EdgeSSL
Last updated
Last updated
The Settings > EdgeSSL service menu section furnishes you with the capability to enforce end-to-end encryption for all data transactions between your end-users and your application's web servers. This is achieved through the SSL protocol, which ensures the establishment of a robust and secure HTTPS connection.
Such proactive security measures not only ensure the privacy and integrity of data but also fortify the protection of sensitive user information, such as personal and financial data, assuring a safe and secure online environment.
Let's take an in-depth look at the panes within this section:
Within this section, you'll find the ‘Redirect all visitors to use HTTPS instead of HTTP’ toggle switch, which enables you to ensure that all connections directed to your service are securely processed through the HTTPS protocol.
As a default setting, this option is deactivated. However, it is generally recommended to activate it once you've deployed the EdgeSSL certificate for your custom service domain(s).
You can also turn this option on even without having your dedicated SSL certificate set up, e.g., for testing purposes. But please be aware that in this case, HTTPS connections to your service may not be considered trusted by user agents.
Remember to click Save in the bottom right corner to implement the changes after adjusting this toggle's position.
Please be patient, as it might take up to 30 minutes for this update to propagate fully across all regions and PoPs.
In case you haven't yet configured SSL for your service, you can initiate this process by clicking the Enable SSL button:
For step-by-step instructions on how to complete this process, please refer to the Issue SSL Certificate guide.
Once the SSL certificate is issued and properly deployed, it will be displayed within this section, accompanied by details regarding its parameters and the Edit option for making modifications.
Here, you can find information about:
Auto-renew option state - indicates whether certificate auto-renewal is enabled or disabled.
Domain - the domain name(s) for which the SSL certificate was issued.
Expire date - the date until which the issued certificate remains valid.
Validation Level - the .
The Edit option beneath the details on your SSL certificate allows for making adjustments to the issued certificate.
Upon clicking on it, you’ll access the frame that allows you to review and modify some of the related configurations:
Within this frame, you have the ability to:
Review and manually copy the Validation Token of your deployed certificate (adding this value to your DNS settings as a TXT record is an essential part of the validation process for new or updated SSL certificates):
View the list of Domains for which the certificate was issued, where the domain marked with “1” in the IS COMMON NAME? column defines the main domain name in the hierarchy.
Add Domain if you have modified the list of CNAMEs and need the newly added domain names to be also covered by the current SSL certificate:
For detailed instructions on this task, please refer to the Update SSL Certificate document.
Change the state of the Auto-Renew option (located at the bottom of the frame):
This toggle switch defines the following:
If it is enabled, a new validation token will be automatically generated 3 months prior to the expiration date. You will only need to update it within the corresponding DNS TXT record (except for Organization Validation (OV) certificates, where the system manages the renewal process automatically).
If it is disabled, you will receive a notification when your previously validated SSL certificate is about to expire. In this case, you'll need to go through the steps outlined in the Issue SSL Certificate guide again to manually generate a new token.
Delete the deployed SSL certificate:
When making any changes within this frame (except the certificate deletion), you need to click Save below in order to apply them.
By clicking the binicon next to any of the other domains, you can remove them from the list.