ScyScan Blog

How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

Why SSL/TLS Matters

Securing your website with HTTPS is no longer optional—it’s essential. SSL/TLS certificates:

  • Encrypt data between users and your server 🔒
  • Boost SEO rankings (Google favors HTTPS sites)
  • Build user trust with browser padlock icons ✅
  • Prevent “Not Secure” warnings in browsers

Prerequisites

Before starting, ensure you have:

  1. Nginx installed on your server
  2. A registered domain name pointing to your server
  3. SSL certificate files (certificate, private key, and CA bundle)

💡 Pro Tip: Get free certificates from Let’s Encrypt or purchase from trusted CAs like DigiCert/Sectigo.

Step-by-Step Configuration

1. Upload Certificate Files

Place your certificate files in a secure directory:

1
2
3
4
sudo mkdir /etc/nginx/ssl
sudo cp your_domain.crt /etc/nginx/ssl/
sudo cp your_domain.key /etc/nginx/ssl/
sudo cp ca_bundle.crt /etc/nginx/ssl/ # If provided

2. Configure Nginx Server Block

Edit your site configuration (/etc/nginx/sites-available/your_site):

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name your-domain.com;

# SSL Certificate Paths
ssl_certificate /etc/nginx/ssl/your_domain.crt;
ssl_certificate_key /etc/nginx/ssl/your_domain.key;

# Enable modern TLS protocols
ssl_protocols TLSv1.2 TLSv1.3;

# Optimize cipher suites
ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256';
ssl_prefer_server_ciphers on;

# Enable OCSP stapling
ssl_stapling on;
ssl_stapling_verify on;

# Cache SSL parameters
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 1d;

# Your existing configuration (root, index, etc)
# ...
}

# Redirect HTTP to HTTPS
server {
listen 80;
listen [::]:80;
server_name your-domain.com;
return 301 https://$host$request_uri;
}

3. Test & Reload Nginx

1
2
sudo nginx -t  # Verify configuration syntax
sudo systemctl reload nginx # Apply changes

Verify Your Configuration

Check your implementation with these tools:

  • ssllabs.com - Comprehensive security analysis (A+ rating target)
  • whynopadlock.com - Troubleshoot mixed-content issues
  • SSL Checker - Certificate chain verification (Recommended)

Troubleshooting Tips

  • Mixed Content Errors: Ensure all resources (images, scripts) load via HTTPS
  • Certificate Chain Issues: Concatenate certificates: cat your_domain.crt ca_bundle.crt > combined.crt
  • Permissions: Set proper key permissions: sudo chmod 600 /etc/nginx/ssl/*.key
  • Firewalls: Confirm port 443 is open: sudo ufw allow 443/tcp

Security Best Practices

  • Renew certificates before expiration (auto-renew with cron jobs)
  • Enable HSTS header: add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
  • Use 2048-bit or stronger private keys
  • Disable TLS 1.0/1.1 for improved security

Conclusion

Implementing SSL in Nginx takes <10 minutes but delivers critical security benefits. With modern browsers flagging HTTP sites as “Not Secure,” HTTPS has become mandatory for professional websites.

📚 Further Reading:
Nginx SSL Termination Docs
Mozilla SSL Configuration Generator