diff options
Diffstat (limited to 'install/po/sv.po')
-rw-r--r-- | install/po/sv.po | 7813 |
1 files changed, 7813 insertions, 0 deletions
diff --git a/install/po/sv.po b/install/po/sv.po new file mode 100644 index 000000000..69b921a5e --- /dev/null +++ b/install/po/sv.po @@ -0,0 +1,7813 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) YEAR Red Hat +# This file is distributed under the same license as the PACKAGE package. +# +msgid "" +msgstr "" +"Project-Id-Version: FreeIPA\n" +"Report-Msgid-Bugs-To: https://bugzilla.redhat.com/enter_bug.cgi?product=freeIPA\n" +"POT-Creation-Date: 2011-06-06 13:27-0400\n" +"PO-Revision-Date: 2011-08-17 23:23+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: Swedish (http://www.transifex.net/projects/p/fedora/team/sv/)\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Language: sv\n" +"Plural-Forms: nplurals=2; plural=(n != 1)\n" + +#: ipalib/plugins/__init__.py:20 +msgid "" +"\n" +"Sub-package containing all core plugins.\n" +msgstr "" + +#: ipalib/plugins/aci.py:20 +msgid "" +"\n" +"Directory Server Access Control Instructions (ACIs)\n" +"\n" +"ACIs are used to allow or deny access to information. This module is\n" +"currently designed to allow, not deny, access.\n" +"\n" +"The aci commands are designed to grant permissions that allow updating\n" +"existing entries or adding or deleting new ones. The goal of the ACIs\n" +"that ship with IPA is to provide a set of low-level permissions that\n" +"grant access to special groups called taskgroups. These low-level\n" +"permissions can be combined into roles that grant broader access. These\n" +"roles are another type of group, roles.\n" +"\n" +"For example, if you have taskgroups that allow adding and modifying users you\n" +"could create a role, useradmin. You would assign users to the useradmin\n" +"role to allow them to do the operations defined by the taskgroups.\n" +"\n" +"You can create ACIs that delegate permission so users in group A can write\n" +"attributes on group B.\n" +"\n" +"The type option is a map that applies to all entries in the users, groups or\n" +"host location. It is primarily designed to be used when granting add\n" +"permissions (to write new entries).\n" +"\n" +"An ACI consists of three parts:\n" +"1. target\n" +"2. permissions\n" +"3. bind rules\n" +"\n" +"The target is a set of rules that define which LDAP objects are being\n" +"targeted. This can include a list of attributes, an area of that LDAP\n" +"tree or an LDAP filter.\n" +"\n" +"The targets include:\n" +"- attrs: list of attributes affected\n" +"- type: an object type (user, group, host, service, etc)\n" +"- memberof: members of a group\n" +"- targetgroup: grant access to modify a specific group. This is primarily\n" +" designed to enable users to add or remove members of a specific group.\n" +"- filter: A legal LDAP filter used to narrow the scope of the target.\n" +"- subtree: Used to apply a rule across an entire set of objects. For example,\n" +" to allow adding users you need to grant \"add\" permission to the subtree\n" +" ldap://uid=*,cn=users,cn=accounts,dc=example,dc=com. The subtree option\n" +" is a fail-safe for objects that may not be covered by the type option.\n" +"\n" +"The permissions define what the the ACI is allowed to do, and are one or\n" +"more of:\n" +"1. write - write one or more attributes\n" +"2. read - read one or more attributes\n" +"3. add - add a new entry to the tree\n" +"4. delete - delete an existing entry\n" +"5. all - all permissions are granted\n" +"\n" +"Note the distinction between attributes and entries. The permissions are\n" +"independent, so being able to add a user does not mean that the user will\n" +"be editable.\n" +"\n" +"The bind rule defines who this ACI grants permissions to. The LDAP server\n" +"allows this to be any valid LDAP entry but we encourage the use of\n" +"taskgroups so that the rights can be easily shared through roles.\n" +"\n" +"For a more thorough description of access controls see\n" +"http://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_Access_Control.html\n" +"\n" +"EXAMPLES:\n" +"\n" +"NOTE: ACIs are now added via the permission plugin. These examples are to\n" +"demonstrate how the various options work but this is done via the permission\n" +"command-line now (see last example).\n" +"\n" +" Add an ACI so that the group \"secretaries\" can update the address on any user:\n" +" ipa group-add --desc=\"Office secretaries\" secretaries\n" +" ipa aci-add --attrs=streetAddress --memberof=ipausers --group=secretaries --permissions=write --prefix=none \"Secretaries write addresses\"\n" +"\n" +" Show the new ACI:\n" +" ipa aci-show --prefix=none \"Secretaries write addresses\"\n" +"\n" +" Add an ACI that allows members of the \"addusers\" permission to add new users:\n" +" ipa aci-add --type=user --permission=addusers --permissions=add --prefix=none \"Add new users\"\n" +"\n" +" Add an ACI that allows members of the editors manage members of the admins group:\n" +" ipa aci-add --permissions=write --attrs=member --targetgroup=admins --group=editors --prefix=none \"Editors manage admins\"\n" +"\n" +" Add an ACI that allows members of the admin group to manage the street and zip code of those in the editors group:\n" +" ipa aci-add --permissions=write --memberof=editors --group=admins --attrs=street,postalcode --prefix=none \"admins edit the address of editors\"\n" +"\n" +" Add an ACI that allows the admins group manage the street and zipcode of those who work for the boss:\n" +" ipa aci-add --permissions=write --group=admins --attrs=street,postalcode --filter=\"(manager=uid=boss,cn=users,cn=accounts,dc=example,dc=com)\" --prefix=none \"Edit the address of those who work for the boss\"\n" +"\n" +" Add an entirely new kind of record to IPA that isn't covered by any of the --type options, creating a permission:\n" +" ipa permission-add --permissions=add --subtree=\"cn=*,cn=orange,cn=accounts,dc=example,dc=com\" --desc=\"Add Orange Entries\" add_orange\n" +"\n" +"\n" +"The show command shows the raw 389-ds ACI.\n" +"\n" +"IMPORTANT: When modifying the target attributes of an existing ACI you\n" +"must include all existing attributes as well. When doing an aci-mod the\n" +"targetattr REPLACES the current attributes, it does not add to them.\n" +"\n" +msgstr "" + +#: ipalib/plugins/aci.py:153 +msgid "A list of ACI values" +msgstr "" + +#: ipalib/plugins/aci.py:172 +msgid "" +"\n" +" Given a name and a prefix construct an ACI name.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:181 +msgid "" +"\n" +" Parse the raw ACI name and return a tuple containing the ACI prefix\n" +" and the actual ACI name.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:193 +msgid "" +"\n" +" Pull the group name out of a memberOf filter\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:204 +msgid "" +"\n" +" Given a name and a set of keywords construct an ACI.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:215 +msgid "type, filter, subtree and targetgroup are mutually exclusive" +msgstr "" + +#: ipalib/plugins/aci.py:218 +msgid "ACI prefix is required" +msgstr "" + +#: ipalib/plugins/aci.py:221 +msgid "" +"at least one of: type, filter, subtree, targetgroup, attrs or memberof are " +"required" +msgstr "" + +#: ipalib/plugins/aci.py:224 +msgid "filter and memberof are mutually exclusive" +msgstr "" + +#: ipalib/plugins/aci.py:230 +msgid "group, permission and self are mutually exclusive" +msgstr "" + +#: ipalib/plugins/aci.py:232 +msgid "One of group, permission or self is required" +msgstr "" + +#: ipalib/plugins/aci.py:251 +msgid "Group '%s' does not exist" +msgstr "" + +#: ipalib/plugins/aci.py:273 +msgid "empty filter" +msgstr "" + +#: ipalib/plugins/aci.py:294 +msgid "Syntax Error: %(error)s" +msgstr "" + +#: ipalib/plugins/aci.py:299 +msgid "" +"Convert an ACI into its equivalent keywords.\n" +"\n" +" This is used for the modify operation so we can merge the\n" +" incoming kw and existing ACI and pass the result to\n" +" _make_aci().\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:379 +msgid "ACI with name \"%s\" not found" +msgstr "" + +#: ipalib/plugins/aci.py:400 +msgid "ACI prefix" +msgstr "" + +#: ipalib/plugins/aci.py:401 +msgid "" +"Prefix used to distinguish ACI types (permission, delegation, selfservice, " +"none)" +msgstr "" + +#: ipalib/plugins/aci.py:407 +msgid "" +"\n" +" ACI object.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:412 +msgid "ACIs" +msgstr "" + +#: ipalib/plugins/aci.py:417 +msgid "ACI name" +msgstr "" + +#: ipalib/plugins/aci.py:422 +msgid "Permission" +msgstr "" + +#: ipalib/plugins/aci.py:423 +msgid "Permission ACI grants access to" +msgstr "" + +#: ipalib/plugins/aci.py:427 ipalib/plugins/delegation.py:130 +msgid "User group" +msgstr "" + +#: ipalib/plugins/aci.py:428 ipalib/plugins/delegation.py:131 +msgid "User group ACI grants access to" +msgstr "" + +#: ipalib/plugins/aci.py:432 ipalib/plugins/baseldap.py:60 +#: ipalib/plugins/delegation.py:113 ipalib/plugins/permission.py:107 +#: ipalib/plugins/permission.py:118 ipalib/plugins/selfservice.py:86 +msgid "Permissions" +msgstr "" + +#: ipalib/plugins/aci.py:433 +msgid "" +"comma-separated list of permissions to grant(read, write, add, delete, all)" +msgstr "" + +#: ipalib/plugins/aci.py:439 ipalib/plugins/delegation.py:119 +#: ipalib/plugins/permission.py:124 ipalib/plugins/selfservice.py:92 +msgid "Attributes" +msgstr "" + +#: ipalib/plugins/aci.py:440 ipalib/plugins/delegation.py:120 +#: ipalib/plugins/permission.py:125 ipalib/plugins/selfservice.py:93 +msgid "Comma-separated list of attributes" +msgstr "" + +#: ipalib/plugins/aci.py:444 ipalib/plugins/internal.py:164 +#: ipalib/plugins/permission.py:131 +msgid "Type" +msgstr "" + +#: ipalib/plugins/aci.py:445 +msgid "type of IPA object (user, group, host, hostgroup, service, netgroup)" +msgstr "" + +#: ipalib/plugins/aci.py:450 +msgid "Member of" +msgstr "" + +#: ipalib/plugins/aci.py:451 +msgid "Member of a group" +msgstr "" + +#: ipalib/plugins/aci.py:455 ipalib/plugins/internal.py:234 +#: ipalib/plugins/permission.py:144 +msgid "Filter" +msgstr "" + +#: ipalib/plugins/aci.py:456 ipalib/plugins/permission.py:145 +msgid "Legal LDAP filter (e.g. ou=Engineering)" +msgstr "" + +#: ipalib/plugins/aci.py:460 ipalib/plugins/permission.py:150 +msgid "Subtree" +msgstr "" + +#: ipalib/plugins/aci.py:461 +msgid "Subtree to apply ACI to" +msgstr "" + +#: ipalib/plugins/aci.py:465 ipalib/plugins/permission.py:156 +msgid "Target group" +msgstr "" + +#: ipalib/plugins/aci.py:466 +msgid "Group to apply ACI to" +msgstr "" + +#: ipalib/plugins/aci.py:470 +msgid "Target your own entry (self)" +msgstr "" + +#: ipalib/plugins/aci.py:471 +msgid "Apply ACI to your own entry (self)" +msgstr "" + +#: ipalib/plugins/aci.py:478 +msgid "" +"\n" +" Create new ACI.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:482 +msgid "Created ACI \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/aci.py:487 +msgid "Test the ACI syntax but don't write anything" +msgstr "" + +#: ipalib/plugins/aci.py:493 +msgid "" +"\n" +" Execute the aci-create operation.\n" +"\n" +" Returns the entry as it will be created in LDAP.\n" +"\n" +" :param aciname: The name of the ACI being added.\n" +" :param kw: Keyword arguments for the other LDAP attributes.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:533 +msgid "" +"\n" +" Delete ACI.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:538 +msgid "Deleted ACI \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/aci.py:543 +msgid "" +"\n" +" Execute the aci-delete operation.\n" +"\n" +" :param aciname: The name of the ACI being added.\n" +" :param kw: unused\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:576 +msgid "" +"\n" +" Modify ACI.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:582 ipalib/plugins/aci.py:830 +#: ipalib/plugins/aci.py:871 ipalib/plugins/delegation.py:255 +#: ipalib/plugins/selfservice.py:212 +msgid "ACI" +msgstr "" + +#: ipalib/plugins/aci.py:588 +msgid "Modified ACI \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/aci.py:633 +msgid "" +"\n" +" Search for ACIs.\n" +"\n" +" Returns a list of ACIs\n" +"\n" +" EXAMPLES:\n" +"\n" +" To find all ACIs that apply directly to members of the group ipausers:\n" +" ipa aci-find --memberof=ipausers\n" +"\n" +" To find all ACIs that grant add access:\n" +" ipa aci-find --permissions=add\n" +"\n" +" Note that the find command only looks for the given text in the set of\n" +" ACIs, it does not evaluate the ACIs to see if something would apply.\n" +" For example, searching on memberof=ipausers will find all ACIs that\n" +" have ipausers as a memberof. There may be other ACIs that apply to\n" +" members of that group indirectly.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:653 +msgid "%(count)d ACI matched" +msgid_plural "%(count)d ACIs matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/aci.py:823 +msgid "" +"\n" +" Display a single ACI given an ACI name.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:837 +msgid "" +"\n" +" Execute the aci-show operation.\n" +"\n" +" Returns the entry\n" +"\n" +" :param uid: The login name of the user to retrieve.\n" +" :param kw: unused\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:865 +msgid "" +"\n" +" Rename an ACI.\n" +" " +msgstr "" + +#: ipalib/plugins/aci.py:878 +msgid "New ACI name" +msgstr "" + +#: ipalib/plugins/aci.py:882 +msgid "Renamed ACI to \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/automount.py:20 +msgid "" +"\n" +"Automount\n" +"\n" +"Stores automount(8) configuration for autofs(8) in IPA.\n" +"\n" +"The base of an automount configuration is the configuration file auto.master.\n" +"This is also the base location in IPA. Multiple auto.master configurations\n" +"can be stored in separate locations. A location is implementation-specific\n" +"with the default being a location named 'default'. For example, you can have\n" +"locations by geographic region, by floor, by type, etc.\n" +"\n" +"Automount has three basic object types: locations, maps and keys.\n" +"\n" +"A location defines a set of maps anchored in auto.master. This allows you\n" +"to store multiple automount configurations. A location in itself isn't\n" +"very interesting, it is just a point to start a new automount map.\n" +"\n" +"A map is roughly equivalent to a discrete automount file and provides\n" +"storage for keys.\n" +"\n" +"A key is a mount point associated with a map.\n" +"\n" +"When a new location is created, two maps are automatically created for\n" +"it: auto.master and auto.direct. auto.master is the root map for all\n" +"automount maps for the location. auto.direct is the default map for\n" +"direct mounts and is mounted on /-.\n" +"\n" +"EXAMPLES:\n" +"\n" +"Locations:\n" +"\n" +" Create a named location, \"Baltimore\":\n" +" ipa automountlocation-add baltimore\n" +"\n" +" Display the new location:\n" +" ipa automountlocation-show baltimore\n" +"\n" +" Find available locations:\n" +" ipa automountlocation-find\n" +"\n" +" Remove a named automount location:\n" +" ipa automountlocation-del baltimore\n" +"\n" +" Show what the automount maps would look like if they were in the filesystem:\n" +" ipa automountlocation-tofiles baltimore\n" +"\n" +" Import an existing configuration into a location:\n" +" ipa automountlocation-import baltimore /etc/auto.master\n" +"\n" +" The import will fail if any duplicate entries are found. For\n" +" continuous operation where errors are ignored, use the --continue\n" +" option.\n" +"\n" +"Maps:\n" +"\n" +" Create a new map, \"auto.share\":\n" +" ipa automountmap-add baltimore auto.share\n" +"\n" +" Display the new map:\n" +" ipa automountmap-show baltimore auto.share\n" +"\n" +" Find maps in the location baltimore:\n" +" ipa automountmap-find baltimore\n" +"\n" +" Remove the auto.share map:\n" +" ipa automountmap-del baltimore auto.share\n" +"\n" +"Keys:\n" +"\n" +" Create a new key for the auto.share map in location baltimore. This ties\n" +" the map we previously created to auto.master:\n" +" ipa automountkey-add baltimore auto.master --key=/share --info=auto.share\n" +"\n" +" Create a new key for our auto.share map, an NFS mount for man pages:\n" +" ipa automountkey-add baltimore auto.share --key=man --info=\"-ro,soft,rsize=8192,wsize=8192 ipa.example.com:/shared/man\"\n" +"\n" +" Find all keys for the auto.share map:\n" +" ipa automountkey-find baltimore auto.share\n" +"\n" +" Find all direct automount keys:\n" +" ipa automountkey-find baltimore --key=/-\n" +"\n" +" Remove the man key from the auto.share map:\n" +" ipa automountkey-del baltimore auto.share --key=man\n" +msgstr "" + +#: ipalib/plugins/automount.py:182 +msgid "" +"\n" +" Location container for automount maps.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:190 +msgid "Automount Locations" +msgstr "" + +#: ipalib/plugins/automount.py:196 ipalib/plugins/host.py:247 +msgid "Location" +msgstr "" + +#: ipalib/plugins/automount.py:197 +msgid "Automount location name." +msgstr "" + +#: ipalib/plugins/automount.py:206 +msgid "" +"\n" +" Create a new automount location.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:221 +msgid "" +"\n" +" Delete an automount location.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:229 +msgid "" +"\n" +" Display an automount location.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:237 +msgid "" +"\n" +" Search for an automount location.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:245 +msgid "" +"\n" +" Generate automount files for a specific location.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:308 +msgid "" +"\n" +" Import automount files for a specific location.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:314 +msgid "Master file" +msgstr "" + +#: ipalib/plugins/automount.py:315 +msgid "Automount master file." +msgstr "" + +#: ipalib/plugins/automount.py:322 +msgid "" +"Continuous operation mode. Errors are reported but the process continues." +msgstr "" + +#: ipalib/plugins/automount.py:334 +msgid "File %(file)s not found" +msgstr "" + +#: ipalib/plugins/automount.py:341 +msgid "" +"\n" +" The basic idea is to read the master file and create all the maps\n" +" we need, then read each map file and add all the keys for the map.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:492 +msgid "" +"\n" +" Automount map object.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:505 +msgid "Map" +msgstr "" + +#: ipalib/plugins/automount.py:506 +msgid "Automount map name." +msgstr "" + +#: ipalib/plugins/automount.py:511 ipalib/plugins/group.py:114 +#: ipalib/plugins/hbacrule.py:171 ipalib/plugins/hbacsvc.py:73 +#: ipalib/plugins/hbacsvcgroup.py:75 ipalib/plugins/host.py:237 +#: ipalib/plugins/hostgroup.py:85 ipalib/plugins/netgroup.py:109 +#: ipalib/plugins/privilege.py:76 ipalib/plugins/role.py:92 +#: ipalib/plugins/sudocmd.py:74 ipalib/plugins/sudocmdgroup.py:76 +#: ipalib/plugins/sudorule.py:78 +msgid "Description" +msgstr "" + +#: ipalib/plugins/automount.py:515 +msgid "Automount Maps" +msgstr "" + +#: ipalib/plugins/automount.py:521 +msgid "" +"\n" +" Create a new automount map.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:529 +msgid "" +"\n" +" Delete an automount map.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:548 +msgid "" +"\n" +" Modify an automount map.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:556 +msgid "" +"\n" +" Search for an automount map.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:564 +msgid "" +"\n" +" Display an automount map.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:572 +msgid "" +"\n" +" Automount key object.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:589 ipalib/plugins/automount.py:778 +#: ipalib/plugins/automount.py:850 +msgid "Key" +msgstr "" + +#: ipalib/plugins/automount.py:590 ipalib/plugins/automount.py:779 +#: ipalib/plugins/automount.py:851 +msgid "Automount key name." +msgstr "" + +#: ipalib/plugins/automount.py:594 ipalib/plugins/automount.py:783 +#: ipalib/plugins/automount.py:855 +msgid "Mount information" +msgstr "" + +#: ipalib/plugins/automount.py:597 +msgid "description" +msgstr "" + +#: ipalib/plugins/automount.py:606 +msgid "Automount Keys" +msgstr "" + +#: ipalib/plugins/automount.py:607 +msgid "" +"The key,info pair must be unique. A key named %(key)s with info %(info)s " +"already exists" +msgstr "" + +#: ipalib/plugins/automount.py:608 +msgid "key named %(key)s already exists" +msgstr "" + +#: ipalib/plugins/automount.py:609 +msgid "The automount key %(key)s with info %(info)s does not exist" +msgstr "" + +#: ipalib/plugins/automount.py:659 +msgid "" +"More than one entry with key %(key)s found, use --info to select specific " +"entry." +msgstr "" + +#: ipalib/plugins/automount.py:717 +msgid "" +"\n" +" Create a new automount key.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:742 +msgid "" +"\n" +" Create a new indirect mount point.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:748 +msgid "Mount point" +msgstr "" + +#: ipalib/plugins/automount.py:752 +msgid "Parent map" +msgstr "" + +#: ipalib/plugins/automount.py:753 +msgid "Name of parent automount map (default: auto.master)." +msgstr "" + +#: ipalib/plugins/automount.py:772 +msgid "" +"\n" +" Delete an automount key.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:803 +msgid "" +"\n" +" Modify an automount key.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:809 +msgid "New mount information" +msgstr "" + +#: ipalib/plugins/automount.py:836 +msgid "" +"\n" +" Search for an automount key.\n" +" " +msgstr "" + +#: ipalib/plugins/automount.py:844 +msgid "" +"\n" +" Display an automount key.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:19 +msgid "" +"\n" +"Base classes for LDAP plugins.\n" +msgstr "" + +#: ipalib/plugins/baseldap.py:39 +msgid "Failed members" +msgstr "" + +#: ipalib/plugins/baseldap.py:42 +msgid "Member users" +msgstr "" + +#: ipalib/plugins/baseldap.py:45 +msgid "Member groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:48 +msgid "Member of groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:51 +msgid "Member hosts" +msgstr "" + +#: ipalib/plugins/baseldap.py:54 +msgid "Member host-groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:57 +msgid "Member of host-groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:66 +msgid "Roles" +msgstr "" + +#: ipalib/plugins/baseldap.py:69 ipalib/plugins/sudocmdgroup.py:65 +#: ipalib/plugins/sudocmdgroup.py:84 ipalib/plugins/sudorule.py:139 +#: ipalib/plugins/sudorule.py:143 +msgid "Sudo Command Groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:75 +msgid "Granting privilege to roles" +msgstr "" + +#: ipalib/plugins/baseldap.py:78 +msgid "Member netgroups" +msgstr "" + +#: ipalib/plugins/baseldap.py:81 +msgid "Member of netgroups" +msgstr "" + +#: ipalib/plugins/baseldap.py:84 +msgid "Member services" +msgstr "" + +#: ipalib/plugins/baseldap.py:87 +msgid "Member service groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:93 +msgid "Member HBAC service groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:102 +msgid "Indirect Member users" +msgstr "" + +#: ipalib/plugins/baseldap.py:105 +msgid "Indirect Member groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:108 +msgid "Indirect Member hosts" +msgstr "" + +#: ipalib/plugins/baseldap.py:111 +msgid "Indirect Member host-groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:114 +msgid "Indirect Member of roles" +msgstr "" + +#: ipalib/plugins/baseldap.py:117 +msgid "Indirect Member permissions" +msgstr "" + +#: ipalib/plugins/baseldap.py:120 +msgid "Indirect Member HBAC service" +msgstr "" + +#: ipalib/plugins/baseldap.py:123 +msgid "Indirect Member HBAC service group" +msgstr "" + +#: ipalib/plugins/baseldap.py:126 +msgid "Indirect Member netgroups" +msgstr "" + +#: ipalib/plugins/baseldap.py:141 +msgid "External host" +msgstr "" + +#: ipalib/plugins/baseldap.py:144 +msgid "Failed hosts/hostgroups" +msgstr "" + +#: ipalib/plugins/baseldap.py:147 +msgid "Failed users/groups" +msgstr "" + +#: ipalib/plugins/baseldap.py:150 +msgid "Failed managedby" +msgstr "" + +#: ipalib/plugins/baseldap.py:153 +msgid "Failed to remove" +msgstr "" + +#: ipalib/plugins/baseldap.py:171 +msgid "" +"\n" +" Given a list of values in the form name=value, return a list of name.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:197 +msgid "" +"\n" +" When adding or removing reverse members we are faking an update to\n" +" object A by updating the member attribute in object B. The memberof\n" +" plugin makes this work by adding or removing the memberof attribute\n" +" to/from object A, it just takes a little bit of time.\n" +"\n" +" This will loop for 6+ seconds, retrieving object A so we can see\n" +" if all the memberof attributes have been updated.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:241 +msgid "" +"\n" +" Object representing a LDAP entry.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:281 +msgid "Entry" +msgstr "" + +#: ipalib/plugins/baseldap.py:283 +msgid "container entry (%(container)s) not found" +msgstr "" + +#: ipalib/plugins/baseldap.py:284 +msgid "%(parent)s: %(oname)s not found" +msgstr "" + +#: ipalib/plugins/baseldap.py:285 +msgid "%(pkey)s: %(oname)s not found" +msgstr "" + +#: ipalib/plugins/baseldap.py:286 +msgid "%(oname)s with name \"%(pkey)s\" already exists" +msgstr "" + +#: ipalib/plugins/baseldap.py:415 +msgid "" +"Add an attribute/value pair. Format is attr=value. The attribute must be " +"part of the schema." +msgstr "" + +#: ipalib/plugins/baseldap.py:420 +msgid "" +"Set an attribute to a name/value pair. Format is attr=value.\n" +"For multi-valued attributes, the command replaces the values already present." +msgstr "" + +#: ipalib/plugins/baseldap.py:444 +msgid "" +"\n" +" If the set of objectclasses is limited enforce that only those\n" +" are updated in entry_attrs (plus dn)\n" +"\n" +" allow_only tells us what mode to check in:\n" +"\n" +" If True then we enforce that the attributes must be in the list of\n" +" allowed.\n" +"\n" +" If False then those attributes are not allowed.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:474 +msgid "" +"\n" +" Callback registration interface\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:561 +msgid "" +"\n" +" Create a new entry in LDAP.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:703 +msgid "" +"\n" +" Base class for commands that need to retrieve an existing entry.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:727 +msgid "" +"\n" +" Base class for commands that need to retrieve one or more existing entries.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:733 +msgid "Continuous mode: Don't stop on errors." +msgstr "" + +#: ipalib/plugins/baseldap.py:750 +msgid "" +"\n" +" Retrieve an LDAP entry.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:758 ipalib/plugins/baseldap.py:827 +#: ipalib/plugins/internal.py:232 +msgid "Rights" +msgstr "" + +#: ipalib/plugins/baseldap.py:759 ipalib/plugins/baseldap.py:828 +msgid "" +"Display the access rights of this entry (requires --all). See ipa man page " +"for details." +msgstr "" + +#: ipalib/plugins/baseldap.py:821 +msgid "" +"\n" +" Update an LDAP entry.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:837 +msgid "Rename" +msgstr "" + +#: ipalib/plugins/baseldap.py:838 +msgid "Rename the %(ldap_obj_name)s object" +msgstr "" + +#: ipalib/plugins/baseldap.py:957 +msgid "the entry was deleted while being modified" +msgstr "" + +#: ipalib/plugins/baseldap.py:988 +msgid "" +"\n" +" Delete an LDAP entry and all of its direct subentries.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1078 +msgid "" +"\n" +" Base class for member manipulation.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1120 +msgid "" +"\n" +" Add other LDAP entries to members.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1131 ipalib/plugins/baseldap.py:1592 +#: ipalib/plugins/privilege.py:165 ipalib/plugins/privilege.py:191 +#: ipalib/plugins/role.py:179 ipalib/plugins/role.py:203 +msgid "Members that could not be added" +msgstr "" + +#: ipalib/plugins/baseldap.py:1135 ipalib/plugins/baseldap.py:1596 +msgid "Number of members added" +msgstr "" + +#: ipalib/plugins/baseldap.py:1226 +msgid "" +"\n" +" Remove LDAP entries from members.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1236 ipalib/plugins/baseldap.py:1705 +msgid "Members that could not be removed" +msgstr "" + +#: ipalib/plugins/baseldap.py:1240 ipalib/plugins/baseldap.py:1709 +msgid "Number of members removed" +msgstr "" + +#: ipalib/plugins/baseldap.py:1335 +msgid "" +"\n" +" Retrieve all LDAP entries matching the given criteria.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1344 +msgid "Time Limit" +msgstr "" + +#: ipalib/plugins/baseldap.py:1345 +msgid "Time limit of search in seconds" +msgstr "" + +#: ipalib/plugins/baseldap.py:1351 +msgid "Size Limit" +msgstr "" + +#: ipalib/plugins/baseldap.py:1352 +msgid "Maximum number of entries returned" +msgstr "" + +#: ipalib/plugins/baseldap.py:1552 +msgid "" +"\n" +" Base class for reverse member manipulation.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1574 +msgid "" +"\n" +" Add other LDAP entries to members in reverse.\n" +"\n" +" The call looks like \"add A to B\" but in fact executes\n" +" add B to A to handle reverse membership.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1654 +msgid "added" +msgstr "" + +#: ipalib/plugins/baseldap.py:1687 +msgid "" +"\n" +" Remove other LDAP entries from members in reverse.\n" +"\n" +" The call looks like \"remove A from B\" but in fact executes\n" +" remove B from A to handle reverse membership.\n" +" " +msgstr "" + +#: ipalib/plugins/baseldap.py:1767 +msgid "removed" +msgstr "" + +#: ipalib/plugins/batch.py:21 +msgid "" +"\n" +"Plugin to make multiple ipa calls via one remote procedure call\n" +"\n" +"To run this code in the lite-server\n" +"\n" +"curl -H \"Content-Type:application/json\" -H \"Accept:application/json\" -H \"Accept-Language:en\" --negotiate -u : --cacert /etc/ipa/ca.crt -d @batch_request.json -X POST http://localhost:8888/ipa/json\n" +"\n" +"where the contents of the file batch_request.json follow the below example\n" +"\n" +"{\"method\":\"batch\",\"params\":[[\n" +" {\"method\":\"group_find\",\"params\":[[],{}]},\n" +" {\"method\":\"user_find\",\"params\":[[],{\"whoami\":\"true\",\"all\":\"true\"}]},\n" +" {\"method\":\"user_show\",\"params\":[[\"admin\"],{\"all\":true}]}\n" +" ],{}],\"id\":1}\n" +"\n" +"The format of the response is nested the same way. At the top you will see\n" +" \"error\": null,\n" +" \"id\": 1,\n" +" \"result\": {\n" +" \"count\": 3,\n" +" \"results\": [\n" +"\n" +"\n" +"And then a nested response for each IPA command method sent in the request\n" +"\n" +msgstr "" + +#: ipalib/plugins/batch.py:61 +msgid "Nested Methods to execute" +msgstr "" + +#: ipalib/plugins/batch.py:68 ipalib/frontend.py:861 +msgid "Client version. Used to determine if server will accept request." +msgstr "" + +#: ipalib/plugins/cert.py:22 +msgid "" +"\n" +"IPA certificate operations\n" +"\n" +"Implements a set of commands for managing server SSL certificates.\n" +"\n" +"Certificate requests exist in the form of a Certificate Signing Request (CSR)\n" +"in PEM format.\n" +"\n" +"If using the selfsign back end then the subject in the CSR needs to match\n" +"the subject configured in the server. The dogtag CA uses just the CN\n" +"value of the CSR and forces the rest of the subject.\n" +"\n" +"A certificate is stored with a service principal and a service principal\n" +"needs a host.\n" +"\n" +"In order to request a certificate:\n" +"\n" +"* The host must exist\n" +"* The service must exist (or you use the --add option to automatically add it)\n" +"\n" +"EXAMPLES:\n" +"\n" +" Request a new certificate and add the principal:\n" +" ipa cert-request --add --principal=HTTP/lion.example.com example.csr\n" +"\n" +" Retrieve an existing certificate:\n" +" ipa cert-show 1032\n" +"\n" +" Revoke a certificate (see RFC 5280 for reason details):\n" +" ipa cert-revoke --revocation-reason=6 1032\n" +"\n" +" Remove a certificate from revocation hold status:\n" +" ipa cert-remove-hold 1032\n" +"\n" +" Check the status of a signing request:\n" +" ipa cert-status 10\n" +"\n" +"IPA currently immediately issues (or declines) all certificate requests so\n" +"the status of a request is not normally useful. This is for future use\n" +"or the case where a CA does not immediately issue a certificate.\n" +"\n" +"The following revocation reasons are supported:\n" +"\n" +" * 0 - unspecified\n" +" * 1 - keyCompromise\n" +" * 2 - cACompromise\n" +" * 3 - affiliationChanged\n" +" * 4 - superseded\n" +" * 5 - cessationOfOperation\n" +" * 6 - certificateHold\n" +" * 8 - removeFromCRL\n" +" * 9 - privilegeWithdrawn\n" +" * 10 - aACompromise\n" +"\n" +"Note that reason code 7 is not used. See RFC 5280 for more details:\n" +"\n" +"http://www.ietf.org/rfc/rfc5280.txt\n" +"\n" +msgstr "" + +#: ipalib/plugins/cert.py:104 +msgid "" +"\n" +" Return the value of CN in the subject of the request or None\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:112 +msgid "Failure decoding Certificate Signing Request:" +msgstr "" + +#: ipalib/plugins/cert.py:115 +msgid "" +"\n" +" Return the first value of the subject alt name, if any\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:125 ipalib/plugins/cert.py:137 +msgid "Failure decoding Certificate Signing Request" +msgstr "" + +#: ipalib/plugins/cert.py:128 +msgid "" +"\n" +" Ensure the CSR is base64-encoded and can be decoded by our PKCS#10\n" +" parser.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:139 +msgid "Failure decoding Certificate Signing Request: %s" +msgstr "" + +#: ipalib/plugins/cert.py:142 +msgid "" +"\n" +" Strip any leading and trailing cruft around the BEGIN/END block\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:162 +msgid "" +"\n" +" Convert a SN given in decimal or hexadecimal.\n" +" Returns the number or None if conversion fails.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:188 +msgid "" +"\n" +" Given a principal with or without a realm return the\n" +" host portion.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:202 +msgid "" +"\n" +" Submit a certificate signing request.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:216 ipalib/plugins/service.py:225 +msgid "Principal" +msgstr "" + +#: ipalib/plugins/cert.py:217 +msgid "Service principal for this certificate (e.g. HTTP/test.example.com)" +msgstr "" + +#: ipalib/plugins/cert.py:224 +msgid "automatically add the principal if it doesn't exist" +msgstr "" + +#: ipalib/plugins/cert.py:232 ipalib/plugins/cert.py:439 +#: ipalib/plugins/entitle.py:173 ipalib/plugins/host.py:276 +#: ipalib/plugins/service.py:232 +msgid "Certificate" +msgstr "" + +#: ipalib/plugins/cert.py:236 ipalib/plugins/cert.py:442 +#: ipalib/plugins/host.py:159 ipalib/plugins/service.py:93 +msgid "Subject" +msgstr "" + +#: ipalib/plugins/cert.py:240 ipalib/plugins/cert.py:445 +#: ipalib/plugins/host.py:165 ipalib/plugins/service.py:99 +msgid "Issuer" +msgstr "" + +#: ipalib/plugins/cert.py:244 ipalib/plugins/cert.py:448 +#: ipalib/plugins/host.py:168 ipalib/plugins/service.py:102 +msgid "Not Before" +msgstr "" + +#: ipalib/plugins/cert.py:248 ipalib/plugins/cert.py:451 +#: ipalib/plugins/host.py:171 ipalib/plugins/service.py:105 +msgid "Not After" +msgstr "" + +#: ipalib/plugins/cert.py:252 ipalib/plugins/cert.py:454 +#: ipalib/plugins/host.py:174 ipalib/plugins/service.py:108 +msgid "Fingerprint (MD5)" +msgstr "" + +#: ipalib/plugins/cert.py:256 ipalib/plugins/cert.py:457 +#: ipalib/plugins/host.py:177 ipalib/plugins/service.py:111 +msgid "Fingerprint (SHA1)" +msgstr "" + +#: ipalib/plugins/cert.py:260 ipalib/plugins/cert.py:425 +msgid "Serial number" +msgstr "" + +#: ipalib/plugins/cert.py:268 ipalib/plugins/entitle.py:230 +#: ipalib/plugins/entitle.py:588 ipalib/plugins/misc.py:57 +msgid "Dictionary mapping variable name to value" +msgstr "" + +#: ipalib/plugins/cert.py:396 +msgid "" +"\n" +" Check the status of a certificate signing request.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:402 +msgid "Request id" +msgstr "" + +#: ipalib/plugins/cert.py:408 +msgid "Request status" +msgstr "" + +#: ipalib/plugins/cert.py:426 +msgid "Serial number in decimal or if prefixed with 0x in hexadecimal" +msgstr "" + +#: ipalib/plugins/cert.py:431 +msgid "" +"\n" +" Retrieve an existing certificate.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:460 ipalib/plugins/host.py:180 +#: ipalib/plugins/service.py:114 +msgid "Revocation reason" +msgstr "" + +#: ipalib/plugins/cert.py:466 +msgid "Output filename" +msgstr "" + +#: ipalib/plugins/cert.py:467 +msgid "File to store the certificate in." +msgstr "" + +#: ipalib/plugins/cert.py:518 +msgid "" +"\n" +" Revoke a certificate.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:526 +msgid "Revoked" +msgstr "" + +#: ipalib/plugins/cert.py:534 +msgid "Reason" +msgstr "" + +#: ipalib/plugins/cert.py:535 +msgid "Reason for revoking the certificate (0-10)" +msgstr "" + +#: ipalib/plugins/cert.py:562 +msgid "" +"\n" +" Take a revoked certificate off hold.\n" +" " +msgstr "" + +#: ipalib/plugins/cert.py:570 +msgid "Unrevoked" +msgstr "" + +#: ipalib/plugins/cert.py:573 +msgid "Error" +msgstr "" + +#: ipalib/plugins/config.py:20 +msgid "" +"\n" +"Manage the IPA configuration\n" +"\n" +"Manage the default values that IPA uses and some of its tuning parameters.\n" +"\n" +" To show the current configuration:\n" +" ipa config-show\n" +"\n" +" To modify the configuration:\n" +" ipa config-mod --maxusername=99\n" +"\n" +"The available options are:\n" +"\n" +"User management options:\n" +"\n" +" --maxusername=INT Max. username length when creating/modifying a user\n" +" --homedirectory=STR Default location of home directories (default /home)\n" +" --defaultshell=STR Default shell for new users (default /bin/sh)\n" +" --defaultgroup=STR Default group for new users (default ipausers). The\n" +" group must exist, or adding new users will fail.\n" +" --emaildomain=STR Default e-mail domain for new users\n" +"\n" +"Search tuning options. These impact how much data is searched through and\n" +"how many records may be returned on a given search.\n" +"\n" +" --searchtimelimit=INT Max. amount of time (sec.) for a search (> 0, or -1 for\n" +" unlimited)\n" +" --searchrecordslimit=INT Max. number of records to search (-1 is unlimited)\n" +"\n" +"Server Configuration.\n" +"\n" +" --enable-migration=BOOL Enable migration mode\n" +" --pwdexpnotify=INT Password Expiration Notification (days)\n" +"\n" +"The password notification value is stored here so it will be replicated.\n" +"It is not currently used to notify users in advance of an expiring\n" +"password.\n" +"\n" +"Some attributes are read-only, provided only for information purposes. These\n" +"include:\n" +"\n" +"Certificate Subject base: the configured certificate subject base,\n" +" e.g. O=EXAMPLE.COM. This is configurable only at install time.\n" +"Password plug-in features: currently defines additional hashes that the\n" +" password will generate (there may be other conditions).\n" +msgstr "" + +#: ipalib/plugins/config.py:76 +msgid "searchtimelimit must be -1 or > 1." +msgstr "" + +#: ipalib/plugins/config.py:80 +msgid "" +"\n" +" IPA configuration object\n" +" " +msgstr "" + +#: ipalib/plugins/config.py:91 ipalib/plugins/internal.py:151 +msgid "Configuration" +msgstr "" + +#: ipalib/plugins/config.py:96 +msgid "Max. username length" +msgstr "" + +#: ipalib/plugins/config.py:101 +msgid "Home directory base" +msgstr "" + +#: ipalib/plugins/config.py:102 +msgid "Default location of home directories." +msgstr "" + +#: ipalib/plugins/config.py:106 +msgid "Default shell" +msgstr "" + +#: ipalib/plugins/config.py:107 +msgid "Default shell for new users." +msgstr "" + +#: ipalib/plugins/config.py:111 +msgid "Default users group" +msgstr "" + +#: ipalib/plugins/config.py:112 +msgid "Default group for new users." +msgstr "" + +#: ipalib/plugins/config.py:116 +msgid "Default e-mail domain for new users" +msgstr "" + +#: ipalib/plugins/config.py:117 +msgid "Default e-mail domain new users." +msgstr "" + +#: ipalib/plugins/config.py:121 +msgid "Search time limit" +msgstr "" + +#: ipalib/plugins/config.py:122 +msgid "Max. amount of time (sec.) for a search (> 0, or -1 for unlimited)." +msgstr "" + +#: ipalib/plugins/config.py:127 +msgid "Search size limit" +msgstr "" + +#: ipalib/plugins/config.py:128 +msgid "Max. number of records to search (-1 is unlimited)." +msgstr "" + +#: ipalib/plugins/config.py:133 +msgid "User search fields" +msgstr "" + +#: ipalib/plugins/config.py:134 +msgid "A comma-separated list of fields to search when searching for users." +msgstr "" + +#: ipalib/plugins/config.py:139 +msgid "A comma-separated list of fields to search when searching for groups." +msgstr "" + +#: ipalib/plugins/config.py:143 +msgid "Migration mode" +msgstr "" + +#: ipalib/plugins/config.py:144 +msgid "Enable migration mode." +msgstr "" + +#: ipalib/plugins/config.py:148 +msgid "Certificate Subject base" +msgstr "" + +#: ipalib/plugins/config.py:149 +msgid "Base for certificate subjects (OU=Test,O=Example)." +msgstr "" + +#: ipalib/plugins/config.py:154 +msgid "Default group objectclasses" +msgstr "" + +#: ipalib/plugins/config.py:155 +msgid "Default group objectclassses (comma-separated list)." +msgstr "" + +#: ipalib/plugins/config.py:159 +msgid "Default user objectclasses" +msgstr "" + +#: ipalib/plugins/config.py:160 +msgid "Default user objectclassses (comma-separated list)." +msgstr "" + +#: ipalib/plugins/config.py:164 +msgid "Password Expiration Notification" +msgstr "" + +#: ipalib/plugins/config.py:165 +msgid "Number of days's notice of impending password expiration." +msgstr "" + +#: ipalib/plugins/config.py:170 +msgid "Password plugin features" +msgstr "" + +#: ipalib/plugins/config.py:171 +msgid "Extra hashes to generate in password plug-in." +msgstr "" + +#: ipalib/plugins/config.py:183 +msgid "" +"\n" +" Modify configuration options.\n" +" " +msgstr "" + +#: ipalib/plugins/config.py:220 +msgid "" +"\n" +" Show the current configuration.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:19 +msgid "" +"\n" +"Group to Group Delegation\n" +"\n" +"A permission enables fine-grained delegation of permissions. Access Control\n" +"Rules, or instructions (ACIs), grant permission to permissions to perform\n" +"given tasks such as adding a user, modifying a group, etc.\n" +"\n" +"Group to Group Delegations grants the members of one group to update a set\n" +"of attributes of members of another group.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a delegation rule to allow editors to edit admin's addresses:\n" +" ipa delegation-add --attrs=street --membergroup=admins --group=editors 'editors edit admins street'\n" +"\n" +" When managing the list of attributes you need to include all attributes\n" +" in the list, including existing ones. Add postalCode to the list:\n" +" ipa delegation-mod --attrs=street,postalCode --membergroup=admins --group=editors 'editors edit admins street'\n" +"\n" +" Display our updated rule:\n" +" ipa delegation-show 'editors edit admins street'\n" +"\n" +" Delete a rule:\n" +" ipa delegation-del 'editors edit admins street'\n" +msgstr "" + +#: ipalib/plugins/delegation.py:56 +msgid "" +"\n" +" memberOf is in filter but we want to pull out the group for easier\n" +" displaying.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:63 ipalib/plugins/delegation.py:90 +msgid "Delegation '%(permission)s' not found" +msgstr "" + +#: ipalib/plugins/delegation.py:70 +msgid "Error retrieving member group %(group)s: %(error)s" +msgstr "" + +#: ipalib/plugins/delegation.py:79 +msgid "" +"\n" +" Determine if the ACI is a Delegation ACI and raise an exception if it\n" +" isn't.\n" +"\n" +" Return the result if it is a delegation ACI, adding a new attribute\n" +" membergroup.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:95 +msgid "" +"\n" +" Delegation object.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:102 +msgid "Delegation" +msgstr "" + +#: ipalib/plugins/delegation.py:107 ipalib/plugins/delegation.py:108 +msgid "Delegation name" +msgstr "" + +#: ipalib/plugins/delegation.py:114 ipalib/plugins/selfservice.py:87 +msgid "" +"Comma-separated list of permissions to grant (read, write). Default is " +"write." +msgstr "" + +#: ipalib/plugins/delegation.py:125 +msgid "Member user group" +msgstr "" + +#: ipalib/plugins/delegation.py:126 +msgid "User group to apply delegation to" +msgstr "" + +#: ipalib/plugins/delegation.py:152 +msgid "" +"\n" +" Add a new delegation.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:156 +msgid "Added delegation \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/delegation.py:176 +msgid "" +"\n" +" Delete a delegation.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:181 +msgid "Deleted delegation \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/delegation.py:197 +msgid "" +"\n" +" Modify a delegation.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:201 +msgid "Modified delegation \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/delegation.py:219 +msgid "" +"\n" +" Search for delegations.\n" +" " +msgstr "" + +#: ipalib/plugins/delegation.py:223 +msgid "%(count)d delegation matched" +msgid_plural "%(count)d delegations matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/delegation.py:250 +msgid "" +"\n" +" Display information about a delegation.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:20 +msgid "" +"\n" +"Domain Name System (DNS)\n" +"\n" +"Manage DNS zone and resource records.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add new zone:\n" +" ipa dnszone-add example.com --name-server nameserver.example.com\n" +" --admin-email admin@example.com\n" +"\n" +" Add second nameserver for example.com:\n" +" ipa dnsrecord-add example.com @ --ns-rec nameserver2.example.com\n" +"\n" +" Add a mail server for example.com:\n" +" ipa dnsrecord-add example.com @ --mx-rec=\"10 mail2\"\n" +"\n" +" Delete previously added nameserver from example.com:\n" +" ipa dnsrecord-del example.com @ --ns-rec nameserver2.example.com\n" +"\n" +" Add new A record for www.example.com: (random IP)\n" +" ipa dnsrecord-add example.com www --a-rec 80.142.15.2\n" +"\n" +" Add new PTR record for www.example.com\n" +" ipa dnsrecord-add 15.142.80.in-addr.arpa 2 --ptr-rec www.example.com.\n" +"\n" +" Add new SRV records for LDAP servers. Three quarters of the requests\n" +" should go to fast.example.com, one quarter to slow.example.com. If neither\n" +" is available, switch to backup.example.com.\n" +" ipa dnsrecord-add example.com _ldap._tcp --srv-rec=\"0 3 389 fast.example.com\"\n" +" ipa dnsrecord-add example.com _ldap._tcp --srv-rec=\"0 1 389 slow.example.com\"\n" +" ipa dnsrecord-add example.com _ldap._tcp --srv-rec=\"1 1 389 backup.example.com\"\n" +"\n" +" When dnsrecord-add command is executed with no option to add a specific record\n" +" an interactive mode is started. The mode interactively prompts for the most\n" +" typical record types for the respective zone:\n" +" ipa dnsrecord-add example.com www\n" +" [A record]: 1.2.3.4,11.22.33.44 (2 interactively entered random IPs)\n" +" [AAAA record]: (no AAAA address entered)\n" +" Record name: www\n" +" A record: 1.2.3.4, 11.22.33.44\n" +"\n" +" The interactive mode can also be used for deleting the DNS records:\n" +" ipa dnsrecord-del example.com www\n" +" No option to delete specific record provided.\n" +" Delete all? Yes/No (default No): (do not delete all records)\n" +" Current DNS record contents:\n" +"\n" +" A record: 1.2.3.4, 11.22.33.44\n" +"\n" +" Delete A record '1.2.3.4'? Yes/No (default No): \n" +" Delete A record '11.22.33.44'? Yes/No (default No): y\n" +" Record name: www\n" +" A record: 1.2.3.4 (A record 11.22.33.44 has been deleted)\n" +"\n" +" Show zone example.com:\n" +" ipa dnszone-show example.com\n" +"\n" +" Find zone with \"example\" in its domain name:\n" +" ipa dnszone-find example\n" +"\n" +" Find records for resources with \"www\" in their name in zone example.com:\n" +" ipa dnsrecord-find example.com www\n" +"\n" +" Find A records with value 10.10.0.1 in zone example.com\n" +" ipa dnsrecord-find example.com --a-rec 10.10.0.1\n" +"\n" +" Show records for resource www in zone example.com\n" +" ipa dnsrecord-show example.com www\n" +"\n" +" Delete zone example.com with all resource records:\n" +" ipa dnszone-del example.com\n" +"\n" +" Resolve a host name to see if it exists (will add default IPA domain\n" +" if one is not included):\n" +" ipa dns-resolve www.example.com\n" +" ipa dns-resolve www\n" +msgstr "" + +#: ipalib/plugins/dns.py:140 +msgid "Generate serial number for zones." +msgstr "" + +#: ipalib/plugins/dns.py:189 +msgid "see RFC 2915 " +msgstr "" + +#: ipalib/plugins/dns.py:249 +msgid "Nameserver '%(host)s' does not have a corresponding A/AAAA record" +msgstr "" + +#: ipalib/plugins/dns.py:272 +msgid "" +"\n" +" DNS Zone, container for resource records.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:284 +msgid "DNS" +msgstr "" + +#: ipalib/plugins/dns.py:289 +msgid "Zone name" +msgstr "" + +#: ipalib/plugins/dns.py:290 +msgid "Zone name (FQDN)" +msgstr "" + +#: ipalib/plugins/dns.py:296 +msgid "Authoritative nameserver" +msgstr "" + +#: ipalib/plugins/dns.py:297 +msgid "Authoritative nameserver." +msgstr "" + +#: ipalib/plugins/dns.py:301 ipalib/plugins/dns.py:302 +msgid "Administrator e-mail address" +msgstr "" + +#: ipalib/plugins/dns.py:308 +msgid "SOA serial" +msgstr "" + +#: ipalib/plugins/dns.py:309 +msgid "SOA record serial number" +msgstr "" + +#: ipalib/plugins/dns.py:316 +msgid "SOA refresh" +msgstr "" + +#: ipalib/plugins/dns.py:317 +msgid "SOA record refresh time" +msgstr "" + +#: ipalib/plugins/dns.py:324 +msgid "SOA retry" +msgstr "" + +#: ipalib/plugins/dns.py:325 +msgid "SOA record retry time" +msgstr "" + +#: ipalib/plugins/dns.py:332 +msgid "SOA expire" +msgstr "" + +#: ipalib/plugins/dns.py:333 +msgid "SOA record expire time" +msgstr "" + +#: ipalib/plugins/dns.py:340 +msgid "SOA minimum" +msgstr "" + +#: ipalib/plugins/dns.py:341 +msgid "How long should negative responses be cached" +msgstr "" + +#: ipalib/plugins/dns.py:349 +msgid "SOA time to live" +msgstr "" + +#: ipalib/plugins/dns.py:350 +msgid "SOA record time to live" +msgstr "" + +#: ipalib/plugins/dns.py:354 +msgid "SOA class" +msgstr "" + +#: ipalib/plugins/dns.py:355 +msgid "SOA record class" +msgstr "" + +#: ipalib/plugins/dns.py:360 ipalib/plugins/dns.py:361 +msgid "BIND update policy" +msgstr "" + +#: ipalib/plugins/dns.py:365 +msgid "Active zone" +msgstr "" + +#: ipalib/plugins/dns.py:366 +msgid "Is zone active?" +msgstr "" + +#: ipalib/plugins/dns.py:372 +msgid "Dynamic update" +msgstr "" + +#: ipalib/plugins/dns.py:373 +msgid "Allow dynamic updates." +msgstr "" + +#: ipalib/plugins/dns.py:382 +msgid "" +"\n" +" Create new DNS zone (SOA record).\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:387 ipalib/plugins/dns.py:697 +#: ipalib/plugins/host.py:315 ipalib/plugins/service.py:250 +msgid "Force" +msgstr "" + +#: ipalib/plugins/dns.py:388 +msgid "Force DNS zone creation even if nameserver not in DNS." +msgstr "" + +#: ipalib/plugins/dns.py:391 +msgid "Add the nameserver to DNS with this IP address" +msgstr "" + +#: ipalib/plugins/dns.py:397 +msgid "DNS is not configured" +msgstr "" + +#: ipalib/plugins/dns.py:431 +msgid "" +"\n" +" Delete DNS zone (SOA record).\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:439 +msgid "" +"\n" +" Modify DNS zone (SOA record).\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:452 +msgid "" +"\n" +" Search for DNS zones (SOA records).\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:460 +msgid "" +"\n" +" Display information about a DNS zone (SOA record).\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:468 +msgid "" +"\n" +" Disable DNS Zone.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:472 +msgid "Disabled DNS zone \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/dns.py:490 +msgid "" +"\n" +" Enable DNS Zone.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:494 +msgid "Enabled DNS zone \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/dns.py:512 +msgid "" +"\n" +" DNS record.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:522 +msgid "DNS resource record" +msgstr "" + +#: ipalib/plugins/dns.py:527 ipalib/plugins/dns.py:528 +msgid "Record name" +msgstr "" + +#: ipalib/plugins/dns.py:533 ipalib/plugins/dns.py:534 +msgid "Time to live" +msgstr "" + +#: ipalib/plugins/dns.py:538 +msgid "Class" +msgstr "" + +#: ipalib/plugins/dns.py:539 +msgid "DNS class" +msgstr "" + +#: ipalib/plugins/dns.py:566 +msgid "" +"\n" +" Base class for DNS record commands with record options.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:610 +msgid "" +"\n" +" Base class for adding/removing records from DNS resource entries.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:674 +msgid "" +"\n" +" Add records to DNS resource.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:690 +msgid "" +"\n" +" Add new DNS resource record.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:699 +msgid "force NS record creation even if its hostname is not in DNS" +msgstr "" + +#: ipalib/plugins/dns.py:735 +msgid "" +"Reverse zone for PTR record should be a sub-zone of one the following fully " +"qualified domains: %s" +msgstr "" + +#: ipalib/plugins/dns.py:740 +msgid "Reverse zone %s requires exactly %d IP address components, %d given" +msgstr "" + +#: ipalib/plugins/dns.py:746 +msgid "PTR record '%s' is not fully qualified (check traling '.')" +msgstr "" + +#: ipalib/plugins/dns.py:789 +msgid "" +"\n" +" Delete DNS record entry.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:792 +msgid "Deleted record \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/dns.py:799 +msgid "" +"\n" +" Delete DNS resource record.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:802 +msgid "" +"Neither --del-all nor options to delete a specific record provided.\n" +"Command help may be consulted for all supported record types." +msgstr "" + +#: ipalib/plugins/dns.py:807 +msgid "Delete all associated records" +msgstr "" + +#: ipalib/plugins/dns.py:834 +msgid "No option to delete specific record provided." +msgstr "" + +#: ipalib/plugins/dns.py:835 +msgid "Delete all?" +msgstr "" + +#: ipalib/plugins/dns.py:845 +msgid "Current DNS record contents:\n" +msgstr "" + +#: ipalib/plugins/dns.py:875 +msgid "%s record with value %s not found" +msgstr "" + +#: ipalib/plugins/dns.py:889 +msgid "" +"\n" +" Display DNS resource.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:905 +msgid "" +"\n" +" Search for DNS resources.\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:932 +msgid "" +"\n" +" Resolve a host name in DNS\n" +" " +msgstr "" + +#: ipalib/plugins/dns.py:936 +msgid "Found '%(value)s'" +msgstr "" + +#: ipalib/plugins/dns.py:940 +msgid "Hostname" +msgstr "" + +#: ipalib/plugins/dns.py:962 +msgid "Host '%(host)s' not found" +msgstr "" + +#: ipalib/plugins/dns.py:970 +msgid "" +"\n" +" Checks if any of the servers has the DNS service enabled.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:19 +msgid "" +"\n" +"Entitlements\n" +"\n" +"Manage entitlements for client machines\n" +"\n" +"Entitlements can be managed either by registering with an entitlement\n" +"server with a username and password or by manually importing entitlement\n" +"certificates. An entitlement certificate contains embedded information\n" +"such as the product being entitled, the quantity and the validity dates.\n" +"\n" +"An entitlement server manages the number of client entitlements available.\n" +"To mark these entitlements as used by the IPA server you provide a quantity\n" +"and they are marked as consumed on the entitlement server.\n" +"\n" +" Register with an entitlement server:\n" +" ipa entitle-register consumer\n" +"\n" +" Import an entitlement certificate:\n" +" ipa entitle-import /home/user/ipaclient.pem\n" +"\n" +" Display current entitlements:\n" +" ipa entitle-status\n" +"\n" +" Retrieve details on entitlement certificates:\n" +" ipa entitle-get\n" +"\n" +" Consume some entitlements from the entitlement server:\n" +" ipa entitle-consume 50\n" +"\n" +"The registration ID is a Unique Identifier (UUID). This ID will be\n" +"IMPORTED if you have used entitle-import.\n" +"\n" +"Changes to /etc/rhsm/rhsm.conf require a restart of the httpd service.\n" +msgstr "" + +#: ipalib/plugins/entitle.py:106 +msgid "" +"\n" +" Get our entitlement pool. Assume there is only one pool.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:129 +msgid "" +"\n" +" Retrieve our UUID, certificate and key from LDAP.\n" +"\n" +" Except on error the caller is responsible for removing temporary files\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:178 +msgid "" +"\n" +" Entitlement object\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:189 +msgid "Entitlements" +msgstr "" + +#: ipalib/plugins/entitle.py:206 +msgid "" +"\n" +" Display current entitlements\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:214 ipalib/plugins/entitle.py:602 +msgid "UUID" +msgstr "" + +#: ipalib/plugins/entitle.py:217 ipalib/plugins/entitle.py:306 +#: ipalib/plugins/entitle.py:388 ipalib/plugins/entitle.py:575 +#: ipalib/plugins/entitle.py:690 +msgid "Product" +msgstr "" + +#: ipalib/plugins/entitle.py:220 ipalib/plugins/entitle.py:286 +#: ipalib/plugins/entitle.py:296 ipalib/plugins/entitle.py:391 +#: ipalib/plugins/entitle.py:578 ipalib/plugins/entitle.py:680 +msgid "Quantity" +msgstr "" + +#: ipalib/plugins/entitle.py:223 ipalib/plugins/entitle.py:309 +#: ipalib/plugins/entitle.py:581 ipalib/plugins/entitle.py:693 +msgid "Consumed" +msgstr "" + +#: ipalib/plugins/entitle.py:276 +msgid "" +"\n" +" Consume an entitlement\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:282 +msgid "Consumed %(value)s entitlement(s)." +msgstr "" + +#: ipalib/plugins/entitle.py:314 +msgid "" +"\n" +" Override this so we can set value to the number of entitlements\n" +" consumed.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:362 ipalib/plugins/entitle.py:724 +msgid "" +"\n" +" Returning the certificates isn't very interesting. Return the\n" +" status of entitlements instead.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:380 +msgid "" +"\n" +" Retrieve the entitlement certs\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:394 +msgid "Start" +msgstr "" + +#: ipalib/plugins/entitle.py:397 +msgid "End" +msgstr "" + +#: ipalib/plugins/entitle.py:400 ipalib/plugins/host.py:162 +#: ipalib/plugins/internal.py:132 ipalib/plugins/service.py:96 +msgid "Serial Number" +msgstr "" + +#: ipalib/plugins/entitle.py:435 ipalib/plugins/entitle.py:626 +#: ipalib/plugins/entitle.py:628 +msgid "Not an entitlement certificate" +msgstr "" + +#: ipalib/plugins/entitle.py:460 +msgid "" +"\n" +" Search for entitlement accounts.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:473 +msgid "" +"\n" +" Register to the entitlement system\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:479 +msgid "Registered to entitlement server." +msgstr "" + +#: ipalib/plugins/entitle.py:483 +msgid "Username" +msgstr "" + +#: ipalib/plugins/entitle.py:490 ipalib/plugins/entitle.py:603 +msgid "Enrollment UUID" +msgstr "" + +#: ipalib/plugins/entitle.py:494 ipalib/plugins/migration.py:271 +#: ipalib/plugins/passwd.py:59 ipalib/plugins/user.py:172 +msgid "Password" +msgstr "" + +#: ipalib/plugins/entitle.py:495 +msgid "Registration password" +msgstr "" + +#: ipalib/plugins/entitle.py:569 +msgid "" +"\n" +" Import an entitlement certificate.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:646 +msgid "" +"\n" +" If we are adding the first entry there are no updates so EmptyModlist\n" +" will get thrown. Ignore it.\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:667 +msgid "" +"\n" +" Re-sync the local entitlement cache with the entitlement server\n" +" " +msgstr "" + +#: ipalib/plugins/entitle.py:673 +msgid "Entitlement(s) synchronized." +msgstr "" + +#: ipalib/plugins/group.py:20 +msgid "" +"\n" +"Groups of users\n" +"\n" +"Manage groups of users. By default, new groups are POSIX groups. You\n" +"can add the --nonposix option to the group-add command to mark a new group\n" +"as non-POSIX, and you can use the same argument to the group-mod command\n" +"to convert a non-POSIX group to a POSIX group. POSIX groups cannot be\n" +"converted to non-POSIX groups.\n" +"\n" +"Every group must have a description.\n" +"\n" +"POSIX groups must have a Group ID (GID) number. Changing a GID is\n" +"supported but can have an impact on your file permissions. It is not necessary\n" +"to supply a GID when creating a group. IPA will generate one automatically\n" +"if it is not provided.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new group:\n" +" ipa group-add --desc='local administrators' localadmins\n" +"\n" +" Add a new non-POSIX group:\n" +" ipa group-add --nonposix --desc='remote administrators' remoteadmins\n" +"\n" +" Convert a non-POSIX group to posix:\n" +" ipa group-mod --posix remoteadmins\n" +"\n" +" Add a new POSIX group with a specific Group ID number:\n" +" ipa group-add --gid=500 --desc='unix admins' unixadmins\n" +"\n" +" Add a new POSIX group and let IPA assign a Group ID number:\n" +" ipa group-add --desc='printer admins' printeradmins\n" +"\n" +" Remove a group:\n" +" ipa group-del unixadmins\n" +"\n" +" To add the \"remoteadmins\" group to the \"localadmins\" group:\n" +" ipa group-add-member --groups=remoteadmins localadmins\n" +"\n" +" Add a list of users to the \"localadmins\" group:\n" +" ipa group-add-member --users=test1,test2 localadmins\n" +"\n" +" Remove a user from the \"localadmins\" group:\n" +" ipa group-remove-member --users=test2 localadmins\n" +"\n" +" Display information about a named group.\n" +" ipa group-show localadmins\n" +msgstr "" + +#: ipalib/plugins/group.py:76 +msgid "" +"\n" +" Group object.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:100 +msgid "User Groups" +msgstr "" + +#: ipalib/plugins/group.py:108 +msgid "Group name" +msgstr "" + +#: ipalib/plugins/group.py:115 ipalib/plugins/sudocmdgroup.py:77 +msgid "Group description" +msgstr "" + +#: ipalib/plugins/group.py:119 ipalib/plugins/user.py:187 +msgid "GID" +msgstr "" + +#: ipalib/plugins/group.py:120 +msgid "GID (use this option to set it manually)" +msgstr "" + +#: ipalib/plugins/group.py:128 +msgid "" +"\n" +" Create a new group.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:132 +msgid "Added group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/group.py:137 +msgid "Create as a non-POSIX group" +msgstr "" + +#: ipalib/plugins/group.py:154 +msgid "" +"\n" +" Delete group.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:158 +msgid "Deleted group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/group.py:186 +msgid "" +"\n" +" Modify a group.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:189 +msgid "Modified group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/group.py:194 +msgid "change to a POSIX group" +msgstr "" + +#: ipalib/plugins/group.py:215 +msgid "" +"\n" +" Search for groups.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:220 +msgid "%(count)d group matched" +msgid_plural "%(count)d groups matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/group.py:227 ipalib/plugins/netgroup.py:192 +msgid "search for private groups" +msgstr "" + +#: ipalib/plugins/group.py:257 +msgid "" +"\n" +" Display information about a named group.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:265 +msgid "" +"\n" +" Add members to a group.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:273 +msgid "" +"\n" +" Remove members from a group.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:281 +msgid "" +"\n" +" Detach a managed group from a user\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:285 +msgid "Detached group \"%(value)s\" from user \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/group.py:288 +msgid "" +"\n" +" This requires updating both the user and the group. We first need to\n" +" verify that both the user and group can be updated, then we go\n" +" about our work. We don't want a situation where only the user or\n" +" group can be modified and we're left in a bad state.\n" +" " +msgstr "" + +#: ipalib/plugins/group.py:306 +msgid "not allowed to modify user entries" +msgstr "" + +#: ipalib/plugins/group.py:312 +msgid "not allowed to modify group entries" +msgstr "" + +#: ipalib/plugins/group.py:331 +msgid "Not a managed group" +msgstr "" + +#: ipalib/plugins/hbacrule.py:19 +msgid "" +"\n" +"Host-based access control\n" +"\n" +"Control who can access what services on what hosts and from where. You\n" +"can use HBAC to control which users or groups on a source host can\n" +"access a service, or group of services, on a target host.\n" +"\n" +"You can also specify a category of users, target hosts, and source\n" +"hosts. This is currently limited to \"all\", but might be expanded in the\n" +"future.\n" +"\n" +"Target hosts and source hosts in HBAC rules must be hosts managed by IPA.\n" +"\n" +"The available services and groups of services are controlled by the\n" +"hbacsvc and hbacsvcgroup plug-ins respectively.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Create a rule, \"test1\", that grants all users access to the host \"server\" from\n" +" anywhere:\n" +" ipa hbacrule-add --type=allow --usercat=all --srchostcat=all test1\n" +" ipa hbacrule-add-host --hosts=server.example.com test1\n" +"\n" +" Display the properties of a named HBAC rule:\n" +" ipa hbacrule-show test1\n" +"\n" +" Create a rule for a specific service. This lets the user john access\n" +" the sshd service on any machine from any machine:\n" +" ipa hbacrule-add --type=allow --hostcat=all --srchostcat=all john_sshd\n" +" ipa hbacrule-add-user --users=john john_sshd\n" +" ipa hbacrule-add-service --hbacsvcs=sshd john_sshd\n" +"\n" +" Create a rule for a new service group. This lets the user john access\n" +" the FTP service on any machine from any machine:\n" +" ipa hbacsvcgroup-add ftpers\n" +" ipa hbacsvc-add sftp\n" +" ipa hbacsvcgroup-add-member --hbacsvcs=ftp,sftp ftpers\n" +" ipa hbacrule-add --type=allow --hostcat=all --srchostcat=all john_ftp\n" +" ipa hbacrule-add-user --users=john john_ftp\n" +" ipa hbacrule-add-service --hbacsvcgroups=ftpers john_ftp\n" +"\n" +" Disable a named HBAC rule:\n" +" ipa hbacrule-disable test1\n" +"\n" +" Remove a named HBAC rule:\n" +" ipa hbacrule-del allow_server\n" +msgstr "" + +#: ipalib/plugins/hbacrule.py:91 +msgid "" +"\n" +" See if options[attribute] is lower-case 'all' in a safe way.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:103 +msgid "" +"\n" +" HBAC object.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:126 +msgid "HBAC Rule" +msgstr "" + +#: ipalib/plugins/hbacrule.py:131 ipalib/plugins/sudorule.py:73 +msgid "Rule name" +msgstr "" + +#: ipalib/plugins/hbacrule.py:136 +msgid "Rule type (allow or deny)" +msgstr "" + +#: ipalib/plugins/hbacrule.py:137 +msgid "Rule type" +msgstr "" + +#: ipalib/plugins/hbacrule.py:143 ipalib/plugins/netgroup.py:124 +#: ipalib/plugins/sudorule.py:86 +msgid "User category" +msgstr "" + +#: ipalib/plugins/hbacrule.py:144 ipalib/plugins/netgroup.py:125 +#: ipalib/plugins/sudorule.py:87 +msgid "User category the rule applies to" +msgstr "" + +#: ipalib/plugins/hbacrule.py:149 ipalib/plugins/netgroup.py:130 +#: ipalib/plugins/sudorule.py:92 +msgid "Host category" +msgstr "" + +#: ipalib/plugins/hbacrule.py:150 ipalib/plugins/netgroup.py:131 +#: ipalib/plugins/sudorule.py:93 +msgid "Host category the rule applies to" +msgstr "" + +#: ipalib/plugins/hbacrule.py:155 +msgid "Source host category" +msgstr "" + +#: ipalib/plugins/hbacrule.py:156 +msgid "Source host category the rule applies to" +msgstr "" + +#: ipalib/plugins/hbacrule.py:161 +msgid "Service category" +msgstr "" + +#: ipalib/plugins/hbacrule.py:162 +msgid "Service category the rule applies to" +msgstr "" + +#: ipalib/plugins/hbacrule.py:174 ipalib/plugins/sudorule.py:81 +msgid "Enabled" +msgstr "" + +#: ipalib/plugins/hbacrule.py:178 ipalib/plugins/sudorule.py:115 +#: ipalib/plugins/user.py:108 +msgid "Users" +msgstr "" + +#: ipalib/plugins/hbacrule.py:182 ipalib/plugins/internal.py:272 +#: ipalib/plugins/sudorule.py:119 +msgid "Groups" +msgstr "" + +#: ipalib/plugins/hbacrule.py:186 ipalib/plugins/host.py:226 +#: ipalib/plugins/sudorule.py:123 +msgid "Hosts" +msgstr "" + +#: ipalib/plugins/hbacrule.py:190 ipalib/plugins/hostgroup.py:73 +#: ipalib/plugins/sudorule.py:127 +msgid "Host Groups" +msgstr "" + +#: ipalib/plugins/hbacrule.py:194 +msgid "Source hosts" +msgstr "" + +#: ipalib/plugins/hbacrule.py:198 +msgid "Source host groups" +msgstr "" + +#: ipalib/plugins/hbacrule.py:202 ipalib/plugins/internal.py:196 +#: ipalib/plugins/service.py:220 +msgid "Services" +msgstr "" + +#: ipalib/plugins/hbacrule.py:206 +msgid "Service Groups" +msgstr "" + +#: ipalib/plugins/hbacrule.py:215 +msgid "" +"\n" +" Create a new HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:219 +msgid "Added HBAC rule \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacrule.py:230 +msgid "" +"\n" +" Delete an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:234 +msgid "Deleted HBAC rule \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacrule.py:240 +msgid "" +"\n" +" Modify an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:244 +msgid "Modified HBAC rule \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacrule.py:266 +msgid "" +"\n" +" Search for HBAC rules.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:270 +msgid "%(count)d HBAC rule matched" +msgid_plural "%(count)d HBAC rules matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/hbacrule.py:278 +msgid "" +"\n" +" Display the properties of an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:286 +msgid "" +"\n" +" Enable an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:290 +msgid "Enabled HBAC rule \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacrule.py:315 +msgid "" +"\n" +" Disable an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:319 +msgid "Disabled HBAC rule \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacrule.py:344 +msgid "" +"\n" +" Add an access time to an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:351 ipalib/plugins/hbacrule.py:391 +msgid "Access time" +msgstr "" + +#: ipalib/plugins/hbacrule.py:385 +msgid "" +"\n" +" Remove access time to HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:425 +msgid "" +"\n" +" Add users and groups to an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:442 +msgid "" +"\n" +" Remove users and groups from an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:452 +msgid "" +"\n" +" Add target hosts and hostgroups to an HBAC rule\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:469 +msgid "" +"\n" +" Remove target hosts and hostgroups from an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:479 +msgid "" +"\n" +" Add source hosts and hostgroups from a HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:496 +msgid "" +"\n" +" Remove source hosts and hostgroups from an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:506 +msgid "" +"\n" +" Add services to an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacrule.py:523 +msgid "" +"\n" +" Remove service and service groups from an HBAC rule.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvc.py:19 +msgid "" +"\n" +"HBAC Services\n" +"\n" +"The PAM services that HBAC can control access to. The name used here\n" +"must match the service name that PAM is evaluating.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new HBAC service:\n" +" ipa hbacsvc-add tftp\n" +"\n" +" Modify an existing HBAC service:\n" +" ipa hbacsvc-mod --desc=\"TFTP service\" tftp\n" +"\n" +" Search for HBAC services. This example will return two results, the FTP\n" +" service and the newly-added tftp service:\n" +" ipa hbacsvc-find ftp\n" +"\n" +" Delete an HBAC service:\n" +" ipa hbacsvc-del tftp\n" +"\n" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:51 +msgid "" +"\n" +" HBAC Service object.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvc.py:61 +msgid "HBAC Services" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:66 +msgid "Service name" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:67 +msgid "HBAC service" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:74 +msgid "HBAC service description" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:82 +msgid "" +"\n" +" Add a new HBAC service.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvc.py:85 +msgid "Added HBAC service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:91 +msgid "" +"\n" +" Delete an existing HBAC service.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvc.py:94 +msgid "Deleted HBAC service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:100 +msgid "" +"\n" +" Modify an HBAC service.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvc.py:104 +msgid "Modified HBAC service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacsvc.py:110 +msgid "" +"\n" +" Search for HBAC services.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvc.py:114 +msgid "%(count)d HBAC service matched" +msgid_plural "%(count)d HBAC services matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/hbacsvc.py:122 +msgid "" +"\n" +" Display information about an HBAC service.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:19 +msgid "" +"\n" +"HBAC Service Groups\n" +"\n" +"HBAC service groups can contain any number of individual services,\n" +"or \"members\". Every group must have a description.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new HBAC service group:\n" +" ipa hbacsvcgroup-add --desc=\"login services\" login\n" +"\n" +" Add members to an HBAC service group:\n" +" ipa hbacsvcgroup-add-member --hbacsvcs=sshd,login login\n" +"\n" +" Display information about a named group:\n" +" ipa hbacsvcgroup-show login\n" +"\n" +" Add a new group to the \"login\" group:\n" +" ipa hbacsvcgroup-add --desc=\"switch users\" login\n" +" ipa hbacsvcgroup-add-member --hbacsvcs=su,su-l login\n" +"\n" +" Delete an HBAC service group:\n" +" ipa hbacsvcgroup-del login\n" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:51 +msgid "" +"\n" +" HBAC service group object.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:64 +msgid "HBAC service Groups" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:69 +msgid "Service group name" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:76 +msgid "HBAC service group description" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:84 +msgid "" +"\n" +" Add a new HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:87 +msgid "Added HBAC service group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:93 +msgid "" +"\n" +" Delete an HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:96 +msgid "Deleted HBAC service group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:102 +msgid "" +"\n" +" Modify an HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:105 +msgid "Modified HBAC service group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:111 +msgid "" +"\n" +" Search for an HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:114 +msgid "%(count)d HBAC service group matched" +msgid_plural "%(count)d HBAC service groups matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/hbacsvcgroup.py:122 +msgid "" +"\n" +" Display information about an HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:130 +msgid "" +"\n" +" Add members to an HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/hbacsvcgroup.py:138 +msgid "" +"\n" +" Remove members from an HBAC service group.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:20 +msgid "" +"\n" +"Hosts/Machines\n" +"\n" +"A host represents a machine. It can be used in a number of contexts:\n" +"- service entries are associated with a host\n" +"- a host stores the host/ service principal\n" +"- a host can be used in Host-based Access Control (HBAC) rules\n" +"- every enrolled client generates a host entry\n" +"\n" +"ENROLLMENT:\n" +"\n" +"There are three enrollment scenarios when enrolling a new client:\n" +"\n" +"1. You are enrolling as a full administrator. The host entry may exist\n" +" or not. A full administrator is a member of the hostadmin role\n" +" or the admins group.\n" +"2. You are enrolling as a limited administrator. The host must already\n" +" exist. A limited administrator is a member a role with the\n" +" Host Enrollment privilege.\n" +"3. The host has been created with a one-time password.\n" +"\n" +"A host can only be enrolled once. If a client has enrolled and needs to\n" +"be re-enrolled, the host entry must be removed and re-created. Note that\n" +"re-creating the host entry will result in all services for the host being\n" +"removed, and all SSL certificates associated with those services being\n" +"revoked.\n" +"\n" +"A host can optionally store information such as where it is located,\n" +"the OS that it runs, etc.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new host:\n" +" ipa host-add --location=\"3rd floor lab\" --locality=Dallas test.example.com\n" +"\n" +" Delete a host:\n" +" ipa host-del test.example.com\n" +"\n" +" Add a new host with a one-time password:\n" +" ipa host-add --os='Fedora 12' --password=Secret123 test.example.com\n" +"\n" +" Add a new host with a random one-time password:\n" +" ipa host-add --os='Fedora 12' --random test.example.com\n" +"\n" +" Modify information about a host:\n" +" ipa host-mod --os='Fedora 12' test.example.com\n" +"\n" +" Disable the host Kerberos key, SSL certificate and all of its services:\n" +" ipa host-disable test.example.com\n" +"\n" +" Add a host that can manage this host's keytab and certificate:\n" +" ipa host-add-managedby --hosts=test2 test\n" +msgstr "" + +#: ipalib/plugins/host.py:97 +msgid "" +"\n" +" Require at least one dot in the hostname (to support localhost.localdomain)\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:101 +msgid "Fully-qualified hostname required" +msgstr "" + +#: ipalib/plugins/host.py:129 +msgid "DNS reverse zone for IP address %(addr)s not found" +msgstr "" + +#: ipalib/plugins/host.py:153 ipalib/plugins/service.py:87 +msgid "Keytab" +msgstr "" + +#: ipalib/plugins/host.py:185 +msgid "" +"\n" +" Verify that we have either an IPv4 or IPv6 address.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:189 +msgid "invalid IP address" +msgstr "" + +#: ipalib/plugins/host.py:194 +msgid "" +"\n" +" Host object.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:231 +msgid "Host name" +msgstr "" + +#: ipalib/plugins/host.py:238 +msgid "A description of this host" +msgstr "" + +#: ipalib/plugins/host.py:242 +msgid "Locality" +msgstr "" + +#: ipalib/plugins/host.py:243 +msgid "Host locality (e.g. \"Baltimore, MD\")" +msgstr "" + +#: ipalib/plugins/host.py:248 +msgid "Host location (e.g. \"Lab 2\")" +msgstr "" + +#: ipalib/plugins/host.py:252 +msgid "Platform" +msgstr "" + +#: ipalib/plugins/host.py:253 +msgid "Host hardware platform (e.g. \"Lenovo T61\")" +msgstr "" + +#: ipalib/plugins/host.py:257 +msgid "Operating system" +msgstr "" + +#: ipalib/plugins/host.py:258 +msgid "Host operating system and version (e.g. \"Fedora 9\")" +msgstr "" + +#: ipalib/plugins/host.py:262 +msgid "User password" +msgstr "" + +#: ipalib/plugins/host.py:263 +msgid "Password used in bulk enrollment" +msgstr "" + +#: ipalib/plugins/host.py:266 +msgid "Generate a random password to be used in bulk enrollment" +msgstr "" + +#: ipalib/plugins/host.py:271 +msgid "Random password" +msgstr "" + +#: ipalib/plugins/host.py:277 ipalib/plugins/service.py:233 +msgid "Base-64 encoded server certificate" +msgstr "" + +#: ipalib/plugins/host.py:280 ipalib/plugins/host.py:548 +msgid "Principal name" +msgstr "" + +#: ipalib/plugins/host.py:306 +msgid "" +"\n" +" Add a new host.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:311 +msgid "Added host \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/host.py:316 +msgid "force host name even if not in DNS" +msgstr "" + +#: ipalib/plugins/host.py:319 +msgid "skip reverse DNS detection" +msgstr "" + +#: ipalib/plugins/host.py:322 +msgid "Add the host to DNS with this IP address" +msgstr "" + +#: ipalib/plugins/host.py:338 ipalib/plugins/host.py:477 +msgid "DNS zone %(zone)s not found" +msgstr "" + +#: ipalib/plugins/host.py:413 +msgid "The host was added but the DNS update failed with: %(exc)s" +msgstr "" + +#: ipalib/plugins/host.py:422 +msgid "" +"\n" +" Delete a host.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:426 +msgid "Deleted host \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/host.py:431 +msgid "Remove entries from DNS" +msgstr "" + +#: ipalib/plugins/host.py:537 +msgid "" +"\n" +" Modify information about a host.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:542 +msgid "Modified host \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/host.py:549 +msgid "Kerberos principal name for this host" +msgstr "" + +#: ipalib/plugins/host.py:618 +msgid "" +"\n" +" Search for hosts.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:623 +msgid "%(count)d host matched" +msgid_plural "%(count)d hosts matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/host.py:643 +msgid "" +"\n" +" Display information about a host.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:649 ipalib/plugins/service.py:400 +msgid "file to store certificate in" +msgstr "" + +#: ipalib/plugins/host.py:673 ipalib/plugins/service.py:422 +msgid "Certificate stored in file '%(file)s'" +msgstr "" + +#: ipalib/plugins/host.py:684 +msgid "" +"\n" +" Disable the Kerberos key, SSL certificate and all services of a host.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:688 +msgid "Disabled host \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/host.py:770 +msgid "" +"\n" +" Add hosts that can manage this host.\n" +" " +msgstr "" + +#: ipalib/plugins/host.py:781 +msgid "" +"\n" +" Remove hosts that can manage this host.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:20 +msgid "" +"\n" +"Groups of hosts.\n" +"\n" +"Manage groups of hosts. This is useful for applying access control to a\n" +"number of hosts by using Host-based Access Control.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new host group:\n" +" ipa hostgroup-add --desc=\"Baltimore hosts\" baltimore\n" +"\n" +" Add another new host group:\n" +" ipa hostgroup-add --desc=\"Maryland hosts\" maryland\n" +"\n" +" Add members to the hostgroup:\n" +" ipa hostgroup-add-member --hosts=box1,box2,box3 baltimore\n" +"\n" +" Add a hostgroup as a member of another hostgroup:\n" +" ipa hostgroup-add-member --hostgroups=baltimore maryland\n" +"\n" +" Remove a host from the hostgroup:\n" +" ipa hostgroup-remove-member --hosts=box2 baltimore\n" +"\n" +" Display a host group:\n" +" ipa hostgroup-show baltimore\n" +"\n" +" Delete a hostgroup:\n" +" ipa hostgroup-del baltimore\n" +msgstr "" + +#: ipalib/plugins/hostgroup.py:55 +msgid "" +"\n" +" Hostgroup object.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:78 +msgid "Host-group" +msgstr "" + +#: ipalib/plugins/hostgroup.py:79 +msgid "Name of host-group" +msgstr "" + +#: ipalib/plugins/hostgroup.py:86 +msgid "A description of this host-group" +msgstr "" + +#: ipalib/plugins/hostgroup.py:94 +msgid "" +"\n" +" Add a new hostgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:98 +msgid "Added hostgroup \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hostgroup.py:104 +msgid "" +"\n" +" Delete a hostgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:108 +msgid "Deleted hostgroup \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hostgroup.py:114 +msgid "" +"\n" +" Modify a hostgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:118 +msgid "Modified hostgroup \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/hostgroup.py:124 +msgid "" +"\n" +" Search for hostgroups.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:128 +msgid "%(count)d hostgroup matched" +msgid_plural "%(count)d hostgroups matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/hostgroup.py:136 +msgid "" +"\n" +" Display information about a hostgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:144 +msgid "" +"\n" +" Add members to a hostgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/hostgroup.py:152 +msgid "" +"\n" +" Remove members from a hostgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/internal.py:22 +msgid "" +"\n" +"Plugins not accessible directly through the CLI, commands used internally\n" +msgstr "" + +#: ipalib/plugins/internal.py:36 +msgid "" +"\n" +" Export plugin meta-data for the webUI.\n" +" " +msgstr "" + +#: ipalib/plugins/internal.py:44 +msgid "Name of object to export" +msgstr "" + +#: ipalib/plugins/internal.py:47 +msgid "Name of method to export" +msgstr "" + +#: ipalib/plugins/internal.py:52 +msgid "Dict of JSON encoded IPA Objects" +msgstr "" + +#: ipalib/plugins/internal.py:53 +msgid "Dict of JSON encoded IPA Methods" +msgstr "" + +#: ipalib/plugins/internal.py:96 +msgid "Logged In As" +msgstr "" + +#: ipalib/plugins/internal.py:99 +msgid "Attribute" +msgstr "" + +#: ipalib/plugins/internal.py:102 +msgid "Add Automount Location" +msgstr "" + +#: ipalib/plugins/internal.py:103 +msgid "Automount Location Settings" +msgstr "" + +#: ipalib/plugins/internal.py:106 +msgid "Add Automount Map" +msgstr "" + +#: ipalib/plugins/internal.py:109 +msgid "Add Automount Key" +msgstr "" + +#: ipalib/plugins/internal.py:112 +msgid "Unspecified" +msgstr "" + +#: ipalib/plugins/internal.py:113 +msgid "Key Compromise" +msgstr "" + +#: ipalib/plugins/internal.py:114 +msgid "CA Compromise" +msgstr "" + +#: ipalib/plugins/internal.py:115 +msgid "Affiliation Changed" +msgstr "" + +#: ipalib/plugins/internal.py:116 +msgid "Superseded" +msgstr "" + +#: ipalib/plugins/internal.py:117 +msgid "Cessation of Operation" +msgstr "" + +#: ipalib/plugins/internal.py:118 +msgid "Certificate Hold" +msgstr "" + +#: ipalib/plugins/internal.py:119 +msgid "Remove from CRL" +msgstr "" + +#: ipalib/plugins/internal.py:120 +msgid "Privilege Withdrawn" +msgstr "" + +#: ipalib/plugins/internal.py:121 +msgid "AA Compromise" +msgstr "" + +#: ipalib/plugins/internal.py:122 +msgid "" +"To confirm your intention to revoke this certificate, select a reason from " +"the pull-down list, and click the \"Revoke\" button." +msgstr "" + +#: ipalib/plugins/internal.py:124 +msgid "Note" +msgstr "" + +#: ipalib/plugins/internal.py:125 +msgid "Reason for Revocation" +msgstr "" + +#: ipalib/plugins/internal.py:126 +msgid "" +"To confirm your intention to restore this certificate, click the \"Restore\"" +" button." +msgstr "" + +#: ipalib/plugins/internal.py:128 +msgid "Issued To" +msgstr "" + +#: ipalib/plugins/internal.py:129 +msgid "Common Name" +msgstr "" + +#: ipalib/plugins/internal.py:130 +msgid "Organization" +msgstr "" + +#: ipalib/plugins/internal.py:131 +msgid "Organizational Unit" +msgstr "" + +#: ipalib/plugins/internal.py:133 +msgid "Issued By" +msgstr "" + +#: ipalib/plugins/internal.py:134 +msgid "Validity" +msgstr "" + +#: ipalib/plugins/internal.py:135 +msgid "Issued On" +msgstr "" + +#: ipalib/plugins/internal.py:136 +msgid "Expires On" +msgstr "" + +#: ipalib/plugins/internal.py:137 +msgid "Fingerprints" +msgstr "" + +#: ipalib/plugins/internal.py:138 +msgid "SHA1 Fingerprint" +msgstr "" + +#: ipalib/plugins/internal.py:139 +msgid "MD5 Fingerprint" +msgstr "" + +#: ipalib/plugins/internal.py:140 +msgid "Enter the Base64-encoded CSR below" +msgstr "" + +#: ipalib/plugins/internal.py:141 +msgid "Valid Certificate Present" +msgstr "" + +#: ipalib/plugins/internal.py:142 +msgid "New Certificate" +msgstr "" + +#: ipalib/plugins/internal.py:143 +msgid "Certificate Revoked" +msgstr "" + +#: ipalib/plugins/internal.py:144 +msgid "No Valid Certificate" +msgstr "" + +#: ipalib/plugins/internal.py:145 +msgid "Certificate for ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:146 +msgid "Issue New Certificate for ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:147 +msgid "Revoke Certificate for ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:148 +msgid "Restore Certificate for ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:152 +msgid "Name" +msgstr "" + +#: ipalib/plugins/internal.py:155 +msgid "Add Delegation" +msgstr "" + +#: ipalib/plugins/internal.py:158 +msgid "Add DNS Zone" +msgstr "" + +#: ipalib/plugins/internal.py:159 +msgid "DNS Zone Settings" +msgstr "" + +#: ipalib/plugins/internal.py:162 +msgid "Add DNS Resource Record" +msgstr "" + +#: ipalib/plugins/internal.py:163 +msgid "Resource" +msgstr "" + +#: ipalib/plugins/internal.py:165 +msgid "Data" +msgstr "" + +#: ipalib/plugins/internal.py:166 +msgid "Records for DNS Zone" +msgstr "" + +#: ipalib/plugins/internal.py:169 +msgid "Add Group" +msgstr "" + +#: ipalib/plugins/internal.py:170 +msgid "Group Settings" +msgstr "" + +#: ipalib/plugins/internal.py:171 ipalib/plugins/internal.py:206 +msgid "Is this a POSIX group?" +msgstr "" + +#: ipalib/plugins/internal.py:174 +msgid "Add HBAC Rule" +msgstr "" + +#: ipalib/plugins/internal.py:175 ipalib/plugins/internal.py:280 +#: ipalib/plugins/internal.py:306 +msgid "Active" +msgstr "" + +#: ipalib/plugins/internal.py:176 ipalib/plugins/internal.py:282 +msgid "Allow" +msgstr "" + +#: ipalib/plugins/internal.py:177 ipalib/plugins/internal.py:283 +msgid "Deny" +msgstr "" + +#: ipalib/plugins/internal.py:178 ipalib/plugins/internal.py:281 +#: ipalib/plugins/internal.py:308 +msgid "Inactive" +msgstr "" + +#: ipalib/plugins/internal.py:179 ipalib/plugins/internal.py:296 +msgid "Rule status" +msgstr "" + +#: ipalib/plugins/internal.py:180 ipalib/plugins/internal.py:284 +msgid "Who" +msgstr "" + +#: ipalib/plugins/internal.py:181 ipalib/plugins/internal.py:285 +msgid "Anyone" +msgstr "" + +#: ipalib/plugins/internal.py:182 ipalib/plugins/internal.py:286 +msgid "Specified Users and Groups" +msgstr "" + +#: ipalib/plugins/internal.py:183 +msgid "Accessing" +msgstr "" + +#: ipalib/plugins/internal.py:184 ipalib/plugins/internal.py:288 +msgid "Any Host" +msgstr "" + +#: ipalib/plugins/internal.py:185 ipalib/plugins/internal.py:289 +msgid "Specified Hosts and Groups" +msgstr "" + +#: ipalib/plugins/internal.py:186 +msgid "Via Service" +msgstr "" + +#: ipalib/plugins/internal.py:187 +msgid "Any Service" +msgstr "" + +#: ipalib/plugins/internal.py:188 +msgid "Specified Services and Groups" +msgstr "" + +#: ipalib/plugins/internal.py:189 +msgid "From" +msgstr "" + +#: ipalib/plugins/internal.py:192 +msgid "Add HBAC Service" +msgstr "" + +#: ipalib/plugins/internal.py:195 +msgid "Add HBAC Service Group" +msgstr "" + +#: ipalib/plugins/internal.py:199 +msgid "Add Host" +msgstr "" + +#: ipalib/plugins/internal.py:200 +msgid "Host Certificate" +msgstr "" + +#: ipalib/plugins/internal.py:201 ipalib/plugins/internal.py:259 +msgid "Host Name" +msgstr "" + +#: ipalib/plugins/internal.py:202 +msgid "Host Settings" +msgstr "" + +#: ipalib/plugins/internal.py:203 +msgid "Enrolled?" +msgstr "" + +#: ipalib/plugins/internal.py:204 +msgid "Enrollment" +msgstr "" + +#: ipalib/plugins/internal.py:205 +msgid "Fully Qualified Host Name" +msgstr "" + +#: ipalib/plugins/internal.py:207 ipalib/plugins/internal.py:262 +msgid "Status" +msgstr "" + +#: ipalib/plugins/internal.py:208 +msgid "Kerberos Key Present, Host Provisioned" +msgstr "" + +#: ipalib/plugins/internal.py:209 ipalib/plugins/internal.py:264 +msgid "Delete Key, Unprovision" +msgstr "" + +#: ipalib/plugins/internal.py:210 ipalib/plugins/internal.py:265 +msgid "Kerberos Key Not Present" +msgstr "" + +#: ipalib/plugins/internal.py:211 +msgid "Enroll via One-Time-Password" +msgstr "" + +#: ipalib/plugins/internal.py:212 +msgid "Set OTP" +msgstr "" + +#: ipalib/plugins/internal.py:213 +msgid "One-Time-Password has been set." +msgstr "" + +#: ipalib/plugins/internal.py:214 ipalib/plugins/internal.py:266 +msgid "Unprovisioning ${entity}" +msgstr "" + +#: ipalib/plugins/internal.py:215 +msgid "Are you sure you want to unprovision this host?" +msgstr "" + +#: ipalib/plugins/internal.py:216 ipalib/plugins/internal.py:268 +msgid "Unprovision" +msgstr "" + +#: ipalib/plugins/internal.py:219 +msgid "Add Host Group" +msgstr "" + +#: ipalib/plugins/internal.py:220 +msgid "Host Group Settings" +msgstr "" + +#: ipalib/plugins/internal.py:223 +msgid "Kerberos ticket policy" +msgstr "" + +#: ipalib/plugins/internal.py:226 +msgid "Add Netgroup" +msgstr "" + +#: ipalib/plugins/internal.py:227 +msgid "Netgroup Settings" +msgstr "" + +#: ipalib/plugins/internal.py:230 +msgid "Add Permission" +msgstr "" + +#: ipalib/plugins/internal.py:231 ipalib/plugins/internal.py:376 +msgid "Identity" +msgstr "" + +#: ipalib/plugins/internal.py:233 +msgid "Target" +msgstr "" + +#: ipalib/plugins/internal.py:235 +msgid "By Subtree" +msgstr "" + +#: ipalib/plugins/internal.py:236 +msgid "Target Group" +msgstr "" + +#: ipalib/plugins/internal.py:237 +msgid "Object By Type" +msgstr "" + +#: ipalib/plugins/internal.py:238 +msgid "Permission with invalid target specification" +msgstr "" + +#: ipalib/plugins/internal.py:241 +msgid "Add Privilege" +msgstr "" + +#: ipalib/plugins/internal.py:242 +msgid "Privilege Settings" +msgstr "" + +#: ipalib/plugins/internal.py:245 +msgid "Add Password Policy" +msgstr "" + +#: ipalib/plugins/internal.py:246 ipalib/plugins/pwpolicy.py:219 +msgid "Password Policy" +msgstr "" + +#: ipalib/plugins/internal.py:249 +msgid "Add Role" +msgstr "" + +#: ipalib/plugins/internal.py:250 +msgid "Role Settings" +msgstr "" + +#: ipalib/plugins/internal.py:253 +msgid "Add Self Service Definition" +msgstr "" + +#: ipalib/plugins/internal.py:256 +msgid "Add Service" +msgstr "" + +#: ipalib/plugins/internal.py:257 +msgid "Service Certificate" +msgstr "" + +#: ipalib/plugins/internal.py:258 +msgid "Service Settings" +msgstr "" + +#: ipalib/plugins/internal.py:260 +msgid "Provisioning" +msgstr "" + +#: ipalib/plugins/internal.py:261 +msgid "Service" +msgstr "" + +#: ipalib/plugins/internal.py:263 +msgid "Kerberos Key Present, Service Provisioned" +msgstr "" + +#: ipalib/plugins/internal.py:267 +msgid "Are you sure you want to unprovision this service?" +msgstr "" + +#: ipalib/plugins/internal.py:271 +msgid "Add Sudo Command" +msgstr "" + +#: ipalib/plugins/internal.py:275 +msgid "Add Sudo Command Group" +msgstr "" + +#: ipalib/plugins/internal.py:276 ipalib/plugins/sudocmdgroup.py:80 +msgid "Commands" +msgstr "" + +#: ipalib/plugins/internal.py:279 +msgid "Add Sudo Rule" +msgstr "" + +#: ipalib/plugins/internal.py:287 +msgid "Access this host" +msgstr "" + +#: ipalib/plugins/internal.py:290 +msgid "Run Commands" +msgstr "" + +#: ipalib/plugins/internal.py:291 +msgid "Any Command" +msgstr "" + +#: ipalib/plugins/internal.py:292 +msgid "Specified Commands and Groups" +msgstr "" + +#: ipalib/plugins/internal.py:293 +msgid "As Whom" +msgstr "" + +#: ipalib/plugins/internal.py:294 +msgid "Any Group" +msgstr "" + +#: ipalib/plugins/internal.py:295 +msgid "Specified Groups" +msgstr "" + +#: ipalib/plugins/internal.py:297 +msgid "External" +msgstr "" + +#: ipalib/plugins/internal.py:300 +msgid "Add User" +msgstr "" + +#: ipalib/plugins/internal.py:301 +msgid "Account Settings" +msgstr "" + +#: ipalib/plugins/internal.py:302 +msgid "Contact Settings" +msgstr "" + +#: ipalib/plugins/internal.py:303 +msgid "Mailing Address" +msgstr "" + +#: ipalib/plugins/internal.py:304 +msgid "Employee Information" +msgstr "" + +#: ipalib/plugins/internal.py:305 +msgid "Misc. Information" +msgstr "" + +#: ipalib/plugins/internal.py:307 +msgid "Click to Deactivate" +msgstr "" + +#: ipalib/plugins/internal.py:309 +msgid "Click to Activate" +msgstr "" + +#: ipalib/plugins/internal.py:310 +msgid "Error changing account status" +msgstr "" + +#: ipalib/plugins/internal.py:311 +msgid "Reset Password" +msgstr "" + +#: ipalib/plugins/internal.py:312 +msgid "New Password" +msgstr "" + +#: ipalib/plugins/internal.py:313 +msgid "Repeat Password" +msgstr "" + +#: ipalib/plugins/internal.py:314 +msgid "Password change complete" +msgstr "" + +#: ipalib/plugins/internal.py:315 +msgid "Passwords must match" +msgstr "" + +#: ipalib/plugins/internal.py:319 +msgid "Add" +msgstr "" + +#: ipalib/plugins/internal.py:320 +msgid "Add and Add Another" +msgstr "" + +#: ipalib/plugins/internal.py:321 +msgid "Add and Edit" +msgstr "" + +#: ipalib/plugins/internal.py:322 +msgid "Add and Close" +msgstr "" + +#: ipalib/plugins/internal.py:323 +msgid "Add Many" +msgstr "" + +#: ipalib/plugins/internal.py:324 +msgid "Back to List" +msgstr "" + +#: ipalib/plugins/internal.py:325 +msgid "Cancel" +msgstr "" + +#: ipalib/plugins/internal.py:326 +msgid "Close" +msgstr "" + +#: ipalib/plugins/internal.py:327 +msgid "Enroll" +msgstr "" + +#: ipalib/plugins/internal.py:328 +msgid "Find" +msgstr "" + +#: ipalib/plugins/internal.py:329 +msgid "Get" +msgstr "" + +#: ipalib/plugins/internal.py:330 +msgid "Issue" +msgstr "" + +#: ipalib/plugins/internal.py:331 +msgid "OK" +msgstr "" + +#: ipalib/plugins/internal.py:332 +msgid "Reset" +msgstr "" + +#: ipalib/plugins/internal.py:333 +msgid "Delete" +msgstr "" + +#: ipalib/plugins/internal.py:334 +msgid "Restore" +msgstr "" + +#: ipalib/plugins/internal.py:335 +msgid "Retry" +msgstr "" + +#: ipalib/plugins/internal.py:336 +msgid "Revoke" +msgstr "" + +#: ipalib/plugins/internal.py:337 +msgid "Update" +msgstr "" + +#: ipalib/plugins/internal.py:338 +msgid "View" +msgstr "" + +#: ipalib/plugins/internal.py:341 +msgid "Available" +msgstr "" + +#: ipalib/plugins/internal.py:342 +msgid "This page has unsaved changes. Please save or revert." +msgstr "" + +#: ipalib/plugins/internal.py:343 +msgid "Dirty" +msgstr "" + +#: ipalib/plugins/internal.py:344 +msgid "Hide already enrolled." +msgstr "" + +#: ipalib/plugins/internal.py:345 +msgid "Select ${entity} to be removed." +msgstr "" + +#: ipalib/plugins/internal.py:346 +msgid "Remove ${entity}." +msgstr "" + +#: ipalib/plugins/internal.py:347 +msgid "Prospective" +msgstr "" + +#: ipalib/plugins/internal.py:350 +msgid "Managed by" +msgstr "" + +#: ipalib/plugins/internal.py:351 +msgid "Member" +msgstr "" + +#: ipalib/plugins/internal.py:352 +msgid "Indirect Member" +msgstr "" + +#: ipalib/plugins/internal.py:353 +msgid "Member Of" +msgstr "" + +#: ipalib/plugins/internal.py:354 +msgid "Indirect Member Of" +msgstr "" + +#: ipalib/plugins/internal.py:355 ipalib/plugins/internal.py:359 +msgid "Settings" +msgstr "" + +#: ipalib/plugins/internal.py:358 +msgid "Search" +msgstr "" + +#: ipalib/plugins/internal.py:362 +msgid "Quick Links" +msgstr "" + +#: ipalib/plugins/internal.py:363 +msgid "Select All" +msgstr "" + +#: ipalib/plugins/internal.py:364 +msgid "Unselect All" +msgstr "" + +#: ipalib/plugins/internal.py:365 +msgid "Are you sure you want to delete selected entries?" +msgstr "" + +#: ipalib/plugins/internal.py:366 +msgid "" +"Query returned more results than the configured size limit. Displaying the " +"first ${counter} results." +msgstr "" + +#: ipalib/plugins/internal.py:370 +msgid "General" +msgstr "" + +#: ipalib/plugins/internal.py:371 +msgid "Identity Settings" +msgstr "" + +#: ipalib/plugins/internal.py:372 +msgid "${entity} ${primary_key} Settings" +msgstr "" + +#: ipalib/plugins/internal.py:373 +msgid "Back to Top" +msgstr "" + +#: ipalib/plugins/internal.py:377 +msgid "Policy" +msgstr "" + +#: ipalib/plugins/internal.py:378 +msgid "Audit" +msgstr "" + +#: ipalib/plugins/internal.py:379 +msgid "IPA Server" +msgstr "" + +#: ipalib/plugins/internal.py:380 +msgid "Sudo" +msgstr "" + +#: ipalib/plugins/internal.py:381 +msgid "Host Based Access Control" +msgstr "" + +#: ipalib/plugins/internal.py:382 +msgid "Role Based Access Control" +msgstr "" + +#: ipalib/plugins/internal.py:383 +msgid "Automount" +msgstr "" + +#: ipalib/plugins/internal.py:386 +msgid "Add ${other_entity} into ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:387 +msgid "${other_entity} enrolled in ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:388 +msgid "${entity} ${primary_key} is enrolled in the following ${other_entity}" +msgstr "" + +#: ipalib/plugins/internal.py:389 +msgid "Remove ${other_entity} from ${entity} ${primary_key}" +msgstr "" + +#: ipalib/plugins/internal.py:392 +msgid "Text does not match field pattern" +msgstr "" + +#: ipalib/plugins/internal.py:395 +msgid "" +"Your Kerberos ticket is no longer valid. Please run kinit and then click " +"'Retry'. If this is your first time running the IPA Web UI <a " +"href='/ipa/config/unauthorized.html'>follow these directions</a> to " +"configure your browser." +msgstr "" + +#: ipalib/plugins/internal.py:399 +msgid "Dict of I18N messages" +msgstr "" + +#: ipalib/plugins/kerberos.py:20 +msgid "" +"\n" +"Backend plugin for Kerberos.\n" +"\n" +"This wraps the python-kerberos and python-krbV bindings.\n" +msgstr "" + +#: ipalib/plugins/kerberos.py:35 +msgid "" +"\n" +" Kerberos backend plugin.\n" +"\n" +" This wraps the `krbV` bindings (and will eventually wrap the `kerberos`\n" +" bindings also). Importantly, this plugin does correct Unicode\n" +" encoding/decoding of values going-to/coming-from the bindings.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:44 +msgid "" +"\n" +" Return the ``krbV.CCache`` for the default credential cache.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:50 +msgid "" +"\n" +" Return the ``krb5.Principal`` for the default credential cache.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:56 +msgid "" +"\n" +" Return the ``krbV.CCache`` for the ``ccname`` credential ccache.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:62 +msgid "" +"\n" +" Return the ``krb5.Principal`` for the ``ccname`` credential ccache.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:68 +msgid "" +"\n" +" Return the default ccache file name.\n" +"\n" +" This will return something like '/tmp/krb5cc_500'.\n" +"\n" +" This cannot return anything meaningful if used in the server as a\n" +" request is processed.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:79 +msgid "" +"\n" +" Return the principal name in default credential cache.\n" +"\n" +" This will return something like 'admin@EXAMPLE.COM'. If no credential\n" +" cache exists for the invoking user, None is returned.\n" +"\n" +" This cannot return anything meaningful if used in the server as a\n" +" request is processed.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:91 +msgid "" +"\n" +" Return the realm from the default credential cache.\n" +"\n" +" This will return something like 'EXAMPLE.COM'. If no credential cache\n" +" exists for the invoking user, None is returned.\n" +"\n" +" This cannot return anything meaningful if used in the server as a\n" +" request is processed.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:103 +msgid "" +"\n" +" Return the principal from credential cache file at ``ccname``.\n" +"\n" +" This will return something like 'admin@EXAMPLE.COM'.\n" +" " +msgstr "" + +#: ipalib/plugins/kerberos.py:111 +msgid "" +"\n" +" Return the realm from credential cache file at ``ccname``.\n" +"\n" +" This will return something like 'EXAMPLE.COM'.\n" +" " +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:19 +msgid "" +"\n" +"Kerberos ticket policy\n" +"\n" +"There is a single Kerberos ticket policy. This policy defines the\n" +"maximum ticket lifetime and the maximum renewal age, the period during\n" +"which the ticket is renewable.\n" +"\n" +"You can also create a per-user ticket policy by specifying the user login.\n" +"\n" +"For changes to the global policy to take effect, restarting the KDC service\n" +"is required, which can be achieved using:\n" +"\n" +"service krb5kdc restart\n" +"\n" +"Changes to per-user policies take effect immediately for newly requested\n" +"tickets (e.g. when the user next runs kinit).\n" +"\n" +"EXAMPLES:\n" +"\n" +" Display the current Kerberos ticket policy:\n" +" ipa krbtpolicy-show\n" +"\n" +" Reset the policy to the default:\n" +" ipa krbtpolicy-reset\n" +"\n" +" Modify the policy to 8 hours max life, 1-day max renewal:\n" +" ipa krbtpolicy-mod --maxlife=28800 --maxrenew=86400\n" +"\n" +" Display effective Kerberos ticket policy for user 'admin':\n" +" ipa krbtpolicy-show admin\n" +"\n" +" Reset per-user policy for user 'admin':\n" +" ipa krbtpolicy-reset admin\n" +"\n" +" Modify per-user policy for user 'admin':\n" +" ipa krbtpolicy-mod admin --maxlife=3600\n" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:71 +msgid "" +"\n" +" Kerberos Ticket Policy object\n" +" " +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:79 +msgid "Kerberos Ticket Policy" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:84 ipalib/plugins/passwd.py:53 +msgid "User name" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:85 +msgid "Manage ticket policy for specific user" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:90 +msgid "Max life" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:91 +msgid "Maximum ticket life (seconds)" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:96 +msgid "Max renew" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:97 +msgid "Maximum renewable age (seconds)" +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:111 +msgid "" +"\n" +" Modify Kerberos ticket policy.\n" +" " +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:125 +msgid "" +"\n" +" Display the current Kerberos ticket policy.\n" +" " +msgstr "" + +#: ipalib/plugins/krbtpolicy.py:149 +msgid "" +"\n" +" Reset Kerberos ticket policy to the default values.\n" +" " +msgstr "" + +#: ipalib/plugins/migration.py:19 +msgid "" +"\n" +"Migration to IPA\n" +"\n" +"Migrate users and groups from an LDAP server to IPA.\n" +"\n" +"This performs an LDAP query against the remote server searching for\n" +"users and groups in a container. In order to migrate passwords you need\n" +"to bind as a user that can read the userPassword attribute on the remote\n" +"server. This is generally restricted to high-level admins such as\n" +"cn=Directory Manager in 389-ds (this is the default bind user).\n" +"\n" +"The default user container is ou=People.\n" +"\n" +"The default group container is ou=Groups.\n" +"\n" +"Users and groups that already exist on the IPA server are skipped.\n" +"\n" +"Two LDAP schemas define how group members are stored: RFC2307 and\n" +"RFC2307bis. RFC2307bis uses member and uniquemember to specify group\n" +"members, RFC2307 uses memberUid. The default schema is RFC2307bis.\n" +"\n" +"Migrated users do not have Kerberos credentials, they have only their\n" +"LDAP password. To complete the migration process, users need to go\n" +"to http://ipa.example.com/ipa/migration and authenticate using their\n" +"LDAP password in order to generate their Kerberos credentials.\n" +"\n" +"Migration is disabled by default. Use the command ipa config-mod to\n" +"enable it:\n" +"\n" +" ipa config-mod --enable-migration=TRUE\n" +"\n" +"EXAMPLES:\n" +"\n" +" The simplest migration, accepting all defaults:\n" +" ipa migrate-ds ldap://ds.example.com:389\n" +"\n" +" Specify the user and group container. This can be used to migrate user and\n" +" group data from an IPA v1 server:\n" +" ipa migrate-ds --user-container='cn=users,cn=accounts' --group-container='cn=groups,cn=accounts' ldap://ds.example.com:389\n" +msgstr "" + +#: ipalib/plugins/migration.py:78 +msgid "" +"Kerberos principal %s already exists. Use 'ipa user-mod' to set it manually." +msgstr "" + +#: ipalib/plugins/migration.py:79 +msgid "" +"Failed to add user to the default group. Use 'ipa group-add-member' to add " +"manually." +msgstr "" + +#: ipalib/plugins/migration.py:175 +msgid "" +"\n" +" Convert usernames in member attributes to work in IPA.\n" +" " +msgstr "" + +#: ipalib/plugins/migration.py:220 +msgid "Invalid LDAP URI." +msgstr "" + +#: ipalib/plugins/migration.py:225 +msgid "" +"\n" +" Migrate users and groups from DS to IPA.\n" +" " +msgstr "" + +#: ipalib/plugins/migration.py:266 +msgid "LDAP URI" +msgstr "" + +#: ipalib/plugins/migration.py:267 +msgid "LDAP URI of DS server to migrate from" +msgstr "" + +#: ipalib/plugins/migration.py:272 +msgid "bind password" +msgstr "" + +#: ipalib/plugins/migration.py:279 +msgid "Bind DN" +msgstr "" + +#: ipalib/plugins/migration.py:285 +msgid "User container" +msgstr "" + +#: ipalib/plugins/migration.py:286 +msgid "RDN of container for users in DS" +msgstr "" + +#: ipalib/plugins/migration.py:292 +msgid "Group container" +msgstr "" + +#: ipalib/plugins/migration.py:293 +msgid "RDN of container for groups in DS" +msgstr "" + +#: ipalib/plugins/migration.py:299 +msgid "User object class" +msgstr "" + +#: ipalib/plugins/migration.py:300 +msgid "" +"Comma-separated list of objectclasses used to search for user entries in DS" +msgstr "" + +#: ipalib/plugins/migration.py:306 +msgid "Group object class" +msgstr "" + +#: ipalib/plugins/migration.py:307 +msgid "" +"Comma-separated list of objectclasses used to search for group entries in DS" +msgstr "" + +#: ipalib/plugins/migration.py:313 +msgid "LDAP schema" +msgstr "" + +#: ipalib/plugins/migration.py:314 +msgid "" +"The schema used on the LDAP server. Supported values are RFC2307 and " +"RFC2307bis. The default is RFC2307bis" +msgstr "" + +#: ipalib/plugins/migration.py:320 +msgid "" +"Continuous operation mode. Errors are reported but the process continues" +msgstr "" + +#: ipalib/plugins/migration.py:328 +msgid "Lists of objects migrated; categorized by type." +msgstr "" + +#: ipalib/plugins/migration.py:332 +msgid "Lists of objects that could not be migrated; categorized by type." +msgstr "" + +#: ipalib/plugins/migration.py:336 +msgid "False if migration mode was disabled." +msgstr "" + +#: ipalib/plugins/migration.py:340 +msgid "comma-separated list of %s to exclude from migration" +msgstr "" + +#: ipalib/plugins/migration.py:342 +msgid "" +"search results for objects to be migrated\n" +"have been truncated by the server;\n" +"migration process might be incomplete\n" +msgstr "" + +#: ipalib/plugins/migration.py:347 +msgid "Migration mode is disabled. Use 'ipa config-mod' to enable it." +msgstr "" + +#: ipalib/plugins/migration.py:350 +msgid "" +"Passwords have been migrated in pre-hashed format.\n" +"IPA is unable to generate Kerberos keys unless provided\n" +"with clear text passwords. All migrated users need to\n" +"login at https://your.domain/ipa/migration/ before they\n" +"can use their Kerberos accounts." +msgstr "" + +#: ipalib/plugins/migration.py:358 +msgid "" +"\n" +" Call get_options of the baseclass and add \"exclude\" options\n" +" for each type of object being migrated.\n" +" " +msgstr "" + +#: ipalib/plugins/migration.py:375 +msgid "" +"\n" +" Convert all \"exclude\" option values to lower-case.\n" +"\n" +" Also, empty List parameters are converted to None, but the migration\n" +" plugin doesn't like that - convert back to empty lists.\n" +" " +msgstr "" + +#: ipalib/plugins/migration.py:399 +msgid "" +"\n" +" Migrate objects from DS to LDAP.\n" +" " +msgstr "" + +#: ipalib/plugins/migration.py:425 +msgid "Container for %(container)s not found" +msgstr "" + +#: ipalib/plugins/misc.py:20 +msgid "" +"\n" +"Misc plug-ins\n" +msgstr "" + +#: ipalib/plugins/misc.py:36 +msgid "Show environment variables" +msgstr "" + +#: ipalib/plugins/misc.py:38 +msgid "%(count)d variables" +msgstr "" + +#: ipalib/plugins/misc.py:47 ipalib/plugins/misc.py:115 +msgid "" +"retrieve and print all attributes from the server. Affects command output." +msgstr "" + +#: ipalib/plugins/misc.py:61 +msgid "Total number of variables env (>= count)" +msgstr "" + +#: ipalib/plugins/misc.py:66 +msgid "Number of variables returned (<= total)" +msgstr "" + +#: ipalib/plugins/misc.py:106 +msgid "Show all loaded plugins" +msgstr "" + +#: ipalib/plugins/misc.py:108 +msgid "%(count)d plugin loaded" +msgid_plural "%(count)d plugins loaded" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/misc.py:126 +msgid "Number of plugins loaded" +msgstr "" + +#: ipalib/plugins/netgroup.py:20 +msgid "" +"\n" +"Netgroups\n" +"\n" +"A netgroup is a group used for permission checking. It can contain both\n" +"user and host values.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new netgroup:\n" +" ipa netgroup-add --desc=\"NFS admins\" admins\n" +"\n" +" Add members to the netgroup:\n" +" ipa netgroup-add-member --users=tuser1,tuser2 admins\n" +"\n" +" Remove a member from the netgroup:\n" +" ipa netgroup-remove-member --users=tuser2 admins\n" +"\n" +" Display information about a netgroup:\n" +" ipa netgroup-show admins\n" +"\n" +" Delete a netgroup:\n" +" ipa netgroup-del admins\n" +msgstr "" + +#: ipalib/plugins/netgroup.py:59 +msgid "Member Host" +msgstr "" + +#: ipalib/plugins/netgroup.py:67 +msgid "" +"\n" +" Netgroup object.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:98 +msgid "Netgroups" +msgstr "" + +#: ipalib/plugins/netgroup.py:103 +msgid "Netgroup name" +msgstr "" + +#: ipalib/plugins/netgroup.py:110 +msgid "Netgroup description" +msgstr "" + +#: ipalib/plugins/netgroup.py:114 +msgid "NIS domain name" +msgstr "" + +#: ipalib/plugins/netgroup.py:119 +msgid "IPA unique ID" +msgstr "" + +#: ipalib/plugins/netgroup.py:140 +msgid "" +"\n" +" Add a new netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:144 +msgid "Added netgroup \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/netgroup.py:153 +msgid "" +"\n" +" Delete a netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:156 +msgid "Deleted netgroup \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/netgroup.py:162 +msgid "" +"\n" +" Modify a netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:166 +msgid "Modified netgroup \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/netgroup.py:180 +msgid "" +"\n" +" Search for a netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:185 +msgid "%(count)d netgroup matched" +msgid_plural "%(count)d netgroups matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/netgroup.py:213 +msgid "" +"\n" +" Display information about a netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:222 +msgid "" +"\n" +" Add members to a netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/netgroup.py:258 +msgid "" +"\n" +" Remove members from a netgroup.\n" +" " +msgstr "" + +#: ipalib/plugins/passwd.py:19 +msgid "" +"\n" +"Set a user's password\n" +"\n" +"If someone other than a user changes that user's password (e.g., Helpdesk\n" +"resets it) then the password will need to be changed the first time it\n" +"is used. This is so the end-user is the only one who knows the password.\n" +"\n" +"The IPA password policy controls how often a password may be changed,\n" +"what strength requirements exist, and the length of the password history.\n" +"\n" +"EXAMPLES:\n" +"\n" +" To reset your own password:\n" +" ipa passwd\n" +"\n" +" To change another user's password:\n" +" ipa passwd tuser1\n" +msgstr "" + +#: ipalib/plugins/passwd.py:46 +msgid "" +"\n" +" Set a user's password\n" +" " +msgstr "" + +#: ipalib/plugins/passwd.py:64 +msgid "Changed password for \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/passwd.py:67 +msgid "" +"\n" +" Execute the passwd operation.\n" +"\n" +" The dn should not be passed as a keyword argument as it is constructed\n" +" by this method.\n" +"\n" +" Returns the entry\n" +"\n" +" :param principal: The login name or principal of the user\n" +" :param password: the new password\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:19 +msgid "" +"\n" +"Permissions\n" +"\n" +"A permission enables fine-grained delegation of rights. A permission is\n" +"a human-readable form of a 389-ds Access Control Rule, or instruction (ACI).\n" +"A permission grants the right to perform a specific task such as adding a\n" +"user, modifying a group, etc.\n" +"\n" +"A permission may not contain other permissions.\n" +"\n" +"* A permission grants access to read, write, add or delete.\n" +"* A privilege combines similar permissions (for example all the permissions\n" +" needed to add a user).\n" +"* A role grants a set of privileges to users, groups, hosts or hostgroups.\n" +"\n" +"A permission is made up of a number of different parts:\n" +"\n" +"1. The name of the permission.\n" +"2. The target of the permission.\n" +"3. The rights granted by the permission.\n" +"\n" +"Rights define what operations are allowed, and may be one or more\n" +"of the following:\n" +"1. write - write one or more attributes\n" +"2. read - read one or more attributes\n" +"3. add - add a new entry to the tree\n" +"4. delete - delete an existing entry\n" +"5. all - all permissions are granted\n" +"\n" +"Read permission is granted for most attributes by default so the read\n" +"permission is not expected to be used very often.\n" +"\n" +"Note the distinction between attributes and entries. The permissions are\n" +"independent, so being able to add a user does not mean that the user will\n" +"be editable.\n" +"\n" +"There are a number of allowed targets:\n" +"1. type: a type of object (user, group, etc).\n" +"2. memberof: a member of a group or hostgroup\n" +"3. filter: an LDAP filter\n" +"4. subtree: an LDAP filter specifying part of the LDAP DIT. This is a\n" +" super-set of the \"type\" target.\n" +"5. targetgroup: grant access to modify a specific group (such as granting\n" +" the rights to manage group membership)\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a permission that grants the creation of users:\n" +" ipa permission-add --type=user --permissions=add \"Add Users\"\n" +"\n" +" Add a permission that grants the ability to manage group membership:\n" +" ipa permission-add --attrs=member --permissions=write --type=group \"Manage Group Members\"\n" +msgstr "" + +#: ipalib/plugins/permission.py:84 +msgid "Permission Type" +msgstr "" + +#: ipalib/plugins/permission.py:89 +msgid "" +"\n" +" Permission object.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:112 +msgid "Permission name" +msgstr "" + +#: ipalib/plugins/permission.py:119 +msgid "" +"Comma-separated list of permissions to grant (read, write, add, delete, all)" +msgstr "" + +#: ipalib/plugins/permission.py:132 +msgid "" +"Type of IPA object (user, group, host, hostgroup, service, netgroup, dns)" +msgstr "" + +#: ipalib/plugins/permission.py:138 +msgid "Member of group" +msgstr "" + +#: ipalib/plugins/permission.py:139 +msgid "Target members of a group" +msgstr "" + +#: ipalib/plugins/permission.py:151 +msgid "Subtree to apply permissions to" +msgstr "" + +#: ipalib/plugins/permission.py:157 +msgid "User group to apply permissions to" +msgstr "" + +#: ipalib/plugins/permission.py:177 +msgid "" +"\n" +" Add a new permission.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:181 +msgid "Added permission \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/permission.py:236 +msgid "" +"\n" +" Delete a permission.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:240 +msgid "Deleted permission \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/permission.py:256 +msgid "" +"\n" +" Modify a permission.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:260 +msgid "Modified permission \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/permission.py:352 +msgid "" +"\n" +" Search for permissions.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:356 +msgid "%(count)d permission matched" +msgid_plural "%(count)d permissions matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/permission.py:405 +msgid "" +"\n" +" Display information about a permission.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:428 +msgid "" +"\n" +" Add members to a permission.\n" +" " +msgstr "" + +#: ipalib/plugins/permission.py:437 +msgid "" +"\n" +" Remove members from a permission.\n" +" " +msgstr "" + +#: ipalib/plugins/ping.py:19 +msgid "" +"\n" +"Ping the remote IPA server\n" +msgstr "" + +#: ipalib/plugins/ping.py:29 +msgid "" +"\n" +" ping a remote server\n" +" " +msgstr "" + +#: ipalib/plugins/ping.py:37 +msgid "" +"\n" +" A possible enhancement would be to take an argument and echo it\n" +" back but a fixed value works for now.\n" +" " +msgstr "" + +#: ipalib/plugins/pkinit.py:19 +msgid "" +"\n" +"Kerberos pkinit options\n" +"\n" +"Enable or disable anonymous pkinit using the principal\n" +"WELLKNOWN/ANONYMOUS@REALM. The server must have been installed with\n" +"pkinit support.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Enable anonymous pkinit:\n" +" ipa pkinit-anonymous enable\n" +"\n" +" Disable anonymous pkinit:\n" +" ipa pkinit-anonymous disable\n" +"\n" +"For more information on anonymous pkinit see:\n" +"\n" +"http://k5wiki.kerberos.org/wiki/Projects/Anonymous_pkinit\n" +msgstr "" + +#: ipalib/plugins/pkinit.py:46 +msgid "" +"\n" +" PKINIT Options\n" +" " +msgstr "" + +#: ipalib/plugins/pkinit.py:51 +msgid "PKINIT" +msgstr "" + +#: ipalib/plugins/pkinit.py:56 +msgid "" +"\n" +" Accepts only Enable/Disable.\n" +" " +msgstr "" + +#: ipalib/plugins/pkinit.py:67 +msgid "" +"\n" +" Enable or Disable Anonymous PKINIT\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:19 +msgid "" +"\n" +"Privileges\n" +"\n" +"A privilege combines permissions into a logical task. A permission provides\n" +"the rights to do a single task. There are some IPA operations that require\n" +"multiple permissions to succeed. A privilege is where permissions are\n" +"combined in order to perform a specific task.\n" +"\n" +"For example, adding a user requires the following permissions:\n" +" * Creating a new user entry\n" +" * Resetting a user password\n" +" * Adding the new user to the default IPA users group\n" +"\n" +"Combining these three low-level tasks into a higher level task in the\n" +"form of a privilege named \"Add User\" makes it easier to manage Roles.\n" +"\n" +"A privilege may not contain other privileges.\n" +"\n" +"See role and permission for additional information.\n" +msgstr "" + +#: ipalib/plugins/privilege.py:45 +msgid "" +"\n" +" Privilege object.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:65 +msgid "Privileges" +msgstr "" + +#: ipalib/plugins/privilege.py:70 +msgid "Privilege name" +msgstr "" + +#: ipalib/plugins/privilege.py:77 +msgid "Privilege description" +msgstr "" + +#: ipalib/plugins/privilege.py:85 +msgid "" +"\n" +" Add a new privilege.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:89 +msgid "Added privilege \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/privilege.py:95 +msgid "" +"\n" +" Delete a privilege.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:99 +msgid "Deleted privilege \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/privilege.py:105 +msgid "" +"\n" +" Modify a privilege.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:109 +msgid "Modified privilege \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/privilege.py:115 +msgid "" +"\n" +" Search for privileges.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:119 +msgid "%(count)d privilege matched" +msgid_plural "%(count)d privileges matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/privilege.py:127 +msgid "" +"\n" +" Display information about a privilege.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:135 +msgid "" +"\n" +" Add members to a privilege\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:144 +msgid "" +"\n" +" Remove members from a privilege\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:153 +msgid "" +"\n" +" Add permissions to a privilege.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:169 +msgid "Number of permissions added" +msgstr "" + +#: ipalib/plugins/privilege.py:177 +msgid "" +"\n" +" Remove permissions from a privilege.\n" +" " +msgstr "" + +#: ipalib/plugins/privilege.py:195 +msgid "Number of permissions removed" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:20 +msgid "" +"\n" +"Password policy\n" +"\n" +"A password policy sets limitations on IPA passwords, including maximum\n" +"lifetime, minimum lifetime, the number of passwords to save in\n" +"history, the number of character classes required (for stronger passwords)\n" +"and the minimum password length.\n" +"\n" +"By default there is a single, global policy for all users. You can also\n" +"create a password policy to apply to a group. Each user is only subject\n" +"to one password policy, either the group policy or the global policy. A\n" +"group policy stands alone; it is not a super-set of the global policy plus\n" +"custom settings.\n" +"\n" +"Each group password policy requires a unique priority setting. If a user\n" +"is in multiple groups that have password policies, this priority determines\n" +"which password policy is applied. A lower value indicates a higher priority\n" +"policy.\n" +"\n" +"Group password policies are automatically removed when the groups they\n" +"are associated with are removed.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Modify the global policy:\n" +" ipa pwpolicy-mod --minlength=10\n" +"\n" +" Add a new group password policy:\n" +" ipa pwpolicy-add --maxlife=90 --minlife=1 --history=10 --minclasses=3 --minlength=8 --priority=10 localadmins\n" +"\n" +" Display the global password policy:\n" +" ipa pwpolicy-show\n" +"\n" +" Display a group password policy:\n" +" ipa pwpolicy-show localadmins\n" +"\n" +" Display the policy that would be applied to a given user:\n" +" ipa pwpolicy-show --user=tuser1\n" +"\n" +" Modify a group password policy:\n" +" ipa pwpolicy-mod --minclasses=2 localadmins\n" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:72 +msgid "" +"\n" +" Class of Service object used for linking policies with groups\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:87 +msgid "priority must be a unique value (%(prio)d already used by %(gname)s)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:172 +msgid "" +"\n" +" Password Policy object\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:201 +msgid "Max failures" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:202 +msgid "Consecutive failures before lockout" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:207 +msgid "Failure reset interval" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:208 +msgid "Period after which failure count will be reset (seconds)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:213 +msgid "Lockout duration" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:214 +msgid "Period for which lockout is enforced (seconds)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:224 +msgid "Group" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:225 +msgid "Manage password policy for specific group" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:230 +msgid "Max lifetime (days)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:231 +msgid "Maximum password lifetime (in days)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:236 +msgid "Min lifetime (hours)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:237 +msgid "Minimum password lifetime (in hours)" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:242 +msgid "History size" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:243 +msgid "Password history size" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:248 +msgid "Character classes" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:249 +msgid "Minimum number of character classes" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:255 +msgid "Min length" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:256 +msgid "Minimum length of password" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:261 +msgid "Priority" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:262 +msgid "Priority of the policy (higher number means lower priority" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:294 +msgid "" +"\n" +" Ensure that the maximum lifetime is greater than the minimum.\n" +" If there is no minimum lifetime set then don't return an error.\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:314 +msgid "Maximum password life must be greater than minimum." +msgstr "" + +#: ipalib/plugins/pwpolicy.py:333 +msgid "" +"\n" +" Add a new group password policy.\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:361 +msgid "" +"\n" +" Delete a group password policy.\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:380 +msgid "" +"\n" +" Modify a group password policy.\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:391 +msgid "priority cannot be set on global policy" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:423 +msgid "" +"\n" +" Display information about password policy.\n" +" " +msgstr "" + +#: ipalib/plugins/pwpolicy.py:428 +msgid "User" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:429 +msgid "Display effective policy for a specific user" +msgstr "" + +#: ipalib/plugins/pwpolicy.py:452 +msgid "" +"\n" +" Search for group password policies.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:20 +msgid "" +"\n" +"Roles\n" +"\n" +"A role is used for fine-grained delegation. A permission grants the ability\n" +"to perform given low-level tasks (add a user, modify a group, etc.). A\n" +"privilege combines one or more permissions into a higher-level abstraction\n" +"such as useradmin. A useradmin would be able to add, delete and modify users.\n" +"\n" +"Privileges are assigned to Roles.\n" +"\n" +"Users, groups, hosts and hostgroups may be members of a Role.\n" +"\n" +"Roles can not contain other roles.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new role:\n" +" ipa role-add --desc=\"Junior-level admin\" junioradmin\n" +"\n" +" Add some privileges to this role:\n" +" ipa role-add-privilege --privileges=addusers junioradmin\n" +" ipa role-add-privilege --privileges=change_password junioradmin\n" +" ipa role-add-privilege --privileges=add_user_to_default_group juioradmin\n" +"\n" +" Add a group of users to this role:\n" +" ipa group-add --desc=\"User admins\" useradmins\n" +" ipa role-add-member --groups=useradmins junioradmin\n" +"\n" +" Display information about a role:\n" +" ipa role-show junioradmin\n" +"\n" +" The result of this is that any users in the group 'useradmins' can\n" +" add users, reset passwords or add a user to the default IPA user group.\n" +msgstr "" + +#: ipalib/plugins/role.py:62 +msgid "" +"\n" +" Role object.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:81 +msgid "Role" +msgstr "" + +#: ipalib/plugins/role.py:86 +msgid "Role name" +msgstr "" + +#: ipalib/plugins/role.py:93 +msgid "A description of this role-group" +msgstr "" + +#: ipalib/plugins/role.py:101 +msgid "" +"\n" +" Add a new role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:105 +msgid "Added role \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/role.py:111 +msgid "" +"\n" +" Delete a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:115 +msgid "Deleted role \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/role.py:121 +msgid "" +"\n" +" Modify a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:125 +msgid "Modified role \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/role.py:131 +msgid "" +"\n" +" Search for roles.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:135 +msgid "%(count)d role matched" +msgid_plural "%(count)d roles matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/role.py:143 +msgid "" +"\n" +" Display information about a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:151 +msgid "" +"\n" +" Add members to a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:159 +msgid "" +"\n" +" Remove members from a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:167 +msgid "" +"\n" +" Add privileges to a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:183 +msgid "Number of privileges added" +msgstr "" + +#: ipalib/plugins/role.py:191 +msgid "" +"\n" +" Remove privileges from a role.\n" +" " +msgstr "" + +#: ipalib/plugins/role.py:207 +msgid "Number of privileges removed" +msgstr "" + +#: ipalib/plugins/selfservice.py:19 +msgid "" +"\n" +"Self-service Permissions\n" +"\n" +"A permission enables fine-grained delegation of permissions. Access Control\n" +"Rules, or instructions (ACIs), grant permission to permissions to perform\n" +"given tasks such as adding a user, modifying a group, etc.\n" +"\n" +"A Self-service permission defines what an object can change in its own entry.\n" +"\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a self-service rule to allow users to manage their address:\n" +" ipa selfservice-add --permissions=write --attrs=street,postalCode,l,c,st \"Users manage their own address\"\n" +"\n" +" When managing the list of attributes you need to include all attributes\n" +" in the list, including existing ones. Add telephoneNumber to the list:\n" +" ipa selfservice-mod --attrs=street,postalCode,l,c,st,telephoneNumber \"Users manage their own address\"\n" +"\n" +" Display our updated rule:\n" +" ipa selfservice-show \"Users manage their own address\"\n" +"\n" +" Delete a rule:\n" +" ipa selfservice-del \"Users manage their own address\"\n" +msgstr "" + +#: ipalib/plugins/selfservice.py:56 +msgid "" +"\n" +" Determine if the ACI is a Self-service ACI and raise an exception if it\n" +" isn't.\n" +"\n" +" Return the result if it is a self-service ACI.\n" +" " +msgstr "" + +#: ipalib/plugins/selfservice.py:64 +msgid "Self-service permission '%(permission)s' not found" +msgstr "" + +#: ipalib/plugins/selfservice.py:68 +msgid "" +"\n" +" Selfservice object.\n" +" " +msgstr "" + +#: ipalib/plugins/selfservice.py:75 +msgid "Self Service Permissions" +msgstr "" + +#: ipalib/plugins/selfservice.py:80 ipalib/plugins/selfservice.py:81 +msgid "Self-service name" +msgstr "" + +#: ipalib/plugins/selfservice.py:114 +msgid "" +"\n" +" Add a new self-service permission.\n" +" " +msgstr "" + +#: ipalib/plugins/selfservice.py:118 +msgid "Added selfservice \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/selfservice.py:137 +msgid "" +"\n" +" Delete a self-service permission.\n" +" " +msgstr "" + +#: ipalib/plugins/selfservice.py:142 +msgid "Deleted selfservice \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/selfservice.py:158 +msgid "" +"\n" +" Modify a self-service permission.\n" +" " +msgstr "" + +#: ipalib/plugins/selfservice.py:162 +msgid "Modified selfservice \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/selfservice.py:181 +msgid "" +"\n" +" Search for a self-service permission.\n" +" " +msgstr "" + +#: ipalib/plugins/selfservice.py:185 +msgid "%(count)d selfservice matched" +msgid_plural "%(count)d selfservices matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/selfservice.py:207 +msgid "" +"\n" +" Display information about a self-service permission.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:21 +msgid "" +"\n" +"Services\n" +"\n" +"A IPA service represents a service that runs on a host. The IPA service\n" +"record can store a Kerberos principal, an SSL certificate, or both.\n" +"\n" +"An IPA service can be managed directly from a machine, provided that\n" +"machine has been given the correct permission. This is true even for\n" +"machines other than the one the service is associated with. For example,\n" +"requesting an SSL certificate using the host service principal credentials\n" +"of the host. To manage a service using host credentials you need to\n" +"kinit as the host:\n" +"\n" +" # kinit -kt /etc/krb5.keytab host/ipa.example.com@EXAMPLE.COM\n" +"\n" +"Adding an IPA service allows the associated service to request an SSL\n" +"certificate or keytab, but this is performed as a separate step; they\n" +"are not produced as a result of adding the service.\n" +"\n" +"Only the public aspect of a certificate is stored in a service record;\n" +"the private key is not stored.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new IPA service:\n" +" ipa service-add HTTP/web.example.com\n" +"\n" +" Allow a host to manage an IPA service certificate:\n" +" ipa service-add-host --hosts=web.example.com HTTP/web.example.com\n" +" ipa role-add-member --hosts=web.example.com certadmin\n" +"\n" +" Delete an IPA service:\n" +" ipa service-del HTTP/web.example.com\n" +"\n" +" Find all IPA services associated with a host:\n" +" ipa service-find web.example.com\n" +"\n" +" Find all HTTP services:\n" +" ipa service-find HTTP\n" +"\n" +" Disable the service Kerberos key and SSL certificate:\n" +" ipa service-disable HTTP/web.example.com\n" +"\n" +" Request a certificate for an IPA service:\n" +" ipa cert-request --principal=HTTP/web.example.com example.csr\n" +"\n" +" Generate and retrieve a keytab for an IPA service:\n" +" ipa-getkeytab -s ipa.example.com -p HTTP/web.example.com -k /etc/httpd/httpd.keytab\n" +"\n" +msgstr "" + +#: ipalib/plugins/service.py:162 +msgid "" +"\n" +" For now just verify that it is properly base64-encoded.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:175 +msgid "" +"\n" +" Set individual attributes from some values from a certificate.\n" +"\n" +" entry_attrs is a dict of an entry\n" +"\n" +" returns nothing\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:199 +msgid "" +"\n" +" Service object.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:226 +msgid "Service principal" +msgstr "" + +#: ipalib/plugins/service.py:242 +msgid "" +"\n" +" Add a new IPA new service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:245 +msgid "Added service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/service.py:251 +msgid "force principal name even if not in DNS" +msgstr "" + +#: ipalib/plugins/service.py:284 +msgid "" +"\n" +" Delete an IPA service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:287 +msgid "Deleted service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/service.py:321 +msgid "" +"\n" +" Modify an existing IPA service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:324 +msgid "Modified service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/service.py:356 +msgid "" +"\n" +" Search for IPA services.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:359 +msgid "%(count)d service matched" +msgid_plural "%(count)d services matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/service.py:394 +msgid "" +"\n" +" Display information about an IPA service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:432 +msgid "" +"\n" +" Add hosts that can manage this service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:442 +msgid "" +"\n" +" Remove hosts that can manage this service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:452 +msgid "" +"\n" +" Disable the Kerberos key and SSL certificate of a service.\n" +" " +msgstr "" + +#: ipalib/plugins/service.py:456 +msgid "Disabled service \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmd.py:19 +msgid "" +"\n" +"Sudo Commands\n" +"\n" +"Commands used as building blocks for sudo\n" +"\n" +"EXAMPLES:\n" +"\n" +" Create a new command\n" +" ipa sudocmd-add --desc='For reading log files' /usr/bin/less\n" +"\n" +" Remove a command\n" +" ipa sudocmd-del /usr/bin/less\n" +"\n" +msgstr "" + +#: ipalib/plugins/sudocmd.py:46 +msgid "" +"\n" +" Sudo Command object.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmd.py:64 +msgid "Sudo Commands" +msgstr "" + +#: ipalib/plugins/sudocmd.py:69 +msgid "Sudo Command" +msgstr "" + +#: ipalib/plugins/sudocmd.py:75 +msgid "A description of this command" +msgstr "" + +#: ipalib/plugins/sudocmd.py:98 +msgid "" +"\n" +" Create new sudo command.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmd.py:102 +msgid "Added sudo command \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmd.py:107 +msgid "" +"\n" +" Delete sudo command.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmd.py:111 +msgid "Deleted sudo command \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmd.py:116 +msgid "" +"\n" +" Modify command.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmd.py:120 +msgid "Modified sudo command \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmd.py:125 +msgid "" +"\n" +" Search for commands.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmd.py:129 +msgid "%(count)d sudo command matched" +msgid_plural "%(count)d sudo command matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/sudocmd.py:136 +msgid "" +"\n" +" Display sudo command.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:19 +msgid "" +"\n" +"Groups of Sudo commands\n" +"\n" +"Manage groups of Sudo commands.\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new Sudo command group:\n" +" ipa sudocmdgroup-add --desc='administrators commands' admincmds\n" +"\n" +" Remove a Sudo command group:\n" +" ipa sudocmdgroup-del admincmds\n" +"\n" +" Manage Sudo command group membership, commands:\n" +" ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less,/usr/bin/vim admincmds\n" +"\n" +" Manage Sudo command group membership, commands:\n" +" ipa group-remove-member --sudocmds=/usr/bin/less admincmds\n" +"\n" +" Show a Sudo command group:\n" +" ipa group-show localadmins\n" +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:50 +msgid "" +"\n" +" Sudo Group object.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:70 +msgid "Sudo Command Group" +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:93 +msgid "" +"\n" +" Create new sudo command group.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:97 +msgid "Added sudo command group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:103 +msgid "" +"\n" +" Delete sudo command group.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:107 +msgid "Deleted sudo command group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:113 +msgid "" +"\n" +" Modify group.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:117 +msgid "Modified sudo command group \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:123 +msgid "" +"\n" +" Search for sudo command groups.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:127 +msgid "%(count)d sudo command group matched" +msgid_plural "%(count)d sudo command groups matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/sudocmdgroup.py:136 +msgid "" +"\n" +" Display sudo command group.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:144 +msgid "" +"\n" +" Add members to sudo command group.\n" +" " +msgstr "" + +#: ipalib/plugins/sudocmdgroup.py:152 +msgid "" +"\n" +" Remove members from sudo command group.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:19 +msgid "" +"\n" +"Sudo (su \"do\") allows a system administrator to delegate authority to\n" +"give certain users (or groups of users) the ability to run some (or all)\n" +"commands as root or another user while providing an audit trail of the\n" +"commands and their arguments.\n" +"\n" +"FreeIPA provides a designated binddn to use with Sudo located at:\n" +"uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com\n" +"\n" +"To enable the binddn run the following command to set the password:\n" +"LDAPTLS_CACERT=/etc/ipa/ca.crt /usr/bin/ldappasswd -S -W -h ipa.example.com -ZZ -D \"cn=Directory Manager\" uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com\n" +"\n" +"For more information, see the FreeIPA Documentation to Sudo.\n" +msgstr "" + +#: ipalib/plugins/sudorule.py:44 +msgid "" +"\n" +" Sudo Rule management\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:68 +msgid "Sudo Rule" +msgstr "" + +#: ipalib/plugins/sudorule.py:98 +msgid "Command category" +msgstr "" + +#: ipalib/plugins/sudorule.py:99 +msgid "Command category the rule applies to" +msgstr "" + +#: ipalib/plugins/sudorule.py:104 +msgid "Run As User category" +msgstr "" + +#: ipalib/plugins/sudorule.py:105 +msgid "Run As User category the rule applies to" +msgstr "" + +#: ipalib/plugins/sudorule.py:110 +msgid "Run As Group category" +msgstr "" + +#: ipalib/plugins/sudorule.py:111 +msgid "Run As Group category the rule applies to" +msgstr "" + +#: ipalib/plugins/sudorule.py:131 +msgid "Sudo Allow Commands" +msgstr "" + +#: ipalib/plugins/sudorule.py:135 +msgid "Sudo Deny Commands" +msgstr "" + +#: ipalib/plugins/sudorule.py:147 +msgid "Run As User" +msgstr "" + +#: ipalib/plugins/sudorule.py:151 +msgid "Run As Group" +msgstr "" + +#: ipalib/plugins/sudorule.py:156 +msgid "External User" +msgstr "" + +#: ipalib/plugins/sudorule.py:157 +msgid "External User the rule applies to" +msgstr "" + +#: ipalib/plugins/sudorule.py:161 +msgid "RunAs External User" +msgstr "" + +#: ipalib/plugins/sudorule.py:162 +msgid "External User the commands can run as" +msgstr "" + +#: ipalib/plugins/sudorule.py:166 +msgid "RunAs External Group" +msgstr "" + +#: ipalib/plugins/sudorule.py:167 +msgid "External Group the commands can run as" +msgstr "" + +#: ipalib/plugins/sudorule.py:175 +msgid "" +"\n" +" Create new Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:183 +msgid "Added sudo rule \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/sudorule.py:189 +msgid "" +"\n" +" Delete Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:197 +msgid "" +"\n" +" Modify Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:205 +msgid "" +"\n" +" Search for Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:213 +msgid "" +"\n" +" Display Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:221 +msgid "" +"\n" +" Enable a Sudo rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:247 +msgid "" +"\n" +" Disable a Sudo rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:273 ipalib/plugins/sudorule.py:293 +msgid "" +"\n" +" Add commands and sudo command groups affected by Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:283 ipalib/plugins/sudorule.py:303 +msgid "" +"\n" +" Remove commands and sudo command groups affected by Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:313 +msgid "" +"\n" +" Add users and groups affected by Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:349 +msgid "" +"\n" +" Remove users and groups affected by Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:383 +msgid "" +"\n" +" Add hosts and hostgroups affected by Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:419 +msgid "" +"\n" +" Remove hosts and hostgroups affected by Sudo Rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:453 +msgid "" +"\n" +" Add user for Sudo to execute as.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:489 +msgid "" +"\n" +" Remove user for Sudo to execute as.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:523 +msgid "" +"\n" +" Add group for Sudo to execute as.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:559 +msgid "" +"\n" +" Remove group for Sudo to execute as.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:593 +msgid "" +"\n" +" Add an option to the Sudo rule.\n" +" " +msgstr "" + +#: ipalib/plugins/sudorule.py:600 ipalib/plugins/sudorule.py:641 +msgid "Sudo Option" +msgstr "" + +#: ipalib/plugins/sudorule.py:635 +msgid "" +"\n" +" Remove an option from Sudo rule.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:20 +msgid "" +"\n" +"Users\n" +"\n" +"Manage user entries. All users are POSIX users.\n" +"\n" +"IPA supports a wide range of username formats, but you need to be aware of any\n" +"restrictions that may apply to your particular environment. For example,\n" +"usernames that start with a digit or usernames that exceed a certain length\n" +"may cause problems for some UNIX systems.\n" +"Use 'ipa config-mod' to change the username format allowed by IPA tools.\n" +"\n" +"Disabling a user account prevents that user from obtaining new Kerberos\n" +"credentials. It does not invalidate any credentials that have already\n" +"been issued.\n" +"\n" +"Password management is not a part of this module. For more information\n" +"about this topic please see: ipa help passwd\n" +"\n" +"EXAMPLES:\n" +"\n" +" Add a new user:\n" +" ipa user-add --first=Tim --last=User --password tuser1\n" +"\n" +" Find all users whose entries include the string \"Tim\":\n" +" ipa user-find Tim\n" +"\n" +" Find all users with \"Tim\" as the first name:\n" +" ipa user-find --first=Tim\n" +"\n" +" Disable a user account:\n" +" ipa user-disable tuser1\n" +"\n" +" Enable a user account:\n" +" ipa user-enable tuser1\n" +"\n" +" Delete a user:\n" +" ipa user-del tuser1\n" +msgstr "" + +#: ipalib/plugins/user.py:79 +msgid "" +"\n" +" User object.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:116 +msgid "User login" +msgstr "" + +#: ipalib/plugins/user.py:123 +msgid "First name" +msgstr "" + +#: ipalib/plugins/user.py:127 +msgid "Last name" +msgstr "" + +#: ipalib/plugins/user.py:130 +msgid "Full name" +msgstr "" + +#: ipalib/plugins/user.py:135 +msgid "Display name" +msgstr "" + +#: ipalib/plugins/user.py:140 +msgid "Initials" +msgstr "" + +#: ipalib/plugins/user.py:146 +msgid "Home directory" +msgstr "" + +#: ipalib/plugins/user.py:150 +msgid "GECOS field" +msgstr "" + +#: ipalib/plugins/user.py:156 +msgid "Login shell" +msgstr "" + +#: ipalib/plugins/user.py:161 +msgid "Kerberos principal" +msgstr "" + +#: ipalib/plugins/user.py:168 +msgid "Email address" +msgstr "" + +#: ipalib/plugins/user.py:173 +msgid "Prompt to set the user password" +msgstr "" + +#: ipalib/plugins/user.py:180 +msgid "UID" +msgstr "" + +#: ipalib/plugins/user.py:181 +msgid "User ID Number (system will assign one if not provided)" +msgstr "" + +#: ipalib/plugins/user.py:188 +msgid "Group ID Number" +msgstr "" + +#: ipalib/plugins/user.py:193 +msgid "Street address" +msgstr "" + +#: ipalib/plugins/user.py:197 +msgid "City" +msgstr "" + +#: ipalib/plugins/user.py:201 +msgid "State/Province" +msgstr "" + +#: ipalib/plugins/user.py:204 +msgid "ZIP" +msgstr "" + +#: ipalib/plugins/user.py:208 +msgid "Telephone Number" +msgstr "" + +#: ipalib/plugins/user.py:211 +msgid "Mobile Telephone Number" +msgstr "" + +#: ipalib/plugins/user.py:214 +msgid "Pager Number" +msgstr "" + +#: ipalib/plugins/user.py:218 +msgid "Fax Number" +msgstr "" + +#: ipalib/plugins/user.py:222 +msgid "Org. Unit" +msgstr "" + +#: ipalib/plugins/user.py:225 +msgid "Job Title" +msgstr "" + +#: ipalib/plugins/user.py:228 +msgid "Manager" +msgstr "" + +#: ipalib/plugins/user.py:231 +msgid "Car License" +msgstr "" + +#: ipalib/plugins/user.py:234 +msgid "Account disabled" +msgstr "" + +#: ipalib/plugins/user.py:258 +msgid "" +"\n" +" Given a userid verify the user's existence and return the dn.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:276 +msgid "manager %(manager)s not found" +msgstr "" + +#: ipalib/plugins/user.py:281 +msgid "" +"\n" +" Convert a manager dn into a userid\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:295 +msgid "" +"\n" +" Add a new user.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:298 +msgid "Added user \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/user.py:303 +msgid "Don't create user private group" +msgstr "" + +#: ipalib/plugins/user.py:333 +msgid "can be at most %(len)d characters" +msgstr "" + +#: ipalib/plugins/user.py:400 +msgid "" +"\n" +" Delete a user.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:404 +msgid "Deleted user \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/user.py:413 +msgid "" +"\n" +" Modify a user.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:417 +msgid "Modified user \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/user.py:437 +msgid "" +"\n" +" Search for users.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:444 +msgid "Self" +msgstr "" + +#: ipalib/plugins/user.py:445 +msgid "Display user record for current Kerberos principal" +msgstr "" + +#: ipalib/plugins/user.py:463 +msgid "%(count)d user matched" +msgid_plural "%(count)d users matched" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/plugins/user.py:471 +msgid "" +"\n" +" Display information about a user.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:484 +msgid "" +"\n" +" Disable a user account.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:489 +msgid "Disabled user account \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/user.py:507 +msgid "" +"\n" +" Enable a user account.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:512 +msgid "Enabled user account \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/user.py:529 +msgid "" +"\n" +" Unlock a user account\n" +"\n" +" An account may become locked if the password is entered incorrectly too\n" +" many times within a specific time period as controlled by password\n" +" policy. A locked account is a temporary condition and may be unlocked by\n" +" an administrator.\n" +" " +msgstr "" + +#: ipalib/plugins/user.py:538 +msgid "Unlocked account \"%(value)s\"" +msgstr "" + +#: ipalib/plugins/virtual.py:20 +msgid "" +"\n" +"Base classes for non-LDAP backend plugins.\n" +msgstr "" + +#: ipalib/plugins/virtual.py:28 +msgid "" +"\n" +" A command that doesn't use the LDAP backend but wants to use the\n" +" LDAP access control system to make authorization decisions.\n" +"\n" +" The class variable operation is the commonName attribute of the\n" +" entry to be tested against.\n" +"\n" +" In advance, you need to create an entry of the form:\n" +" cn=<operation>, api.env.container_virtual, api.env.basedn\n" +"\n" +" Ex.\n" +" cn=request certificate, cn=virtual operations,cn=etc, dc=example, dc=com\n" +" " +msgstr "" + +#: ipalib/plugins/virtual.py:44 +msgid "" +"\n" +" Perform an LDAP query to determine authorization.\n" +"\n" +" This should be executed before any actual work is done.\n" +" " +msgstr "" + +#: ipalib/plugins/xmlclient.py:21 +msgid "" +"\n" +"XML-RPC client plugin.\n" +msgstr "" + +#: ipalib/cli.py:581 +#, python-format +msgid "Enter %(label)s again to verify: " +msgstr "" + +#: ipalib/cli.py:585 ipa-client/ipa-getkeytab.c:751 +#, c-format +msgid "Passwords do not match!" +msgstr "" + +#: ipalib/cli.py:590 +msgid "Cancelled." +msgstr "" + +#: ipalib/cli.py:819 +msgid "Command name" +msgstr "" + +#: ipalib/cli.py:1117 +msgid "No file to read" +msgstr "" + +#: ipalib/errors.py:300 +#, python-format +msgid "%(cver)s client incompatible with %(sver)s server at %(server)r" +msgstr "" + +#: ipalib/errors.py:318 +#, python-format +msgid "unknown error %(code)d from %(server)s: %(error)s" +msgstr "" + +#: ipalib/errors.py:334 +msgid "an internal error has occurred" +msgstr "" + +#: ipalib/errors.py:356 +#, python-format +msgid "an internal error has occurred on server at %(server)r" +msgstr "" + +#: ipalib/errors.py:372 +#, python-format +msgid "unknown command %(name)r" +msgstr "" + +#: ipalib/errors.py:389 ipalib/errors.py:414 +#, python-format +msgid "error on server %(server)r: %(error)s" +msgstr "" + +#: ipalib/errors.py:405 +#, python-format +msgid "cannot connect to %(uri)r: %(error)s" +msgstr "" + +#: ipalib/errors.py:423 +#, python-format +msgid "Invalid JSON-RPC request: %(error)s" +msgstr "" + +#: ipalib/errors.py:439 +#, python-format +msgid "error marshalling data for XML-RPC transport: %(error)s" +msgstr "" + +#: ipalib/errors.py:465 +#, python-format +msgid "Kerberos error: %(major)s/%(minor)s" +msgstr "" + +#: ipalib/errors.py:482 +msgid "did not receive Kerberos credentials" +msgstr "" + +#: ipalib/errors.py:498 +#, python-format +msgid "Service %(service)r not found in Kerberos database" +msgstr "" + +#: ipalib/errors.py:514 +msgid "No credentials cache found" +msgstr "" + +#: ipalib/errors.py:530 +msgid "Ticket expired" +msgstr "" + +#: ipalib/errors.py:546 +msgid "Credentials cache permissions incorrect" +msgstr "" + +#: ipalib/errors.py:562 +msgid "Bad format in credentials cache" +msgstr "" + +#: ipalib/errors.py:578 +msgid "Cannot resolve KDC for requested realm" +msgstr "" + +#: ipalib/errors.py:597 +#, python-format +msgid "Insufficient access: %(info)s" +msgstr "" + +#: ipalib/errors.py:641 +#, python-format +msgid "command %(name)r takes no arguments" +msgstr "" + +#: ipalib/errors.py:661 +#, python-format +msgid "command %(name)r takes at most %(count)d argument" +msgid_plural "command %(name)r takes at most %(count)d arguments" +msgstr[0] "" +msgstr[1] "" + +#: ipalib/errors.py:691 +#, python-format +msgid "overlapping arguments and options: %(names)r" +msgstr "" + +#: ipalib/errors.py:707 +#, python-format +msgid "%(name)r is required" +msgstr "" + +#: ipalib/errors.py:723 ipalib/errors.py:739 +#, python-format +msgid "invalid %(name)r: %(error)s" +msgstr "" + +#: ipalib/errors.py:755 +#, python-format +msgid "api has no such namespace: %(name)r" +msgstr "" + +#: ipalib/errors.py:764 +msgid "Passwords do not match" +msgstr "" + +#: ipalib/errors.py:773 +msgid "Command not implemented" +msgstr "" + +#: ipalib/errors.py:782 +msgid "Client is not configured. Run ipa-client-install." +msgstr "" + +#: ipalib/errors.py:810 ipalib/errors.py:1050 ipalib/errors.py:1144 +#: ipalib/errors.py:1424 ipalib/errors.py:1441 +#, python-format +msgid "%(reason)s" +msgstr "" + +#: ipalib/errors.py:826 +msgid "This entry already exists" +msgstr "" + +#: ipalib/errors.py:842 +msgid "You must enroll a host in order to create a host service" +msgstr "" + +#: ipalib/errors.py:858 +#, python-format +msgid "" +"Service principal is not of the form: service/fully-qualified host name: " +"%(reason)s" +msgstr "" + +#: ipalib/errors.py:874 +msgid "" +"The realm for the principal does not match the realm for this IPA server" +msgstr "" + +#: ipalib/errors.py:890 +msgid "This command requires root access" +msgstr "" + +#: ipalib/errors.py:906 +msgid "This is already a posix group" +msgstr "" + +#: ipalib/errors.py:922 +#, python-format +msgid "Principal is not of the form user@REALM: %(principal)r" +msgstr "" + +#: ipalib/errors.py:938 +msgid "This entry is already enabled" +msgstr "" + +#: ipalib/errors.py:954 +msgid "This entry is already disabled" +msgstr "" + +#: ipalib/errors.py:970 +msgid "This entry cannot be enabled or disabled" +msgstr "" + +#: ipalib/errors.py:986 +msgid "This entry is not a member" +msgstr "" + +#: ipalib/errors.py:1002 +msgid "A group may not be a member of itself" +msgstr "" + +#: ipalib/errors.py:1018 +msgid "This entry is already a member" +msgstr "" + +#: ipalib/errors.py:1034 +#, python-format +msgid "Base64 decoding failed: %(reason)s" +msgstr "" + +#: ipalib/errors.py:1066 +msgid "A group may not be added as a member of itself" +msgstr "" + +#: ipalib/errors.py:1082 +msgid "The default users group cannot be removed" +msgstr "" + +#: ipalib/errors.py:1098 +msgid "Host does not have corresponding DNS A record" +msgstr "" + +#: ipalib/errors.py:1113 +msgid "Deleting a managed group is not allowed. It must be detached first." +msgstr "" + +#: ipalib/errors.py:1128 +msgid "A managed group cannot have a password policy." +msgstr "" + +#: ipalib/errors.py:1160 +#, python-format +msgid "'%(entry)s' doesn't have a certificate." +msgstr "" + +#: ipalib/errors.py:1176 +#, python-format +msgid "Unable to create private group. A group '%(group)s' already exists." +msgstr "" + +#: ipalib/errors.py:1192 +#, python-format +msgid "" +"A problem was encountered when verifying that all members were %(verb)s: " +"%(exc)s" +msgstr "" + +#: ipalib/errors.py:1216 +#, python-format +msgid "no command nor help topic %(topic)r" +msgstr "" + +#: ipalib/errors.py:1240 +msgid "change collided with another change" +msgstr "" + +#: ipalib/errors.py:1256 +msgid "no modifications to be performed" +msgstr "" + +#: ipalib/errors.py:1272 +#, python-format +msgid "%(desc)s: %(info)s" +msgstr "" + +#: ipalib/errors.py:1288 +msgid "limits exceeded for this query" +msgstr "" + +#: ipalib/errors.py:1303 +#, python-format +msgid "%(info)s" +msgstr "" + +#: ipalib/errors.py:1318 +msgid "modifying primary key is not allowed" +msgstr "" + +#: ipalib/errors.py:1334 +#, python-format +msgid "%(attr)s: Only one value allowed." +msgstr "" + +#: ipalib/errors.py:1350 +#, python-format +msgid "%(attr)s: Invalid syntax." +msgstr "" + +#: ipalib/errors.py:1366 +#, python-format +msgid "Bad search filter %(info)s" +msgstr "" + +#: ipalib/errors.py:1391 +#, python-format +msgid "Certificate operation cannot be completed: %(error)s" +msgstr "" + +#: ipalib/errors.py:1407 +#, python-format +msgid "Certificate format error: %(error)s" +msgstr "" + +#: ipalib/errors.py:1458 +msgid "Already registered" +msgstr "" + +#: ipalib/errors.py:1474 +msgid "Not registered yet" +msgstr "" + +#: ipalib/frontend.py:398 +msgid "Results are truncated, try a more specific search" +msgstr "" + +#: ipalib/frontend.py:850 +msgid "" +"Retrieve and print all attributes from the server. Affects command output." +msgstr "" + +#: ipalib/frontend.py:856 +msgid "Print entries as stored on the server. Only affects output format." +msgstr "" + +#: ipalib/frontend.py:985 +msgid "Forward to server instead of running locally" +msgstr "" + +#: ipalib/output.py:92 +msgid "A dictionary representing an LDAP entry" +msgstr "" + +#: ipalib/output.py:100 +msgid "A list of LDAP entries" +msgstr "" + +#: ipalib/output.py:111 +msgid "All commands should at least have a result" +msgstr "" + +#: ipalib/parameters.py:296 +msgid "incorrect type" +msgstr "" + +#: ipalib/parameters.py:299 +msgid "Only one value is allowed" +msgstr "" + +#: ipalib/parameters.py:901 +msgid "must be True or False" +msgstr "" + +#: ipalib/parameters.py:1002 +msgid "must be an integer" +msgstr "" + +#: ipalib/parameters.py:1054 +#, python-format +msgid "must be at least %(minvalue)d" +msgstr "" + +#: ipalib/parameters.py:1064 +#, python-format +msgid "can be at most %(maxvalue)d" +msgstr "" + +#: ipalib/parameters.py:1074 +msgid "must be a decimal number" +msgstr "" + +#: ipalib/parameters.py:1097 +#, python-format +msgid "must be at least %(minvalue)f" +msgstr "" + +#: ipalib/parameters.py:1107 +#, python-format +msgid "can be at most %(maxvalue)f" +msgstr "" + +#: ipalib/parameters.py:1174 +#, python-format +msgid "must match pattern \"%(pattern)s\"" +msgstr "" + +#: ipalib/parameters.py:1192 +msgid "must be binary data" +msgstr "" + +#: ipalib/parameters.py:1208 +#, python-format +msgid "must be at least %(minlength)d bytes" +msgstr "" + +#: ipalib/parameters.py:1218 +#, python-format +msgid "can be at most %(maxlength)d bytes" +msgstr "" + +#: ipalib/parameters.py:1228 +#, python-format +msgid "must be exactly %(length)d bytes" +msgstr "" + +#: ipalib/parameters.py:1246 +msgid "must be Unicode text" +msgstr "" + +#: ipalib/parameters.py:1277 +#, python-format +msgid "must be at least %(minlength)d characters" +msgstr "" + +#: ipalib/parameters.py:1287 +#, python-format +msgid "can be at most %(maxlength)d characters" +msgstr "" + +#: ipalib/parameters.py:1297 +#, python-format +msgid "must be exactly %(length)d characters" +msgstr "" + +#: ipalib/parameters.py:1315 +#, python-format +msgid "The character '%(char)r' is not allowed." +msgstr "" + +#: ipalib/parameters.py:1355 +#, python-format +msgid "must be one of %(values)r" +msgstr "" + +#: ipalib/util.py:200 +#, python-format +msgid "Permission denied: %(file)s" +msgstr "" + +#: ipalib/x509.py:174 +#, python-format +msgid "Issuer \"%(issuer)s\" does not match the expected issuer" +msgstr "" + +#: ipaserver/plugins/dogtag.py:1313 ipaserver/plugins/dogtag.py:1398 +#: ipaserver/plugins/dogtag.py:1463 ipaserver/plugins/dogtag.py:1541 +#: ipaserver/plugins/dogtag.py:1600 +#, python-format +msgid "Unable to communicate with CMS (%s)" +msgstr "" + +#: ipaserver/plugins/join.py:54 +msgid "The hostname to register as" +msgstr "" + +#: ipaserver/plugins/join.py:62 +msgid "The IPA realm" +msgstr "" + +#: ipaserver/plugins/join.py:68 +msgid "Hardware platform of the host (e.g. Lenovo T61)" +msgstr "" + +#: ipaserver/plugins/join.py:72 +msgid "Operating System and version of the host (e.g. Fedora 9)" +msgstr "" + +#: ipaserver/plugins/selfsign.py:99 +#, python-format +msgid "" +"Request subject \"%(request_subject)s\" does not match the form " +"\"%(subject_base)s\"" +msgstr "" + +#: ipaserver/plugins/selfsign.py:104 +#, python-format +msgid "unable to decode csr: %s" +msgstr "" + +#: ipaserver/plugins/selfsign.py:125 ipaserver/plugins/selfsign.py:140 +msgid "file operation" +msgstr "" + +#: ipaserver/plugins/selfsign.py:154 +msgid "cannot obtain next serial number" +msgstr "" + +#: ipaserver/plugins/selfsign.py:189 +msgid "certutil failure" +msgstr "" + +#: ipa-client/config.c:55 +#, c-format +msgid "cannot open configuration file %s\n" +msgstr "" + +#: ipa-client/config.c:62 +#, c-format +msgid "cannot stat() configuration file %s\n" +msgstr "" + +#: ipa-client/config.c:68 +#, c-format +msgid "out of memory\n" +msgstr "" + +#: ipa-client/config.c:79 +#, c-format +msgid "read error\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:85 ipa-client/ipa-getkeytab.c:821 +#: ipa-client/ipa-rmkeytab.c:190 +#, c-format +msgid "Kerberos context initialization failed\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:147 ipa-client/ipa-getkeytab.c:834 +#, c-format +msgid "No system preferred enctypes ?!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:155 +#, c-format +msgid "Out of memory!?\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:173 ipa-client/ipa-getkeytab.c:188 +#, c-format +msgid "Out of memory\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:203 +#, c-format +msgid "Warning unrecognized encryption type: [%s]\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:218 +#, c-format +msgid "Warning unrecognized salt type: [%s]\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:245 +#, c-format +msgid "Enctype comparison failed!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:307 +#, c-format +msgid "Failed to create random key!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:320 ipa-client/ipa-getkeytab.c:337 +#: ipa-client/ipa-getkeytab.c:345 ipa-client/ipa-getkeytab.c:382 +#, c-format +msgid "Failed to create key!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:327 ipa-client/ipa-getkeytab.c:360 +#: ipa-client/ipa-join.c:417 ipa-client/ipa-join.c:426 +#: ipa-client/ipa-join.c:563 ipa-client/ipa-join.c:751 +#: ipa-client/ipa-join.c:819 +#, c-format +msgid "Out of memory!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:371 +#, c-format +msgid "Bad or unsupported salt type (%d)!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:492 +#, c-format +msgid "No keys accepted by KDC\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:507 +#, c-format +msgid "Out of memory \n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:545 +#, c-format +msgid "Out of Memory!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:552 +#, c-format +msgid "Failed to create control!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:576 +#, c-format +msgid "Unable to initialize ldap library!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:583 +#, c-format +msgid "Unable to set ldap options!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:596 +#, c-format +msgid "Simple bind failed\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:606 +#, c-format +msgid "SASL Bind failed!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:622 ipa-client/ipa-getkeytab.c:635 +#: ipa-client/ipa-getkeytab.c:642 ipa-client/ipa-getkeytab.c:649 +#, c-format +msgid "Operation failed! %s\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:655 ipa-client/ipa-getkeytab.c:665 +#, c-format +msgid "Missing reply control!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:672 +#, c-format +msgid "ber_init() failed, Invalid control ?!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:691 ipa-client/ipa-getkeytab.c:698 +#, c-format +msgid "ber_scanf() failed, Invalid control ?!\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:736 +msgid "New Principal Password" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:742 +msgid "Verify Principal Password" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:776 +msgid "Print as little as possible" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:776 +msgid "Output only on errors" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:778 +msgid "Contact this specific KDC Server" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:779 +msgid "Server Name" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:781 ipa-client/ipa-rmkeytab.c:171 +msgid "" +"The principal to get a keytab for (ex: ftp/ftp.example.com@EXAMPLE.COM)" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:782 ipa-client/ipa-rmkeytab.c:172 +msgid "Kerberos Service Principal Name" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:784 ipa-client/ipa-rmkeytab.c:174 +msgid "File were to store the keytab information" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:785 ipa-client/ipa-rmkeytab.c:174 +msgid "Keytab File Name" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:787 +msgid "Encryption types to request" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:788 +msgid "Comma separated encryption types list" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:790 +msgid "Show the list of permitted encryption types and exit" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:791 +msgid "Permitted Encryption Types" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:793 +msgid "Asks for a non-random password to use for the principal" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:795 +msgid "LDAP DN" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:795 +msgid "DN to bind as if not using kerberos" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:797 +msgid "LDAP password" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:797 +msgid "password to use if not using kerberos" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:837 +#, c-format +msgid "Supported encryption types:\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:841 +#, c-format +msgid "Warning: failed to convert type (#%d)\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:860 +#, c-format +msgid "Bind password required when using a bind DN.\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:873 +#, c-format +msgid "" +"Warning: salt types are not honored with randomized passwords (see opt. " +"-P)\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:885 +#, c-format +msgid "Invalid Service Principal Name\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:893 +#, c-format +msgid "Kerberos Credential Cache not found. Do you have a Kerberos Ticket?\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:901 +#, c-format +msgid "" +"Kerberos User Principal not found. Do you have a valid Credential Cache?\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:909 +#, c-format +msgid "Failed to open Keytab\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:916 +#, c-format +msgid "Failed to create key material\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:935 +#, c-format +msgid "Failed to add key to the keytab\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:944 +#, c-format +msgid "Failed to close the keytab\n" +msgstr "" + +#: ipa-client/ipa-getkeytab.c:950 +#, c-format +msgid "Keytab successfully retrieved and stored in: %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:65 +#, c-format +msgid "No permission to join this host to the IPA domain.\n" +msgstr "" + +#: ipa-client/ipa-join.c:94 ipa-client/ipa-join.c:106 +#, c-format +msgid "No write permissions on keytab file '%s'\n" +msgstr "" + +#: ipa-client/ipa-join.c:111 +#, c-format +msgid "access() on %s failed: errno = %d\n" +msgstr "" + +#: ipa-client/ipa-join.c:143 ipa-client/ipa-join.c:197 +#, c-format +msgid "Out of memory!" +msgstr "" + +#: ipa-client/ipa-join.c:204 +#, c-format +msgid "Unable to initialize connection to ldap server: %s" +msgstr "" + +#: ipa-client/ipa-join.c:210 +#, c-format +msgid "Unable to enable SSL in LDAP\n" +msgstr "" + +#: ipa-client/ipa-join.c:216 +#, c-format +msgid "Unable to set LDAP version\n" +msgstr "" + +#: ipa-client/ipa-join.c:236 +#, c-format +msgid "Bind failed: %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:269 +#, c-format +msgid "Search for %s on rootdse failed with error %d" +msgstr "" + +#: ipa-client/ipa-join.c:279 ipa-client/ipa-join.c:331 +#, c-format +msgid "No values for %s" +msgstr "" + +#: ipa-client/ipa-join.c:322 +#, c-format +msgid "Search for ipaCertificateSubjectBase failed with error %d" +msgstr "" + +#: ipa-client/ipa-join.c:390 +#, c-format +msgid "Unable to determine root DN of %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:399 +#, c-format +msgid "Unable to determine certificate subject of %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:407 +#, c-format +msgid "Unable to make an LDAP connection to %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:432 +#, c-format +msgid "Searching with %s in %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:438 +#, c-format +msgid "ldap_search_ext_s: %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:446 +#, c-format +msgid "Unable to find host '%s'\n" +msgstr "" + +#: ipa-client/ipa-join.c:453 +#, c-format +msgid "Unable to get binddn for host '%s'\n" +msgstr "" + +#: ipa-client/ipa-join.c:466 +#, c-format +msgid "Host already has principal, trying bind anyway\n" +msgstr "" + +#: ipa-client/ipa-join.c:480 ipa-client/ipa-join.c:633 +#, c-format +msgid "Host is already joined.\n" +msgstr "" + +#: ipa-client/ipa-join.c:484 +#, c-format +msgid "Incorrect password.\n" +msgstr "" + +#: ipa-client/ipa-join.c:495 +#, c-format +msgid "principal not found in host entry\n" +msgstr "" + +#: ipa-client/ipa-join.c:618 +#, c-format +msgid "principal not found in XML-RPC response\n" +msgstr "" + +#: ipa-client/ipa-join.c:699 ipa-client/ipa-join.c:900 +#, c-format +msgid "Unable to determine IPA server from %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:715 ipa-client/ipa-join.c:915 +#, c-format +msgid "The hostname must be fully-qualified: %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:724 ipa-client/ipa-join.c:925 +#, c-format +msgid "Unable to join host: Kerberos context initialization failed\n" +msgstr "" + +#: ipa-client/ipa-join.c:732 +#, c-format +msgid "Error resolving keytab: %s.\n" +msgstr "" + +#: ipa-client/ipa-join.c:741 +#, c-format +msgid "Error getting default Kerberos realm: %s.\n" +msgstr "" + +#: ipa-client/ipa-join.c:759 +#, c-format +msgid "Error parsing \"%s\": %s.\n" +msgstr "" + +#: ipa-client/ipa-join.c:777 +#, c-format +msgid "Error obtaining initial credentials: %s.\n" +msgstr "" + +#: ipa-client/ipa-join.c:788 +#, c-format +msgid "Unable to generate Kerberos Credential Cache\n" +msgstr "" + +#: ipa-client/ipa-join.c:796 +#, c-format +msgid "Error storing creds in credential cache: %s.\n" +msgstr "" + +#: ipa-client/ipa-join.c:846 +#, c-format +msgid "Unenrollment successful.\n" +msgstr "" + +#: ipa-client/ipa-join.c:849 +#, c-format +msgid "Unenrollment failed.\n" +msgstr "" + +#: ipa-client/ipa-join.c:854 +#, c-format +msgid "result not found in XML-RPC response\n" +msgstr "" + +#: ipa-client/ipa-join.c:932 +#, c-format +msgid "Unable to join host: Kerberos Credential Cache not found\n" +msgstr "" + +#: ipa-client/ipa-join.c:940 +#, c-format +msgid "" +"Unable to join host: Kerberos User Principal not found and host password not" +" provided.\n" +msgstr "" + +#: ipa-client/ipa-join.c:954 +#, c-format +msgid "fork() failed\n" +msgstr "" + +#: ipa-client/ipa-join.c:983 +#, c-format +msgid "ipa-getkeytab not found\n" +msgstr "" + +#: ipa-client/ipa-join.c:986 +#, c-format +msgid "ipa-getkeytab has bad permissions?\n" +msgstr "" + +#: ipa-client/ipa-join.c:989 +#, c-format +msgid "executing ipa-getkeytab failed, errno %d\n" +msgstr "" + +#: ipa-client/ipa-join.c:1001 +#, c-format +msgid "child exited with %d\n" +msgstr "" + +#: ipa-client/ipa-join.c:1007 +#, c-format +msgid "Certificate subject base is: %s\n" +msgstr "" + +#: ipa-client/ipa-join.c:1042 +msgid "Print the raw XML-RPC output in GSSAPI mode" +msgstr "" + +#: ipa-client/ipa-join.c:1044 +msgid "Quiet mode. Only errors are displayed." +msgstr "" + +#: ipa-client/ipa-join.c:1046 +msgid "Unenroll this host from IPA server" +msgstr "" + +#: ipa-client/ipa-join.c:1048 +msgid "Hostname of this server" +msgstr "" + +#: ipa-client/ipa-join.c:1048 ipa-client/ipa-join.c:1050 +msgid "hostname" +msgstr "" + +#: ipa-client/ipa-join.c:1050 +msgid "IPA Server to use" +msgstr "" + +#: ipa-client/ipa-join.c:1052 +msgid "Specifies where to store keytab information." +msgstr "" + +#: ipa-client/ipa-join.c:1052 +msgid "filename" +msgstr "" + +#: ipa-client/ipa-join.c:1054 +msgid "LDAP password (if not using Kerberos)" +msgstr "" + +#: ipa-client/ipa-join.c:1054 +msgid "password" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:43 +#, c-format +msgid "Unable to parse principal name\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:45 +#, c-format +msgid "krb5_parse_name %d: %s\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:55 +#, c-format +msgid "Removing principal %s\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:68 +#, c-format +msgid "Failed to open keytab\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:72 +#, c-format +msgid "principal not found\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:74 +#, c-format +msgid "krb5_kt_get_entry %d: %s\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:82 +#, c-format +msgid "Unable to remove entry\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:84 +#, c-format +msgid "kvno %d\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:85 +#, c-format +msgid "krb5_kt_remove_entry %d: %s\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:119 +#, c-format +msgid "Unable to parse principal\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:121 +#, c-format +msgid "krb5_unparse_name %d: %s\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:143 +#, c-format +msgid "realm not found\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:169 +msgid "Print debugging information" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:169 +msgid "Debugging output" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:176 +msgid "Remove all principals in this realm" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:176 +msgid "Realm name" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:230 ipa-client/ipa-rmkeytab.c:237 +#, c-format +msgid "Failed to open keytab '%s': %s\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:253 +#, c-format +msgid "Closing keytab failed\n" +msgstr "" + +#: ipa-client/ipa-rmkeytab.c:255 +#, c-format +msgid "krb5_kt_close %d: %s\n" +msgstr "" + + |