Set up automatic TLS certificates for your Nginx server using Infisical and Certbot. Certbot requests and renews certificates automatically from Infisical’s ACME server.Documentation Index
Fetch the complete documentation index at: https://infisical.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
This guide assumes you have an Application with ACME enrollment configured.
Prerequisites
- An Nginx web server running on Linux with administrative access
- An Application in Infisical with ACME enrollment configured
- Network connectivity from your Nginx server to Infisical
- Port 80 open for HTTP-01 validation
Guide
Get ACME Credentials from Infisical
In your Application, go to the Settings tab and find the Certificate Profiles section. Click Configure on the profile with ACME enrollment, then click Reveal ACME EAB to view the credentials:
| Credential | Purpose |
|---|---|
| ACME Directory URL | The URL Certbot uses to communicate with Infisical |
| EAB Key Identifier (KID) | Identifies your ACME account |
| EAB Secret | Authenticates your ACME client |
Keep your EAB credentials secure. They authenticate your ACME client with Infisical and are unique to each enrollment.
Install Certbot
Install Certbot on the server where Nginx is running by following the official Certbot installation guide.The installation guide provides up-to-date instructions for various Linux distributions and package managers, ensuring you get the most current version and proper Nginx plugin integration.After installation, you can verify that Certbot has been installed correctly by running:
Request Certificate Using Certbot
Run the following command to request a certificate from Infisical:For guidance on each parameter:After updating the server block, you should test and reload Nginx to apply the changes:If
certonly: Instructs Certbot to request a certificate without modifying and reloading your Nginx configuration file(s); this mode is recommended if you prefer to manage your Nginx TLS configuration manually, use automation tools, or integrate certificates into an existing deployment workflow.--nginx: Specifies the Nginx plugin so Certbot can solve the HTTP-01 challenge by creating temporary files served by Nginx.--server: The Infisical ACME directory URL from Step 1. This instructs Certbot to communicate with Infisical’s ACME server instead of Let’s Encrypt.--eab-kid: Your External Account Binding (EAB) Key Identifier from Step 1.--eab-hmac-key: The EAB secret associated with the KID from Step 1.-d: Specifies the domain name for which the certificate is being requested.--email: The contact email for expiration notices and account recovery.--agree-tos: Accepts the ACME server’s Terms of Service.--non-interactive: Runs Certbot without prompting for user input (recommended for automation).
/etc/letsencrypt/live/{domain-name}/.If --certonly is used: Certbot does not modify your Nginx configuration, so you must manually update your Nginx server block to reference the new certificate files and reload the server to apply the changes.Here’s how you can configure your server block:--certonly was not used: Certbot uses Nginx installer mode, which attempts to automatically configure HTTPS by updating your Nginx server block and reloading the server if needed.At this point, your Nginx server should be successfully serving HTTPS using the certificate issued by Infisical.Verify Certificate Installation
After configuring Nginx SSL, verify that your certificate was issued correctly and Nginx is serving it properly.Check that the certificate files were created by Certbot:You should see files like:
cert.pem(your certificate)chain.pem(certificate chain)fullchain.pem(certificate + chain)privkey.pem(private key)
Renew Your Certificate with Certbot
Certbot automatically installs a To test the renewal process, run the following command:This command simulates the full renewal process without modifying your active certificate. If the dry run succeeds, automatic renewal will work as expected.To trigger an actual renewal immediately, run the following command:Note that after a certificate is renewed, Nginx must be reloaded so it can begin using the new certificate. To do this, run the following command:To automate the process of renewing a certificate and reloading Nginx, you can create a simple deploy hook that Certbot will run after every successful renewal.Inside Then make the hook executable:
systemd timer during installation. This timer runs twice per day and checks whether any certificates are due for renewal. Because Certbot stores the ACME server URL and EAB credentials from your initial request, renewal will automatically use the same Infisical ACME configuration—no additional settings are required.Note that Certbot automatically renews certificates when they are within 30 days of expiration; renewal settings can be adjusted in /etc/letsencrypt/renewal/{domain-name}.conf./etc/letsencrypt/renewal-hooks/deploy/reload-nginx.sh, add the following:What’s Next?
Apache with Certbot
Set up ACME for Apache web servers.
Certificate Syncs
Push certificates to cloud destinations.
Alerting
Get notified when certificates are about to expire.
ACME Enrollment
Learn more about ACME enrollment configuration.