Skip to the content
  • Solutions
    • Website Security
      • Caching
      • Encryption
      • On premise
    • Deflect Labs
      • Baskerville
      • Investigations
    • eQPress
  • Pricing
    • For business & individuals
    • For non-profits
  • Partners
  • Resources
    • Terms of service
    • Privacy notice
    • Getting Started
  • About
    • News
    • Principles
    • In the media
    • Deflect clients
    • Testimonials
  • Login
  • Contact
  • Sign up
  • en
  • Solutions
    • Website Security
      • Caching
      • Encryption
      • On premise
    • Deflect Labs
      • Baskerville
      • Investigations
    • eQPress
  • Pricing
    • For business & individuals
    • For non-profits
  • Partners
  • Resources
    • Terms of service
    • Privacy notice
    • Getting Started
  • About
    • News
    • Principles
    • In the media
    • Deflect clients
    • Testimonials
  • Login
  • Contact
  • Sign up
  • en

Introduction

1
  • Get Started

Registration & Setup Process

5
  • Step 1 – Register
  • Step 2 – IP and DNS setup
  • Step 3 – Admin Credentials
  • Step 4 – HTTPS/TLS
  • Step 5 – Finalize

Control Panel & Dashboard

18
  • General
    • Contact Deflect Support
    • Two-Factor Authentication
    • My Account
    • Deflect Protected Websites
  • Website Settings
    • Billing Tab
    • Users Tab
    • Settings Tab
    • Security Tab
    • Cache Tab
    • Baskerville Tab
    • HTTP/TLS Tab
    • Hosting Tab
    • DNS Records Tab
    • Stats Tab
  • Report a DDoS Attack
    • Challenging Requests
    • Reporting an Attack
  • HTTPS/TLS support
    • Enable HTTPS connections to your website under Deflect
    • How TLS/HTTPS works on Deflect

eQPress Hosting

16
  • eQPress Limitations
  • Overview of eQPress Hosting
  • Create a website on eQPress
    • How to create an empty WordPress site on eQPress
    • First steps with your eQPress site
  • Migrate your website to eQPress
    • How to migrate your WordPress site
  • Manage your eQPress website
    • Resources for learning WordPress
    • How to make your site temporarily inaccessible
    • eQPress Console: enhancing your WordPress admin panel
  • Secure your eQPress website
    • Antispam recommendations
    • Protecting your WordPress website
    • Removing the WordPress “admin” user
    • Securing your site with HTTPS
  • Troubleshooting
    • You updated your site but still see the old one?
    • Still waiting for DNS to be updated and want to see your site?
    • Your DNS has been updated but you still can’t see your site?
    • When you try to open your website you only see a white screen?
View Categories
  • Home
  • Docs
  • Control Panel & Dashboard
  • HTTPS/TLS support
  • Enable HTTPS connections to your website under Deflect

Enable HTTPS connections to your website under Deflect

2 min read

When someone visits your website by entering a common URL starting with http:// their logins and passwords and other confidential data can be intercepted by undesired third parties. Strongly motivated attackers can even alter visited pages to try injecting malware into your users’ browsers.

Threats like these can be prevented by allowing your readers to access your website through a so-called encrypted tunnel TLS encryption, by using a URL starting with https:// instead of http:// (in many browsers you will see a green padlock next to the address bar when https:// is used). This option must be made available by the administrator of the visited website, and this page explains what you can do.

If you are enabling HTTPS connections for the first time on your website and you don’t have a TLS certificate yet, you have 3 options:

Ask Deflect to do everything for you #

ask_deflect_to_do_everything_for_you

You can ask Deflect to do everything for you: we will generate a public-facing Let’s Encrypt certificate to encrypt connections between your readers and Deflect edges, and an origin certificate to secure connections between Deflect and your website (see option 1 in the public-facing certificate setup guide and option 1 in the guide to the Deflect Dashboard Control Panel).

This option is recommended if you are not familiar with OpenSSL. Both public-edge and edge-origin communications will be encrypted and the edge can validate that it is talking to your server rather than some other server impersonating yours.

Generate your origin certificate and have it signed by Deflect #

gernerate_your_origin_certificate_and_have_it_signed_by_deflect

If you feel comfortable using OpenSSL, Deflect will only generate a public-facing Let’s Encrypt certificate, while you generate your origin certificate and have it signed by Deflect so that connections between edges and origin can be validated and Deflect can be sure that it is talking to your server(see option 1 in the public-facing certificate setup guide and option 1 in the guide to the Deflect Dashboard Control Panel).

This is an advanced option, recommended if you are comfortable using OpenSSL and creating a certificate signing request. You won’t need to share your private key with Deflect, and the edge will still be able to validate your origin certificate.

Generate a self-signed origin certificate #

generate_a_self-signed_origin_certificate

You can also generate a self-signed origin certificate without having it signed by Deflect. Deflect will only generate a public-facing Let’s Encrypt certificate, while connections between Deflect and your website will be encrypted through your own self-signed certificate (see option 1 in the public-facing certificate setup guide.

You can choose this option if you would rather not share your private key with anyone but have no experience with certificate signing requests. All connections will be encrypted, but Deflect will not be able to confirm that the certificate really belongs to you.

If your website already accepts HTTPS connections and you have a TLS certificate that you would like to keep using, you have two options:

Upload a custom TLS certificate bundle #

upload_a_custom_tls_certificate_bundle

Upload a custom TLS certificate bundle – in this case, both connections to Deflect and connections between Deflect and your website will be encrypted through your TLS certificate (see option 2 in the public-facing certificate setup guide.

This option allows you to keep using the certificate you have already generated, but requires you to share your private key with Deflect.

Use a third-party certificate on your origin server #

use_a_third_party_certificate_on_your_origin_server

Ask Deflect to generate a public-facing Let’s Encrypt certificate while you use your third-party certificate as an origin certificate (see option 1 in the public-facing certificate setup guide.

This option allows you to keep using the certificate you have already generated without having to share your private key with anyone.

Updated on August 22, 2025
revised

Is it helpful?

  • Happy
  • Normal
  • Sad
Share This Article :
How TLS/HTTPS works on Deflect
Table of Contents
  • Ask Deflect to do everything for you
  • Generate your origin certificate and have it signed by Deflect
  • Generate a self-signed origin certificate
  • Upload a custom TLS certificate bundle
  • Use a third-party certificate on your origin server

© 2025

Powered by WordPress

To the top ↑ Up ↑