We're calling on all EU-based Mozillians with iOS or iPadOS devices to help us monitor Apple’s new browser choice screens. Join the effort to hold Big Tech to account!

Този сайт ще има ограничена функционалност, докато се извършва тече неговата поддръжка. Ако дадена статия не може реши проблема ви и искате да зададете въпрос, нашата общност е готова да ви помогне на @firefox в Twitter и /r/firefox в Reddit.

Търсене в помощните статии

Избягвайте измамите при поддръжката. Никога няма да ви помолим да се обадите или изпратите SMS на телефонен номер или да споделите лична информация. Моля, докладвайте подозрителна активност на "Докладване за злоупотреба".

Научете повече

Why is Firefox completely unsuitable for use with an enterprise PKI?

  • 1 отговор
  • 1 има този проблем
  • 14 изгледи
  • Последен отговор от philipp

more options

I know my topic is a bit intentionally inflammatory. Let me explain.

1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database.

That's unacceptable for enterprise software.

Just. Completely. Unacceptable.

If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise.

This has been a problem for years, if the archive is any indication.

I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.

I know my topic is a bit intentionally inflammatory. Let me explain. 1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database. That's unacceptable for enterprise software. Just. Completely. Unacceptable. If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise. This has been a problem for years, if the archive is any indication. I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.

Всички отговори (1)

more options

hi Grums, your concerns are certainly valid. however since this forum is more a users-helping-users type of venue, the more appropriate place to provide this feedback would be the Mozilla "Enterprise Working Group Mailing List": https://wiki.mozilla.org/Enterprise