Our network admin recently enabled HTTPS inspection on our firewall/router. For IE users this is fine because the certs have all been distributed via Active Directory for domain-joined machines. However, we have a number of Firefox users that are now throwing certificate errors on practically every HTTPS site.
Firefox uses their own CA store, and they're real proud of it too. Is there any way to get Firefox to trust the system certificate store by default? I see a lot of posts on how to do this in Linux, but nothing for Windows.
I suspect from this post that it's not possible, but that post is almost 4 years old.
Since Firefox 49 there is some support for Windows CA certificates and support for Active Directory provided enterprise root certificates since Firefox 52. It is also supported in macOS to read from the Keychain since version 63.
Since Firefox 68 this feature is enabled by default in the ESR (enterprise) version, but not in the (standard) rapid release.
You can enable this feature for Windows and macOS in
about:config
by creating this boolean value:and set it to
true
.For GNU/Linux, this is usually managed by p11-kit-trust and no flag is needed.
Deploying the configuration system wide
Since Firefox 64, there is a new and recommended way by using policies, documented at https://support.mozilla.org/en-US/kb/setting-certificate-authorities-firefox
For legacy versions, the Firefox installation folder can be retrieved from Windows registry, then go to
defaults\pref\
subdirectory and create a new file with the following:Save it with
.js
extension, e.g.trustwincerts.js
and restart Firefox. The entry will appear inabout:config
for all users.Deploying Windows Certificates system wide
In Firefox from 49 until 51, it only supports the "Root" store. Since Firefox 52, it supports other stores, including those added from domain via AD.
This is a bit out of scope but explains which was the only certificate store supported by Firefox for versions 49 to 51 or just for local testing. Because this deploys for all local machine users, it requires Administrator privileges in your CMD/PowerShell window or in your own automated deployment script.:
This may also be done from the Management Console by clicking a lot of windows if you prefer the mouse way (How to: View Certificates with the MMC Snap-In).
Have you considered deploying those certificates to Firefox as well as to the Windows cert store?
https://wiki.mozilla.org/CA:AddRootToFirefox details a few options:
certutil
.Use Firefox's autoconfig feature, by placing a javascript file alongside the binary, to add the certificates:
There isn't a good way handle forcing the use of the system store, but there is a nice workaround (force the use of a customized firefox compatible store).
The bit of script below works well at login / logoff.
There is free project that provides the ability to manage Firefox root certificates using group policies. You can either install or remove root certificates from Firefox database.