MMCT TEAM
Server IP : 103.53.40.154  /  Your IP : 3.12.34.150
Web Server : Apache
System : Linux md-in-35.webhostbox.net 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64
User : ppcad7no ( 715)
PHP Version : 8.2.25
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON
Directory (0755) :  /usr/share/locale/war/../lv/../es_DO/../zh_CN/LC_MESSAGES/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : //usr/share/locale/war/../lv/../es_DO/../zh_CN/LC_MESSAGES/authconfig.mo
��(\	���N� "#(#L/p$�#�!�(!4V[du~���	�f�GIX�
��
���������_�:(?hq����x�;?+{�����
"*Mj �d�  E& @l � � � � � %� e!t!g�!�!�!"
""1"H"M"V"h"z""
�"
�"�"
�"�"!�"	#
###*#7#D#Q#V#Y#k#n#�#	�#�#�#�#R�#$$
'$5$E$hM$��$g%x%��%5	&1?&0q&,�&/�&0�&+0'!\'-~'��'�q(�@);*"R*!u*"�*#�*�*	�*�*++-+?+G+\+td+�+�+,6 ,W,h,[p,�,�,�,--'-'>-]f-�-�-L�-&...J.e.u.|.�.
�.�.�.
�.�.(�.0/0L/1}/�/�/.�/)�/[(0_�0+�061G1#\1�1�1�1�1�1�1�152 L2m2@�2*�2,�2 3+<3Th3V�3:41O4#�46�4.�4.5*:5%e5(�5*�5C�5'#6-K6/y6$�6<�657=A717:�7#�718-B87p81�8-�8+9>49?s9)�9+�9	:*):MT:O�:9�:0,;"];5�;X�;-<)=<$g<'�<)�<B�<&!=,H=.u=#�=&�=%�=>> T>1u>D�>;�>(?1E?(w?;�?D�?3!@)U@(@6�@2�@6A0IA)zAX�A(�A*&B0QB�B�B-�B��BGnC�C�CD�C4:DoD�D�D4�D+�D2E'JE�rEL/G|G~G�G�G�G�G�GH H=HWH\HbHxH�H�H�H�H�Hm�HEILeI�I
�I�I�I�IJ`JtJ�J�J�JJ�JK*
K8KEK]KjK qK�Kb�K-L)9LcLyL�L�L�L�L�L#�L �L M>M?XM�M�M6�M@�M(N>NUNlNrNN\�N�NTO[ObO	uOO�O�O�O�O�O�O�O�OPP)P5PAPTPgPnP�P
�P�P�P
�P	�P�P�P�P�P�P	QQQ#&QJQiQpQ�Q�Q�QQ�Q�R�R�Rs�R(7S `S#�S �S"�S�ST(T ET�fT�U��U:ZV)�V!�V�V%�V%W;WHWXWdWwW
�W�W
�Wv�W+X:XPX.jX�X�XM�X�XYY>YMYdYsYT�Y�Y�YO�YJZYZuZ�Z�Z�Z�Z�Z�Z[[ *[!K['m[$�[*�[�[�['\$6\B[\E�\$�\-	]7](M]v]�]�]�]�]�]�]3^:^Y^*o^�^$�^�^#�^;_BV_'�_!�_$�_*`3`&R`y`6�`$�`$�`7a!Oa!qa'�a!�a;�a*b0Db-ub7�b�b�bc!2cTc sc*�c*�c*�cd$4dYd#qd<�dB�d'e!=e$_e*�e?�e&�ef3f$Nf$sf7�f$�f!�f'g"?g%bg�g5�g�g*�g9%h-_h�h�h�h8�h8i4Gi*|i!�i'�i'�i'jAj`j?|j!�j(�j#k
+k9kRkprk3�kl*l7@l9xl�l�l�l,�l)m&Dmkm'bG8����$?Z�v/w"�ph�r�������&g�Jm����q-�!A���}��	;!���fa�����3��#`�N�jD�:�_��E� @|��%���*5�����l�c����]�e\�Y,H�
�.�(OK��d��X	�TF
u�������I���V~=R���P�#�6��B
����L��
"x�iz���U)'%��$�1WS��y��&�2������M���(79s0t>C4^��Q<�k���� n���[����{�+�o� <Tab>/<Alt-Tab> between elements   |   <Space> selects   |  <F12> next screen*<URL><b>Authentication Configuration</b><b>Local Authentication Options</b><b>Maximal Consecutive Character Repetition</b><b>Minimal Password Requirements</b><b>Other Authentication Options</b><b>Required Character Classes</b><b>Smart Card Authentication Options</b><b>User Account Configuration</b><dn><domain><lowest-highest><module><name><number><realm><server><servers><small><b>Tip:</b> Smart cards support logging into both local and centrally managed accounts.</small><small><b>Tip:</b> These checks are disabled if the value is 0.</small><small><b>Tip:</b> This is managed via /etc/security/access.conf.</small><workgroup>ADS Realm:Ad_min Servers:Admin Server:Advanced _OptionsAlertAll configuration files which were modified by the previous authentication configuration change will be restored from backup. Revert the changes?Allow offline _loginAut_hentication Method:AuthenticationAuthentication ConfigurationAuthentication module %s/pam_%s.so is missing. Authentication process might not work correctly.BackBad smart card removal action specified.Base DN:C_haracter Classes:Cache InformationCancelCard Re_moval Action:Certificate _URL:Click this button if you did not download a CA certificate yet or you have not set the CA certificate up by other means.Control how the system verifies users who attempt to log inCreate _home directories on the first loginDo not configure _NTPDo_n't SaveDomain Administrator:Domain Controllers:Domain _administrator:Domain:Download CA CertificateEnable _fingerprint reader supportEnable _local access controlEnable _smart card supportError downloading CA certificateFingerprint authentication allows you to log in by scanning your finger with the fingerprint reader.Fingerprint readerFreeIPAHashing or crypto algorithm used for storing passwords of local usersHostname or ldap:// or ldaps:// URI pointing to the LDAP server.IPA R_ealm:IPA _Domain:IPA _Server:IPAv2IPAv2 SettingsIPAv2 domain join was not successful.IPAv2 domain join was not successful. The ipa-client-install command failed with the following error:IPAv2 passwordIf the home directory of an user doesn't exist yet it will be created automatically on his first login.IgnoreInvalid LDAP URI.Join DomainJoin SettingsJoining IPA DomainJoining Winbind DomainKDC:KerberosKerberos SettingsKerberos passwordLDAPLDAP Search _Base DN:LDAP SettingsLDAP _Server:LDAP authenticationLDAP passwordLocal accounts onlyLocal authorization is sufficientLockLow_ercaseNISNIS SettingsNIS _Domain:NIS _Server:NIS passwordNextNoO_ther charactersOkPass_word OptionsPasswordPassword:R_ealm:Realm:Require smart car_d for loginRestore the configuration files backed up before the previous configuration changeRevertSa_me Class:Save SettingsSecurity Model:Server:Smart card authentication allows you to log in using a certificate and key associated with a smart card.Some of the configuration changes you've made should be saved to disk before continuing.  If you do not save them, then your attempt to join the domain may fail.  Save changes?Te_mplate Shell:Template Shell:The %s file was not found, but it is required for %s support to work properly.
Install the %s package, which provides this file.The passmaxclassrepeat option value is not an integerThe passmaxclassrepeat value must not be negativeThe passmaxrepeat option value is not an integerThe passmaxrepeat value must not be negativeThe passminclass option value is not an integerThe passminclass value must not be higher than 4The passminclass value must not be negativeThe passminlen minimum value is 6The passminlen option value is not an integerTo connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory.
Then press OK.To verify the LDAP server with TLS protocol enabled you need a CA certificate which signed the server's certificate. Please fill in the URL where the CA certificate in the PEM format can be downloaded from.Unable to initialize graphical environment. Most likely cause of failure
is that the tool was not run using a graphical environment. Please either
start your graphical user interface or set your DISPLAY variable.
Unknown password hashing algorithm specified, using sha256.Use DNS to _locate KDCs for realmsUse DNS to locate KDCs for realmsUse DNS to resolve hosts to realmsUse D_NS to resolve hosts to realmsUse Fingerprint readerUse IPAv2Use KerberosUse LDAPUse LDAP AuthenticationUse MD5 PasswordsUse NISUse Shadow PasswordsUse TLSUse Transport Layer Security extension for LDAP as defined by RFC-2830. It must not be ticked with ldaps server URI.Use WinbindUse Winbind AuthenticationUse _TLS to encrypt connectionsUse the "Join Domain" button to join the IPAv2 domain.User InformationWarningWhen enabled /etc/security/access.conf will be consulted for authorization of users access.WinbindWinbind ADS R_ealm:Winbind Domain Co_ntrollers:Winbind SettingsWinbind _Domain:Winbind authenticationWinbind domain join was not successful.Winbind domain join was not successful. The net join command failed with the following error:Winbind passwordYesYou must provide ldaps:// server address or use TLS for LDAP authentication._Digits_Download CA Certificate..._Identity & Authentication_Join Domain..._KDCs:_Length:_Password Hashing Algorithm:_Password:_Same Character:_Security Model:_Uppercase_User Account Database:action to be taken on smart card removalauthenticate system accounts by local files onlyauthenticate system accounts by network servicesauthorize local users also through remote servicecachingcan only be run as rootcheck access.conf during account authorizationconfigures winbind to allow offline loginconfigures winbind to assume that users with no domain in their user names are domain usersconfigures winbind to assume that users with no domain in their user names are not domain usersconfigures winbind to prevent offline logincreate home directories for users on their first logindefault LDAP base DNdefault LDAP server hostname or URIdefault NIS domaindefault NIS serverdefault hesiod LHSdefault hesiod RHSdefault kerberos KDCdefault kerberos admin serverdefault kerberos realmdefault realm for samba and winbind when security=adsdefault smart card module to usedialog was cancelleddisable IPAv2 for user information and authentication by defaultdisable LDAP for authentication by defaultdisable LDAP for user information by defaultdisable MD5 passwords by defaultdisable NIS for user information by defaultdisable SSSD for authentication by default (still used for supported configurations)disable SSSD for user information by default (still used for supported configurations)disable authentication with fingerprint readers by defaultdisable authentication with smart card by defaultdisable automatic per-user ecryptfsdisable caching of user credentials in SSSD by defaultdisable caching of user information by defaultdisable hesiod for user information by defaultdisable kerberos authentication by defaultdisable shadowed passwords by defaultdisable use of DNS to find kerberos KDCsdisable use of DNS to find kerberos realmsdisable use of RFC-2307bis schema for LDAP user information lookupsdisable use of TLS with LDAP (RFC-2830)disable winbind for authentication by defaultdisable winbind for user information by defaultdisable wins for hostname resolutiondisplay Back instead of Cancel in the main dialog of the TUIdo not check access.conf during account authorizationdo not create home directories for users on their first logindo not display the deprecated text user interfacedo not prefer dns over wins or nis for hostname resolutiondo not require digits in a passworddo not require lowercase characters in a passworddo not require other characters in a passworddo not require smart card for authentication by defaultdo not require uppercase characters in a passworddo not setup the NTP against the IPAv2 domaindo not start/stop portmap, ypbind, and nscddo not update the configuration files, only print new settingsenable IPAv2 for user information and authentication by defaultenable LDAP for authentication by defaultenable LDAP for user information by defaultenable MD5 passwords by defaultenable NIS for user information by defaultenable SSSD for authentication by default with manually managed configurationenable SSSD for user information by default with manually managed configurationenable authentication with fingerprint readers by defaultenable authentication with smart card by defaultenable automatic per-user ecryptfsenable caching of user credentials in SSSD by defaultenable caching of user information by default (automatically disabled when SSSD is used)enable hesiod for user information by defaultenable kerberos authentication by defaultenable shadowed passwords by defaultenable use of DNS to find kerberos KDCsenable use of DNS to find kerberos realmsenable use of RFC-2307bis schema for LDAP user information lookupsenable use of TLS with LDAP (RFC-2830)enable winbind for authentication by defaultenable winbind for user information by defaultenable wins for hostname resolutionhash/crypt algorithm for new passwordsjoin the IPAv2 domain as this accountjoin the winbind domain or ads realm now as this administratorload CA certificate from the URLlocal authorization is sufficient for local usersmaximum number of consecutive characters of same class in a passwordmaximum number of same consecutive characters in a passwordminimum length of a passwordminimum number of character classes in a passwordnames of servers to authenticate againstnever use SSSD implicitly even for supported configurationsopposite of --test, update configuration files with changed settingsprefer dns over wins or nis for hostname resolutionprobe network for defaults and print themrequire at least one digit in a passwordrequire at least one lowercase character in a passwordrequire at least one other character in a passwordrequire at least one uppercase character in a passwordrequire smart card for authentication by defaultrestore the backup of configuration filesrestore the backup of configuration files saved before the previous configuration changesave a backup of all configuration filessecurity mode to use for samba and winbindsetup the NTP against the IPAv2 domain (default)shadow passwordshow this help message and exitthe IPAv2 domain the system should be part ofthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabledthe directory which winbind-created users will have as home directoriesthe realm for the IPAv2 domainthe server for the IPAv2 domainthe shell which winbind-created users will have as their login shelluid range winbind will assign to domain or ads usersunexpected argumentupdate all configuration filesusage: %s [options]use SSSD implicitly if it supports the configurationwinbind will use Kerberos 5 to authenticatewinbind will use the default authentication methodworkgroup authentication servers are inProject-Id-Version: PACKAGE VERSION
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2016-06-17 11:35+0200
PO-Revision-Date: 2016-03-02 08:17-0500
Last-Translator: Leah Liu <lliu@redhat.com>
Language-Team: Chinese (China) (http://www.transifex.com/projects/p/fedora/language/zh_CN/)
Language: zh-CN
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=1; plural=0;
X-Generator: Zanata 3.8.4
<Tab>/<Alt-Tab> 在元素间切换   |   <Space> 选择   |  <F12> 下一屏*<URL><b>认证配置</b><b>本地认证选项</b><b>最多连续字符重复</b><b>基本密码要求</b><b>其它认证选项</b><b>所需字符类型</b><b>智能卡认证选项</b><b>用户帐户配置</b><dn><域><最低值-最高值><模块><名称><number><域><服务器><服务器><small><b>提示:</b>智能卡既支持登录本地帐户,也支持登录集中管理的帐户。</small><small><b>Tip:</b> 如果该值为 0 则检查这些选项。</small><small><b>提示:</b>这通过 /etc/security/access.conf 管理。</small><工作组>ADS 域:管理服务器(_M):管理服务器:高级选项(_O)警报所有上一次认证配置更改所修改的配置文件将从备份中恢复。是否恢复?允许离线登录(_L)认证方法(_H):认证认证配置缺少验证模块 %s/pam_%s.so 。认证进程可能无法正常工作。后退指定了错误的智能卡移除动作。基础 DN:字符(_h)类别:缓存信息取消智能卡移除操作(_M):证书 URL(_U):如果您还未下载 CA 证书或还未使用其它方法设定 CA 证书,请点击此按钮。控制系统如何验证试图登录的用户在首次登录时创建家目录(_H)不配置 NTP(_N)不保存(_N)域管理员:域控制器:域管理员(_A):域:下载 CA 证书启用指纹读取器支持(_F)启用本地访问控制(_L)启用智能卡支持(_S)下载 CA 证书时出错指纹认证允许您使用指纹读取器扫描指纹登录。指纹读取器FreeIPA用于保存本地用户密码的散列或加密算法指向 LDAP 服务器的主机名、 ldap:// 或 ldaps:// URI。IPA R_ealm(_e):IPA _Domain(_D):IPA _Server(_S):IPAv2IPAv2 设置加入 IPAv2 域不成功。加入 IPAv2 域不成功。ipa-client-install 命令失败,并给出以下出错信息:IPAv2 密码如果用户的主目录还不存在,它将在其首次登录时被自动创建。忽略无效 LDAP URI。加入域加入设置加入 IPA 域正在加入 Winbind 域KDC:KerberosKerberos 设置Kerberos 密码LDAPLDAP 搜索基础 DN (_B):LDAP 设置LDAP 服务器 (_S):LDAP 认证LDAP 密码仅限本地帐户本地授权即可锁定Low_ercase(_e)NISNIS 设置NIS 域 (_D):NIS 服务器(_S):NIS 密码下一步否其他(_t)字符确定密码(_w)选项密码密码:域(_E):域:需要使用智能卡登录(_D)恢复份的配置文件状态恢复相同(_m)类别保存设置安全模型:服务器:智能卡认证允许您使用与智能卡关联的证书和密钥进行登录。在继续之前,您更改过的一些配置应保存到磁盘。如果您不将其保存,则您加入域的尝试可能失败。是否保存修改?模板 Shell(_M):模板 Shell: %s 文件未找到,但 %s 支持需要此文件方可正常工作。
请安装提供此文件的 %s 软件包。passmaxclassrepeat 选项值不是整数passmaxrepeat 值不得为负数passmaxrepeat 选项值不是整数passmaxrepeat 值不得为负数passminclass 选项值不是整数passmincalss 值不得大于 4passminclass 值不得为负数passminlen 的最小值为 6passminlen 选项值不是整数要连到启用 TLS 的 LDAP 服务器,您需要一个签署您服务器证书的 CA 证书。将此PEM 格式的证书复制到“%s”目录中。⏎
然后按“确定”。要验证已启用 TLS 协议的 LDAP 服务器,您需要一个签署此服务器证书的 CA 证书。请填写能下载 PEM 格式的 CA 证书的 URL。无法初始化图形化环境。可能的原因
是工具并非在图形化环境下运行。请
启动您的图形化环境或者设置您的 DISPLAY 变量。
指定了未知的密码散列算法,现使用 sha256。使用 DNS 定位用于域的 KDC(_L)使用 DNS 定位用于域的 KDC使用 DNS 解析主机为域用 DNS 将主机解析为域(_N)使用指纹读取器使用 IPAv2使用 Kerberos使用 LDAP使用 LDAP 认证使用 MD5 密码使用 NIS使用 shadow 密码使用 TLS使用 RFC-2830 中定义的用于 LDAP 的传输层安全扩展。不能将其与 ldaps 服务器 URI 同时勾选。使用 Winbind使用 Winbind 认证用 TLS 加密连接 (_T)使用“加入域”按钮加入 IPAv2 域。用户信息警告启用后,在用户访问的授权中将参考 /etc/security/access.conf。WinbindWinbind ADS 域(_E):Winbind 域控制器(_N):Winbind 设置Winbind 域(_D):Winbind 认证加入 Winbind 域不成功。加入 Winbind 域不成功。net join 命令失败,并给出以下出错信息:Winbind 密码是您必须提供 ldaps:// 服务器地址 或者使用 TLS 用于 LDAP 验证。数字(_D)下载 CA 证书(_D)...身份&验证(_I)加入域(_J)...KDC(_K):长度(_L)密码散列算法(_P):密码(_P):相同(_S)字符安全模型(_S):大写(_U)用户帐户数据库(_U):移除智能卡时采取的动作仅通过本地文件认证系统帐户通过网络服务认证系统帐户也可通过远程服务授权本地用户正在缓存只能用 root 帐户运行在帐户授权期间检查 access.conf配置 winbind 为允许离线登录配置 winbind 为假定用户名中没有域的用户是域用户配置 winbind 为假定用户名中没有域的用户不是域用户配置 winbind 为阻止离线登录在用户首次登录时为其创建家目录默认 LDAP 基础 DN默认 LDAP 服务器的主机名或 URI默认 NIS 域默认 NIS 服务器默认 hesiod LHS默认 hesiod RHS默认 kerberos KDC默认 kerberos 管理服务器默认 kerberos 域当 security=ads 时 samba 和 winbind 的默认域默认使用的智能卡模块对话框被按取消默认为用户信息和验证禁用 IPAv2默认禁用 LDAP 用于认证默认禁用 LDAP 用于用户信息默认禁用 MD5 密码默认禁用 NIS 用于用户信息默认禁用 SSSD 认证(在已支持配置中依然使用)默认禁用 SSSD 用于用户信息(仍用于支持的配置)默认禁用通过指纹读取器认证默认禁用通过智能卡认证禁用自动基于用户的 ecryptfs默认禁用 SSSD 中的用户凭证缓存默认禁用用户信息缓存默认禁用 hesiod 用于用户信息默认禁用 kerberos 认证恢复在上一次配置更改前备份的配置文件禁用通过 DNS 查找 kerberos KDC禁用通过 DNS 查找 kerberos 域禁用 RFC-2307bis 架构用于 LDAP 用户信息查询禁用带 TLS 的 LDAP (RFC-2830)默认禁用 winbind 用于认证默认禁用 winbind 用于用户信息禁用 wins 用于主机名解析在 TUI 主对话框中显示“后退”代替“取消”在帐户授权期间不检查 access.conf不在用户首次登录时为其创建家目录不显示将被弃用的文本化用户界面不首选 dns 而是 wins 或 nis 用于主机名解析密码中不需要数字密码中不需要小写字符密码中不需要其他字符默认不要求用智能卡认证密码中不需要大写字符不要根据 IPAv2 域设定 NTP不启动/停止 portmap、ypbind 和 nscd不更新配置文件,只显示新设置默认为用户信息和验证启用 IPAv2默认启用 LDAP 用于认证默认启用 LDAP 用于用户信息默认启用 MD5 密码默认启用 NIS 用于用户信息使用手动管理的配置时默认启用 SSSD 用于认证使用手动管理的配置时默认启用 SSSD 用于用户信息默认启用通过指纹读取器认证默认启用通过智能卡认证启用自动基于用户的 ecryptfs默认启用 SSSD 中的用户凭证缓存默认启用用户信息缓存(使用 SSSD 时自动禁用)默认启用 hesiod 用于用户信息默认启用 kerberos 认证默认启用 shadow 密码启用通过 DNS 查找 kerberos KDC启用通过 DNS 查找 kerberos 域启用 RFC-2307bis 架构用于 LDAP 用户信息查询启用带 TLS 的 LDAP(RFC-2830)默认启用 winbind 用于认证默认启用 winbind 用于用户信息启用 wins  用于主机名解析用于新密码的散列/加密算法以这个帐户加入 IPAv2 域现在用管理员帐号加入 winbind 域或 ads 域从该 URL 加载 CA 证书本地授权对本地用户而言已足够密码同一类别中最多连续使用同一字符次数密码中同一字符最多连续使用次数密码最大长度密码中最多字符数提供认证的服务器名绝不隐含使用 SSSD,甚至不用于支持的配置与 --test 相反,用更改的设置更新配置文件首选 dns 而非 wins 或 nis 用于主机名解析探测网络获取默认值并将其显示密码中至少需要一个数字密码中至少需要一个小写字符密码中至少需要一个其他字符密码中至少需要一个大写字符默认要求用智能卡认证恢复配置文件的备份恢复在上一次配置更改前保存的配置文件的备份保存所有配置文件的备份用于 samba 和 winbind 的安全模式根据 IPAv2 域设定 NTP (默认)shadow 密码显示本帮助并退出应包含该系统的 IPAv2 域如果 winbindusedefaultdomain 未启用,此字符将用于分隔 winbind 所建用户名的域和用户部分此目录将成为 winbind 所建用户的家目录IPAv2 域的 realmIPAv2 域的服务器此 shell 将成为 winbind 所建用户的登录 shellwinbind 将分配给域用户或 ads 用户的 uid 范围意外参数更新所有配置文件用法:%s [选项]隐含使用 SSSD,如果它支持此配置winbind 将采用 Kerberos 5 进行认证winbind 将采用默认的认证方法认证服务器所在工作组

MMCT - 2023