How to use HTTPS for local development

Sometimes, you need to run your local development site with HTTPS. Tools and tips to do this safely and quickly.

Maud Nalpas
Maud Nalpas

In this post, statements about localhost are valid for and [::1] as well, since they both describe the local computer address, also called "loopback address". Also, to keep things simple, the port number isn't specified. So when you see http://localhost, read it as http://localhost:{PORT} or{PORT}.

If your production website uses HTTPS, you want your local development site to behave like an HTTPS site (if your production website doesn't use HTTPS, make it a priority to switch to HTTPS). Most of the time, you can trust http://localhost to behave like an HTTPS site. But in some cases, you need to run your site locally with HTTPS. Let's take a look at how to do this.

⏩ Are you looking for quick instructions, or have you been here before? Skip to the Cheatsheet.

To use HTTPS with your local development site and access https://localhost or https://mysite.example (custom hostname), you need a TLS certificate. But browsers won't consider just any certificate valid: your certificate needs to be signed by an entity that is trusted by your browser, called a trusted certificate authority (CA).

What you need to do is to create a certificate and sign it with a CA that is trusted locally by your device and browser. mkcert is a tool that helps you do this in a few commands. Here's how it works:

  • If you open your locally running site in your browser using HTTPS, your browser will check the certificate of your local development server.
  • Upon seeing that the certificate has been signed by the mkcert-generated certificate authority, the browser checks whether it's registered as a trusted certificate authority.
  • mkcert is listed as a trusted authority, so your browser trusts the certificate and creates an HTTPS connection.
A diagram of how mkcert works.
A diagram of how mkcert works.

mkcert (and similar tools) provide several benefits:

  • mkcert is specialized in creating certificates that are compliant with what browsers consider valid certificates. It stays updated to match requirements and best practices. This is why you won't have to run mkcert commands with complex configurations or arguments to generate the right certificates!
  • mkcert is a cross-platform tool. Anyone on your team can use it.

mkcert is the tool we recommend for creating a TLS certificate for local development. You can check out other options too.

Many operating systems may include libraries to produce certificates, such as openssl. Unlike mkcert and similar tools, such libraries may not consistently produce correct certificates, may require complex commands to be run, and are not necessarily cross-platform.



  1. Install mkcert (only once).

    Follow the instructions for installing mkcert on your operating system. For example, on macOS:

    brew install mkcert
    brew install nss # if you use Firefox
  2. Add mkcert to your local root CAs.

    In your terminal, run the following command:

    mkcert -install

    This generates a local certificate authority (CA). Your mkcert-generated local CA is only trusted locally, on your device.

  3. Generate a certificate for your site, signed by mkcert.

    In your terminal, navigate to your site's root directory or whichever directory you'd like the certificates to be located at.

    Then, run:

    mkcert localhost

    If you're using a custom hostname like mysite.example, run:

    mkcert mysite.example

    The command above does two things:

    • Generates a certificate for the hostname you've specified
    • Lets mkcert (that you've added as a local CA in Step 2) sign this certificate.

    Now, your certificate is ready and signed by a certificate authority your browser trusts locally. You're almost done, but your server doesn't know about your certificate yet!

  4. Configure your server.

    You now need to tell your server to use HTTPS (since development servers tend to use HTTP by default) and to use the TLS certificate you've just created.

    How to do this exactly depends on your server. A few examples:

    👩🏻‍💻 With node:

    server.js (replace {PATH/TO/CERTIFICATE...} and {PORT}):

    const https = require('https');
    const fs = require('fs');
    const options = {
      key: fs.readFileSync('{PATH/TO/CERTIFICATE-KEY-FILENAME}.pem'),
      cert: fs.readFileSync('{PATH/TO/CERTIFICATE-FILENAME}.pem'),
      .createServer(options, function (req, res) {
        // server code

    👩🏻‍💻 With http-server:

    Start your server as follows (replace {PATH/TO/CERTIFICATE...}):


    -S runs your server with HTTPS, while -C sets the certificate and -K sets the key.

    👩🏻‍💻 With a React development server:

    Edit your package.json as follows, and replace {PATH/TO/CERTIFICATE...}:

    "scripts": {

    For example, if you've created a certificate for localhost that is located in your site's root directory as follows:

    |-- my-react-app
        |-- package.json
        |-- localhost.pem
        |-- localhost-key.pem

    Then your start script should look like this:

    "scripts": {
        "start": "HTTPS=true SSL_CRT_FILE=localhost.pem SSL_KEY_FILE=localhost-key.pem react-scripts start"

    👩🏻‍💻 Other examples:

  5. ✨ You're done! Open https://localhost or https://mysite.example in your browser: you're running your site locally with HTTPS. You won't see any browser warnings, because your browser trusts mkcert as a local certificate authority.

Using mkcert: cheatsheet

mkcert in short

To run your local development site with HTTPS:

  1. Set up mkcert.

    If you haven't yet, install mkcert, for example on macOS:

    brew install mkcert

    Check install mkcert for Windows and Linux instructions.

    Then, create a local certificate authority:

    mkcert -install
  2. Create a trusted certificate.

    mkcert {YOUR HOSTNAME e.g. localhost or mysite.example}

    This create a valid certificate (that will be signed by mkcert automatically).

  3. Configure your development server to use HTTPS and the certificate you've created in Step 2.

  4. ✨ You're done! You can now access https://{YOUR HOSTNAME} in your browser, without warnings

Running your site locally with HTTPS: other options

Self-signed certificate

You may also decide to not use a local certificate authority like mkcert, and instead sign your certificate yourself.

Beware of a few pitfalls with this approach:

  • Browsers don't trust you as a certificate authority and they'll show warnings you'll need to bypass manually. In Chrome, you may use the flag #allow-insecure-localhost to bypass this warning automatically on localhost. It feels a bit hacky, because it is.
  • This is unsafe if you're working in an insecure network.
  • Self-signed certificates won't behave in exactly the same way as trusted certificates.
  • It's not necessarily easier or faster than using a local CA like mkcert.
  • If you're not using this technique in a browser context, you may need to disable certificate verification for your server. Omitting to re-enable it in production would be dangerous.
Screenshots of the warnings browsers show when a self-signed certificate is used.
The warnings browsers show when a self-signed certificate is used.
Why don't browsers trust self-signed certificates?

If you open your locally running site in your browser using HTTPS, your browser will check the certificate of your local development server. When it sees that the certificate has been signed by yourself, it checks whether you're registered as a trusted certificate authority. Because you're not, your browser can't trust the certificate; it displays a warning telling you that your connection is not secure. You may proceed at your own risk—if you do, an HTTPS connection will be created.

Why browsers don't trust self-signed certificates: a diagram.
Why browsers don't trust self-signed certificates.

Certificate signed by a regular certificate authority

You may also find techniques based on having an actual certificate authority—not a local one—sign your certificate.

A few things to keep in mind if you're considering using these techniques:

  • You'll have more setup work to do than when using a local CA technique like mkcert.
  • You need to use a domain name that you control and that is valid. This means that you can't use actual certificate authorities for:
    • localhost and other domain names that are reserved, such as example or test.
    • Any domain name that you don't control.
    • Top-level domains that are not valid. See the list of valid top-level domains.

Reverse proxy

Another option to access a locally running site with HTTPS is to use a reverse proxy such as ngrok.

A few points to consider:

  • Anyone can access your local development site once you share with them a URL created with a reverse proxy. This can be very handy when demoing your project to clients! Or this can be a downside, if your project is sensitive.
  • You may need to consider pricing.
  • New security measures in browsers may affect the way these tools work.

If you're using a custom hostname like mysite.example, you can use a flag in Chrome to forcefully consider mysite.example secure. Avoid doing this, because:

  • You would need to be 100% sure that mysite.example always resolves to a local address, otherwise you could leak production credentials.
  • You won't be able to debug across browsers with this trick 🙀.

With many thanks for contributions and feedback to all reviewers and contributors—especially Ryan Sleevi, Filippo Valsorda, Milica Mihajlija and Rowan Merewood. 🙌

Hero image background by @anandu on Unsplash, edited.