Important Notice: We're experiencing email notification issues. If you've posted a question in the community forums recently, please check your profile manually for responses while we're working to fix this.

On Monday the 3rd of March, around 5pm UTC (9am PT) users may experience a brief period of downtime while one of our underlying services is under maintenance.

Zoeken in Support

Vermijd ondersteuningsscams. We zullen u nooit vragen een telefoonnummer te bellen, er een sms naar te sturen of persoonlijke gegevens te delen. Meld verdachte activiteit met de optie ‘Misbruik melden’.

Meer info

Deze conversatie is gearchiveerd. Stel een nieuwe vraag als u hulp nodig hebt.

Why is Firefox completely unsuitable for use with an enterprise PKI?

  • 1 antwoord
  • 1 heeft dit probleem
  • 14 weergaven
  • Laatste antwoord van philipp

more options

I know my topic is a bit intentionally inflammatory. Let me explain.

1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database.

That's unacceptable for enterprise software.

Just. Completely. Unacceptable.

If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise.

This has been a problem for years, if the archive is any indication.

I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.

I know my topic is a bit intentionally inflammatory. Let me explain. 1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database. That's unacceptable for enterprise software. Just. Completely. Unacceptable. If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise. This has been a problem for years, if the archive is any indication. I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.

Alle antwoorden (1)

more options

hi Grums, your concerns are certainly valid. however since this forum is more a users-helping-users type of venue, the more appropriate place to provide this feedback would be the Mozilla "Enterprise Working Group Mailing List": https://wiki.mozilla.org/Enterprise