Certificates in the Web's X.509 PKI (PKIX) are used for a number of purposes, the most significant of which is the authentication of DNS Domain. Thus, Certificate Authorities in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the DNS Domain name(s) in the certificate. Today, this verification is done through a collection of Ad Hoc mechanisms. Automatic Certificate Management Environment describes a protocol that a Certificate Authority (CA) and an applicant can use to automate the process of verification and Certificate Request Process. The protocol also provides facilities for other certificate management functions, such as certificate Revocation.
Thus, certificate authorities in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the DNS Domain name(s) in the certificate.
Existing Web PKI certificate authorities tend to run on a set of Ad Hoc protocols for certificate issuance and identity Proofing. A typical user experience is something like:
With the exception of the Certificate Signing Request itself and the certificates that are issued, these are all completely Ad Hoc procedures and are accomplished by getting the human user to follow interactive natural-language instructions from the CA rather than by machine-to-machine protocols. In many cases, the instructions are difficult to follow and cause significant confusion. Informal usability tests by the authors indicate that webmasters often need 1-3 hours to obtain and install a certificate for a DNS Domain. Even in the best case, the lack of published, standardized mechanisms presents an obstacle to the wide deployment of HTTPS and other PKIX-dependent systems because it inhibits mechanization of tasks related to certificate issuance, deployment, and revocation.
Automatic Certificate Management Environment describes an extensible framework for automating the issuance and DNS Domain validation procedure, thereby allowing servers and infrastructural software to obtain certificates without user interaction. Use of this protocol should radically simplify the deployment of HTTPS and the practicality of PKIX authentication for other protocols based on TLS.