Most Requested Enterprise Features

142 views
Skip to first unread message

Mike Kaply

unread,
Mar 31, 2025, 11:37:17 AMMar 31
to Mozilla.org
So I'm trying to assemble a list of things we might still be missing for "table stakes" for Firefox in the enterprise.

I feel like we've done pretty good so far, but I want to see if we're missing anything I don't know about. Here's my short list:

1. Forced update of Firefox.
2. Disabling clearing history.
3. Much better documentation.
4. A better update story on macOS.

Does anyone else have any thoughts about things we're missing?

Thanks

--
Mike Kaply
Technical Partner Lead
Mozilla Corporation

Streich Colomeda, Dimas

unread,
Mar 31, 2025, 12:03:36 PMMar 31
to enter...@mozilla.org
For me, I'm waiting for these:
  • Remote policies.json. We talked about that some time ago (08/04/2021 email subject "Remote policies.json"). Now, it's possible to distribute a policies.json file to all the PCs with GPO, but any change to policies.json file is very slow to distribute. With AutoConfig we could have a remote firefox.js that was processed by all Firefox instances.
  • Legacy Browser Support. You developed this add-on, but it doesn't cover our needs because it forces all the other pages to be opened in Firefox. It'd be nice to force opening some pages with IE/Edge, but don't disable IE/Edge for other pages.
  • https://bugzilla.mozilla.org/show_bug.cgi?id=183602

Thx,

Dimas Streich Colomeda
Unitat de Tecnologies de la Informació i Comunicació

Departament de Salut | Generalitat de Catalunya
Av.França s/n | 17007 Girona 
dstreich....@gencat.cat | http://www.hospitaltrueta.cat
Instagram | Twitter | YouTube | LinkedIn

Les nostres jornades laborals poden no coincidir. No et sentis en l'obligació d’atendre aquest correu si arriba fora de la teva jornada laboral. Aquest missatge s'adreça exclusivament a la persona destinatària i pot contenir informació privilegiada o confidencial. Si no sou la persona destinatària indicada, us recordem que la utilització, divulgació i/o còpia sense autorització està prohibida en virtut de la legislació vigent. Si heu rebut aquest missatge per error, us demanem que ens ho feu saber immediatament per aquesta via i que el destruïu.
--
You received this message because you are subscribed to the Google Groups "enter...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to enterprise+...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/enterprise/CAHueOzCRrSL8wOAnTLR7kZRiccRx53PzgXGb-WDoVYRBtHEQ6Q%40mail.gmail.com.

Robert Marcano

unread,
Apr 2, 2025, 1:20:55 PMApr 2
to Mike Kaply, Mozilla.org
On 3/31/25 11:36 AM, 'Mike Kaply' via enter...@mozilla.org wrote:
> So I'm trying to assemble a list of things we might still be missing for
> "table stakes" for Firefox in the enterprise.
>
> I feel like we've done pretty good so far, but I want to see if we're
> missing anything I don't know about. Here's my short list:
>
> 1. Forced update of Firefox.
> 2. Disabling clearing history.
> 3. Much better documentation.
> 4. A better update story on macOS.
>
> Does anyone else have any thoughts about things we're missing?

I don't think this is highly requested feature, but is something I would
like to have. Firefox has dom.push.serverURL preference. Implement one
for intranet domains, and another to set the domains allowed.

dom.push.serverURL is a global value, you can run a local push server,
for your internal needs, but if you use internet public services, then
you push server needs to be exposed to the public, with the extra
maintenance an internet facing server needs.

I write apps that need to run if a customer company internet goes down,
so having a local push server is nice, to not lose internal push
notifications, and some of them even are small businesses behind carrier
grade NATs, so even if with a local push server, there is no way to
expose it to the internet, so if you use a local push server you lose
the public internet apps push notifications.

>
> Thanks
>
> --
> Mike Kaply
> Technical Partner Lead
> Mozilla Corporation
>
> --
> You received this message because you are subscribed to the Google
> Groups "enter...@mozilla.org" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to enterprise+...@mozilla.org
> <mailto:enterprise+...@mozilla.org>.
> To view this discussion visit https://groups.google.com/a/mozilla.org/d/
> msgid/enterprise/CAHueOzCRrSL8wOAnTLR7kZRiccRx53PzgXGb-
> WDoVYRBtHEQ6Q%40mail.gmail.com <https://groups.google.com/a/mozilla.org/
> d/msgid/enterprise/CAHueOzCRrSL8wOAnTLR7kZRiccRx53PzgXGb-
> WDoVYRBtHEQ6Q%40mail.gmail.com?utm_medium=email&utm_source=footer>.

Thane K. Sherrington

unread,
Apr 2, 2025, 3:19:56 PMApr 2
to enter...@mozilla.org
Here's one I'd like - the ability to make the domain highlighting in the URL in the address bar more obvious.  During our phishing tests, we've found that most people can't see the subtle highlighting Firefox uses.  It needs to be more bold, or a brighter colour.  It would need to be user configurable because some people are colour blind.  This would really make detecting phishing/fake sites easier.

In case any one is wondering, I'm referring to this highlighting in the address bar.


I like the rest of the suggestions.

Thane K. Sherrington

Computer Connection, Ltd. ...taking the mystery out of computers since 1982.
Winner of the 2012 Ian Spencer - Excellence in Business Award
Thanks for making us the Reader's Choice Best Computer Store in 2016, 2017, 2018 and 2019!
95 College St.
Antigonish, NS
B2G 1X6
902-863-3361 (phone)
th...@computerconnectionltd.com
--
You received this message because you are subscribed to the Google Groups "enter...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to enterprise+...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/enterprise/CAHueOzCRrSL8wOAnTLR7kZRiccRx53PzgXGb-WDoVYRBtHEQ6Q%40mail.gmail.com.

Philipp Madersbacher

unread,
Apr 3, 2025, 6:14:44 AMApr 3
to Mike Kaply, enter...@mozilla.org
Hi Mike, one major pain point for us with windows roaming profiles is that firefox still commonly puts loads of data in the storage-section of the roaming profile (might argue the same for gmp-plugins, minidumps, etc) instead of %localappdata%, which causes issues with size limits on the server and slower logons for users. See https://bugzilla.mozilla.org/show_bug.cgi?id=1395705 and others - any improvements in this regard would be very welcome!

Best regards
Philipp

--

Osdoba, Sascha

unread,
Apr 8, 2025, 10:10:35 AMApr 8
to enter...@mozilla.org

I support this request to strictly keep out caches from the roaming part of the profile

 

additionality I would like to have something like a tracing why SSO is sometimes not working for internal website

(sometimes doesn’t work with an existing FF profile, if you create a new FF profile it works again)

 

Sascha

Reply all
Reply to author
Forward
0 new messages