Setting up TLS with your own certificates (2024)

This guide describes how to use the Fastly TLS product to upload and deploy your own TLS certificates and private keys using the Fastly web interface.

To serve secure traffic from Fastly using HTTPS (Hypertext Transfer Protocol Secure), a website or application needs to provide clients with a valid TLS certificate signed by a trusted Certification Authority (CA). TLS (Transport Level Security) and its predecessor SSL (Secure Sockets Layer) are the protocols that allow clients to form secure server connections so traffic can be served over HTTPS.

TIP

Fastly offers an API for uploading and managing your keys and certificates used to activate TLS for your domains on Fastly.

Before you begin

Before setting up TLS on your domains, be sure to review the Fastly TLS prerequisites and limitations.

Setting up TLS for a domain

To set up TLS, you'll upload a TLS certificate and the matching private key (used to initially generate the certificate). Then, you'll apply a TLS configuration to the domain and activate TLS on the domain.

  1. First-time set up
  2. Uploading additional certificates

To set up TLS for the first time, complete the following:

  1. Log in to the Fastly web interface and select Security from the navigation sidebar. The Overview page appears displaying an overview of Fastly's security offerings.
  2. Click Manage certificates.
  3. Click Get started.

  4. Click Upload my own private key and certificate to continue.

  5. Drag and drop the key file into the drag and drop area for key files. Alternately, click the browse link to navigate to the file on your system using the file picker. A success message appears along with a visualization of your key.

  6. Drag and drop the certificate file into the drag and drop area for certificate files. Alternately, click the browse link to navigate to the file on your system using the file picker.

  7. Click Continue to move to the final steps of enabling TLS on your domain.

  8. Select the checkbox next to the domain you want to activate.

  9. From the Select a TLS Configuration menu, select the TLS configuration to apply. The configuration defines both the IPs that the certificate will be deployed to and the associated TLS settings that will be applied. The default option is HTTP/3 & TLS v1.3 + 0RTT (t.sni).

  10. Click Activate.

Activating TLS on a domain

Once a valid certificate and private key have been uploaded, all domains that appear as SAN entries will be listed on the Domains page with a status of TLS ready. To serve HTTPS traffic using your certificate, follow the steps below to activate TLS for the domain and point the DNS records to the certificate's location.

  1. Log in to the Fastly web interface.
  2. Go to Security > TLS management > Domains.

  3. Find the card for the domain with the certificates on which you want to activate TLS. Certificates in a disabled state will have the status of Ready to activate.

  4. Click Add TLS activation to the right of the certificate you want to activate.

  5. Select the TLS configuration you want to apply. If the configuration is already activated for a different certificate on the domain, a notice appears. You must click Switch to this certificate to continue.

    Fastly deploys your TLS certificate to the entire Fastly edge network. It may take up to an hour for your certificate to become available throughout the world.

  6. Click View details to view the DNS details for the domain. Use these details to configure your DNS records so that a TLS connection can be established using your certificate.

    • For TLS on an apex domain (e.g., example.com), you'll need to create an A record with your DNS provider.
    • For subdomains and wildcard domains (e.g, www.example.com or *.example.com), you'll need to create a relevant CNAME record.
IMPORTANT

It can take up to 48 hours for new DNS records to propagate across the internet.

Applying a TLS configuration to a domain

TLS configurations are a collection of TLS settings that include the supported versions of TLS and HTTP, along with networking and handshaking options that clients will use. For accounts with more than one TLS configuration, the default configuration has a label in the right corner of the card.

Setting up TLS with your own certificates (1)

TIP

TLS configuration names are editable by clicking the pencil icon next to the name.

To override the default TLS configuration applied to a domain or to migrate a domain to use a different configuration follow these steps.

  1. Log in to the Fastly web interface.
  2. Go to Security > TLS management > Domains.

  3. Find the card for the domain with the certificates on which you want to add additional TLS activations.

  4. Click View details next to the certificate on which you want to add additional activations.

  5. Click Add TLS activation.

  6. Select the TLS configuration you want to apply to the certificate.

    NOTE

    While you may have multiple certificates on a given domain, only one certificate can be active for a given TLS configuration. If the TLS configuration is already in use by another certificate, a Switch to this certificate button appears.

    Once the configuration is selected, the TLS configuration is applied to the domain. Each TLS configuration is active and available at their respective IP addresses and DNS records.

  7. Click View details and use the information to configure your DNS records so that a TLS connection can be established using your certificate.

  8. Confirm the new DNS records have propagated across the internet (this can take up to 48 hours), then delete the old TLS configuration by clicking the trash.

NOTE

For HTTP/1.1, be sure to activate TLS for each of your domains in the web interface. If you upload a certificate with multiple SANs, each domain must have TLS explicitly activated if you want to secure these domains on Fastly.

Exceptions may apply in the case of HTTP/2 if your browser coalesces secure connections and has previously received a TLS certificate from an earlier handshake. In this case, some browsers may reuse an existing secure connection to Fastly if its certificate has a matching SAN entry.

Updating a certificate

Fastly allows you to update a certificate by replacing it with a new one at any time. To help identify certificates that need updating and replacing, the following alerts appear on the certificate cards on the TLS certificates page:

  • Expiring: Indicates a certificate is nearing its expiration date.
  • Expired: Indicates a certificate is past its expiration date.
  • Replace: Indicates a certificate Fastly recommends you update and replace.

Updating certificates when there are no removed domains

To update a TLS certificate by replacing it with one that contains all the domains as the original (either as a superset or a matching list) follow these steps.

  1. Generate a new certificate with your preferred Certification Authority.
  2. Log in to the Fastly web interface.
  3. Go to Security > TLS management > Self-managed certificates.
  4. Find the card for the certificate you’re replacing.
  5. Click the word Replace in the upper right corner of the certificate’s card.
  6. Drag and drop the replacement certificate file into the drag and drop area for certificate files. The certificate you select should be PEM-formatted and the SAN entries of this new certificate must contain all entries in the current certificate (i.e., it must either have an exact matching list or contain a superset). Alternately, click the browse link to navigate to the file on your system using the file picker.
  7. If a new key was generated with the new certificate, drag and drop the key file into the drag and drop area for key files. Alternately, click the browse link to navigate to the file on your system using the file picker.
  8. Below the drag and drop areas, verify that the certificate replacement menu is pre-selected with the certificate you want to replace with your new certificate.
  9. Click Submit.

All domains actively serving TLS traffic on the old certificate will be automatically transitioned to the updated certificate within a matter of minutes. Any new domains will need to be manually activated by following the steps for activating TLS on a domain.

Updating certificates when there have been changes to domains

If you want to update one of your certificates that requires removing domains, you will need to procure a new certificate with the updated list of SAN entries. Follow the steps to upload this certificate as a new certificate.

  1. Upload the new certificate.
  2. Go to Security > TLS management > Domains.
  3. Locate the previously existing domains that have already been activated with the certificate you’re replacing.
  4. Click View details next to the certificate on which you want to add additional activations.
  5. Click the Add TLS activation button.
  6. Select the TLS configuration you want to apply to the certificate. Once the configuration is selected, the TLS configuration is applied to the domain. Each TLS configuration is active and available at their respective IP addresses and DNS records.
  7. Delete the old certificate.

Certificates for newly activated domains can take between 5 minutes to an hour to fully deploy across Fastly’s global network. If the new certificate is not being used to serve TLS traffic within 1 hour, contact support for assistance.

Deactivating TLS and deleting certificates and private keys

Once a domain has TLS activated, you have the option to deactivate TLS via the Deactivate TLS button listed on the TLS domains page. If a domain has multiple certificates, you can elect to deactivate a specific certificate by clicking Add/Edit Activations and clicking the Deactivate button next to any active configurations. If all certificates are deactivated, Fastly will no longer serve TLS traffic on the selected domain and it will become disabled.

To delete a certificate from the Self-managed certificates page, be sure to disable TLS for all domains on that specific certificate. You will also need to delete all certificates before you can delete a matching private key. Private keys can only be deleted if they have no matching TLS certificate.

TIP

Unmatched and unused private keys aren't automatically deleted. To avoid reaching the maximum key limit, be sure to delete any unused keys.

Certificate expirations

Thirty days before any certificate is due to expire, the web interface will display warnings on certificates soon to expire. Fastly will also begin to periodically send automated expiration notification emails to all superusers. If the certificate is not replaced or removed, Fastly will continue to email users on the account until the certificate expires. Once expired, Fastly will no longer send automatic notifications.

Do not use this form to send sensitive information. If you need assistance, contact support. This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Setting up TLS with your own certificates (2024)

FAQs

Does TLS work with self-signed certificate? ›

Self-signed certificates are an easy way to enable SSL/TLS encryption for your websites and services.

How to fix self-signed certificates will cause browser warnings? ›

Browsers will show a warning if you are connecting to a web server which is using a self-signed certificate. You can override this warning by telling your browser to trust this certificate but there is no good way you can get rid of the warning in other people's browser.

What are the problems with self-signed certificates? ›

Not trusted by browsers and users

Self-signed certificates contain private and public keys within the same entity, and they cannot be revoked, thus making it difficult to detect security compromises.

Is it OK to use self-signed certificate? ›

Self-signed TLS/SSL certificates are safe in a testing environment, and you can use them while you are waiting for your certificates to be issued by a public CA. But, using them in a production environment will significantly decrease the traffic to your website or application and lead to a lack of trust from users.

Does SSL TLS accept all certificates? ›

What is SSL TLS accept all certificates? Yes, it implies that it'll acknowledge all (as in, regardless of issuer) SSL certificates, indeed in case they are from an untrusted Certificate Authority (CA). You'll utilize this if you didn't care who your messages were going to but wanted them secure.

Can you do TLS without a certificate? ›

Without an SSL certificate, a website's traffic can't be encrypted with TLS.

How to bypass a self-signed certificate? ›

Google Chrome

When accessing a page with a self-signed certificate, Chrome displays a warning page. To bypass this warning and proceed to the site, users can use one of two methods: Click on the "Advanced" link and then select the "Proceed to [Website Name] (unsafe)" option.

How do I get rid of self-signed certificate error? ›

If your website is still using a self-signed certificate, you will need to replace it with a valid certificate issued by a trusted CA. Purchase and install a signed certificate matched to your domain to resolve the trust issue.

What are examples of self-signed certificates? ›

For example, the Encrypting File System on Microsoft Windows issues a self-signed certificate on behalf of a user account to transparently encrypt and decrypt files on the fly. Another example is a root certificate, which is a form of self-signed certificate.

How do you manage self-signed certificates? ›

You can create a self-signed certificate for a queue manager by using the createcert command on the command line. You can add the public part of a self-signed certificate to a queue manager by using the addcert command on the command line.

Can TLS work without certificates? ›

Yes, most websites that conduct business on the internet require a digital TLS/SSL certificate to encrypt and secure private data that is transmitted. TLS/SSL certificates protect your business' and your customers private information.

Does self-signed certificate encrypt traffic? ›

What is a Self-Signed Certificate? Advantages, Disadvantages & Risks. Authentication and security are the focus of the SSL/TLS protocol. Data communications across open networks can be encrypted with this technology, protecting against alteration and interception by malicious parties.

Does TLS require private key? ›

The SSL/TLS protocol uses a pair of keys – one private, one public – to authenticate, secure and manage secure connections. These keys are a linked pair of text files and are created together as a pair when you create your Certificate Signing Request (CSR).

Top Articles
The challenges of frozen food processing – Yamato Scale
What are Advisory Boards Roles & Responsibilities?
3 Tick Granite Osrs
Antisis City/Antisis City Gym
Golden Abyss - Chapter 5 - Lunar_Angel
Knoxville Tennessee White Pages
Lamb Funeral Home Obituaries Columbus Ga
Craigslist Campers Greenville Sc
Ghosted Imdb Parents Guide
Katmoie
Triumph Speed Twin 2025 e Speed Twin RS, nelle concessionarie da gennaio 2025 - News - Moto.it
50 Meowbahh Fun Facts: Net Worth, Age, Birthday, Face Reveal, YouTube Earnings, Girlfriend, Doxxed, Discord, Fanart, TikTok, Instagram, Etc
Devourer Of Gods Resprite
REVIEW - Empire of Sin
What to do if your rotary tiller won't start – Oleomac
Marion County Wv Tax Maps
Rainfall Map Oklahoma
Committees Of Correspondence | Encyclopedia.com
Tamilyogi Proxy
Morristown Daily Record Obituary
Tripadvisor Napa Restaurants
Masterkyngmash
Best Transmission Service Margate
Puretalkusa.com/Amac
Baja Boats For Sale On Craigslist
C&T Wok Menu - Morrisville, NC Restaurant
Pawn Shop Moline Il
Churchill Downs Racing Entries
Danielle Moodie-Mills Net Worth
Bursar.okstate.edu
Kempsville Recreation Center Pool Schedule
Utexas Baseball Schedule 2023
Wcostream Attack On Titan
Gas Prices In Henderson Kentucky
Teenage Jobs Hiring Immediately
Uhaul Park Merced
The Mad Merchant Wow
Go Smiles Herndon Reviews
Dr. John Mathews Jr., MD – Fairfax, VA | Internal Medicine on Doximity
Florida Lottery Claim Appointment
Santa Clara County prepares for possible ‘tripledemic,’ with mask mandates for health care settings next month
Ghareeb Nawaz Texas Menu
Nimbleaf Evolution
Strange World Showtimes Near Marcus La Crosse Cinema
Egg Inc Wiki
Craigslist Charles Town West Virginia
Minute Clinic Mooresville Nc
Research Tome Neltharus
Solving Quadratics All Methods Worksheet Answers
Bones And All Showtimes Near Emagine Canton
Hcs Smartfind
Predator revo radial owners
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 6008

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.