ACME Server Beta

RFC 8555-compliant ACME server with FIPS 140-3 validated classical cryptography and FIPS 204-conformant post-quantum signatures.

Private CA — Certificates chain to the Quantum Nexum Root CA and are not publicly trusted. Install the CA Bundle to trust issued certificates.

ACME Server

RFC 8555-compliant ACME server issuing ML-DSA (FIPS 204) certificates from the Quantum Nexum PKI hierarchy.

ACME Client

Standalone client for requesting post-quantum certificates. Works with our server or any ACME-compatible CA.

ACME Server

The Quantum Nexum ACME server implements RFC 8555 (ACME protocol) with extensions for post-quantum algorithms. Certificates are issued from our live PKI infrastructure using ML-DSA-65 (NIST Level 3).

Supported Algorithms

AlgorithmStandardLevelStatus
ECDSA P-256FIPS 186-5Available
ECDSA P-384FIPS 186-5Available
ECDSA P-521FIPS 186-5Available
RSA 2048–4096FIPS 186-5Available
Ed25519RFC 8032Available
ML-DSA-44FIPS 204Level 2Available
ML-DSA-65FIPS 204Level 3Default (PQC)
ML-DSA-87FIPS 204Level 5Available

Cryptographic Validation

Classical cryptoFIPS 140-3 validated via aws-lc-rs (AWS-LC FIPS Module, NIST Certificate #4816, Level 1)
Post-quantum cryptoFIPS 204 specification-conformant (ML-DSA). Not yet FIPS 140-3 validated.
Trust modelPrivate CA. Not publicly trusted. Install QN CA Bundle.

Validation Methods

ACME Client

Our standalone ACME client handles the full certificate lifecycle—account registration, domain validation, certificate issuance, and renewal. Built with post-quantum support from the ground up.

Features

Server Endpoints

EndpointURL
Directoryhttps://acme.quantumnexum.com/directory
New Noncehttps://acme.quantumnexum.com/acme/new-nonce
New Accounthttps://acme.quantumnexum.com/acme/new-acct
New Orderhttps://acme.quantumnexum.com/acme/new-order
Revoke Certhttps://acme.quantumnexum.com/acme/revoke-cert
Key Changehttps://acme.quantumnexum.com/acme/key-change

Quick Start

Using certbot

# Register account
certbot register --server https://acme.quantumnexum.com/directory

# Request certificate
certbot certonly --standalone \
  --server https://acme.quantumnexum.com/directory \
  -d quantumnexum.com

Using SPORK CLI

# Register account
spork acme register \
  --email admin@quantumnexum.com \
  --server https://acme.quantumnexum.com/directory

# Order certificate
spork acme order quantumnexum.com www.quantumnexum.com

Trust Chain

Certificates are issued by the Quantum Nexum TLS Issuing CA, chaining to our ML-DSA root. For browsers and clients to trust these certificates, install the CA Bundle.

Deployment Modes

ModeDescription
Standalone 2-TierRoot CA + Issuing CA
Standalone 3-TierRoot CA + Policy CA + Issuing CA
Windows CA SubordinateIssuing CA subordinate to existing AD CS root
Windows CA BridgeCross-certification with AD CS via WinRM
Import PFXImport existing CA key material from PKCS#12

Rate Limits

LimitValue
Certificates per domain50 / week
Failed validations5 / hour
New registrations10 / hour per IP

Additional protections may apply. Rate limits are subject to change.

Security

Report vulnerabilities to security@quantumnexum.com.

Questions? Contact pki@quantumnexum.com