[{"data":1,"prerenderedAt":170},["ShallowReactive",2],{"navigation_docs":3,"landing":82},[4,22,31,48,65],{"title":5,"path":6,"stem":7,"children":8,"page":21},"Api","\u002Fdocs\u002Fapi","docs\u002Fapi",[9,13,17],{"title":10,"path":11,"stem":12},"CLI Reference","\u002Fdocs\u002Fapi\u002Fcli-reference","docs\u002Fapi\u002F1.cli-reference",{"title":14,"path":15,"stem":16},"ACME Endpoints","\u002Fdocs\u002Fapi\u002Facme-endpoints","docs\u002Fapi\u002F2.acme-endpoints",{"title":18,"path":19,"stem":20},"Error Reference","\u002Fdocs\u002Fapi\u002Ferror-reference","docs\u002Fapi\u002F3.error-reference",false,{"title":23,"path":24,"stem":25,"children":26,"page":21},"Community","\u002Fdocs\u002Fcommunity","docs\u002Fcommunity",[27],{"title":28,"path":29,"stem":30},"Contributing","\u002Fdocs\u002Fcommunity\u002Fcontributing","docs\u002Fcommunity\u002F1.contributing",{"title":32,"path":33,"stem":34,"children":35,"page":21},"Concepts","\u002Fdocs\u002Fconcepts","docs\u002Fconcepts",[36,40,44],{"title":37,"path":38,"stem":39},"Architecture","\u002Fdocs\u002Fconcepts\u002Farchitecture","docs\u002Fconcepts\u002F1.architecture",{"title":41,"path":42,"stem":43},"ACME Implementation","\u002Fdocs\u002Fconcepts\u002Facme-implementation","docs\u002Fconcepts\u002F2.acme-implementation",{"title":45,"path":46,"stem":47},"Security Model","\u002Fdocs\u002Fconcepts\u002Fsecurity-model","docs\u002Fconcepts\u002F3.security-model",{"title":49,"path":50,"stem":51,"children":52,"page":21},"Getting Started","\u002Fdocs\u002Fgetting-started","docs\u002Fgetting-started",[53,57,61],{"title":54,"path":55,"stem":56},"Introduction","\u002Fdocs\u002Fgetting-started\u002Fintroduction","docs\u002Fgetting-started\u002F1.introduction",{"title":58,"path":59,"stem":60},"Installation","\u002Fdocs\u002Fgetting-started\u002Finstallation","docs\u002Fgetting-started\u002F2.installation",{"title":62,"path":63,"stem":64},"Quick Start","\u002Fdocs\u002Fgetting-started\u002Fquick-start","docs\u002Fgetting-started\u002F3.quick-start",{"title":66,"path":67,"stem":68,"children":69,"page":21},"Guides","\u002Fdocs\u002Fguides","docs\u002Fguides",[70,74,78],{"title":71,"path":72,"stem":73},"Docker Deployment","\u002Fdocs\u002Fguides\u002Fdocker-deployment","docs\u002Fguides\u002F1.docker-deployment",{"title":75,"path":76,"stem":77},"Traefik Integration","\u002Fdocs\u002Fguides\u002Ftraefik-integration","docs\u002Fguides\u002F2.traefik-integration",{"title":79,"path":80,"stem":81},"mTLS Admin Setup","\u002Fdocs\u002Fguides\u002Fmtls-admin-setup","docs\u002Fguides\u002F3.mtls-admin-setup",{"id":83,"title":84,"body":85,"description":84,"extension":161,"meta":162,"navigation":163,"path":164,"seo":165,"stem":168,"__hash__":169},"landing\u002Findex.md","",{"type":86,"value":87,"toc":158},"minimark",[88,119],[89,90,91,95,103],"u-page-hero",{},[92,93,94],"template",{"v-slot:title":84},"ACME v2 for private networks.",[92,96,97,98,102],{"v-slot:description":84},"uPKI RA is a fully compliant ",[99,100,101],"strong",{},"ACME v2 Registration Authority"," (RFC 8555) that connects your internal infrastructure to a self-hosted CA. Use Traefik, cert-manager, or any ACME client — no Let's Encrypt required.",[92,104,105,112],{"v-slot:links":84},[106,107,111],"u-button",{"color":108,"size":109,"to":55,"trailing-icon":110},"neutral","xl","i-lucide-arrow-right","Get Started",[106,113,118],{"color":108,"size":109,"to":114,"icon":115,"target":116,"variant":117},"https:\u002F\u002Fgithub.com\u002Fcircle-rd\u002Fupki-ra","i-simple-icons-github","_blank","outline","Star on GitHub",[120,121,122,125],"u-page-section",{},[92,123,124],{"v-slot:title":84},"Why uPKI RA?",[92,126,127,133,138,143,148,153],{"v-slot:features":84},[128,129],"u-page-feature",{"description":130,"icon":131,"title":132},"Full ACME v2 implementation — new-account, new-order, challenges, certificate issuance and revocation.","i-lucide-shield-check","RFC 8555 compliant",[128,134],{"description":135,"icon":136,"title":137},"First start automatically registers the RA with the CA and issues its own mTLS certificate.","i-lucide-rocket","Auto-bootstrap",[128,139],{"description":140,"icon":141,"title":142},"Mutual TLS protects all admin and client endpoints. Docker image ships with TLS enabled by default.","i-lucide-lock","mTLS by default",[128,144],{"description":145,"icon":146,"title":147},"Works out of the box as a Traefik ACME provider. Point caServer at the RA and you're done.","i-lucide-layers","Traefik native",[128,149],{"description":150,"icon":151,"title":152},"Zero internet dependency. Deploy behind a firewall, in a DMZ, or in a fully isolated network.","i-lucide-wifi-off","Air-gapped friendly",[128,154],{"description":155,"icon":156,"title":157},"ACME state (accounts, orders, authorizations) stored in SQLite. Simple, reliable, zero operational overhead.","i-lucide-database","SQLite state",{"title":84,"searchDepth":159,"depth":159,"links":160},2,[],"md",{},true,"\u002F",{"title":166,"description":167},"uPKI RA — ACME v2 Registration Authority","ACME v2 Registration Authority for private networks — RFC 8555 without Let's Encrypt.","index","iQ6F7DnglxA9VfwBIfmEv5eRkr6v6hmZXdWES9AOg1g",1775909572886]