Certbot.

To use Certbot to redirect visitors, you will have to have a registered area to your server. The area will likely be added when executing the Certbot command to redirect the visitors the usage of a internet server of your selection. Moreover, the DNS information for your server must have a document pointing to the server’s public IP cope with.

First, let’s see set up Certbot on Ubuntu 22.04.

Access your server operating your web site, then be sure you have snapd put in and up to date the usage of the next instructions:

$ sudo snap set up core

$ sudo snap refresh core

Certbot recommends taking out any example of an older model you have been the usage of sooner than putting in Certbot for your server and the usage of the next command:

$ sudo apt take away certbot

Next, set up Certbot as a snap bundle.

$ sudo snap set up –vintage certbot

With Certbot put in, it’s highest to create a symbolic hyperlink to it for speedy get right of entry to and execution.

$ sudo ln -s /snap/bin/certbot /usr/bin/certbot

Certbot is now in a position to be used. However. You will have to first open your internet server configuration record and make sure that the server block for Nginx, which is definitely configured for Certbot to configure SSL mechanically.

Open the Nginx configuration record to your server’s area.

$ sudo nano /and many others/nginx/sites-available/

Add the server block for the area the usage of the next syntax:

server {

server_name <a href=“”>www.your-domain.coma>


Here’s an instance:

Save the configuration record, then test the standing of the configuration record with the next command:

If it returns luck, then reload nginx.

The subsequent step is to configure the firewall to permit HTTPS.

Execute the next command:

$ sudo ufw permit ‘Nginx Full’


At this level, you’ll be able to invoke Certbot to supply an SSL certificates the usage of its more than a few plugins. The excellent information with Certbot is that it handles all of the reconfiguring of your config record for Nginx to redirect HTTP visitors to HTTPS.

There are alternative ways you’ll be able to invoke the Certbot plugin.

You can at once upload the Certbot command adopted by means of your internet server.

Alternatively, you’ll be able to use the -d possibility, then specify the area to your server the usage of the next syntax:

$ sudo certbot –nginx -d -d

Certbot will create the SSL certificates and modify the configurations the place vital. All that’s wanted from you is to substantiate the activates and reload your web site as soon as Certbot is finished.

A safety indicator appearing a padlock will ascertain that your website online’s HTTP visitors is secured.

You can take a look at it by means of getting access to your website online’s area the usage of HTTP as an alternative of HTTPS. You will notice that the relationship is secured as Certbot redirects HTTP to HTTPS.


Certbot gives plugins that facilitate redirecting HTTP to HTTPS by means of producing an SSL certificates and mechanically enhancing the configuration record to your internet server to redirect visitors. This information main points redirect HTTP to HTTPS the usage of Certbot. We’ve lined the whole lot from putting in Certbot to the usage of it to redirect HTTP to HTTPS.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More