docs/versioned_docs/version-1.9.0/Deployment/deployment-nginx-ssl.mdx
import Icon from "@site/src/components/icon";
Deploy Langflow on a Linux-based server using Nginx as a reverse proxy, Let's Encrypt for SSL certificates, and Certbot for automated certificate management.
This setup encrypts all communications between users and your Langflow server. SSL certificates ensure that sensitive data is protected from eavesdropping and tampering, and the automatic certificate management through Certbot eliminates the complexity of manual SSL configuration.
203.0.113.1, configure your DNS like this:
Type: A
Name: langflow.example.com
Value: 203.0.113.1
Create an SSH key to connect to your server remotely. For example:
ssh-keygen -t ed25519 -C "[email protected]"
Replace [email protected] with the email address that you want to associate with the SSH key.
In your terminal, follow the instructions to create your SSH key pair. This creates both a private and public key. To copy the public key from your terminal, enter the following command:
cat ~/Downloads/host-lf.pub | pbcopy
In your server, add the SSH key you copied in the previous step. For example, if you are using a Digital Ocean cloud server, add this SSH key when the server is created, or with the Digital Ocean control panel.
To connect to your server with SSH, enter the following command.
ssh -i PATH_TO_PRIVATE_KEY/PRIVATE_KEY_NAME root@SERVER_IP_ADDRESS
Replace the following:
PATH_TO_PRIVATE_KEY/PRIVATE_KEY_NAME: The path to your private SSH key file that matches the public key you added to your serverSERVER_IP_ADDRESS: Your server's IP addressWhen prompted for a key fingerprint, type yes.
The terminal output indicates if the connection succeeds or fails.
The following response was returned after connecting to a Digital Ocean cloud server.
System information as of Wed Oct 8 21:40:43 UTC 2025
System load: 0.02 Processes: 103
Usage of /: 4.1% of 47.35GB Users logged in: 1
Memory usage: 10% IPv4 address for eth0: 165.227.176.236
Swap usage: 0% IPv4 address for eth0: 10.17.0.5
To install Langflow on your server, do the following:
Update system packages.
sudo apt update && sudo apt upgrade -y
Install Python and pip.
sudo apt install python3 python3-pip python3-venv -y
Install uv to manage Python packages. Langflow recommends uv for faster installation.
pip install uv
Create a virtual environment for Langflow.
uv venv langflow-venv
source langflow-venv/bin/activate
Install Langflow using uv.
uv pip install langflow
Optionally, start Langflow.
uv run langflow run --host 127.0.0.1 --port 7860 &
Test access at your http://YOUR_PUBLIC_IP:7860.
Since Langflow is running on localhost, you should not be successful.
In next steps, you will install Nginx as a reverse proxy to handle external access, and Certbot to configure SSL for secure HTTPS access.
Nginx is a reverse proxy that receives external requests and forwards them to your Langflow server. In addition to SSL termination, Nginx includes features for load balancing and security. For more information, see the Nginx documentation.
Install Nginx on your server.
sudo apt install nginx -y
Start and enable Nginx on your server.
sudo systemctl start nginx
sudo systemctl enable nginx
Create an Nginx configuration file.
Replace DOMAIN_NAME with your actual domain name, such as langflow.example.com.
sudo nano /etc/nginx/sites-available/DOMAIN_NAME
Paste the following content to the configuration file you created at /etc/nginx/sites-available/DOMAIN_NAME.
Replace DOMAIN_NAME with your actual domain name, such as langflow.example.com.
server {
listen 80;
server_name DOMAIN_NAME;
# Increase client body size for file uploads
client_max_body_size 100M;
location / {
proxy_pass http://127.0.0.1:7860/;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# WebSocket support for Langflow
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
# Timeout settings for long-running flows
proxy_connect_timeout 60s;
proxy_send_timeout 60s;
proxy_read_timeout 300s;
# Buffer settings
proxy_buffering off;
proxy_request_buffering off;
}
}
This configuration listens on port 80 for standard HTTP. When you install Certbot in a later step, it will modify this configuration to add port 443 for HTTPS.
To enable your site configuration, create a symlink between the /sites-available and /sites-enabled directories. /sites-available stores all site configurations, and /sites-enabled stores only active configurations which Nginx reads from. Creating this symlink switches this configuration ON.
sudo ln -s /etc/nginx/sites-available/DOMAIN_NAME /etc/nginx/sites-enabled/DOMAIN_NAME
Check the Nginx configuration file's syntax.
sudo nginx -t
Restart Nginx.
sudo systemctl restart nginx
While Nginx handles SSL termination in encrypting and decrypting traffic, Certbot automatically obtains SSL certificates from Let's Encrypt and configures Nginx to use them.
The Certbot client is recommended by Let's Encrypt for automated certificate management. For more information, see the Certbot documentation.
Install the Certbot client on your server to manage certificates, and install the python3-certbot-nginx plugin to allow Certbot to modify your server's Nginx configuration.
Install Certbot and the python3-certbot-nginx plugin.
sudo apt install certbot python3-certbot-nginx -y
Obtain the SSL certificate for DOMAIN_NAME from Let's Encrypt.
sudo certbot --nginx -d DOMAIN_NAME
This result indicates that Certbot succeeded.
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/DOMAIN_NAME/fullchain.pem
Key is saved at: /etc/letsencrypt/live/DOMAIN_NAME/privkey.pem
When using --nginx, Certbot automatically injects the paths into your Nginx configuration as ssl_certificate and ssl_certificate_key.
Start Langflow from the virtual environment.
a. Activate the virtual environment.
source langflow-venv/bin/activate
b. Start Langflow in the background.
uv run langflow run --host 127.0.0.1 --port 7860 &
To test the deployment, navigate to https://DOMAIN_NAME in your browser.
Verify the SSL certificate is working. Ensure the URL is https://, not http://.
Your browser's address bar should display a <Icon name="Lock" aria-hidden="true"/> Lock icon.
Click <Icon name="Lock" aria-hidden="true"/> Lock to view your SSL certificate details.