|
|
|
@ -1,901 +0,0 @@
|
|
|
|
|
# Common messages
|
|
|
|
|
enabled=de Enabled
|
|
|
|
|
name=de Name
|
|
|
|
|
displayName=de Display name
|
|
|
|
|
displayNameHtml=de HTML Display name
|
|
|
|
|
save=de Save
|
|
|
|
|
cancel=de Cancel
|
|
|
|
|
onText=AN
|
|
|
|
|
offText=AUS
|
|
|
|
|
client=de Client
|
|
|
|
|
clients=de Clients
|
|
|
|
|
clear=de Clear
|
|
|
|
|
selectOne=de Select One...
|
|
|
|
|
|
|
|
|
|
true=de True
|
|
|
|
|
false=de False
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# Realm settings
|
|
|
|
|
realm-detail.enabled.tooltip=de Users and clients can only access a realm if it's enabled
|
|
|
|
|
registrationAllowed=de User registration
|
|
|
|
|
registrationAllowed.tooltip=de Enable/disable the registration page. A link for registration will show on login page too.
|
|
|
|
|
registrationEmailAsUsername=de Email as username
|
|
|
|
|
registrationEmailAsUsername.tooltip=de If enabled then username field is hidden from registration form and email is used as username for new user.
|
|
|
|
|
editUsernameAllowed=de Edit username
|
|
|
|
|
editUsernameAllowed.tooltip=de If enabled, the username field is editable, readonly otherwise.
|
|
|
|
|
resetPasswordAllowed=de Forgot password
|
|
|
|
|
resetPasswordAllowed.tooltip=de Show a link on login page for user to click on when they have forgotten their credentials.
|
|
|
|
|
rememberMe=de Remember Me
|
|
|
|
|
rememberMe.tooltip=de Show checkbox on login page to allow user to remain logged in between browser restarts until session expires.
|
|
|
|
|
verifyEmail=de Verify email
|
|
|
|
|
verifyEmail.tooltip=de Require the user to verify their email address the first time they login.
|
|
|
|
|
sslRequired=de Require SSL
|
|
|
|
|
sslRequired.option.all=de all requests
|
|
|
|
|
sslRequired.option.external=de external requests
|
|
|
|
|
sslRequired.option.none=de none
|
|
|
|
|
sslRequired.tooltip=de Is HTTPS required? 'None' means HTTPS is not required for any client IP address. 'External requests' means localhost and private IP addresses can access without HTTPS. 'All requests' means HTTPS is required for all IP addresses.
|
|
|
|
|
publicKey=de Public key
|
|
|
|
|
gen-new-keys=de Generate new keys
|
|
|
|
|
certificate=de Certificate
|
|
|
|
|
host=de Host
|
|
|
|
|
smtp-host=de SMTP Host
|
|
|
|
|
port=de Port
|
|
|
|
|
smtp-port=de SMTP Port (defaults to 25)
|
|
|
|
|
from=de From
|
|
|
|
|
sender-email-addr=de Sender Email Address
|
|
|
|
|
enable-ssl=de Enable SSL
|
|
|
|
|
enable-start-tls=de Enable StartTLS
|
|
|
|
|
enable-auth=de Enable Authentication
|
|
|
|
|
username=de Username
|
|
|
|
|
login-username=de Login Username
|
|
|
|
|
password=de Password
|
|
|
|
|
login-password=de Login Password
|
|
|
|
|
login-theme=de Login Theme
|
|
|
|
|
login-theme.tooltip=de Select theme for login, TOTP, grant, registration, and forgot password pages.
|
|
|
|
|
account-theme=de Account Theme
|
|
|
|
|
account-theme.tooltip=de Select theme for user account management pages.
|
|
|
|
|
admin-console-theme=de Admin Console Theme
|
|
|
|
|
select-theme-admin-console=de Select theme for admin console.
|
|
|
|
|
email-theme=de Email Theme
|
|
|
|
|
select-theme-email=de Select theme for emails that are sent by the server.
|
|
|
|
|
i18n-enabled=de Internationalization Enabled
|
|
|
|
|
supported-locales=de Supported Locales
|
|
|
|
|
supported-locales.placeholder=de Type a locale and enter
|
|
|
|
|
default-locale=de Default Locale
|
|
|
|
|
realm-cache-clear=de Realm Cache
|
|
|
|
|
realm-cache-clear.tooltip=de Clears all entries from the realm cache (this will clear entries for all realms)
|
|
|
|
|
user-cache-clear=de User Cache
|
|
|
|
|
user-cache-clear.tooltip=de Clears all entries from the user cache (this will clear entries for all realms)
|
|
|
|
|
revoke-refresh-token=de Revoke Refresh Token
|
|
|
|
|
revoke-refresh-token.tooltip=de If enabled refresh tokens can only be used once. Otherwise refresh tokens are not revoked when used and can be used multiple times.
|
|
|
|
|
sso-session-idle=de SSO Session Idle
|
|
|
|
|
seconds=de Seconds
|
|
|
|
|
minutes=de Minutes
|
|
|
|
|
hours=de Hours
|
|
|
|
|
days=de Days
|
|
|
|
|
sso-session-max=de SSO Session Max
|
|
|
|
|
sso-session-idle.tooltip=de Time a session is allowed to be idle before it expires. Tokens and browser sessions are invalidated when a session is expired.
|
|
|
|
|
sso-session-max.tooltip=de Max time before a session is expired. Tokens and browser sessions are invalidated when a session is expired.
|
|
|
|
|
offline-session-idle=de Offline Session Idle
|
|
|
|
|
offline-session-idle.tooltip=de Time an offline session is allowed to be idle before it expires. You need to use offline token to refresh at least once within this period, otherwise offline session will expire.
|
|
|
|
|
access-token-lifespan=de Access Token Lifespan
|
|
|
|
|
access-token-lifespan.tooltip=de Max time before an access token is expired. This value is recommended to be short relative to the SSO timeout.
|
|
|
|
|
access-token-lifespan-for-implicit-flow=de Access Token Lifespan For Implicit Flow
|
|
|
|
|
access-token-lifespan-for-implicit-flow.tooltip=de Max time before an access token issued during OpenID Connect Implicit Flow is expired. This value is recommended to be shorter than SSO timeout. There is no possibility to refresh token during implicit flow, that's why there is separate timeout different to 'Access Token Lifespan'.
|
|
|
|
|
client-login-timeout=de Client login timeout
|
|
|
|
|
client-login-timeout.tooltip=de Max time an client has to finish the access token protocol. This should normally be 1 minute.
|
|
|
|
|
login-timeout=de Login timeout
|
|
|
|
|
login-timeout.tooltip=de Max time a user has to complete a login. This is recommended to be relatively long. 30 minutes or more.
|
|
|
|
|
login-action-timeout=de Login action timeout
|
|
|
|
|
login-action-timeout.tooltip=de Max time a user has to complete login related actions like update password or configure totp. This is recommended to be relatively long. 5 minutes or more.
|
|
|
|
|
headers=de Headers
|
|
|
|
|
brute-force-detection=de Brute Force Detection
|
|
|
|
|
x-frame-options=de X-Frame-Options
|
|
|
|
|
click-label-for-info=de Click on label link for more information. The default value prevents pages from being included via non-origin iframes.
|
|
|
|
|
content-sec-policy=de Content-Security-Policy
|
|
|
|
|
max-login-failures=de Max Login Failures
|
|
|
|
|
max-login-failures.tooltip=de How many failures before wait is triggered.
|
|
|
|
|
wait-increment=de Wait Increment
|
|
|
|
|
wait-increment.tooltip=de When failure threshold has been met, how much time should the user be locked out?
|
|
|
|
|
quick-login-check-millis=de Quick Login Check Milli Seconds
|
|
|
|
|
quick-login-check-millis.tooltip=de If a failure happens concurrently too quickly, lock out the user.
|
|
|
|
|
min-quick-login-wait=de Minimum Quick Login Wait
|
|
|
|
|
min-quick-login-wait.tooltip=de How long to wait after a quick login failure.
|
|
|
|
|
max-wait=de Max Wait
|
|
|
|
|
max-wait.tooltip=de Max time a user will be locked out.
|
|
|
|
|
failure-reset-time=de Failure Reset Time
|
|
|
|
|
failure-reset-time.tooltip=de When will failure count be reset?
|
|
|
|
|
realm-tab-login=de Login
|
|
|
|
|
realm-tab-keys=de Keys
|
|
|
|
|
realm-tab-email=de Email
|
|
|
|
|
realm-tab-themes=de Themes
|
|
|
|
|
realm-tab-cache=de Cache
|
|
|
|
|
realm-tab-tokens=de Tokens
|
|
|
|
|
realm-tab-client-initial-access=de Initial Access Tokens
|
|
|
|
|
realm-tab-security-defenses=de Security Defenses
|
|
|
|
|
realm-tab-general=de General
|
|
|
|
|
add-realm=de Add realm
|
|
|
|
|
|
|
|
|
|
#Session settings
|
|
|
|
|
realm-sessions=de Realm Sessions
|
|
|
|
|
revocation=de Revocation
|
|
|
|
|
logout-all=de Logout all
|
|
|
|
|
active-sessions=de Active Sessions
|
|
|
|
|
sessions=de Sessions
|
|
|
|
|
not-before=de Not Before
|
|
|
|
|
not-before.tooltip=de Revoke any tokens issued before this date.
|
|
|
|
|
set-to-now=de Set to now
|
|
|
|
|
push=de Push
|
|
|
|
|
push.tooltip=de For every client that has an admin URL, notify them of the new revocation policy.
|
|
|
|
|
|
|
|
|
|
#Protocol Mapper
|
|
|
|
|
usermodel.prop.label=de Property
|
|
|
|
|
usermodel.prop.tooltip=de Name of the property method in the UserModel interface. For example, a value of 'email' would reference the UserModel.getEmail() method.
|
|
|
|
|
usermodel.attr.label=de User Attribute
|
|
|
|
|
usermodel.attr.tooltip=de Name of stored user attribute which is the name of an attribute within the UserModel.attribute map.
|
|
|
|
|
userSession.modelNote.label=de User Session Note
|
|
|
|
|
userSession.modelNote.tooltip=de Name of stored user session note within the UserSessionModel.note map.
|
|
|
|
|
multivalued.label=de Multivalued
|
|
|
|
|
multivalued.tooltip=de Indicates if attribute supports multiple values. If true, then the list of all values of this attribute will be set as claim. If false, then just first value will be set as claim
|
|
|
|
|
selectRole.label=de Select Role
|
|
|
|
|
selectRole.tooltip=de Enter role in the textbox to the left, or click this button to browse and select the role you want
|
|
|
|
|
tokenClaimName.label=de Token Claim Name
|
|
|
|
|
tokenClaimName.tooltip=de Name of the claim to insert into the token. This can be a fully qualified name like 'address.street'. In this case, a nested json object will be created.
|
|
|
|
|
jsonType.label=de Claim JSON Type
|
|
|
|
|
jsonType.tooltip=de JSON type that should be used to populate the json claim in the token. long, int, boolean, and String are valid values.
|
|
|
|
|
includeInIdToken.label=de Add to ID token
|
|
|
|
|
includeInIdToken.tooltip=de Should the claim be added to the ID token?
|
|
|
|
|
includeInAccessToken.label=de Add to access token
|
|
|
|
|
includeInAccessToken.tooltip=de Should the claim be added to the access token?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# client details
|
|
|
|
|
clients.tooltip=de Clients are trusted browser apps and web services in a realm. These clients can request a login. You can also define client specific roles.
|
|
|
|
|
search.placeholder=de Search...
|
|
|
|
|
create=de Create
|
|
|
|
|
import=de Import
|
|
|
|
|
client-id=de Client ID
|
|
|
|
|
base-url=de Base URL
|
|
|
|
|
actions=de Actions
|
|
|
|
|
not-defined=de Not defined
|
|
|
|
|
edit=de Edit
|
|
|
|
|
delete=de Delete
|
|
|
|
|
no-results=de No results
|
|
|
|
|
no-clients-available=de No clients available
|
|
|
|
|
add-client=de Add Client
|
|
|
|
|
select-file=de Select file
|
|
|
|
|
view-details=de View details
|
|
|
|
|
clear-import=de Clear import
|
|
|
|
|
client-id.tooltip=de Specifies ID referenced in URI and tokens. For example 'my-client'
|
|
|
|
|
client.name.tooltip=de Specifies display name of the client. For example 'My Client'. Supports keys for localized values as well. For example\: ${my_client}
|
|
|
|
|
client.enabled.tooltip=de Disabled clients cannot initiate a login or have obtain access tokens.
|
|
|
|
|
consent-required=de Consent Required
|
|
|
|
|
consent-required.tooltip=de If enabled users have to consent to client access.
|
|
|
|
|
direct-grants-only=de Direct Grants Only
|
|
|
|
|
direct-grants-only.tooltip=de When enabled, client can only obtain grants from grant REST API.
|
|
|
|
|
client-protocol=de Client Protocol
|
|
|
|
|
client-protocol.tooltip=de 'OpenID connect' allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server.'SAML' enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO) and uses security tokens containing assertions to pass information.
|
|
|
|
|
access-type=de Access Type
|
|
|
|
|
access-type.tooltip=de 'Confidential' clients require a secret to initiate login protocol. 'Public' clients do not require a secret. 'Bearer-only' clients are web services that never initiate a login.
|
|
|
|
|
standard-flow-enabled=de Standard Flow Enabled
|
|
|
|
|
standard-flow-enabled.tooltip=de This enables standard OpenID Connect redirect based authentication with authorization code. In terms of OpenID Connect or OAuth2 specifications, this enables support of 'Authorization Code Flow' for this client.
|
|
|
|
|
implicit-flow-enabled=de Implicit Flow Enabled
|
|
|
|
|
implicit-flow-enabled.tooltip=de This enables support for OpenID Connect redirect based authentication without authorization code. In terms of OpenID Connect or OAuth2 specifications, this enables support of 'Implicit Flow' for this client.
|
|
|
|
|
direct-access-grants-enabled=de Direct Access Grants Enabled
|
|
|
|
|
direct-access-grants-enabled.tooltip=de This enables support for Direct Access Grants, which means that client has access to username/password of user and exchange it directly with Keycloak server for access token. In terms of OAuth2 specification, this enables support of 'Resource Owner Password Credentials Grant' for this client.
|
|
|
|
|
service-accounts-enabled=de Service Accounts Enabled
|
|
|
|
|
service-accounts-enabled.tooltip=de Allows you to authenticate this client to Keycloak and retrieve access token dedicated to this client.
|
|
|
|
|
include-authnstatement=de Include AuthnStatement
|
|
|
|
|
include-authnstatement.tooltip=de Should a statement specifying the method and timestamp be included in login responses?
|
|
|
|
|
sign-documents=de Sign Documents
|
|
|
|
|
sign-documents.tooltip=de Should SAML documents be signed by the realm?
|
|
|
|
|
sign-assertions=de Sign Assertions
|
|
|
|
|
sign-assertions.tooltip=de Should assertions inside SAML documents be signed? This setting isn't needed if document is already being signed.
|
|
|
|
|
signature-algorithm=de Signature Algorithm
|
|
|
|
|
signature-algorithm.tooltip=de The signature algorithm to use to sign documents.
|
|
|
|
|
canonicalization-method=de Canonicalization Method
|
|
|
|
|
canonicalization-method.tooltip=de Canonicalization Method for XML signatures.
|
|
|
|
|
encrypt-assertions=de Encrypt Assertions
|
|
|
|
|
encrypt-assertions.tooltip=de Should SAML assertions be encrypted with client's public key using AES?
|
|
|
|
|
client-signature-required=de Client Signature Required
|
|
|
|
|
client-signature-required.tooltip=de Will the client sign their saml requests and responses? And should they be validated?
|
|
|
|
|
force-post-binding=de Force POST Binding
|
|
|
|
|
force-post-binding.tooltip=de Always use POST binding for responses.
|
|
|
|
|
front-channel-logout=de Front Channel Logout
|
|
|
|
|
front-channel-logout.tooltip=de When true, logout requires a browser redirect to client. When false, server performs a background invocation for logout.
|
|
|
|
|
force-name-id-format=de Force Name ID Format
|
|
|
|
|
force-name-id-format.tooltip=de Ignore requested NameID subject format and use admin console configured one.
|
|
|
|
|
name-id-format=de Name ID Format
|
|
|
|
|
name-id-format.tooltip=de The name ID format to use for the subject.
|
|
|
|
|
root-url=de Root URL
|
|
|
|
|
root-url.tooltip=de Root URL appended to relative URLs
|
|
|
|
|
valid-redirect-uris=de Valid Redirect URIs
|
|
|
|
|
valid-redirect-uris.tooltip=de Valid URI pattern a browser can redirect to after a successful login or logout. Simple wildcards are allowed i.e. 'http://example.com/*'. Relative path can be specified too i.e. /my/relative/path/*. Relative paths will generate a redirect URI using the request's host and port. For SAML, you must set valid URI patterns if you are relying on the consumer service URL embedded with the login request.
|
|
|
|
|
base-url.tooltip=de Default URL to use when the auth server needs to redirect or link back to the client.
|
|
|
|
|
admin-url=de Admin URL
|
|
|
|
|
admin-url.tooltip=de URL to the admin interface of the client. Set this if the client supports the adapter REST API. This REST API allows the auth server to push revocation policies and other adminstrative tasks. Usually this is set to the base URL of the client.
|
|
|
|
|
master-saml-processing-url=de Master SAML Processing URL
|
|
|
|
|
master-saml-processing-url.tooltip=de If configured, this URL will be used for every binding to both the SP's Assertion Consumer and Single Logout Services. This can be individually overiden for each binding and service in the Fine Grain SAML Endpoint Configuration.
|
|
|
|
|
idp-sso-url-ref=de IDP Initiated SSO URL Name
|
|
|
|
|
idp-sso-url-ref.tooltip=de URL fragment name to reference client when you want to do IDP Initiated SSO. Leaving this empty will disable IDP Initiated SSO. The URL you will reference from your browser will be: {server-root}/realms/{realm}/protocol/saml/clients/{client-url-name}
|
|
|
|
|
idp-sso-relay-state=de IDP Initiated SSO Relay State
|
|
|
|
|
idp-sso-relay-state.tooltip=de Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
|
|
|
|
|
web-origins=de Web Origins
|
|
|
|
|
web-origins.tooltip=de Allowed CORS origins. To permit all origins of Valid Redirect URIs add '+'. To permit all origins add '*'.
|
|
|
|
|
fine-saml-endpoint-conf=de Fine Grain SAML Endpoint Configuration
|
|
|
|
|
fine-saml-endpoint-conf.tooltip=de Expand this section to configure exact URLs for Assertion Consumer and Single Logout Service.
|
|
|
|
|
assertion-consumer-post-binding-url=de Assertion Consumer Service POST Binding URL
|
|
|
|
|
assertion-consumer-post-binding-url.tooltip=de SAML POST Binding URL for the client's assertion consumer service (login responses). You can leave this blank if you do not have a URL for this binding.
|
|
|
|
|
assertion-consumer-redirect-binding-url=de Assertion Consumer Service Redirect Binding URL
|
|
|
|
|
assertion-consumer-redirect-binding-url.tooltip=de SAML Redirect Binding URL for the client's assertion consumer service (login responses). You can leave this blank if you do not have a URL for this binding.
|
|
|
|
|
logout-service-binding-post-url=de Logout Service POST Binding URL
|
|
|
|
|
logout-service-binding-post-url.tooltip=de SAML POST Binding URL for the client's single logout service. You can leave this blank if you are using a different binding
|
|
|
|
|
logout-service-redir-binding-url=de Logout Service Redirect Binding URL
|
|
|
|
|
logout-service-redir-binding-url.tooltip=de SAML Redirect Binding URL for the client's single logout service. You can leave this blank if you are using a different binding.
|
|
|
|
|
|
|
|
|
|
# client import
|
|
|
|
|
import-client=de Import Client
|
|
|
|
|
format-option=de Format Option
|
|
|
|
|
select-format=de Select a Format
|
|
|
|
|
import-file=de Import File
|
|
|
|
|
|
|
|
|
|
# client tabs
|
|
|
|
|
settings=de Settings
|
|
|
|
|
credentials=de Credentials
|
|
|
|
|
saml-keys=de SAML Keys
|
|
|
|
|
roles=de Roles
|
|
|
|
|
mappers=de Mappers
|
|
|
|
|
mappers.tooltip=de Protocol mappers perform transformation on tokens and documents. They an do things like map user data into protocol claims, or just transform any requests going between the client and auth server.
|
|
|
|
|
scope=de Scope
|
|
|
|
|
scope.tooltip=de Scope mappings allow you to restrict which user role mappings are included within the access token requested by the client.
|
|
|
|
|
sessions.tooltip=de View active sessions for this client. Allows you to see which users are active and when they logged in.
|
|
|
|
|
offline-access=de Offline Access
|
|
|
|
|
offline-access.tooltip=de View offline sessions for this client. Allows you to see which users retrieve offline token and when they retrieve it. To revoke all tokens for the client, go to Revocation tab and set not before value to now.
|
|
|
|
|
clustering=de Clustering
|
|
|
|
|
installation=de Installation
|
|
|
|
|
installation.tooltip=de Helper utility for generating various client adapter configuration formats which you can download or cut and paste to configure your clients.
|
|
|
|
|
service-account-roles=de Service Account Roles
|
|
|
|
|
service-account-roles.tooltip=de Allows you to authenticate role mappings for the service account dedicated to this client.
|
|
|
|
|
|
|
|
|
|
# client credentials
|
|
|
|
|
client-authenticator=de Client Authenticator
|
|
|
|
|
client-authenticator.tooltip=de Client Authenticator used for authentication this client against Keycloak server
|
|
|
|
|
certificate.tooltip=de Client Certificate for validate JWT issued by client and signed by Client private key from your keystore.
|
|
|
|
|
no-client-certificate-configured=de No client certificate configured
|
|
|
|
|
gen-new-keys-and-cert=de Generate new keys and certificate
|
|
|
|
|
import-certificate=de Import Certificate
|
|
|
|
|
gen-client-private-key=de Generate Client Private Key
|
|
|
|
|
generate-private-key=de Generate Private Key
|
|
|
|
|
archive-format=de Archive Format
|
|
|
|
|
archive-format.tooltip=de Java keystore or PKCS12 archive format.
|
|
|
|
|
key-alias=de Key Alias
|
|
|
|
|
key-alias.tooltip=de Archive alias for your private key and certificate.
|
|
|
|
|
key-password=de Key Password
|
|
|
|
|
key-password.tooltip=de Password to access the private key in the archive
|
|
|
|
|
store-password=de Store Password
|
|
|
|
|
store-password.tooltip=de Password to access the archive itself
|
|
|
|
|
generate-and-download=de Generate and Download
|
|
|
|
|
client-certificate-import=de Client Certificate Import
|
|
|
|
|
import-client-certificate=de Import Client Certificate
|
|
|
|
|
jwt-import.key-alias.tooltip=de Archive alias for your certificate.
|
|
|
|
|
secret=de Secret
|
|
|
|
|
regenerate-secret=de Regenerate Secret
|
|
|
|
|
registrationAccessToken=de Registration access token
|
|
|
|
|
registrationAccessToken.regenerate=de Regenerate registration access token
|
|
|
|
|
registrationAccessToken.tooltip=de The registration access token provides access for clients to the client registration service.
|
|
|
|
|
add-role=de Add Role
|
|
|
|
|
role-name=de Role Name
|
|
|
|
|
composite=de Composite
|
|
|
|
|
description=de Description
|
|
|
|
|
no-client-roles-available=de No client roles available
|
|
|
|
|
scope-param-required=de Scope Param Required
|
|
|
|
|
scope-param-required.tooltip=de This role will only be granted if scope parameter with role name is used during authorization/token request.
|
|
|
|
|
composite-roles=de Composite Roles
|
|
|
|
|
composite-roles.tooltip=de When this role is (un)assigned to a user any role associated with it will be (un)assigned implicitly.
|
|
|
|
|
realm-roles=de Realm Roles
|
|
|
|
|
available-roles=de Available Roles
|
|
|
|
|
add-selected=de Add selected
|
|
|
|
|
associated-roles=de Associated Roles
|
|
|
|
|
composite.associated-realm-roles.tooltip=de Realm level roles associated with this composite role.
|
|
|
|
|
composite.available-realm-roles.tooltip=de Realm level roles associated with this composite role.
|
|
|
|
|
remove-selected=de Remove selected
|
|
|
|
|
client-roles=de Client Roles
|
|
|
|
|
select-client-to-view-roles=de Select client to view roles for client
|
|
|
|
|
available-roles.tooltip=de Roles from this client that you can associate to this composite role.
|
|
|
|
|
client.associated-roles.tooltip=de Client roles associated with this composite role.
|
|
|
|
|
add-builtin=de Add Builtin
|
|
|
|
|
category=de Category
|
|
|
|
|
type=de Type
|
|
|
|
|
no-mappers-available=de No mappers available
|
|
|
|
|
add-builtin-protocol-mappers=de Add Builtin Protocol Mappers
|
|
|
|
|
add-builtin-protocol-mapper=de Add Builtin Protocol Mapper
|
|
|
|
|
scope-mappings=de Scope Mappings
|
|
|
|
|
full-scope-allowed=de Full Scope Allowed
|
|
|
|
|
full-scope-allowed.tooltip=de Allows you to disable all restrictions.
|
|
|
|
|
scope.available-roles.tooltip=de Realm level roles that can be assigned to scope.
|
|
|
|
|
assigned-roles=de Assigned Roles
|
|
|
|
|
assigned-roles.tooltip=de Realm level roles assigned to scope.
|
|
|
|
|
effective-roles=de Effective Roles
|
|
|
|
|
realm.effective-roles.tooltip=de Assigned realm level roles that may have been inherited from a composite role.
|
|
|
|
|
select-client-roles.tooltip=de Select client to view roles for client
|
|
|
|
|
assign.available-roles.tooltip=de Client roles available to be assigned.
|
|
|
|
|
client.assigned-roles.tooltip=de Assigned client roles.
|
|
|
|
|
client.effective-roles.tooltip=de Assigned client roles that may have been inherited from a composite role.
|
|
|
|
|
basic-configuration=de Basic configuration
|
|
|
|
|
node-reregistration-timeout=de Node Re-registration Timeout
|
|
|
|
|
node-reregistration-timeout.tooltip=de Interval to specify max time for registered clients cluster nodes to re-register. If cluster node won't send re-registration request to Keycloak within this time, it will be unregistered from Keycloak
|
|
|
|
|
registered-cluster-nodes=de Registered cluster nodes
|
|
|
|
|
register-node-manually=de Register node manually
|
|
|
|
|
test-cluster-availability=de Test cluster availability
|
|
|
|
|
last-registration=de Last registration
|
|
|
|
|
node-host=de Node host
|
|
|
|
|
no-registered-cluster-nodes=de No registered cluster nodes available
|
|
|
|
|
cluster-nodes=de Cluster Nodes
|
|
|
|
|
add-node=de Add Node
|
|
|
|
|
active-sessions.tooltip=de Total number of active user sessions for this client.
|
|
|
|
|
show-sessions=de Show Sessions
|
|
|
|
|
show-sessions.tooltip=de Warning, this is a potentially expensive operation depending on number of active sessions.
|
|
|
|
|
user=de User
|
|
|
|
|
from-ip=de From IP
|
|
|
|
|
session-start=de Session Start
|
|
|
|
|
first-page=de First Page
|
|
|
|
|
previous-page=de Previous Page
|
|
|
|
|
next-page=de Next Page
|
|
|
|
|
client-revoke.not-before.tooltip=de Revoke any tokens issued before this date for this client.
|
|
|
|
|
client-revoke.push.tooltip=de If admin URL is configured for this client, push this policy to that client.
|
|
|
|
|
select-a-format=de Select a Format
|
|
|
|
|
download=de Download
|
|
|
|
|
offline-tokens=de Offline Tokens
|
|
|
|
|
offline-tokens.tooltip=de Total number of offline tokens for this client.
|
|
|
|
|
show-offline-tokens=de Show Offline Tokens
|
|
|
|
|
show-offline-tokens.tooltip=de Warning, this is a potentially expensive operation depending on number of offline tokens.
|
|
|
|
|
token-issued=de Token Issued
|
|
|
|
|
last-access=de Last Access
|
|
|
|
|
last-refresh=de Last Refresh
|
|
|
|
|
key-export=de Key Export
|
|
|
|
|
key-import=de Key Import
|
|
|
|
|
export-saml-key=de Export SAML Key
|
|
|
|
|
import-saml-key=de Import SAML Key
|
|
|
|
|
realm-certificate-alias=de Realm Certificate Alias
|
|
|
|
|
realm-certificate-alias.tooltip=de Realm certificate is stored in archive too. This is the alias to it.
|
|
|
|
|
signing-key=de Signing Key
|
|
|
|
|
saml-signing-key=de SAML Signing Key.
|
|
|
|
|
private-key=de Private Key
|
|
|
|
|
generate-new-keys=de Generate new keys
|
|
|
|
|
export=de Export
|
|
|
|
|
encryption-key=de Encryption Key
|
|
|
|
|
saml-encryption-key.tooltip=de SAML Encryption Key.
|
|
|
|
|
service-accounts=de Service Accounts
|
|
|
|
|
service-account.available-roles.tooltip=de Realm level roles that can be assigned to service account.
|
|
|
|
|
service-account.assigned-roles.tooltip=de Realm level roles assigned to service account.
|
|
|
|
|
service-account-is-not-enabled-for=de Service account is not enabled for {{client}}
|
|
|
|
|
create-protocol-mappers=de Create Protocol Mappers
|
|
|
|
|
create-protocol-mapper=de Create Protocol Mapper
|
|
|
|
|
protocol=de Protocol
|
|
|
|
|
protocol.tooltip=de Protocol...
|
|
|
|
|
id=de ID
|
|
|
|
|
mapper.name.tooltip=de Name of the mapper.
|
|
|
|
|
mapper.consent-required.tooltip=de When granting temporary access, must the user consent to providing this data to the client?
|
|
|
|
|
consent-text=de Consent Text
|
|
|
|
|
consent-text.tooltip=de Text to display on consent page.
|
|
|
|
|
mapper-type=de Mapper Type
|
|
|
|
|
mapper-type.tooltip=de Type of the mapper
|
|
|
|
|
select-role=de Select role
|
|
|
|
|
select-role.tooltip=de Enter role in the textbox to the left, or click this button to browse and select the role you want.
|
|
|
|
|
|
|
|
|
|
# realm identity providers
|
|
|
|
|
identity-providers=de Identity Providers
|
|
|
|
|
table-of-identity-providers=de Table of identity providers
|
|
|
|
|
add-provider.placeholder=de Add provider...
|
|
|
|
|
provider=de Provider
|
|
|
|
|
gui-order=de GUI order
|
|
|
|
|
first-broker-login-flow=de First Login Flow
|
|
|
|
|
post-broker-login-flow=de Post Login Flow
|
|
|
|
|
redirect-uri=de Redirect URI
|
|
|
|
|
redirect-uri.tooltip=de The redirect uri to use when configuring the identity provider.
|
|
|
|
|
alias=de Alias
|
|
|
|
|
identity-provider.alias.tooltip=de The alias uniquely identifies an identity provider and it is also used to build the redirect uri.
|
|
|
|
|
identity-provider.enabled.tooltip=de Enable/disable this identity provider.
|
|
|
|
|
authenticate-by-default=de Authenticate by Default
|
|
|
|
|
identity-provider.authenticate-by-default.tooltip=de Indicates if this provider should be tried by default for authentication even before displaying login screen.
|
|
|
|
|
store-tokens=de Store Tokens
|
|
|
|
|
identity-provider.store-tokens.tooltip=de Enable/disable if tokens must be stored after authenticating users.
|
|
|
|
|
stored-tokens-readable=de Stored Tokens Readable
|
|
|
|
|
identity-provider.stored-tokens-readable.tooltip=de Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.
|
|
|
|
|
update-profile-on-first-login=de Update Profile on First Login
|
|
|
|
|
on=de On
|
|
|
|
|
on-missing-info=de On missing info
|
|
|
|
|
off=de Off
|
|
|
|
|
update-profile-on-first-login.tooltip=de Define conditions under which a user has to update their profile during first-time login.
|
|
|
|
|
trust-email=de Trust Email
|
|
|
|
|
trust-email.tooltip=de If enabled then email provided by this provider is not verified even if verification is enabled for the realm.
|
|
|
|
|
gui-order.tooltip=de Number defining order of the provider in GUI (eg. on Login page).
|
|
|
|
|
first-broker-login-flow.tooltip=de Alias of authentication flow, which is triggered after first login with this identity provider. Term 'First Login' means that there is not yet existing Keycloak account linked with the authenticated identity provider account.
|
|
|
|
|
post-broker-login-flow.tooltip=de Alias of authentication flow, which is triggered after each login with this identity provider. Useful if you want additional verification of each user authenticated with this identity provider (for example OTP). Leave this empty if you don't want any additional authenticators to be triggered after login with this identity provider. Also note, that authenticator implementations must assume that user is already set in ClientSession as identity provider already set it.
|
|
|
|
|
openid-connect-config=de OpenID Connect Config
|
|
|
|
|
openid-connect-config.tooltip=de OIDC SP and external IDP configuration.
|
|
|
|
|
authorization-url=de Authorization URL
|
|
|
|
|
authorization-url.tooltip=de The Authorization Url.
|
|
|
|
|
token-url=de Token URL
|
|
|
|
|
token-url.tooltip=de The Token URL.
|
|
|
|
|
logout-url=de Logout URL
|
|
|
|
|
identity-provider.logout-url.tooltip=de End session endpoint to use to logout user from external IDP.
|
|
|
|
|
backchannel-logout=de Backchannel Logout
|
|
|
|
|
backchannel-logout.tooltip=de Does the external IDP support backchannel logout?
|
|
|
|
|
user-info-url=de User Info URL
|
|
|
|
|
user-info-url.tooltip=de The User Info Url. This is optional.
|
|
|
|
|
identity-provider.client-id.tooltip=de The client or client identifier registered within the identity provider.
|
|
|
|
|
client-secret=de Client Secret
|
|
|
|
|
show-secret=de Show secret
|
|
|
|
|
hide-secret=de Hide secret
|
|
|
|
|
client-secret.tooltip=de The client or client secret registered within the identity provider.
|
|
|
|
|
issuer=de Issuer
|
|
|
|
|
issuer.tooltip=de The issuer identifier for the issuer of the response. If not provided, no validation will be performed.
|
|
|
|
|
default-scopes=de Default Scopes
|
|
|
|
|
identity-provider.default-scopes.tooltip=de The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to 'openid'.
|
|
|
|
|
prompt=de Prompt
|
|
|
|
|
unspecified.option=de unspecified
|
|
|
|
|
none.option=de none
|
|
|
|
|
consent.option=de consent
|
|
|
|
|
login.option=de login
|
|
|
|
|
select-account.option=de select_account
|
|
|
|
|
prompt.tooltip=de Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
|
|
|
|
|
validate-signatures=de Validate Signatures
|
|
|
|
|
identity-provider.validate-signatures.tooltip=de Enable/disable signature validation of external IDP signatures.
|
|
|
|
|
validating-public-key=de Validating Public Key
|
|
|
|
|
identity-provider.validating-public-key.tooltip=de The public key in PEM format that must be used to verify external IDP signatures.
|
|
|
|
|
import-external-idp-config=de Import External IDP Config
|
|
|
|
|
import-external-idp-config.tooltip=de Allows you to load external IDP metadata from a config file or to download it from a URL.
|
|
|
|
|
import-from-url=de Import from URL
|
|
|
|
|
identity-provider.import-from-url.tooltip=de Import metadata from a remote IDP discovery descriptor.
|
|
|
|
|
import-from-file=de Import from file
|
|
|
|
|
identity-provider.import-from-file.tooltip=de Import metadata from a downloaded IDP discovery descriptor.
|
|
|
|
|
saml-config=de SAML Config
|
|
|
|
|
identity-provider.saml-config.tooltip=de SAML SP and external IDP configuration.
|
|
|
|
|
single-signon-service-url=de Single Sign-On Service URL
|
|
|
|
|
saml.single-signon-service-url.tooltip=de The Url that must be used to send authentication requests (SAML AuthnRequest).
|
|
|
|
|
single-logout-service-url=de Single Logout Service URL
|
|
|
|
|
saml.single-logout-service-url.tooltip=de The Url that must be used to send logout requests.
|
|
|
|
|
nameid-policy-format=de NameID Policy Format
|
|
|
|
|
nameid-policy-format.tooltip=de Specifies the URI reference corresponding to a name identifier format. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:persistent.
|
|
|
|
|
http-post-binding-response=de HTTP-POST Binding Response
|
|
|
|
|
http-post-binding-response.tooltip=de Indicates whether to respond to requests using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
|
|
|
|
|
http-post-binding-for-authn-request=de HTTP-POST Binding for AuthnRequest
|
|
|
|
|
http-post-binding-for-authn-request.tooltip=de Indicates whether the AuthnRequest must be sent using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
|
|
|
|
|
want-authn-requests-signed=de Want AuthnRequests Signed
|
|
|
|
|
want-authn-requests-signed.tooltip=de Indicates whether the identity provider expects signed a AuthnRequest.
|
|
|
|
|
force-authentication=de Force Authentication
|
|
|
|
|
identity-provider.force-authentication.tooltip=de Indicates whether the identity provider must authenticate the presenter directly rather than rely on a previous security context.
|
|
|
|
|
validate-signature=de Validate Signature
|
|
|
|
|
saml.validate-signature.tooltip=de Enable/disable signature validation of SAML responses.
|
|
|
|
|
validating-x509-certificate=de Validating X509 Certificate
|
|
|
|
|
validating-x509-certificate.tooltip=de The certificate in PEM format that must be used to check for signatures.
|
|
|
|
|
saml.import-from-url.tooltip=de Import metadata from a remote IDP SAML entity descriptor.
|
|
|
|
|
social.client-id.tooltip=de The client identifier registered with the identity provider.
|
|
|
|
|
social.client-secret.tooltip=de The client secret registered with the identity provider.
|
|
|
|
|
social.default-scopes.tooltip=de The scopes to be sent when asking for authorization. See documentation for possible values, separator and default value'.
|
|
|
|
|
key=de Key
|
|
|
|
|
stackoverflow.key.tooltip=de The Key obtained from Stack Overflow client registration.
|
|
|
|
|
|
|
|
|
|
realms=de Realms
|
|
|
|
|
realm=de Realm
|
|
|
|
|
|
|
|
|
|
identity-provider-mappers=de Identity Provider Mappers
|
|
|
|
|
create-identity-provider-mapper=de Create Identity Provider Mapper
|
|
|
|
|
add-identity-provider-mapper=de Add Identity Provider Mapper
|
|
|
|
|
client.description.tooltip=de Specifies description of the client. For example 'My Client for TimeSheets'. Supports keys for localized values as well. For example\: ${my_client_description}
|
|
|
|
|
|
|
|
|
|
expires=de Expires
|
|
|
|
|
expiration=de Expiration
|
|
|
|
|
expiration.tooltip=de Specifies how long the token should be valid
|
|
|
|
|
count=de Count
|
|
|
|
|
count.tooltip=de Specifies how many clients can be created using the token
|
|
|
|
|
remainingCount=de Remaining Count
|
|
|
|
|
created=de Created
|
|
|
|
|
back=de Back
|
|
|
|
|
initial-access-tokens=de Initial Access Tokens
|
|
|
|
|
add-initial-access-tokens=de Add Initial Access Token
|
|
|
|
|
initial-access-token=de Initial Access Token
|
|
|
|
|
initial-access.copyPaste.tooltip=de Copy/paste the initial access token before navigating away from this page as it's not posible to retrieve later
|
|
|
|
|
continue=de Continue
|
|
|
|
|
initial-access-token.confirm.title=de Copy Initial Access Token
|
|
|
|
|
initial-access-token.confirm.text=de Please copy and paste the initial access token before confirming as it can't be retrieved later
|
|
|
|
|
|
|
|
|
|
client-templates=de Client Templates
|
|
|
|
|
client-templates.tooltip=de Client templates allow you to define common configuration that is shared between multiple clients
|
|
|
|
|
|
|
|
|
|
groups=de Groups
|
|
|
|
|
|
|
|
|
|
group.add-selected.tooltip=de Realm roles that can be assigned to the group.
|
|
|
|
|
group.assigned-roles.tooltip=de Realm roles mapped to the group
|
|
|
|
|
group.effective-roles.tooltip=de All realm role mappings. Some roles here might be inherited from a mapped composite role.
|
|
|
|
|
group.available-roles.tooltip=de Assignable roles from this client.
|
|
|
|
|
group.assigned-roles-client.tooltip=de Role mappings for this client.
|
|
|
|
|
group.effective-roles-client.tooltip=de Role mappings for this client. Some roles here might be inherited from a mapped composite role.
|
|
|
|
|
|
|
|
|
|
default-roles=de Default Roles
|
|
|
|
|
no-realm-roles-available=de No realm roles available
|
|
|
|
|
|
|
|
|
|
users=de Users
|
|
|
|
|
user.add-selected.tooltip=de Realm roles that can be assigned to the user.
|
|
|
|
|
user.assigned-roles.tooltip=de Realm roles mapped to the user
|
|
|
|
|
user.effective-roles.tooltip=de All realm role mappings. Some roles here might be inherited from a mapped composite role.
|
|
|
|
|
user.available-roles.tooltip=de Assignable roles from this client.
|
|
|
|
|
user.assigned-roles-client.tooltip=de Role mappings for this client.
|
|
|
|
|
user.effective-roles-client.tooltip=de Role mappings for this client. Some roles here might be inherited from a mapped composite role.
|
|
|
|
|
default.available-roles.tooltip=de Realm level roles that can be assigned.
|
|
|
|
|
realm-default-roles=de Realm Default Roles
|
|
|
|
|
realm-default-roles.tooltip=de Realm level roles assigned to new users.
|
|
|
|
|
default.available-roles-client.tooltip=de Roles from this client that are assignable as a default.
|
|
|
|
|
client-default-roles=de Client Default Roles
|
|
|
|
|
client-default-roles.tooltip=de Roles from this client assigned as a default role.
|
|
|
|
|
composite.available-roles.tooltip=de Realm level roles associated with this composite role.
|
|
|
|
|
composite.associated-roles.tooltip=de Realm level roles associated with this composite role.
|
|
|
|
|
composite.available-roles-client.tooltip=de Roles from this client that you can associate to this composite role.
|
|
|
|
|
composite.associated-roles-client.tooltip=de Client roles associated with this composite role.
|
|
|
|
|
partial-import=de Partial Import
|
|
|
|
|
|
|
|
|
|
file=de File
|
|
|
|
|
import-from-realm=de Import from realm
|
|
|
|
|
import-users=de Import users
|
|
|
|
|
import-clients=de Import clients
|
|
|
|
|
import-identity-providers=de Import identity providers
|
|
|
|
|
import-realm-roles=de Import realm roles
|
|
|
|
|
import-client-roles=de Import client roles
|
|
|
|
|
if-resource-exists=de If a resource exists
|
|
|
|
|
fail=de Fail
|
|
|
|
|
skip=de Skip
|
|
|
|
|
overwrite=de Overwrite
|
|
|
|
|
if-resource-exists.tooltip=de Specify what should be done if you try to import a resource that already exists.
|
|
|
|
|
|
|
|
|
|
action=de Action
|
|
|
|
|
role-selector=de Role Selector
|
|
|
|
|
realm-roles.tooltip=de Realm roles that can be selected.
|
|
|
|
|
|
|
|
|
|
select-a-role=de Select a role
|
|
|
|
|
select-realm-role=de Select realm role
|
|
|
|
|
client-roles.tooltip=de Client roles that can be selected.
|
|
|
|
|
select-client-role=de Select client role
|
|
|
|
|
|
|
|
|
|
client-template=de Client Template
|
|
|
|
|
client-template.tooltip=de Client template this client inherits configuration from
|
|
|
|
|
client-saml-endpoint=de Client SAML Endpoint
|
|
|
|
|
add-client-template=de Add client template
|
|
|
|
|
|
|
|
|
|
manage=de Manage
|
|
|
|
|
authentication=de Authentication
|
|
|
|
|
user-federation=de User Federation
|
|
|
|
|
events=de Events
|
|
|
|
|
realm-settings=de Realm Settings
|
|
|
|
|
configure=de Configure
|
|
|
|
|
select-realm=de Select realm
|
|
|
|
|
add=de Add
|
|
|
|
|
|
|
|
|
|
client-template.name.tooltip=de Name of the client template. Must be unique in the realm
|
|
|
|
|
client-template.description.tooltip=de Description of the client template
|
|
|
|
|
client-template.protocol.tooltip=de Which SSO protocol configuration is being supplied by this client template
|
|
|
|
|
|
|
|
|
|
add-user-federation-provider=de Add user federation provider
|
|
|
|
|
required-settings=de Required Settings
|
|
|
|
|
provider-id=de Provider ID
|
|
|
|
|
console-display-name=de Console Display Name
|
|
|
|
|
console-display-name.tooltip=de Display name of provider when linked in admin console.
|
|
|
|
|
priority=de Priority
|
|
|
|
|
priority.tooltip=de Priority of provider when doing a user lookup. Lowest first.
|
|
|
|
|
sync-settings=de Sync Settings
|
|
|
|
|
periodic-full-sync=de Periodic Full Sync
|
|
|
|
|
periodic-full-sync.tooltip=de Does periodic full synchronization of provider users to Keycloak should be enabled or not
|
|
|
|
|
full-sync-period=de Full Sync Period
|
|
|
|
|
full-sync-period.tooltip=de Period for full synchronization in seconds
|
|
|
|
|
periodic-changed-users-sync=de Periodic Changed Users Sync
|
|
|
|
|
periodic-changed-users-sync.tooltip=de Does periodic synchronization of changed or newly created provider users to Keycloak should be enabled or not
|
|
|
|
|
changed-users-sync-period=de Changed Users Sync Period
|
|
|
|
|
changed-users-sync-period.tooltip=de Period for synchronization of changed or newly created provider users in seconds
|
|
|
|
|
synchronize-changed-users=de Synchronize changed users
|
|
|
|
|
synchronize-all-users=de Synchronize all users
|
|
|
|
|
kerberos-realm=de Kerberos Realm
|
|
|
|
|
kerberos-realm.tooltip=de Name of kerberos realm. For example FOO.ORG
|
|
|
|
|
server-principal=de Server Principal
|
|
|
|
|
server-principal.tooltip=de Full name of server principal for HTTP service including server and domain name. For example HTTP/host.foo.org@FOO.ORG
|
|
|
|
|
keytab=de KeyTab
|
|
|
|
|
keytab.tooltip=de Location of Kerberos KeyTab file containing the credentials of server principal. For example /etc/krb5.keytab
|
|
|
|
|
debug=de Debug
|
|
|
|
|
debug.tooltip=de Enable/disable debug logging to standard output for Krb5LoginModule.
|
|
|
|
|
allow-password-authentication=de Allow Password Authentication
|
|
|
|
|
allow-password-authentication.tooltip=de Enable/disable possibility of username/password authentication against Kerberos database
|
|
|
|
|
edit-mode=de Edit Mode
|
|
|
|
|
edit-mode.tooltip=de READ_ONLY means that password updates are not allowed and user always authenticates with Kerberos password. UNSYNCED means user can change his password in Keycloak database and this one will be used instead of Kerberos password then
|
|
|
|
|
ldap.edit-mode.tooltip=de READ_ONLY is a read only LDAP store. WRITABLE means data will be synced back to LDAP on demand. UNSYNCED means user data will be imported, but not synced back to LDAP.
|
|
|
|
|
update-profile-first-login=de Update Profile First Login
|
|
|
|
|
update-profile-first-login.tooltip=de Update profile on first login
|
|
|
|
|
sync-registrations=de Sync Registrations
|
|
|
|
|
ldap.sync-registrations.tooltip=de Should newly created users be created within LDAP store? Priority effects which provider is chose to sync the new user.
|
|
|
|
|
vendor=de Vendor
|
|
|
|
|
ldap.vendor.tooltip=de LDAP vendor (provider)
|
|
|
|
|
username-ldap-attribute=de Username LDAP attribute
|
|
|
|
|
ldap-attribute-name-for-username=de LDAP attribute name for username
|
|
|
|
|
username-ldap-attribute.tooltip=de Name of LDAP attribute, which is mapped as Keycloak username. For many LDAP server vendors it can be 'uid'. For Active directory it can be 'sAMAccountName' or 'cn'. The attribute should be filled for all LDAP user records you want to import from LDAP to Keycloak.
|
|
|
|
|
rdn-ldap-attribute=de RDN LDAP attribute
|
|
|
|
|
ldap-attribute-name-for-user-rdn=de LDAP attribute name for user RDN
|
|
|
|
|
rdn-ldap-attribute.tooltip=de Name of LDAP attribute, which is used as RDN (top attribute) of typical user DN. Usually it's the same as Username LDAP attribute, however it's not required. For example for Active directory it's common to use 'cn' as RDN attribute when username attribute might be 'sAMAccountName'.
|
|
|
|
|
uuid-ldap-attribute=de UUID LDAP attribute
|
|
|
|
|
ldap-attribute-name-for-uuid=de LDAP attribute name for UUID
|
|
|
|
|
uuid-ldap-attribute.tooltip=de Name of LDAP attribute, which is used as unique object identifier (UUID) for objects in LDAP. For many LDAP server vendors it's 'entryUUID' however some are different. For example for Active directory it should be 'objectGUID'. If your LDAP server really doesn't support the notion of UUID, you can use any other attribute, which is supposed to be unique among LDAP users in tree. For example 'uid' or 'entryDN'.
|
|
|
|
|
user-object-classes=de User Object Classes
|
|
|
|
|
ldap-user-object-classes.placeholder=de LDAP User Object Classes (div. by comma)
|
|
|
|
|
|
|
|
|
|
ldap-connection-url=de LDAP connection URL
|
|
|
|
|
ldap-users-dn=de LDAP Users DN
|
|
|
|
|
ldap-bind-dn=de LDAP Bind DN
|
|
|
|
|
ldap-bind-credentials=de LDAP Bind Credentials
|
|
|
|
|
ldap-filter=de LDAP Filter
|
|
|
|
|
ldap.user-object-classes.tooltip=de All values of LDAP objectClass attribute for users in LDAP divided by comma. For example: 'inetOrgPerson, organizationalPerson' . Newly created Keycloak users will be written to LDAP with all those object classes and existing LDAP user records are found just if they contain all those object classes.\
|
|
|
|
|
|
|
|
|
|
connection-url=de Connection URL
|
|
|
|
|
ldap.connection-url.tooltip=de Connection URL to your LDAP server
|
|
|
|
|
test-connection=de Test connection
|
|
|
|
|
users-dn=de Users DN
|
|
|
|
|
ldap.users-dn.tooltip=de Full DN of LDAP tree where your users are. This DN is parent of LDAP users. It could be for example 'ou=users,dc=example,dc=com' assuming that your typical user will have DN like 'uid=john,ou=users,dc=example,dc=com'
|
|
|
|
|
authentication-type=de Authentication Type
|
|
|
|
|
ldap.authentication-type.tooltip=de LDAP Authentication type. Right now just 'none' (anonymous LDAP authentication) or 'simple' (Bind credential + Bind password authentication) mechanisms are available
|
|
|
|
|
bind-dn=de Bind DN
|
|
|
|
|
ldap.bind-dn.tooltip=de DN of LDAP admin, which will be used by Keycloak to access LDAP server
|
|
|
|
|
bind-credential=de Bind Credential
|
|
|
|
|
ldap.bind-credential.tooltip=de Password of LDAP admin
|
|
|
|
|
test-authentication=de Test authentication
|
|
|
|
|
custom-user-ldap-filter=de Custom User LDAP Filter
|
|
|
|
|
ldap.custom-user-ldap-filter.tooltip=de Additional LDAP Filter for filtering searched users. Leave this empty if you don't need additional filter. Make sure that it starts with '(' and ends with ')'
|
|
|
|
|
search-scope=de Search Scope
|
|
|
|
|
ldap.search-scope.tooltip=de For one level, we search for users just in DNs specified by User DNs. For subtree, we search in whole of their subtree. See LDAP documentation for more details
|
|
|
|
|
connection-pooling=de Connection Pooling
|
|
|
|
|
ldap.connection-pooling.tooltip=de Does Keycloak should use connection pooling for accessing LDAP server
|
|
|
|
|
ldap.pagination.tooltip=de Does the LDAP server support pagination.
|
|
|
|
|
kerberos-integration=de Kerberos Integration
|
|
|
|
|
allow-kerberos-authentication=de Allow Kerberos authentication
|
|
|
|
|
ldap.allow-kerberos-authentication.tooltip=de Enable/disable HTTP authentication of users with SPNEGO/Kerberos tokens. The data about authenticated users will be provisioned from this LDAP server
|
|
|
|
|
use-kerberos-for-password-authentication=de Use Kerberos For Password Authentication
|
|
|
|
|
ldap.use-kerberos-for-password-authentication.tooltip=de Use Kerberos login module for authenticate username/password against Kerberos server instead of authenticating against LDAP server with Directory Service API
|
|
|
|
|
batch-size=de Batch Size
|
|
|
|
|
ldap.batch-size.tooltip=de Count of LDAP users to be imported from LDAP to Keycloak within single transaction.
|
|
|
|
|
ldap.periodic-full-sync.tooltip=de Does periodic full synchronization of LDAP users to Keycloak should be enabled or not
|
|
|
|
|
ldap.periodic-changed-users-sync.tooltip=de Does periodic synchronization of changed or newly created LDAP users to Keycloak should be enabled or not
|
|
|
|
|
ldap.changed-users-sync-period.tooltip=de Period for synchronization of changed or newly created LDAP users in seconds
|
|
|
|
|
user-federation-mappers=de User Federation Mappers
|
|
|
|
|
create-user-federation-mapper=de Create user federation mapper
|
|
|
|
|
add-user-federation-mapper=de Add user federation mapper
|
|
|
|
|
provider-name=de Provider Name
|
|
|
|
|
no-user-federation-providers-configured=de No user federation providers configured
|
|
|
|
|
add-identity-provider=de Add identity provider
|
|
|
|
|
add-identity-provider-link=de Add identity provider link
|
|
|
|
|
identity-provider=de Identity Provider
|
|
|
|
|
identity-provider-user-id=de Identity Provider User ID
|
|
|
|
|
identity-provider-user-id.tooltip=de Unique ID of the user on the Identity Provider side
|
|
|
|
|
identity-provider-username=de Identity Provider Username
|
|
|
|
|
identity-provider-username.tooltip=de Username on the Identity Provider side
|
|
|
|
|
pagination=de Pagination
|
|
|
|
|
|
|
|
|
|
browser-flow=de Browser Flow
|
|
|
|
|
browser-flow.tooltip=de Select the flow you want to use for browser authentication.
|
|
|
|
|
registration-flow=de Registration Flow
|
|
|
|
|
registration-flow.tooltip=de Select the flow you want to use for registration.
|
|
|
|
|
direct-grant-flow=de Direct Grant Flow
|
|
|
|
|
direct-grant-flow.tooltip=de Select the flow you want to use for direct grant authentication.
|
|
|
|
|
reset-credentials=de Reset Credentials
|
|
|
|
|
reset-credentials.tooltip=de Select the flow you want to use when the user has forgotten their credentials.
|
|
|
|
|
client-authentication=de Client Authentication
|
|
|
|
|
client-authentication.tooltip=de Select the flow you want to use for authentication of clients.
|
|
|
|
|
new=de New
|
|
|
|
|
copy=de Copy
|
|
|
|
|
add-execution=de Add execution
|
|
|
|
|
add-flow=de Add flow
|
|
|
|
|
auth-type=de Auth Type
|
|
|
|
|
requirement=de Requirement
|
|
|
|
|
config=de Config
|
|
|
|
|
no-executions-available=de No executions available
|
|
|
|
|
authentication-flows=de Authentication Flows
|
|
|
|
|
create-authenticator-config=de Create authenticator config
|
|
|
|
|
authenticator.alias.tooltip=de Name of the configuration
|
|
|
|
|
otp-type=de OTP Type
|
|
|
|
|
time-based=de Time Based
|
|
|
|
|
counter-based=de Counter Based
|
|
|
|
|
otp-type.tooltip=de totp is Time-Based One Time Password. 'hotp' is a counter base one time password in which the server keeps a counter to hash against.
|
|
|
|
|
otp-hash-algorithm=de OTP Hash Algorithm
|
|
|
|
|
otp-hash-algorithm.tooltip=de What hashing algorithm should be used to generate the OTP.
|
|
|
|
|
number-of-digits=de Number of Digits
|
|
|
|
|
otp.number-of-digits.tooltip=de How many digits should the OTP have?
|
|
|
|
|
look-ahead-window=de Look Ahead Window
|
|
|
|
|
otp.look-ahead-window.tooltip=de How far ahead should the server look just in case the token generator and server are out of time sync or counter sync?
|
|
|
|
|
initial-counter=de Initial Counter
|
|
|
|
|
otp.initial-counter.tooltip=de What should the initial counter value be?
|
|
|
|
|
otp-token-period=de OTP Token Period
|
|
|
|
|
otp-token-period.tooltip=de How many seconds should an OTP token be valid? Defaults to 30 seconds.
|
|
|
|
|
table-of-password-policies=de Table of Password Policies
|
|
|
|
|
add-policy.placeholder=de Add policy...
|
|
|
|
|
policy-type=de Policy Type
|
|
|
|
|
policy-value=de Policy Value
|
|
|
|
|
admin-events=de Admin Events
|
|
|
|
|
admin-events.tooltip=de Displays saved admin events for the realm. Events are related to admin account, for example a realm creation. To enable persisted events go to config.
|
|
|
|
|
login-events=de Login Events
|
|
|
|
|
filter=de Filter
|
|
|
|
|
update=de Update
|
|
|
|
|
reset=de Reset
|
|
|
|
|
operation-types=de Operation Types
|
|
|
|
|
select-operations.placeholder=de Select operations...
|
|
|
|
|
resource-path=de Resource Path
|
|
|
|
|
resource-path.tooltip=de Filter by resource path. Supports wildcards '*' to match a single part of the path and '**' matches multiple parts. For example 'realms/*/clients/asbc' matches client with id asbc in any realm, while or 'realms/master/**' matches anything in the master realm.
|
|
|
|
|
date-(from)=de Date (From)
|
|
|
|
|
date-(to)=de Date (To)
|
|
|
|
|
authentication-details=de Authentication Details
|
|
|
|
|
ip-address=de IP Address
|
|
|
|
|
time=de Time
|
|
|
|
|
operation-type=de Operation Type
|
|
|
|
|
auth=de Auth
|
|
|
|
|
representation=de Representation
|
|
|
|
|
register=de Register
|
|
|
|
|
required-action=de Required Action
|
|
|
|
|
default-action=de Default Action
|
|
|
|
|
auth.default-action.tooltip=de If enabled, any new user will have this required action assigned to it.
|
|
|
|
|
no-required-actions-configured=de No required actions configured
|
|
|
|
|
defaults-to-id=de Defaults to id
|
|
|
|
|
flows=de Flows
|
|
|
|
|
bindings=de Bindings
|
|
|
|
|
required-actions=de Required Actions
|
|
|
|
|
password-policy=de Password Policy
|
|
|
|
|
otp-policy=de OTP Policy
|
|
|
|
|
user-groups=de User Groups
|
|
|
|
|
default-groups=de Default Groups
|
|
|
|
|
groups.default-groups.tooltip=de Set of groups that new users will automatically join.
|
|
|
|
|
cut=de Cut
|
|
|
|
|
paste=de Paste
|
|
|
|
|
|
|
|
|
|
create-group=de Create group
|
|
|
|
|
create-authenticator-execution=de Create Authenticator Execution
|
|
|
|
|
create-form-action-execution=de Create Form Action Execution
|
|
|
|
|
create-top-level-form=de Create Top Level Form
|
|
|
|
|
flow.alias.tooltip=de Specifies display name for the flow.
|
|
|
|
|
top-level-flow-type=de Top Level Flow Type
|
|
|
|
|
flow.generic=de generic
|
|
|
|
|
flow.client=de client
|
|
|
|
|
top-level-flow-type.tooltip=de What kind of top level flow is it? Type 'client' is used for authentication of clients (applications) when generic is for users and everything else
|
|
|
|
|
create-execution-flow=de Create Execution Flow
|
|
|
|
|
flow-type=de Flow Type
|
|
|
|
|
flow.form.type=de form
|
|
|
|
|
flow-type.tooltip=de What kind of form is it
|
|
|
|
|
form-provider=de Form Provider
|
|
|
|
|
default-groups.tooltip=de Newly created or registered users will automatically be added to these groups
|
|
|
|
|
select-a-type.placeholder=de select a type
|
|
|
|
|
available-groups=de Available Groups
|
|
|
|
|
available-groups.tooltip=de Select a group you want to add as a default.
|
|
|
|
|
value=de Value
|
|
|
|
|
table-of-group-members=de Table of group members
|
|
|
|
|
last-name=de Last Name
|
|
|
|
|
first-name=de First Name
|
|
|
|
|
email=de Email
|
|
|
|
|
toggle-navigation=de Toggle navigation
|
|
|
|
|
manage-account=de Manage account
|
|
|
|
|
sign-out=de Sign Out
|
|
|
|
|
server-info=de Server Info
|
|
|
|
|
resource-not-found=de Resource <strong>not found</strong>...
|
|
|
|
|
resource-not-found.instruction=de We could not find the resource you are looking for. Please make sure the URL you entered is correct.
|
|
|
|
|
go-to-the-home-page=de Go to the home page »
|
|
|
|
|
page-not-found=de Page <strong>not found</strong>...
|
|
|
|
|
page-not-found.instruction=de We could not find the page you are looking for. Please make sure the URL you entered is correct.
|
|
|
|
|
events.tooltip=de Displays saved events for the realm. Events are related to user accounts, for example a user login. To enable persisted events go to config.
|
|
|
|
|
select-event-types.placeholder=de Select event types...
|
|
|
|
|
events-config.tooltip=de Displays configuration options to enable persistence of user and admin events.
|
|
|
|
|
select-an-action.placeholder=de Select an action...
|
|
|
|
|
event-listeners.tooltip=de Configure what listeners receive events for the realm.
|
|
|
|
|
login.save-events.tooltip=de If enabled login events are saved to the database which makes events available to the admin and account management consoles.
|
|
|
|
|
clear-events.tooltip=de Deletes all events in the database.
|
|
|
|
|
events.expiration.tooltip=de Sets the expiration for events. Expired events are periodically deleted from the database.
|
|
|
|
|
admin-events-settings=de Admin Events Settings
|
|
|
|
|
save-events=de Save events
|
|
|
|
|
admin.save-events.tooltip=de If enabled admin events are saved to the database which makes events available to the admin console.
|
|
|
|
|
saved-types.tooltip=de Configure what event types are saved.
|
|
|
|
|
include-representation=de Include Representation
|
|
|
|
|
include-representation.tooltip=de Include JSON representation for create and update requests.
|
|
|
|
|
clear-admin-events.tooltip=de Deletes all admin events in the database.
|
|
|
|
|
server-version=de Server Version
|
|
|
|
|
info=de Info
|
|
|
|
|
providers=de Providers
|
|
|
|
|
server-time=de Server Time
|
|
|
|
|
server-uptime=de Server Uptime
|
|
|
|
|
memory=de Memory
|
|
|
|
|
total-memory=de Total Memory
|
|
|
|
|
free-memory=de Free Memory
|
|
|
|
|
used-memory=de Used Memory
|
|
|
|
|
system=de System
|
|
|
|
|
current-working-directory=de Current Working Directory
|
|
|
|
|
java-version=de Java Version
|
|
|
|
|
java-vendor=de Java Vendor
|
|
|
|
|
java-runtime=de Java Runtime
|
|
|
|
|
java-vm=de Java VM
|
|
|
|
|
java-vm-version=de Java VM Version
|
|
|
|
|
java-home=de Java Home
|
|
|
|
|
user-name=de User Name
|
|
|
|
|
user-timezone=de User Timezone
|
|
|
|
|
user-locale=de User Locale
|
|
|
|
|
system-encoding=de System Encoding
|
|
|
|
|
operating-system=de Operating System
|
|
|
|
|
os-architecture=de OS Architecture
|
|
|
|
|
spi=de SPI
|
|
|
|
|
granted-roles=de Granted Roles
|
|
|
|
|
granted-protocol-mappers=de Granted Protocol Mappers
|
|
|
|
|
additional-grants=de Additional Grants
|
|
|
|
|
revoke=de Revoke
|
|
|
|
|
new-password=de New Password
|
|
|
|
|
password-confirmation=de Password Confirmation
|
|
|
|
|
credentials.temporary.tooltip=de If enabled user is required to change password on next login
|
|
|
|
|
remove-totp=de Remove TOTP
|
|
|
|
|
credentials.remove-totp.tooltip=de Remove one time password generator for user.
|
|
|
|
|
reset-actions=de Reset Actions
|
|
|
|
|
credentials.reset-actions.tooltip=de Set of actions to execute when sending the user a Reset Actions Email. 'Verify email' sends an email to the user to verify their email address. 'Update profile' requires user to enter in new personal information. 'Update password' requires user to enter in a new password. 'Configure TOTP' requires setup of a mobile password generator.
|
|
|
|
|
reset-actions-email=de Reset Actions Email
|
|
|
|
|
send-email=de Send email
|
|
|
|
|
credentials.reset-actions-email.tooltip=de Sends an email to user with an embedded link. Clicking on link will allow the user to execute the reset actions. They will not have to login prior to this. For example, set the action to update password, click this button, and the user will be able to change their password without logging in.
|
|
|
|
|
add-user=de Add user
|
|
|
|
|
created-at=de Created At
|
|
|
|
|
user-enabled=de User Enabled
|
|
|
|
|
user-enabled.tooltip=de A disabled user cannot login.
|
|
|
|
|
user-temporarily-locked=de User Temporarily Locked
|
|
|
|
|
user-temporarily-locked.tooltip=de The user may have been locked due to failing to login too many times.
|
|
|
|
|
unlock-user=de Unlock user
|
|
|
|
|
federation-link=de Federation Link
|
|
|
|
|
email-verified=de Email Verified
|
|
|
|
|
email-verified.tooltip=de Has the user's email been verified?
|
|
|
|
|
required-user-actions=de Required User Actions
|
|
|
|
|
required-user-actions.tooltip=de Require an action when the user logs in. 'Verify email' sends an email to the user to verify their email address. 'Update profile' requires user to enter in new personal information. 'Update password' requires user to enter in a new password. 'Configure TOTP' requires setup of a mobile password generator.
|
|
|
|
|
locale=de Locale
|
|
|
|
|
select-one.placeholder=de Select one...
|
|
|
|
|
impersonate=de Impersonate
|
|
|
|
|
impersonate-user=de Impersonate user
|
|
|
|
|
impersonate-user.tooltip=de Login as this user. If user is in same realm as you, your current login session will be logged out before you are logged in as this user.
|
|
|
|
|
identity-provider-alias=de Identity Provider Alias
|
|
|
|
|
provider-user-id=de Provider User ID
|
|
|
|
|
provider-username=de Provider Username
|
|
|
|
|
no-identity-provider-links-available=de No identity provider links available
|
|
|
|
|
group-membership=de Group Membership
|
|
|
|
|
leave=de Leave
|
|
|
|
|
group-membership.tooltip=de Groups user is a member of. Select a listed group and click the Leave button to leave the group.
|
|
|
|
|
membership.available-groups.tooltip=de Groups a user can join. Select a group and click the join button.
|
|
|
|
|
table-of-realm-users=de Table of Realm Users
|
|
|
|
|
view-all-users=de View all users
|
|
|
|
|
unlock-users=de Unlock users
|
|
|
|
|
no-users-available=de No users available
|
|
|
|
|
users.instruction=de Please enter a search, or click on view all users
|
|
|
|
|
consents=de Consents
|
|
|
|
|
started=de Started
|
|
|
|
|
logout-all-sessions=de Logout all sessions
|
|
|
|
|
logout=de Logout
|
|
|
|
|
new-name=de New Name
|
|
|
|
|
ok=de Ok
|
|
|
|
|
attributes=de Attributes
|
|
|
|
|
role-mappings=de Role Mappings
|
|
|
|
|
members=de Members
|
|
|
|
|
details=de Details
|
|
|
|
|
identity-provider-links=de Identity Provider Links
|
|
|
|
|
register-required-action=de Register required action
|
|
|
|
|
gender=de Gender
|
|
|
|
|
address=de Address
|
|
|
|
|
phone=de Phone
|
|
|
|
|
profile-url=de Profile URL
|
|
|
|
|
picture-url=de Picture URL
|
|
|
|
|
website=de Website
|
|
|
|
|
import-keys-and-cert=de Import keys and cert
|
|
|
|
|
import-keys-and-cert.tooltip=de Upload the client's key pair and cert.
|
|
|
|
|
upload-keys=de Upload Keys
|
|
|
|
|
download-keys-and-cert=de Download keys and cert
|
|
|
|
|
no-value-assigned.placeholder=de No value assigned
|
|
|
|
|
remove=de Remove
|
|
|
|
|
no-group-members=de No group members
|
|
|
|
|
temporary=de Temporary
|
|
|
|
|
join=de Join
|
|
|
|
|
event-type=de Event Type
|
|
|
|
|
events-config=de Events Config
|
|
|
|
|
event-listeners=de Event Listeners
|
|
|
|
|
login-events-settings=de Login Events Settings
|
|
|
|
|
clear-events=de Clear Events
|
|
|
|
|
saved-types=de Saved Types
|
|
|
|
|
clear-admin-events=de Clear admin events
|
|
|
|
|
clear-changes=de Clear changes
|