Install Apache TLS

Step-by-Step Guide to Install Apache with TLS (SSL/TLS Encryption)

Step 1: Install Apache Web Server

If you haven’t already installed Apache, you can do so using your system’s package manager.

For Ubuntu/Debian:

sudo apt update
sudo apt install apache2

For CentOS/RHEL:

sudo yum install httpd

Step 2: Install OpenSSL

TLS/SSL encryption requires OpenSSL for certificate generation and secure communication.

For Ubuntu/Debian:

sudo apt install openssl

For CentOS/RHEL:

sudo yum install openssl

Step 3: Enable the SSL Module in Apache

To enable SSL in Apache, you need to enable the mod_ssl module.

For Ubuntu/Debian:

sudo a2enmod ssl

For CentOS/RHEL, SSL is typically included by default, so you don’t need to enable the module manually.

Step 4: Create SSL Directory (If Needed)

Create a directory to store your SSL certificates and private keys.

sudo mkdir /etc/ssl/private
sudo mkdir /etc/ssl/certs

Step 5: Generate SSL Certificate and Private Key

You can either use a self-signed certificate for testing or obtain a certificate from a Certificate Authority (CA) for production.

For a Self-Signed Certificate:

  1. Generate a private key:

sudo openssl genpkey -algorithm RSA -out /etc/ssl/private/apache.key -aes256

  1. Generate a self-signed certificate:

sudo openssl req -new -x509 -key /etc/ssl/private/apache.key -out /etc/ssl/certs/apache.crt -days 365

During this process, you’ll be asked to provide details such as the Common Name (CN), which should be your domain name (e.g., example.com).

For a Certificate from a CA:

  1. Generate a CSR (Certificate Signing Request):

sudo openssl req -new -key /etc/ssl/private/apache.key -out /etc/ssl/certs/apache.csr

  1. Submit the CSR to a Certificate Authority (CA) to get the SSL certificate. The CA will send you the certificate file (e.g., apache.crt) and CA bundle.

Step 6: Configure Apache to Use SSL

Next, you need to configure Apache to use SSL/TLS. This involves editing the Apache configuration files.

  1. Edit the SSL configuration file (typically located in /etc/apache2/sites-available/default-ssl.conf for Ubuntu/Debian or /etc/httpd/conf.d/ssl.conf for CentOS/RHEL):

For Ubuntu/Debian:

sudo nano /etc/apache2/sites-available/default-ssl.conf

For CentOS/RHEL:

sudo nano /etc/httpd/conf.d/ssl.conf
  1. In the configuration file, specify the path to your SSL certificate and key files:
SSLEngine on
SSLCertificateFile /etc/ssl/certs/apache.crt
SSLCertificateKeyFile /etc/ssl/private/apache.

keyIf you’re using a CA-signed certificate, you may also need to specify the CA bundle:

SSLCertificateChainFile /etc/ssl/certs/ca-bundle.crt
  1. Save and exit the file.

Step 7: Enable SSL Site (Ubuntu/Debian Only)

If you’re on Ubuntu/Debian, enable the SSL site configuration by running:

sudo a2ensite default-ssl.conf

Step 8: Restart Apache to Apply Changes

Restart Apache to apply the SSL configuration changes:

For Ubuntu/Debian:

sudo systemctl restart apache2

For CentOS/RHEL:

sudo systemctl restart httpd

Step 9: Test Your SSL Installation

To verify that SSL/TLS is working correctly, navigate to your website using https:// (e.g., https://yourdomain.com). Your website should load securely with a padlock symbol in the browser’s address bar.

You can also use the SSL Labs’ SSL Test tool to ensure your server is properly configured and has a strong security rating:
https://www.ssllabs.com/ssltest/

Step 10: Enforce HTTPS (Optional but Recommended)

To ensure that all traffic is encrypted, you can redirect HTTP traffic to HTTPS. Add the following rule to your Apache configuration:

  1. Open the Apache configuration file for your site (e.g., /etc/apache2/sites-available/000-default.conf for Ubuntu/Debian or /etc/httpd/conf.d/vhost.conf for CentOS/RHEL).
  2. Add the following redirect rule within the <VirtualHost *:80> section:
<VirtualHost *:80>  
    ServerName yourdomain.com    
    Redirect permanent / https://yourdomain.com/
</VirtualHost>
  1. Save and restart Apache to apply the changes.