SSL Certificates Explained: Why HTTPS Is Non-Negotiable in 2020

System AdminMarch 10, 2020508 views7 min read

The Basics: What SSL and TLS Actually Do

Every time a visitor loads your website, data travels between their browser and your server. Without encryption, that data — login credentials, form submissions, session cookies — moves in plain text. Anyone positioned between the two endpoints can read, intercept, or modify it. SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) solve this by encrypting the connection end to end.

In everyday conversation, people still say "SSL" even though TLS has been the actual protocol for years. The important thing is the outcome: when your site serves traffic over HTTPS, the data in transit is encrypted, the server identity is verified through a certificate, and both parties can trust that the communication has not been tampered with.

Why HTTPS Is Baseline, Not Optional

There was a time when HTTPS was reserved for login pages and payment forms. That era ended years ago. Modern browsers flag HTTP-only sites as "Not Secure" in the address bar, and users have learned to notice. Search engines factor HTTPS into ranking signals, meaning unencrypted sites are at a measurable disadvantage in search results.

Beyond search rankings, HTTPS enables HTTP/2 and HTTP/3 — newer protocols that improve page load performance through multiplexing and reduced latency. Without HTTPS, your site cannot take advantage of these improvements. In practical terms, failing to deploy HTTPS means slower pages, lower search visibility, and reduced visitor trust — a combination no business can afford.

Certificate Types: DV, OV, and EV

SSL certificates come in three validation levels, and the differences matter more than most people realize.

Domain Validation (DV)

DV certificates verify that you control the domain. The certificate authority (CA) checks through DNS records or HTTP challenges — no paperwork, no phone calls. Issuance takes minutes. DV certificates are free through services like Let's Encrypt and are perfectly adequate for most websites, blogs, and applications.

DV is the right choice for the vast majority of hosting customers. It encrypts the connection, satisfies browser requirements, and keeps your SEO in good standing. If your site does not handle financial transactions or sensitive corporate data, DV is sufficient.

Organization Validation (OV)

OV certificates add an extra layer: the CA verifies that your organization legally exists. This involves checking business registration documents and sometimes a phone verification. The certificate itself contains your organization name, which can be inspected by visitors who click on the padlock icon.

OV is common for corporate websites, government portals, and any organization that wants to associate its verified legal name with the certificate. The encryption is identical to DV — the difference is the trust signal embedded in the certificate metadata.

Extended Validation (EV)

EV certificates require the most rigorous validation. The CA conducts a thorough check of the organization's legal standing, physical address, and operational existence. Historically, EV certificates triggered a green address bar in browsers, but most modern browsers have removed that visual distinction. The certificate still contains the verified organization details, and some security-conscious users and partners look for it.

EV makes sense for financial institutions, large e-commerce platforms, and organizations where trust and brand integrity are paramount. For most small and mid-size businesses, the practical security benefit over DV or OV is negligible — the encryption strength is the same.

How TLS Works in Plain English

When a browser connects to your server over HTTPS, a handshake occurs. The browser says, "I want to connect securely." The server responds with its certificate. The browser checks whether the certificate was issued by a trusted CA, whether it has expired, and whether the domain name matches. If everything checks out, the two sides negotiate an encryption key using asymmetric cryptography, then switch to faster symmetric encryption for the actual data transfer.

TLS 1.3, the latest version, simplifies this handshake to a single round trip — faster connection setup, fewer attack surfaces, and stronger default cipher suites. If your server still negotiates TLS 1.0 or 1.1, you are running outdated protocols that browsers are actively deprecating. Ensure your hosting configuration supports TLS 1.2 at minimum, and ideally TLS 1.3.

Deploying HTTPS: Step by Step

Getting HTTPS running on your site involves more than installing a certificate. Here is the full process, in the order that matters.

1. Obtain the Certificate

If you are using Let's Encrypt, tools like Certbot automate the entire process. For OV or EV certificates, you will purchase through a CA and complete the validation process before downloading your certificate files. Either way, you end up with a certificate file, a private key, and sometimes an intermediate chain file.

2. Install and Configure on the Server

The certificate and key get installed in your web server configuration — Nginx, Apache, or whatever reverse proxy you use. Configure the server to listen on port 443, point it to your certificate and key files, and specify the TLS protocols and cipher suites you want to support. Disable TLS 1.0, TLS 1.1, and weak ciphers. Prefer forward secrecy cipher suites.

3. Redirect HTTP to HTTPS

Set up a permanent 301 redirect from all HTTP URLs to their HTTPS equivalents. This ensures that visitors who type your domain without "https://" or follow old HTTP links still land on the encrypted version. Without this redirect, you may end up serving the same content on both protocols, which creates duplicate content issues and dilutes the security benefit.

4. Fix Mixed Content

Mixed content occurs when your HTTPS page loads resources — images, scripts, stylesheets, fonts — over plain HTTP. Browsers block or warn about these requests, which can break functionality and trigger "Not Secure" warnings even on HTTPS pages. Audit your site for hardcoded HTTP URLs and update them to HTTPS or use protocol-relative references. Content management systems often have plugins or settings that handle this automatically.

5. Enable HSTS

HTTP Strict Transport Security (HSTS) tells browsers to always connect to your site over HTTPS, even if the user types an HTTP URL. Once a browser receives the HSTS header, it will refuse to make insecure connections for the duration specified in the header. Start with a short max-age (a few hours) to test, then increase it to a year or more once you are confident that HTTPS is working correctly across your entire site.

HSTS eliminates the brief window where a browser might first connect over HTTP before being redirected to HTTPS — a window that attackers can exploit through SSL stripping attacks.

Automated Renewals: Do Not Skip This

Let's Encrypt certificates expire every 90 days, and even paid certificates have finite lifetimes. Certificate expiration is one of the most common causes of unexpected downtime. The fix is simple: automate renewals. Certbot and similar tools support cron-based or systemd timer-based automated renewal. After renewal, the web server needs to reload the new certificate — make sure your automation handles that step as well.

Set up monitoring that alerts you at least 14 days before a certificate expires. Even with automation, things occasionally fail — DNS changes, permission issues, rate limiting. A monitoring check gives you time to fix problems before visitors see a browser warning.

Common Mistakes to Avoid

  • Forgetting the www subdomain: If your site is accessible at both example.com and www.example.com, your certificate must cover both. Use a wildcard certificate (*.example.com) or a certificate with Subject Alternative Names (SANs) for both.
  • Incomplete certificate chains: Your server must send the full chain — your certificate plus any intermediate certificates. Missing intermediates cause trust failures on some browsers and devices, even though the certificate itself is valid.
  • Not testing after deployment: Use tools like SSL Labs Server Test to verify your configuration. Check the grade, look for weak ciphers, and confirm the certificate chain is complete.
  • Ignoring internal services: If your application communicates with databases, APIs, or microservices over the network, those connections should also be encrypted. HTTPS on the front end is not enough if backend traffic travels in plain text.

The SEO and Trust Connection

HTTPS is a confirmed ranking signal. While it is a lightweight one compared to content quality and backlinks, it is also the easiest to address. There is no legitimate reason to leave it off the table. Beyond rankings, HTTPS affects user behavior. Studies consistently show that visitors are more likely to engage with, purchase from, and return to sites that display a padlock icon and load without security warnings.

For e-commerce specifically, HTTPS is often a requirement for payment gateway integration. Payment processors and card networks mandate encrypted connections for any page that handles card data. Failing to comply is not just a security risk — it is a compliance violation that can result in fines and loss of processing privileges.

Wrapping Up

HTTPS is the minimum baseline for any site that wants to be taken seriously by visitors, search engines, and payment processors. The technology is mature, the tools are free or affordable, and the deployment process is well-documented. There is no performance penalty — in fact, enabling HTTPS unlocks faster protocols and better browser features.

If your site is not yet on HTTPS, fix that today. If it is, verify that your configuration is solid: TLS 1.2 or 1.3, no weak ciphers, HSTS enabled, mixed content resolved, and renewals automated. Security is not a one-time task; it is an ongoing discipline. Start with the basics, and build from there.

DevOpsMySQLLinux