▲ | LiamPowell 3 days ago | |||||||||||||||||||||||||||||||
> So, essentially, no company out there supports all these stores, and you just train users to bypass these warnings. This just sounds like a problem with your company. The barrier for getting certs from a public CA is lower than ever now that Let's Encrypt and others exist. If you really must have a non-public CA then your company needs an IT team that can properly manage that. This isn't an issue for normal users. | ||||||||||||||||||||||||||||||||
▲ | Galanwe 3 days ago | parent [-] | |||||||||||||||||||||||||||||||
> This just sounds like a problem with your company. I have seen that pattern in enough companies to be convinced this is widespread. > The barrier for getting certs from a public CA is lower than ever now that Let's Encrypt and others exist I don't think you understood what I'm talking about. Public certificates are cute for your public website, but any sizeable company is _also_ hundreds of internal websites and services, especially for the non IT departments. Think legal, compliance, accounting, HR, etc. Most companies use a private CA for these, and that makes sense: - You want subsigning CAs for your VPN, contractor services, websites, teams, etc. - You want private DNS to private IPs (lots of ISPs won't even serve your private IPs through their DNS caches) - etc > If you really must have a non-public CA then your company needs an IT team that can properly manage that. On the contrary, managing private CAs is what most companies do _well_. What they don't (and honestly nobody can) do well is distribute CA certs to user devices. This is often not done right on work devices, but BYOD made it even worst. No company can distribute its CA certs on the hundreds of different stores that one could think of, so after 2 years, some benign change of default corporate browser for users ends up with them learning to auto bypass certificate warnings. | ||||||||||||||||||||||||||||||||
|