An Introduction to Let's Encrypt

An Introduction to Let's Encrypt


Let’s Encrypt is an open and automated certificate authority that uses the ACME (Automatic Certificate Management Environment ) protocol to provide free TLS/SSL certificates to any compatible client. These certificates can be used to encrypt communication between your web server and your users. There are dozens of clients available, written in various programming languages, and many integrations with popular administrative tools, services, and servers.

The most popular ACME client, Certbot, is now developed by the Electronic Frontier Foundation. In addition to verifying domain ownership and fetching certificates, Certbot can automatically configure TLS/SSL on both Apache and Nginx web servers.

This tutorial will briefly discuss certificate authorities and how Let’s Encrypt works, then review a few popular ACME clients.

What is a Certificate Authority?

Certificate authorities (CAs) are entities that cryptographically sign TLS/SSL certificates to vouch for their authenticity. Browsers and operating systems have a list of trusted CAs that they use to verify site certificates.

Until recently, most CAs were commercial operations that charged money for their verification and signing services. Let’s Encrypt has made this process free for users by completely automating the procedure, and by relying on sponsorship and donations to fund the necessary infrastructure.

For more information on certificates and the different types of certificate authorities, you can read “A Comparison of Let’s Encrypt, Commercial and Private Certificate Authorities, and Self-Signed SSL Certificates.”

Next, we’ll look at how Let’s Encrypt does automated domain verification.

How Let’s Encrypt Works

Let’s Encrypt’s ACME protocol defines how clients communicate with its servers to request certificates, verify domain ownership, and download certificates. It is currently in the process of becoming an official IETF standard.

Let’s Encrypt offers domain-validated certificates, meaning they have to check that the certificate request comes from a person who actually controls the domain. They do this by sending the client a unique token, and then making a web or DNS request to retrieve a key derived from that token.

For example, with the HTTP-based challenge, the client will compute a key from the unique token and an account token, then place the results in a file to be served by the web server. The Let’s Encrypt servers then retrieve the file at http://example.com/.well-known/acme-challenge/token. If the key is correct, the client has proven it can control resources on example.com, and the server will sign and return a certificate.

The ACME protocol defines multiple challenges your client can use to prove domain ownership. The HTTPS challenge is similar to HTTP, except instead of a text file, the client will provision a self-signed certificate with the key included. The DNS challenge looks for the key in a DNS TXT record.

The Certbot Let’s Encrypt Client

Certbot is by far the most popular Let’s Encrypt client. It is included in most major Linux distributions, and includes convenient automatic configuration capabilities for Apache and Nginx. Once installed, fetching a certificate and updating your Apache configuration can be done like so:

  1. sudo certbot --apache -d www.example.com

Certbot will ask a few questions, run the challenge, download certificates, update your Apache config, and reload the server. You should then be able to navigate to https://www.example.com with your web browser. A green lock will appear indicating that the certificate is valid and the connection is encrypted.

Because Let’s Encrypt certificates are only valid for ninety days, it’s important to set up an automated renewal process. The following command will renew all certificates on a machine:

  1. sudo certbot renew

Put the above command in a crontab to run it every day, and certificates will be automatically renewed thirty days before they expire. If a certificate was initially created with the --apache or --nginx options, Certbot will reload the server after a successful renewal.

If you’d like to learn more about cron and crontabs, please refer to the tutorial “How To Use Cron To Automate Tasks.”

Other Clients

Because the ACME protocol is open and well-documented, many alternate clients have been developed. Let’s Encrypt maintains a list of ACME clients on their website. Most of the other clients don’t have the automatic web server configuration features of Certbot, but they have other features that may appeal to you:

  • There is a client written in most every programming language, including shell scripts, Go, and Node.js. This could be important if you’re creating certificates in a constrained environment and would rather not include Python and other Certbot dependencies
  • Some clients can run without root privileges. It’s generally a good idea to run the least amount of privileged code possible
  • Many clients can automate the DNS-based challenge by using your DNS provider’s API to create the appropriate TXT record automatically. The DNS challenge enables some trickier use-cases such as encrypting web servers that are not publicly accessible.
  • Some clients are actually integrated into web servers, reverse proxies, or load balancers, making it extra easy to configure and deploy

Some of the more popular clients are:

  • lego: Written in Go, lego is a one-file binary install, and supports many DNS providers when using the DNS challenge
  • acme.sh: acme.sh is a simple shell script that can run in unprivileged mode, and also interact with 30+ DNS providers
  • Caddy: Caddy is a full web server written in Go with built-in support for Let’s Encrypt.

Many more clients are available, and many other servers and services are automating TLS/SSL setup by integrating Let’s Encrypt support.


We’ve gone over the basics of how Let’s Encrypt works, and discussed some of the client software available. If you’d like more detailed instructions on using Let’s Encrypt with various software, the following tutorials are a good place to start:

Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.

Learn more about our products

About the authors

Still looking for an answer?

Ask a questionSearch for more help

Was this helpful?

This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

Thanks. Is chrome trust to let’s encrypt certificates? They already banned chinese startcom and have some issues with Symantec’s.

And does free certificates affect on seo?


Do you have a working configuration for like if I have 2-3 domains on same server with nginx configuration and I want to install certificate on them at once with single command. Also, renewal should be with single command only.

Thanks Manideep

Try DigitalOcean for free

Click below to sign up and get $200 of credit to try our products over 60 days!

Sign up

Join the Tech Talk
Success! Thank you! Please check your email for further details.

Please complete your information!

Featured on Community

Get our biweekly newsletter

Sign up for Infrastructure as a Newsletter.

Hollie's Hub for Good

Working on improving health and education, reducing inequality, and spurring economic growth? We'd like to help.

Become a contributor

Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.

Welcome to the developer cloud

DigitalOcean makes it simple to launch in the cloud and scale up as you grow — whether you're running one virtual machine or ten thousand.

Learn more
DigitalOcean Cloud Control Panel