🔒 SSL/TLS Enabled

AI API Proxy HTTPS Configuration

Learn how to configure HTTPS, obtain SSL certificates, and implement TLS best practices for secure AI API proxy connections. Protect your data in transit with industry-standard encryption.

TLS 1.3
Auto-Renewal
Free SSL

HTTPS Setup Guide

Obtain SSL Certificate

Get a free SSL certificate from Let's Encrypt using Certbot or configure your existing certificate from a CA.

sudo certbot certonly --standalone -d yourdomain.com

Configure API Gateway

Update your API gateway configuration to use HTTPS with the certificate files.

ssl_certificate: /etc/letsencrypt/live/yourdomain.com/fullchain.pem

Enable TLS 1.3

Configure your server to use only TLS 1.2 and 1.3, disabling legacy protocols.

ssl_protocols: TLSv1.2 TLSv1.3

Set Up Auto-Renewal

Configure automatic certificate renewal to prevent expiration.

sudo certbot renew --dry-run

Test Configuration

Verify your HTTPS setup using SSL Labs or similar tools.

https://www.ssllabs.com/ssltest/analyze.html?d=yourdomain.com

SSL Certificate Types

🔐

Domain Validation (DV)

Basic encryption for personal sites and blogs. Quick issuance in minutes.

  • ✓ Basic encryption
  • ✓ Domain ownership verified
  • ✓ Free options available
  • ✓ Best for testing
🏢

Organization Validation (OV)

Business validation for professional applications. Shows company information.

  • ✓ Organization verified
  • ✓ Higher trust level
  • ✓ Company name in cert
  • ✓ Best for businesses
🏦

Extended Validation (EV)

Highest trust level for financial and enterprise applications.

  • ✓ Rigorous verification
  • ✓ Green address bar
  • ✓ Maximum trust
  • ✓ Best for e-commerce

Nginx Configuration Example

⚙️

HTTPS Configuration for API Gateway

# Nginx HTTPS configuration server { listen 443 ssl http2; server_name api.yourdomain.com; # SSL certificate paths ssl_certificate /etc/letsencrypt/live/api.yourdomain.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/api.yourdomain.com/privkey.pem; # TLS configuration ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers HIGH:!aNULL:!MD5; ssl_prefer_server_ciphers on; # Security headers add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; add_header X-Frame-Options "SAMEORIGIN" always; add_header X-Content-Type-Options "nosniff" always; # Proxy to AI API gateway location / { proxy_pass http://localhost:8000; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; } } # Redirect HTTP to HTTPS server { listen 80; server_name api.yourdomain.com; return 301 https://$server_name$request_uri; }

HTTPS Security Checklist

Enable HSTS

Force HTTPS connections with HTTP Strict Transport Security header.

Use Strong Ciphers

Disable weak ciphers and use modern cryptographic algorithms.

Enable OCSP Stapling

Improve SSL handshake performance with OCSP stapling.

Configure CAA Records

Specify which CAs can issue certificates for your domain.

Monitor Certificate Expiry

Set up alerts to renew certificates before they expire.

Use Certificate Pinning

Pin certificates in mobile apps to prevent MITM attacks.

Partner Resources