<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Alice Martin</title>
    <description>The latest articles on DEV Community by Alice Martin (@alicemartin).</description>
    <link>https://dev.to/alicemartin</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3108506%2F4b55b09a-d96b-43fb-ad6d-eb0c81de19e0.jpeg</url>
      <title>DEV Community: Alice Martin</title>
      <link>https://dev.to/alicemartin</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/alicemartin"/>
    <language>en</language>
    <item>
      <title>How to Secure Multi-Level Subdomains Using a Wildcard SSL Certificate</title>
      <dc:creator>Alice Martin</dc:creator>
      <pubDate>Fri, 16 May 2025 12:46:36 +0000</pubDate>
      <link>https://dev.to/alicemartin/how-to-secure-multi-level-subdomains-using-a-wildcard-ssl-certificate-5cna</link>
      <guid>https://dev.to/alicemartin/how-to-secure-multi-level-subdomains-using-a-wildcard-ssl-certificate-5cna</guid>
      <description>&lt;p&gt;In today’s web environment, securing your site with HTTPS is a must not just for data protection, but for user trust and SEO credibility. If your site architecture includes multiple subdomains, especially those with more than one level (like dev.blog.example.com), figuring out the right SSL setup can get complicated.&lt;/p&gt;

&lt;p&gt;Wildcard SSL certificates are often the first solution people turn to for subdomain coverage. They simplify certificate management and reduce costs, but they’re not a one-size-fits-all answer. When your domain structure starts getting deeper to multi-level, you need a more strategic approach.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is a Wildcard SSL Certificate?
&lt;/h2&gt;

&lt;p&gt;A &lt;a href="https://www.cheapsslshop.com/wildcard-ssl-certificates" rel="noopener noreferrer"&gt;wildcard SSL certificate&lt;/a&gt; allows you to secure a main domain and all its subdomains with a single certificate. Instead of managing separate certs for blog.example.com, shop.example.com, and mail.example.com, a wildcard certificate for &lt;code&gt;*.example.com&lt;/code&gt; secures them all in one go.&lt;/p&gt;

&lt;p&gt;The wildcard symbol (*) acts as a placeholder for any first-level subdomain, making these certificates a great option for dynamic projects or businesses expecting growth. You save time and effort by only installing, renewing, and monitoring one certificate.&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding Domain and Subdomain Levels
&lt;/h2&gt;

&lt;p&gt;Before diving deeper, let’s clarify what we mean by domain levels:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Primary Domain: example.com&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;First-Level Subdomain: shop.example.com&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Second-Level Subdomain: secure.shop.example.com&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Third-Level Subdomain: api.secure.shop.example.com&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A wildcard certificate for &lt;code&gt;*.example.com&lt;/code&gt; will secure first-level subdomains only. It won’t extend to deeper structures like &lt;code&gt;secure.shop.example.com&lt;/code&gt; or &lt;code&gt;dev.blog.example.com&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Wildcard Certificates Fall Short for Multi-Level Subdomains
&lt;/h2&gt;

&lt;p&gt;Here’s the catch: wildcard SSL certificates can only secure one level of subdomains. You can’t get a certificate that secures &lt;code&gt;*.*.example.com&lt;/code&gt; - Certificate Authorities (CAs) won’t issue them. This restriction exists for security reasons, as it would be nearly impossible to validate ownership and intent for such wide-ranging domain coverage.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;p&gt;✅ &lt;code&gt;*.example.com&lt;/code&gt; covers shop.example.com&lt;/p&gt;

&lt;p&gt;❌ It does not cover &lt;code&gt;login.shop.example.com&lt;/code&gt; or &lt;code&gt;analytics.blog.example.com&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If your site includes multi-level subdomains, you’ll need to adopt a smarter SSL strategy.&lt;/p&gt;

&lt;h3&gt;
  
  
  Strategy 1: Use Separate Wildcard Certificates for Each Subdomain Group
&lt;/h3&gt;

&lt;p&gt;One straightforward solution is to issue a wildcard certificate for each subdomain branch that requires it. For instance:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A wildcard for &lt;code&gt;*.blog.example.com&lt;/code&gt; will secure &lt;code&gt;media.blog.example.com&lt;/code&gt;, &lt;code&gt;dev.blog.example.com&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;A wildcard for &lt;code&gt;*.shop.example.com&lt;/code&gt; will cover &lt;code&gt;login.shop.example.com&lt;/code&gt;, &lt;code&gt;secure.shop.example.com&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This strategy works well when you have clear groupings of services or regions under different subdomains. The downside? You’ll be managing multiple certificates, which means more tracking, more renewals, and potentially more headaches.&lt;/p&gt;

&lt;p&gt;Still, this approach offers clarity and modular control, especially helpful in organizations where different teams or departments manage their own environments.&lt;/p&gt;

&lt;h3&gt;
  
  
  Strategy 2: Leverage Multi-Domain Wildcard SSL Certificates
&lt;/h3&gt;

&lt;p&gt;For more complex infrastructures, a &lt;strong&gt;Multi-Domain Wildcard SSL Certificate&lt;/strong&gt; (also called a SAN + Wildcard certificate) offers a scalable and centralized alternative. These certificates allow you to list multiple wildcard entries under one certificate using Subject Alternative Names (SANs).&lt;/p&gt;

&lt;p&gt;With a single Multi-Domain Wildcard cert, you can secure:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;*.example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;*.blog.example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;*.shop.example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;*.dev.shop.example.com&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This makes it easier to manage certificates across large projects with distributed or layered subdomain structures, such as SaaS platforms or enterprise-level websites.&lt;/p&gt;

&lt;p&gt;You might come across the term "&lt;a href="https://www.cheapsslshop.com/blog/what-is-double-wildcard-ssl" rel="noopener noreferrer"&gt;double wildcard SSL&lt;/a&gt;" referring to certificates that would hypothetically cover &lt;code&gt;*.*.example.com&lt;/code&gt;. In practice, this doesn’t exist. CAs do not issue double wildcard certificates due to the risks and complexities involved in validation. However, you can mimic this functionality by combining multiple SAN-based wildcard entries in a Multi-Domain Wildcard certificate.&lt;/p&gt;

&lt;h2&gt;
  
  
  Best Practices for Securing Multi-Level Subdomains
&lt;/h2&gt;

&lt;p&gt;To build a reliable SSL strategy, keep these tips in mind:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Audit Your Domain Structure&lt;/strong&gt;&lt;br&gt;
Before purchasing any certificate, map out all your subdomains. This ensures you’re not leaving anything unprotected and helps avoid overpaying for unnecessary coverage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Avoid Key Reuse Across Servers&lt;/strong&gt;&lt;br&gt;
While it’s tempting to use the same wildcard certificate across servers, sharing a private key increases security risks. Use secure key management practices to isolate and protect your certs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Stay on Top of Expirations&lt;/strong&gt;&lt;br&gt;
An expired SSL certificate can bring down an entire site. Set calendar reminders or use automation tools to track expiry dates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Be Cautious with Certificate Pinning&lt;/strong&gt;&lt;br&gt;
Pinning can add security but also complexity, especially if you’re rotating wildcard or SAN certificates. If not handled carefully, pinning can cause issues during certificate renewal or provider changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Work With Trusted Certificate Authorities&lt;/strong&gt;&lt;br&gt;
Use well-established CAs with strong customer support and wide browser compatibility. This ensures smooth issuance and fewer compatibility issues.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Debunking Common Myths of Wildcard Certificates&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Let’s clear up a few misunderstandings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;“One wildcard cert secures everything.” Not quite. It only covers one level of subdomains.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;“I can get a &lt;code&gt;*.*.example.com&lt;/code&gt; certificate.” You can’t. CAs won’t issue these.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;“Wildcard certs are inherently insecure.” Not true. They’re only risky if private keys are poorly managed.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Final Thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wildcard SSL certificates&lt;/strong&gt; are a powerful tool for securing first-level subdomains with minimal hassle. But when your domain structure goes deeper, relying on a single wildcard cert isn’t enough.&lt;/p&gt;

&lt;p&gt;For simpler setups, a standard wildcard certificate does the job. But as your architecture becomes more complex like in multi-regional sites or platforms with deep service layers, you’ll need to scale your approach. That could mean managing multiple wildcard certificates or opting for a &lt;strong&gt;Multi-Domain Wildcard SSL certificate&lt;/strong&gt; to keep things consolidated and secure.&lt;/p&gt;

&lt;p&gt;Plan ahead, choose your certificates wisely, and you’ll have a setup that’s both secure and sustainable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Also Read:&lt;/strong&gt; &lt;a href="https://www.cheapsslshop.com/blog/best-cheapest-wildcard-ssl-certificate-providers" rel="noopener noreferrer"&gt;Top 5 Best Cheapest Wildcard SSL Certificate Providers of 2025&lt;/a&gt; &lt;/p&gt;

</description>
      <category>wildcardssl</category>
      <category>subdomainssl</category>
      <category>sslcertificate</category>
      <category>websecurity</category>
    </item>
    <item>
      <title>How to Fix ERR_HTTP2_PROTOCOL_ERROR After Enabling HTTPS</title>
      <dc:creator>Alice Martin</dc:creator>
      <pubDate>Fri, 09 May 2025 11:58:41 +0000</pubDate>
      <link>https://dev.to/alicemartin/how-to-fix-errhttp2protocolerror-after-enabling-https-2e8c</link>
      <guid>https://dev.to/alicemartin/how-to-fix-errhttp2protocolerror-after-enabling-https-2e8c</guid>
      <description>&lt;p&gt;Transferring your website onto HTTPS is a wise decision because it leads to better security as well as increased SEO and user trust. However, after enabling HTTPS, you might run into a frustrating message in your browser: &lt;code&gt;ERR_HTTP2_PROTOCOL_ERROR&lt;/code&gt;. This error is usually accompanied by little context, and you wonder what you did wrong.&lt;/p&gt;

&lt;p&gt;In this guide, we’ll break down what causes this error, why it may appear after enabling HTTPS, and how to fix it step by step.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is ERR_HTTP2_PROTOCOL_ERROR?
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;ERR_HTTP2_PROTOCOL_ERROR&lt;/code&gt; is a browser-side error that occurs when there’s a failure in communication between the web browser and the server using the HTTP/2 protocol. HTTP/2 is the modern version of HTTP, designed to make web pages load faster and more efficiently using features like multiplexing and header compression.&lt;/p&gt;

&lt;p&gt;When this error pops up, it typically means that either:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The server is sending malformed or unexpected data, or&lt;/li&gt;
&lt;li&gt;The browser is misinterpreting the data due to software bugs or cache conflicts.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why Does This Error Appear After Enabling HTTPS?
&lt;/h2&gt;

&lt;p&gt;If you’ve recently added an SSL certificate and enforced HTTPS, this error could be triggered by several factors:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Improper SSL Configuration&lt;/strong&gt;&lt;br&gt;
Misconfigured SSL settings can interfere with how the server communicates over HTTP/2.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Unsupported or Misconfigured HTTP/2 Module&lt;/strong&gt;&lt;br&gt;
Not all servers support HTTP/2 by default. If HTTP/2 is not enabled or is incorrectly set up, this error may occur when attempting a secure connection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Conflicting Middleware (e.g., CDN, Proxy, Firewall)&lt;/strong&gt;&lt;br&gt;
Services like Cloudflare or reverse proxies can sometimes conflict with your server’s HTTPS and HTTP/2 settings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Outdated Browser or OS&lt;/strong&gt;&lt;br&gt;
If the client (browser) isn’t fully compatible with HTTP/2 or has corrupted cache data, it can misinterpret legitimate responses as protocol errors.&lt;/p&gt;
&lt;h2&gt;
  
  
  How to Fix ERR_HTTP2_PROTOCOL_ERROR – Step-by-Step
&lt;/h2&gt;

&lt;p&gt;Let’s walk through the most effective solutions to resolve this error after enabling HTTPS.&lt;/p&gt;
&lt;h3&gt;
  
  
  1. Check SSL Certificate Validity and Configuration
&lt;/h3&gt;

&lt;p&gt;Since this error appears after HTTPS is enabled, start by verifying your &lt;a href="https://www.cheapsslshop.com/blog/what-is-an-ssl-tls-certificate-and-how-does-it-work" rel="noopener noreferrer"&gt;SSL certificate&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use an SSL Checker Tool&lt;/strong&gt; (like SSL Labs or a browser extension)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check if the certificate is valid, properly chained, and not expired.&lt;/li&gt;
&lt;li&gt;Look for any warning related to intermediate certificate mismatches.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Ensure HTTPS Redirection is Properly Set&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Redirect all HTTP traffic to HTTPS via &lt;code&gt;.htaccess&lt;/code&gt; (Apache) or &lt;code&gt;server block&lt;/code&gt; (Nginx) without causing loops or conflicts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Apache Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;apache

RewriteEngine On
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Nginx Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nginx

server {
    listen 80;
    server_name example.com;
    return 301 https://$host$request_uri;
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  2. Confirm HTTP/2 is Enabled on Your Server
&lt;/h3&gt;

&lt;p&gt;Enabling HTTPS doesn’t automatically mean HTTP/2 is active. You need to confirm HTTP/2 support and enable it explicitly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;On Apache:&lt;/strong&gt;&lt;br&gt;
Make sure the &lt;code&gt;mod_http2&lt;/code&gt; module is enabled:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;a2enmod http2

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then add this directive to your SSL-enabled VirtualHost block:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;apache

Protocols h2 http/1.1

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Restart Apache:&lt;/p&gt;

&lt;p&gt;bash&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo systemctl restart apache2

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;On Nginx:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ensure your server block looks like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nginx

listen 443 ssl http2;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And that Nginx was compiled with HTTP/2 support (you can verify using &lt;code&gt;nginx -V&lt;/code&gt;).&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Clear Browser Cache and Cookies
&lt;/h3&gt;

&lt;p&gt;Sometimes, after switching to HTTPS and HTTP/2, the browser still holds old cache data, leading to protocol conflicts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To clear cache in Chrome:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to &lt;code&gt;Settings &amp;gt; Privacy and Security &amp;gt; Clear browsing data&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Select “Cached images and files” and “Cookies”&lt;/li&gt;
&lt;li&gt;Hit “Clear data”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Afterward, reload the page or open it in an incognito window to test.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Disable Browser Extensions and Try Incognito Mode
&lt;/h3&gt;

&lt;p&gt;Certain browser extensions (especially those that intercept or filter HTTPS traffic like ad blockers or antivirus extensions) may misinterpret or block parts of the HTTP/2 response.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Disable all extensions temporarily&lt;/li&gt;
&lt;li&gt;Visit the site in Incognito Mode using Ctrl + Shift + N&lt;/li&gt;
&lt;li&gt;If the error disappears, re-enable extensions one by one to identify the culprit&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Temporarily Disable Firewall or Antivirus
&lt;/h3&gt;

&lt;p&gt;Some aggressive firewall or antivirus software can interfere with HTTP/2 connections over HTTPS. They may block packets they misidentify as suspicious, even when they are perfectly valid.&lt;/p&gt;

&lt;p&gt;To test:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Temporarily disable your antivirus or firewall&lt;/li&gt;
&lt;li&gt;Reload the site in the browser&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If the error goes away, consider adding your site to the software's exception list.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Update Your Browser and Operating System
&lt;/h3&gt;

&lt;p&gt;Outdated browsers may lack full HTTP/2 support or contain unresolved bugs related to HTTPS. The same goes for your operating system's network stack.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Update your browser to the latest version&lt;/li&gt;
&lt;li&gt;On Windows, &lt;code&gt;go to Settings &amp;gt; Windows Update&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;On Mac, &lt;code&gt;go to System Preferences &amp;gt; Software Update&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  7. Inspect the Network Layer (For Advanced Users)
&lt;/h3&gt;

&lt;p&gt;If you have access to server logs or tools like Chrome DevTools or Wireshark, look for unusual behavior:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use Chrome DevTools (F12 &amp;gt; Network tab) to monitor failed requests and HTTP response headers&lt;/li&gt;
&lt;li&gt;Check if the status code is &lt;code&gt;502&lt;/code&gt;, &lt;code&gt;503&lt;/code&gt;, or if you see frame-level errors (like &lt;code&gt;RST_STREAM&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re using Cloudflare, try:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Disabling HTTP/2 on Cloudflare temporarily&lt;/li&gt;
&lt;li&gt;Bypassing Cloudflare by pointing your domain directly to your origin server for testing&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Bonus Tip: Fallback to HTTP/1.1 (Temporarily)
&lt;/h2&gt;

&lt;p&gt;If HTTP/2 errors persist and you need the site up immediately, consider falling back to HTTP/1.1 while debugging.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In Apache:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;apache

Protocols http/1.1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;In Nginx:&lt;/strong&gt;&lt;br&gt;
Remove &lt;code&gt;http2&lt;/code&gt; from the &lt;code&gt;listen&lt;/code&gt; directive.&lt;/p&gt;

&lt;p&gt;Note: This is just a temporary solution and should be reversed once HTTP/2 issues are resolved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Encountering the &lt;code&gt;ERR_HTTP2_PROTOCOL_ERROR&lt;/code&gt; after enabling HTTPS can be frustrating, but it's usually solvable with a structured approach. For the most part it’s caused by SSL misconfiguration, incompatible browser extensions or HTTP/2 not working properly on your server.&lt;/p&gt;

&lt;p&gt;First things first, check your SSL certificate, confirm the proper configuration of HTTP/2, then clean your browser’s cache, eliminate any client-side hitches. Following these steps, you can be sure to fix the issue and serve your users a secure fast-loading website.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Also Read:&lt;/strong&gt;&lt;a href="https://www.cheapsslshop.com/blog/how-to-fix-err_ssl_bad_record_mac_alert" rel="noopener noreferrer"&gt; How to Fix ERR_SSL_BAD_Record_MAC_Alert: Common Causes &amp;amp; Solutions&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sslerror</category>
      <category>httperror</category>
      <category>httpvshttps</category>
    </item>
    <item>
      <title>SSL Certificate for Subdomains: How to Get One for Your Website</title>
      <dc:creator>Alice Martin</dc:creator>
      <pubDate>Wed, 30 Apr 2025 13:13:45 +0000</pubDate>
      <link>https://dev.to/alicemartin/ssl-certificate-for-subdomains-how-to-get-one-for-your-website-18p1</link>
      <guid>https://dev.to/alicemartin/ssl-certificate-for-subdomains-how-to-get-one-for-your-website-18p1</guid>
      <description>&lt;p&gt;Most people understand the need to secure their main website with SSL. But what about the subdomains — the blog, the store, the dashboard? If those parts of your site aren’t protected, you’re leaving the door wide open for security risks.&lt;/p&gt;

&lt;p&gt;Securing subdomains is just as important as protecting your root domain, especially if they handle sensitive data like logins or transactions. Fortunately, you don’t need a separate certificate for each one. In this guide, we’ll break down how to get an SSL certificate for subdomains, explore the different types available (including wildcard options), and help you avoid common mistakes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why SSL Matters Especially for Subdomains?
&lt;/h2&gt;

&lt;p&gt;SSL (or more accurately, TLS — but most people still say SSL) encrypts the connection between your website and your visitors. It prevents data from being intercepted by hackers and gives users that familiar padlock icon in the browser bar.&lt;/p&gt;

&lt;p&gt;If your site uses subdomains like shop.example.com, login.example.com, or blog.example.com, each of those acts as its own “mini-site.” And just like your main domain, they can be targeted by attackers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Without SSL:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Users may see “Not Secure” warnings&lt;/li&gt;
&lt;li&gt;Search engines may rank you lower&lt;/li&gt;
&lt;li&gt;Sensitive data could be exposed&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Long story short: SSL is just as important for subdomains as it is for your main site.&lt;/p&gt;

&lt;h2&gt;
  
  
  Types of SSL Certificates for Securing Subdomains
&lt;/h2&gt;

&lt;p&gt;When it comes to protecting subdomains, there are a few SSL options. Here’s a simple breakdown:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Wildcard SSL Certificate
&lt;/h3&gt;

&lt;p&gt;A wildcard SSL certificate is the go-to for most websites with multiple subdomains. It secures one domain and all its first-level subdomains, anything like &lt;code&gt;*.example.com&lt;/code&gt;. So with one certificate, you can secure:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;blog.example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;shop.example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;login.example.com&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Websites with several subdomains under the same root&lt;br&gt;
&lt;strong&gt;Bonus:&lt;/strong&gt; Easy to manage, cost-effective&lt;br&gt;
&lt;strong&gt;Note:&lt;/strong&gt; Wildcard SSL does not cover second-level and third-level subdomains.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Multi-Domain SSL (SAN Certificate)
&lt;/h3&gt;

&lt;p&gt;This type can secure multiple domains and subdomains, like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;store.example.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;example2.com&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;mail.example2.com&lt;/code&gt;
You list each one individually, so it’s super flexible.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Businesses with several sites and subdomains&lt;br&gt;
&lt;strong&gt;Drawback&lt;/strong&gt;: Slightly more expensive and technical&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Individual Certificates
&lt;/h3&gt;

&lt;p&gt;This method means you get a separate SSL certificate for each subdomain. For example, one for &lt;code&gt;example.com&lt;/code&gt;, another for &lt;code&gt;blog.example.com&lt;/code&gt;, maybe one for &lt;code&gt;shop.example.com&lt;/code&gt;—each one handled on its own.&lt;/p&gt;

&lt;p&gt;It gives you more control over how each part of your site is secured, which can be handy if you’ve got different teams or tools managing different subdomains. That said, it can also turn into a bit of a chore. You’ll have to install and renew each certificate separately, and that can add up fast if you’ve got a bunch of them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Complex setups where different subdomains need unique certificates (e.g., separate dev teams or services).&lt;br&gt;
&lt;strong&gt;Drawback&lt;/strong&gt;: Not scalable for sites with many subdomains can get time-consuming.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Multi-Domain Wildcard SSL Certificates
&lt;/h3&gt;

&lt;p&gt;If your setup includes multiple domains, and each of those domains also has its own set of subdomains, then a Multi-Domain Wildcard SSL certificate is the way to go. It’s designed for more complex environments where a standard wildcard or single SAN certificate just isn’t enough. It covers multiple-level subdomains within single SSL.&lt;/p&gt;

&lt;p&gt;Let’s break it down with an example:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;*.example1.com&lt;/code&gt; would cover things like &lt;code&gt;blog.example1.com&lt;/code&gt;, &lt;code&gt;shop.example1.com&lt;/code&gt;, or &lt;code&gt;mail.example1.com&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;If you also need to secure something deeper (second-level or third-level subdomains), like &lt;code&gt;tech.blog.example1.com&lt;/code&gt;, you’d use a wildcard for &lt;code&gt;*.blog.example1.com&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Now let’s say you also own &lt;code&gt;example2.com&lt;/code&gt;, and want to secure &lt;code&gt;payment.example2.com&lt;/code&gt; or &lt;code&gt;support.example2.com&lt;/code&gt; — you’d include &lt;code&gt;*.example2.com&lt;/code&gt; in the same certificate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Businesses or agencies juggling multiple projects, brands, or platforms under different domains.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to consider:&lt;/strong&gt; These certificates are powerful, but they’re also more expensive and might be overkill if you’re only working with one domain.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Get an SSL Certificate for Subdomains
&lt;/h2&gt;

&lt;p&gt;Here’s a simple step-by-step to help you get SSL set up:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Make a List of Your Subdomains
&lt;/h3&gt;

&lt;p&gt;Know what you need to protect- blog, shop, login, etc. This will help you pick the right SSL type.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Pick the Right Type of Certificate
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Just one domain?&lt;/strong&gt; Go with single-domain SSL&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Many subdomains?&lt;/strong&gt; Get a wildcard SSL certificate&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multiple sites and subdomains?&lt;/strong&gt; Choose multi-domain/SAN SSL&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Choose a Trusted SSL Certificate Provider
&lt;/h3&gt;

&lt;p&gt;Here are some of the popular options for &lt;a href="https://www.cheapsslshop.com/blog/best-cheapest-wildcard-ssl-certificate-providers" rel="noopener noreferrer"&gt;low-cost SSL certificate providers&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DigiCert&lt;/li&gt;
&lt;li&gt;Sectigo&lt;/li&gt;
&lt;li&gt;RapidSSL&lt;/li&gt;
&lt;li&gt;GlobalSign&lt;/li&gt;
&lt;li&gt;SSL2Buy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Make sure the provider supports the type of certificate you need.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Install the SSL Certificate
&lt;/h3&gt;

&lt;p&gt;Your hosting provider usually helps with this. If you’re using cPanel, it often just takes a few clicks.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Redirect to HTTPS
&lt;/h3&gt;

&lt;p&gt;Once installed, redirect your site to use HTTPS, which tells browsers and users to use the secure version of your site.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Test Everything
&lt;/h3&gt;

&lt;p&gt;Use SSL checker tools to confirm your certificate is working properly across all your subdomains.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the Benefits of Adding SSL to Subdomains?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Better Security&lt;/strong&gt; – Everything is encrypted and harder to hack&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;More Trust&lt;/strong&gt; – The padlock tells visitors your site is safe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SEO Boost&lt;/strong&gt; – Google likes secure sites&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Legal Compliance&lt;/strong&gt; – Helps with rules like GDPR and PCI-DSS&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Peace of Mind&lt;/strong&gt; – One less thing to worry about&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re using a &lt;a href="https://www.cheapsslshop.com/wildcard-ssl-certificates" rel="noopener noreferrer"&gt;wildcard SSL certificate&lt;/a&gt;, managing security is a lot easier — no need to install a separate cert for each subdomain.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mistakes to Watch Out For When Installing Subdomain SSL:
&lt;/h2&gt;

&lt;p&gt;A few things can go wrong if you’re not careful:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Choosing the wrong certificate (e.g., single-domain instead of wildcard)&lt;/li&gt;
&lt;li&gt;Forgetting new subdomains- make sure they’re included&lt;/li&gt;
&lt;li&gt;Letting SSL expire- renew on time or set up auto-renew&lt;/li&gt;
&lt;li&gt;Not using HTTPS redirects, which can confuse users and search engines&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Quick FAQs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Q: Do I need a separate SSL for every subdomain?&lt;/strong&gt;&lt;br&gt;
A: Yes, if you want them all to be secure. A wildcard SSL can cover them all easily in one certificate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Q: Is free SSL enough?&lt;/strong&gt;&lt;br&gt;
A: For small projects, yes. But for business sites or online stores, paid SSL from a trusted provider is better.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Q: Which one is considered the best method for securing subdomains?&lt;/strong&gt;&lt;br&gt;
A: If you want to cover a single subdomain- you can go for Wildcard SSL, but want to secure multiple subdomains for multiple sites, then always opt for Multi-domain SSL.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Q: Can I mix certificate types?&lt;/strong&gt;&lt;br&gt;
A: You can, but it’s often easier to manage one wildcard or SAN certificate depending on your setup.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Securing your website isn’t just about the homepage. Your subdomains, such as login pages, blogs, and stores, are all part of the picture. Leaving them unprotected is like locking your front door but leaving the back wide open.&lt;/p&gt;

&lt;p&gt;By choosing the right SSL certificate for subdomains, you’ll keep your visitors safe, build trust, and stay in good standing with search engines.&lt;/p&gt;

&lt;p&gt;So, whether you go with an individual certificate, wildcard SSL certificate, a SAN cert, or a multi-domain wildcard option, just make sure every part of your site is protected.&lt;/p&gt;

</description>
      <category>subdomainssl</category>
      <category>sslcertificate</category>
      <category>wildcardssl</category>
    </item>
  </channel>
</rss>
