keycloak-scim/js/apps/admin-ui/maven-resources/theme-resources/messages/messages_en.properties

2918 lines
208 KiB
Properties
Raw Normal View History

cancel=Cancel
deleteConfirm_other=Are you sure you want to delete these groups.
trusted-hosts.label=Trusted Hosts
deletedSuccess=Provider successfully deleted.
searchAttributes=Search attributes
userID=User ID
anyResource=Any resource
importAdded_zero=No records added.
createClientPolicy=Create client policy
clientSignature=Client signature required
persistent=Persistent
sync-ldap-roles-to-keycloak=Sync LDAP roles to Keycloak
eventTypes.PERMISSION_TOKEN.name=Permission token
permissionsDisable=Disable permissions?
eventTypes.FEDERATED_IDENTITY_LINK_ERROR.description=Federated identity link error
secretHasExpired=Secret has expired, please generate a new one by clicking the "Regenerate" button above
requiredRoles=Please add at least one role.
addLdapWizardTitle=Add LDAP user federation provider
wantAssertionsSignedHelp=Indicates whether this service provider expects a signed Assertion.
disableConfirm=Are you sure you want to disable the provider '{{provider}}'
eventTypes.CUSTOM_REQUIRED_ACTION.description=Custom required action
flowName=Flow name
userInfoResponseEncryptionContentEncryptionAlgorithm=User info response encryption content encryption algorithm
eventTypes.IDENTITY_PROVIDER_FIRST_LOGIN_ERROR.name=Identity provider first login error
searchByRoleName=Search by role name
credentialType=Type
passLoginHint=Pass login_hint
openIdConnectCompatibilityModesHelp=This section is used to configure settings for backward compatibility with older OpenID Connect / OAuth 2 adaptors. It's useful especially if your client uses older version of Keycloak / RH-SSO adapter.
emptyClientScopes=This client doesn't have any added client scopes
requiredGroups=Please add at least one group.
httpPostBindingAuthnRequestHelp=Indicates whether the AuthnRequest must be sent using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
policyEnforcementMode=Policy enforcement mode
eventTypes.CLIENT_UPDATE.name=Client update
addMultivaluedLabel=Add {{fieldLabel}}
notRepeat=Not repeat
secretRotated=Secret rotated
userFedDeleteConfirmTitle=Delete user federation provider?
userCredentialsHelpTextLabel=User Credentials Help Text
role=Role
displayName=Display name
applyToResourceTypeHelp=Specifies if this permission should be applied to all resources with a given type. In this case, this permission will be evaluated for all instances of a given resource type.
cibaIntervalHelp=The minimum amount of time in seconds that the CD (Consumption Device) must wait between polling requests to the token endpoint. If set to 0, the CD must use 5 as the default value according to the CIBA specification.
envelopeFrom=Envelope from
eventTypes.UPDATE_TOTP.name=Update totp
updateCibaError=Could not update CIBA policy\: {{error}}
policyUrl=Policy URL
clientDescriptionHelp=Specifies description of the client. For example 'My Client for TimeSheets'. Supports keys for localized values as well. For example\: ${my_client_description}
rolesPermissionsHint=Determines if fine grained permissions are enabled for managing this role. Disabling will delete all current permissions that have been set up.
passwordPoliciesHelp.regexPattern=Requires that the password matches one or more defined Java regular expression patterns.
oAuthDPoP=OAuth 2.0 DPoP Bound Access Tokens Enabled
invalidRealmName=Realm name can't contain special characters
validRedirectURIsHelp=Valid URI pattern a browser can redirect to after a successful login. Simple wildcards are allowed such as 'http\://example.com/*'. Relative path can be specified too such as /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used. For SAML, you must set valid URI patterns if you are relying on the consumer service URL embedded with the login request.
realmNameTitle={{name}} realm
subjectNameId=Subject NameID
credentialsList=Credentials List
usermodel.clientRoleMapping.clientId.label=Client ID
clientId=Client ID
serviceProviderEntityId=Service provider entity ID
internationalizationHelp=If enabled, you can choose which locales you support for this realm and which locale is the default.
managePriorityOrder=Manage priority order
contextualAttributesHelp=Any attribute provided by a running environment or execution context.
clientLoginTimeoutHelp=Max time a client has to finish the access token protocol. This should normally be 1 minute.
emptyMappers=No mappers
artifactBindingUrlHelp=URL to send the HTTP ARTIFACT messages to. You can leave this blank if you are using a different binding. This value should be set when forcing ARTIFACT binding together with IdP initiated login.
artifactBindingUrl=Artifact Binding URL
clientsList=Clients list
userId=User ID
eventTypes.CLIENT_UPDATE_ERROR.description=Client update error
eventTypes.UPDATE_EMAIL.description=Update email
eventTypes.VALIDATE_ACCESS_TOKEN.description=Validate access token
dedicatedScopeExplain=This is a client scope which includes the dedicated mappers and scope
updateOtpError=Could not update OTP policy\: {{error}}
addressClaim.postal_code.label=User Attribute Name for Postal Code
defaultRoles=Default roles
samlSignatureKeyNameHelp=Signed SAML documents contain identification of signing key in KeyName element. For Keycloak / RH-SSO counter-party, use KEY_ID, for MS AD FS use CERT_SUBJECT, for others check and use NONE if no other option works.
clientScopeTypes.default=Default
invalidateRotatedSecret=Invalidate rotated secret?
noDirectUsers=No direct users
whoCanEditHelp=If enabled, users or administrators can view and edit the attribute. Otherwise, users or administrators don't have access to write to the attribute.
eventTypes.LOGIN.name=Login
addressClaim.country.tooltip=Name of User Attribute, which will be used to map to 'country' subclaim inside 'address' token claim. Defaults to 'country' .
uuidLdapAttribute=UUID LDAP attribute
scopeNameHelp=Name of the client scope. Must be unique in the realm. Name should not contain space characters as it is used as value of scope parameter
requiredUserActions=Required user actions
noConsentsText=The consents will only be recorded when users try to access a client that is configured to require consent. In that case, users will get a consent page which asks them to grant access to the client.
addStep=Add step
clientAssertionAudience=Client assertion audience
permissionPoliciesHelp=Specifies all the policies that must be applied to the scopes defined by this policy or permission.
userInitiatedActionLifespanHelp=Maximum time before an action permit sent by a user (such as a forgot password e-mail) is expired. This value is recommended to be short because it's expected that the user would react to self-created action quickly.
clearFileExplain=Are you sure you want to clear this file?
userModelAttribute=User model attribute
eventTypes.LOGOUT_ERROR.name=Logout error
allowRemoteResourceManagement=Remote resource management
syncRegistrationsHelp=Should newly created users be created within LDAP store? Priority effects which provider is chosen to sync the new user. This setting is effectively appplied only with WRITABLE edit mode.
resetPasswordAllowed=Forgot password
emptyExecution=No steps
passwordPolicyHintsEnabledHelp=Applicable just for writable MSAD. If on, then updating password of MSAD user will use LDAP_SERVER_POLICY_HINTS_OID extension, which means that advanced MSAD password policies like 'password history' or 'minimal password age' will be applied. This extension works just for MSAD 2008 R2 or newer.
expirationValueNotValid=Value should should be greater or equal to 1
eventTypes.UPDATE_CONSENT.name=Update consent
forceArtifactBinding=Force artifact binding
eventTypes.REFRESH_TOKEN_ERROR.description=Refresh token error
eventTypes.IMPERSONATE.name=Impersonate
updateFirstLogin=Update first login
columnDisplayDescription=Display description
flowUsedBy=Use of this flow
client-updater-trusted-hosts.label=Trusted hosts
updateExecutorSuccess=Executor updated successfully
ldapAttributeHelp=Name of mapped attribute on LDAP object. For example 'cn', 'sn', 'mail', 'street', etc.
assertionLifespan=Assertion Lifespan
export=Export
claimFilterNameHelp=Name of the essential claim
revocationDescription=This is a way to revoke all active sessions and access tokens. Not before means you can revoke any tokens issued before the date.
eventTypes.CODE_TO_TOKEN_ERROR.description=Code to token error
termsOfServiceUrl=Terms of service URL
requestObject.request_uri\ only=Request URI only
passwordPolicy=Password policy
backchannelLogout=Backchannel logout
addressClaim.street.label=User Attribute Name for Street
rolesScope=If there is no role scope mapping defined, each user is permitted to use this client scope. If there are role scope mappings defined, the user must be a member of at least one of the roles.
applyToResourceTypeFlag=Apply to resource type
offlineSessionIdleHelp=Time an offline session is allowed to be idle before it expires. You need to use offline token to refresh at least once within this period; otherwise offline session will expire.
eventTypes.UPDATE_TOTP.description=Update totp
testError=Error when trying to connect to LDAP\: '{{error}}'
groupObjectClassesHelp=Object class (or classes) of the group object. It's divided by commas if more classes needed. In typical LDAP deployment it could be 'groupOfNames'. In Active Directory it's usually 'group'.
filterByClients=Filter by clients
claims=Claims
createPolicyOfType=Create {{policyType}} policy
realmRolePrefix=Realm role prefix
flowUsedByDescription=This flow is used by the following {{value}}
createClientScope=Create client scope
includeRepresentation=Include representation
expireTimeHelp=Defines the time after which the policy MUST NOT be granted. Only granted if current date/time is before or equal to this value.
singleLogoutServiceUrl=Single logout service URL
noRolesInstructions-roles=You haven't created any roles in this realm. Create a role to get started.
editIdPMapper=Edit Identity Provider Mapper
representation=Representation
remove=Remove
userProfile=User profile
confirmPasswordDoesNotMatch=Password and confirmation does not match.
eventTypes.DELETE_ACCOUNT_ERROR.description=Delete account error
provider=Provider
flows=Flows
passwordPoliciesHelp.length=The minimum number of characters required for the password.
root=Root
removeImportedUsersSuccess=Imported users have been removed.
eventTypes.VERIFY_PROFILE_ERROR.name=Verify profile error
signAssertionsHelp=Should assertions inside SAML documents be signed? This setting is not needed if document is already being signed.
authnContextClassRefsHelp=Ordered list of requested AuthnContext ClassRefs.
sessionsType.directGrant=Direct grant
validateSignature=Validate Signatures
useLowerCaseBearerType=Use lower-case bearer type in token responses
headers=Headers
ldapAttributeNameHelp=Name of the LDAP attribute, which will be added to the new user during registration
createAGroup=Create a group
effectiveProtocolMappersHelp=Contains all default client scopes and selected optional scopes. All protocol mappers and role scope mappings of all those client scopes will be used when generating access token issued for your client
exportSuccess=Realm successfully exported.
scopePermissions.groups.manage-description=Policies that decide if an administrator can manage this group
testClusterFail=Failed verified availability for\: {{failedNodes}}. Fix or unregister failed cluster nodes and try again
eventExplain=Events are records of user and admin events in this realm. To configure the tracking of these events, go to <1>Event configs</1>.
queryExtensions=Query Supported Extensions
signingKeysConfig=Signing keys config
validateBindDn=You must enter the DN of the LDAP admin
addedGroupMembership=Added group membership
resourceDeletedSuccess=The resource successfully deleted
userObjectClasses=User object classes
useRefreshTokensHelp=If this is on, a refresh_token will be created and added to the token response. If this is off then no refresh_token will be generated.
getStarted=To get started, select a provider from the list below.
times.hours=Hours
signedJWTConfirm=Generate a private key and certificate for the client from the Keys tab.
permit=Permit
webOrigins=Web origins
searchAdminEventsBtn=Search admin events
deleteDialogDescription=Are you sure you want to permanently delete the attributes group <1>{{group}}</1>?
importResourceSuccess=The resource was successfully imported
inputTypeCols=Input cols
eventTypes.LOGOUT.description=Logout
deleteNodeBody=Are you sure you want to permanently delete the node "{{node}}"
lifespan=Expires In
storedTokensReadableHelp=Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.
authenticationFlowTypeHelp=What kind of form is it
usersAdded_one={{count}} user added to the group
resourcesAndScopes=Resources and Scopes
editUsernameHelp=If enabled, the username field is editable, readonly otherwise.
eventTypes.UPDATE_CONSENT_ERROR.description=Update consent error
overrideActionTokensHelp=Override default settings of maximum time before an action permit sent by a user (such as a forgot password e-mail) is expired for specific action. This value is recommended to be short because it's expected that the user would react to self-created action quickly.
searchByName=Search by name
executorTypeSwitchHelpText=Executor Type Switch Help Text
attributeConsumingServiceNameHelp=Name of the Attribute Consuming Service profile to advertise in the SP metadata.
overrideActionTokens=Override Action Tokens
deleteGrantsError=Error deleting grants.
defaultGroupAdded_other=Added {{count}} groups to the default groups
used.SPECIFIC_CLIENTS=Specific clients
freeMemory=Free memory
applyPolicy=Apply policy
userFedDeleteConfirm=If you delete this user federation provider, all associated data will be removed.
directGrantHelp=Select the flow you want to use for direct grant authentication.
unlockUsersSuccess=Any temporarily locked users are now unlocked
jsonType.tooltip=JSON type that should be used to populate the json claim in the token. long, int, boolean, String and JSON are valid values.
emptyPrimaryAction=Add predefined mapper
enableClientSignatureRequired=Enable "Client signature required"?
supportedApplicationsHelp=Applications that are known to work with the current OTP policy
enableStartTLS=Enable StartTLS
syncModeOverride=Sync mode override
addAssociatedRolesError=Could not associate roles {{error}}
removeUserText=Do you want to remove {{numSelected}} users?. These users will no longer have permissions of the role {{role}} and the associated roles of it.
diagramView=Diagram view
removeImportedUsers=Remove imported users?
conditionsHelpItem=Conditions help item
accountLinkingOnly=Account linking only
clientPoliciesPoliciesHelpText=Client Policy allows to bind client profiles with various conditions to specify when exactly is enforced behavior specified by executors of the particular client profile.
anyClient=The condition is satisfied by any client on any event.
editFlow=Edit flow
noDefaultGroupsInstructions=Default groups allow you to automatically assign group membership whenever any new user is created or imported throughout <1>identity brokering</1>. Add default groups to get started
tokenSaveSuccess=New initial access token has been created
usermodel.attr.label=User Attribute
eventTypes.REGISTER.name=Register
eventTypes.USER_DISABLED_BY_PERMANENT_LOCKOUT.name=User disabled by permanent lockout
eventTypes.USER_DISABLED_BY_PERMANENT_LOCKOUT_ERROR.name=User disabled by permanent lockout error
deleteUser=Delete user
addedNodeSuccess=Node successfully added
eventTypes.INTROSPECT_TOKEN_ERROR.description=Introspect token error
webAuthnPolicyUserVerificationRequirementHelp=Communicates to an authenticator to confirm actually verifying a user.
syncModes.import=Import
realmSaveError=Realm could not be updated\: {{error}}
authDataDescription=Represents a token carrying authorization data as a result of the processing of an authorization request. This representation is basically what Keycloak issues to clients asking for permission. Check the `authorization` claim for the permissions that where granted based on the current authorization request.
allowRemoteResourceManagementHelp=Should resources be managed remotely by the resource server? If false, resources can be managed only from this Admin UI.
generatedAccessTokenIsDisabled=Generated access token is disabled when no user is selected
addNewProvider=Add new provider
userInfoResponseEncryptionKeyManagementAlgorithm=User info response encryption key management algorithm
changedUsersSyncPeriod=Changed users sync period
keystoreHelp=Path to keys file
userRegistration=User registration
save=Save
helpFileUploadClient=Upload a JSON or XML file
generateSuccess=New key pair and certificate generated successfully
userAttributeValueHelp=Value you want to hardcode
whoCanViewHelp=If enabled, users or administrators can view the attribute. Otherwise, users or administrators don't have access to the attribute.
eventTypes.IDENTITY_PROVIDER_LOGIN.description=Identity provider login
includeClients=Include clients
copySuccess=Successfully copied to clipboard\!
eventTypes.LOGOUT_ERROR.description=Logout error
clientProfilesHelp=Client profiles applied on this policy.
deleteClientPolicyError=Could not delete policy\: {{error}}
selectAttribute=Select attribute
resourceAttributeHelp=The attributes associated wth the resource.
updateCredentialUserLabelSuccess=The user label has been changed successfully.
product=Product
credentialUserLabel=User Label
passwordPoliciesHelp.passwordBlacklist=Prevents the use of a password that is in a blacklist file.
bindTypeHelp=Type of the authentication method used during LDAP bind operation. It is used in most of the requests sent to the LDAP server. Currently only 'none' (anonymous LDAP authentication) or 'simple' (bind credential + bind password authentication) mechanisms are available.
whoWillAppearPopoverText=Groups are hierarchical. When you select Direct Membership, you see only the child group that the user joined. Ancestor groups are not included.
eventTypes.VERIFY_EMAIL.description=Verify email
eventTypes.REFRESH_TOKEN_ERROR.name=Refresh token error
partialImportHeaderText=Partial import allows you to import users, clients, and other resources from a previously exported json file.
disableSuccess=Provider successfully disabled
validatingPublicKeyIdHelp=Explicit ID of the validating public key given above if the key ID. Leave blank if the key above should be used always, regardless of key ID specified by external IDP; set it if the key should only be used for verifying if the key ID from external IDP matches.
eventTypes.IDENTITY_PROVIDER_LINK_ACCOUNT_ERROR.name=Identity provider link account error
subtree=Subtree
userFederation=User federation
effectiveRoleScopeMappingsHelp=Selected Optional Client Scopes, which will be used when issuing access token for this client. You can see above what value of OAuth Scope Parameter needs to be used when you want to have these optional client scopes applied when the initial OpenID Connect Authentication request will be sent from your client adapter
disable=Disable
membershipLdapAttribute=Membership LDAP attribute
availableIdPs=Available identity providers
updateClientConditionSuccess=Condition updated successfully.
attributes=Attributes
roleDeleteConfirmDialog=This action will permanently delete the role "{{selectedRoleName}}" and cannot be undone.
clientDelete=Delete {{clientId}} ?
userDeletedSuccess=The user has been deleted
revokeClientScopesTitle=Revoke all granted client scopes?
contentSecurityPolicyReportOnlyHelp=For testing Content Security Policies <1>Learn more</1>
eventTypes.PERMISSION_TOKEN.description=Permission token
allow-default-scopes.label=Allow Default Scopes
minuteHelp=Defines the minute when the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current minute is between or equal to the two values you provided.
updateCibaSuccess=CIBA policy successfully updated
newRoleNameHelp=The new role name. The new name format corresponds to where in the access token the role will be mapped to. So, a new name of 'myapp.newname' will map the role to that position in the access token. A new name of 'newname' will map the role to the realm roles in the token.
mapperTypeFullNameLdapMapper=full-name-ldap-mapper
searchUserByAttributeMissingKeyError=Specify a attribute key
eventTypes.INVALID_SIGNATURE.name=Invalid signature
topLevelFlowTypeHelp=What kind of top level flow is it? Type 'client' is used for authentication of clients (applications) when generic is for users and everything else
authDetailsHelp=Export and download all resource settings for this resource server.
policyProvider.regex=Define regex conditions for your permissions.
clientImportError=Could not import client\: {{error}}
members=Members
scopePermissions.clients.token-exchange-description=Policies that decide which clients are allowed exchange tokens for a token that is targeted to this client.
realmCertificateAliasHelp=Realm certificate is stored in archive too. This is the alias to it.
scopePermissions.roles.map-role-client-scope-description=Policies that decide if an administrator can apply this role to the client scope of a client
createIdentityProviderError=Could not create the identity provider\: {{error}}
eventTypes.SEND_VERIFY_EMAIL_ERROR.description=Send verify email error
deleteClientPolicyConfirm=This action will permanently delete the policy {{policyName}}. This cannot be undone.
cibaAuthRequestedUserHint=Authentication Requested User Hint
samlKeysExportError=Could not export keys due to\: {{error}}
webAuthnPolicyCreateTimeout=Timeout
comparison=Comparison
passwordPoliciesHelp.digits=The number of numerical digits required in the password string.
deletedSuccessClientScope=The client scope has been deleted
notBeforeError=Error clearing "Not Before" for realm\: {{error}}
columnDisplayName=Display name
noUsersFoundErrorStorage=No users found, could be due to wrongly configured federated provider {{error}}
lookAround=Look around window
storeTokensHelp=Enable/disable if tokens must be stored after authenticating users.
revert=Revert
eventTypes.IDENTITY_PROVIDER_RETRIEVE_TOKEN.description=Identity provider retrieve token
dependentPermission=Dependent permission
disableNonce=Disable nonce
addAssociatedRolesSuccess=Associated roles have been added
groupDeleted_one=Group deleted
userHelp=Optionally select user, for whom the example access token will be generated. If you do not select a user, example access token will not be generated during evaluation
loginScreenCustomization=Login screen customization
policiesConfigType=Configure via\:
exportWarningTitle=Export with caution
emailVerifiedHelp=Has the user's email been verified?
duplicateFlow=Duplicate flow
addExecution=Add execution
noSearchResultsInstructions=Click on the search bar above to search for groups
addedNodeFail=Could not add node\: '{{error}}'
groupMembership=Group membership
maxLength=Max length {{length}}
prompts.unspecified=Unspecified
revokeClientScopes=Are you sure you want to revoke all granted client scopes for {{clientId}}?
cibaBackhannelTokenDeliveryModes.poll=Poll
policies=Policies
parentClientScope=Parent client scope
reorder=Reorder
allTypes=All types
backchannelLogoutSessionRequired=Backchannel logout session required
ldapFilter=LDAP filter
eventTypes.PUSHED_AUTHORIZATION_REQUEST_ERROR.name=Pushed authorization request error
editAttribute=Edit attribute
webAuthnPolicyRpEntityNameHelp=Human-readable server name as WebAuthn Relying Party
postBrokerLoginFlowAlias=Post login flow
refreshTokenMaxReuse=Refresh Token Max Reuse
partialExportHeaderText=Partial export allows you to export realm configuration, and other associated resources into a json file.
clientScopes=Client scopes
loadingRealms=Loading realms…
eventTypes.SEND_RESET_PASSWORD_ERROR.description=Send reset password error
httpPostBindingLogout=HTTP-POST binding logout
updateMessageBundleSuccess=Success\! Message bundle updated.
permissionDescription=A description for this permission.
policyClientHelp=Specifies which client(s) are allowed by this policy.
multivalued.label=Multivalued
buildIn=Built-in
roleCreateExplain=This is some description
scopePermissions.identityProviders.token-exchange-description=Policies that decide which clients are allowed exchange tokens for an external token minted by this identity provider.
algorithmNotSpecified=Algorithm not specified
rememberMe=Remember me
flow.registration=Registration flow
showLess=Show less
registeredClusterNodes=Registered cluster nodes
connectionAndAuthenticationSettings=Connection and authentication settings
deleteConfirmUsers=Delete user?
storePassword=Store password
defaultGroups=Default groups
eventTypes.TOKEN_EXCHANGE_ERROR.name=Token exchange error
flow.browser=Browser flow
unlinkUsersSuccess=Unlink of users finished successfully.
addressClaim.street.tooltip=Name of User Attribute, which will be used to map to 'street_address' subclaim inside 'address' token claim. Defaults to 'street' .
webAuthnPolicyCreateTimeoutHint=Timeout needs to be between 0 seconds and 8 hours
addValidator=Add validator
attributeImporter=Import declared SAML attribute if it exists in assertion into the specified user property or attribute.
userInfoSettings=User info settings
createAttributeError=Error\! User Profile configuration has not been saved {{error}}.
password=Password
eventTypes.VERIFY_EMAIL.name=Verify email
httpPostBindingResponseHelp=Indicates whether to respond to requests using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
mapperTypeHardcodedAttributeMapper=hardcoded-attribute-mapper
eventTypes.IMPERSONATE.description=Impersonate
forbidden_other=Forbidden, permissions needed\:
clientAuthorization=Authorization
identityProvidersPermissionsHint=Determines if fine grained permissions are enabled for managing this role. Disabling will delete all current permissions that have been set up.
removeMappingConfirm_other=Are you sure you want to remove {{count}} roles
kerberosWizardDescription=Text needed here.
welcome=Welcome to
events=Events
importHelp=Import a JSON file containing authorization settings for this resource server.
mapperType=Mapper type
importResources=The following settings and data will be imported\:
validateConnectionUrl=You must enter a connection URL
attributeConsumingServiceIndexHelp=Index of the Attribute Consuming Service profile to request during authentication.
clientSessionSettings=Client session settings
cibaAuthRequestedUserHintHelp=The way of identifying the end-user for whom authentication is being requested. Currently only "login_hint" is supported.
leaveGroupConfirmDialog_other=Are you sure you want to remove {{username}} from the {{count}} selected groups?
createTokenHelp=An initial access token can only be used to create clients
removeImportedUsersError=Could not remove imported users\: '{{error}}'
eventTypes.OAUTH2_DEVICE_CODE_TO_TOKEN_ERROR.description=Oauth2 device code to token error
typeHelp=Client scopes, which will be added as default scopes to each created client
linkedIdPs=Linked identity providers
htmlDisplayName=HTML Display name
groupObjectClasses=Group object classes
requiredActionPlaceholder=Select action
bindCredentials=Bind credentials
logoutSettings=Logout settings
validateServerPrincipal=You must enter a server principal
addMessageBundle=Add message bundle
realmName=Realm name
searchEventType=Search saved event type
idpInitiatedSsoRelayStateHelp=Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
otpHashAlgorithmHelp=What hashing algorithm should be used to generate the OTP.
joinGroup=Join Group
eventTypes.REMOVE_TOTP_ERROR.description=Remove totp error
eventTypes.EXECUTE_ACTION_TOKEN_ERROR.description=Execute action token error
unlinkAccountConfirm=Are you sure you want to permanently unlink this account from {{provider}}?
x509CertificateHelp=X509 Certificate encoded in PEM format
samlEndpointsLabel=SAML 2.0 Service Provider Metadata
passCurrentLocaleHelp=Pass the current locale to the identity provider as a ui_locales parameter.
lessThan=Must be less than {{value}}
webAuthnPolicyRequireResidentKeyHelp=It tells an authenticator create a public key credential as Resident Key or not.
logoutServiceRedirectBindingURL=Logout Service Redirect Binding URL
createIdentityProviderSuccess=Identity provider successfully created
emptyMappersInstructions=If you want to add mappers, please click the button below to add some predefined mappers or to configure a new mapper.
dayMonth=Day
clientRolesHelp=The condition checks whether one of the specified client roles exists on the client to determine whether the policy is applied. This effectively allows client administrator to create client role of specified name on the client to make sure that particular client policy will be applied on requests of this client. Condition is checked during most of OpenID Connect requests (Authorization requests, token requests, introspection endpoint request, etc.)
validatingX509Certs=Validating X509 certificates
eventTypes.CLIENT_UPDATE.description=Client update
searchInitialAccessToken=Search token
guiOrder=Display Order
friendlyName=Friendly name of attribute to search for in assertion. You can leave this blank and specify a name instead.
testSuccess=Successfully connected to LDAP
userInfoUrl=User Info URL
displayOnConsentScreen=Display on consent screen
noClientPolicies=No client policies
defaultAdminInitiatedActionLifespanHelp=Maximum time before an action permit sent to a user by administrator is expired. This value is recommended to be long to allow administrators to send e-mails for users that are currently offline. The default timeout can be overridden immediately before issuing the token.
syncUsersSuccess=Sync of users finished successfully.
updatedCredentialMoveError=User Credential configuration hasn't been saved
searchForRoles=Search role by name
refresh=Refresh
roleDeletedSuccess=The role has been deleted
advancedClaimToRole=If all claims exist, grant the user the specified realm or client role.
directGrant=Direct Grant Flow
maxLifespanHelp=Max lifespan of cache entry in milliseconds
associatedRolesModalTitle=Add roles to {{name}}
nameIdFormatHelp=The name ID format to use for the subject.
detailsHelp=this is information about the details
adminEvents=Admin events
serviceAccountHelp=Allows you to authenticate this client to Keycloak and retrieve access token dedicated to this client. In terms of OAuth2 specification, this enables support of 'Client Credentials Grant' for this client.
urisHelp=Set of URIs which are protected by resource.
eventTypes.IDENTITY_PROVIDER_RESPONSE.name=Identity provider response
confirmClientSecretTitle=Regenerate secret for this client?
serverPrincipal=Server principal
deleteConfirmGroup_one=Are you sure you want to delete this group '{{groupName}}'.
signDocuments=Sign documents
noTokens=No initial access tokens
addMapper=Add mapper
webauthnPolicy=Webauthn Policy
userAttributeName=User attribute name to store SAML attribute. Use email, lastName, and firstName to map to those predefined user properties.
displayDescriptionField=Display description
eventTypes.DELETE_ACCOUNT.description=Delete account
eventTypes.RESTART_AUTHENTICATION_ERROR.description=Restart authentication error
evictionHour=Eviction hour
notBefore=Not before
onDragFinish=Dragging finished {{list}}
otpSupportedApplications.totpAppMicrosoftAuthenticatorName=Microsoft Authenticator
ldapMappersList=LDAP Mappers
bindDnHelp=DN of the LDAP admin, which will be used by Keycloak to access LDAP server
newClientProfileName=Client profile name
eventTypes.OAUTH2_DEVICE_CODE_TO_TOKEN_ERROR.name=Oauth2 device code to token error
eventTypes.TOKEN_EXCHANGE.description=Token exchange
continue=Continue
editProvider=Edit provider
included.client.audience.label=Included Client Audience
backchannelLogoutUrlHelp=URL that will cause the client to log itself out when a logout request is sent to this realm (via end_session_endpoint). If omitted, no logout request will be sent to the client is this case.
updateScopeSuccess=Authorization scope successfully updated
userInfoResponseEncryptionKeyManagementAlgorithmHelp=JWA Algorithm used for key management in encrypting User Info Endpoint responses. This option is needed if you want encrypted User Info Endpoint responses. If left empty, User Info Endpoint responses are not encrypted.
authnContextDeclRefsHelp=Ordered list of requested AuthnContext DeclRefs.
inherent=Inherited
tableTitle=Attributes groups
generateNewKeys=Generate new keys
updateClientPolicySuccess=Client policy updated
unlock=Unlock
validateRealm=You must enter a realm
attributeValue=Attribute Value
eventTypes.CLIENT_DELETE_ERROR.description=Client delete error
clientScopesHelp=It uses the scopes requested or assigned in advance to the client to determine whether the policy is applied to this client. Condition is evaluated during OpenID Connect authorization request and/or token request.
revokeRefreshToken=Revoke Refresh Token
mappingUpdatedSuccess=Mapping successfully updated
logoUrlHelp=URL that references a logo for the Client application
operationTypes=Operation types
loginWithEmailAllowed=Login with email
expireTime=Expire time
requestObject.request\ or\ request_uri=Request or Request URI
policyProvider.user=Define conditions for your permissions where a set of one or more users is permitted to access an object.
protocolTypes.openid-connect=OpenID Connect
clientTypeHelp='OpenID Connect' allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server.'SAML' enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO) and uses security tokens containing assertions to pass information.
addOpenIdProvider=Add OpenID Connect provider
memory=Memory
eventTypes.CLIENT_LOGIN.name=Client login
mapper.nameid.format.tooltip=Name ID Format using Mapper
hideOnLoginPageHelp=If hidden, login with this provider is possible only if requested explicitly, for example using the 'kc_idp_hint' parameter.
eventTypes.UPDATE_PROFILE.description=Update profile
assignRolesTo=Assign roles to {{client}}
orderChangeError=Could not change display order of identity providers {{error}}
policyProvider.client-scope=Define conditions for your permissions where a set of one or more client scopes is permitted to access an object.
secretExpiresOn=Secret expires on {{time}}
searchClientByName=Search client by name
loginTimeout=Login timeout
attributeName=Attribute [Name]
updateError=Could not update the provider {{error}}
importUsersHelp=If true, LDAP users will be imported into the Keycloak DB and synced by the configured sync policies.
emptyClientProfilesInstructions=There are no profiles, select 'Create client profile' to create a new client profile
policyProvider.js=Define conditions for your permissions using JavaScript. It is one of the rule-based policy types supported by Keycloak, and provides flexibility to write any policy based on the Evaluation API.
idpType.social=Social login
krbPrincipalAttribute=Kerberos principal attribute
fineGrainSamlEndpointConfig=Fine Grain SAML Endpoint Configuration
hours=Hours
eventTypes.RESET_PASSWORD_ERROR.name=Reset password error
yes=Yes
showRemaining=Show ${remaining}
searchProfile=Search profile
eventTypes.UPDATE_EMAIL_ERROR.name=Update email error
removeConfirm_other=Are you sure you want to remove these groups.
renameGroup=Rename group
configure=Configure
searchScopeHelp=For one level, the search applies only for users in the DNs specified by User DNs. For subtree, the search applies to the whole subtree. See LDAP documentation for more details.
jumpToSection=Jump to section
noUsersEmptyStateDescription=Only the users with this role directly assigned will appear under this tab. If you need to find users assigned to this role, go to
manage=Manage
searchForSession=Search session
temporaryLockedHelp=The user may be locked due to multiple failed attempts to log in.
kerberosIntegration=Kerberos integration
useEntityDescriptorHelp=Import metadata from a remote IDP SAML entity descriptor.
decisionStrategies.CONSENSUS=Consensus
saveProviderSuccess=The provider has been saved successfully.
dedicatedScopes=Dedicated scopes
noSessionsDescription=There are currently no active sessions in this realm.
createGroupText=Create attributes group
otpPolicyCodeReusable=Reusable token
addRedirectUri=Add valid redirect URIs
time=Time
disableSigningExplain=If you disable "{{key}}", the Keycloak database will be updated and you may need to download a new adapter for this client.
mapperTypeRoleLdapMapperHelp=Used to map role mappings of roles from some LDAP DN to Keycloak role mappings of either realm roles or client roles of particular client
used.DEFAULT=Default
authenticationCreateFlowHelp=Create flow
credentialResetEmailSuccess=Email sent to user.
sslType.all=All requests
discoveryEndpointHelp=Import metadata from a remote IDP discovery descriptor.
excludeSessionStateFromAuthenticationResponse=Exclude Session State From Authentication Response
required=Required field
linkedIdPsText=The identity providers which are already linked to this user account
lastUpdated=Last updated
credentialResetBtn=Credential Reset
socialProfileJSONFieldPathHelp=Path of field in Social Provider User Profile JSON data to get value from. You can use dot notation for nesting and square brackets for array index. E.g. 'contact.address[0].country'.
userModelAttributeHelp=Name of the UserModel property or attribute you want to map the LDAP attribute into. For example 'firstName', 'lastName, 'email', 'street' etc.
userList=User list
eventTypes.RESET_PASSWORD.name=Reset password
exportWarningDescription=If there is a great number of groups, roles or clients in your realm, the operation may make server unresponsive for a while.
importRole=Import role
deleteClientProfileConfirm=This action will permanently delete the profile {{profileName}}. This cannot be undone.
signServiceProviderMetadataHelp=Enable/disable signature of the provider SAML metadata.
oAuthMutual=OAuth 2.0 Mutual TLS Certificate Bound Access Tokens Enabled
keystore=Keystore
eventTypes.EXECUTE_ACTION_TOKEN.description=Execute action token
eventTypes.CLIENT_INFO.description=Client info
updateClientProfilesError=Provided JSON is incorrect\: Unexpected token { in JSON
canonicalizationHelp=Canonicalization Method for XML signatures.
authorizationHelp=Enable/Disable fine-grained authorization support for a client
sessions=Sessions
mapperCreateSuccess=Mapper created successfully.
fullSyncPeriodHelp=Period for full synchronization in seconds
resourceTypeHelp=Specifies that this permission must be applied to all resource instances of a given type.
encryptionAlgorithmHelp=Encryption algorithm, which is used by SAML IDP for encryption of SAML documents, assertions or IDs. The corresponding decryption key for decrypt SAML document parts will be chosen based on this configured algorithm and should be available in realm keys for the encryption (ENC) usage. If algorithm is not configured, then any supported algorithm is allowed and decryption key will be chosen based on the algorithm configured in SAML document itself.
socialUserAttributeName=User attribute name to store information.
priority=Priority
jsonType.label=Claim JSON Type
fullScopeAllowed=Full scope allowed
syncModes.inherit=Inherit
masterSamlProcessingUrlHelp=If configured, this URL will be used for every binding to both the SP's Assertion Consumer and Single Logout Services. This can be individually overridden for each binding and service in the Fine Grain SAML Endpoint Configuration.
addedGroupMembershipError=Error adding group membership
authenticatorAttachment.platform=Platform
configSaveSuccess=Successfully saved the execution config
regenerate=Regenerate
ignoreMissingGroups=Ignore missing groups
sslType.external=External requests
showMetaData=Show metadata
webAuthnPolicyAttestationConveyancePreferenceHelp=Communicates to an authenticator the preference of how to generate an attestation statement.
top-level-flow-type.basic-flow=Basic flow
groupRemoveError=Error removing group {error}
temporaryPasswordHelpText=If enabled, the user must change the password on next login
requestObjectEncryption=Request object encryption algorithm
exportAuthDetailsSuccess=Successfully exported authorization details.
connectionPooling=Connection pooling
wantAuthnRequestsSignedHelp=Indicates whether the identity provider expects a signed AuthnRequest.
policyCodeHelp=The JavaScript code providing the conditions for this policy.
eventTypes.IMPERSONATE_ERROR.description=Impersonate error
eventTypes.IDENTITY_PROVIDER_RESPONSE.description=Identity provider response
shouldBeANumber=Should be a number
validatorDialogColNames.colDescription=Description
requestObjectEncoding=Request object content encryption algorithm
idTokenEncryptionKeyManagementAlgorithmHelp=JWA Algorithm used for key management in encrypting ID tokens. This option is needed if you want encrypted ID tokens. If left empty, ID Tokens are just signed, but not encrypted.
idpInitiatedSsoUrlNameHelp=URL fragment name to reference client when you want to do IDP Initiated SSO. Leaving this empty will disable IDP Initiated SSO. The URL you will reference from your browser will be\: {server-root}/realms/{realm}/protocol/saml/clients/{client-url-name}
keyPassword=Key password
attributeFriendlyName=Attribute [Friendly Name]
clearAllFilters=Clear all filters
scopePermissions.clients.map-roles-composite-description=Policies that decide if an administrator can apply roles defined by this client as a composite to another role
roleObjectClassesHelp=Object class (or classes) of the role object. It's divided by commas if more classes are needed. In typical LDAP deployment it could be 'groupOfNames'. In Active Directory it's usually 'group'.
emptyAddClientScopes=No client scopes
changeTypeTo=Change type to
generateKeys=Generate keys?
searchForUser=Search user
groupRemove_one=Group removed
savePasswordError=Error saving password\: {{error}}
allGroups=All groups
deleteNode=Delete node?
rdnLdapAttributeHelp=Name of the LDAP attribute, which is used as RDN (top attribute) of typical user DN. Usually it's the same as the Username LDAP attribute, however it is not required. For example for Active directory, it is common to use 'cn' as RDN attribute when username attribute might be 'sAMAccountName'.
addAaguids=Add AAGUID
createPolicy=Create client policy
disablePolicyConfirm=Users and clients can't access the policy if it's disabled. Are you sure you want to continue?
useDiscoveryEndpoint=Use discovery endpoint
clearAdminEvents=Clear admin events
eventTypes.CLIENT_DELETE.name=Client delete
clientLoginTimeout=Client Login Timeout
mapperSaveSuccess=Mapper saved successfully.
noRolesAssociatedInstructions=To add roles to this role press the 'Add role' button
alwaysDisplayInUIHelp=Always list this client in the Account UI, even if the user does not have an active session.
eventTypes.UPDATE_PASSWORD.name=Update password
eventTypes.UPDATE_CONSENT.description=Update consent
realmSaveSuccess=Realm successfully updated
notBeforePushFail=Failed to push "not before" to\: {{failedNodes}}
executorTypeTextHelpText=Executor Type Text Help Text
eventTypes.IDENTITY_PROVIDER_LOGIN_ERROR.description=Identity provider login error
readTimeout=Read timeout
userInfoResponseEncryptionContentEncryptionAlgorithmHelp=JWA Algorithm used for content encryption in encrypting User Info Endpoint responses. If User Info response encryption key management algorithm is specified, the default for this value is A128CBC-HS256.
accessTokenSignatureAlgorithm=Access token signature algorithm
createUser=Create user
logoutAllDescription=If you sign out all active sessions, active subjects in this realm will be signed out.
credentialResetEmailError=Failed\: {{error}}
flow-type.form-flow=Form
useKerberosForPasswordAuthenticationHelp=User Kerberos login module for authenticating username/password against Kerberos server instead of authenticating against LDAP server with Directory Service API
guiOrderHelp=Specify order of the provider in GUI (such as in Consent page) as integer
signDocumentsHelp=Should SAML documents be signed by the realm?
resetPassword=Reset password
requireSslHelp=Is HTTPS required? 'None' means HTTPS is not required for any client IP address. 'External requests' means localhost and private IP addresses can access without HTTPS. 'All requests' means HTTPS is required for all IP addresses.
policyDeletedSuccess=The Policy successfully deleted
manageServiceAccountUser=To manage detail and group mappings, click on the username <1>{{link}}</1>
addClientProfileSuccess=New client profile added
helpDisabled=Help off
deleteResource=Permanently delete resource?
validRequestURIsHelp=List of valid URIs, which can be used as values of 'request_uri' parameter during OpenID Connect authentication request. There is support for the same capabilities like for Valid Redirect URIs. For example wildcards or relative paths.
emptyAddClientScopesInstructions=There are no client scopes left to add
changeTypeIntro={{count}} selected client scopes will be changed to
secretSizeHelp=Size in bytes for the generated secret
clientSecret=Client Secret
inputType=Input type
claimHelp=Name of claim to search for in token. You can reference nested claims by using a '.', i.e. 'address.locality'. To use dot (.) literally, escape it with backslash. (\\.)
regexClaimValues=Regex Claim Values
iconUri=Icon URI
allowed-protocol-mappers.label=Allowed Protocol Mappers
group=Group
addAssociatedRolesText=Add associated roles
enabledFeatures=Enabled features
groupsClaimHelp=If defined, the policy will fetch user's groups from the given claim within an access token or ID token representing the identity asking permissions. If not defined, user's groups are obtained from your realm configuration.
createGroup=Create group
validatingPublicKeyId=Validating public key id
clientAuthentications.client_secret_jwt=JWT signed with client secret
created=Created
minutes=Minutes
displayOnClient=Display client on screen
certSubject=CERT_SUBJECT
userCredentialsHelpText=The top level handlers allow you to shift the priority of the credential for the user, the topmost credential having the highest priority. The handlers within one expandable panel allow you to change the visual order of the credentials, the topmost credential will show at the most left.
ldapAdvancedSettingsDescription=This section contains all the other options for more fine-grained configuration of the LDAP storage provider.
usersDN=Users DN
secretSize=Secret size
included.custom.audience.label=Included Custom Audience
max-clients.label=Max Clients Per Realm
requestObjectSignatureAlgorithm=Request object signature algorithm
searchForGroups=Search group
noRolesAssociated=No associated roles
eventTypes.IDENTITY_PROVIDER_POST_LOGIN_ERROR.name=Identity provider post login error
emptyStateMessage=No attributes groups
tokenLifespan.expires=Expires in
oidcAttributeImporter=Import declared claim if it exists in ID, access token, or the claim set returned by the user profile endpoint into the specified user property or attribute.
requestObject.request\ only=Request only
waitIncrementSeconds=Wait increment
requiredForLabel.admins=Only admins
clientScopeSuccess=Scope mapping updated
clientPolicySearch=Search client policy
refreshTokens=Refresh tokens
eventTypes.UPDATE_EMAIL_ERROR.description=Update email error
credentials=Credentials
webAuthnPolicyCreateTimeoutHelp=Timeout value for creating user's public key credential in seconds. if set to 0, this timeout option is not adapted.
policyType.hotp=Counter based
claimFilterValue=Essential claim value
eventTypes.REGISTER_ERROR.name=Register error
priorityHelp=Priority of the provider
emptyPolicies=No policies
manageOrderTableAria=List of identity providers in the order listed on the login page
disableError=Could not disable the provider {{error}}
anyAlgorithm=Any algorithm
enableSSL=Enable SSL
general=General
failureFactor=Max login failures
updateClientPoliciesSuccess=The client policies configuration was updated
advancedSettings=Advanced settings
attributeValueHelp=Value the attribute must have. If the attribute is a list, then the value must be contained in the list.
eventTypes.FEDERATED_IDENTITY_LINK.description=Federated identity link
adminTheme=Admin theme
alias=Alias
eventTypes.SEND_IDENTITY_PROVIDER_LINK_ERROR.name=Send identity provider link error
userEvents=User events
inputTypePlaceholder=Input placeholder
otpPolicyPeriodErrorHint=Value needs to be between 1 second and 2 minutes
introduction=If you want to leave this page and manage this realm, please click the corresponding menu items in the left navigation bar.
clearUserEvents=Clear user events
descriptionHelp=Help text for the description of the new flow
addCustomProvider=Add custom provider
permissionType=Specifies that this permission must be applied to all resources instances of a given type.
policyEnforcementModes.ENFORCING=Enforcing
rowSaveBtnAriaLabel=Save edits for {{messageBundle}}
permanentLockout=Permanent lockout
debug=Debug
webAuthnPolicyRequireResidentKey=Require resident key
notBeforePushSuccess=Successfully push "not before" to\: {{successNodes}}
unlockUsersConfirm=All the users that are temporarily locked will be unlocked.
clear=Clear
idpType.custom=Custom
eventTypes.LOGOUT.name=Logout
deletedErrorClientScope=Could not delete client scope\: {{error}}
groupsClaim=Groups claim
roleMappingUpdatedError=Could not update role mapping {{error}}
client-updater-source-groups.label=Groups
frontchannelLogoutUrlHelp=URL that will cause the client to log itself out when a logout request is sent to this realm (via end_session_endpoint). If not provided, it defaults to the base url.
authenticationOverridesHelp=Override realm authentication flow bindings.
requiredActions=Required actions
selectLocales=Select locales
policyDecisionStagey=The decision strategy dictates how the policies associated with a given permission are evaluated and how a final decision is obtained. 'Affirmative' means that at least one policy must evaluate to a positive decision in order for the final decision to be also positive. 'Unanimous' means that all policies must evaluate to a positive decision in order for the final decision to be also positive. 'Consensus' means that the number of positive decisions must be greater than the number of negative decisions. If the number of positive and negative is the same, the final decision will be negative.
usermodel.prop.tooltip=Name of the property method in the UserModel interface. For example, a value of 'email' would reference the UserModel.getEmail() method.
kc.identity.authc.method=Authentication Method
regexAttributeValues=Regex Attribute Values
otpTypeHelp=totp is Time-Based One Time Password. 'hotp' is a counter base one time password in which the server keeps a counter to hash against.
setAsDefaultAction=Set as default action
keyForCodeExchange=Proof Key for Code Exchange Code Challenge Method
clientProfiles=Client profiles
endpointsHelp=Shows the configuration of the Service Provider endpoint
mapperTypeLdapAttributeMapper=hardcoded-ldap-attribute-mapper
unlockAllUsers=Unlock all users
noGroupsText=You haven't added this user to any groups. Join a group to get started.
createClientPolicyError=Could not create policy due to\: {{error}}
eventTypes.EXECUTE_ACTIONS_ERROR.name=Execute actions error
path=Path
overwritten=Overwritten
mapperNameHelp=Name of the mapper
deleteProviderError=Error deleting the provider
supportedLocalesHelp=The locales to support for this realm. The user chooses one of these locales on the login screen.
comparisonHelp=Specifies the comparison method used to evaluate the requested context classes or statements. The default is "Exact".
generatedIdTokenIsDisabled=Generated id token is disabled when no user is selected
nodeHost=Node host
eventTypes.REGISTER_NODE_ERROR.description=Register node error
eventListenersHelpTextHelp=Configure what listeners receive events for the realm.
acrToLoAMapping=ACR to LoA Mapping
advancedSettingsSaml=This section is used to configure advanced settings of this client
resetCredentialsError=Error resetting users credentials\: {{error}}
eventTypes.INTROSPECT_TOKEN.name=Introspect token
unspecified=Unspecified
deleteMappingTitle=Delete mapping?
profile=Profile
active=Active
generateKeysDescription=If you generate new keys, you can download the keystore with the private key automatically and save it on your client's side. Keycloak server will save just the certificate and public key, but not the private key.
addSubFlowTitle=Add a sub-flow
useTruststoreSpiHelp=Specifies whether LDAP connection will use the Truststore SPI with the truststore configured in command-line options. 'Always' means that it will always use it. 'Never' means that it will not use it. Note that even if Keycloak truststore is not configured, the default java cacerts or certificate specified by 'javax.net.ssl.trustStore' property will be used.
forcePostBindingHelp=Always use POST binding for responses.
executorName=Name
VERIFY_EMAIL=Verify Email (VERIFY_EMAIL)
realmCertificateAlias=Realm certificate alias
roleName=Role name
addOrigins=Add Origin
evictionDayHelp=Day of the week the entry will become invalid
actionTokens=Action tokens
permissionResources=Specifies that this permission must be applied to a specific resource instance.
testConnectionHint.withoutEmail=To test the connection you must first configure an e-mail address for the current user ({{userName}}).
includeOneTimeUseConditionHelp=Should a OneTimeUse Condition be included in login responses?
availableIdPsText=All the configured identity providers in this realm are listed here. You can link the user account to any of the IdP accounts.
accessTokenLifespanHelp=Max time before an access token is expired. This value is recommended to be short relative to the SSO timeout
editableRowsTable=Editable rows table
redirectURIHelp=The redirect uri to use when configuring the identity provider.
permissionsEnabled=Permissions enabled
saveRealmError=Could not create realm {{error}}
attestationPreference.none=None
pairwiseSubAlgorithmSalt.label=Salt
addGroupsToGroupPolicy=Add groups to group policy
deniedScopes=Denied scopes
updateClientProfilesSuccess=The client profiles configuration was updated
flow.docker\ auth=Docker authentication flow
useEntityDescriptor=Use entity descriptor
loginActionTimeout=Login action timeout
windowsDomainQN=Windows Domain Qualified Name
deleteClientError=Could not delete profile\: {{error}}
validRedirectURIs=Valid URI pattern a browser can redirect to after a successful login. Simple wildcards are allowed such as 'http\://example.com/*'. Relative path can be specified too such as /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used. For SAML, you must set valid URI patterns if you are relying on the consumer service URL embedded with the login request.
UPDATE_PROFILE=Update Profile (UPDATE_PROFILE)
assertionConsumerServicePostBindingURL=Assertion Consumer Service POST Binding URL
removeImported=Remove imported
endpoints=Endpoints
roleSaveError=Could not save role\: {{error}}
keySize=Key size
membershipUserLdapAttributeHelp=Used just if Membership Attribute Type is UID. It is the name of the LDAP attribute on user, which is used for membership mappings. Usually it will be 'uid'. For example if the value of 'Membership User LDAP Attribute' is 'uid' and LDAP group has 'memberUid\: john', then it is expected that particular LDAP user will have attribute 'uid\: john'.
validatingX509CertsHelp=The certificate in PEM format that must be used to check for signatures. Multiple certificates can be entered, separated by comma (,).
samlCapabilityConfig=SAML capabilities
accessTokenSignatureAlgorithmHelp=JWA algorithm used for signing access tokens.
derFormatted=DER formatted
periodicChangedUsersSyncHelp=Whether periodic synchronization of changed or newly created LDAP users to Keycloak should be enabled or not
signatureAlgorithmHelp=The signature algorithm to use to sign documents. Note that 'SHA1' based algorithms are deprecated and can be removed in the future. It is recommended to stick to some more secure algorithm instead of '*_SHA1'
allow-default-scopes.tooltip=If on, newly registered clients will be allowed to have client scopes mentioned in realm default client scopes or realm optional client scopes
emailVerified=Email verified
addExecutionHelp=Execution can have a wide range of actions, from sending a reset email to validating an OTP
requestObjectRequiredHelp=Specifies if the client needs to provide a request object with their authorization requests, and what method they can use for this. If set to "not required", providing a request object is optional. In all other cases, providing a request object is mandatory. If set to "request", the request object must be provided by value. If set to "request_uri", the request object must be provided by reference. If set to "request or request_uri", either method can be used.
clientScopesRolesScope=If there is no role scope mapping defined, each user is permitted to use this client scope. If there are role scope mappings defined, the user must be a member of at least one of the roles.
passwordPoliciesHelp.notUsername=The password cannot match the username.
removeConfirm_one=Are you sure you want to remove this group
createUserProviderSuccess=User federation provider successfully created
countHelp=Specifies how many clients can be created using the token
mapperTypeHardcodedLdapGroupMapper=hardcoded-ldap-group-mapper
Monday=Monday
resetCredentialsSuccess=The password has been reset successfully.
added=Added
authnContextDeclRefs=AuthnContext DeclRefs
clientAssertionAudienceHelp=The audience to use for the client assertion. The default value is the IDP's token endpoint URL.
externalRoleToRole=Looks for an external role in a keycloak access token. If external role exists, grant the user the specified realm or client role.
attributeGroup=Attribute group
deleteExecutionError=Could not delete execution\: {{error}}
hideInheritedRoles=Hide inherited roles
consentRequired=Consent required
selectMethodType.import=Import
standardFlow=Standard flow
votedToStatus=\ voted to {{status}}
credentialResetConfirmText=Are you sure you want to send email to user
clientScopeType.default=Default
helpFileUpload=Upload a JSON file
addProvider_one=Add {{provider}} provider
clientPoliciesPolicies=Client Policies Policies
editUSernameHelp=If enabled, the username is editable, otherwise it is read-only.
removeAllAssociatedRoles=Remove all associated roles
flowCreatedSuccess=Flow created
fineGrainOpenIdConnectConfiguration=Fine grain OpenID Connect configuration
flow.reset\ credentials=Reset credentials flow
eventTypes.DELETE_ACCOUNT_ERROR.name=Delete account error
eventTypes.CLIENT_DELETE_ERROR.name=Client delete error
noRolesInstructions-client=You haven't created any roles for this client. Create a role to get started.
test=Test
leaveGroup_one=Leave group {{name}}?
count=Count
noPasswordPoliciesInstructions=You haven't added any password policies to this realm. Add a policy to get started.
testAuthentication=Test authentication
groupNameLdapAttributeHelp=Name of LDAP attribute, which is used in group objects for name and RDN of group. Usually it will be 'cn'. In this case typical group/role object may have DN like 'cn\=Group1,ouu\=groups,dc\=example,dc\=org'.
deleteError=Could not delete the provider {{error}}
attributeDisplayName=Display name
pkceEnabled=Use PKCE
userProviderSaveSuccess=User federation provider successfully saved
month=Month
valueLabel=Value
dropNonexistingGroupsDuringSyncHelp=If this flag is true, then during sync of groups from LDAP to Keycloak, we will keep just those Keycloak groups that still exist in LDAP. The rest will be deleted.
expiration=Expiration
addKerberosWizardTitle=Add Kerberos user federation provider
noPasswordPolicies=No password policies
resourceTypes=Resource types
deleteConfirmTitle_one=Delete group?
eventTypes.UPDATE_PROFILE_ERROR.description=Update profile error
webAuthnUpdateSuccess=Updated webauthn policies successfully
authorizationSignedResponseAlg=Authorization response signature algorithm
mapperTypeFullNameLdapMapperHelp=Used to map the full-name of a user from single attribute in LDAP (usually 'cn' attribute) to firstName and lastName attributes of UserModel in Keycloak DB
includeInUserInfo.label=Add to userinfo
onDragMove=Dragging item {{item}}
back=Back
deleteScopeConfirm=If you delete this authorization scope, some permissions will be affected.
updateOtpSuccess=OTP policy successfully updated
title=Authentication
deleteAttributeError=Attribute not deleted
enableClientSignatureRequiredExplain=If you enable "Client signature required", the adapter of this client will be updated. You may need to download a new adapter for this client. You need to generate or import keys for this client otherwise the authentication will not work.
policiesConfigTypes.formView=Form view
residentKey.No=No
nodeReRegistrationTimeout=Node Re-registration timeout
fineGrainSamlEndpointConfigHelp=This section to configure exact URLs for Assertion Consumer and Single Logout Service.
connectionURL=Connection URL
validateCustomUserSearchFilter=Filter must be enclosed in parentheses, for example\: (filter)
accessTokenLifespan=Access Token Lifespan
loginWithEmailHelpText=Allow users to log in with their email address.
eventTypes.IDENTITY_PROVIDER_LINK_ACCOUNT.name=Identity provider link account
deleteMessageBundleSuccess=Successfully removed the message from the bundle
retry=Press here to refresh and continue
selectAttributes=Select attributes
firstBrokerLoginFlowAliasHelp=Alias of authentication flow, which is triggered after first login with this identity provider. Term 'First Login' means that no Keycloak account is currently linked to the authenticated identity provider account.
owner=Owner
eventTypes.VERIFY_PROFILE.description=Verify profile
executorAuthenticatorMultiSelectHelpText=Executor Authenticator MultiSelect Help Text
eventTypes.FEDERATED_IDENTITY_LINK_ERROR.name=Federated identity link error
eventTypes.EXECUTE_ACTIONS.name=Execute actions
encryptAssertions=Encrypt assertions
disableConfirmTitle=Disable realm?
custom=Custom Attribute...
keyTab=Key tab
addSamlProvider=Add SAML provider
permission=Permission
saveEventListeners=Save Event Listeners
capabilityConfig=Capability config
mapperTypeMsadUserAccountControlManagerHelp=Mapper specific to MSAD. It's able to integrate the MSAD user account state into Keycloak account state (account enabled, password is expired etc). It's using userAccountControl and pwdLastSet MSAD attributes for that. For example if pwdLastSet is 0, the Keycloak user is required to update the password; if userAccountControl is 514 (disabled account) the Keycloak user is disabled as well etc. Mapper is also able to handle the exception code from LDAP user authentication.
home=Home
bindFlow=Bind flow
userAttributeValue=User Attribute Value
browserFlowHelp=Select the flow you want to use for browser authentication.
tokenLifespan.never=Never expires
notFound=Could not find the resource that you are looking for
passMaxAge=Pass max_age
disablePolicyConfirmTitle=Disable policy?
eventTypes.LOGIN_ERROR.description=Login error
linkAccount=Link account
attestationPreference.direct=Direct
eventTypes.OAUTH2_DEVICE_AUTH_ERROR.description=Oauth2 device authentication error
unlinkUsers=Unlink users
userLdapFilter=User LDAP filter
emailVerification=Email Verification
configSaveError=Could not save the execution config\: {{error}}
clientAuthenticatorTypeHelp=Client Authenticator used for authentication of this client against Keycloak server
cachePolicyHelp=Cache Policy for this storage provider. 'DEFAULT' is whatever the default settings are for the global cache. 'EVICT_DAILY' is a time of day every day that the cache will be invalidated. 'EVICT_WEEKLY' is a day of the week and time the cache will be invalidated. 'MAX_LIFESPAN' is the time in milliseconds that will be the lifespan of a cache entry.
eventTypes.CUSTOM_REQUIRED_ACTION_ERROR.description=Custom required action error
eventTypes.SEND_RESET_PASSWORD.name=Send reset password
requiredFor=Required for
scopePermissions.users.map-roles-description=Policies that decide if administrator can map roles for all users
bindCredentialsHelp=Password of LDAP admin. This field is able to obtain its value from vault, use ${vault.ID} format.
searchForAdminEvent=Search admin event
unitLabel=Select a time unit
webAuthnPolicySignatureAlgorithms=Signature algorithms
eventTypes.GRANT_CONSENT_ERROR.name=Grant consent error
action=Action
shortVerificationUri=Short verification_uri in Device Authorization flow
placeholderText=Select one
deleteCredentialsError=Error deleting users credentials\: {{error}}
authDefaultActionTooltip=If enabled, any new user will have this required action assigned to it.
validateBindCredentials=You must enter the password of the LDAP admin
evictionMinuteHelp=Minute of the hour the entry will become invalid
includeAuthnStatement=Include AuthnStatement
validatorType=Validator type
attributesHelp=Name and (regex) value of the attributes to search for in token. The configured name of an attribute is searched in SAML attribute name and attribute friendly name fields. Every given attribute description must be met to set the role. If the attribute is an array, then the value must be contained in the array. If an attribute can be found several times, then one match is sufficient.
samlAttributeToRole=If an attribute exists, grant the user the specified realm or client role.
enableStartTls=Enable StartTLS
addIdPMapper=Add Identity Provider Mapper
createPermissionSuccess=Successfully created the permission
roleAuthentication=Role authentication
homeURL=Home URL
eventTypes.REVOKE_GRANT_ERROR.name=Revoke grant error
contentSecurityPolicyReportOnly=Content-Security-Policy-Report-Only
firstBrokerLoginFlowAlias=First login flow
missingAttributes=No attributes have been defined yet. Click the below button to add attributes, key and value are required for a key pair.
testConnectionError=Error\! {{error}}
authenticatedAccessPoliciesHelp=Those Policies are used when Client Registration Service is invoked by authenticated request. This means that the request contains Initial Access Token or Bearer Token.
deleteClientPolicyProfileSuccess=Profile successfully removed from the policy.
reGenerateSigningExplain=If you regenerate signing key for client, the Keycloak database will be updated and you may need to download a new adapter for this client.
evaluate=Evaluate
enableLdapv3Password=Enable the LDAPv3 password modify extended operation
status=Status
dragInstruction=Click and drag to change priority
clients=Clients
clientName=Name
syncModes.force=Force
deleteMappingConfirm=Are you sure you want to delete this mapping?
createClientProfileSuccess=New client profile created
eventTypes.CLIENT_LOGIN_ERROR.description=Client login error
explainBearerOnly=This is a special OIDC type. This client only allows bearer token requests and cannot participate in browser logins.
noMessageBundlesInstructions=Add a message bundle to get started.
clearFile=Clear this file
allowCreate=Allow create
providerUpdatedError=Could not update client policy due to {{error}}
usersAddedError=Could not add users to the group\: {{error}}
orderChangeErrorUserFed=Could not change the priority order of user federation providers {{error}}
scopeParameterPlaceholder=Select scope parameters
deleteClientPolicyConfirmTitle=Delete policy?
validateRdnLdapAttribute=You must enter an RDN LDAP attribute
policyUrlHelp=URL that the Relying Party Client provides to the End-User to read about the how the profile data will be used
fromDisplayName=From display name
affirmative=Affirmative
clientRoles=Client roles
removeRoles=Remove roles
flowNameDescriptionHelp=Help text for the name description of the new flow
maxFailureWaitSecondsHelp=Max time a user will be locked out.
groupsPath=Groups path
useRealmRolesMapping=Use realm roles mapping
identityProviderEntityId=Identity provider entity ID
userInfoSignedResponseAlgorithm=User info signed response algorithm
selectGroup=Select group
scopePermissions.groups.view-members-description=Policies that decide if an administrator can view the members of this group
tableOfGroups=Table of groups
allowed-protocol-mappers.tooltip=Whitelist of allowed protocol mapper providers. If there is an attempt to register client, which contains some protocol mappers, which were not whitelisted, registration request will be rejected.
policyProvider.role=Define conditions for your permissions where a set of one or more roles is permitted to access an object.
targetOptions.brokerId=BROKER_ID
eventTypes.VERIFY_PROFILE.name=Verify profile
useRealmRolesMappingHelp=If true, then LDAP role mappings will be mapped to realm role mappings in Keycloak. Otherwise it will be mapped to client role mappings.
forwardParameters=Forwarded query parameters
isAccessTokenJWTHelp=The Access Token received from the Identity Provider is a JWT and its claims will be accessible for mappers.
frontchannelLogoutUrl=Front-channel logout URL
testConnectionHint.withoutEmailAction=Configure e-mail address
webAuthnUpdateError=Could not update webauthn policies due to {{error}}
paginationHelp=Whether the LDAP server supports pagination
oAuthMutualHelp=This enables support for OAuth 2.0 Mutual TLS Certificate Bound Access Tokens, which means that keycloak bind an access token and a refresh token with a X.509 certificate of a token requesting client exchanged in mutual TLS between keycloak's Token Endpoint and this client. These tokens can be treated as Holder-of-Key tokens instead of bearer tokens.
deleteProviderTitle=Delete key provider?
scopes=Scopes
accessTokens=Access tokens
columnName=Name
flowType=Flow type
syncLDAPGroupsSuccessful=Data successfully synced {{result}}
policyEnforcementModes.PERMISSIVE=Permissive
subject=Subject DN
use=Use
defaultAdminInitiated=Default Admin-Initiated Action Lifespan
chooseAMapperType=Choose a mapper type
startTimeHelp=Defines the time before which the policy MUST NOT be granted. Only granted if current date/time is after or equal to this value.
noGroupsInThisRealm=No groups in this realm
searchUserByAttributeKeyAlreadyInUseError=Attribute key already in use
executorClientAuthenticator=Executor Client Authenticator
addWebOrigins=Add web origins
clientScopeExplain=Client scopes are a common set of protocol mappers and roles that are shared between multiple clients.
attributeNameHelp=Name of attribute to search for in assertion. You can leave this blank and specify a friendly name instead.
linkAccountTitle=Link account to {{provider}}
invalidateRotatedSuccess=Rotated secret successfully removed
userSessionAttributeHelp=Name of user session attribute you want to hardcode
updateSuccessIdentityProvider=Provider successfully updated
host=Host
forbidden_one=Forbidden, permission needed\:
backchannelLogoutRevokeOfflineSessions=Backchannel logout revoke offline sessions
supportedApplications=Supported applications
shortVerificationUriTooltipHelp=If set, this value will be return as verification_uri in Device Authorization flow. This uri need to redirect to {server-root}/realms/{realm}/device
kerberosPrincipal=Kerberos Principal
resourceAttribute=Resource attribute
addressClaim.region.label=User Attribute Name for Region
applyToResourceTypeFlagHelp=Specifies if this permission should be applied to all resources with a given type. In this case, this permission will be evaluated for all instances of a given resource type.
managePriorityInfo=Priority is the order of providers when doing a user lookup. You can drag the row handlers to change the priorities.
deletedErrorIdentityProvider=Could not delete the provider {{error}}
included.custom.audience.tooltip=This is used just if 'Included Client Audience' is not filled. The specified value will be included in audience (aud) field of the token. If there are existing audiences in the token, the specified value is just added to them. It won't override existing audiences.
includeInIdToken.label=Add to ID token
steps=Steps
tokenDeleteConfirm=Are you sure you want to permanently delete the initial access token {{id}}
flowCreateError=Could not create flow\: {{error}}
readTimeoutHelp=LDAP read timeout in milliseconds. This timeout applies for LDAP read operations.
registrationAccessTokenHelp=The registration access token provides access for clients to the client registration service.
host-sending-registration-request-must-match.tooltip=If on, any request to Client Registration Service is allowed just if it was sent from some trusted host or domain.
profilesConfigTypes.formView=Form view
validatorDeletedSuccess=Success\! User Profile configuration has been saved.
canonicalization=Canonicalization method
deleteConfirmTitle=Delete realm?
includeInAccessTokenResponse.label=Add to access token response
SSOSessionMax=SSO Session Max
clientScope=Client scope
inheritedFrom=Inherited from
clientScopeSearch.name=Name
deleteConditionSuccess=The condition has been deleted
clientProfile=Client profile details
syncAllUsers=Sync all users
allowedClockSkewHelp=Clock skew in seconds that is tolerated when validating identity provider tokens. Default value is zero.
disableConfirmIdentityProvider=Are you sure you want to disable the provider '{{provider}}'
clientSaveError=Client could not be updated\: {{error}}
tokenSaveError=Could not create initial access token {{error}}
certificate=Certificate
deleteConfirmExecutionMessage=Are you sure you want to permanently delete the execution "<1>{{name}}</1>".
offlineSessionMaxLimitedHelp=Enable offline session max
delete=Delete
userGroupsRetrieveStrategyHelp=Specify how to retrieve groups of user. LOAD_GROUPS_BY_MEMBER_ATTRIBUTE means that roles of user will be retrieved by sending LDAP query to retrieve all groups where 'member' is our user. GET_GROUPS_FROM_USER_MEMBEROF_ATTRIBUTE means that groups of user will be retrieved from 'memberOf' attribute of our user or from the other attribute specified by 'Member-Of LDAP Attribute'.
hour=Hour
connectionTimeoutHelp=LDAP connection timeout in milliseconds
repeat=Repeat
defaultSigAlgHelp=Default algorithm used to sign tokens for the realm
save-admin-events=If enabled, admin events are saved to the database, which makes events available to the Admin UI.
policyGroups=Specifies which user(s) are allowed by this policy.
searchForProtocol=Search protocol mapper
eventTypes.CLIENT_INFO.name=Client info
eventTypes.OAUTH2_DEVICE_CODE_TO_TOKEN.description=Oauth2 device code to token
eventTypes.UPDATE_TOTP_ERROR.name=Update totp error
client-updater-source-groups.tooltip=Name of groups to check. Condition evaluates to true if the entity, who creates/updates client is member of some of the specified groups. Configured groups are specified by their simple name, which must match to the name of the Keycloak group. No support for group hierarchy is used here.
webAuthnPolicyRpId=Relying party ID
ldapRolesDnHelp=LDAP DN where roles of this tree are saved. For example, 'ou\=finance,dc\=example,dc\=org'
serviceAccount=Service accounts roles
providerUpdatedSuccess=Client policy updated successfully
assertionConsumerServiceRedirectBindingURL=Assertion Consumer Service Redirect Binding URL
createClientScopeError=Could not create client scope\: '{{error}}'
deleteRole=Delete this role
SSOSessionSettings=SSO Session Settings
directAccessHelp=This enables support for Direct Access Grants, which means that client has access to username/password of user and exchange it directly with Keycloak server for access token. In terms of OAuth2 specification, this enables support of 'Resource Owner Password Credentials Grant' for this client.
groupHelp=Group to add the user in. Fill the full path of the group including path. For example\: '/root-group/child-group'.
clientPolicyNameHelp=Display name of the policy
addressClaim.country.label=User Attribute Name for Country
downloadType=this is information about the download type
clustering=Clustering
createSuccess=Identity provider successfully created
mapperAttributeName=Attribute Name
setPassword=Set password
client-updater-source-roles.tooltip=The condition is checked during client registration/update requests and it evaluates to true if the entity (usually user), who is creating/updating client is member of the specified role. For reference the realm role, you can use the realm role name like 'my_realm_role' . For reference client role, you can use the client_id.role_name for example 'my_client.my_client_role' will refer to client role 'my_client_role' of client 'my_client'.
createRole=Create role
clientDeletedSuccess=The client has been deleted
eventTypes.IDENTITY_PROVIDER_RESPONSE_ERROR.description=Identity provider response error
editModeLdapHelp=READ_ONLY is a read-only LDAP store. WRITABLE means data will be synced back to LDAP on demand. UNSYNCED means user data will be imported, but not synced back to LDAP.
enableServiceAccount=Enable service account roles
signOutAllActiveSessionsQuestion=Sign out all active sessions?
addPostLogoutRedirectUri=Add valid post logout redirect URIs
SSOSessionMaxRememberMe=SSO Session Max Remember Me
pkceMethod=PKCE Method
noRoles-user=No roles for this user
moveGroupEmptyInstructions=There are no sub groups, select 'Move here' to move the selected group as a subgroup of this group
hmacGenerated=hmac-generated
unlockSuccess=User successfully unlocked
unlockError=Could not unlock user due to {{error}}
hourHelp=Defines the hour when the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current hour is between or equal to the two values you provided.
deleteClientProfileConfirmTitle=Delete profile?
syncLDAPGroupsError=Data could not be synced due {{error}}
saveSuccess=User federation provider successfully saved
generatedAccessToken=Generated access token
resetPasswordConfirmation=New password confirmation
testConnection=Test connection
archiveFormat=Archive format
requestObjectEncryptionHelp=JWE algorithm, which client needs to use when sending OIDC request object specified by 'request' or 'request_uri' parameters. If set to 'any', encryption is optional and any algorithm is allowed.
importSuccess=New certificate imported
attributeConsumingServiceName=Attribute Consuming Service Name
invalidJsonError=Unable to save user profile, the provided information is not valid JSON.
promptHelp=Specifies whether the Authorization Server prompts the End-User for re-authentication and consent.
deleteBtn=Delete
defaultLocale=Default locale
addLdapWizardDescription=Text needed here
aggregate.attrs.label=Aggregate attribute values
removedGroupMembershipError=Error removing group membership
allowPasswordAuthenticationHelp=Enable/disable possibility of username/password authentication against Kerberos database
deleteExecutorSuccess=Success\! The executor was deleted.
eventTypes.SEND_RESET_PASSWORD_ERROR.name=Send reset password error
eventTypes.IDENTITY_PROVIDER_FIRST_LOGIN.name=Identity provider first login
noRoles-groups=No roles for this group
enableSwitchSuccess={{switch}} changed successfully
eventTypes.INTROSPECT_TOKEN_ERROR.name=Introspect token error
usernameHelperText=Enter the username of the user for this identity provider.
includeInAccessToken.tooltip=Should the claim be added to the access token?
noScopeCreateHint=You'll need to create an authorization scope first.
eventTypes.CLIENT_INITIATED_ACCOUNT_LINKING_ERROR.name=Client initiated account linking error
clientScopesCondition=Expected Scopes
backchannelLogoutSessionRequiredHelp=Specifying whether a sid (session ID) Claim is included in the Logout Token when the Backchannel Logout URL is used.
global=Global
userAttributeHelp=Name of user attribute you want to hardcode
searchForMapper=Search for mapper
oidcCibaGrantHelp=This enables support for OIDC CIBA Grant, which means that the user is authenticated via some external authentication device instead of the user's browser.
includeOneTimeUseCondition=Include OneTimeUse Condition
clientUpdaterSourceRoles=Updating entity role
enableSwitchError=Could not enable / disable due to {{error}}
deleteClientPolicyProfileConfirm=This action will permanently delete {{profileName}} from the policy {{policyName}}. This cannot be undone.
deleteExecutorProfileConfirm=The action will permanently delete {{executorName}}. This cannot be undone.
confirmClientSecretBody=If you regenerate secret, the Keycloak database will be updated and you will need to download a new adapter for this client.
keysList=Keys list
generatedUserInfo=Generated user info
clientRegistration=Client registration
masterSamlProcessingUrl=Master SAML Processing URL
samlIdentityProviderMetadata=SAML 2.0 Identity Provider Metadata
importParseError=Could not parse the file {{error}}
validTo=Valid to
addMember=Add member
eventTypes.CLIENT_INFO_ERROR.name=Client info error
scopeParameterHelp=You can copy/paste this value of scope parameter and use it in initial OpenID Connect Authentication Request sent from this client adapter. Default client scopes and selected optional client scopes will be used when generating token issued for this client
idTokenEncryptionKeyManagementAlgorithm=ID token encryption key management algorithm
authenticatorAttachment.not\ specified=Not specified
oidcCibaGrant=OIDC CIBA Grant
displayDescriptionHintHelp=A text that should be used as a tooltip when rendering user-facing forms.
ssoSessionIdle=Time a session is allowed to be idle before it expires. Tokens and browser sessions are invalidated when a session is expired.
searchKey=Search key
deleteClientSuccess=Client profile deleted
emptyClientScopesPrimaryAction=Add client scopes
addStepTo=Add step to {{name}}
eventTypes.AUTHREQID_TO_TOKEN_ERROR.description=Authreqid to token error
deleteAttributeConfirm=Are you sure you want to permanently delete the attribute {{attributeName}}?
chooseResources=Choose the resources you want to import
selectOne=Select an option
emailTheme=Email theme
eventTypes.UPDATE_PASSWORD.description=Update password
policiesConfigTypes.jsonEditor=JSON editor
eventConfigSuccessfully=Successfully saved configuration
scopePermissions.users.impersonate-description=Policies that decide if administrator can impersonate other users
deleteResourceWarning=The permissions below will be removed when they are no longer used by other resources\:
permissionScopesHelp=Specifies that this permission must be applied to one or more scopes.
moveTo=Move to
registerNodeManually=Register node manually
redirectURI=Redirect URI
publicKeys=Public keys
emptyEventsInstructions=There are no more events types left to add
periodicFullSync=Periodic full sync
removeConfirmTitle_other=Remove groups?
clientAccesstypeTooltip=Access Type of the client, for which the condition will be applied.
emptyBuiltInMappersInstructions=All built in mappers were added to this client
assertionLifespanHelp=Lifespan set in the SAML assertion conditions. After that time the assertion will be invalid. The "SessionNotOnOrAfter" attribute is not modified and continue using the "SSO Session Max" time defined at realm level.
noTokensInstructions=You haven't created any initial access tokens. Create an initial access token by clicking "Create".
editUsername=If enabled, the username field is editable, readonly otherwise.
ldapAttributeValueHelp=Value of the LDAP attribute, which will be added to the new user during registration. You can either hardcode any value like 'foo' but you can also use some special tokens. Only supported token right now is '${RANDOM}', which will be replaced with some randomly generated string.
lastRegistration=Last registration
advancedSettingsOpenid-connect=This section is used to configure advanced settings of this client related to OpenID Connect protocol
requireSsl=Require SSL
reevaluate=Re-evaluate
clientOfflineSessionMax=Client Offline Session Max
eventTypes.SEND_VERIFY_EMAIL.description=Send verify email
eventTypes.REVOKE_GRANT_ERROR.description=Revoke grant error
descriptionLanding=This is the description for the user federation landing page
moveHere=Move here
noKeys=No keys
batchSizeHelp=Count of LDAP users to be imported from LDAP to Keycloak within a single transaction
createClientConditionSuccess=Condition created successfully.
kerberosKeyTab=Kerberos Key Tab
principalAttribute=Principal attribute
mapperTypeLdapAttributeMapperHelp=This mapper is supported just if syncRegistrations is enabled. New users registered in Keycloak will be written to the LDAP with the hardcoded value of some specified attribute.
userRegistrationHelpText=Enable/disable the registration page. A link for registration will show on login page too.
activeHelp=Set if the keys can be used for signing
addMapperExplain=If you want more fine-grain control, you can create protocol mapper on this client
realmRoles=Realm roles
fineGrainOpenIdConnectConfigurationHelp=This section is used to configure advanced settings of this client related to OpenID Connect protocol.
searchForUserDescription=This realm may have a federated provider. Viewing all users may cause the system to slow down, but it can be done by searching for "*". Please search for a user above.
expirationHelp=Sets the expiration for events. Expired events are periodically deleted from the database.
webAuthnPolicySignatureAlgorithmsHelp=What signature algorithms should be used for Authentication Assertion.
setToNowError=Error\! Failed to set notBefore to current date and time.
eventTypes.UNREGISTER_NODE_ERROR.description=Unregister node error
clientScopeTypes.optional=Optional
nameIdFormat=Name ID format
eventTypes.SEND_VERIFY_EMAIL_ERROR.name=Send verify email error
addMessageBundleSuccess=Success\! The message bundle has been added.
validRedirectUri=Valid redirect URIs
webauthnIntro=What is this form used for?
wantAssertionsEncryptedHelp=Indicates whether this service provider expects an encrypted Assertion.
roleObjectClasses=Role object classes
deleteClientScope_other=Delete {{count}} client scopes
deleteCredentialsConfirmTitle=Delete credentials?
expires=Expires
OVERWRITE=Overwrite
user-clearEvents=Deletes all user events in the database.
eventTypes.REFRESH_TOKEN.name=Refresh token
userAttribute=User Attribute
revoke=Revoke
admin=Admin
syncUsersError=Could not sync users\: '{{error}}'
generatedAccessTokenHelp=See the example access token, which will be generated and sent to the client when selected user is authenticated. You can see claims and roles that the token will contain based on the effective protocol mappers and role scope mappings and also based on the claims/roles assigned to user himself
webAuthnPolicyAcceptableAaguidsHelp=The list of AAGUID of which an authenticator can be registered.
keyPasswordHelp=Password for the private key
frontchannelLogout=Front channel logout
clientUpdaterTrustedHostsTooltip=List of Hosts, which are trusted. In case that client registration/update request comes from the host/domain specified in this configuration, condition evaluates to true. You can use hostnames or IP addresses. If you use star at the beginning (for example '*.example.com' ) then whole domain example.com will be trusted.
titleRoles=Realm roles
mapperTypeGroupLdapMapperHelp=Used to map group mappings of groups from some LDAP DN to Keycloak group mappings
sectorIdentifierUri.tooltip=Providers that use pairwise sub values and support Dynamic Client Registration SHOULD use the sector_identifier_uri parameter. It provides a way for a group of websites under common administrative control to have consistent pairwise sub values independent of the individual domain names. It also provides a way for Clients to change redirect_uri domains without having to reregister all their users.
eventTypes.REVOKE_GRANT.name=Revoke grant
rdnLdapAttribute=RDN LDAP attribute
usedBy=Used by
replyToDisplayName=Reply to display name
xRobotsTag=X-Robots-Tag
bindType=Bind type
tokenDeleteSuccess=Initial access token deleted successfully
contextualInfo=Contextual Information
syncModeHelp=Default sync mode for all mappers. The sync mode determines when user data will be synced using the mappers. Possible values are\: 'legacy' to keep the behaviour before this option was introduced, 'import' to only import the user once during first login of the user with this identity provider, 'force' to always update the user during every login with this identity provider.
temporaryPassword=Temporary
applyPolicyHelp=Specifies all the policies that must be applied to the scopes defined by this policy or permission.
addKerberosWizardDescription=Text needed here
sslType.none=None
dateTo=Date(to)
eventTypes.REVOKE_GRANT.description=Revoke grant
keyPlaceholder=Type a key
eventTypes.OAUTH2_DEVICE_VERIFY_USER_CODE_ERROR.name=Oauth2 device verify user code error
addAuthnContextDeclRef=Add AuthnContext DeclRef
eventTypes.SEND_IDENTITY_PROVIDER_LINK.description=Send identity provider link
eventTypes.IDENTITY_PROVIDER_RETRIEVE_TOKEN.name=Identity provider retrieve token
userInfo=User info
consentScreenText=Consent screen text
addRoles=Add roles
clientPoliciesProfilesHelpText=Client Profile allows to setup set of executors, which are enforced for various actions done with the client. Actions can be admin actions like creating or updating client, or user actions like authentication to the client.
archiveFormatHelp=Java keystore or PKCS12 archive format.
xContentTypeOptions=X-Content-Type-Options
groupsDescription=A group is a set of attributes and role mappings that can be applied to a user. You can create, edit, and delete groups and manage their child-parent organization.
addValidatorRole=Add {{validatorName}} validator
protocolTypes.all=All
keyAlias=Key alias
prefix=A prefix for each Realm Role (optional).
xContentTypeOptionsHelp=Default value prevents Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type <1>Learn more</1>
privateKeyMask=PRIVATE KEY NOT SET UP OR KNOWN
signOutAllActiveSessions=Sign out all active sessions
addExecutorSuccess=Success\! Executor created successfully
executorTypeSelectHelpText=Executor Type Select Help Text
useDiscoveryEndpointHelp=If this setting is enabled, the discovery endpoint will be used to fetch the provider config. Keycloak can load the config from the endpoint and automatically update the config if the source has any updates
eventTypes.USER_INFO_REQUEST_ERROR.name=User info request error
createUserProviderError=User federation provider could not be created\: {{error}}
learnMore=Learn more
onDragCancel=Dragging cancelled. List is unchanged.
removeUser=Remove users
ownerManagedAccess=User-Managed access enabled
eventTypes.USER_DISABLED_BY_PERMANENT_LOCKOUT.description=User disabled by permanent lockout
eventTypes.USER_DISABLED_BY_PERMANENT_LOCKOUT_ERROR.description=User disabled by permanent lockout error
userModelAttributeNameHelp=Name of the model attribute to be added when importing user from LDAP
templateHelp=Template to use to format the username to import. Substitutions are enclosed in ${}. For example\: '${ALIAS}.${CLAIM.sub}'. ALIAS is the provider alias. CLAIM.<NAME> references an ID or Access token claim. The substitution can be converted to upper or lower case by appending |uppercase or |lowercase to the substituted value, e.g. '${CLAIM.sub | lowercase}
permissions=Permissions
emptyExecutionInstructions=You can start defining this flow by adding a sub-flow or an execution
offlineSessionSettings=Offline session settings
unAssignRole=Unassign
deleteScope=Permanently delete authorization scope?
eventTypes.CODE_TO_TOKEN.description=Code to token
oAuthDevicePollingIntervalHelp=The minimum amount of time in seconds that the client should wait between polling requests to the token endpoint.
passwordDataTitle=Password data
accountThemeHelp=Select a theme for the user account management console.
clientPolicies=Client policies
NONE=NONE
keystorePasswordHelp=Password for the keys
clientSettings=Client details
deleteClientPolicyConditionConfirm=This action will permanently delete {{condition}}. This cannot be undone.
selectATheme=Select a theme
permissionsList=Permission list
attributeGroupHelp=user.profile.attribute.group.tooltip
createRealm=Create realm
eventTypes.VALIDATE_ACCESS_TOKEN_ERROR.description=Validate access token error
mapperSaveError=Error saving mapper\: {{error}}
eventTypes.CLIENT_LOGIN_ERROR.name=Client login error
passwordPoliciesHelp.passwordHistory=Prevents a recently used password from being reused.
displayOnConsentScreenHelp=If on, and this client scope is added to some client with consent required, the text specified by 'Consent Screen Text' will be displayed on consent screen. If off, this client scope will not be displayed on the consent screen
requirements.DISABLED=Disabled
mapperTypeHardcodedLdapGroupMapperHelp=Users imported from LDAP will be automatically added into this configured group.
titleUsers=Users
whoWillAppearLinkText=Who will appear in this group list?
ldapFullNameAttribute=LDAP full name attribute
createClientError=Could not create client\: '{{error}}'
deleteConfirmClientScopes=Are you sure you want to delete this client scope
forceAuthenticationHelp=Indicates whether the identity provider must authenticate the presenter directly rather than rely on a previous security context.
testClusterAvailability=Test cluster availability
reGenerateSigning=Regenerate signing key for this client
authorizationEncryptedResponseAlgHelp=JWA Algorithm used for key management in encrypting the authorization response when the response mode is jwt. This option is needed if you want encrypted authorization response. If left empty, the authorization response is just signed, but not encrypted.
deleteConfirmGroup_other=Are you sure you want to delete these groups.
scopePermissions.users.manage-description=Policies that decide if an administrator can manage all users in the realm
defaultACRValuesHelp=Default values to be used as voluntary ACR in case that there is no explicit ACR requested by 'claims' or 'acr_values' parameter in the OIDC request.
membershipAttributeType=Membership attribute type
eventTypes.PUSHED_AUTHORIZATION_REQUEST.name=Pushed authorization request
included.client.audience.tooltip=The Client ID of the specified audience client will be included in audience (aud) field of the token. If there are existing audiences in the token, the specified value is just added to them. It won't override existing audiences.
searchGroup=Search group
allowCreateHelp=Allow the external identity provider to create a new identifier to represent the principal.
allResults=All results
addressClaim.locality.tooltip=Name of User Attribute, which will be used to map to 'locality' subclaim inside 'address' token claim. Defaults to 'locality' .
keyForCodeExchangeHelp=Choose which code challenge method for PKCE is used. If not specified, keycloak does not applies PKCE to a client unless the client sends an authorization request with appropriate code challenge and code exchange method.
includeInAccessTokenResponse.tooltip=Should the claim be added to the access token response? Should only be used for informative and non-sensitive data
removeMappingConfirm_one=Are you sure you want to remove this role?
oidcSettings=OpenID Connect settings
otpPolicyDigitsHelp=How many digits should the OTP have?
clientAuthentications.client_secret_post=Client secret sent as post
prompts.select_account=Select account
defaultACRValues=Default ACR Values
valueError=A value must be provided.
noConsents=No consents
orderChangeSuccessUserFed=Successfully changed the priority order of user federation providers
noUsersEmptyStateDescriptionContinued=to find them. Users that already have this role as an effective role cannot be added here.
userProviderSaveError=User federation provider could not be saved\: {{error}}
executorsHelpText=Executors, which will be applied for this client profile
ldapSearchingAndUpdatingSettings=LDAP searching and updating
authenticationAliasHelp=Name of the configuration
SSOSessionIdle=SSO Session Idle
deleteClientPolicyConditionConfirmTitle=Delete condition?
initialCounterErrorHint=Value needs to be between 1 and 120
connectionTimeout=Connection timeout
passLoginHintHelp=Pass login_hint to identity provider.
monthHelp=Defines the month which the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current month is between or equal to the two values you provided.
eventTypes.CLIENT_LOGIN.description=Client login
registrationAccessToken=Registration access token
headerName=header name
issuerHelp=The issuer identifier for the issuer of the response. If not provided, no validation will be performed.
uiDisplayNameHelp=Display name of provider when linked in the Admin UI
titleSessions=Sessions
dedicatedScopeName={{clientName}}-dedicated
mapperTypeUserAttributeLdapMapper=user-attribute-ldap-mapper
deleteAttributeConfirmTitle=Delete attribute?
importSkipped_zero=No records skipped.
rootURL=Root URL appended to relative URLs
contentSecurityPolicyHelp=Default value prevents pages from being included by non-origin iframes <1>Learn more</1>
policyUsers=Specifies which user(s) are allowed by this policy.
logoutServicePostBindingURLHelp=SAML POST Binding URL for the client's single logout service. You can leave this blank if you are using a different binding
generatedIdTokenNo=No generated id token
byConfiguration=By configuration
usersAdded_other={{count}} users added to the group
userFedUnlinkUsersConfirmTitle=Unlink all users?
passCurrentLocale=Pass current locale
realmNameField=Realm name
roleCreated=Role created
socialProfileJSONFieldPath=Social Profile JSON Field Path
noViewRights=You do not have rights to view this group.
eventTypes.SEND_RESET_PASSWORD.description=Send reset password
eventTypes.CLIENT_INITIATED_ACCOUNT_LINKING.name=Client initiated account linking
resourceScopeError=Could not remove the authorization scope due to {{error}}
identityInformation=Identity Information
usermodel.clientRoleMapping.rolePrefix.label=Client Role prefix
partialImport=Partial import
cibaBackhannelTokenDeliveryModes.ping=Ping
includeInTokenScopeHelp=If on, the name of this client scope will be added to the access token property 'scope' as well as to the Token Introspection Endpoint response. If off, this client scope will be omitted from the token and from the Token Introspection Endpoint response.
savePassword=Save password
noRolesInstructions-user=You haven't assigned any roles to this user. Assign a role to get started.
signatureKeyNameHelp=Signed SAML documents contain identification of signing key in KeyName element. For Keycloak / RH-SSO counterparty, use KEY_ID, for MS AD FS use CERT_SUBJECT, for others check and use NONE if no other option works.
sync-keycloak-roles-to-ldap=Sync Keycloak roles to LDAP
decisionStrategies.UNANIMOUS=Unanimous
cacheSettingsDescription=This section contains options useful for caching users, which were loaded from this user storage provider.
groupsPathHelp=Keycloak group path the LDAP groups are added to. For example if value '/Applications/App1' is used, then LDAP groups will be available in Keycloak under group 'App1', which is child of top level group 'Applications'. The default value is '/' so LDAP groups will be mapped to the Keycloak groups at the top level. The configured group path must already exist in the Keycloak when creating this mapper.
aesGenerated=aes-generated
addPolicy=Add policy
tokenClaimName.label=Token Claim Name
executorsTable=Executors table
extendToChildren=Extend to children
from=From
decisionStrategyHelp=The decision strategy dictates how permissions are evaluated and how a final decision is obtained. 'Affirmative' means that at least one permission must evaluate to a positive decision in order to grant access to a resource and its scopes. 'Unanimous' means that all permissions must evaluate to a positive decision in order for the final decision to be also positive.
deleteClientPolicyProfileError=Could not delete profile from the policy\: {{error}}
greaterThan=Must be greater than {{value}}
hideOnLoginPage=Hide on login page
couldNotCreateGroup=Could not create group {{error}}
defaultRole=This role serves as a container for both realm and client default roles. It cannot be removed.
eventConfigs=Event configs
conditionsHelp=Conditions, which will be evaluated to determine if client policy should be applied during particular action or not.
disableProvider=Disable provider?
eventTypes.UNREGISTER_NODE.name=Unregister node
anonymousAccessPoliciesHelp=Those Policies are used when the Client Registration Service is invoked by unauthenticated request. This means that the request does not contain Initial Access Token nor Bearer Token.
clientScopeError=Could not update scope mapping {{error}}
saveRealmSuccess=Realm created successfully
createToken=Create initial access token
clientsClientTypeHelp='OpenID Connect' allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server.'SAML' enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO) and uses security tokens containing assertions to pass information.
orderChangeSuccess=Successfully changed display order of identity providers
emptyPoliciesInstructions=If you want to create a policy, please click the button below to create the policy.
createScopeSuccess=Authorization scope created successfully
logoUrl=Logo URL
accessTokenLifespanImplicitFlowHelp=Max time before an access token issued during OpenID Connect Implicit Flow is expired. This value is recommended to be shorter than the SSO timeout. There is no possibility to refresh token during implicit flow, that's why there is a separate timeout different to 'Access Token Lifespan'
noRealmRolesToAssign=There are no realm roles to assign
logoutUrl=Logout URL
regexPatternHelp=Specifies the regex pattern.
searchForUserEvent=Search user event
usernameLdapAttributeHelp=Name of the LDAP attribute, which is mapped as Keycloak username. For many LDAP server vendors it can be 'uid'. For Active directory it can be 'sAMAccountName' or 'cn'. The attribute should be filled for all LDAP user records you want to import from LDAP to Keycloak.
federationLink=Federation link
webAuthnPolicyPasswordlessFormHelp=Policy for passwordless WebAuthn authentication. This one will be used by 'Webauthn Register Passwordless' required action and 'WebAuthn Passwordless Authenticator' authenticator. Typical usage is, when WebAuthn will be used as first-factor authentication. Having both 'WebAuthn Policy' and 'WebAuthn Passwordless Policy' allows to use WebAuthn as both first factor and second factor authenticator in the same realm.
unlinkUsersError=Could not unlink users\: '{{error}}'
roleHelpHelp=Role to grant to user. Click 'Select Role' button to browse roles, or just type it in the textbox. To reference an application role the syntax is appname.approle, i.e. myapp.myrole.
storedTokensReadable=Stored tokens readable
defaultRoleDeleteError=You cannot delete a default role.
unknownUser=Anonymous
displayHeaderField=Display name
userVerify.not\ specified=Not specified
usermodel.prop.label=Property
userFedUnlinkUsersConfirm=Do you want to unlink all the users? Any users without a password in the database will not be able to authenticate anymore.
searchUserByAttributeDescription=It supports setting multiple attributes as the search filter by setting different keys or values. Only one value can be typed for a key.
eventTypes.REMOVE_FEDERATED_IDENTITY.name=Remove federated identity
membership=Membership
eventTypes.RESET_PASSWORD.description=Reset password
authenticationOverrides=Authentication flow overrides
client-scopes-condition.label=Expected Scopes
deleteAttributeSuccess=Attribute deleted
artifactResolutionService=Artifact Resolution Service
clientProfilesSubTab=Client profiles subtab
selectEncryptionType=Select Encryption type
mapperTypeMsadLdsUserAccountControlMapper=msad-user-account-control-mapper
realmSettingsExplain=Realm settings are settings that control the options for users, applications, roles, and groups in the current realm.
mappingUpdatedError=Could not update mapping\: '{{error}}'
manageDisplayOrder=Manage display order
exactSearch=Exact search
value=Value
filenamePlaceholder=Upload a PEM file or paste key below
deleteConfirm_one=Are you sure you want to delete this group '{{groupName}}'.
userProfileEnabledHelp=If enabled, allows managing user profiles.
scopeDisplayNameHelp=A unique name for this scope. The name can be used to uniquely identify a scope, useful when querying for a specific scope.
times.seconds=Seconds
removeMappingTitle=Remove role?
executorTypeSelectAlgorithm=Executor Type Select Algorithm
resources=Resources
userRolesRetrieveStrategy=User roles retrieve strategy
importKey=Import key
events-disable-title=Unsave events?
ellipticCurve=Elliptic Curve
forceArtifactBindingHelp=Should response messages be returned to the client through the SAML ARTIFACT binding system?
forceAuthentication=Force authentication
connectionPoolingHelp=Determines if Keycloak should use connection pooling for accessing LDAP server.
unlink=Unlink
groupRemove_other=Groups removed
claimFilterName=Essential claim
deletePolicy=Permanently delete policy?
assertionConsumerServiceRedirectBindingURLHelp=SAML Redirect Binding URL for the client's assertion consumer service (login responses). You can leave this blank if you do not have a URL for this binding.
searchFor=Search role by name
providers=Add providers
writeOnly=Write only
noRolesInstructions-clientScopes=You haven't created any roles for this client scope. Create a role to get started.
removeImportedUsersMessage=Do you really want to remove all imported users? The option "Unlink users" makes sense just for the Edit Mode "Unsynced" and there should be a warning that "unlinked" users without the password in Keycloak database won't be able to authenticate.
noGroupsInThisSubGroup=No groups in this sub group
validateUserObjectClasses=You must enter one or more user object classes
encryptionAlgorithm=Encryption Algorithm
requiredForLabel.users=Only users
groupUpdated=Group updated
hideMetaData=Hide metadata
customAttribute=Custom Attribute…
themes=Themes
clientType=Client type
addClientScope=Add client scope
notBeforeSuccess=Success\! "Not before" set for realm
clientPoliciesSubTab=Client policies subtab
quickLoginCheckMilliSecondsHelp=If a failure happens concurrently too quickly, lock out the user.
unanimous=Unanimous
policy-name=The name of this policy.
syncRegistrations=Sync Registrations
eventTypes.REMOVE_TOTP.name=Remove totp
clientHelp=Select the client making this authorization request. If not provided, authorization requests would be done based on the client you are in.
eventTypes.CLIENT_REGISTER_ERROR.name=Client register error
unlockUsersError=Could not unlock all users {{error}}
serviceProviderEntityIdHelp=The Entity ID that will be used to uniquely identify this SAML Service Provider.
disabledFeatures=Disabled features
eventTypes.UPDATE_CONSENT_ERROR.name=Update consent error
noAdminUrlSet=No push sent. No admin URI configured or no registered cluster nodes available
authData=Authorization data
realmInfo=Realm info
chooseAPolicyType=Choose a policy type
signOut=Sign out
deleteExecutorError=Could not delete executor\: {{error}}
userProfileError=Could not update user profile settings\: {{error}}
validatorDialogColNames.colName=Role name
clientUpdaterSourceRolesTooltip=The condition is checked during client registration/update requests and it evaluates to true if the entity (usually user), who is creating/updating client is member of the specified role. For reference the realm role, you can use the realm role name like 'my_realm_role' . For reference client role, you can use the client_id.role_name for example 'my_client.my_client_role' will refer to client role 'my_client_role' of client 'my_client'.
UPDATE_PASSWORD=Update password (UPDATE_PASSWORD)
version=Version
synchronizationSettings=Synchronization settings
certificateHelp=Client Certificate for validate JWT issued by client and signed by Client private key from your keystore.
resetPasswordError=Error resetting password\: {{error}}
associatedPermissions=Associated permission
encryptionKeysConfigExplain=If you enable the "Encryption assertions" below, you must configure the encryption keys by generating or importing keys, and the SAML assertions will be encrypted with the client's public key using AES.
preserveGroupInheritanceHelp=Flag whether group inheritance from LDAP should be propagated to Keycloak. If false, then all LDAP groups will be mapped as flat top-level groups in Keycloak. Otherwise group inheritance is preserved into Keycloak, but the group sync might fail if LDAP structure contains recursions or multiple parent groups per child groups.
createScopeBasedPermission=Create scope-based permission
showMore=Show more
operationType=Operation type
userInitiatedActionLifespan=User-Initiated Action Lifespan
decisionStrategy=Decision strategy
roleMappingUpdatedSuccess=Role mapping updated
securityDefences=Security defenses
realmSettings=Realm settings
emptyStateInstructions=If you want to add an attributes group click the button below.
logoutAllSessionsError=Error\! Failed to log out of all sessions\: {{error}}.
eventTypes.VERIFY_EMAIL_ERROR.name=Verify email error
partialExport=Partial export
eventTypes.CLIENT_REGISTER.description=Client register
generalOptions=General options
decisionStrategies.AFFIRMATIVE=Affirmative
helpEnabled=Help on
defaultGroupsHelp=Default groups allow you to automatically assign groups membership whenever any new user is created or imported through <1>identity brokering</1>.
times.years=Years
userLdapFilterHelp=Additional LDAP filter for filtering searched users. Leave this empty if you don't need an additional filter. Make sure that it starts with '(' and ends with ')'.
generatedIdToken=Generated ID token
effectiveRoleScopeMappings=Effective role scope mappings
clientAuthenticator=Client Authenticator
importAdded_other={{count}} records added.
oAuthDeviceCodeLifespanHelp=Max time before the device code and user code are expired. This value needs to be a long enough lifetime to be usable (allowing the user to retrieve their secondary device, navigate to the verification URI, login, etc.), but should be sufficiently short to limit the usability of a code obtained for phishing.
dynamicScopeHelp=If on, this scope will be considered a Dynamic Scope, which will be comprised of a static and a variable portion.
attributePermissionDescription=This section contains permissions for who can edit and who can view the attribute.
providerDetails=Provider details
groupDeleteError=Error deleting group {{error}}
editGroupText=Edit attributes group
updateFirstLoginHelp=Update profile on first login
deleteGroup=Delete group
eventTypes.VERIFY_EMAIL_ERROR.description=Verify email error
close=Close
usersDNHelp=Full DN of LDAP tree where your users are. This DN is the parent of LDAP users. It could be for example 'ou\=users,dc\=example,dc\=com' assuming that your typical user will have DN like 'uid\='john',ou\=users,dc\=example,dc\=com'.
addKeycloakOpenIdProvider=Add Keycloak OpenID Connect provider
clientSessionMax=Client Session Max
deleteClientPolicy=Delete client policy
authenticatorAttachment.cross-platform=Cross platform
whoCanView=Who can view?
lastAccess=Last access
emptyClientScopesInstructions=There are currently no client scopes linked to this client. You can add existing client scopes to this client to share protocol mappers and roles.
clientAuthentications.private_key_jwt=JWT signed with private key
uiDisplayName=UI display name
createClientSuccess=Client created successfully
adminEventsSettings=Admin events settings
cibaInterval=Interval
totalMemory=Total memory
usernameTemplateImporter=Format the username to import.
resourceNameHelp=A unique name for this resource. The name can be used to uniquely identify a resource, useful when querying for a specific resource.
times.minutes=Minutes
disableUserInfo=Disable user info
authorizationEncryptedResponseEnc=Authorization response encryption content encryption algorithm
editCondition=Edit condition
ssoSessionMaxRememberMe=Max time before a session is expired when a user has set the remember me option. Tokens and browser sessions are invalidated when a session is expired. If not set it uses the standard SSO Session Max value.
forcePostBinding=Force POST binding
usersExplain=Users are the users in the current realm.
passMaxAgeHelp=Pass max_age to identity provider.
exportFail=Could not export realm\: '{{error}}'
flowTypeHelp=What kind of form is it
targetHelp=Destination field for the mapper. LOCAL (default) means that the changes are applied to the username stored in local database upon user import. BROKER_ID and BROKER_USERNAME means that the changes are stored into the ID or username used for federation user lookup, respectively.
setPasswordConfirm=Set password?
attributeDisplayNameHelp=Display name for the attribute. Supports keys for localized values as well. For example\: ${profile.attribute.phoneNumber}.
assignedType=Assigned type
modeHelp=LDAP_ONLY means that all group mappings of users are retrieved from LDAP and saved into LDAP. READ_ONLY is Read-only LDAP mode where group mappings are retrieved from both LDAP and DB and merged together. New group joins are not saved to LDAP but to DB. IMPORT is Read-only LDAP mode where group mappings are retrieved from LDAP just at the time when user is imported from LDAP and then they are saved to local keycloak DB.
identityProvider=Identity provider
forgotPasswordHelpText=Show a link on login page for user to click when they have forgotten their credentials.
identityProviderLinks=Identity provider links
mapperTypeMsadLdsUserAccountControlMapperHelp=Mapper specific to MSAD LDS. It's able to integrate the MSAD LDS user account state into Keycloak account state (account enabled, password is expired etc). It's using msDS-UserAccountDisabled and pwdLastSet is 0, the Keycloak user is required to update password, if msDS-UserAccountDisabled is 'TRUE' the Keycloak user is disabled as well etc. Mapper is also able to handle exception code from LDAP user authentication.
leave=Leave
loginSettings=Login settings
deleteMessageBundleError=Error removing the message from the bundle, {{error}}
finish=Finish
eventTypes.LOGIN_ERROR.name=Login error
validations=Validations
updatedRequiredActionError=Could not update required action\: {{error}}
createChildGroup=Create child group
x509Certificate=X509 Certificate
addressClaim.formatted.label=User Attribute Name for Formatted Address
metadataOfDiscoveryEndpoint=Metadata of the discovery endpoint
add=Add
createPolicySuccess=Successfully created the policy
notVerified=Not verified
encryptionKeysConfig=Encryption keys config
updateClientProfileSuccess=Client profile updated successfully
openIDEndpointConfiguration=OpenID Endpoint Configuration
prompts.login=Login
users=Users
keyTabHelp=Location of Kerberos KeyTab file containing the credentials of server principal. For example, /etc/krb5.keytab
wantAssertionsEncrypted=Want Assertions encrypted
noClientPoliciesInstructions=There are no client policies. Select 'Create client policy' to create a new client policy.
deleteValidatorConfirmMsg=Are you sure you want to permanently delete the validator {{validatorName}}?
uris=URIs
jwksUrlConfig=JWKS URL configs
forceNameIdFormatHelp=Ignore requested NameID subject format and use Admin UI configured one.
validateKeyTab=You must enter a key tab
editUsernameAllowed=Edit username
searchType.attribute=Attribute search
saveProviderError=Error saving provider\: {{error}}
port=Port
searchForPermission=Search for permission
ldapFilterHelp=LDAP Filter adds an additional custom filter to the whole query for retrieve LDAP groups. Leave this empty if no additional filtering is needed and you want to retrieve all groups from LDAP. Otherwise make sure that filter starts with '(' and ends with ')'.
clientUpdaterSourceGroupsTooltip=Name of groups to check. Condition evaluates to true if the entity, who creates/updates client is member of some of the specified groups. Configured groups are specified by their simple name, which must match to the name of the Keycloak group. No support for group hierarchy is used here.
addRequestUri=Add valid request URIs
selectACondition=Select a condition
ldapAttributeValue=LDAP attribute value
jwksUrlHelp=URL where identity provider keys in JWK format are stored. See JWK specification for more details. If you use external Keycloak identity provider, you can use URL like 'http\://broker-keycloak\:8180/realms/test/protocol/openid-connect/certs' assuming your brokered Keycloak is running on 'http\://broker-keycloak\:8180' and its realm is 'test' .
eventTypes.CLIENT_DELETE.description=Client delete
emptyResources=No resources
roleHelp=Role to grant to user if all attributes are present. Click 'Select Role' button to browse roles, or just type it in the textbox. To reference a client role the syntax is clientname.clientrole, i.e. myclient.myrole
ldapSynchronizationSettingsDescription=This section contains options related to synchronization of users from LDAP to the Keycloak database.
addPredefinedMappers=Add predefined mappers
updatedRequiredActionSuccess=Updated required action successfully
roles=Roles
displayOrder=Display order
registrationAllowed=User registration
choose=Choose...
appliedByProviders=Applied by the following providers
saveEventListenersSuccess=Event listener has been updated.
eventTypes.IDENTITY_PROVIDER_LINK_ACCOUNT.description=Identity provider link account
eventTypes.TOKEN_EXCHANGE.name=Token exchange
skipped=Skipped
eventTypes.RESTART_AUTHENTICATION.description=Restart authentication
scopePermissions.users.manage-group-membership-description=Policies that decide if an administrator can manage group membership for all users in the realm. This is used in conjunction with specific group policy
loginTheme=Login theme
eventTypes.UPDATE_PASSWORD_ERROR.description=Update password error
deleteConfirmRealmSetting=If you delete this realm, all associated data will be removed.
scope=Scope
evaluateExplain=This page allows you to see all protocol mappers and role scope mappings
providerCreateError=Could not create client policy due to {{error}}
includeRepresentationHelp=Include JSON representation for create and update requests.
searchForClientScope=Search for client scope
removeAttribute=Remove attribute
deleteProviderSuccess=Success. The provider has been deleted.
sessionsType.offline=Offline
validatorDeletedError=Error saving User Profile\: {{error}}
preserveGroupInheritance=Preserve group inheritance
createClientScopeSuccess=Client scope created
selectOrTypeAKey=Select or type a key
resourceDetails=Resource details
authorizationScopes=Authorization scopes
fromDisplayNameHelp=A user-friendly name for the 'From' address (optional).
identityProviderEntityIdHelp=The Entity ID used to validate the Issuer for received SAML assertions. If empty, no Issuer validation is performed.
noRoles-client=No roles for this client
eventTypes.EXECUTE_ACTION_TOKEN_ERROR.name=Execute action token error
eventTypes.USER_INFO_REQUEST_ERROR.description=User info request error
policyRoles=Specifies the client roles allowed by this policy.
roleMapping=Role mapping
accountLinkingOnlyHelp=If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider
refreshTokenMaxReuseHelp=Maximum number of times a refresh token can be reused. When a different token is used, revocation is immediate.
eventTypes.REMOVE_FEDERATED_IDENTITY.description=Remove federated identity
childGroups=Child groups
eventTypes.IDENTITY_PROVIDER_LOGIN.name=Identity provider login
exportAuthDetailsError=Error exporting authorization details\: {{error}}
clientOfflineSessionIdleHelp=Time a client offline session is allowed to be idle before it expires. Offline tokens are invalidated when a client offline session is expired. The option does not affect the global user SSO session. If not set, it uses the realm Offline Session Idle value.
selectGroups=Select groups to join
webAuthnPolicyAuthenticatorAttachmentHelp=Communicates to an authenticator an acceptable attachment pattern.
username=Username
mappedGroupAttributes=Mapped group attributes
localization=Localization
importConfig=Import config from file
replyToDisplayNameHelp=A user-friendly name for the 'Reply-To' address (optional).
webAuthnPolicyRpIdHelp=This is ID as WebAuthn Relying Party. It must be origin's effective domain.
signingKeysConfigExplain=If you enable the "Client signature required" below, you must configure the signing keys by generating or importing keys, and the client will sign their saml requests and responses. The signature will be validated.
newClientProfile=Create client profile
consoleDisplayConnectionUrlHelp=Connection URL to your LDAP server
enabledWhen=Enabled when
clientAssertionSigningAlg=Client assertion signature algorithm
homeURLHelp=Default URL to use when the auth server needs to redirect or link back to the client.
ldapAttribute=LDAP attribute
fullScopeAllowedHelp=Allows you to disable all restrictions.
eventTypes.SEND_IDENTITY_PROVIDER_LINK_ERROR.description=Send identity provider link error
otpType=OTP type
algorithm=Algorithm
grantedScopes=Granted scopes
groupNameLdapAttribute=Group name LDAP attribute
deleteProviderConfirm=Are you sure you want to permanently delete the key provider {{provider}}?
removeConfirmTitle_one=Remove group?
eventTypes.PUSHED_AUTHORIZATION_REQUEST_ERROR.description=Pushed authorization request error
includeInTokenScope=Include in token scope
eventType=Event saved type
tokenDeleteConfirmTitle=Delete initial access token?
useRefreshTokenForClientCredentialsGrant=Use refresh tokens for client credentials grant
userDetails=User details
sectorIdentifierUri.label=Sector Identifier URI
inputTypeStep=Input step size
mapperTypeHelp=Used to map single attribute from LDAP user to attribute of UserModel in Keycloak DB
importWarning=The data and settings imported above may overwrite the data and settings that already exist.
kerberosRequiredSettingsDescription=This section contains a few basic options common to all user storage providers.
resetPasswordFor=Reset password for {{username}}
duplicateEmailsAllowed=Duplicate emails
deleteEventsConfirm=If you clear all events of this realm, all records will be permanently cleared in the database
noGroupsInThisRealmInstructions=You haven't created any groups in this realm. Create a group to get started.
eventTypes.REMOVE_TOTP_ERROR.name=Remove totp error
groupUpdateError=Error updating group {{error}}
logoutAllSessions=Logout all sessions
membershipUserLdapAttribute=Membership user LDAP attribute
noKeysDescription=You haven't created any active keys
rememberMeHelpText=Show checkbox on login page to allow user to remain logged in between browser restarts until session expires.
eventTypes.UPDATE_EMAIL.name=Update email
notBeforeHelp=Revoke any tokens issued before this time for this client. To push the policy, you should set an effective admin URL in the Settings tab first.
protocolTypes.saml=SAML
idTokenSignatureAlgorithm=ID token signature algorithm
displayHeaderHintHelp=A user-friendly name for the group that should be used when rendering a group of attributes in user-facing forms. Supports keys for localized values as well. For example\: ${profile.attribute.group.address}.
providerInfo=Provider info
ssoServiceUrl=Single Sign-On service URL
inputHelperTextAfter=Helper text (under) the input field
appliedByClients=Applied by the following clients
createFlowHelp=You can create a top level flow within this from
defaultLocaleHelp=The initial locale to use. It is used on the login screen and other screens in the Admin UI and Account UI.
deleteConfirmFlowMessage=Are you sure you want to permanently delete the flow "<1>{{flow}}</1>".
webAuthnPolicyAuthenticatorAttachment=Authenticator Attachment
logoutServiceSoapBindingUrlHelp=SAML SOAP Binding URL for the client's single logout service. You can leave this blank if you are using a different binding.
kerberos=Kerberos
noNodesInstructions=There are no nodes registered, you can add one manually.
login=Login
eventTypes.IDENTITY_PROVIDER_RETRIEVE_TOKEN_ERROR.name=Identity provider retrieve token error
local=Local
noGroupsInThisSubGroupInstructions=You haven't created any groups in this sub group.
validatorColNames.colName=Validator name
userVerify.required=Required
searchMembers=Search members
keySizeHelp=Size for the generated keys
otpSupportedApplications.totpAppGoogleName=Google Authenticator
clientDeleteConfirmTitle=Delete client?
policyDetails=Policy details
changedUsersSyncHelp=Period for synchronization of changed or newly created LDAP users in seconds
trustEmailHelp=If enabled, email provided by this provider is not verified even if verification is enabled for the realm.
editModeKerberosHelp=READ_ONLY means that password updates are not allowed and user always authenticates with Kerberos password. UNSYNCED means that the user can change the password in the Keycloak database and this one will be used instead of the Kerberos password.
invalidateRotatedSecretExplain=After invalidating rotated secret, the rotated secret will be removed automatically
clientSessionMaxHelp=Max time before a client session is expired. Tokens are invalidated when a session is expired. The option does not affect the global user SSO session. If not set, it uses the standard SSO Session Max value.
clientScopeDetails=Client scope details
requiredHelp=Set the attribute as required. If enabled, the attribute must be set by users and administrators. Otherwise, the attribute is optional.
clientScopeRemoveError=Could not remove the scope mapping {{error}}
mapperTypeRoleLdapMapper=role-ldap-mapper
testConnectionHint.withEmail=When testing the connection an e-mail will be sent to the current user ({{email}}).
adminURLHelp=URL to the admin interface of the client. Set this if the client supports the adapter REST API. This REST API allows the auth server to push revocation policies and other administrative tasks. Usually this is set to the base URL of the client.
otpPolicyPeriodHelp=How many seconds should an OTP token be valid? Defaults to 30 seconds.
otpPolicyCodeReusableHelp=Possibility to use the same OTP code again after successful authentication.
parentId=Parent ID
storePasswordHelp=Password to access the archive itself
directAccess=Direct access grants
logoutServiceSoapBindingUrl=Logout Service SOAP Binding URL
userFedDeletedSuccess=The user federation provider has been deleted.
eventTypes.UNREGISTER_NODE.description=Unregister node
whoWillAppearPopoverTextRoles=This tab shows only the users who are assigned directly to this role. To see users who are assigned this role as an associated role or through a group, go to
showPassword=Show password field in clear text
logic=Logic
clientScopeSearch.type=Assigned type
scopePermissions.groups.manage-membership-description=Policies that decide if an administrator can add or remove users from this group
resourceType=Resource type
copied=Authorization details copied.
scopeName=A unique name for this scope. The name can be used to uniquely identify a scope, useful when querying for a specific scope.
userObjectClassesHelp=All values of LDAP objectClass attribute for users in LDAP, divided by commas. For example\: 'inetOrgPerson, organizationalPerson'. Newly created Keycloak users will be written to LDAP with all those object classes and existing LDAP user records are found just if they contain all those object classes.
userInfoUrlHelp=The User Info Url. This is optional.
clientProfileSearch=Search
addSavedTypes=Add saved types
setPasswordFor=Set password for {{username}}
eventTypes.CODE_TO_TOKEN.name=Code to token
updateUserLocale=Update User Locale
whoWillAppearPopoverTextUsers=Groups are hierarchical. When you select Direct Membership, you see only the child group that the user joined. Ancestor groups are not included.
mapperCreateError=Error creating mapper.
resetBtn=Reset
mode=Mode
kc.realm.name=Realm
userFedDisableConfirmTitle=Disable user federation provider?
impersonate=Impersonate
eventTypes.CLIENT_REGISTER.name=Client register
mappingTable=Table with predefined mapping
requestObject.not\ required=Not required
adminURL=Admin URL
generatedAccessTokenNo=No generated access token
always=Always
pkceEnabledHelp=Use PKCE (Proof of Key-code exchange) for IdP Brokering
settings=Settings
webAuthnPolicyUserVerificationRequirement=User verification requirement
failureFactorHelp=How many failures before wait is triggered.
unlinkAccountTitle=Unlink account from {{provider}}?
noNodes=No nodes registered
singleLogoutServiceUrlHelp=The Url that must be used to send logout requests.
authorizationEncryptedResponseAlg=Authorization response encryption key management algorithm
useTruststoreSpi=Use Truststore SPI
allowEcpFlowHelp=This client is allowed to use ECP flow for authenticating users.
noSessions=No sessions
clipboardCopyError=Error copying to clipboard.
storeTokens=Store tokens
usermodel.clientRoleMapping.rolePrefix.tooltip=A prefix for each client role (optional).
deleteConfirmCurrentUser=Are you sure you want to permanently delete this user
eventTypes.CLIENT_REGISTER_ERROR.description=Client register error
addClientScopesTo=Add client scopes to {{clientName}}
x509=X.509 Subject Name
showDataBtn=Show data
dedicatedScopeDescription=Dedicated scope and mappers for this client
Sunday=Sunday
editMode=Edit mode
updatePasswordPolicySuccess=Password policies successfully updated
passwordHelp=SMTP password. This field is able to obtain its value from vault, use ${vault.ID} format.
clientUpdaterContext=The condition checks the context how is client created/updated to determine whether the policy is applied. For example it checks if client is created with admin REST API or OIDC dynamic client registration. And for the letter case if it is ANONYMOUS client registration or AUTHENTICATED client registration with Initial access token or Registration access token and so on.
removedGroupMembership=Removed group membership
deleteScopeWarning=The permissions below will be removed when they are no longer used by other authorization scopes\:
compositeRoleOff=Composite role turned off
fullSyncPeriod=Full sync period
clientsExplain=Clients are applications and services that can request authentication of a user.
addNode=Add node
jwksUrl=JWKS URL
policy-description=A description for this policy.
defaultPasswordLabel=My password
mapperUserAttributeName=User Attribute Name
importClient=Import client
deleteMapperSuccess=Mapper successfully deleted.
scopeSaveError=Could not persist authorization scope due to {{error}}
used.SPECIFIC_PROVIDERS=Specific providers
deletedSuccessIdentityProvider=Provider successfully deleted.
reload=Reload
eventTypes.CLIENT_INITIATED_ACCOUNT_LINKING_ERROR.description=Client initiated account linking error
eventTypes.IDENTITY_PROVIDER_LOGIN_ERROR.name=Identity provider login error
scopePermissions.groups.view-description=Policies that decide if an administrator can view this group
tokens=Tokens
createFlow=Create flow
encryptAssertionsHelp=Should SAML assertions be encrypted with client's public key using AES?
oAuthDPoPHelp=This enables support for Demonstrating Proof-of-Possession (DPoP) bound tokens. The access and refresh tokens are bound to the key stored on the user agent. In order to prove the possession of the key, the user agent must send a signed proof alongside the token.
unsavedChangesConfirm=You have unsaved changes. Do you really want to leave the page?
disabledOff=Disabled off
membershipLdapAttributeHelp=Name of LDAP attribute on group, which is used for membership mappings. Usually it will be 'member'. However when 'Membership Attribute Type' is 'UID', then 'Membership LDAP Attribute' could be typically 'memberUid'.
usersLeftError=Could not remove users from the group\: {{error}}
addTypes=Add types
pushedAuthorizationRequestRequiredHelp=Boolean parameter indicating whether the authorization server accepts authorization request data only via the pushed authorization request method.
requirement=Requirement
any=Any
minute=Minute
useJwksUrl=Use JWKS URL
wantAssertionsSigned=Want Assertions signed
roleSaveSuccess=The role has been saved
scopeParameter=Scope parameter
unsigned=Unsigned
userGroupsRetrieveStrategy=User groups retrieve strategy
addSubFlow=Add sub-flow
validatingPublicKeyHelp=The public key in PEM format that must be used to verify external IDP signatures.
client-uris-must-match.label=Client URIs Must Match
webAuthnPolicyAcceptableAaguids=Acceptable AAGUIDs
noRoles-roles=No roles in this realm
logoutServiceRedirectBindingURLHelp=SAML Redirect Binding URL for the client's single logout service. You can leave this blank if you are using a different binding.
deleteMapperConfirm=Are you sure you want to permanently delete the mapper {{mapper}}?
scopePermissions.roles.map-role-description=Policies that decide if an administrator can map this role to a user or group
backchannelUrlInvalid=Backchannel logout URL is not a valid URL
eventTypes.LOGIN.description=Login
impersonateConfirm=Impersonate user?
scopePermissions.clients.map-roles-client-scope-description=Policies that decide if an administrator can apply roles defined by this client to the client scope of another client
accessTokenSuccess=Access token regenerated
includeInIdToken.tooltip=Should the claim be added to the ID token?
validRequestURIs=Valid request URIs
allowPasswordAuthentication=Allow password authentication
federationLinkHelp=UserStorageProvider this locally stored user was imported from.
validateUsernameLDAPAttribute=You must enter a username LDAP attribute
pairwiseSubAlgorithmSalt.tooltip=Salt used when calculating the pairwise subject identifier. If left blank, a salt will be generated.
waitIncrementSecondsHelp=When failure threshold has been met, how much time should the user be locked out?
allowKerberosAuthentication=Allow Kerberos authentication
addressClaim.formatted.tooltip=Name of User Attribute, which will be used to map to 'formatted' subclaim inside 'address' token claim. Defaults to 'formatted' .
predefinedMappingDescription=Choose any of the predefined mappings from this table
allowedClockSkew=Allowed clock skew
privateRSAKey=Private RSA Key
createPermission=Create permission
moveToGroup=Move {{group1}} to {{group2}}
noRealmRoles=No realm roles
events-disable-confirm=If "Save events" is disabled, subsequent events will not be displayed in the "Events" menu
reqAuthnConstraints=Requested AuthnContext Constraints
userProfileEnabled=User Profile Enabled
eventTypes.PUSHED_AUTHORIZATION_REQUEST.description=Pushed authorization request
addIdpMapperNameHelp=Name of the mapper.
requirements.ALTERNATIVE=Alternative
claimFilterValueHelp=Value of the essential claim (with regex support)
credentialResetConfirm=Send Email
permissionsEnabledHelp=Determines if fine grained permissions are enabled for managing this role. Disabling will delete all current permissions that have been set up.
consentScreenTextHelp=Text that will be shown on the consent screen when this client scope is added to some client with consent required. Defaults to name of client scope if it is not filled
realmRolesList=Realm roles
roleList=Role list
kerberosRealm=Kerberos realm
scopePermissions.groups.manage-members-description=Policies that decide if an administrator can manage the members of this group
consentRequiredHelp=If enabled, users have to consent to client access.
flow.direct\ grant=Direct grant flow
eventTypes.EXECUTE_ACTION_TOKEN.name=Execute action token
groupName=Group name
eventTypes.RESTART_AUTHENTICATION.name=Restart authentication
authorizationUrl=Authorization URL
eventTypes.VALIDATE_ACCESS_TOKEN.name=Validate access token
contextualAttributes=Contextual Attributes
replyTo=Reply to
providerDescription=Provider description
downloadAdapterConfig=Download adapter config
scopePermissions.clients.view-description=Policies that decide if an administrator can view this client
allowEcpFlow=Allow ECP flow
rsa=rsa
setPasswordConfirmText=Are you sure you want to set the password for the user {{username}}?
updateErrorIdentityProvider=Could not update the provider {{error}}
emptyProfiles=No client profiles configured
createClientProfileError=Could not create client profile\: '{{error}}'
usermodel.clientRoleMapping.clientId.tooltip=Client ID for role mappings. Just client roles of this client will be added to the token. If this is unset, client roles of all clients will be added to the token.
targetOptions.local=LOCAL
addMessageBundleError=Error creating message bundle, {{error}}
pkceMethodHelp=PKCE Method to use
encryption=Encryption
addExecutorError=Executor not created
scopePermissions.clients.manage-description=Policies that decide if an administrator can manage this client
vendor=Vendor
roleRemoveAssociatedText=This action will remove {{role}} from {{roleName}}. All the associated roles of {{role}} will also be removed.
disabled=Disabled
idpInitiatedSsoRelayState=IDP Initiated SSO Relay State
attribute=Attribute
clientScopesConditionTooltip=The list of expected client scopes. Condition evaluates to true if specified client request matches some of the client scopes. It depends also whether it should be default or optional client scope based on the 'Scope Type' configured.
timestamp=Created date
principalAttributeHelp=Name or Friendly Name of the attribute used to identify external users.
nameIdPolicyFormat=NameID policy format
idpInitiatedSsoUrlName=IDP-Initiated SSO URL name
selectMethod=Select method
deleteConfirmExecution=Delete execution?
eventTypes.VALIDATE_ACCESS_TOKEN_ERROR.name=Validate access token error
xFrameOptions=X-Frame-Options
scopeDescriptionHelp=Description of the client scope
deletedErrorRealmSetting=Could not delete realm\: {{error}}
copyInitialAccessToken=Please copy and paste the initial access token before closing as it can not be retrieved later.
consensus=Consensus
scopePermissions.roles.map-role-composite-description=Policies that decide if an administrator can apply this role as a composite to another role
emptyEvents=Nothing to add
residentKey.Yes=Yes
eventTypes.SEND_IDENTITY_PROVIDER_LINK.name=Send identity provider link
ssoSessionIdleRememberMe=Time a remember me session is allowed to be idle before it expires. Tokens and browser sessions are invalidated when a session is expired. If not set it uses the standard SSO Session Idle value.
SSOSessionIdleRememberMe=SSO Session Idle Remember Me
cibaBackchannelTokenDeliveryModeHelp=Specifies how the CD (Consumption Device) gets the authentication result and related tokens. This mode will be used by default for the CIBA clients, which do not have other mode explicitly set.
eventTypes.REGISTER_NODE.description=Register node
supported=Supported
deleteAttributeText=Delete an attribute
deleteNodeSuccess=Node successfully removed
includeInIntrospection.label=Add to token introspection
roleImportSuccess=Role import successful
tokenUrl=Token URL
executionConfig={{name}} config
grantedClientScopes=Granted client scopes
keyError=A key must be provided.
addAnnotationText=Add annotation
helpToggleInfo=This toggle will enable / disable part of the help info in the UI. Includes any help text, links and popovers.
clientProfileName=Client profile name
effectiveProtocolMappers=Effective protocol mappers
userVerify.preferred=Preferred
syncModes.legacy=Legacy
allowRegexComparisonHelp=If OFF, then the Subject DN from given client certificate must exactly match the given DN from the 'Subject DN' property as described in the RFC8705 specification. The Subject DN can be in the RFC2553 or RFC1779 format. If ON, then the Subject DN from given client certificate should match regex specified by 'Subject DN' property.
eventTypes.UPDATE_TOTP_ERROR.description=Update totp error
titleEvents=Events
signServiceProviderMetadata=Sign service provider metadata
updateClientPoliciesError=Provided JSON is incorrect\: Unexpected token { in JSON
acceptsPromptNoneHelp=This is just used together with Identity Provider Authenticator or when kc_idp_hint points to this identity provider. In case that client sends a request with prompt\=none and user is not yet authenticated, the error will not be directly returned to client, but the request with prompt\=none will be forwarded to this identity provider.
roleDetails=Role details
eventTypes.USER_INFO_REQUEST.name=User info request
clientScopeType.none=None
results=Results
userRolesRetrieveStrategyHelp=Specify how to retrieve roles of user. LOAD_ROLES_BY_MEMBER_ATTRIBUTE means that roles fo user will be retrieved by sending LDAP query to retrieve all roles where 'member' is our user. GET_ROLES_FROM_USER_MEMBEROF means that roles of user will be retrieved from 'memberOf' attribute of our user. Or from the other attributes specified by 'Member-Of LDAP Attribute'. LOAD_ROLES_BY_MEMBER_ATTRIBUTE is applicable just in Active Directory and it means that roles of user will be retrieved recursively with usage of LDAP_MATCHING_RULE_IN_CHAIN LDAP extension.
roleDeleteError=Could not delete role\: {{error}}
selectScope=Select a scope
attributeDefaultValue=Attribute default value
eventTypes.UPDATE_PASSWORD_ERROR.name=Update password error
addGroups=Add groups
offlineSessionIdle=Offline Session Idle
mapperAttributeFriendlyName=Friendly name
addProvider=Add provider
readOnlyHelp=Read-only attribute is imported from LDAP to UserModel, but it's not saved back to LDAP when user is updated in Keycloak.
resourceDeletedError=Could not remove the resource {{error}}
backchannelLogoutUrl=Backchannel logout URL
requestObjectEncodingHelp=JWE algorithm, which client needs to use when encrypting the content of the OIDC request object specified by 'request' or 'request_uri' parameters. If set to 'any', any algorithm is allowed.
minimumQuickLoginWaitSeconds=Minimum quick login wait
duplicate=Duplicate
clientAccesstype=Client Access Type
roleDeleteConfirm=Delete role?
createClientProfileNameHelperText=The name must be unique within the realm
disabledHelp=A disabled user cannot log in.
eventTypes.UPDATE_PROFILE_ERROR.name=Update profile error
adminThemeHelp=Select a theme for administration console.
name=Name
deleteConfirmDialog_other=Are you sure you want to permanently delete {{count}} selected users
targetOptions.brokerUsername=BROKER_USERNAME
clientList=Clients
eventTypes.REGISTER_ERROR.description=Register error
infoDisabledFeatures=Shows all disabled features.
userSession.modelNote.label=User Session Note
next=Next
userLabel=User label
pagination=Pagination
changeAuthenticatorConfirm=If you change authenticator to {{clientAuthenticatorType}}, the Keycloak database will be updated and you may need to download a new adapter configuration for this client.
import=Import
otpHashAlgorithm=OTP hash algorithm
importFail=Import failed\: {{error}}
show=Show
description=Description
alwaysReadValueFromLdap=Always read value from LDAP
searchUserEventsBtn=Search events
addressClaim.postal_code.tooltip=Name of User Attribute, which will be used to map to 'postal_code' subclaim inside 'address' token claim. Defaults to 'postal_code' .
generatedUserInfoNo=No generated user info
allowed-client-scopes.label=Allowed Client Scopes
providerId=Provider ID
assignedClientScope=Assigned client scope
savePasswordSuccess=The password has been set successfully.
Tuesday=Tuesday
idTokenEncryptionContentEncryptionAlgorithm=ID token encryption content encryption algorithm
newRoleName=New role name
listExplain=Identity providers are social networks or identity brokers that allow users to authenticate to Keycloak.
emptyInstructions=Change your search criteria or add a user
tableView=Table view
addClientProfile=Add client profile
maxFailureWaitSeconds=Max wait
userEventsRegistered=User events registered
renameAGroup=Rename group
eventConfigError=Could not save event configuration {{error}}
confirmAccessTokenTitle=Regenerate registration access token?
target=Target
impersonateConfirmDialog=Are you sure you want to log in as this user? If this user is in the same realm with you, your current login session will be logged out before you log in as this user.
alwaysDisplayInUI=Always display in UI
protocolMapper=Protocol...
requiredSettings=Required Settings
oneLevel=One Level
userSaved=The user has been saved
useRefreshTokens=Use refresh tokens
standardFlowHelp=This enables standard OpenID Connect redirect based authentication with authorization code. In terms of OpenID Connect or OAuth2 specifications, this enables support of 'Authorization Code Flow' for this client.
clientDeleteConfirm=If you delete this client, all associated data will be removed.
derFormattedHelp=Activate this if the certificate is DER formatted in LDAP and not PEM formatted.
eventTypes.IDENTITY_PROVIDER_POST_LOGIN.name=Identity provider post login
scopePermissions.users.view-description=Policies that decide if an administrator can view all users in realm
ldapGeneralOptionsSettingsDescription=This section contains a few basic options common to all user storage providers.
importSkipped_one=One record skipped.
eventTypes.OAUTH2_DEVICE_AUTH.description=Oauth2 device authentication
notBeforeClearedSuccess=Success\! "Not Before" cleared for realm.
policySaveError=Could not update the policy due to {{error}}
experimental=Experimental
idTokenSignatureAlgorithmHelp=JWA algorithm used for signing ID tokens.
deleteResourceConfirm=If you delete this resource, some permissions will be affected.
httpPostBindingResponse=HTTP-POST binding response
tokenLifespan.inherited=Inherits from realm settings
saveEvents=Save events
issuer=Issuer
policyEnforcementModeHelp=The policy enforcement mode dictates how policies are enforced when evaluating authorization requests. 'Enforcing' means requests are denied by default even when there is no policy associated with a given resource. 'Permissive' means requests are allowed even when there is no policy associated with a given resource. 'Disabled' completely disables the evaluation of policies and allows access to any resource.
selectAUser=Select a user
groupCreated=Group created
generateError=Could not generate new key pair and certificate {{error}}
testClusterSuccess=Successfully verified availability for\: {{successNodes}}
whoWillAppearLinkTextRoles=Who will appear in this user list?
attestationPreference.not\ specified=Not specified
importConfigHelp=Import metadata from a downloaded IDP discovery descriptor.
targetClaim=Target claim
assignRole=Assign role
accessSettings=Access settings
updateFlowSuccess=Flow successfully updated
xXSSProtectionHelp=This header configures the Cross-site scripting (XSS) filter in your browser. Using the default behaviour, the browser will prevent rendering of the page when a XSS attack is detected. <1>Learn more</1>
authenticatedAccessPolicies=Authenticated access polices
addExecutor=Add executor
selectIfResourceExists=If a resource already exists, specify what should be done
passwordPoliciesHelp.notEmail=The password cannot match the email address of the user.
deleteAttributeGroupError=Could not delete user attributes group\: {{error}}
trustEmail=Trust Email
credentialReset=Credentials Reset
eventTypes.CUSTOM_REQUIRED_ACTION_ERROR.name=Custom required action error
deleteValidatorConfirmTitle=Delete validator?
claimJsonType=JSON type that should be used to populate the json claim in the token. long, int, boolean, String and JSON are valid values.
kc.client.network.ip_address=Client IPv4 Address
signatureAndEncryption=Signature and Encryption
reset=Reset
hardcodedUserSessionAttribute=When a user is imported from a provider, hardcode a value to a specific user session attribute.
conditionType=Condition type
multiValued=Indicates if attribute supports multiple values. If true, the list of all values of this attribute will be set as claim. If false, just first value will be set as claim
browse=Browse
duplicateEmailsHelpText=Allow multiple users to have the same email address. Changing this setting will also clear the user's cache. It is recommended to manually update email constraints of existing users in the database after switching off support for duplicate email addresses.
importOverwritten_zero=No records overwritten.
usermodel.realmRoleMapping.rolePrefix.label=Realm Role prefix
eventTypes.GRANT_CONSENT.name=Grant consent
noProvidersLinked=No identity providers linked. Choose one from the list below.
testConnectionSuccess=Success\! SMTP connection successful. E-mail was sent\!
samlSettings=SAML settings
userFedDisableConfirm=If you disable this user federation provider, it will not be considered for queries and imported users will be disabled and read-only until the provider is enabled again.
userSessionAttribute=User Session Attribute
enabled=Enabled
forgotPassword=Forgot password
searchUserByAttributeMissingValueError=Specify a attribute value
passwordPoliciesHelp.maxLength=The maximum number of characters allowed in the password.
moveGroupError=Could not move group {{error}}
clientImportSuccess=Client imported successfully
dragHelp=Press space or enter to begin dragging, and use the arrow keys to navigate up or down. Press enter to confirm the drag, or any other key to cancel the drag operation.
startTime=Start time
logicHelp=The logic dictates how the policy decision should be made. If 'Positive', the resulting effect (permit or deny) obtained during the evaluation of this policy will be used to perform a decision. If 'Negative', the resulting effect will be negated, in other words, a permit becomes a deny and vice-versa.
allowRegexComparison=Allow regex pattern comparison
noSessionsForUser=There are currently no active sessions for this user.
eventTypes.IDENTITY_PROVIDER_LINK_ACCOUNT_ERROR.description=Identity provider link account error
implicitFlowHelp=This enables support for OpenID Connect redirect based authentication without authorization code. In terms of OpenID Connect or OAuth2 specifications, this enables support of 'Implicit Flow' for this client.
user-events-cleared-error=Could not clear the user events {{error}}
eventTypes.IMPERSONATE_ERROR.name=Impersonate error
executorType=Executor type
configureMappingDescription=Choose any of the mappings from this table
keystorePassword=Keystore password
mapperTypeHardcodedLdapRoleMapperHelp=Users imported from LDAP will be automatically added into this configured role.
more={{count}} more
clientNameHelp=Specifies display name of the client. For example 'My Client'. Supports keys for localized values as well. For example\: ${my_client}
mappersList=Mappers list
rootUrl=Root URL
realmExplain=A realm manages a set of users, credentials, roles, and groups. A user belongs to and logs into a realm. Realms are isolated from one another and can only manage and authenticate the users that they control.
inputHelperTextBefore=Helper text (above) the input field
webAuthnPolicyExtraOrigins=Extra Origins
samlSignatureKeyName=SAML signature key name
validateUsersDn=You must enter users DN
importError=Could not import certificate {{error}}
logicType.negative=Negative
otpPolicy=OTP Policy
noRolesInstructions-groups=You haven't created any roles for this group. Create a role to get started.
cibaBackchannelTokenDeliveryMode=Backchannel Token Delivery Mode
validateAttributeName=Attribute configuration without name is not allowed.
eventTypes.RESET_PASSWORD_ERROR.description=Reset password error
addUser=Add user
eventTypes.REGISTER.description=Register
includeAuthnStatementHelp=Should a statement specifying the method and timestamp be included in login responses?
evaluateError=Could not evaluate due to\: {{error}}
iconUriHelp=A URI pointing to an icon.
eventTypes.OAUTH2_DEVICE_VERIFY_USER_CODE.name=Oauth2 device verify user code
protocol=Protocol
permissionsScopeName=Scope-name
validPostLogoutRedirectURIsHelp=Valid URI pattern a browser can redirect to after a successful logout. A value of '+' or an empty field will use the list of valid redirect uris. A value of '-' will not allow any post logout redirect uris. Simple wildcards are allowed such as 'http\://example.com/*'. Relative path can be specified too such as /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used.
manageAccount=Manage account
oauthDeviceAuthorizationGrant=OAuth 2.0 Device Authorization Grant
copyFlowError=Could not duplicate flow\: {{error}}
roleRemoveAssociatedRoleConfirm=Remove associated role?
httpPostBindingAuthnRequest=HTTP-POST binding for AuthnRequest
includeInAccessToken.label=Add to access token
samlKeysExportSuccess=Successfully exported keys
usersInRole=Users in role
policyProvider.group=Define conditions for your permissions where a set of one or more groups (and their hierarchies) is permitted to access an object.
updatedUserProfileError=User Profile configuration hasn't been saved
emptyPermissions=No permissions
deletePermission=Permanently delete permission?
selectUser=Select a user whose identity is going to be used to query permissions from the server.
resultPermit=Result-Permit
userFederationExplain=User federation provides access to external databases and directories, such as LDAP and Active Directory.
emptyAuthorizationScopes=No authorization scopes
noDefaultGroups=No default groups
policyProvider.time=Define time conditions for your permissions.
updateFlowError=Could not update flow\: {{error}}
valuePlaceholder=Type a value
usersLeft_other={{count}} users left the group
updateClientContext=Update Client Context
removeAssociatedRoles=Remove associated roles
nameIdPolicyFormatHelp=Specifies the URI reference corresponding to a name identifier format.
mappers=Mappers
attributeGeneralSettingsDescription=This section contains a few basic settings common to all attributes.
name-id-format=Name ID Format
deleteRealm=Delete realm
noRoles-clientScopes=No roles for this client scope
deleteFlowError=Could not delete flow\: {{error}}
eventTypes.IDENTITY_PROVIDER_POST_LOGIN.description=Identity provider post login
roleImportError=Could not import role
regexAttributeValuesHelp=If enabled attribute values are interpreted as regular expressions.
userCreated=The user has been created
residentKey.not\ specified=Not specified
clientUpdaterSourceHost=The condition checks the host/domain of the entity who tries to create/update the client to determine whether the policy is applied.
alwaysReadValueFromLdapHelp=If on, then during reading of the LDAP attribute value will always used instead of the value from Keycloak DB.
usermodel.clientRoleMapping.tokenClaimName.tooltip=Name of the claim to insert into the token. This can be a fully qualified name like 'address.street'. In this case, a nested json object will be created. To prevent nesting and use dot literally, escape the dot with backslash (\\.). The special token ${client_id} can be used and this will be replaced by the actual client ID. Example usage is 'resource_access.${client_id}.roles'. This is useful especially when you are adding roles from all the clients (Hence 'Client ID' switch is unset) and you want client roles of each client stored separately.
scopePermissions.clients.map-roles-description=Policies that decide if an administrator can map roles defined by this client
signAssertions=Sign assertions
disableUserInfoHelp=Disable usage of User Info service to obtain additional user information? Default is to use this OIDC service.
xFrameOptionsHelp=Default value prevents pages from being included by non-origin iframes <1>Learn more</1>
copyError=Error copying authorization details\: {{error}}
validateSignatures=Enable/disable signature validation of SAML responses.
authentication=Authentication
eventTypes.DELETE_ACCOUNT.name=Delete account
logoutUrlHelp=End session endpoint to use to logout user from external IDP.
noUserDetails=No user details
sync-ldap-groups-to-keycloak=Sync LDAP groups to Keycloak
attestationPreference.indirect=Indirect
frontchannelUrlInvalid=Front-channel logout URL is not a valid URL
noCredentialsText=This user does not have any credentials. You can set password for this user.
deletePolicyWarning=The aggregated polices below will be removed automatically\:
validatingPublicKey=Validating public key
permissionsListIntro=Edit the permission list by clicking the scope-name. It then redirects to the permission details page of the client named <1>{{realm}}</1>
deleteClientConditionSuccess=Condition deleted successfully.
signatureAlgorithm=Signature algorithm
deleteConfirmIdentityProvider=Are you sure you want to permanently delete the provider '{{provider}}'?
resetActions=Reset Actions
cibaExpiresInHelp=The expiration time of the "auth_req_id" in seconds since the authentication request was received.
eventTypes.CLIENT_INFO_ERROR.description=Client info error
batchSize=Batch size
user=User
scopesAsRequested=Scopes are requested
updateErrorClientScope=Could not update client scope\: '{{error}}'
eventTypes.OAUTH2_DEVICE_VERIFY_USER_CODE.description=Oauth2 device verify user code
useKerberosForPasswordAuthentication=Use Kerberos for password authentication
validateUuidLDAPAttribute=You must enter a UUID LDAP attribute
client-scopes-condition.tooltip=The list of expected client scopes. Condition evaluates to true if specified client request matches some of the client scopes. It depends also whether it should be default or optional client scope based on the 'Scope Type' configured.
rootURLHelp=Root URL appended to relative URLs
anonymousAccessPolicies=Anonymous access polices
createResourceBasedPermission=Create resource-based permission
searchForRole=Search role
xXSSProtection=X-XSS-Protection
debugHelp=Enable/disable debug logging to standard output for Krb5LoginModule.
validatorColNames.colConfig=Config
createClient=Create client
inputTypeRows=Input rows
eventTypes.IDENTITY_PROVIDER_FIRST_LOGIN.description=Identity provider first login
usedMemory=Used memory
validatePasswordPolicyHelp=Determines if Keycloak should validate the password with the realm password policy before updating it. For the case when user's password is saved in LDAP, some Keycloak password policies will not work (Not Recently Used, Expire Password, Hashing Iterations, Hashing Algorithm) due the fact that Keycloak does not have direct control over the password storage. It is needed to enable password policies at the LDAP server layer if you want to leverage those password policies.
quickLoginCheckMilliSeconds=Quick login check milliseconds
createResourceSuccess=Resource created successfully
documentation=Documentation
fullNameLdapReadOnlyHelp=For Read-only, data is imported from LDAP to Keycloak DB, but it's not saved back to LDAP when the user is updated in Keycloak.
roleExplain=Realm roles are the roles that you define for use in the current realm.
whatIsDefaultGroups=What is the function of default groups?
transient=Transient
generalSettings=General settings
addClientProfileError=Could not create client profile\: '{{error}}'
overallResults=Overall Results
requiredUserActionsHelp=Require an action when the user logs in. 'Verify email' sends an email to the user to verify their email address. 'Update profile' requires user to enter in new personal information. 'Update password' requires user to enter in a new password. 'Configure OTP' requires setup of a mobile password generator.
requestObjectSignatureAlgorithmHelp=JWA algorithm, which client needs to use when sending OIDC request object specified by 'request' or 'request_uri' parameters. If set to 'any', Request object can be signed by any algorithm (including 'none' ).
ldapKerberosSettingsDescription=This section contains options useful for the Kerberos integration. This is used only when the LDAP server is used together with Kerberos/SPNEGO for user authentication.
deleteEvents=Clear events
termsOfServiceUrlHelp=URL that the Relying Party Client provides to the End-User to read about the Relying Party's terms of service
clientSecretError=Could not regenerate client secret due to\: {{error}}
resourcePath=Resource path
useJwksUrlHelp=If the switch is on, identity provider public keys will be downloaded from given JWKS URL. This allows great flexibility because new keys will be always re-downloaded again when identity provider generates new keypair. If the switch is off, public key (or certificate) from the Keycloak DB is used, so when the identity provider keypair changes, you always need to import the new key to the Keycloak DB as well.
mapperTypeHardcodedAttributeMapperHelp=This mapper will hardcode any model user attribute and some property (like emailVerified or enabled) when importing user from LDAP.
downloadAdaptorTitle=Download adaptor configs
client-roles.label=Client Roles
keysFilter.PASSIVE=Passive keys
revocation=Revocation
scopeTypeHelp=Client scopes, which will be added as default scopes to each created client
search=Search
validateEditMode=You must select an edit mode
copyFlowSuccess=Flow successfully duplicated
cacheSettings=Cache settings
searchForClient=Search for client
permissionDeletedError=Could not delete permission due to {{error}}
eventTypes.UPDATE_PROFILE.name=Update profile
realmId=Realm ID
eventTypes.PERMISSION_TOKEN_ERROR.description=Permission token error
algorithmHelp=Intended algorithm for the key
importFile=Import file
userVerify.discouraged=Discouraged
ldapRolesDn=LDAP roles DN
displayOnClientHelp=Applicable only if 'Consent Required' is on for this client. If this switch is off, the consent screen will contain just the consents corresponding to configured client scopes. If on, there will be also one item on the consent screen about this client itself.
requestObjectRequired=Request object required
protocolHelp=Which SSO protocol configuration is being supplied by this client scope
prompts.none=None
resourcesHelp=Specifies that this permission must be applied to a specific resource instance.
passwordConfirmation=Password confirmation
aggregate.attrs.tooltip=Indicates if attribute values should be aggregated with the group attributes. If using OpenID Connect mapper the multivalued option needs to be enabled too in order to get all the values. Duplicated values are discarded and the order of values is not guaranteed with this option.
helpLabel=More help for '{{label}}'
noRoles=No roles for this user
createAttribute=Create attribute
Thursday=Thursday
importOverwritten_one=One record overwritten.
tokenDeleteError=Could not delete initial access token\: '{{error}}'
eventTypes.REGISTER_NODE_ERROR.name=Register node error
isMandatoryInLdap=Is mandatory in LDAP
discoveryEndpoint=Discovery endpoint
claimValue=Claim Value
eventTypes.FEDERATED_IDENTITY_LINK.name=Federated identity link
authenticationHelp=This defines the type of the OIDC client. When it's ON, the OIDC type is set to confidential access type. When it's OFF, it is set to public access type
deleteClientConditionError=Error creating condition\: {{error}}
noMappers=No Mappers
couldNotLinkIdP=Could not link identity provider {{error}}
otpPolicyPeriod=OTP Token period
managePriorities=Manage priorities
createClientPolicySuccess=New policy created
frontendUrlHelp=Set the frontend URL for the realm. Use in combination with the default hostname provider to override the base URL for frontend requests for a specific realm.
used.notInUse=Not in use
emailSettings=Email settings
samlEntityDescriptorHelp=Allows you to load external IDP metadata from a config file or to download it from a URL.
generatedIdTokenHelp=See the example ID Token, which will be generated and sent to the client when selected user is authenticated. You can see claims and roles that the token will contain based on the effective protocol mappers and role scope mappings and also based on the claims/roles assigned to user himself
createClientProfile=Create client profile
passwordPoliciesHelp.specialChars=The number of special characters required in the password string.
cachePolicy=Cache policy
noCredentials=No credentials
clientOfflineSessionIdle=Client Offline Session Idle
eventListeners=Event listeners
bindDn=Bind DN
evictionHourHelp=Hour of the day the entry will become invalid
permissionDetails=Permission details
clipboardCopyDenied=Your browser is blocking access to the clipboard.
Friday=Friday
saveProviderListSuccess=The priority of the provider has been updated successfully.
copyToClipboard=Copy to clipboard
wantAuthnRequestsSigned=Want AuthnRequests signed
usermodel.attr.tooltip=Name of stored user attribute which is the name of an attribute within the UserModel.attribute map.
clientPoliciesProfiles=Client Policies Profiles
eventTypes.SEND_VERIFY_EMAIL.name=Send verify email
requiredForLabel.both=Both users and admins
eventTypes.REGISTER_NODE.name=Register node
addToFilter=Add to filter
CONFIGURE_TOTP=Configure OTP (CONFIGURE_TOTP)
eventTypes.EXECUTE_ACTIONS.description=Execute actions
clientUpdaterSourceRolesHelp=The condition checks the role of the entity who tries to create/update the client to determine whether the policy is applied.
userModelAttributeName=User model attribute name
importResourceError=Could not import the resource due to {{error}}
dynamicScope=Dynamic scope
mapperTypeHardcodedLdapRoleMapper=hardcoded-ldap-role-mapper
validateName=You must enter a name
flowDetails=Flow details
never=Never
includeInIntrospection.tooltip=Should the claim be added to the token introspection?
addressClaim.region.tooltip=Name of User Attribute, which will be used to map to 'region' subclaim inside 'address' token claim. Defaults to 'region' .
IDK-periodicChangedUsersSyncHelp=Should newly created users be created within LDAP store? Priority affects which provider is chosen to sync the new user.
logoutServiceArtifactBindingUrlHelp=SAML ARTIFACT Binding URL for the client's single logout service. You can leave this blank if you are using a different binding.
claimToRole=If a claim exists, grant the user the specified realm or client role.
logoutServicePostBindingURL=Logout Service POST Binding URL
eventTypes.REMOVE_FEDERATED_IDENTITY_ERROR.name=Remove federated identity error
assertionConsumerServicePostBindingURLHelp=SAML POST Binding URL for the client's assertion consumer service (login responses). You can leave this blank if you do not have a URL for this binding.
createAuthorizationScope=Create authorization scope
noGroups=No groups
backchannelLogoutRevokeOfflineSessionsHelp=Specifying whether a "revoke_offline_access" event is included in the Logout Token when the Backchannel Logout URL is used. Keycloak will revoke offline sessions when receiving a Logout Token with this event.
roleID=Role ID
roleNameLdapAttributeHelp=Name of LDAP attribute, which is used in role objects for name and RDN of role. Usually it will be 'cn'. In this case typical group/role object may have DN like 'cn\=role1,ou\=finance,dc\=example,dc\=org'.
origin=Origin
regexPattern=Regex pattern
filteredByClaim=Verify essential claim
rowCancelBtnAriaLabel=Cancel edits for {{messageBundle}}
validateSignatureHelp=Enable/disable signature validation of external IDP signatures.
searchForFlow=Search for flow
verifyEmail=Verify email
notBeforeIntro=In order to successfully push a revocation policy to the client, you need to set an Admin URL under the <1>Settings</1> tab for this client first
addressClaim.locality.label=User Attribute Name for Locality
formatOption=Format option
addAuthnContextClassRef=Add AuthnContext ClassRef
showPasswordDataName=Name
clientScopeTypes.none=None
whoCanEdit=Who can edit?
mappingCreatedSuccess=Mapping successfully created
eventTypes.GRANT_CONSENT.description=Grant consent
client=Client
setToNow=Set to now
eventTypes.OAUTH2_DEVICE_AUTH_ERROR.name=Oauth2 device authentication error
addSubFlowHelp=Sub-Flows can be either generic or form. The form type is used to construct a sub-flow that generates a single flow for the user. Sub-flows are a special type of execution that evaluate as successful depending on how the executions they contain evaluate.
implicitFlow=Implicit flow
authorizationSignedResponseAlgHelp=JWA algorithm used for signing authorization response tokens when the response mode is jwt.
associatedRolesRemoved=Associated roles have been removed
keyAliasHelp=Alias for the private key
whoWillAppearLinkTextUsers=Who will appear in this group list?
tokenClaimName.tooltip=Name of the claim to insert into the token. This can be a fully qualified name like 'address.street'. In this case, a nested json object will be created. To prevent nesting and use dot literally, escape the dot with backslash (\\.).
userName=Username
clientProfileDescription=Description
ellipticCurveHelp=Elliptic curve used in ECDSA
fromPredefinedMapper=From predefined mappers
attributesGroup=Attributes group
ssoSessionMax=Max time before a session is expired. Tokens and browser sessions are invalidated when a session is expired.
clientDeleteError=Could not delete client\: {{error}}
optimizeLookup=Optimize REDIRECT signing key lookup
joinGroupsFor=Join groups for user {{username}}
temporaryLocked=Temporarily locked
setup=Setup
unlinkAccount=Unlink account
executors=Executors
eventTypes.CLIENT_UPDATE_ERROR.name=Client update error
realm=Realm
attributeConsumingServiceIndex=Attribute Consuming Service Index
prompt=Prompt
assign=Assign
disableConfirmRealm=User and clients can't access the realm if it's disabled. Are you sure you want to continue?
showAuthData=Show authorization data
includeInUserInfo.tooltip=Should the claim be added to the userinfo?
select=Select
signature-algorithm=JWA algorithm, which the client needs to use when signing a JWT for authentication. If left blank, the client is allowed to use any appropriate algorithm for the particular client authenticator.
advanced=Advanced
initialCounter=Initial counter
revokeRefreshTokenHelp=If enabled a refresh token can only be used up to 'Refresh Token Max Reuse' and is revoked when a different token is used. Otherwise refresh tokens are not revoked when used and can be used multiple times.
nameField=Name
ownerManagedAccessHelp=If enabled, the access to this resource can be managed by the resource owner.
useLowerCaseBearerTypeHelp=If this is on, token responses will be set the with the type "bearer" in lower-case. By default, the server sets the type as "Bearer" as defined by RFC6750.
addCondition=Add condition
updateSuccessClientScope=Client scope updated
connectionAndAuthentication=Connection & Authentication
clientScopeType.optional=Optional
permissionsDisableConfirm=If you disable the permissions, all the permissions in the list below will be delete automatically. In addition, the resources and scopes that are related will be removed
eventTypes.REFRESH_TOKEN.description=Refresh token
authorization=Authorization
clientProfilesHelpItem=Client profiles help item
userSessionAttributeValue=User Session Attribute Value
dayMonthHelp=Defines the day of month when the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current day of month is between or equal to the two values you provided.
fullNameLdapWriteOnlyHelp=For Write-only, data is propagated to LDAP when a user is created or updated in Keycloak. But this mapper is not used to propagate data from LDAP back into Keycloak. This setting is useful if you configured separate firstName and lastName attribute mappers and you want to use those to read the attribute from LDAP into Keycloak.
userFedDeleteError=Could not delete user federation provider\: '{{error}}'
id=ID
join=Join
clientUpdaterSourceGroupsHelp=The condition checks the group of the entity who tries to create/update the client to determine whether the policy is applied.
idTokenEncryptionContentEncryptionAlgorithmHelp=JWA Algorithm used for content encryption in encrypting ID tokens. This option is needed just if you want encrypted ID tokens. If left empty, ID Tokens are just signed, but not encrypted.
messageBundleDescription=You can edit the supported locales. If you haven't selected supported locales yet, you can only edit the English locale.
saveEventListenersError=Error saving event listener\: {{error}}
scopesHelp=The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to 'openid'.
multivalued.tooltip=Indicates if attribute supports multiple values. If true, the list of all values of this attribute will be set as claim. If false, just first value will be set as claim
inputOptionLabelsI18nPrefix=Internationalization key prefix
enabledHelp=Set if the keys are enabled
nameHintHelp=A unique name for the group. This name will be used to reference the group when binding an attribute to a group.
admin-events-cleared-error=Could not clear the admin events {{error}}
usersPermissionsHint=Fine grained permissions for managing all users in realm. You can define different policies for who is allowed to manage users in the realm.
isBinaryAttribute=Is binary attribute
clientScopeList=Client scopes
noValidMetaDataFound=No valid metadata was found at this URL\: '{{error}}'
eventTypes.IDENTITY_PROVIDER_RETRIEVE_TOKEN_ERROR.description=Identity provider retrieve token error
usernameLdapAttribute=Username LDAP attribute
updateResourceSuccess=Resource successfully updated
displayNameHelp=Friendly name for Identity Providers.
idpAccountEmailVerification=IdP account email verification
template=Template
deleteExecutionSuccess=Execution successfully deleted
deleteConfirmTitle_other=Delete groups?
profilesConfigTypes.jsonEditor=JSON editor
testingConnection=Testing connection
noUsersFoundError=No users found due to {{error}}
clientUpdaterSourceGroups=Groups
executorDetails=Executor details
maxDeltaTimeSeconds=Failure reset time
backchannelLogoutHelp=Does the external IDP support backchannel logout?
eventTypes.REMOVE_FEDERATED_IDENTITY_ERROR.description=Remove federated identity error
usermodel.realmRoleMapping.rolePrefix.tooltip=A prefix for each Realm Role (optional).
exportSamlKeyTitle=Export SAML Keys
eventTypes.OAUTH2_DEVICE_VERIFY_USER_CODE_ERROR.description=Oauth2 device verify user code error
eventTypes.EXECUTE_ACTIONS_ERROR.description=Execute actions error
SKIP=Skip
eventTypes.INTROSPECT_TOKEN.description=Introspect token
infoEnabledFeatures=Shows enabled preview and experimental features.
displayOrderHelp=Number defining the order of the providers in GUI (for example, on the Login page). The lowest number will be applied first.
deleteCredentialsConfirm=Are you sure you want to delete these users credentials?
requiredClientScope=Please add at least one client scope.
keysIntro=If "Use JWKS URL switch" is on, you need to fill a valid JWKS URL. After saving, admin can download keys from the JWKS URL or keys will be downloaded automatically by Keycloak server when an unknown KID is seen during client authentication.
logoutServiceArtifactBindingUrl=Logout Service ARTIFACT Binding URL
passwordPoliciesHelp.lowerCase=The number of lowercase letters required in the password string.
searchForProvider=Search for provider
ldapSearchingAndUpdatingSettingsDescription=This section contains options related to searching the LDAP server for the available users.
sessionsType.regularSSO=Regular SSO
allowed-client-scopes.tooltip=Whitelist of the client scopes, which can be used on a newly registered client. Attempt to register client with some client scope, which is not whitelisted, will be rejected. By default, the whitelist is either empty or contains just realm default client scopes (based on 'Allow Default Scopes' configuration property)
maxDeltaTimeSecondsHelp=When will failure count be reset?
executorsHelpItem=Executors help item
contentSecurityPolicy=Content-Security-Policy
client-uris-must-match.tooltip=If on, all Client URIs (Redirect URIs and others) are allowed just if they match some trusted host or domain.
off=Off
frontchannelLogoutHelp=When true, logout requires a browser redirect to client. When false, server performs a background invocation for logout.
updateSuccess=Provider successfully updated
hide=Hide
isMandatoryInLdapHelp=If true, attribute is mandatory in LDAP. Hence if there is no value in Keycloak DB, the empty value will be set to be propagated to LDAP.
client-accesstype.label=Client Access Type
eventTypes.IDENTITY_PROVIDER_POST_LOGIN_ERROR.description=Identity provider post login error
skipCustomizationAndFinish=Skip customization and finish
mappingDeletedSuccess=Mapping successfully deleted
addIdentityProvider=Add {{provider}} provider
flowDescriptionHelp=Help text for the description of the new flow
kc.time.date_time=Date/Time (MM/dd/yyyy hh\:mm\:ss)
principalType=Principal type
ignoreMissingGroupsHelp=Ignore missing groups in the group hierarchy.
updatedCredentialMoveSuccess=User Credential configuration has been saved
deleteExecutorProfileConfirmTitle=Delete executor?
auth=Auth
accessTokenLifespanImplicitFlow=Access Token Lifespan For Implicit Flow
createAttributeSuccess=Success\! User Profile configuration has been saved.
annotations=Annotations
confirmAccessTokenBody=If you regenerate registration access token, the access data regarding the client registration service will be updated.
remainingCount=Remaining count
eventTypes.INVALID_SIGNATURE.description=Invalid signature
download=Download
authScopes=Authorization scopes
requiredWhen=Required when
updatePasswordPolicyError=Could not update the password policies\: '{{error}}'
max-clients.tooltip=It will not be allowed to register a new client if count of existing clients in realm is same or bigger than the configured limit.
uuidLdapAttributeHelp=Name of the LDAP attribute, which is used as a unique object identifier (UUID) for objects in LDAP. For many LDAP server vendors, it is 'entryUUID'; however some are different. For example, for Active directory it should be 'objectGUID'. If your LDAP server does not support the notion of UUID, you can use any other attribute that is supposed to be unique among LDAP users in tree. For example 'uid' or 'entryDN'.
mappingDetails=Mapper details
top-level-flow-type.client-flow=Client flow
eventTypes.GRANT_CONSENT_ERROR.description=Grant consent error
claim=Claim
hardcodedAttribute=When user is imported from provider, hardcode a value to a specific user attribute.
permissionSaveError=Could not update the permission due to {{error}}
optimizeLookupHelp=When signing SAML documents in REDIRECT binding for SP that is secured by Keycloak adapter, should the ID of the signing key be included in SAML protocol message in <Extensions> element? This optimizes validation of the signature as the validating party uses a single key instead of trying every known key for validation.
deleteClientScope_one=Delete client scope {{name}}
accessTokenError=Could not regenerate access token due to\: {{error}}
joinGroups=Join Groups
scopePermissions.clients.configure-description=Reduced management permissions for administrator. Cannot set scope, template, or protocol mappers.
providedBy=Provided by
doNotStoreUsers=Do not store users
ms=milliseconds
ipAddress=IP address
keyID=KEY_ID
spi=SPI
emptyValidators=No validators.
plus=Plus
browserFlow=Browser Flow
anyScope=Any scope
enableDisable=Disabled clients cannot initiate a login or have obtained access tokens.
noUsersFound=No users found
serverInfo=Server info
chooseAPolicyTypeInstructions=Choose one policy type from the list below and then you can configure a new policy for authorization. There are some types and description.
emailThemeHelp=Select a theme for emails that are sent by the server.
principalTypeHelp=Way to identify and track external users from the assertion. Default is using Subject NameID, alternatively you can set up identifying attribute.
Wednesday=Wednesday
consents=Consents
authDetails=Authorization details
mappingDeletedError=Could not delete mapping\: '{{error}}'
minimumQuickLoginWaitSecondsHelp=How long to wait after a quick login failure.
mappedGroupAttributesHelp=List of names of attributes divided by commas. This points to the list of attributes on LDAP group, which will be mapped as attributes of Group in Keycloak. Leave this empty if no additional group attributes are required to be mapped in Keycloak.
deleteGrantsSuccess=Grants successfully revoked.
mapperTypeGroupLdapMapper=group-ldap-mapper
policyEnforcementModes.DISABLED=Disabled
openIdConnectCompatibilityModes=Open ID Connect Compatibility Modes
no=No
code=Code
nameHelp=Help text for the name of the new flow
keys=Keys
defaultSigAlg=Default Signature Algorithm
signatureKeyName=SAML signature key name
notBeforeTooltip=The admin URL should be set in the Settings tab first.
resourcesToImport=Resources to import
selectRole.label=Select Role
isBinaryAttributeHelp=Should be true for binary LDAP attributes.
whoWillAppearPopoverFooterText=Users who have this role as an effective role cannot be added on this tab.
eventTypes.RESTART_AUTHENTICATION_ERROR.name=Restart authentication error
generatedUserInfoIsDisabled=Generated user info is disabled when no user is selected
nameHelpHelp=Name of the mapper
prompts.consent=Consent
flowNameHelp=Help text for the name of the new flow
webAuthnPolicyRpEntityName=Relying party entity name
lastEvaluation=Last Evaluation
createClientConditionError=Error creating condition\: {{error}}
serverPrincipalHelp=Full name of server principal for HTTP service including server and domain name. For example, HTTP/host.foo.org@FOO.ORG
enableStartTlsHelp=Encrypts the connection to LDAP using STARTTLS, which will disable connection pooling
resourceScopeSuccess=The authorization scope successfully deleted
userIdHelperText=Enter the unique ID of the user for this identity provider.
forwardParametersHelp=Non OpenID Connect/OAuth standard query parameters to be forwarded to external IDP from the initial application request to Authorization Endpoint. Multiple parameters can be entered, separated by comma (,).
on=On
changeAuthenticatorConfirmTitle=Change to {{clientAuthenticatorType}}?
eventTypes.OAUTH2_DEVICE_AUTH.name=Oauth2 device authentication
admin-events-cleared=The admin events have been cleared
or=or
deleteDialogTitle=Delete attribute group?
eventTypes.CLIENT_INITIATED_ACCOUNT_LINKING.description=Client initiated account linking
annotationsText=Annotations
ldapAttributeName=LDAP attribute name
acceptsPromptNone=Accepts prompt\=none forward from client
loginThemeHelp=Select theme for login, OTP, grant, registration and forgot password pages.
AESKeySizeHelp=Size in bytes for the generated AES key. Size 16 is for AES-128, Size 24 for AES-192, and Size 32 for AES-256. WARN\: Bigger keys than 128 are not allowed on some JDK implementations.
client-accesstype.tooltip=Access Type of the client, for which the condition will be applied. Confidential client has enabled client authentication when public client has disabled client authentication. Bearer-only is a deprecated client type.
oneTimePassword=One-Time Password
invalidateRotatedError=Could not remove rotated secret\: {{error}}
excludeSessionStateFromAuthenticationResponseHelp=If this is on, the parameter 'session_state' will not be included in OpenID Connect Authentication Response. It is useful if the client uses an older OIDC / OAuth2 adapter, which does not support the 'session_state' parameter.
useRefreshTokenForClientCredentialsGrantHelp=If this is on, a refresh_token will be created and added to the token response if the client_credentials grant is used. The OAuth 2.0 RFC6749 Section 4.4.3 states that a refresh_token should not be generated when client_credentials grant is used. If this is off then no refresh_token will be generated and the associated user session will be removed.
userManagedAccess=User-managed access
initialAccessToken=Initial access token
rowEditBtnAriaLabel=Edit {{messageBundle}}
evictionDay=Eviction day
vendorHelp=LDAP vendor (provider)
applyToResourceType=Apply to Resource Type
addDefaultGroups=Add default groups
selectRole.tooltip=Enter role in the textbox to the left, or click this button to browse and select the role you want.
filterGroups=Filter groups
validPostLogoutRedirectUri=Valid post logout redirect URIs
authnContextClassRefs=AuthnContext ClassRefs
deleteCredentialsSuccess=The credentials has been deleted successfully.
eventTypes.PERMISSION_TOKEN_ERROR.name=Permission token error
userProfileSuccess=User profile settings successfully updated.
attributeDefaultValueHelp=If there is no value in Keycloak DB and attribute is mandatory in LDAP, this value will be propagated to LDAP.
cibaPolicy=CIBA Policy
Saturday=Saturday
importSkipped_other={{count}} records skipped.
membershipAttributeTypeHelp=DN means that LDAP group has it's members declared in form of their full DN. For example 'member\: uid\=john,ou\=users,dc\=example,dc\=com'. UID means that LDAP group has it's members declared in form of pure user uids. For example 'memberUid\: john'.
unsavedChangesTitle=Unsaved changes
emptyResourcesInstructions=If you want to create a resource, please click the button below.
save-user-events=If enabled, user events are saved to the database, which makes events available to the admin and account management UIs.
otpSupportedApplications.totpAppFreeOTPName=FreeOTP
validPostLogoutRedirectURIs=Valid URI pattern a browser can redirect to after a successful logout. A value of '+' or an empty field will use the list of valid redirect uris. A value of '-' will not allow any post logout redirect uris. Simple wildcards are allowed such as 'http\://example.com/*'. Relative path can be specified too such as /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used.
composite=Composite
recommendedSsoTimeout=It is recommended for this value to be shorter than the SSO session idle timeout\: {{time}}
sessionExplain=Sessions are sessions of users in this realm and the clients that they access within the session.
noSearchResults=No search results
eventTypes.AUTHREQID_TO_TOKEN.description=Authreqid to token
recent=Recent
executeActions=Execute actions
policyProvider.aggregate=Reuse existing policies to build more complex ones and keep your permissions even more decoupled from the policies that are evaluated during the processing of authorization requests.
advancedAttributeToRole=If the set of attributes exists and can be matched, grant the user the specified realm or client role.
userEventsSettings=User events settings
deny=Deny
moveGroupSuccess=Group moved
eventTypes.USER_INFO_REQUEST.description=User info request
userDeletedError=The user could not be deleted {{error}}
edit=Edit
authorizationScopeDetails=Authorization scope details
ldapGroupsDnHelp=LDAP DN where groups of this tree are saved. For example 'ou\=groups,dc\=example,dc\=org'
readOnly=Read only
client-updater-trusted-hosts.tooltip=List of Hosts, which are trusted. In case that client registration/update request comes from the host/domain specified in this configuration, condition evaluates to true. You can use hostnames or IP addresses. If you use star at the beginning (for example '*.example.com' ) then whole domain example.com will be trusted.
resultDeny=Result-Deny
kc.client.network.host=Client Host
noResourceCreateHint=There are no resources you can't create resource-based permission
directMembership=Direct membership
addExecutionTitle=Add an execution
associatedRolesText=Associated roles
clientIdHelp=The client identifier registered with the identity provider.
eventTypes.INVALID_SIGNATURE_ERROR.name=Invalid signature error
clientSecretSuccess=Client secret regenerated
oAuthDeviceCodeLifespan=OAuth 2.0 Device Code Lifespan
ldapConnectionAndAuthorizationSettingsDescription=This section contains options related to the configuration of the connection to the LDAP server. It also contains options related to authentication of the LDAP connection to the LDAP server.
clientSaveSuccess=Client successfully updated
ecdsaGenerated=ecdsca-generated
flow-type.basic-flow=Generic
oAuthDevicePollingInterval=OAuth 2.0 Device Polling Interval
deletedSuccessRealmSetting=The realm has been deleted
webauthnPasswordlessPolicy=Webauthn Passwordless Policy
editUserLabel=Edit User Label Button
conditions=Conditions
addUri=Add URI
excludeIssuerFromAuthenticationResponse=Exclude Issuer From Authentication Response
minus=Minus
groupsHelp=Groups where the user has membership. To leave a group, select it and click Leave.
includeGroupsAndRoles=Include groups and roles
groupsPermissionsHint=Determines if fine grained permissions are enabled for managing this role. Disabling will delete all current permissions that have been set up.
searchForMessageBundle=Search for message bundle
offlineSessionMaxHelp=Max time before an offline session is expired regardless of activity.
resourceSaveError=Could not persist resource due to {{error}}
clientsClientScopesHelp=The scopes associated with this resource.
updateCredentialUserLabelError=Error changing user label\: {{error}}
enableHelpMode=Enable help mode
clientPoliciesTab=Client policies tab
ldapGroupsDn=LDAP groups DN
ldapFullNameAttributeHelp=Name of the LDAP attribute, which contains the fullName of the user. Usually it will be 'cn'.
clientRegisterPolicyDeleteConfirm=Are you sure you want to permanently delete the client registration policy {{name}}
jsonEditor=JSON editor
chooseBindingType=Choose binding type
mappingCreatedError=Could not create mapping\: '{{error}}'
deleteClientPolicyProfileConfirmTitle=Delete profile?
passwordPoliciesHelp.forceExpiredPasswordChange=The number of days the password is valid before a new password is required.
envelopeFromHelp=An email address used for bounces (optional).
passwordPoliciesHelp.upperCase=The number of uppercase letters required in the password string.
policyDeletedError=Could not remove the resource {{error}}
key=Key
email=Email
groupDeleted_other=Groups deleted
acrToLoAMappingHelp=Define which ACR (Authentication Context Class Reference) value is mapped to which LoA (Level of Authentication). The ACR can be any value, whereas the LoA must be numeric.
uploadFile=Upload JSON file
loginActionTimeoutHelp=Max time a user has to complete login related actions like update password or configure totp. This is recommended to be relatively long, such as 5 minutes or more
identityProviders=Identity providers
importUsers=Import users
authenticationFlow=Authentication flow
leaveGroup_other=Leave groups?
deleteClientPolicySuccess=Client policy deleted
mapperTypeCertificateLdapMapper=certificate-ldap-mapper
clientAuthentications.client_secret_basic=Client secret sent as basic auth
started=Started
filteredByClaimHelp=If true, ID tokens issued by the identity provider must have a specific claim. Otherwise, the user can not authenticate through this broker.
mapperTypeCertificateLdapMapperHelp=Used to map single attribute which contains a certificate from LDAP user to attribute of UserModel in Keycloak DB
permissionDecisionStrategyHelp=The decision strategy dictates how the policies associated with a given permission are evaluated and how a final decision is obtained. 'Affirmative' means that at least one policy must evaluate to a positive decision in order for the final decision to be also positive. 'Unanimous' means that all policies must evaluate to a positive decision in order for the final decision to be also positive. 'Consensus' means that the number of positive decisions must be greater than the number of negative decisions. If the number of positive and negative is the same, the final decision will be negative.
userManagedAccessHelp=If enabled, users are allowed to manage their resources and permissions using the Account Management UI.
confirm=Confirm
policyType.totp=Time based
addAttribute=Add an attribute
clientScopeSearch.protocol=Protocol
initialAccessTokenDetails=Initial access token details
noMessageBundles=No message bundles
deleteProvider=Delete provider?
inputTypeSize=Input size
createAttributeSubTitle=Create a new attribute
eventTypes.CODE_TO_TOKEN_ERROR.name=Code to token error
emptyAuthorizationInstructions=If you want to create authorization scopes, please click the button below to create the authorization scope
subjectHelp=A regular expression for validating Subject DN in the Client Certificate. Use "(.*?)(?\:$)" to match all kind of expressions.
updatePolicySuccess=Successfully updated the policy
eventTypes.CUSTOM_REQUIRED_ACTION.name=Custom required action
updateExecutorError=Executor not updated
clientIdHelpHelp=Client ID of client to which LDAP role mappings will be mapped. Applicable only if 'Use Realm Roles Mapping' is false.
createdAt=Created at
moveGroupEmpty=No sub groups
rolesHelp=Select the roles you want to associate with the selected user.
samlEntityDescriptor=SAML entity descriptor
passwordPolicyHintsEnabled=Password policy hints enabled
enableLdapv3PasswordHelp=Use the LDAPv3 Password Modify Extended Operation (RFC-3062). The password modify extended operation usually requires that LDAP user already has password in the LDAP server. So when this is used with 'Sync Registrations', it can be good to add also 'Hardcoded LDAP attribute mapper' with randomly generated initial password.
syncMode=Sync mode
details=Details
privateRSAKeyHelp=Private RSA Key encoded in PEM format
onDragStart=Dragging started for item {{item}}
pushedAuthorizationRequestRequired=Pushed authorization request required
requirements.REQUIRED=Required
generate=Generate
clientOfflineSessionMaxHelp=Max time before a client offline session is expired. If Offline Session Max Limited is enabled at realm level, offline tokens are invalidated when a client offline session is expired. The option does not affect the global user SSO session. If not set, it uses the realm Offline Session Max value.
resetPasswordBtn=Reset password
strictTransportSecurity=HTTP Strict Transport Security (HSTS)
editInfo=Edit info
offlineSessionMaxLimited=Offline Session Max Limited
providerCreateSuccess=New client policy created successfully
disableSigning=Disable "{{key}}"
periodicChangedUsersSync=Periodic changed users sync
searchScope=Search scope
dateFrom=Date(from)
importAdded_one=One record added.
clientAccessType=It uses the client's access type (confidential, public, bearer-only) to determine whether the policy is applied. Condition is checked during most of OpenID Connect requests (Authorization requests, token requests, introspection endpoint request, etc.). Confidential client has enabled client authentication when public client has disabled client authentication. Bearer-only is a deprecated client type.
firstName=First name
emptySecondaryAction=Configure a new mapper
defaultGroupAdded_one=New group added to the default groups
unexpectedError=An unexpected error occurred\: '{{error}}'
removeAllAssociatedRolesConfirmDialog=This action will remove the associated roles of {{name}}. Users who have permission to {{name}} will no longer have access to these roles.
noRolesInstructions=You haven't assigned any roles to this user. Assign a role to get started.
authorizationEncryptedResponseEncHelp=JWA Algorithm used for content encryption in encrypting the authorization response when the response mode is jwt. This option is needed if you want encrypted authorization response. If left empty, the authorization response is just signed, but not encrypted.
permissionName=The name of this permission.
postBrokerLoginFlowAliasHelp=Alias of authentication flow, which is triggered after each login with this identity provider. Useful if you want additional verification of each user authenticated with this identity provider (for example OTP). Leave this to "None" if you need no any additional authenticators to be triggered after login with this identity provider. Also note that authenticator implementations must assume that user is already set in ClientSession as identity provider already set it.
preview=Preview
eventTypes.UNREGISTER_NODE_ERROR.name=Unregister node error
clientRegisterPolicyDeleteConfirmTitle=Delete client registration policy?
groupDetails=Group details
sessionsType.allSessions=All session types
kid=Kid
sessionsType.serviceAccount=Service account
allowKerberosAuthenticationHelp=Enable/disable HTTP authentication of users with SPNEGO/Kerberos tokens. The data about authenticated users will be provisioned from this LDAP server.
oauthDeviceAuthorizationGrantHelp=This enables support for OAuth 2.0 Device Authorization Grant, which means that client is an application on device that has limited input capabilities or lack a suitable browser.
clientSignatureHelp=Will the client sign their saml requests and responses? And should they be validated?
importOverwritten_other={{count}} records overwritten.
requirements.CONDITIONAL=Conditional
leaveGroupConfirmDialog_one=Are you sure you want to remove {{username}} from the group {{groupname}}?
kc.client.user_agent=Client/User Agent
frontendUrl=Frontend URL
permissionDeletedSuccess=Successfully deleted permission
clientScopeRemoveSuccess=Scope mapping successfully removed
addClientScopes=Add client scopes
doNotStoreUsersHelp=When enabled, users from this broker are not persisted in internal database.
deletePolicyConfirm=If you delete this policy, some permissions or aggregated policies will be affected.
userCreateError=Could not create user\: {{error}}
user-events-cleared=The user events have been cleared
resetPasswordConfirm=Reset password?
emailAsUsernameHelpText=Allow users to set email as username.
AESKeySize=AES Key Size
fullName={{givenName}} {{familyName}}
deleteConfirm=Are you sure you want to permanently delete the provider '{{provider}}'?
compositesRemovedAlertDescription=All the associated roles have been removed
aliasHelp=The alias uniquely identifies an identity provider and it is also used to build the redirect uri.
selectRealm=Select realm
roleNameLdapAttribute=Role name LDAP attribute
javaKeystore=java-keystore
updatedUserProfileSuccess=User Profile configuration has been saved
deleteProviderMapper=Delete mapper?
clientsPermissionsHint=Fine grained permissions for administrators that want to manage this client or apply roles defined by this client.
lookAroundHelp=How far around should the server look just in case the token generator and server are out of time sync or counter sync?
usersLeft_one={{count}} user left the group
sync-keycloak-groups-to-ldap=Sync Keycloak groups to LDAP
saveError=User federation provider could not be saved\: {{error}}
bruteForceDetection=Brute force detection
loginTimeoutHelp=Max time a user has to complete a login. This is recommended to be relatively long, such as 30 minutes or more
eventTypes.OAUTH2_DEVICE_CODE_TO_TOKEN.name=Oauth2 device code to token
searchGroups=Search groups
trusted-hosts.tooltip=List of Hosts, which are trusted and are allowed to invoke Client Registration Service and/or be used as values of Client URIs. You can use hostnames or IP addresses. If you use star at the beginning (for example '*.example.com' ) then whole domain example.com will be trusted.
disableNonceHelp=Do not send the nonce parameter in the authentication request. The nonce parameter is sent and verified by default.
deleteClientProfile=Delete this client profile
none=None
type=Type
createNewUser=Create new user
emptyClientProfiles=No profiles
internationalization=Internationalization
seconds=Seconds
memberofLdapAttributeHelp=Used just when 'User Roles Retrieve Strategy' is GET_GROUPS_FROM_USER_MEMBEROF_ATTRIBUTE. It specifies the name of the LDAP attribute on the LDAP user, which contains the groups, which the user is member of. Usually it will be the default 'memberOf'.
clientRegisterPolicyDeleteSuccess=Client registration policy deleted successfully
otpPolicyDigits=Number of digits
keysFilter.ACTIVE=Active keys
rsaGenerated=rsa-generated
krbPrincipalAttributeHelp=Name of the LDAP attribute, which refers to Kerberos principal. This is used to lookup appropriate LDAP user after successful Kerberos/SPNEGO authentication in Keycloak. When this is empty, the LDAP user will be looked based on LDAP username corresponding to the first part of his Kerberos principal. For instance, for principal 'john@KEYCLOAK.ORG', it will assume that LDAP username is 'john'.
client-roles-condition.tooltip=Client roles, which will be checked during this condition evaluation. Condition evaluates to true if client has at least one client role with the name as the client roles specified in the configuration.
impersonateError=Could not impersonate the user\: {{error}}
keyLabel=Key
syncChangedUsers=Sync changed users
eventTypes.IDENTITY_PROVIDER_RESPONSE_ERROR.name=Identity provider response error
orderDialogIntro=The order that the providers are listed in the login page or the Account UI. You can drag the row handles to change the order.
clientSessionIdle=Client Session Idle
push=Push
targetClaimHelp=Specifies the target claim which the policy will fetch.
periodicFullSyncHelp=Whether periodic full synchronization of LDAP users to Keycloak should be enabled or not
scopePermissions.users.user-impersonated-description=Policies that decide which users can be impersonated. These policies are applied to the user being impersonated.
forceNameIdFormat=Force name ID format
noMappersInstructions=There are currently no mappers for this identity provider.
deleteConfirmFlow=Delete flow?
addRole=Add role
FAIL=Fail import
userInfoSignedResponseAlgorithmHelp=JWA algorithm used for signed User Info Endpoint response. If set to 'unsigned', User Info Response won't be signed and will be returned in application/json format.
lastName=Last name
isAccessTokenJWT=Access Token is JWT
deleteConfirmDialog_one=Are you sure you want to permanently delete {{count}} selected user
eventTypes.AUTHREQID_TO_TOKEN.name=Authreqid to token
createError=Could not create the identity provider\: {{error}}
excludeIssuerFromAuthenticationResponseHelp=If this is on, the parameter 'iss' will not be included in OpenID Connect Authentication Response. It is useful if the client uses an older OIDC / OAuth2 adapter, which does not support the 'iss' parameter.
eventTypes.AUTHREQID_TO_TOKEN_ERROR.name=Authreqid to token error
deletePermissionConfirm=Are you sure you want to delete the permission {{permission}}
TERMS_AND_CONDITIONS=Terms and Conditions (TERMS_AND_CONDITIONS)
artifactResolutionServiceHelp=SAML Artifact resolution service for the client. This is the endpoint to which Keycloak will send a SOAP ArtifactResolve message. You can leave this blank if you do not have a URL for this binding.
userRoleMappingUpdatedSuccess=User role mapping successfully updated
clientUpdaterTrustedHosts=Trusted Hosts
deleteSuccess=Attributes group deleted.
attributesDropdown=Attributes dropdown
ssoServiceUrlHelp=The Url that must be used to send authentication requests (SAML AuthnRequest).
copy=Copy
credentialData=Data
clientRolesConditionTooltip=Client roles, which will be checked during this condition evaluation. Condition evaluates to true if client has at least one client role with the name as the client roles specified in the configuration.
invalidateSecret=Invalidate
emptyPermissionInstructions=If you want to create a permission, please click the button below to create a resource-based or scope-based permission.
webAuthnPolicyAvoidSameAuthenticatorRegisterHelp=Avoid registering the authenticator that has already been registered.
memberofLdapAttribute=Member-of LDAP attribute
supportedLocales=Supported locales
showPasswordDataValue=Value
webAuthnPolicyAttestationConveyancePreference=Attestation conveyance preference
copyOf=Copy of {{name}}
eventTypes.REMOVE_TOTP.description=Remove totp
evictionMinute=Eviction minute
requiredClient=Please add at least one client.
help=Help
passSubject=Pass subject
deleteFlowSuccess=Flow successfully deleted
nodeReRegistrationTimeoutHelp=Interval to specify max time for registered clients cluster nodes to re-register. If cluster node will not send re-registration request to Keycloak within this time, it will be unregistered from Keycloak
rename=Rename
httpPostBindingLogoutHelp=Indicates whether to respond to requests using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
policyProvider.client=Define conditions for your permissions where a set of one or more clients is permitted to access an object.
clientAuthentication=Client authentication
validatePasswordPolicy=Validate password policy
registrationEmailAsUsername=Email as username
webAuthnPolicyFormHelp=Policy for WebAuthn authentication. This one will be used by 'WebAuthn Register' required action and 'WebAuthn Authenticator' authenticator. Typical usage is, when WebAuthn will be used for the two-factor authentication.
createResource=Create resource
data=Data
createNewMapper=Create new mapper
mapperTypeMsadUserAccountControlManager=msad-user-account-control-mapper
deleteNodeFail=Could not delete node\: '{{error}}'
syncModeOverrideHelp=Overrides the default sync mode of the IDP for this mapper. Values are\: 'legacy' to keep the behaviour before this option was introduced, 'import' to only import the user once during first login of the user with this identity provider, 'force' to always update the user during every login with this identity provider and 'inherit' to use the sync mode defined in the identity provider for this mapper.
eventTypes.TOKEN_EXCHANGE_ERROR.description=Token exchange error
strictTransportSecurityHelp=The Strict-Transport-Security HTTP header tells browsers to always use HTTPS. Once a browser sees this header, it will only visit the site over HTTPS for the time specified (1 year) at max-age, including the subdomains. <1>Learn more</1>
authenticationExplain=Authentication is the area where you can configure and manage different credential types.
passwordPoliciesHelp.hashIterations=The number of times a password is hashed before storage or verification. Default\: 27,500.
dropNonexistingGroupsDuringSync=Drop non-existing groups during sync
clientAssertionSigningAlgHelp=Signature algorithm to create JWT assertion as client authentication. In the case of JWT signed with private key or JWT signed with client secret, it is required. If no algorithm is specified, the following algorithm is adapted. RS256 is adapted in the case of JWT signed with private key. HS256 is adapted in the case of JWT signed with client secret.
addProvider_other=Add {{provider}} providers
cibaExpiresIn=Expires In
dynamicScopeFormatHelp=This is the regular expression that the system will use to extract the scope name and variable.
updateMessageBundleError=Error updating message bundle.
resetPasswordConfirmText=Are you sure you want to reset the password for the user {{username}}?
create=Create
noAvailableIdentityProviders=No available identity providers.
passSubjectHelp=During login phase, forward an optional login_hint query parameter to SAML AuthnRequest's Subject.
notBeforeSetToNow=Not Before set for client
resource=Resource
emptyConditions=No conditions configured
profiles=Profiles
userSession.modelNote.tooltip=Name of stored user session note within the UserSessionModel.note map.
filterByRoles=Filter by realm roles
maxLifespan=Max lifespan
host-sending-registration-request-must-match.label=Host Sending Client Registration Request Must Match
eventTypes.VERIFY_PROFILE_ERROR.description=Verify profile error
webOriginsHelp=Allowed CORS origins. To permit all origins of Valid Redirect URIs, add '+'. This does not include the '*' wildcard though. To permit all origins, explicitly add '*'.
noSessionsForClient=There are currently no active sessions for this client.
profilesConfigType=Configure via\:
enableHelp=Help is enabled
xRobotsTagHelp=Prevent pages from appearing in search engines <1>Learn more</1>
client-updater-source-roles.label=Updating entity role
clientRegisterPolicyDeleteError=Could not delete client registration policy\: '{{error}}'
resourceFile=Resource file
admin-clearEvents=Deletes all admin events in the database.
hardcodedRole=When user is imported from provider, hardcode a role mapping for it.
searchType.default=Default search
keysFilter.DISABLED=Disabled keys
link=Link
defaultGroupAddedError=Error adding group(s) to the default group {error}
eventTypes.INVALID_SIGNATURE_ERROR.description=Invalid signature error
idpUnlinkSuccess=The provider link has been removed
providerType=Provider Type
clientSessionIdleHelp=Time a client session is allowed to be idle before it expires. Tokens are invalidated when a client session is expired. The option does not affect the global user SSO session. If not set, it uses the standard SSO Session Idle value.
passwordPoliciesHelp.hashAlgorithm=Applies a hashing algorithm to passwords, so they are not stored in clear text.
scopesSelect=Specifies that this permission must be applied to one or more scopes.
selectMethodType.generate=Generate
emailInvalid=You must enter a valid email.
chooseAPolicyProvider=Choose a policy provider
clientAuthenticationHelp=The client authentication method (cfr. https\://openid.net/specs/openid-connect-core-1_0.html\#ClientAuthentication). In case of JWT signed with private key, the realm private key is used.
kerberosRealmHelp=Name of kerberos realm. For example, FOO.ORG
roleCreateError=Could not create role\: {{error}}
clientSecretHelp=The client secret registered with the identity provider. This field is able to obtain its value from vault, use ${vault.ID} format.
offlineSessionMax=Offline Session Max
generatedUserInfoHelp=See the example User Info, which will be provided by the User Info Endpoint
dynamicScopeFormat=Dynamic scope format
webAuthnPolicyExtraOriginsHelp=The list of extra origin for non-web application.
updatePermissionSuccess=Successfully updated the permission
idpLinkSuccess=Identity provider has been linked
removeAnnotationText=Remove annotation
verifyEmailHelpText=Require user to verify their email address after initial login or after address changes are submitted.
referrerPolicy=Referrer Policy
flow.clients=Client authentication flow
eventTypes.IDENTITY_PROVIDER_FIRST_LOGIN_ERROR.description=Identity provider first login error
groups=Groups
emptyStateText=There aren't any realm roles in this realm. Create a realm role to get started.
includeSubGroups=Include sub-group users
permanentLockoutHelp=Lock the user permanently when the user exceeds the maximum login failures.
logicType.positive=Positive
associatedPolicy=Associated policy
accountTheme=Account theme
webAuthnPolicyAvoidSameAuthenticatorRegister=Avoid same authenticator registration
emptyExecutors=No executors configured
notBeforeNowClear=Not Before cleared for client
selectARole=Select a role
titleAuthentication=Authentication
category=Category
startBySearchingAUser=Start by searching for users
times.days=Days
selectALocale=Select a locale
clientsClientScopesHelp=The scopes associated with this resource.
error-empty=Please specify value of '{{0}}'.
error-invalid-blank=Please specify value of '{{0}}'.
error-invalid-date='{{0}}' is invalid date.
error-invalid-email=Invalid email address.
error-invalid-length-too-long='{{0}}' must have maximal length of {{2}}.
error-invalid-length-too-short='{{0}}' must have minimal length of {{1}}.
error-invalid-length='{{0}}' must have a length between {{1}} and {{2}}.
error-invalid-number='{{0}}' is invalid number.
error-invalid-uri-fragment='{{0}}' is invalid URL fragment.
error-invalid-uri-scheme='{{0}}' has invalid URL scheme.
error-invalid-uri='{{0}}' is invalid URL.
error-invalid-value='{{0}}' has invalid value.
error-number-out-of-range-too-big='{{0}}' must have maximal value of {{2}}.
error-number-out-of-range-too-small='{{0}}' must have minimal value of {{1}}.
error-number-out-of-range='{{0}}' must be a number between {{1}} and {{2}}.
error-pattern-no-match='{{0}}' doesn't match required format.
error-person-name-invalid-character='{{0}}' contains invalid character.
error-user-attribute-required=Please specify '{{0}}'.
error-username-invalid-character='{{0}}' contains invalid character.
error-user-attribute-read-only=The field {{0}} is read only.
missingUsernameMessage='{{0}}': Please specify username.
missingFirstNameMessage='{{0}}': Please specify first name.
invalidEmailMessage='{{0}}': Invalid email address.
missingLastNameMessage='{{0}}': Please specify last name.
missingEmailMessage='{{0}}': Please specify email.
missingPasswordMessage='{{0}}': Please specify password.