KEYCLOAK-19777 Fix typos in admin-console messages
overriden -> overridden mesasge -> message Username the Service Account -> Username of the Service Account Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
This commit is contained in:
parent
d0493b4306
commit
93d286fdc7
1 changed files with 3 additions and 3 deletions
|
@ -376,7 +376,7 @@ base-url.tooltip=Default URL to use when the auth server needs to redirect or li
|
|||
admin-url=Admin URL
|
||||
admin-url.tooltip=URL to the admin interface of the client. Set this if the client supports the adapter REST API. This REST API allows the auth server to push revocation policies and other administrative tasks. Usually this is set to the base URL of the client.
|
||||
master-saml-processing-url=Master SAML Processing URL
|
||||
master-saml-processing-url.tooltip=If configured, this URL will be used for every binding to both the SP's Assertion Consumer and Single Logout Services. This can be individually overriden for each binding and service in the Fine Grain SAML Endpoint Configuration.
|
||||
master-saml-processing-url.tooltip=If configured, this URL will be used for every binding to both the SP's Assertion Consumer and Single Logout Services. This can be individually overridden for each binding and service in the Fine Grain SAML Endpoint Configuration.
|
||||
idp-sso-url-ref=IDP Initiated SSO URL Name
|
||||
idp-sso-url-ref.tooltip=URL fragment name to reference client when you want to do IDP Initiated SSO. Leaving this empty will disable IDP Initiated SSO. The URL you will reference from your browser will be: {server-root}/realms/{realm}/protocol/saml/clients/{client-url-name}
|
||||
idp-sso-url-ref.urlhint=Target IDP initiated SSO URL:
|
||||
|
@ -433,7 +433,7 @@ logout-service-artifact-binding-url.tooltip=SAML ARTIFACT Binding URL for the cl
|
|||
artifact-binding-url= Artifact Binding URL
|
||||
artifact-binding-url.tooltip=URL to send the HTTP ARTIFACT messages to. You can leave this blank if you are using a different binding. This value should be set when forcing ARTIFACT binding together with IdP initiated login.
|
||||
artifact-resolution-service-url= Artifact Resolution Service
|
||||
artifact-resolution-service-url.tooltip= SAML Artifact resolution service for the client. This is the endpoint to which Keycloak will send a SOAP ArtifactResolve mesasge. You can leave this blank if you do not have a URL for this binding.
|
||||
artifact-resolution-service-url.tooltip= SAML Artifact resolution service for the client. This is the endpoint to which Keycloak will send a SOAP ArtifactResolve message. You can leave this blank if you do not have a URL for this binding.
|
||||
saml-signature-keyName-transformer=SAML Signature Key Name
|
||||
saml-signature-keyName-transformer.tooltip=Signed SAML documents contain identification of signing key in KeyName element. For Keycloak / RH-SSO counterparty, use KEY_ID, for MS AD FS use CERT_SUBJECT, for others check and use NONE if no other option works.
|
||||
oidc-compatibility-modes=OpenID Connect Compatibility Modes
|
||||
|
@ -606,7 +606,7 @@ service-account.available-roles.tooltip=Realm level roles that can be assigned t
|
|||
service-account=Service Account
|
||||
service-account.roles=Service Account Roles
|
||||
service-account.user=Service Account User
|
||||
service-account.user.tooltip=Username the Service Account. To manage details and group mappings click on the username.
|
||||
service-account.user.tooltip=Username of the Service Account. To manage details and group mappings click on the username.
|
||||
service-account.assigned-roles.tooltip=Realm level roles assigned to service account.
|
||||
service-account-is-not-enabled-for=Service account is not enabled for {{client}}
|
||||
create-protocol-mappers=Create Protocol Mappers
|
||||
|
|
Loading…
Reference in a new issue