After you have created a DigitalOcean account and have setup your payment method. This will give a brief overview of some important items you should look at.
Network settings for DigitalOcean can be found under Networking menu option. This will provide a brief overview of some the Networking options.
To get to the Settings in your DigitalOcean account, you click on the top right icon to the right of the Create Droplet button. This post will give a brief overview of some of the Settings options.
To monetize your YouTube channel you will need to have an AdSense account setup through YouTube. This is very easy and straightforward if you don't already have one. However, it can be somewhat tricky if you do have an existing AdSense account that you want to use, either activated through YouTube using another account or just through AdSense.
If you have a wildcard certificate, enabling HTTPS on port 443 for the multiple websites can be a bit tricky.
Modify IIS Metabase Directly (IIS 6)
To enable the edit-while running feature of the metabase by using IIS Manager
- In IIS Manager, right-click the local computer,
To add your certificate to a website through Internet Information Services (IIS), follow the procedures below.
- Open IIS Manager, expand Web Sites, and select your website e.g. www.example.com
- Right-click on the website
To import a certificate provided by your domain register or certificate provider, follow the following procedures with the Certificate Snap-in open in MMC:
- Expand Personal and select Certificates
- Right-click and select All Tasks -> Import…
- Click on Start -> Run… and enter mmc
- Click on File -> Add/Remove Snap-in…
- Click on Add…
- a private key file
- an intermediate certificate from the certificate provider (.crt or .cert) e.g. GoDaddy’s intermediate certificate: gd_bundle-g1-g1.crt
- a certificate
For more detailed information see the sources at the end of this post.
Before You Begin
- Make sure the server has at least 2GB of RAM. If not, add or increase your swap size to meet this requirement, otherwise problems may occur during install as reported here and here.
- Update the server software packages:
Clone and Install Let’s Encrypt
- If is not installed then execute the following command:
- Clone the Let’s Encrypt GitHub repository to :
Generate an SSL Certificate
- Navigate to :
- Run Let’s Encrypt with the parameter. For multiple domains add :
From: Sudo Manual
- Next enter an administrative email address and follow the prompts:
- Agree to the Terms of Service:
- If no problems occur then a similar message will show below:
- The files that will be used in nginx for the certificate are located at . The two files that are need are and .
Generate Strong Diffie-Hellman Group
- To increase security, generate a strong Diffie-Hellman group. To generate a 2048-bit group, use this command:
- This will take a while to generate.
Configure SSL in Nginx
- Edit the nginx configuration that contains your server block. The default one is located at , for the purpose this post we will edit this one:
- Now locate the following lines and comment out or remove them in your server block:
- The following is an example configuration:
OCSP Stapling for Let’s Encrypt Certificate with Nginx
- Determine which of the Let’s Encrypt certificates was used to sign your certificate:
- The output will be similar to the following:
- That last part, , is the name of the Let’s Encrypt certificate that was used to sign the certificate.
- Download the PEM version of this certificate. All of the Let’s Encrypt intermediate certificates are on the Let’s Encrypt site; click on the “PEM” link for the appropriate certificate to get the file you need. Or, from the command line,
- Replace “x3” with a different certificate name if necessary.
- Edit the nginx configuration from before and add:
Apply the Changes
- Test the nginx configuration:
- Reload nginx to put the changes into effect:
Test the SSL Certificate
- Check with the DigiCert SSL Installation Diagnostic Tool at: https://www.digicert.com/help/
- Check with Qualys SSL Labs Report to see how your server configuration scores at: https://www.ssllabs.com/ssltest/analyze.html (should result in a A+ rating, it will show “OCSP stapling: No” here is the explaination of why)
- By command line:
- If OCSP stapling is enabled, in the OCSP Response Data section, it should say the following:
Renewing SSL Certificates
It will show a similar message below, certificates have a 90-day lifespan before they expire: