Eheka Pytyvõha

Emboyke pytyvõha apovai. Ndorojeruremo’ãi ehenói térã eñe’ẽmondóvo pumbyrýpe ha emoherakuãvo marandu nemba’etéva. Emombe’u tembiapo imarãkuaáva ko “Marandu iñañáva” rupive.

Kuaave

How can I get my organizations cerificates put in your certificate manager baseline?

  • 2 Mbohovái
  • 1 oguereko ko apañuái
  • 2 Hecha
  • Mbohovái ipaháva cor-el

more options

I work for the US Navy and am trying to import the DOD certs and receiving an error message saying "This certificate can't be verified and will not be imported. The certificate issuer might be unknown or untrusted, the certificate might have expired or been revoked, or the certificate might not have been approved." Then I look in the certificates and see them there but I am still unable to connect with .mil CAC enabled web sites. If I can get a direct email I could send screen shots or please reach out to me at xxx xxx xxxx.

Thanks, v/R

Chris Alford


edited phone# from spambots and public

I work for the US Navy and am trying to import the DOD certs and receiving an error message saying "This certificate can't be verified and will not be imported. The certificate issuer might be unknown or untrusted, the certificate might have expired or been revoked, or the certificate might not have been approved." Then I look in the certificates and see them there but I am still unable to connect with .mil CAC enabled web sites. If I can get a direct email I could send screen shots or please reach out to me at xxx xxx xxxx. Thanks, v/R Chris Alford edited phone# from spambots and public

Moambuepyre James rupive

Opaite Mbohovái (2)

more options

Hi Chris, here is an article on how certification authorities can apply for inclusion: https://wiki.mozilla.org/CA:How_to_apply

If the signing authority is DOD, then most likely DOD would need to apply, and that would allow all certificates it issues to be treated as valid. But it may be that DOD won't allow outside verification of its certificate issuing and key management practices to Mozilla's satisfaction, as it might view secrecy as more important than convenience.

Until then, you could try: https://wiki.mozilla.org/CA:AddRootToFirefox

more options

You can try:

Current Firefox releases require extensions to be signed to prevent abuse by malware. In Firefox 43 and later unsigned extensions will be disabled by default. You can set xpinstall.signatures.required to false to disable this security feature in the current Firefox releases. In later Firefox releases and Beta builds (47+) you may not be able to override this anymore.

See also: