There are no known incompatibilities between ACME clients/PKI on-premises and Azure AKS. You should be able to use a Windows ACME client, such as win-acme, to connect to an Azure AKS cluster and obtain SSL/TLS certificates from a PKI on-premises.
When using a Windows ACME client with Azure AKS, you need to make sure that the client is able to communicate with the AKS cluster's ingress controller. This can be done by configuring the ACME client to use the AKS cluster's public IP address or DNS name as the target for certificate issuance.
You also need to make sure that the PKI on-premises is configured to issue SSL/TLS certificates that are compatible with the AKS cluster's ingress controller. The ingress controller supports certificates that are issued by trusted public CAs, as well as certificates that are issued by private CAs that are trusted by the AKS cluster's nodes.
To use a private CA with the AKS cluster's ingress controller, you need to configure the ingress controller to trust the CA's root certificate. This can be done by creating a Kubernetes secret that contains the CA's root certificate and then referencing the secret in the ingress controller's TLS configuration.
Overall, using a Windows ACME client with a PKI on-premises to obtain SSL/TLS certificates for an Azure AKS cluster is a supported scenario. However, you need to make sure that the ACME client is able to communicate with the AKS cluster's ingress controller and that the PKI on-premises is configured to issue compatible certificates.