The Engine Behind SSL Automation

Everything you need for scalable, secure, and fully automated certificate management — built for modern enterprises.

Quick Look

  • Test it: supply an email address and a domain name, click “GO,” get a certificate. (free on GitHub)
  • Core payoff: hands-free issuance and frequent renewal of free TLS certificates at enterprise scale.
  • Minimal UI, config-first design: everything is controlled through a text config, highly automation-friendly.
  • Full command-line control: any setting - even an entire config - can be overridden with a CLI arg.
  • Hook points everywhere: every stage - request, install, bind - exposes hooks for custom tasks or policies.

Modular Architecture & Resilience

  • Executable is tiny yet modular, allowing many parallel, independent instances to run simultaneously.
  • Per-domain isolation ensures a problem in one configuration never affects others; deliberately non-monolithic.
  • Self-contained and resilient: regenerates missing files, uses no registry entries, and runs from a simple copy.
  • Upgrade-safe process preserves custom scripts and support files; configuration updates merge cleanly.
  • Single embedded dependency (ACME-PS) minimizes supply-chain risk and surprise library updates.

Protocols & Server Compatibility

  • Default protocol is ACME HTTP-01; switch to DNS-01 by flipping a config flag and pointing to a DNS script.
  • Full IIS integration: auto-discovers sites, port bindings, and IPs, then swaps old certs for newly issued ones.
  • Supports non-IIS servers: delivers certificates as PFX or PEM files to Apache, Caddy, Jetty, Nginx, Tomcat, etc.

Enterprise Integration & Distribution

  • Enterprise-wide distribution: publishes certificates to AWS Cert Manager, Azure Key Vault, Exchange, Linux, etc.
  • Secure certificate archives can be placed anywhere our agent runs on your network.
  • Certificate-status alerts can be directed to as many recipients as needed in your organization.
  • Customer dedicated, anonymous SCS instance, firewall-protected; agents authenticate via short-lived certs.

Controlled Deployment

  • Tiered update model: dev servers update first, then UAT, then production, preventing fleet-wide outages.
  • Granular configuration pushes: SCS targets all servers, selected groups, or a single host for precise change

Deep Dive

quick start

Quick Start

The out-of-the-box behavior of the AutoCert agent (AutoCert.exe) is simple and straightforward. Give it an email address and a domain name and click “GO”. That’s it! (free on GitHub)

Simple AutoCert agent UI.
The goal was to make it as easy as possible for anyone to get the software up and running fast.

Here's a log file showing the typical results after clicking "GO" (or running AutoCert.exe -Auto):

Configuration & Automation

The AutoCert agent was designed with the bare minimum UI and optimized for automation. To that end, everything is handled through simple text-based configuration. That said, there is an additional UI element you can see in the above screenshot. It is the "SAN List" button. There you can supply up to 99 more domain names to be included on your certificate.

The platform is highly configurable and fully automatable. Every setting can be overridden via command-line arguments. Even an entire agent configuration can be replaced with a single parameter. Because each configuration is isolated to one domain, an issue in one domain never affects the others; AutoCert is deliberately non-monolithic.

Every stage of certificate acquisition, installation, and binding is customizable. Configuration entries point to PowerShell script snippets that you can tailor. The above logfile’s “Stage x - …” entries illustrate these hooks, added automatically to configuration during the agent's first run.

Modular Architecture & Resilience

The software is both modular and scalable. The agent executable is smaller than most Android apps on your phone, enabling multiple instances to run concurrently and independently; if one instance stops, the others continue without interruption.

Also provided is a lightweight background host that handles as many AutoCert agent instances as you need, each running on its own schedule. The background host also handles configuration backups as well as log file rotation, all automatically and in accord with whatever domain specific maintenance windows you've defined. All of these SCS setup details (and much more) are handled for you by AutoCert staff and is included in your plummet subscription.

Resilience was built-in from day one. If you accidentally delete supporting files or logfile directories, the AutoCert agent regenerates them at runtime. You can even delete large chunks of configuration and the agent will still run fine anyway. It does this by automatically creating missing configuration from context specific default values. AutoCert.exe is also self-contained, it uses no registry entries, and can be copied (with or without support files) to another server and run immediately - no separate installer required.

One point regarding software updates (see also Controlled Deployment below), unlike rivals who juggle a dozen or more external libraries in their software, the AutoCert agent relies on just one - ACME-PS - bundled right into the agent executable. We rarely refresh this component - and only after exhaustive testing. So, you’re never exposed to surprise updates or shifting security risks from open source projects beyond your control (or ours).  In other words, you are never at the mercy of randomly updating external dependencies (see "Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library").

Protocols & Server Compatibility

By default, the agent uses the ACME “HTTP-01” challenge protocol to obtain free certificates from Let’s Encrypt. That's for public domains, which require the server to be internet-facing. For internal domains, simply switch to the “DNS-01” challenge and reference a script for your preferred DNS automation provider - your DNS credentials remain unknown to the agent.Here's the list of ACME capable certificate providers that AutoCert supports (if yours is not there, no problem, just give us your provider's ACME directory URL):

  • Buypass Go SSL
  • DigiCert
  • Google Trust Services
  • Let's Encrypt
  • Sectigo
  • ZeroSSL
  • ACME Directory URL
  • https://api.buypass.com/acme/directory
  • https://one.digicert.com/mpki/api/v1/acme/v2/directory
  • https://dv.acme-v02.api.pki.goog/directory
  • https://acme-v02.api.letsencrypt.org/directory
  • https://acme.sectigo.com/v2/DV
  • https://acme.zerossl.com/v2/DV90

Here's the list of DNS automation providers we supports (if yours is not there, no problem, a script snippet can be quickly AI generated):

  • AcmeDns
  • Azure
  • DNSimple
  • GoDaddy
  • Namecheap
  • Simple DNS Plus

Beyond certificate issuance, the agent also inventories IIS sites, IP addresses, and port bindings and automatically replaces expiring certificates with newly issued ones.The agent can also deliver certificates as PFX or PEM files to other web servers like Apache, Caddy, Jetty, Kestrel, Nginx, and Tomcat.

Enterprise Integration & Distribution

Distribution is not limited to web servers. Certificates can also be pushed to AWS Certificate Manager, Azure Key Vault, Microsoft Centralized Certificate Store, Exchange, Remote Desktop Services, load balancers, Linux hosts, and even SSH or SFTP tools on Windows. Any system that supports automated certificate ingestion (or at least PFX/PEM files) can integrate with AutoCert.

Additional SCS configuration is also completed by the AutoCert team. For example, let us know the contacts who should receive certificate-status notifications; organizations usually assign a separate recipient for each domain. If you would like on-site certificate archives for emergency use, let us know. Each archived certificate is secured with a unique, complex password that is never reused. To obtain a password, an authorized representative must request it from AutoCert. Because the retrieval is a manual, security-sensitive process, a $100 recovery fee applies.

The AutoCert SCS follows the same principles of simplicity, modularity and isolation as the AutoCert agent: each customer receives a dedicated and anonymous (GUID-based) SCS instance behind a firewall and accessible only to customer servers. Agents authenticate with the same short-lived domain certificates used by customer websites, eliminating static, maintenance-laden credentials and the risk of compromised security tokens.

Controlled Deployment

Agent updates are orchestrated by the SCS through tiered deployment. Development servers receive software updates first; after a week without issues, UAT servers are updated, followed by production a week later. This simple commonsense approach prevents large-scale outages like the 2024 CrowdStrike incident (see "2024 CrowdStrike-related IT outages").

Configuration updates are even more granular: the SCS can target all servers, specific domains, selected groups, or a single host, and these updates merge cleanly with any local modifications. A change affecting one domain is pushed only to that domain’s servers, enabling precise configuration management.

Competing solutions often purge the entire application directory during upgrades, wiping custom scripts. AutoCert always preserves existing support files (including custom scripts - no matter where they are located) as well as custom modifications to local configuration made by your staff.

Get Started