ACME
ACME
Certificates that renew themselves. The IETF standard for TLS automation.
SSL.com supports the ACME protocol (RFC 8555) — the industry-standard mechanism for fully automated TLS certificate issuance, renewal, and revocation. With certificate lifetimes now capped at 200 days and shortening further, ACME automation is moving from a convenience to a necessity.
The standard for automated certificate issuance and renewal
ACME (Automated Certificate Management Environment) is an IETF standard (RFC 8555) that allows ACME-compatible clients to automatically request, validate, issue, renew, and revoke TLS certificates from an ACME-capable CA — with no human interaction required after initial setup.
ACME is the protocol that powers automated certificate lifecycle management at scale. It defines the handshake between an ACME client and the CA — domain validation, certificate signing, renewal — so the entire flow can run unattended.
SSL.com is a fully ACME-compatible CA. Any ACME client — Certbot, ACME.sh, win-acme, Caddy, Traefik, and hundreds of others — can use SSL.com as its CA endpoint to issue and renew certificates automatically. Today, ACME issuance covers DV (Domain Validation) certificates; OV and EV issuance via ACME are coming soon — see the directory URL and roadmap below.
Why ACME is increasingly essential
⚠ Certificate lifetime context: Effective March 11, 2026, maximum TLS certificate lifetimes are 200 days. Apple has proposed reductions toward 47 days, with CA/B Forum approval already obtained.
- A team with 100 certificates faces ~183 renewal events per year
- Manual renewal at this frequency creates outage risk
- Operations teams without automation are already under significant pressure
- The same 100-certificate team faces ~777 renewal events per year
- Manual management becomes operationally impossible
- ACME automation becomes the only viable approach at scale
SSL.com supports ACME today. Configure once — renew automatically for the life of your infrastructure.
Key capabilities
Automated issuance
ACME clients request certificates from SSL.com automatically — no portal interaction required. Certificates are issued within seconds of the ACME handshake.Automated renewal
Certificates renew before expiry without human intervention — configured once, runs indefinitely. Works at 200-day and future 47-day certificate lifetimes.Automated revocation
Certificates can be revoked automatically when no longer needed, via the same ACME client that issued them.HTTP-01 challenge
Domain control validated via a file placed at a well-known URL. Works for most single-domain and SAN scenarios. Not available for wildcards.DNS-01 challenge
Domain control validated via a DNS TXT record. Required for wildcard certificates; enables validation without HTTP server access. Works behind firewalls.No rate limits
SSL.com imposes no issuance rate limits on ACME — scale to your needs without throttling, whether you manage dozens or hundreds of thousands of certificates.Multi-domain support
ACME orders can include multiple Subject Alternative Names (SANs) — issue and renew multi-domain certificates automatically.Validation levels
DV available today via ACME. OV and EV issuance via ACME — coming soon. Contact SSL.com for early access.Supported ACME clients
Certbot
ACME.sh
win-acme
Caddy & Traefik
cert-manager (K8s)
SSL.com ACME directory URL (DV — available today):
https://acme.ssl.com/sslcom-dv/directory🚧 Coming soon — OV and EV via ACME: Dedicated directory endpoints for OV and EV issuance are in development. Your existing ACME client will work against the new endpoints with no protocol-level changes. Contact SSL.com for early access and timing.
How to get started
Create an SSL.com account
Register at ssl.com — free, no payment required until certificate issuance.
Generate ACME credentials
Create ACME account credentials in your SSL.com dashboard.
Configure your ACME client
Set SSL.com as the CA in your ACME client (Certbot, ACME.sh, win-acme, Caddy, etc.).
Issue your first certificate
Run your ACME client — it will request, validate, and receive a certificate automatically.
Schedule renewals
Configure your ACME client to run automatically (via cron or systemd) — renewal happens without further intervention.
Challenge types
ACME client places a token file at http://yourdomain.com/.well-known/acme-challenge/TOKEN.
Use when: Your server is publicly accessible on port 80. Works for single-domain and SAN certs. Not available for wildcards.
ACME client creates a _acme-challenge.yourdomain.com DNS TXT record.
Use when: Your DNS provider supports programmatic TXT record creation. Required for wildcard certs. Works without HTTP server access.