Website needs to access internal network server application in HTTPS

Hello all,

We need an advice about the structure to implement SSL and the needs we have here.
We have a webserver hosted on the internet that needs to communicate with a web application that we host on our internal network. We wish for this communication to be made in https after authentication on the website. The use of letsencrypt certificates is being studied to see if the situation applies nicely. So our present situation is:

  1. The website ( hosted outside ) still has no SSL certificate;

  2. Our internal server on our network has a self signed certificate that we have to install locally on each browser to allow https and stop the warnings;


Problem 1. When a user is accessing the website, that has a part of the page with content being part of our internal application, since the user doesn’t have access to our internal self signed certificate, SSL will be broken on that part. How can we address this problem? Is it possible using Let’s Encrypt structure to issue a certificate to our internal server so that it is usable internally on our network independently from the website and also for our internal application to be used inside a page on our website maintaining SSL?

Problem 2. To bridge and allow communication between the Website ( hosted on the web ) and our ( internal application ) we are thinking of using either a SSH Tunnel or to make the internal server visible to the website webserver with NAT port forwarding and firewall rules to limit access - We have both options on our router. So can you advise which one works best with Let’s Encrypt?

Thanks in advance

hi @WhiteKarma

look at services like cloudflare or which let you put a cloud in front of your backend servers to manage the SSL components

alternatively you can host reverse proxies or application delivery controllers to achieve what you want

as this kind of advise would be considered consulting I am not going to explain this further than giving high level approaches


Hi @WhiteKarma,

It doesn’t really seem to me like a publicly-trusted certificate is absolutely necessary to solve your problem, since you could presumably have the outside server receive the content somehow and then add it to the pages it serves. If necessary, you could use a proxy like Squid listening on a different TCP port (still speaking HTTPS with the same certificate and key!), and generate links to URLs containing that port number. E.g. your regular server could listen on and the Squid proxy (which connects to your internal server) could listen on

Let’s Encrypt can issue certificates for your internal server, as long as it’s referred to by a publicly-visible DNS name and you can prove your control over that name to Let’s Encrypt (via one of the three supported verification methods, involving making certain changes to HTTP responses on port 80, HTTPS responses on port 443, or DNS records). Usually the DNS method is most convenient for internal servers if the public can’t make arbitrary web requests to those servers over the Internet.

I don’t believe the Let’s Encrypt technology has any particular preference about the second question, although, again, to get the certificate in the first place you have to prove your control over the server either by allowing port 80 or 443 requests to something responding to that DNS name, or by making associated DNS record changes.

Thank you @ahaw021 Andrei for your answer.

Thank you @schoen, the proxy is very good idea!!!

This is an awesome project, i will surely advertise it to colleagues.

Good luck!!!

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.