Why is Firefox completely unsuitable for use with an enterprise PKI?
I know my topic is a bit intentionally inflammatory. Let me explain.
1. A preponderance of enterprises use Active Directory. 2. A preponderance of enterprises which use Active Directory furthermore use MS's Enterprise PKI. 3. Making Firefox trust the enterprise PKI involves compiling some tools, downloading certutil, and scripting each machine to add the root cert to the local Firefox cert database.
That's unacceptable for enterprise software.
Just. Completely. Unacceptable.
If I can't add an ADM, push a registry key, or drop a simple file onto a machine (i.e. if I can't do it with Group Policy Preferences) then the software isn't suitable for the enterprise.
This has been a problem for years, if the archive is any indication.
I am, for reference, the Windows admin for a pretty important tech company. We will be deprecating Firefox at this point, because the above method is simply unacceptable for cert deployment. Sorry.
Alle Antworten (1)
hi Grums, your concerns are certainly valid. however since this forum is more a users-helping-users type of venue, the more appropriate place to provide this feedback would be the Mozilla "Enterprise Working Group Mailing List": https://wiki.mozilla.org/Enterprise