Port 8443 — Alternative HTTPS

Port 8443 is the unofficial alternative to HTTPS port 443 — the same relationship that port 8080 has to HTTP port 80. It's used when an application needs HTTPS but can't bind to port 443 because: (1) the process lacks root privileges required for ports below 1024 on Linux, (2) another service already holds port 443, or (3) the application runs as a non-privileged service on a shared system.

Unlike port 8080 (which is pervasive across web frameworks), port 8443 is more specific — it appears most commonly in Java application servers, enterprise web UIs, NAS admin panels, and container management tools. When you see https://localhost:8443, expect a self-signed certificate warning — almost every application on this port uses a self-signed cert by default.

Alternative HTTPS: localhost:8443

What Uses Port 8443

SoftwareWhy 8443?URL Pattern
Apache TomcatJava servlet container — 8443 is Tomcat's default HTTPS connector alongside HTTP on 8080https://localhost:8443
Portainer CEDocker management UI — 8443 for HTTPS, 9000 for HTTPhttps://localhost:9443 (newer) or 8443 (older)
UniFi Network ApplicationHTTPS for the self-hosted UniFi controllerhttps://localhost:8443
Synology NAS DSMHTTPS admin panel when HTTPS port configured to 8443https://[nas-ip]:8443
JenkinsCI/CD server HTTPS when configured as non-root servicehttps://localhost:8443
VMware vSphere / ESXiManagement HTTPS alternate port in some configurationshttps://[esxi-host]:8443
WildFly / JBossJava EE application server HTTPS management consolehttps://localhost:8443
Proxmox VEHypervisor web management (standard port is 8006, but 8443 in some configs)https://[host]:8443

Self-Signed Certificate Warning

Applications on port 8443 almost universally serve a self-signed TLS certificate — one they generated themselves, not signed by a trusted Certificate Authority. Your browser doesn't trust self-signed certificates by default and shows a security warning. This is expected behavior for local admin UIs, not an actual security threat on your own network.

To proceed past the warning: click Advanced (or "Show details") then Proceed to localhost (unsafe) in Chrome, or Accept the Risk and Continue in Firefox. The connection is still encrypted — the warning is about certificate authority trust, not about the encryption itself.

Apache Tomcat — Port 8443 Configuration

Tomcat's default HTTPS connector uses port 8443 alongside HTTP on 8080. In conf/server.xml:

<!-- Uncomment and configure this connector for HTTPS on 8443 -->
<Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol"
           maxThreads="150" SSLEnabled="true">
    <SSLHostConfig>
        <Certificate certificateKeystoreFile="conf/localhost-rsa.jks"
                     type="RSA" />
    </SSLHostConfig>
</Connector>

UniFi Network Application

The self-hosted UniFi Network Application (for managing Ubiquiti APs without a Dream Machine) runs HTTPS on port 8443. Access at https://localhost:8443 — accept the self-signed cert warning. Newer versions of UniFi are migrating to different ports; check your version's documentation.

# Docker install
docker run -d --name unifi \
  -p 8443:8443 \
  -p 3478:3478/udp \
  -p 10001:10001/udp \
  -v unifi_data:/config \
  lscr.io/linuxserver/unifi-network-application

Nginx Reverse Proxy to Move 8443 → 443

If you want to access a service on 8443 at a clean https:// URL on port 443, proxy it through Nginx with a real certificate:

server {
    listen 443 ssl;
    server_name myapp.local;
    ssl_certificate /path/to/cert.pem;
    ssl_certificate_key /path/to/key.pem;

    location / {
        proxy_pass https://localhost:8443;
        proxy_ssl_verify off;  # Because backend uses self-signed cert
    }
}

Troubleshooting

ProblemFix
Browser blocks self-signed cert entirelyIn Chrome: type thisisunsafe anywhere on the warning page (bypasses it)
Port 8443 refused — nothing listeningThe service is configured but not running, or HTTPS isn't enabled in its config
UniFi controller "Adoption failed"AP must be able to reach the controller at port 8080 (inform) and 8443 — check firewall rules
Find what's using 8443sudo lsof -i :8443 (Linux/Mac)  |  netstat -ano | findstr :8443 (Windows)