{"id":334,"date":"2021-07-23T12:27:59","date_gmt":"2021-07-23T12:27:59","guid":{"rendered":"https:\/\/ssdsunucum.com\/blog\/guide-to-ssl\/"},"modified":"2021-07-23T12:27:59","modified_gmt":"2021-07-23T12:27:59","slug":"guide-to-ssl","status":"publish","type":"post","link":"https:\/\/ssdsunucum.com\/blog\/guide-to-ssl\/","title":{"rendered":"Guide to SSL"},"content":{"rendered":"<\/p>\n<div class=\"col-md-9\">\n<div class=\"flex-column flex-md-row article-header\">\n<div id=\"versioned-article-header\">\n<p class=\"valid-version-info\"><em>Valid for versions 92 through the latest version<\/em><\/p>\n<\/div>\n<div id=\"version-select-group\" aria-label=\"select versions\">\n<h4>Version:<\/h4>\n<h4>82<\/h4>\n<h4>84<\/h4>\n<h4>86<\/h4>\n<h4>88<\/h4>\n<h4>92<\/h4>\n<\/div><\/div>\n<hr>\n<h2 id=\"overview\">Overview<\/h2>\n<p>SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encrypts information between a visitor\u2019s browser and a server. These protocols protect against electronic eavesdroppers. This also protects sensitive communications (for example, credit card numbers and login information).<\/p>\n<p>Both of these protocols initiate a handshake, during which your server and the user\u2019s computer agree on specific conditions. These conditions include a set of public and private keys. Both computers use these keys to encrypt and decrypt messages transmitted during communication.<\/p>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<p>cPanel &#038; WHM supports Transport Layer Security (TLS) protocol version 1.2 and Transport Layer Security (TLS) protocol version 1.3:<\/p>\n<ul>\n<li>cPanel &#038; WHM only supports TLSv1.2 or newer. The system enables TLSv1.2 by default.<\/li>\n<li>Not all internet browsers or clients will support TLSv1.3, which requires OpenSSL 1.1.1 or higher.<\/li>\n<\/ul><\/div>\n<\/div>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>\n<p>You can set up SSL\/TLS for your server and configure how SSL\/TLS certificates run in cPanel\u2019s <em>SSL\/TLS<\/em> interface (<em>cPanel &gt;&gt; Home &gt;&gt; Security &gt;&gt; SSL\/TLS<\/em>).<\/p>\n<\/li>\n<li>\n<p>cPanel, L.L.C. does <strong>not<\/strong> offer free signed or self-signed hostname certificates for cPanel DNSOnly\u00ae servers.<\/p>\n<\/li>\n<\/ul><\/div>\n<\/div>\n<h2 id=\"ssl-certificates\">SSL certificates<\/h2>\n<p>An SSL certificate is an electronic document that digitally binds a public key to an identity. This helps secure the connection between a web browser and a website. An SSL certificate serves the following functions:<\/p>\n<ul>\n<li>\n<p>Encryption \u2014 Encodes data. This helps to ensure that if someone intercepts the transmission, they cannot understand it.<\/p>\n<\/li>\n<li>\n<p>Identification verification \u2014 This ensures that you connect to the correct server.<\/p>\n<\/li>\n<\/ul>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>SSL certificates review domain names literally. For example, SSL interprets <code>www.example.com<\/code> and <code>example.com<\/code> as two different domains.<\/li>\n<li>The Common Name (CN) entry of an SSL certificate is cosmetic and does <strong>not<\/strong> affect the security of a certificate.<\/li>\n<li>An SSL certificate\u2019s CN does <strong>not<\/strong> need to be the main domain. The certificate covers <em>all<\/em> domains listed in the certificate\u2019s Subject Alternative Name (SAN) field.<\/li>\n<\/ul><\/div>\n<\/div>\n<h4 id=\"ssl-key-security\">SSL key security<\/h4>\n<p>When you generate an SSL certificate, you can select the type of key that your SSL certificate uses. You can also select the type of key the system uses by default when generating SSL certificates:<\/p>\n<ul>\n<li>In WHM, use either WHM\u2019s <em>SSL\/TLS Configuration<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; SSL\/TLS &gt;&gt; SSL\/TLS Configuration<\/em>) or the <em>Default SSL\/TLS Key Type<\/em> setting in WHM\u2019s <em>Tweak Settings<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; Server Configuration &gt;&gt; Tweak Settings<\/em>).\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>This setting <strong>only<\/strong> applies to cPanel users who do <strong>not<\/strong> set a default key type.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<li>In cPanel, use the <em>SSL\/TLS<\/em> interface (<em>cPanel &gt;&gt; Home &gt;&gt; Security &gt;&gt; SSL\/TLS<\/em>).<\/li>\n<\/ul>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<p>When selecting a new default key type, the system performs an AutoSSL run. This updates <strong>all<\/strong> installed AutoSSL-issued certificates to use the new key type.<\/p>\n<\/p><\/div>\n<\/div>\n<h3 id=\"certificate-types\">Certificate types<\/h3>\n<p>When you work with SSL, you may encounter the following types of SSL certificates:<\/p>\n<ul>\n<li>\n<p><strong>Single-domain<\/strong> \u2014 This certificate type secures a single domain or subdomain.<\/p>\n<\/li>\n<li>\n<p><strong>Multi-domain<\/strong> \u2014 This certificate type secures many domains with one certificate. It is also called a Unified Communications\/Subject Alternate Name (UC\/SAN) certificate.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>You <strong>must<\/strong> reissue a multi-domain certificates each time you add a new hostname.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<li>\n<p><strong>Self-signed<\/strong> \u2014 This certificate type does <strong>not<\/strong> verify the identity of the server and does <strong>not<\/strong> require a CA. These certificates are <strong>not<\/strong> secure. Visitors\u2019 browsers will display a warning when they access the site. You can create a self-signed SSL certificate in WHM\u2019s <em>Generate an SSL Certificate and Signing Request<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; SSL\/TLS &gt;&gt; Generate an SSL Certificate and Signing Request<\/em>).<\/p>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<p>We <strong>strongly<\/strong> recommend using a valid <strong>signed<\/strong> certificate if your website handles sensitive data.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<li>\n<p><strong>Shared SSL<\/strong> \u2014 This certificate type allows you to secure multiple domains with the same SSL certificate.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>As of cPanel &#038; WHM version 76, we do <strong>not<\/strong> support this type of certificate.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<li>\n<p><strong>Wildcard<\/strong> \u2014 Any type of certificate that contains a wildcard (<code>*<\/code>) domain. You can secure a domain\u2019s subdomains with a single certificate if they share an IP address. For example, you can use a wildcard for the <code>*.example.com<\/code> domain to also secure the <code>mail.example.com<\/code> and <code>www.example.com<\/code> subdomains. However, this will <strong>not<\/strong> secure the to <code>example.com<\/code> domain.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>\n<p>You can apply a wildcard certificate to services in WHM\u2019s <em>Manage Service SSL Certificates<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; Service Configuration &gt;&gt; Manage Service SSL Certificates<\/em>).<\/p>\n<\/li>\n<li>\n<p>The <code>root<\/code> user may install a wildcard certificate on a collection of subdomains for a single <code>root<\/code> domain on multiple IP addresses. If this configuration uses multiple IP addresses, a user on the server <strong>cannot<\/strong> own the <code>root<\/code> domain.<\/p>\n<\/li>\n<\/ul><\/div>\n<\/div>\n<\/li>\n<\/ul>\n<h3 id=\"sni-support\">SNI support<\/h3>\n<p>Server Name Indication (SNI) support allows you to host multiple SSL certificates for different domains on the same IP address. At the beginning of the handshake process, SNI indicates the hostname to which the client connects. Users on shared servers that support SNI can install their own certificates without a dedicated IP address.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>cPanel &#038; WHM servers do <strong>not<\/strong> support SNI for the FTP service.<\/p>\n<\/p><\/div>\n<\/div>\n<h2 id=\"certificate-authorities\">Certificate authorities<\/h2>\n<p>Your Certificate Authority (CA) is the trusted third-party entity that issues your SSL certificates.<\/p>\n<h3 id=\"ca-bundle-files\">CA bundle files<\/h3>\n<p>Generally, when you purchase an SSL certificate, the CA will provide you a CA bundle file. Some providers will send you the bundle file as a <code>.cab<\/code> or <code>.zip<\/code> file, others provide the files individually, and some will provide you a URL to download the bundle file.<\/p>\n<p>A bundle file will contain the following details about the SSL certificate:<\/p>\n<ul>\n<li>\n<p>The CA that issued the certificate.<\/p>\n<\/li>\n<li>\n<p>Any of the CA\u2019s certificates, root or intermediate.<\/p>\n<\/li>\n<li>\n<p>The chain of trust for the issuer.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>A CA can vouch for other CAs, which results in a chain of trust. For a CA to sell certificates, another CA must vouch for them.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<li>\n<p>Certificate Revocation Lists (CRLs).<\/p>\n<\/li>\n<\/ul>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>\n<p>The order of files in a bundle is important. If the CA sends individual files, we recommend that you ask them to pack them into a bundle file for you.<\/p>\n<\/li>\n<li>\n<p>Bundle files for EV (Extended Validated) certificates may contain more files than certificates than OV (Organization Validated) and DV (Domain Validated) certificates.<\/p>\n<\/li>\n<\/ul><\/div>\n<\/div>\n<p>Browsers include a list of trusted CAs, and they use the list to determine whether to trust a specific CA.<\/p>\n<p>You can locate a domain\u2019s CA bundle with either of the following UAPI functions:<\/p>\n<ul>\n<li>\n<p><code>SSL::get_cabundle<\/code><\/p>\n<\/li>\n<li>\n<p><code>SSL::fetch_key_and_cabundle_for_certificate<\/code><\/p>\n<\/li>\n<\/ul>\n<p>You can install a CA bundle in either of the following interfaces:<\/p>\n<ul>\n<li>\n<p>cPanel\u2019s <em>Manage SSL Sites<\/em> interface (<em>cPanel &gt;&gt; Home &gt;&gt; Security &gt;&gt; SSL\/TLS &gt;&gt; Manage SSL Sites<\/em>).<\/p>\n<\/li>\n<li>\n<p>WHM\u2019s <em>Install an SSL Certificate on a Domain<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; SSL\/TLS &gt;&gt; Install an SSL Certificate on a Domain<\/em>).<\/p>\n<\/li>\n<\/ul>\n<p>You can also use the UAPI <code>SSL::install_ssl<\/code> function to install a CA bundle.<\/p>\n<h3 id=\"caa-records\">CAA records<\/h3>\n<p>A Certification Authority Authorization (CAA) record specifies which CAs may issue certificates for a domain. If no CAA records exist for a domain, all CAs can issue certificates for that domain. You can manage CAA records through WHM\u2019s <em>DNS Zone Manager<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; DNS Functions &gt;&gt; DNS Zone Manager<\/em>) or through cPanel\u2019s <em>Zone Editor<\/em> interface (<em>cPanel &gt;&gt; Home &gt;&gt; Domains &gt;&gt; Zone Editor<\/em>).<\/p>\n<p>If conflicting CAA records already exist, you <strong>must<\/strong> either remove the current CAA records or add one for the desired CAA. For example, a CAA record for Sectigo would resemble the following example, where <code>example.com<\/code> represents the domain name:<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-BASH\" data-lang=\"BASH\">example.com.    <span style=\"color:#ae81ff\">86400<\/span>   IN  CAA <span style=\"color:#ae81ff\">0<\/span> issue <span style=\"color:#e6db74\">\"sectigo.com\"<\/span><\/code><\/pre>\n<\/div>\n<p>Similarly, a CAA record for Let\u2019s Encrypt would resemble the following example, where <code>example.com<\/code> represents the domain name:<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-BASH\" data-lang=\"BASH\">example.com.    <span style=\"color:#ae81ff\">86400<\/span>   IN  CAA <span style=\"color:#ae81ff\">0<\/span> issue <span style=\"color:#e6db74\">\"letsencrypt.com\"<\/span><\/code><\/pre>\n<\/div>\n<h2 id=\"autossl\">AutoSSL<\/h2>\n<p>AutoSSL secures multiple domains with the assumption that all of the domains resolve to the same virtual host. A cPanel-issued AutoSSL certificate expires after 90 days. However, AutoSSL attempts to automatically replace that certificate before it expires.<\/p>\n<p>If your hosting provider has enabled notifications for AutoSSL, the system will send you an email when it generates or renews an AutoSSL certificate for a domain.<\/p>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>\n<p>You can use the cPanel (powered by Sectigo) provider to secure up to 1,000 domains per certificate.<\/p>\n<\/li>\n<li>\n<p>AutoSSL does <strong>not<\/strong> issue certificates for websites on suspended accounts. You <strong>must<\/strong> first activate the account in order for AutoSSL to issue a certificate.<\/p>\n<\/li>\n<li>\n<p>AutoSSL adds service subdomains to the SSL certificate using a sort algorithm. For more information about service subdomains, read our Service and Proxy Subdomains documentation.<\/p>\n<\/li>\n<\/ul><\/div>\n<\/div>\n<h3 id=\"autossl-sorting\">AutoSSL sorting<\/h3>\n<p>AutoSSL uses a sort algorithm to establish which domains to add to the certificate first. This sort order ensures that the system adds the domains that customers will most likely visit to the certificate first. For example, customers most likely intend to navigate to <code>example.com<\/code> versus <code>www.subdomain.example.com<\/code>.<\/p>\n<p>The default sort algorithm prioritizes domains in the following order:<\/p>\n<ol>\n<li>\n<p>Any fully-qualified domain names (FQDNs) that the virtual host\u2019s current SSL certificate secures.<\/p>\n<\/li>\n<li>\n<p>The primary domain on the cPanel account and its <code>ipv6<\/code>, <code>www.<\/code> and <code>mail.<\/code> subdomains.<\/p>\n<\/li>\n<li>\n<p>Each addon domain and its <code>www.<\/code> and <code>mail.<\/code> subdomains. For example, the <code>example<\/code> cPanel user (whose primary domain is <code>example.com<\/code>), creates the <code>foo.com<\/code> addon domain. This addon domain, like all cPanel addon domains, exists on a separate virtual host with a subdomain. In this case, the system prioritizes <code>foo.com<\/code> over <code>foo.example.com<\/code>.<\/p>\n<\/li>\n<li>\n<p>Domains with fewer dots. For example, AutoSSL would prioritize <code>foo.com<\/code> over of <code>www.foo.com<\/code>.<\/p>\n<\/li>\n<li>\n<p>The <code>www<\/code>, <code>mail<\/code>, <code>whm<\/code>, <code>webmail<\/code>, <code>cpanel<\/code>, <code>autodiscover<\/code>, and <code>webdisk<\/code> subdomains.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>AutoSSL only adds the <code>whm<\/code> service subdomain to the SSL certificate for reseller accounts.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<li>\n<p>Shorter domains.<\/p>\n<\/li>\n<\/ol>\n<h3 id=\"autossl-providers\">AutoSSL providers<\/h3>\n<h4 id=\"the-cpanel-powered-by-sectigo-provider\">The cPanel (powered by Sectigo) provider<\/h4>\n<p>By default, cPanel &#038; WHM uses the cPanel (powered by Sectigo) provider. It is free and comes with your cPanel &#038; WHM license.<\/p>\n<h4 id=\"the-let-s-encrypt-plugin\">The Let\u2019s Encrypt plugin<\/h4>\n<p>You can install the Let\u2019s Encrypt\u2122 AutoSSL plugin. This lets you select Let\u2019s Encrypt as a provider. For more information about the plugin, read our Let\u2019s Encrypt Plugin documentation.<\/p>\n<p>The Let\u2019s Encrypt provider has the following limitations:<\/p>\n<ul>\n<li>\n<p>A rate limit of <strong>300 certificate orders every three hours<\/strong>.<\/p>\n<\/li>\n<li>\n<p>A <strong>weekly<\/strong> limit of 50 registered domains.<\/p>\n<\/li>\n<li>\n<p>A <strong>maximum<\/strong> of 100 subdomains per certificate.<\/p>\n<\/li>\n<li>\n<p>Limits the certificates it issues to a specific set of domains to <strong>five certificates per week<\/strong>. After this, Let\u2019s Encrypt blocks any further certificates for that set of domains.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<p>To work around this rate limit, create an alias to a domain in the virtual host list (website). Let\u2019s Encrypt will interpret the virtual host as a new set of domains.<\/p>\n<\/p><\/div>\n<\/div>\n<\/li>\n<\/ul>\n<p>For more information about Let\u2019s Encrypt\u2019s rate limits, read their rate limit documentation.<\/p>\n<h3 id=\"domain-and-rate-limits\">Domain and rate limits<\/h3>\n<p>The AutoSSL feature includes the following limitations and conditions:<\/p>\n<ul>\n<li>\n<p>A domain\u2019s DNS zone contains CAA records. These CAA records restrict which CAs may issue certificates for that domain. If a CAA record for another provider already exists, you can remove that CAA record or add one for the desired CA. If no CAA records exist for a domain, all CAs can issue certificates for that domain.<\/p>\n<ul>\n<li>Your server\u2019s DNS zone can have more than one CAA record to receive certificates from more than one CA.<\/li>\n<\/ul>\n<\/li>\n<li>\n<p>Each AutoSSL provider may use a specific domain rate limit:<\/p>\n<ul>\n<li>\n<p>Certificates that cPanel, L.L.C. provides through AutoSSL can secure a <strong>maximum<\/strong> of 1,000 domains per certificate (Apache virtual host). The following demonstrates these limitations for the cPanel AutoSSL provider:<\/p>\n<ul>\n<li>Virtual host with 1,000 domains \u2014 AutoSSL secures every domain on the virtual host.<\/li>\n<li>Virtual host with 1,002 domains \u2014 AutoSSL can <strong>only<\/strong> secure up to 1,000 of the virtual host\u2019s domains. AutoSSL chooses which domains to secure by sorting those domains which pass Domain Control Validation (DCV) and taking the first 1,000.<\/li>\n<\/ul>\n<\/li>\n<li>\n<p>Certificates that Let\u2019s Encrypt provides can secure a maximum of <strong>100 domains every three hours<\/strong>.<\/p>\n<\/li>\n<li>\n<p>Aliases count <strong>three times<\/strong> towards each certificate\u2019s domains limit. When you create an alias domain, the system adds the following aliases to the original virtual host (where <code>aliasdomain.com<\/code> represents the alias domain):<\/p>\n<ul>\n<li><code>aliasdomain.com<\/code><\/li>\n<li><code>www.aliasdomain.com<\/code><\/li>\n<li><code>mail.aliasdomain.com<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<p>AutoSSL <strong>only<\/strong> includes domains and subdomains that pass a DCV test. This DCV proves ownership of the domain.<\/p>\n<\/li>\n<li>\n<p>AutoSSL includes corresponding <code>www.<\/code> domains for each domain and subdomain in the certificate, and those <code>www.<\/code> domains count towards any domain or rate limits. For example, for the <code>example.com<\/code> domain, AutoSSL automatically includes <code>www.example.com<\/code> in the certificate. If the corresponding <code>www.<\/code> domain does <strong>not<\/strong> pass a DCV test, AutoSSL will <strong>not<\/strong> attempt to secure that <code>www.<\/code> domain.<\/p>\n<ul>\n<li>This method affects Let\u2019s Encrypt\u2019s limit of 50 certificates per week that may contain a domain or its subdomains.<\/li>\n<\/ul>\n<\/li>\n<li>\n<p>The default cPanel AutoSSL provider does <strong>not<\/strong> secure wildcard domains. However, the Let\u2019s Encrypt provider will secure wildcard domains.<\/p>\n<\/li>\n<li>\n<p>Each AutoSSL provider may wait for a specific amount of time to replace an AutoSSL-provided certificate before it expires. For example:<\/p>\n<ul>\n<li>\n<p>AutoSSL attempts to renew certificates that cPanel, L.L.C. provides when they expire within 15 days.<\/p>\n<\/li>\n<li>\n<p>AutoSSL attempts to renew certificates that Let\u2019s Encrypt provides when they expire within 29 days.<\/p>\n<\/li>\n<li>\n<p>Due to rate limits, AutoSSL prioritizes new certificates over the renewal of existing certificates.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<p>AutoSSL will <strong>not<\/strong> attempt to replace certificates that it did not issue. You can override this behavior if you enable the <em>Allow AutoSSL to replace invalid or expiring non-AutoSSL certificates<\/em> setting in WHM\u2019s <em>Manage AutoSSL<\/em> interface (<em>WHM &gt;&gt; Home &gt;&gt; SSL\/TLS &gt;&gt; Manage AutoSSL<\/em>).<\/p>\n<\/li>\n<li>\n<p>AutoSSL replaces certificates with overly-weak security settings. For example, an RSA modulus of 2048-bit or less.<\/p>\n<\/li>\n<li>\n<p>A virtual host may contain more than the provider\u2019s limit of domain names per certificate. AutoSSL uses a sort algorithm to determine the priority of domains to secure. For more information, read the AutoSSL sorting section above.<\/p>\n<\/li>\n<\/ul>\n<h3 id=\"how-to-manually-renew-autossl-certificates\">How to Manually Renew AutoSSL Certificates<\/h3>\n<p>AutoSSL provides and renews SSL certificates. AutoSSL attempts to renew certificates that cPanel, L.L.C. provides when they expire within 15 days. AutoSSL attempts to renew certificates that Let\u2019s Encrypt provides when they expire within 29 days. You can also manually renew certificates prior to the next automated run.<\/p>\n<h4 id=\"to-manually-renew-a-certificate-for-a-single-cpanel-user\">To manually renew a certificate for a single cPanel user:<\/h4>\n<ol>\n<li>Log in to cPanel as the user.<\/li>\n<li>Navigate to cPanel\u2019s <em>SSL\/TLS Status<\/em> inferface (<em>cPanel &gt;&gt; Security &gt;&gt; SSL\/TLS Status<\/em>).<\/li>\n<li>Select <em>Run AutoSSL<\/em>.<\/li>\n<\/ol>\n<h4 id=\"to-manually-renew-a-certificate-before-revocation\">To manually renew a certificate before revocation:<\/h4>\n<ol>\n<li>Log in to cPanel as the user.<\/li>\n<li>Navigate to cPanel\u2019s <em>Manage SSL Sites<\/em> interface (<em>cPanel &gt;&gt; Security &gt;&gt; SSL\/TLS &gt;&gt; Manage SSL Sites<\/em>).<\/li>\n<li>Delete the affected certificate.<\/li>\n<li>Navigate to cPanel\u2019s <em>SSL\/TLS Status<\/em> inferface (<em>cPanel &gt;&gt; Security &gt;&gt; SSL\/TLS Status<\/em>).<\/li>\n<li>Select <em>Run AutoSSL<\/em>.<\/li>\n<\/ol><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Valid for versions 92 through the latest version Version: 82 84 86 88 92 Overview SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encrypts information between a visitor\u2019s browser and a server. These protocols protect against electronic eavesdroppers. This also protects sensitive communications (for example, credit card numbers and login information). Both of these protocols initiate a &hellip;<\/p>\n","protected":false},"author":1,"featured_media":335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/334"}],"collection":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":0,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media\/335"}],"wp:attachment":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}