X-Git-Url: https://git.p6c8.net/policy-templates.git/blobdiff_plain/41e9dfd42f0c917d41dd1bf4806ac69c7df30afe..2bc6f986df65a602f7115eef84a84cdad7411db5:/README.md?ds=sidebyside diff --git a/README.md b/README.md index 960fbd6..30f9a4b 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,24 @@ **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.** -Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`. +Official policy documentation has been moved to https://mozilla.github.io/policy-templates/. + +I'm maintaining things in the README.md until we can update links in Firefox. + +Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`. + +Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example: + +``` +{ + "policies": { + "Authentication": { + "SPNEGO": ["mydomain.com", "https://myotherdomain.com"] + } + "Authentication_Comment": "These domains are required for us" + } +} +``` | Policy Name | Description | --- | --- | @@ -23,6 +40,7 @@ Policies can be specified using the [Group Policy templates on Windows](https:// | **[`Certificates`](#certificates)** | | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator. | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store. +| **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/). | **[`Cookies`](#cookies)** | Configure cookie preferences. | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory. | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates. @@ -47,7 +65,9 @@ Policies can be specified using the [Group Policy templates on Windows](https:// | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image. | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated. | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry +| **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules. | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar. +| **[`DisplayBookmarksToolbar (Deprecated)`](#displaybookmarkstoolbar-deprecated)** | Set the initial state of the bookmarks toolbar. | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar. | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar. | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS. @@ -985,6 +1005,91 @@ Value (string): } } ``` +### Containers +Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/). + +Currently you can set the initial set of containers. + +For each container, you can specify the name, icon, and color. + +| Name | Description | +| --- | --- | +| `name`| Name of container +| `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence` +| `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar` + +**Compatibility:** Firefox 113\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** N/A + +#### Windows (GPO) +Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) = +``` +{ + "Default": [ + { + "name": "My container", + "icon": "pet", + "color": "turquoise" + } + ] +} +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers +``` +Value (string): +``` + + +``` +#### macOS +``` + + Default + + Containers + + + name + My container + icon + pet + color + turquoise + + + + +``` +#### policies.json +``` +{ + "policies": { + "Containers": { + "Default": [ + { + "name": "My container", + "icon": "pet", + "color": "turquoise" + } + ] + } + } +} +``` ### Cookies Configure cookie preferences. @@ -999,7 +1104,7 @@ Configure cookie preferences. `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below. | Value | Description -| --- | --- +| --- | --- | | accept | Accept all cookies | reject-foreign | Reject third party cookies | reject | Reject all cookies @@ -1209,6 +1314,7 @@ Value (string): { "policies": { "DefaultDownloadDirectory": "${home}/Downloads" + } } ``` #### policies.json (Windows) @@ -1216,6 +1322,7 @@ Value (string): { "policies": { "DefaultDownloadDirectory": "${home}\\Downloads" + } } ``` ### DisableAppUpdate @@ -2049,7 +2156,71 @@ Value (string): } } ``` +### DisableThirdPartyModuleBlocking +Do not allow blocking third-party modules from the `about:third-party` page. + +This policy only works on Windows through GPO (not policies.json). + +**Compatibility:** Firefox 110 (Windows only, GPO only)\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** N/A + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0 +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking +``` +Value (string): +``` + or +``` ### DisplayBookmarksToolbar +Set the initial state of the bookmarks toolbar. A user can still change how it is displayed. + +`always` means the bookmarks toolbar is always shown. + +`never` means the bookmarks toolbar is not shown. + +`newtab` means the bookmarks toolbar is only shown on the new tab page. + +**Compatibility:** Firefox 109, Firefox ESR 102.7\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** N/A + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab" +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum +``` +Value (string): +``` + + +``` +#### macOS +``` + + DisplayBookmarksToolbar + always | never | newtab + +``` +#### policies.json +``` +{ + "policies": { + "DisplayBookmarksToolbar": "always" | "never" | "newtab" + } +} +``` +### DisplayBookmarksToolbar (Deprecated) Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden. **Compatibility:** Firefox 60, Firefox ESR 60\ @@ -2334,6 +2505,8 @@ If `Cryptomining` is set to true, cryptomining scripts on websites are blocked. If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked. +If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112) + `Exceptions` are origins for which tracking protection is not enabled. **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\ @@ -2379,6 +2552,7 @@ OMA-URI: ``` Value (string): ``` + ``` OMA-URI: @@ -4511,22 +4685,30 @@ spellchecker. (Firefox 84, Firefox ESR 78.6) toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4) ui. widget. +xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only) ``` as well as the following security preferences: + | Preference | Type | Default -| --- | --- | --- +| --- | --- | --- | | security.default_personal_cert | string | Ask Every Time |     If set to Select Automatically, Firefox automatically chooses the default personal certificate. | security.insecure_connection_text.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites. | security.insecure_connection_text.pbmode.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites in private browsing. -| security.insecure_field_warning.contextual.enabled | bool | true -|     If set to false, remove the warning for inscure login fields. | security.mixed_content.block_active_content | boolean | true |     If false, mixed active content (HTTP and HTTPS) is not blocked. | security.osclientcerts.autoload | boolean | false |     If true, client certificates are loaded from the operating system certificate store. +| security.OCSP.enabled | integer | 1 +|     If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates +| security.OCSP.require | boolean | false +|      If true, if an OCSP request times out, the connection fails. +| security.osclientcerts.assume_rsa_pss_support | boolean | true +|      If false, we don't assume an RSA key can do RSA-PSS (Firefox 114, Firefox ESR 102.12). +| security.ssl.enable_ocsp_stapling | boolean | true +|      If false, OCSP stapling is not enabled. | security.ssl.errorReporting.enabled | boolean | true |     If false, SSL errors cannot be sent to Mozilla. | security.tls.enable_0rtt_data | boolean | true @@ -4537,7 +4719,6 @@ as well as the following security preferences: |     If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8). | security.warn_submit_secure_to_insecure | boolean | true |     If false, no warning is shown when submitting a form from https to http. -  Using the preference as the key, set the `Value` to the corresponding preference value. @@ -4661,7 +4842,7 @@ Set and lock certain preferences. **Preferences Affected:** See below | Preference | Type | Compatibility | Default -| --- | --- | --- | --- +| --- | --- | --- | --- | | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0 |     If set to 1, platform accessibility is disabled. | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true @@ -4764,6 +4945,7 @@ disabled |     If false, the Alt key doesn't show the menubar on Windows. | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A |     If set, overrides the GTK theme for widgets. + #### Windows (GPO) ``` Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0 @@ -4888,6 +5070,8 @@ Value (string): Configure proxy settings. These settings correspond to the connection settings in Firefox preferences. To specify ports, append them to the hostnames with a colon (:). +Unless you lock this policy, changes the user already has in place will take effect. + `Mode` is the proxy method being used. `Locked` is whether or not proxy settings can be changed. @@ -4932,8 +5116,98 @@ Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0 ``` #### Windows (Intune) +**Note** +These setttings were moved to a category to make them easier to configure via Intune. + +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType +``` +Value (string): +``` + + +``` OMA-URI: ``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy +``` +Value (string): +``` + + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin +``` +Value (string): +``` + or +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS +``` +Value (string): +``` + or +``` +OMA-URI (Old way): +``` ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy ``` Value (string): @@ -4941,11 +5215,11 @@ Value (string): - + - - - + + + @@ -5551,6 +5825,68 @@ Value (string): ``` ### SecurityDevices +Add or delete PKCS #11 modules. + +**Compatibility:** Firefox 114, Firefox ESR 112.12\ +**CCK2 Equivalent:** N/A\ +**Preferences Affected:** N/A + +#### Windows (GPO) +``` +Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE +Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE +``` +#### Windows (Intune) +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add +``` +Value (string): +``` + + +``` +OMA-URI: +``` +./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete +``` +Value (string): +``` + + +``` +#### macOS +``` + + SecurityDevices + + Add + + NAME_OF_DEVICE_TO_ADD + PATH_TO_LIBRARY_FOR_DEVICE + + Delete + + NAME_OF_DEVICE_TO_DELETE + + + +``` +#### policies.json +``` +{ + "policies": { + "SecurityDevices": { + "Add": { + "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE" + }, + "Delete": ["NAME_OF_DEVICE_TO_DELETE"] + } + } +} +``` +### SecurityDevices (Deprecated) + Install PKCS #11 modules. **Compatibility:** Firefox 64, Firefox ESR 60.4\ @@ -5581,7 +5917,6 @@ Value (string): ``` - #### policies.json ``` { @@ -5728,7 +6063,7 @@ Value (string): - + ``` #### macOS ``` @@ -5998,3 +6333,4 @@ Value (string): } } ``` +