| ▲ | Koffiepoeder 3 hours ago | |
Can confirm. Have encountered many on-prem and lift-and-shift solutions with no automated means of updating certs. The worst contenders are usually 1) executables on windows server (version 2012, of course), 2) old, obscure or very outdated database servers and 3) custom hardware firewalls. They are the worst. To make things easy they usually all use different cert formats as well, requiring you to have an arsenal of conversion scripts ready. | ||
| ▲ | bigfatkitten 2 hours ago | parent | next [-] | |
> 3) custom hardware firewalls. In this case, “custom” means firewalls made by pretty much any of the major vendors. Cisco, Juniper, Fortinet and Palo Alto have a lot to answer for with their laziness. Cisco and Fortinet added support only recently. Palo and Juniper haven’t bothered at all. | ||
| ▲ | ocdtrekkie 2 hours ago | parent | prev [-] | |
Even plain IIS still doesn't support ACME on Windows Server 2025 without you grabbing some random scripts off the Internet written by people you don't know. But yeah a lot of Windows server software uses inbuilt web servers with no ability to tweak or tamper beyond what the application exposes in its own settings panel. | ||