If you’ve followed the steps we laid out in our initial feature, you’ve got a safe Nginx server all set up and working. It’s serving your static pages without any issue. We don’t yet have a database, PHP, or anything running on it, but we are ready to take the next step: equipping your Web server with SSL/TLS so that you have the option of serving files via HTTPS.
Using HTTPS doesn’t just mean that your traffic is encrypted—encryption is only half of the story and it’s useless without authentication. What good is it to encrypt something between two parties if you can’t be sure of the identity of the person to whom you’re talking? Consequently, being able to serve HTTPS traffic means you must posses a cryptographic certificate attesting to your identity. Acquiring such a certificate requires you prove your identity to one of many Certificate Authorities, or CAs.
This has been made to sound a lot scarier than it really is, because there is money to be made in being a gatekeeper of authentication. Most of the well-known CAs charge tremendous amounts of money for even the simplest identity validation. If you’re a business engaging in e-commerce, it might make sense to pay thousands of dollars for an extended validation certificate, but if you’re a human being serving Web pages on a home-built server, that kind of expense is ludicrous—and, fortunately, unnecessary.
A very, very brief primer on SSL/TLS
SSL stands for Secure Sockets Layer, though in actuality SSL is rarely used these days. Instead, it’s been phased out by the more secure Transport Layer Security. However, the “SSL” acronym is still very much in use because of convention, so I’ll be using “SSL/TLS” throughout this article.

Loading comments...