Protecting your web application with Let’s Encrypt
Internet addresses are included at the very beginning of the protocol being used. By default, all web navigation is done using the Hypertext Transfer Protocol (HTTP), which, while foundational, is not considered secure. When an encryption layer between the client and the server is provided, then the communication is done over HTTPS (the S standing for Secure). This encryption layer is provided and validated by a certifying authority, so the certificate must be bought from such one. Hosting providers usually have the option to buy and install one on their servers, but there is also a free and reliable alternative provided by the Let’s Encrypt foundation (https://letsencrypt.org/).
To install a Let’s Encrypt certificate, you need shell access to your server. If not, then you must rely on the service provided by the hosting. The list of certified hosting providers compatible is here: https://certbot.eff.org/hosting_providers...