Windows Server 2008 R2 can work with several Windows ACME clients.
See: ACME Client Implementations - Let's Encrypt (letsencrypt.org)
Which can be configured to run in standalone mode (without IIS) and/or use DNS authentication to obtain an LE cert.
Binding the cert to the public IP and port number (i.e. using the cert), is a function of the app and you would have to read their documentation on how to do so.
Ideally any workload should to be moved to a newer server. In some case you can hide the server behind a proxy so that the front end service is not directly vulnerable but this doesn't prevent all potential hacks etc.
Yes, that is on the current list of projects for the client. COVID kind of put a halt to a lot of things going on LOL.
the server is actually not front facing. all ports are closed and they have 2 site-site vpns running between locations. i am also implementing a new router so that this particular function that they are requesting only comes from 1 IP address. They need the SSL cert for the CYA scenario in case anything were to happen.
Cool, use DNS validation and either Certify The Web (https://certifytheweb.com - the app I develop, Server 2008 R2 not supported but you might still get it working OK assuming you have .net 4.6.2 or higher, I'm assuming it's SP1) or win-acme.
These apps will provide automatic renewal and deployment to the IIS install on the machine. Other tools are available but don't always know how to configure certs automatically on IIS without extra steps.
Ok so i do need to have IIS installed on the server then. i was told by the software company that is requesting the SSL cert that the SSL needs to be tied to the ip address and the port assignment they want. i asked them if they were using IIS and they said no, their API is running as a service on the server. This is where i got confused.
If you are to use HTTP authentication without --standalone option.
But there may be a way to do both within the ACME client itself (without the need for IIS).
Actually I was wrong to mention IIS because as you stated it's not used here. No those tools don't need IIS and by default they both have a standalone http validation mode (their own temporary web server, but you do need tcp port 80 open for that to work and your app server may need to be temporarily stopped if it uses port 80, depending on what it is). Certify also has a wide range of DNS validation options as an alternative to use http validation.