Phone sales support +39 0575 05077
  Phone technical support +39 0575 0508
 
Cloud Server > 11 - Load Balancer > HTTPS Protocol with LeastConn algorithm: public certificate and private key

11.1.2 HTTPS Protocol with LeastConn algorithm: public certificate and private key

Should you wish to create a rule with the LeastConn algorithm and HTTPS protocol, besides the ports of the load balancer and the Server, you will need to enter the private key and the public certificate.



The HTTPS acronym (HyperText Transfer Protocol over Secure Socket Layer) indicates that in a Server,  installed with SSL certificate (Secure Sockets Layer), safe browsing is being practiced. The default port which is used is port 443. A SSL certificate is made up of two keys: a public key (public certificate) and a private key.

The public key or public certificate is used to certify the validity of the Server to which you are connecting.

Example of public key (public certificate):
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
The private key is made up of an encryption or decryption algorithm and is used to encrypt or decrypt the data exchanged with the Server.

Example of a private key:
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----