Bandwith and CPU resources aside, there's no real problem with it.
If you wish to add authentication in front of acme-dns, you could for example use a reverse Nginx proxy and set up basic authentication in it. That will require slight modifications to the hook script however.
Firewall rules are probably the best way to restrict the API access, if you control a somewhat static set of potential clients.
I have been following this thread since I got a reply in another thread from danb35.
Iāve been able to manually acquire my wildcard ssl cert thanks to everyoneās help so far but I need to get this working using acme-dns as there are many wildcard ssl certs to get and itās not practical to manually get and update the txt records every 60 days for all the domains.
BUT⦠What I canāt grasp still for this automatic acme-dns method is where in the procedure does LE letās me know what the txt record it is looking for so I can post the credentials and txt to my acme-dns server.
I must be missing something fundamentally simple and itās in front of my nose and I canāt see it.
Do I manually get the txt record necessary and use that to update the acme-dns instance BUT⦠that would defeat the automatic part of updating it.
The idea is that you also run a Letās Encrypt client application like Certbot. The Letās Encrypt client receives the details of the TXT record that the CA wants to have created via the ACME protocol.
With Certbot, this can be used with something like
to then make the necessary updates in acme-dns. After all, acme-dns is not an alternative to a Letās Encrypt client like Certbot; itās a complement to the Letās Encrypt client that exists in order to let it perform a DNS-01 challenge without having a separate DNS provider that supports API-based TXT record updates.