Deploy the Browser Extension

 


Overview

This article provides step-by-step instructions for deploying the CerteroX SaaS Management web browser extension to Microsoft Edge, Google Chrome, and Mozilla Firefox, using Group Policy Objects (GPO) in Active Directory. It also covers how to deploy the extension using Microsoft Intune.


Prerequisites

  • CerteroX SaaS Management Extension/App ID

  • Administrator rights on the Domain Controller or Intune Admin Center.

  • ADMX/ADML templates for Chrome and Firefox (Microsoft Edge templates are typically already present on modern Windows Server).


1. Deploying the Extension via Group Policy (GPO)

1.1. Microsoft Edge

  1. Open Group Policy Management
    (gpmc.msc on your Domain Controller)

  2. Create or Edit a GPO

    • Right-click your target OU and select Create a GPO or edit an existing GPO.

  3. Navigate to Extension Policy

    Computer Configuration
    └── Policies
    └── Administrative Templates
    └── Microsoft Edge
    └── Extensions

  4. Configure Extension Install Policy

    • Open Control which extensions are installed silently.

    • Set to Enabled.

    • In the Options pane, click Show... and add the following (replace the example values):

      [CerteroX_ExtensionID];[Update_URL]

      Example:

      abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xml

  5. Apply and update group policy

    • Run gpupdate /force on target machines, or reboot as needed.


1.2. Google Chrome

Import Chrome ADMX Templates

  1. Download Google Chrome ADMX templates:
    Official download

  2. Copy Templates:

    • Copy the chrome.admx file to C:\Windows\PolicyDefinitions\.

    • Copy the relevant language folder (e.g., en-US\chrome.adml) to C:\Windows\PolicyDefinitions\en-US\.

  3. Open Group Policy Management and edit your GPO.

  4. Navigate to Chrome Extension Policy

    Computer Configuration
    └── Policies
    └── Administrative Templates
    └── Google
    └── Google Chrome
    └── Extensions

  5. Configure Force-Installed Extensions

    • Open Configure the list of force-installed apps and extensions.

    • Set to Enabled.

    • Click Show... and add:

      [CerteroX_ExtensionID];[Update_URL]

      Example:

      abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xml


1.3. Mozilla Firefox

Import Firefox ADMX Templates

  1. Download Firefox ADMX templates:
    Official download

  2. Copy Templates:

    • Place firefox.admx into C:\Windows\PolicyDefinitions\.

    • Place firefox.adml in the corresponding language folder.

  3. Open Group Policy Management and edit your GPO.

  4. Navigate to Firefox Extension Policy

    Computer Configuration
    └── Policies
    └── Administrative Templates
    └── Mozilla
    └── Firefox
    └── Extensions

  5. Configure Extension Management

    • Enable and configure the Extension Management Policy.

    • Enter the JSON to describe the extension management policy. Example:

      {"saas@certerox.com":{"installation_mode":"force_installed","install_url":"https://xxx.certerox.com/extensions/firefox.xpi"}}

2. Deploying the Extension via Microsoft Intune

2.1. Microsoft Edge

  1. Log in to the Microsoft Intune Admin Center.

  2. Navigate to Devices > Configuration profiles.

  3. Create a New Profile:

    • Platform: Windows 10 and later

    • Profile type: Settings catalog

  4. Click Add Settings, the settings blade will open.

  5. Search for “Extension” and select Microsoft Edge\Extensions.

  6. Check the box for Control which extensions are installed silently. Close the settings blade

  7. Enable the setting and enter the extension details:

    [CerteroX_ExtensionID];[Update_URL]

    Example:

    abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xml

  8. Assign the Profile to your required user or device groups.

  9. Monitor Deployment

    • Devices should automatically receive and apply the extension policy upon their next sync with Intune.

2.2. Google Chrome

  1. Log in to the Microsoft Intune Admin Center.

  2. Navigate to Devices > Configuration profiles.

  3. Create a New Profile:

    • Platform: Windows 10 and later

    • Profile type: Settings catalog

  4. Click Add Settings, the settings blade will open.

  5. Search for “Extension” and select Google Google Chrome Extensions

  6. Check the box for Configure the list of force-installed apps and extensions. Close the settings blade

  7. Enable the setting and enter the extension details:

    [CerteroX_ExtensionID];[Update_URL]

    Example:

    abcdefghijklmnopabcdefghijklmnop;https://xxx.certerox.com/extensions/update.xml

  8. Assign the Profile to your required user or device groups.

  9. Monitor Deployment

    • Devices should automatically receive and apply the extension policy upon their next sync with Intune.

2.3. Mozilla Firefox

Import Firefox ADMX Templates

  1. Download Firefox ADMX templates:

  2. Log in to the Microsoft Intune Admin Center.

  3. Navigate to Devices > Configuration > Import ADMX.

  4. Upload the Mozilla AMDX & ADML, followed by the Firefox ADMX & ADML files.

  5. Navigate to Devices > Configuration profiles.

  6. Create a New Profile:

    • Platform: Windows 10 and later

    • Profile type: Templates

    • Template name: Imported Administrative templates

  7. Navigate to Firefox Extension Policy

└── Mozilla
└── Firefox
└── Extensions
  1. Configure Extension Management

  2. Enable and configure the Extension Management Policy.

  3. Enter the JSON to describe the extension management policy. Example:

    {"saas@certerox.com":{"installation_mode":"force_installed","install_url":"https://xxx.certerox.com/extensions/firefox.xpi"}}

3. Extension/App ID and Update URLs

Browser

Example Extension ID

Example Update URL

Edge

hmlipeingjcdljakndogahonkhhnpaop

https://xxx.certerox.com/extensions/update.xml

Chrome

hmlipeingjcdljakndogahonkhhnpaop

https://xxx.certerox.com/extensions/update.xml

Firefox

saas@certerox.com

https://xxx.certerox.com/extensions/firefox.xpi