Join the AMA (Ask Me Anything) with the Firefox leadership team to celebrate Firefox 20th anniversary and discuss Firefox’s future on Mozilla Connect. Mark your calendar on Thursday, November 14, 18:00 - 20:00 UTC!

This site will have limited functionality while we undergo maintenance to improve your experience. If an article doesn't solve your issue and you want to ask a question, we have our support community waiting to help you at @FirefoxSupport on Twitter and/r/firefox on Reddit.

Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

Why is Firefox completely unsuitable for use with an enterprise PKI?

  • 1 reply
  • 1 has this problem
  • 14 views
  • Last reply by philipp

more options

I know my topic is a bit intentionally inflammatory. Let me explain.

1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database.

That's unacceptable for enterprise software.

Just. Completely. Unacceptable.

If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise.

This has been a problem for years, if the archive is any indication.

I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.

I know my topic is a bit intentionally inflammatory. Let me explain. 1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database. That's unacceptable for enterprise software. Just. Completely. Unacceptable. If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise. This has been a problem for years, if the archive is any indication. I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.

All Replies (1)

more options

hi Grums, your concerns are certainly valid. however since this forum is more a users-helping-users type of venue, the more appropriate place to provide this feedback would be the Mozilla "Enterprise Working Group Mailing List": https://wiki.mozilla.org/Enterprise