# RFC 8555 - Automatic Certificate Management Environment (ACME) <https://tools.ietf.org/html/rfc8555> * [x] Introduction * [ ] Deployment Model and Operator Experience * [ ] Terminology * [ ] Protocol Overview * [ ] Character Encoding * [ ] Message Transport * [ ] HTTPS Requests * [ ] Request Authentication * [ ] GET and POST-as-GET Requests * [ ] Request URL Integrity * [ ] "url" (URL) JWS Header Parameter * [ ] Replay Protection * [ ] Replay-Nonce * [ ] "nonce" (Nonce) JWS Header Parameter * [ ] Rate Limits * [ ] Errors * [ ] Subproblems * [ ] Certificate Management * [ ] Resources * [ ] Directory * [ ] Account Objects * [ ] Order Objects * [ ] Authorization Objects * [ ] Challenge Objects * [ ] Status Changes * [ ] Getting a Nonce * [ ] Account Management * [ ] Finding an Account URL Given a Key * [ ] Account Update * [ ] Changes of Terms of Service * [ ] External Account Binding * [ ] Account Key Rollover * [ ] Account Deactivation * [ ] Applying for Certificate Issuance * [ ] Pre-authorization * [ ] Downloading the Certificate * [ ] Identifier Authorization * [ ] Responding to Challenges * [ ] Deactivating an Authorization * [ ] Certificate Revocation * [x] Identifier Validation Challenges * [x] Key Authorizations * [x] Retrying Challenges * [x] HTTP Challenge * [x] DNS Challenge * [ ] IANA Considerations * [ ] Media Type: application/pem-certificate-chain * [ ] Well-Known URI for the HTTP Challenge * [ ] Replay-Nonce HTTP Header * [ ] "url" JWS Header Parameter * [ ] "nonce" JWS Header Parameter * [ ] URN Sub-namespace for ACME (urn:ietf:params:acme) * [ ] New Registries * [ ] Fields in Account Objects * [ ] Fields in Order Objects * [ ] Fields in Authorization Objects * [ ] Error Types * [ ] Resource Types * [ ] Fields in the "meta" Object within a Directory Object * [ ] Identifier Types * [ ] Validation Methods * [ ] Security Considerations * [ ] Threat Model * [ ] Integrity of Authorizations * [ ] Denial-of-Service Considerations * [ ] Server-Side Request Forgery * [ ] CA Policy Considerations * [ ] Operational Considerations * [ ] Key Selection * [ ] DNS Security * [ ] Token Entropy * [ ] Malformed Certificate Chains * [ ] References * [ ] Normative References * [ ] Informative References