From e2826c1c67bab707f0b824000e9e95df9439e641 Mon Sep 17 00:00:00 2001 From: Kapil Agrawal <7047165+netops2devops@users.noreply.github.com> Date: Thu, 16 Apr 2026 19:31:05 -0500 Subject: [PATCH] github pages with Hugo static site docs --- docs/content/_index.md | 6 ++++-- docs/public/index.html | 27 ++++++++++++++++----------- docs/public/sitemap.xml | 2 +- 3 files changed, 21 insertions(+), 14 deletions(-) diff --git a/docs/content/_index.md b/docs/content/_index.md index abc5076..f253f08 100644 --- a/docs/content/_index.md +++ b/docs/content/_index.md @@ -6,7 +6,9 @@ title = 'ACME Proxy' `acme-proxy` is a standalone ACME server built on [step-ca](https://github.com/smallstep/certificates) that operates in [registration authority (RA)](https://smallstep.com/docs/registration-authorities/) mode. It runs as a standalone server inside your enterprise environment, acting as an intermediary between your internal infrastructure and an external certificate authority service (such as Sectigo). It accepts certificate orders and validates certificate requests using the ACME protocol (RFC 8555), but does **NOT** sign certificates or store private keys. -**Certificate Request Flow:** +{{< image src="/assets/highlevel-flow.png" alt="sequence" >}} + +# Certificate Request Flow 1. Your internal server (behind a firewall perimeter) requests a certificate from `acme-proxy` using standard ACME clients like certbot, acme.sh or cert-manager.io if you're using Kubernetes. 2. `acme-proxy` presents cryptographic challenges to verify domain ownership @@ -14,4 +16,4 @@ title = 'ACME Proxy' 4. The external CA signs the certificate 5. `acme-proxy` retrieves the certificate bundle and returns it to your server -{{< image src="../assets/highlevel-flow.png" alt="sequence" >}} +{{< image src="/assets/sequence.png" alt="sequence" >}} diff --git a/docs/public/index.html b/docs/public/index.html index c424685..4377b22 100644 --- a/docs/public/index.html +++ b/docs/public/index.html @@ -10,23 +10,22 @@ +Certificate Request Flow# Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes. acme-proxy presents cryptographic challenges to verify domain ownership Once validation succeeds, acme-proxy forwards the certificate signing request to your external CA using External Account Binding (EAB) The external CA signs the certificate acme-proxy retrieves the certificate bundle and returns it to your server "> +Certificate Request Flow# Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes. acme-proxy presents cryptographic challenges to verify domain ownership Once validation succeeds, acme-proxy forwards the certificate signing request to your external CA using External Account Binding (EAB) The external CA signs the certificate acme-proxy retrieves the certificate bundle and returns it to your server"> - +Certificate Request Flow# Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes. acme-proxy presents cryptographic challenges to verify domain ownership Once validation succeeds, acme-proxy forwards the certificate signing request to your external CA using External Account Binding (EAB) The external CA signs the certificate acme-proxy retrieves the certificate bundle and returns it to your server"> + ACME Proxy | ACME Proxy @@ -228,6 +227,7 @@

ACME Proxy

@@ -242,7 +242,11 @@

ACME Proxy

What is ACME Proxy?#

acme-proxy is a standalone ACME server built on step-ca that operates in registration authority (RA) mode. It runs as a standalone server inside your enterprise environment, acting as an intermediary between your internal infrastructure and an external certificate authority service (such as Sectigo). It accepts certificate orders and validates certificate requests using the ACME protocol (RFC 8555), but does NOT sign certificates or store private keys.

-

Certificate Request Flow:

+ +

Certificate Request Flow#

  1. Your internal server (behind a firewall perimeter) requests a certificate from acme-proxy using standard ACME clients like certbot, acme.sh or cert-manager.io if you’re using Kubernetes.
  2. acme-proxy presents cryptographic challenges to verify domain ownership
  3. @@ -250,9 +254,9 @@

    ACME Proxy

  4. The external CA signs the certificate
  5. acme-proxy retrieves the certificate bundle and returns it to your server
-
@@ -263,9 +267,9 @@

ACME Proxy

- + Calendar - April 12, 2026 + April 16, 2026
@@ -318,6 +322,7 @@

ACME Proxy

diff --git a/docs/public/sitemap.xml b/docs/public/sitemap.xml index 5b41bd5..cee2b3d 100644 --- a/docs/public/sitemap.xml +++ b/docs/public/sitemap.xml @@ -21,7 +21,7 @@ 2026-04-12T20:08:41-05:00 http://localhost:1313/ - 2026-04-12T20:08:41-05:00 + 2026-04-16T18:55:01-05:00 http://localhost:1313/categories/