You will be sent a tracking number when your shipping label prints, please allow up to 12 hours for tracking information to be updated. Note: Orders shipped 1st class USPS will not have a tracking number
What if my tracking number doesn\u2019t work?
Confirmation is sent when your shipping label is printed, please allow time for this information to be processed. Please see Shipping & Delivery section for more.
How do I become a stockist?
If you would like to be considered, please email in...@manual.is. Please include a link to your website, other brands carried, pictures of your store and the products desired. We will review your store and respond within 1\u20133 days.
What if I\u2019m experiencing issues with your website?
If you are having trouble checking out or other website issues please call us at: 773-255-8594 or email us at in...@manual.is. We will respond to you as quickly as possible. Make sure your browser is up to date before contacting Manual.
We collect information from you when you register on our site, place an order or subscribe to our newsletter. When ordering or registering on our site, as appropriate, you may be asked to enter your: name, e-mail address, mailing address, phone number or credit card information. You may, however, visit our site anonymously.
Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
The email address you provide for order processing, will only be used to send you information and updates pertaining to your order. Note: If at any time you would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email.
This 2016 edition modernizes the prior manual interpreting those laws. The manual includes summaries of and links to relevant statutes, court decisions, formal Attorney General Opinions, and Public Records Act Model Rules.
My office produced this manual with the assistance of attorneys representing media and requesters, and local and state government organizations. If you have questions or comments about the contents of this manual, please fill out this Contact Form.
Kristal Wiitala, Information Governance Manager for the Department of Revenue. Ms. Wiitala was previously the Public Records Officer for the Department of Social and Health Services.
Obtaining a certificate: automatically performing the required authentication steps to prove that you control the domain(s),saving the certificate to /etc/letsencrypt/live/ and renewing it on a regular schedule.
Optionally, installing that certificate to supported web servers (like Apache or nginx) and other kinds of servers. This isdone by automatically modifying the configuration of your server in order to use the certificate.
To perform these tasks, Certbot will ask you to choose from a selection of authenticator and installer plugins. The appropriatechoice of plugins will depend on what kind of server software you are running and plan to use your certificates with.
The Apache plugin currently supportsmodern OSes based on Debian, Fedora, SUSE, Gentoo, CentOS and Darwin.This automates both obtaining and installing certificates on an Apachewebserver. To specify this plugin on the command line, simply include--apache.
Note that to use the webroot plugin, your server must be configured to servefiles from hidden directories. If /.well-known is treated specially byyour webserver configuration, you might need to modify the configurationto ensure that files inside /.well-known/acme-challenge are served bythe webserver.
Under Windows, Certbot will generate a web.config file, if one does not already exist,in /.well-known/acme-challenge in order to let IIS serve the challenge files even if theydo not have an extension.
The Nginx plugin should work for most configurations. We recommend backing upNginx configurations before using it (though you can also revert changes toconfigurations with certbot --nginx rollback). You can use it by providingthe --nginx flag on the commandline.
By default, Certbot first attempts to bind to the port for all interfaces usingIPv6 and then bind to that port using IPv4; Certbot continues so long as atleast one bind succeeds. On most Linux systems, IPv4 traffic will be routed tothe bound IPv6 port and the failure during the second bind is expected.
These plugins are not included in a default Certbot installation and must beinstalled separately. They are available in many OS package managers, as Dockerimages, and as snaps. Visit to learn the best way touse the DNS plugins on your system.
When using the dns challenge, certbot will ask you to place a TXT DNSrecord with specific contents under the domain name consisting of the hostnamefor which you want a certificate issued, prepended by _acme-challenge.
Certificates created using --manual do not support automatic renewal unlesscombined with an authentication hook script via --manual-auth-hookto automatically set up the required HTTP and/or TXT challenges.
To manually renew a certificate using --manual without hooks, repeat the samecertbot --manual command you used to create the certificate originally. As thiswill require you to copy and paste new HTTP files or DNS TXT records, the commandcannot be automated with a cron job.
Sometimes you may want to specify a combination of distinct authenticator andinstaller plugins. To do so, specify the authenticator plugin with--authenticator or -a and the installer plugin with --installer or-i.
If a certificate is requested with run or certonly specifying acertificate name that already exists, Certbot updatesthe existing certificate. Otherwise a new certificateis created and assigned the specified name.
--duplicate tells Certbot to create a separate, unrelated certificatewith the same domains as an existing certificate. This certificate issaved completely separately from the prior one. Most users will notneed to issue this command in normal circumstances.
--expand tells Certbot to update an existing certificate with a newcertificate that contains all of the old domains and one or more additionalnew domains. With the --expand option, use the -d option to specifyall existing domains and one or more new domains.
--allow-subset-of-names tells Certbot to continue with certificate generation ifonly some of the specified domain authorizations can be obtained. This maybe useful if some domains specified in a certificate no longer point at thissystem.
Whenever you obtain a new certificate in any of these ways, the newcertificate exists alongside any previously obtained certificates, whetheror not the previous certificates have expired. The generation of a newcertificate counts against several rate limits that are intended to preventabuse of the ACME protocol, as describedhere.
The --cert-name flag can also be used to modify the domains a certificate contains,by specifying new domains using the -d or --domains flag. If certificate example.compreviously contained example.com and www.example.com, it can be modified to onlycontain example.com by specifying only example.com with the -d or --domains flag. Example:
As of version 2.0.0, Certbot defaults to ECDSA secp256r1 (P-256) certificate private keysfor all new certificates. Existing certificates will continue to renew using their existing keytype, unless a key type change is requested.
The type of key used by Certbot can be controlled through the --key-type option.You can use the --elliptic-curve option to control the curve used in ECDSAcertificates and the --rsa-key-size option to control the size of RSA keys.
If you obtain certificates using ECDSA keys, you should be carefulnot to downgrade to a Certbot version earlier than 1.10.0 where ECDSA keys werenot supported. Downgrades like this are possible if you switch from something likethe snaps or pip to packages provided by your operating system which often lag behind.
After revocation, Certbot will (by default) ask whether you want to delete the certificate.Unless deleted, Certbot will try to renew revoked certificates the next time certbot renew runs.
You can also specify the reason for revoking your certificate by using the reason flag.Reasons include unspecified which is the default, as well as keycompromise,affiliationchanged, superseded, and cessationofoperation:
Deleting a certificate without following the proper steps can result in a non-functioning server. To safely delete acertificate, follow all the steps below to make sure that references to a certificate are removed from the configurationof any installed server software (Apache, nginx, Postfix, etc) before deleting the certificate.
You will need a self-signed certificate to replace the certificate you are deleting. The following command will generate onefor you, saving the certificate at /etc/letsencrypt/self-signed-cert.pem and its private key at/etc/letsencrypt/self-signed-privkey.pem:
This command attempts to renew any previously-obtained certificates thatexpire in less than 30 days. The same plugin and options that were usedat the time the certificate was originally issued will be used for therenewal attempt, unless you specify other plugins or options. Unlike certonly, renew acts onmultiple certificates and always takes into account whether each one is nearexpiry. Because of this, renew is suitable (and designed) for automated use,to allow your system to automatically renew each certificate when appropriate.Since renew only renews certificates that are near expiry it can berun as frequently as you want - since it will usually take no action.
The renew command includes hooks for running commands or scripts before or after a certificate isrenewed. For example, if you have a single certificate obtained usingthe standalone plugin, you might need to stop the webserverbefore renewing so standalone can bind to the necessary ports, andthen restart it after the plugin is finished. Example: