当前位置:网站首页>WordPress pill applet build applet from zero to one [wordpress pagoda configure SSL pseudo static]
WordPress pill applet build applet from zero to one [wordpress pagoda configure SSL pseudo static]
2022-06-24 06:20:00 【Kit】
WordPress Site configuration SSL Pseudostatic
After the installation and polishing of the first two sections WordPress The site has been perfectly installed and running on the server , Let's mainly talk about SSL With pseudo static configuration . About SLL We can use the one button application provided by the pagoda , This is convenient and fast , And the server vendors , I have brought the pagoda to show you . When our site is not configured SSL When doing small programs, you can't add them to the server domain name , And the domain name must be filed. Neither of them is indispensable .
pagoda WordPress To configure SSL certificate
1. We go to the pagoda backstage and click on the website , Click on our domain name , Then click... On the left SSL choice "Let's Encrypt", Check the domain name , Inspection method selection document , Click Apply , Just a few seconds .
1.1 Click apply to open the following interface , It means that there is no hurry under normal circumstances
1.2 Application completed , We need to click on the force in the upper right corner HTTPS, Why ? No why? , In order to make the whole station open HTTPS load .
The domain name display interface after configuration is successful is as follows
pagoda WordPress Configure pseudo static
1. Make a little program , except SSL outside , We also need the server to configure pseudo static rules , The advantage of using pagoda panels is that you don't need to configure them separately , You can check it directly in the background , The configuration tutorial is shown in the following figure :
1.1. After the server configuration is completed, we need to log in to the fixed link of the website under the background configuration Website background selection settings > Fixed connection > Select custom structure > Copy the link below , Copy the link below : Website background address : Your domain name /wp-admin Access entry
/%category%/%post_id%.html
边栏推荐
- PNAs: development of white matter pathways in human brain during the second and third trimester of pregnancy
- Material production tool manual
- PMP | 8 abilities that excellent project managers focus on training
- Spirit information development log (3)
- Progress update | optimization and upgrading of shard nodes
- At the trusted cloud conference, Tencent securely unlocked a number of new certifications!
- A high-end router antenna connection mechanism that can simultaneously deploy and store antennas
- How to use the domain name? What domain name should be selected to purchase
- Multi objective Optimization Practice Based on esmm model -- shopping mall
- Is IPFs a new national infrastructure project? What impact will the new infrastructure have on IPFs?
猜你喜欢

One line of keyboard

ServiceStack. Source code analysis of redis (connection and connection pool)

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing

Technology is a double-edged sword, which needs to be well kept
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

What is the difference between a white box test and a black box test

Solution to the 39th weekly game of acwing
随机推荐
[fault announcement] one stored procedure brings down the entire database
The company is worried about customer frustration and brand damage caused by DDoS Attacks
A plate processing device of network separator which can adapt to different line port positions
The influence of TLS protocol and cipher on remote RDP
How to resolve the domain name? How to choose a domain name?
As a sigmastar agent, Qiming cloud shares dry goods for you: what are the characteristics of ssd201/202
TRTC applet custom message
Project deployment for learning 3D visualization from scratch
At the beginning of the school season, use this template to improve the management level
Malicious software packages are found in pypi code base. Tencent security threat intelligence has been included. Experts remind coders to be careful of supply chain attacks
Coding and codesign: make design and development easier
Enterprise management background user manual
The development and construction of live broadcast app, and the source code of live broadcast app involves all aspects
Tencent cloud harbor private warehouse deployment practice
Is IPFs a new national infrastructure project? What impact will the new infrastructure have on IPFs?
Architecture: rest and HATEOAS
How is a Clickhouse query completed?
Quick reference table of PHP security configuration maintained by OWASP
Analysis of DDoS attack methods
How to register a domain name? What are the benefits of building a website?