Posts

Showing posts with the label Certbot

Certbot obtain / renew manual (letsencrypt - wildcard)

Image
If you’d like to obtain a certificate running  certbot  on a machine other than your target webserver or perform the steps for domain validation yourself, you can use the manual plugin. While hidden from the UI, you can use the plugin to obtain a certificate by specifying  certonly  and  --manual  on the command line. This requires you to copy and paste commands into another terminal session, which may be on a different computer. To manually renew a certificate using  --manual  without hooks, repeat the same  certbot --manual  command you used to create the certificate originally. As this will require you to copy and paste new HTTP files or DNS TXT records, the command cannot be automated with a cron job. The manual plugin can use either the  http  or the  dns  challenge. You can use the  --preferred-challenges  option to choose the challenge of your preference. I prefer to use  dns , so it would look l...

Installing the Certbot Let’s Encrypt Client for NGINX on Amazon Linux 2

Image
Installing the Certbot Let’s Encrypt Client The certbot package is not available through the package manager by default. You will need to enable the  EPEL  repository to install Certbot. sudo yum install epel-release sudo yum install certbot-nginx Set Up NGINX certbot  can automatically configure  NGINX  for SSL/TLS. It looks for and modifies the server block in your  NGINX  configuration that contains a server_name directive with the domain name you’re requesting a certificate for. In our example, the domain is  www.mydomain.com . Assuming you’re starting with a fresh NGINX install, use a text editor to create a file in the  /etc/nginx/conf.d  directory named  domain_name.conf  (so in our example, www.mydomain.com.conf). Specify your domain name (and variants, if any) with the  server_name  directive: server { listen 80 default_server; listen [::]:80 default_server; root /var/www/html; server_name myd...