Posh-ACME.net46

4.24.0

ACME protocol client for obtaining certificates using Let''s Encrypt (or other ACME compliant CA)
This is a custom build intended allow compatibility with .NET 4.6.1. It should not be used with PowerShell Core and you should only attempt to use RSA based key options.

Minimum PowerShell version

5.1

Installation Options

Copy and Paste the following command to install this package using PowerShellGet More Info

Install-Module -Name Posh-ACME.net46 -RequiredVersion 4.24.0

Copy and Paste the following command to install this package using Microsoft.PowerShell.PSResourceGet More Info

Install-PSResource -Name Posh-ACME.net46 -Version 4.24.0

You can deploy this package directly to Azure Automation. Note that deploying packages with dependencies will deploy all the dependencies to Azure Automation. Learn More

Manually download the .nupkg file to your system's default download location. Note that the file won't be unpacked, and won't include any dependencies. Learn More

Owners

Copyright

(c) 2018 Ryan Bolger. All rights reserved.

Package Details

Author(s)

  • Ryan Bolger

Tags

LetsEncrypt ssl tls certificates acme

Functions

Complete-PAOrder Export-PAAccountKey Get-KeyAuthorization Get-PAAccount Get-PAAuthorization Get-PACertificate Get-PAOrder Get-PAPlugin Get-PAPluginArgs Get-PAServer Install-PACertificate Invoke-HttpChallengeListener New-PAAccount New-PACertificate New-PAOrder New-PAAuthorization Publish-Challenge Remove-PAAccount Remove-PAOrder Remove-PAServer Revoke-PAAuthorization Revoke-PACertificate Save-Challenge Send-ChallengeAck Set-PAAccount Set-PAOrder Set-PAServer Submit-ChallengeValidation Submit-OrderFinalize Submit-Renewal Unpublish-Challenge

PSEditions

Desktop Core

Dependencies

This module has no dependencies.

Release Notes

## 4.24.0 (2024-06-19)

* DomainOffensive plugin updated with new API root and documentation links. (Thanks @henrikalves)
* Added [ARI (ACME Renewal Information)](https://datatracker.ietf.org/doc/draft-ietf-acme-ari/) support based on draft 03. This should be considered experimental until the RFC is finalized.
 * `ARIId` and `Serial` fields have been added to the output of `Get-PACertificate`
 * `DisableARI` switch added to `Set-PAServer` which disables ARI support for the server even it would otherwise be supported. This will primarily be useful if the ARI draft changes enough to break the current support and CAs update their implementations before the module can be updated. It may also be useful for providers with existing ARI support from an older unsupported draft.
 * `ReplacesCert` parameter added to `New-PAOrder` which takes an ARIId string as returned by `Get-PACertificate`. This will be ignored if the current ACME server doesn't support ARI or support has been explicitly disabled via `Set-PAServer`.
 * Order refreshes now perform an ARI check if supported and not disabled. The `RenewAfter` field is updated if the response indicates it is necessary.
 * `Submit-Renewal` now triggers an order refresh if ARI is supported and not disabled.

FileList

Version History

Version Downloads Last updated
4.26.0 8 11/2/2024
4.25.1 22 9/3/2024
4.25.0 8 8/18/2024
4.24.0 (current version) 9 6/19/2024
4.23.1 9 5/23/2024
4.23.0 7 5/4/2024
4.22.0 8 4/13/2024
4.21.0 16 3/8/2024
4.20.0 29 12/13/2023
4.19.0 16 8/26/2023
4.18.0 12 6/28/2023
4.17.1 22 3/29/2023
4.17.0 19 2/21/2023
4.16.0 22 11/23/2022
4.15.1 26 9/9/2022
4.15.0 15 8/27/2022
4.14.0 55 4/13/2022
4.13.1 25 3/14/2022
4.13.0 25 3/7/2022
4.12.0 75 1/14/2022
4.11.0 56 11/24/2021
4.10.0 46 10/6/2021
4.9.0 38 9/21/2021
4.8.1 24 9/12/2021
4.8.0 19 9/10/2021
4.7.1 27 8/28/2021
4.7.0 20 8/24/2021
4.6.0 38 7/26/2021
4.5.0 35 5/29/2021
4.4.0 33 5/3/2021
4.3.2 33 3/14/2021
4.3.1 18 3/12/2021
4.3.0 26 2/24/2021
4.2.0 31 2/1/2021
4.1.0 29 1/18/2021
4.0.0 28 12/19/2020
3.20.0 31 11/25/2020
3.19.0 26 11/20/2020
3.18.1 23 11/12/2020
3.18.0 19 11/8/2020
3.17.0 17 10/9/2020
3.16.1 24 9/1/2020
3.15.1 42 7/8/2020
3.15.0 28 6/23/2020
3.14.0 38 5/7/2020
3.13.0 71 4/11/2020
3.12.0 107 12/10/2019
3.11.0 47 11/12/2019
3.10.0 25 11/6/2019
3.9.0 30 10/26/2019
3.8.0 36 9/27/2019
3.7.0 25 9/18/2019
3.6.0 43 8/20/2019
3.5.0 4,140 6/21/2019
3.4.0 53 4/30/2019
3.3.0 31 3/24/2019
3.2.1 37 3/4/2019
3.2.0 38 1/22/2019
3.1.1 1,005 12/22/2018
3.1.0 21 12/16/2018
3.0.1 46 11/30/2018
3.0.0 46 11/13/2018
2.9.1 24 10/26/2018
2.9.0 28 10/6/2018
2.8.0 171 9/12/2018
2.7.1 21 8/30/2018
2.7.0 29 8/12/2018
2.6.0 20 8/1/2018
2.5.0 29 7/13/2018
Show more