Deploy the Browser Extension
Overview
This article provides step-by-step instructions for deploying the CerteroX SaaS Management web browser extension to Microsoft Edge, Google Chrome, and Mozilla Firefox, using Group Policy Objects (GPO) in Active Directory. It also covers how to deploy the extension using Microsoft Intune.
Prerequisites
Administrator rights on the Domain Controller or Intune Admin Center.
ADMX/ADML templates for Chrome and Firefox (Microsoft Edge templates are typically already present on modern Windows Server).
1. Deploying the Extension via Group Policy (GPO)
1.1. Microsoft Edge
Open Group Policy Management
(gpmc.msc on your Domain Controller)Create or Edit a GPO
Right-click your target OU and select Create a GPO or edit an existing GPO.
Navigate to Extension Policy
Computer Configuration└── Policies└── Administrative Templates└── Microsoft Edge└── ExtensionsConfigure Extension Install Policy
Open Control which extensions are installed silently.
Set to Enabled.
In the Options pane, click Show... and add the following (replace the example values):
[CerteroX_ExtensionID];[Update_URL]Example:
abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xml
Apply and update group policy
Run gpupdate /force on target machines, or reboot as needed.
1.2. Google Chrome
Import Chrome ADMX Templates
Download Google Chrome ADMX templates:
Official downloadCopy Templates:
Copy the chrome.admx file to C:\Windows\PolicyDefinitions\.
Copy the relevant language folder (e.g., en-US\chrome.adml) to C:\Windows\PolicyDefinitions\en-US\.
Open Group Policy Management and edit your GPO.
Navigate to Chrome Extension Policy
Computer Configuration└── Policies└── Administrative Templates└── Google└── Google Chrome└── ExtensionsConfigure Force-Installed Extensions
Open Configure the list of force-installed apps and extensions.
Set to Enabled.
Click Show... and add:
[CerteroX_ExtensionID];[Update_URL]Example:
abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xml
1.3. Mozilla Firefox
Import Firefox ADMX Templates
Download Firefox ADMX templates:
Official downloadCopy Templates:
Place firefox.admx into C:\Windows\PolicyDefinitions\.
Place firefox.adml in the corresponding language folder.
Open Group Policy Management and edit your GPO.
Navigate to Firefox Extension Policy
Computer Configuration└── Policies└── Administrative Templates└── Mozilla└── Firefox└── ExtensionsConfigure Extension Management
Enable and configure the Extension Management Policy.
Enter the JSON to describe the extension management policy. Example:
{"saas@certerox.com":{"installation_mode":"force_installed","install_url":"https://xxx.certerox.com/extensions/firefox.xpi"}}
2. Deploying the Extension via Microsoft Intune
2.1. Microsoft Edge
Log in to the Microsoft Intune Admin Center.
Navigate to Devices > Configuration profiles.
Create a New Profile:
Platform: Windows 10 and later
Profile type: Settings catalog
Click Add Settings, the settings blade will open.
Search for “Extension” and select Microsoft Edge\Extensions.
Check the box for Control which extensions are installed silently. Close the settings blade
Enable the setting and enter the extension details:
[CerteroX_ExtensionID];[Update_URL]Example:
abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xmlAssign the Profile to your required user or device groups.
Monitor Deployment
Devices should automatically receive and apply the extension policy upon their next sync with Intune.
2.2. Google Chrome
Log in to the Microsoft Intune Admin Center.
Navigate to Devices > Configuration profiles.
Create a New Profile:
Platform: Windows 10 and later
Profile type: Settings catalog
Click Add Settings, the settings blade will open.
Search for “Extension” and select Google Google Chrome Extensions
Check the box for Configure the list of force-installed apps and extensions. Close the settings blade
Enable the setting and enter the extension details:
[CerteroX_ExtensionID];[Update_URL]Example:
abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xmlAssign the Profile to your required user or device groups.
Monitor Deployment
Devices should automatically receive and apply the extension policy upon their next sync with Intune.
2.3. Mozilla Firefox
Import Firefox ADMX Templates
Download Firefox ADMX templates:
Log in to the Microsoft Intune Admin Center.
Navigate to Devices > Configuration > Import ADMX.
Upload the Mozilla AMDX & ADML, followed by the Firefox ADMX & ADML files.
Navigate to Devices > Configuration profiles.
Create a New Profile:
Platform: Windows 10 and later
Profile type: Templates
Template name: Imported Administrative templates
Navigate to Firefox Extension Policy
Configure Extension Management
Enable and configure the Extension Management Policy.
Enter the JSON to describe the extension management policy. Example:
{"saas@certerox.com":{"installation_mode":"force_installed","install_url":"https://xxx.certerox.com/extensions/firefox.xpi"}}
3. Extension/App ID and Update URLs
Browser | Example Extension ID | Example Update URL |
|---|
Browser | Example Extension ID | Example Update URL |
|---|---|---|
Edge | hmlipeingjcdljakndogahonkhhnpaop | |
Chrome | hmlipeingjcdljakndogahonkhhnpaop | |
Firefox | saas@certerox.com |