-Policies can either be specified using the Group Policy templates or by creating a file called policies.json. On Windows, create a directory called distribution where the EXE is located and place the file there. On Mac, the file goes into Firefox.app/Content/Resources/distribution.
+**IMPORTANT**: This file is in active development along with the policies in Firefox. To get the policy information that corresponds to a specific release, go to https://github.com/mozilla/policy-templates/releases.
+
+Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
The content of the JSON file should look like this:
```
}
}
```
-Policies are documented below. Note that even though comments are used in this file for documentation, comments are not allowed for JSON files.
+Policies are documented below.
+
+
+**Note**: though comments are used in this readme file for documentation, comments are not valid in actual JSON files. Remove all comments before attempting to deploy.
+
+### AppUpdateURL
+This policy is for changing the URL used for application update
+```
+{
+ "AppUpdateURL": "http://yoursite.com"
+}
+```
+
+
### Authentication
This policy is for configuring sites that support integrated authentication. See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
```
"Authentication": {
"SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
"Delegated": ["mydomain.com", "https://myotherdomain.com"],
- "NTLM": ["mydomain.com", "https://myotherdomain.com"]
+ "NTLM": ["mydomain.com", "https://myotherdomain.com"],
+ "AllowNonFQDN": {
+ "SPNEGO": true,
+ "NTLM": true
+ }
}
}
}
"BlockAboutSupport": true
}
```
-### DisableSetDesktopBackground
-This policy removes the "Set As Desktop Background..." menuitem when right clicking on an image.
+### Bookmarks
+This policy allows you to specify bookmarks. You can have any number of bookmarks, although only ten are specified in the ADMX file.
+Placement can be specified as either toolbar or menu. If a folder is specified, it is automatically created and bookmarks with the
+same folder name are grouped together.
```
{
"policies": {
- "DisableSetDesktopBackground": true
+ "Bookmarks": [
+ {
+ "Title": "Example",
+ "URL": "http://example.org",
+ "Favicon": "http://example.com/favicon.ico",
+ "Placement": ["toolbar", "menu"],
+ "Folder": "FolderName"
+ }
+ ]
}
}
```
+### CaptivePortal
+This policy enables or disables captive portal support by setting and locking the preference `network.captive-portal-service.enabled`.
+```
+{
+ "policies": {
+ "CaptivePortal": [true|false]
+}
+```
### Certificates
-This is a Windows only policy that tells Firefox to read certificates from the Windows certificate store.
+This policy can be used to install certificates or to read certificates from the system certificate store on Mac and Windows.
+
+The ImportEnterpriseRoots key will cause Firefox to import 3rd party certificates that have been added by a user administrator from the system certificate store.
+It does not import all certificates. These certificates will not display in the Firefox certificates manager.
+
+The Install Certificates key by default will search for certificates in the locations listed below.
+Starting in Firefox 65 you can specify a fully qualified path including UNC. (See cert3.der and cert4.pem, in example).
+
+**Be advised if you wish to load a certificate from a UNC path you must use double backslashes.**
+Example: \\\\SERVER\\CERTS\\CERT5.PEM
+
+
+If Firefox does not find something at your fully qualified path, it will search the default directories.
+
+Certificates can be located in the following locations:
+- Windows
+ - %USERPROFILE%\AppData\Local\Mozilla\Certificates
+ - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
+- macOS
+ - /Library/Application Support/Mozilla/Certificates
+ - ~/Library/Application Support/Mozilla/Certificates
+- Linux
+ - /usr/lib/mozilla/certificates
+ - /usr/lib64/mozilla/certificates
+ - ~/.mozilla/certificates
+
+
```
{
"policies": {
"Certificates": {
- "ImportEnterpriseRoots": [true|false]
+ "ImportEnterpriseRoots": true,
+ "Install": ["cert1.der", "cert2.pem", "%SYSTEMDRIVE%\\Company\\cert3.der", "/Library/Company/cert4.pem", "\\\\server\\certs\\cert.pem"]
}
}
}
"Default": [true|false], /* This sets the default value for "Accept cookies from websites" */
"AcceptThirdParty": ["always", "never", "from-visited"], /* This sets the default value for "Accept third-party cookies" */
"ExpireAtSessionEnd": [true|false], /* This determines when cookies expire */
+ "RejectTracker": [true|false], /* Only reject trackers */
"Locked": [true|false] /* If this is true, cookies preferences can't be changed */
}
}
}
```
+### DNSOverHTTPS
+This policy configures DNS over HTTPS.
+```
+{
+ "policies": {
+ "DNSOverHTTPS": {
+ "Enabled": [true|false],
+ "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
+ "Locked": [true|false]
+ }
+ }
+}
+```
+### DisableSetDesktopBackground
+This policy removes the "Set As Desktop Background..." menuitem when right clicking on an image.
+```
+{
+ "policies": {
+ "DisableSetDesktopBackground": true
+ }
+}
+```
### DisableMasterPasswordCreation
-This policy removes the master password functionality if set to true.
+If this policy is set to true, the master password functionality is removed.
```
{
"policies": {
}
```
### DisableFeedbackCommands
-This policy disables the menus for reporting sites (Submit Feedback, Report Deceptive Site)
+This policy disables the menus for reporting sites (Submit Feedback, Report Deceptive Site).
```
{
"policies": {
}
```
### DisableFirefoxScreenshots
-This policy removes access to Firefox Screenshots
+This policy removes access to Firefox Screenshots.
```
{
"policies": {
}
```
### DisableFirefoxAccounts
-This policy disables Sync
+This policy disables Sync.
```
{
"policies": {
}
```
### DisableFirefoxStudies
-This policy disables Firefox studies (Shield)
+This policy disables Firefox studies (Shield).
```
{
"policies": {
- "DisableFirefoxAccounts": true
+ "DisableFirefoxStudies": true
}
}
```
### DisableForgetButton
-This policy disables the "Forget" button
+This policy disables the "Forget" button.
```
{
"policies": {
}
```
### DisableFormHistory
-This policy turns off the browser.formfill.enable preferences
+This policy turns off the browser.formfill.enable preferences.
```
{
"policies": {
}
```
### DisablePocket
-This policy turns off Pocket
+This policy turns off Pocket.
```
{
"policies": {
}
```
### DisablePrivateBrowsing
-This policy removes access to private browsing
+This policy removes access to private browsing.
```
{
"policies": {
}
```
### DisableProfileImport
-This policy disables the"Import data from another browser" option in the bookmarks window.
+This policy disables the "Import data from another browser" option in the bookmarks window.
```
{
"policies": {
}
```
### DisableSafeMode
-This policy disables safe mode on Windows only
+This policy disables safe mode on Windows and macOS only.
```
{
"policies": {
}
```
### DisableSecurityBypass
-This policy prevents the user from bypassign security in certain cases.
+This policy prevents the user from bypassing security in certain cases.
```
{
"policies": {
}
```
### DisplayBookmarksToolbar
-This policy turns on the bookmarks toolbar by default. A user can still turn it off and it will stay off.
+This policy turns on the bookmarks toolbar by default. A user can still turn it off, and it will stay off.
```
{
"policies": {
}
```
### DisplayMenuBar
-This policy turns on the menubar by default. A user can still turn it off and it will stay off.
+This policy turns on the menubar by default. A user can still turn it off, and it will stay off.
```
{
"policies": {
### EnableTrackingProtection
This policy affects tracking protection.
-If this policy is not configured, tracking protection is not enabled by default in the browser but it is enabled by default in private browsing and the user can change it.
+If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
+
+If Value is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
-If Value is set to false, tracking protection is disabled and locked in both the browser and private browsing.
+If Value is set to true, tracking protection is enabled by default in both the regular browser and private browsing.
-If Value is set to true, private browsing is enabled by default in both the browser and private browsing and you can choose set the Locked value if you want to prevent the user from changing it.
+You can choose to set the Locked value if you want to prevent the user from changing it.
```
{
"policies": {
"Value": [true, false],
"Locked": [true, false]
}
+}
```
### Extensions
-This policy controls the install, uninstall and locking of extensions. Locked extensions cannot be disabled or uninstalled.
-For Install, you can specify a list of URLs or paths.
+This policy controls the installation, uninstallation and locking of extensions. Locked extensions cannot be disabled or uninstalled.
+For Install, you specify a list of URLs or paths.
For Uninstall and Locked, you specify extension IDs.
```
{
"policies": {
"Extensions": {
- "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"]
+ "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
"Uninstall": ["addon_id@mozilla.org"],
"Locked": ["addon_id@mozilla.org"]
}
+ }
+}
+```
+### ExtensionUpdate
+This policy enables or disables extension updates by setting and locking the preference `extensions.update.enabled`.
+```
+{
+ "policies": {
+ "ExtensionUpdate": [true|false]
+}
+```
+### HardwareAcceleration
+This policy disables hardware acceleration by locking the preference layers.acceleration.disabled to true.
+```
+{
+ "policies": {
+ "HardwareAcceleration": false
+ }
+}
```
### NoDefaultBookmarks
-Don't create the default bookmarks or the Smart Bookmarks (Most Visited, Recent Tags). Note: this policy is only effective if used before the first run of the profile.
+This policy prevents the default bookmarks or the Smart Bookmarks (Most Visited, Recent Tags) from being created. Note: this policy is only effective if used before the first run of the profile.
```
{
"policies": {
}
```
### Homepage
-This policy sets the default homepage value. It can also be used to lock the homepage and add additional homepages.
+This policy sets the default homepage value and the default start page. It can also be used to lock the homepage or add additional homepages.
```
{
"policies": {
"URL": "http://example.com/",
"Locked": true,
"Additional": ["http://example.org/",
- "http://example.edu/"]
+ "http://example.edu/"],
+ "StartPage": ["none", "homepage", "previous-session"]
}
}
}
```
### PopupBlocking
-This policy sets domains for which pop-up windows are allowed. It also set the default pop-up policy
+This policy sets domains for which pop-up windows are allowed. It also sets the default pop-up policy.
```
{
"policies": {
"policies": {
"InstallAddonsPermission": {
"Allow": ["http://example.org/",
- "http://example.edu/"]
- "Default": [true|false], /* If this is set to false, add-ons cannot be installed by the user */
+ "http://example.edu/"],
+ "Default": [true|false] /* If this is set to false, add-ons cannot be installed by the user */
}
}
}
"FlashPlugin": {
"Allow": ["http://example.org/"], /* Sites on the allow list do not override Flash being completely disabled */
"Block": ["http://example.edu/"],
- "Default": [true|false], /* If this is set to true, flash is always enabled. If it is set to false, Flash is never enabled */
+ "Default": [true|false], /* If this is set to true, Flash is always enabled. If it is set to false, Flash is never enabled */
"Locked": [true|false]
}
}
}
```
+### NetworkPrediction
+This policy enables or disables network prediction (DNS prefetching) by setting and locking the preferences `network.dns.disablePrefetch` and `network.dns.disablePrefetchFromHTTPS`.
+```
+{
+ "policies": {
+ "NetworkPrediction": [true|false]
+}
+```
### OverrideFirstRunPage
-This policy allowed you to override the first run page. If you leave the URL blank, the first run page will not be displayed.
+This policy allows you to override the first run page. If you leave the URL blank, the first run page will not be displayed.
```
{
"policies": {
}
```
### OverridePostUpdatePage
-This policy allowed you to override the upgrade page page. If you leave the URL blank, the upgrade page will not be displayed.
+This policy allows you to override the upgrade page. If you leave the URL blank, the upgrade page will not be displayed.
```
{
"policies": {
}
}
```
-### Bookmarks
-This policy allows you to specify bookmarks. You can have any number of bookmarks although only ten are specified in the ADMX file.
-Placement can be specified as either toolbar or menu. If a folder is specified, it is automatically created and bookmarks with the
-same folder name are grouped together.
-
-```
-{
- "policies": {
- "Bookmarks": [
- {
- "Title": "Example",
- "URL": "http://example.org",
- "Favicon": "http://example.com/favicon.ico",
- "Placement": ["toolbar", "menu"],
- "Folder": "FolderName"
+### Permissions
+This policy allows you to change the permissions associated with camera, microphone, location, and notifications
+```
+{
+ "policies": {
+ "Permissions": {
+ "Camera": {
+ "Allow": ["http://example.org/"], /* Origins where camera access is allowed by default */
+ "Block": ["http://example.org/"], /* Origins where camera access is blocked by default */
+ "BlockNewRequests": [true|false], /* Block new requests to access the camera */
+ "Locked": [true|false] /* Don't allow the user to change the camera preferences */
+ },
+ "Microphone": {
+ "Allow": ["http://example.org/"], /* Origins where microphone access is allowed by default */
+ "Block": ["http://example.org/"], /* Origins where microphone access is blocked by default */
+ "BlockNewRequests": [true|false], /* Block new requests to access the microphone */
+ "Locked": [true|false] /* Don't allow the user to change the microphone preferences */
+ },
+ "Location": {
+ "Allow": ["http://example.org/"], /* Origins where location access is allowed by default */
+ "Block": ["http://example.org/"], /* Origins where location access is blocked by default */
+ "BlockNewRequests": [true|false], /* Block new requests to access location */
+ "Locked": [true|false] /* Don't allow the user to change the location preferences */
+ },
+ "Notifications": {
+ "Allow": ["http://example.org/"], /* Origins where sending notifications is allowed by default */
+ "Block": ["http://example.org/"], /* Origins where sending notifications is blocked by default */
+ "BlockNewRequests": [true|false], /* Block new requests to send notifications */
+ "Locked": [true|false] /* Don't allow the user to change the notification preferences */
}
- ]
+ }
}
}
```
To specify ports, append them to the hostnames with a colon (:). If Locked is set to true, the values can't be changed by the user.
```
{
- "Proxy": {
- "Mode": ["none", "system", "manual", "autoDetect", "autoConfig"]
- "Locked": [true, false]
- "HTTPProxy": "hostname",
- "UseHTTPProxyForAllProtocols": [true, false]
- "SSLProxy": "hostname",
- "FTPProxy": "hostname",
- "SOCKSProxy": "hostname",
- "SOCKSVersion": [4, 5],
- "Passthrough": "List of passthrough addresses/domains",
- "AutoConfigURL": "URL_TO_AUTOCONFIG",
- "AutoLogin": [true, false],
- "UseProxyForDNS": [true, false]
+ "policies": {
+ "Proxy": {
+ "Mode": ["none", "system", "manual", "autoDetect", "autoConfig"],
+ "Locked": [true, false],
+ "HTTPProxy": "hostname",
+ "UseHTTPProxyForAllProtocols": [true, false],
+ "SSLProxy": "hostname",
+ "FTPProxy": "hostname",
+ "SOCKSProxy": "hostname",
+ "SOCKSVersion": [4, 5],
+ "Passthrough": "List of passthrough addresses/domains",
+ "AutoConfigURL": "URL_TO_AUTOCONFIG",
+ "AutoLogin": [true, false],
+ "UseProxyForDNS": [true, false]
+ }
+ }
+}
+```
+### RequestedLocales
+This policy sets the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
+```
+{
+ "policies": {
+ "RequestedLocales": ["de", "en-US"]
}
}
```
}
```
### WebsiteFilter
-Blocks websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https accesses are supported at the moment. The arrays are limited to 1000 entries each.
+This policy blocks websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
```
{
"policies": {
}
}
```
-### Search Engines
-This policy allows you to add new search engines, as well as set the default and prevent the install of search engines from web pages. Only Name and URLTemplate is required.
+### Search Engines (This policy is only available on the ESR.)
+This policy allows you to add new search engines, remove or hide search engines, as well as set the default and prevent the install of search engines from web pages. Only Name and URLTemplate is required.
```
{
"policies": {
}
],
"Default": "Name of engine",
- "PreventInstalls": [true|false]
+ "PreventInstalls": [true|false],
+ "Remove": ["Twitter", "Wikipedia (en)"]
+ }
+ }
+}
+```
+### SecurityDevices
+This policy allows you to add PKCS #11 Modules
+```
+{
+ "policies": {
+ "SecurityDevices": {
+ "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
}
}
}
```
+### SSLVersionMin
+This policy allows you to set the minimum TLS version.
+```
+{
+ "policies": {
+ "SSSLVersionMin": ["tls1", "tls1.1", "tls1.2",. "tls1.3"]
+ }
+}
+
+```
+### SSLVersionMax
+This policy allows you to set the maximum TLS version.
+```
+{
+ "policies": {
+ "SSSLVersionMax": ["tls1", "tls1.1", "tls1.2",. "tls1.3"]
+ }
+}
+```