Mozilla VPN is currently experiencing an outage. Our team is actively working to resolve the issue. Please check the status page for real-time updates. Thank you for your patience.

This site will have limited functionality while we undergo maintenance to improve your experience. If an article doesn't solve your issue and you want to ask a question, we have our support community waiting to help you at @FirefoxSupport on Twitter and/r/firefox on Reddit.

Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

Add internal CA root certificate to all users in a domain

  • 1 balasan
  • 19 ada masalah ini
  • 15 paparan
  • Balasan terakhir oleh cor-el

more options

Hi everyone. We are slowly deploying FF 3.6.x to some services in our organization. What we absolutely need to do is adding our roots CA certificates to the trusted ones in FF, to be able to use our secure https services. We would like to implement this like we do for IE (for example using GPOs) or using batch files, VBS, or whatever. But it should be done in a totally silent way for the users. I mean... not asking them to do anything. And this should be done for all users in the damain/organization, regardless of which version they are using (minimun requirement for us is 3.6). Thanks for your suggestions.

Hi everyone. We are slowly deploying FF 3.6.x to some services in our organization. What we absolutely need to do is adding our roots CA certificates to the trusted ones in FF, to be able to use our secure https services. We would like to implement this like we do for IE (for example using GPOs) or using batch files, VBS, or whatever. But it should be done in a totally silent way for the users. I mean... not asking them to do anything. And this should be done for all users in the damain/organization, regardless of which version they are using (minimun requirement for us is 3.6). Thanks for your suggestions.

All Replies (1)