#
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
#
# Copyright (c) 2007 Sun Microsystems Inc. All Rights Reserved
#
# The contents of this file are subject to the terms
# of the Common Development and Distribution License
# (the License). You may not use this file except in
# compliance with the License.
#
# You can obtain a copy of the License at
# See the License for the specific language governing
# permission and limitations under the License.
#
# When distributing Covered Code, include this CDDL
# Header Notice in each file and include the License file
# If applicable, add the following below the CDDL Header,
# with the fields enclosed by brackets [] replaced by
# your own identifying information:
# "Portions Copyrighted [year] [name of copyright owner]"
#
# $Id: amConsole.properties,v 1.170 2010/01/08 20:47:17 babysunil Exp $
#
# Portions Copyrighted 2011-2016 ForgeRock AS.
# Portions Copyrighted 2012 Open Source Solution Technology Corporation
# Portions Copyrighted 2013-2015 Nomura Research Institute, Ltd.
webconsole.title=OpenAM
#####
#
# "Back to <page>" button labels
#
#####
back.button=Back to {0}
policy.back.button=Policy
previous.view=previous view
################################################################################
#
# COMMON
#
################################################################################
masthead.logoutTooltip=Log out of OpenAM
masthead.logoutStatus=Log out of OpenAM
masthead.logoutMessage=Log out of the OpenAM?\\nYou might need to close any associated windows.
button.new=New...
button.cancel=Cancel
button.create=Create
button.add=Add...
button.delete=Delete
button.reset=Reset
button.save=Save
button.select=Select
button.search=Search
button.next=Next
button.back=Back
button.finish=Finish
button.duplicate=Duplicate
button.ok=OK
button.close=Close
button.assign=Assign
button.configure=Configure
button.validate=Start Test
button.refresh=Refresh
button.register=Register
button.edit=Edit
link.edit=Edit...
link.duplicate=Duplicate...
label.items=Item(s)
label.active=Active
label.inactive=Inactive
label.edit=Edit
label.name=Name
label.Enable=Enabled
label.Yes=Yes
label.No=No
label.location=Location
label.current.value=Current Values
label.new.value=New Value
label.Signed=Signed
label.validate=Validate
label.upload=Upload
i18nTrue=Enabled
i18nFalse=Disabled
help.inSeconds=In seconds
help.title=OpenAM Help
maplist.key.label=Map Key
maplist.value.label=Corresponding Map Value
maplist.msg.invalid.entry=Invalid Map Entry, e.g. []=some values, [key]= and []= are not allowed.
maplist.msg.invalid.key=Invalid key e.g. [ and ] characters are not allowed.
maplist.msg.invalid.value=Invalid Value e.g. [ and ] characters are not allowed.
maplist.msg.invalid.nokey=Key is required.
message.input.error=Invalid or Missing Input
message.error=Error
message.warning=Warning
message.information=Information
message.question=Question
message.updated=Profile was updated.
message.profile.modified=Profile has been modified. Click the Save button to save the changes.
message.sizelimit.exceeded=Size limit Exceeded. Refine your search to locate more entries.
message.timelimit.exceeded=Time limit Exceeded. Refine your search to locate more entries.
message.missing.name=The name is missing or empty.
message.delete.entries=The selected entries were removed.
message.validation.success=Validation successful.
subconfig.section.header=Secondary Configuration Instance
services.subconfig.table.title=Instances
services.subconfig.table.empty.message=There are no configuration instances.
schemaType.global=Global Attributes
schemaType.organization=Realm Attributes
schemaType.dynamic=Dynamic Attributes
schemaType.user=User Attributes
legend.required=Indicates Required Field
password.confirm.label={0} (confirm)
authenticated.message=You're logged in.
false=No
true=Yes
parentagepath.root=root
propertysheet.no.attributes.message=There are no attributes.
admin_suffix.name=Administrator
no.properties=There is no information to display for this entry.
no.entries.match.filter=There are no entries which match the search filter.
no.entries.selected=No entries were selected.
unsupported.operation=This operation is not available.
needs.to.be.integer={0} needs to be an integer.
invalid.url.message=Invalid URL.
uncaughtException.message=An error occurred while processing this request. Contact your administrator.
################################################################################
#
# CONSOLE PROFILE
#
################################################################################
page.title.console.properties=Adminstration Console Properties
console.properties.organization.label=Organization
console.agent.container=Default Agent Container
console.onlineHelpDocs=Online Help Documents
console.maxItemsPerPage=Paging Size
console.externalAttrFetch=External Attribute Fetch
console.enableAttrFetch=enabled
console.jspDirectoryName=JSP Directory Name
console.searchProperties=Search Parameters
console.search.timeout=Search Timeout Value
console.search.limit=Number of results returned
console.save.ok=The Administration Console Properties were updated.
console.noproperties.message=The Administration Console properties could not be retrieved.
password-mismatched=Password and password confirmation values mismatched.
invalid-date.message=Invalid Date, {0}.
################################################################################
#
# Bread Crumbs
#
################################################################################
breadcrumbs.addrealm=New Realm
breadcrumbs.editRealm=Realm - {0}
breadcrumbs.realms=Access Control
breadcrumbs.policies=Policies
breadcrumbs.addPolicy=New Policy
breadcrumbs.editPolicy=Policy - {0}
breadcrumbs.addReferralPolicy=New Referral
breadcrumbs.selectServiceType=New Rule
breadcrumbs.selectReferralType=Select Referral Type
breadcrumbs.selectSubjectType=New Subject
breadcrumbs.selectConditionType=New Condition
breadcrumbs.selectResponseProviderType=New Response Provider
breadcrumbs.addRule=New Rule
breadcrumbs.editRule=Rule - {0}
breadcrumbs.addSubject=New Subject
breadcrumbs.editSubject=Subject - {0}
breadcrumbs.addCondition=New Condition
breadcrumbs.editCondition=Condition - {0}
breadcrumbs.addResponseProvider=Add Response Provider
breadcrumbs.editResponseProvider=Response Provider - {0}
breadcrumbs.addReferral=New Referral
breadcrumbs.editReferral=Edit Referral - {0}
breadcrumbs.realm.services.selectService=Add Service
breadcrumbs.realm.services.addService=Add Service
breadcrumbs.realm.services.editService=Service - {0}
breadcrumbs.auth.newInstance=New Instance
breadcrumbs.auth.newConfiguration=New Authentication Chain
breadcrumbs.auth.editInstance=Authentication Instance - {0}
breadcrumbs.auth.editConfiguration=Authentication Chain - {0}
breadcrumbs.auth.advanced.properties=Authentication - Advanced Properties
breadcrumbs.realm.idrepo.selectIdRepo=Select Type of Data Store
breadcrumbs.realm.idrepo.addIdRepo=Add Data Store
breadcrumbs.realm.idrepo.editIdRepo=Data Store - {0}
breadcrumbs.realm.pivilege.editPrivilege=Privilege - {0}
breadcrumbs.addentities=Add Subject
breadcrumbs.editentities=Subject - {0}
breadcrumbs.editentities.addservice=Add Service
breadcrumbs.editentities.editservice=Service - {0}
breadcrumbs.editentities.selectservice=Add Service
breadcrumbs.authentication=Authentication
breadcrumbs.authentication.edit=Module - {0}
breadcrumbs.services.config=Service Configuration
breadcrumbs.services.edit=Service - {0}
breadcrumbs.services.subconfig.add=Add Sub Configuration
breadcrumbs.services.subconfig.edit=Edit Sub Configuration
breadcrumbs.services.subschema.select=Select Sub Schema
breadcrumbs.services.policy=Policy Configuration
breadcrumbs.services.policy.resource.comparator.add=Add Resource Comparator
breadcrumbs.services.policy.resource.comparator.edit=Edit Resource Comparator
breadcrumbs.idm.services.editService=Service - {0}
################################################################################
#
# Home Page
#
################################################################################
page.title.common.tasks=Welcome to the OpenAM Administration Console
page.title.common.tasks.section.SAML2=Create SAMLv2 Providers
page.title.common.tasks.section.createFedlet=Create Fedlet
page.title.common.tasks.section.validateSAMLv2=Test Federation Connectivity
page.title.common.tasks.section.documentation=Get Product Documentation
page.title.common.tasks.section.product=Register This Product
page.title.common.tasks.section.soapSTSDeployment=Create a Soap STS Deployment
page.title.common.tasks.section.desc.SAML2=Use these work flows to create hosted or remote identity and service providers for SAMLv2 Federation.
page.title.common.tasks.section.desc.createFedlet=Create a Fedlet to enable federation between an identity provider hosted on this instance of OpenAM and a remote service provider that does not have a federation solution. Before beginning, a hosted identity provider must be configured.
page.title.common.tasks.section.desc.validateSAMLv2=Use this automated test to determine if federation connections are being made successfully, or to identify where issues might be located.
page.title.common.tasks.section.desc.documentation=Launch the OpenAM product documentation page.
page.title.common.tasks.section.desc.product=Register this OpenAM product.
page.title.common.tasks.section.desc.soapSTSDeployment=Create a Soap STS .war file specific to a given realm and Soap STS agent.
################################################################################
#
# Policy Config Service Page
#
################################################################################
page.title.policy.properties=Policy Configuration Properties
policy.noproperties.message=The Policy configuration properties could not be retrieved.
policy.save.ok=The Policy Configuration Properties were updated.
policy.properties.section.title.LDAPInformation=LDAP Connection
policy.properties.section.title.LDAPSubjectInformation=LDAP Subject Information
policy.properties.section.title.availableObjects=Available Object Types
policy.properties.section.title.miscellaneous=Miscellaneous
policy.service.table.resource.comparator.title=Resource Comparator
policy.service.table.resource.comparator.noentries=There are no comparators.
policy.service.table.resource.comparator.help=List of resource comparators for each policy service
policy.service.table.resource.comparator.help.txt=Services that define policy attributes can have a custom resource comparator. \
Resource comparators are used to determine if the resource name (eg: a URL) in the resource matches the resource name defined in the \
policy.<br/><br/>\
<i>NB </i>If a service does not define a specific resource comparator then the default of <code>PrefixResourceName</code> is used.
################################################################################
#
# AUTHENTICATION PROFILE
#
################################################################################
page.title.authentication.properties={0} Authentication Module Properties
page.title.authentication=Authentication Modules
authentication.save.ok=The authentication chain properties were updated.
authentication.profile.updated=The authentication properties were updated.
authentication.noproperties.message=The authentication property values could not be retrieved for this entry.
table.auth.module.action=Action
table.authenticationTypes.title=Authentication Module
table.authTypes.summary=Authentication Module
table.authTypes.empty.message=There are no authentication module
label.authTypes=Authentication Types
label.generalProperties=General Properties
jump.title.coreServices=Jump to Core Service
jump.title.authTypes=Jump To Authentication Types
jump.title.topPage=Jump to Top of Page
label.backToTop=Back to top
label.generalProperties.sub.title=General Properties
label.authModules.sub.title=Authentication Module
auth.module.save.clicked=Save was clicked.
authentication.instance.list.empty=There are no Instances available to add to this Configuration.
authentication.instance.invalids={0} are invalid.
authentication.instance.invalid={0} is invalid.
################################################################################
#
# COMPONENT
#
################################################################################
################################################################################
#
# MASTHEAD
#
################################################################################
masthead.link.title.version=Display Product Version
masthead.text.version=Version
masthead.text.searchall=Search All
masthead.button.search=Search All
masthead.text.search.button=Search Button
masthead.link.title.logout=Log Out
masthead.text.logout=Log Out
masthead.link.title.help=Display Help for This Page
masthead.text.help=Help
masthead.image.alt.brand=OpenAM
masthead.image.alt.product=OpenAM
masthead.text.user=User
masthead.text.server=Server
masthead.image.alt.sunlogo=Sun Microsystems Inc.
masthead.button.help.status=Display Help for This Page (Opens a New Window)
masthead.button.help.tooltip=Display Help for This Page (Opens a New Window)
masthead.button.help.tooltip.debug=Help Target - {0}
tab.common.label = Common Tasks
tab.common.tooltip=Click to go to Common Tasks
tab.common.status=Click to go to Common Tasks
tab.dm.label=Directory Management
tab.dm.tooltip=Click to configure Directory Management
tab.dm.status=Click to configure Directory Management
tab.realm.label=Realms
tab.realm.tooltip=Click to configure realms
tab.realm.status=Click to configure realms
tab.sub.realm.label=Realms
tab.sub.realm.tooltip=Click to go to Realms
tab.sub.realm.status=Click to go to Realms
tab.sub.policy.label=Policies
tab.sub.policy.tooltip=Click to go to Policies
tab.sub.policy.status=Click to go to Policies
tab.sub.subjects.label=Subjects
tab.sub.subjects.tooltip=Click to go to Subjects
tab.sub.subjects.status=Click to go to Subjects
tab.session.label=Sessions
tab.session.tooltip=Click to go to Sessions
tab.session.status=Click to go to Sessions
tab.configuration.label=Configuration
tab.configuration.tooltip=Click to go to Configuration
tab.configuration.status=Click to go to Configuration
tab.configuration.service.label=Services
tab.configuration.service.tooltip=Click to go to Service Configuration
tab.configuration.service.status=Click to go to Service Configuration
tab.configuration.service.auth.label=Authentication
tab.configuration.service.auth.tooltip=Click to go to Authentication Service Configuration
tab.configuration.service.auth.status=Click to go to Authentication Service Configuration
tab.configuration.service.console.tooltip=Click to go to Console Service Configuration
tab.configuration.service.console.status=Click to go to Console Service Configuration
tab.configuration.service.system.tooltip=Click to go to System Service Configuration
tab.configuration.service.system.status=Click to go to System Service Configuration
tab.configuration.service.global.tooltip=Click to go to Global Service Configuration
tab.configuration.service.global.status=Click to go to Global Service Configuration
tab.configuration.server.label=Servers and Sites
tab.configuration.server.tooltip=Click to go to Servers and Sites Configuration
tab.configuration.server.status=Click to go to Servers and Sites Configuration
tab.configuration.general.label=General
tab.configuration.general.tooltip=Click to go to General Services
tab.configuration.general.status=Click to go to General Services
tab.configuration.console.label=Administration Console
tab.configuration.console.tooltip=Click to go Administration Console Properties
tab.configuration.console.status=Click to go Administration Console Properties
tab.configuration.authentication.label=Authentication
tab.configuration.authentication.tooltip=Click to go to Authentication Services
tab.configuration.authentication.status=Click to go to Authentication Services
tab.configuration.core.tooltip=Click to go to Core Services
tab.configuration.core.status=Click to go to Core Services
tab.configuration.policy.tooltip=Click to go to Policy Services
tab.configuration.policy.status=Click to go to Policy Services
tab.configuration.scripts.label=Scripts
tab.configuration.scripts.tooltip=Click to go to Script Services
tab.configuration.scripts.status=Click to go to Script Services
tab.sub.services.tooltip=Click to go to Services
tab.sub.services.status=Click to go to Services
tab.sub.authentication.tooltip=Click to go to Authentication
tab.sub.authentication.status=Click to go to Authentication
tab.sub.repository.tooltip=Click to go to Data Stores
tab.sub.repository.status=Click to go to Data Stores
tab.sub.delegation.tooltip=Click to go to Privileges
tab.sub.delegation.status=Click to go to Privileges
#############################################################################
#
# Session Management
#
################################################################################
tab.session.current.label=Current Sessions
tab.session.current.tooltip=Click to go to Current Sessions
tab.session.current.status=Click to go to Current Sessions
#
tab.session.configuration.label=HA Configuration Properties
tab.session.configuration.tooltip=Click to go to Session HA Configuration Properties
tab.session.configuration.status=Click to go to Session HA Configuration Properties
#
tab.session.statistics.label=HA Statistics
tab.session.statistics.tooltip=Click to go to Session HA Statistics
tab.session.statistics.status=Click to go to Session HA Statistics
################################################################################
#
# Realm Management
#
################################################################################
top.level.realm=/ (Top Level Realm)
accesscontrol.tab.text=A realm is the unit that OpenAM uses to organize configuration information. Authentication properties, authorization policies, data stores, subjects and other data can be defined within the realm. The top level realm is created when you deploy OpenAM. The top level realm is the root of the OpenAM instance and contains OpenAM configuration data.
page.title.back.realms=Access Control
page.title.realms=Realms
page.title.realms.properties={0} - Properties
page.title.realms.authentication={0} - Authentication
table.realm.button.new=New...
table.realm.button.delete=Delete
table.realm.name.column.name=Realm Name
table.realm.path.column.name=Location
table.realm.title.name=Realms
table.realm.summary=Realms
table.realm.empty.message=There are no realms.
page.title.realm.create=New Realm
page.title.realm.profile=Realm Profile
realm.sectionHeader.general=General
realm.missing.realmName=Name of realm is required.
realm.message.deleted=Realm is deleted.
realm.message.deleted.pural=Realms are deleted.
realm.showMenu.label=View
realm.showmenu.label.properties=General
realm.showmenu.label.authentication=Authentication
realm.showmenu.label.services=Services
realm.showmenu.label.repository=Data Stores
realm.showmenu.label.groups=Groups
realm.showmenu.label.policy=Policies
realm.showmenu.label.subjects=Subjects
realm.showmenu.label.delegation=Privileges
realm.showmenu.label.scripts=Scripts
realm.parent.label=Parent
################################################################################
#
# Services Management (under Realm)
#
################################################################################
page.title.realms.services={0} - Services
page.title.services=Services
table.services.title.name=Services
table.services.summary=Services
table.services.empty.message=There are no services under this realm.
table.services.button.new=Add...
table.services.button.delete=Remove
services.attribute.label.serviceList=Services
services.noservices.for.assignment.message=There are no services available for assigning to this realm.
page.title.services.select=Step 1 of 2: Select Service
page.title.services.add=Step 2 of 2: Add Service - {0}
services.message.deleted=Service has been removed.
services.message.deleted.pural=Services have been removed.
services.missing.servicename=Service Name is required.
realm.services.noorganization.attributes=There are no attributes to display.
realm.services.not.assign.service=Unable to assign service
################################################################################
#
# Delegation Management
#
################################################################################
page.title.delegation={0} - Privileges
table.delegation.title.name=Privileges
table.delegation.summary=Privilege(s)
table.delegation.empty.message=There are no privileges.
table.delegation.button.new=Add...
nopermissions.message=There are no permissions.
delegation.section.privileges=Privileges
delegation.no.privileges=There are no privileges under this realm.
delegation.RealmAdmin=Read and write access to all realm and policy properties
delegation.RealmReadOnly=Read only access to all properties and services
delegation.DatastoresReadOnly=Read only access to data stores
delegation.privilege.updated=Privilege Profile was updated.
delegation.LogAdmin=Read and write access to all log files
delegation.LogRead=Read access to all log files
delegation.LogWrite=Write access to all log files
delegation.AgentAdmin=Read and write access to all configured Agents
delegation.FederationAdmin=Read and write access to all federation metadata configurations
delegation.PolicyAdmin=Read and write access for policy administration (includes related REST endpoints)
delegation.EntitlementRestAccess=REST calls for policy evaluation
delegation.PrivilegeRestReadAccess=REST calls for reading policies
delegation.PrivilegeRestAccess=REST calls for managing policies
delegation.ApplicationReadAccess=REST calls for reading policy applications
delegation.ApplicationModifyAccess=REST calls for modifying policy applications
delegation.ResourceTypeReadAccess=REST calls for reading policy resource types
delegation.ResourceTypeModifyAccess=REST calls for modifying policy resource types
delegation.ApplicationTypesReadAccess=REST calls for reading policy application types
delegation.ConditionTypesReadAccess=REST calls for reading environment conditions
delegation.SubjectTypesReadAccess=REST calls for reading subject conditions
delegation.DecisionCombinersReadAccess=REST calls for reading decision combiners
delegation.SubjectAttributesReadAccess=REST calls for reading subject attributes
delegation.RealmReadAccess=REST calls for reading realms
delegation.SessionPropertyModifyAccess=REST calls for modifying session properties.
################################################################################
#
# Entities Management
#
################################################################################
table.entities.empty.message=There are no entities.
table.entities.button.new=New...
table.entities.button.delete=Delete
table.entities.name.column.id=Universal Id
entity.attribute.label.uuid=Universal ID
entity.attribute.label.agenttype=Agent Type
entity.attribute.label.agenttype.policy.agent=Policy Agent
entity.attribute.label.agenttype.wsc=Web Service Security Client
entity.attribute.label.agenttype.wsp=Web Service Security Provider
page.title.entities.create=New {0}
page.title.entities.edit=Edit {0} - {1}
entities.missing.entityName={0} Name is required.
entities.message.deleted={0} has been deleted.
entities.message.deleted.pural={0}s have been deleted.
entity-values-missing=Values for {0} is required.
profile.tab=General
services.tab=Services
agent=Agent
user=User
group=Group
filteredrole=Filtered Role
role=Role
table.entities.memberOf.empty.message=There are no subscriptions.
page.title.EntitySelectMembership=Select Membership
table.entities.selectMembership.title.name=Select Membership
table.entities.selectMembership.summary=Select Membership
table.entities.selectMembership.empty.message=There are no memberships.
page.title.EntitySelectMembers=Select Entities
table.entities.selectMembers.title.name=Select Entities
table.entities.selectMembers.summary=Select Entities
table.entities.selectMembers.empty.message=There are no entities for selection.
entities.membership.add.no.selection.message=Select one or more memberships.
entities.members.add.no.selection.message=Select one or more entities.
entities.membership.remove.no.selection.message=Select one or more memberships.
entities.members.remove.no.selection.message=Select one or more entities.
entities.membership.remove.membership=Membership is removed.
entities.membership.remove.membership.pural=Memberships are removed.
entities.members.remove.members=Member is removed.
entities.members.remove.members.pural=Members are removed.
page.title.entities.addservice.select=Step 1 of 2: Select Service for Addition
page.title.entities.addservice=Step 2 of 2: Add Service - {0}
page.title.entities.editservice=Edit Service - {0}
table.entities.services.title.name=Services
table.entities.services.summary=Services
table.entities.services.empty.message=There are no assigned services.
entities.message.service.unassigned=Service is unassigned.
entities.message.service.unassigned.pural=Services are unassigned.
entities.message.service.unassigned.non.selected=Select one service for unassignment.
################################################################################
#
# ID Repo Management
#
################################################################################
page.title.realms.idrepo={0} - Data Stores
table.idrepo.button.new=New...
table.idrepo.button.delete=Delete
idRepo.message.deleted=Data Store has been deleted.
idRepo.message.deleted.pural=Data Stores have been deleted.
page.title.idrepo=Data Stores
table.idrepo.title.name=Data Stores
table.idrepo.summary=Data Stores
table.idrepo.empty.message=There are no data stores.
page.title.realm.idrepo.create=Step 2 of 2: New Data Store - {0}
idrepo.attribute.label.IdRepoLoadSchemaWhenFinished=Load schema when finished
idrepo.attribute.label.IdRepoLoadSchemaWhenSaved=Load schema when saved
idrepo.missing.idRepoName=Name for Data Store is required.
page.title.idrepo.selectType=Step 1 of 2: Select Type of Data Store
idrepo.missing.plugins=There are no data stores configured for this realm.
entity.attribute.label.cospriority=Conflict Resolution Level
idrepo.sevices.not.supported=Services are not supported on this identity.
################################################################################
#
# Policy Management
#
################################################################################
page.title.policy={0} - Policies
table.policy.title.name=Policies
table.policy.summary=Policies
table.policy.empty.message=There are no policies.
table.policy.normal.button.new=New Policy...
table.policy.referral.button.new=New Referral...
table.policy.button.delete=Delete
table.policy.column.resources=Protected Resources
table.policy.column.active=Policy State
policy.modified.message=Policy has been updated.
policy.unsaved.message=Policy is modified. Click on Save button to save the changes.
noReferralForOrg.message=A referral policy with referred resources must first be created to this realm in order to create policies in this realm.
noPolicyConfigSvc.message=Cannot create policy because this realm may not have the Policy Configuration Service.
page.title.policy.selectType=Select Policy Type
page.title.policy.create=New Policy
page.title.referral.create=New Referral
page.title.policy.edit=Edit Policy
policy.attribute.label.description=Description
policy.attribute.label.policyType=Type of Policy
policy.missing.policyName=Policy name is required.
policy.missing.ruleName=Rule name is required.
policy.missing.resourceName=Resource name is required.
policy.missing.actionValues=One or more action values are required.
policy.section.title.general=General
policy.table.title.rules=Rules
policy.table.rules.empty.message=There are no rules.
policy.rules.table.column.name=Rule Name
policy.rules.table.column.type=Service Type
policy.section.title.referrals=Referrals
policy.table.title.referrals=Referrals
policy.table.referrals.empty.message=There are no referrals.
policy.rule.updated=Rule was updated. Click on the Save button in the policy view to save this change.
policy.subject.updated=Subject was updated. Click on the Save button in the policy view to save this change.
policy.referral.updated=Referral was updated. Click on the Save button in the policy view to save this change.
policy.condition.updated=Condition was updated. Click on the Save button in the policy view to save this change.
policy.responseProvider.updated=Response Provider was updated. Click on the Save button in the policy view to save this change.
policy.message.deleted=Policy has been deleted.
policy.message.deleted.pural=Policies have been deleted.
policy.message.unableToDeletePolicies=Unable to delete these policies: {0}.
page.title.policy.selectServiceType=Step 1 of 2: Select Service Type for the Rule
policy.rule.attribute.label.serviceType=Service Type
policy.rule.attribute.label.managedResource=Parent Resource Name
policy.rule.attribute.label.resourceName=Resource Name
policy.rule.attribute.label.actions=One or more actions are required.
page.title.policy.rule.create=Step 2 of 2: New Rule
page.title.policy.rule.edit=Edit Rule
policy.table.title.actions=Actions
policy.table.rules.actions.empty.message=There are no actions.
policy.rules.withResourceName={0} (with resource name)
policy.rules.withoutResourceName={0} (without resource name)
page.title.policy.referral.create=Step 2 of 2: New Referral - {0}
page.title.policy.referral.create.shortcut=New Referral - {0}
page.title.policy.referral.edit=Edit Referral - {0}
page.title.policy.selectReferralType=Step 1 of 2: Select Referral Type
policy.missing.referralName=Referral Name is required.
policy.missing.referral.value=Referral Value is required.
policy.referral.sizelimit.exceeded.message=Size limit Exceeded. Refine your search to locate more entries.
policy.referral.timelimit.exceeded.message=Time limit Exceeded. Refine your search to locate more entries.
policy.section.title.subjects=Subjects
policy.table.title.subjects=Subjects
policy.table.subjects.empty.message=There are no subjects.
policy.missing.subjectName=Subject Name is required.
policy.missing.subject.value=Subject Value is required.
policy.subject.attribute.label.exclusive=Exclusive
page.title.policy.selectSubjectType=Step 1 of 2: Select Subject Type
page.title.policy.subject.create=Step 2 of 2: New Subject - {0}
page.title.policy.subject.create.shortcut=New Subject - {0}
page.title.policy.subject.edit=Edit Subject - {0}
policy.subject.sizelimit.exceeded.message=Size limit Exceeded. Refine your search to locate more entries.
policy.subject.timelimit.exceeded.message=Time limit Exceeded. Refine your search to locate more entries.
policy.subject.select.identity.type=-- Select Identity Type --
policy.section.title.responseproviders=Response Providers
policy.table.title.responseproviders=Response Providers
policy.table.responseproviders.empty.message=There are no response providers.
policy.responseprovider.attribute.label.responseProvider=Response Provider Type
page.title.policy.responseprovider.create=Step 2 of 2: New Response Provider - {0}
page.title.policy.responseprovider.create.shortcut=New Response Provider - {0}
page.title.policy.responseprovider.edit=Edit Response Provider - {0}
policy.missing.responseProviderName=Name is required.
policy.missing.responseprovider.value=Value is required.
page.title.policy.select.response.attribute.type=Step 1 of 2: Select Response Provider Type
policy.responseprovider.sizelimit.exceeded.message=Size limit Exceeded. Refine your search to locate more entries.
policy.responseprovider.timelimit.exceeded.message=Time limit Exceeded. Refine your search to locate more entries.
policy.section.title.conditions=Conditions
policy.table.title.conditions=Conditions
policy.table.conditions.empty.message=There are no conditions
page.title.policy.condition.create=Step 2 of 2: New Condition - {0}
page.title.policy.condition.create.shortcut=New Condition - {0}
page.title.policy.condition.edit=Edit Condition - {0}
page.title.policy.selectConditionType=Step 1 of 2: Select Condition Type
policy.missing.conditionName=Condition Name is required.
policy.missing.condition.value=Condition value is required.
policy.condition.attribute.label.search=Search Filter
policy.condition.attribute.label.realm=Realm where user authenticated
policy.condition.attribute.button.realm=Select Realm
policy.condition.attribute.label.selectschemes=Module Instance
policy.condition.title.selectrealm=Select Realm
policy.condition.selectrealm.no.search.result.message=No matching realm names.
policy.condition.null.realm=[Empty]
# Authentication Level Condition
policy.condition.attribute.label.authlevel=Authentication Level
policy.table.condition.auth.level.title=Authentication Level for Modules
policy.table.condition.auth.level.empty.message=There are no authentication levels.
policy.condition.missing.realm=Realm is required.
policy.condition.missing.auth.level=Authentication Level is required.
policy.condition.authlevel.no.search.result.message=No matching realm names.
policy.condition.authlevel.no.longer.exist.realm=Realm, {0}, no longer exists.
# Authentication Scheme Condition
policy.condition.attribute.label.authscheme=Module Instances
policy.condition.missing.auth.scheme=A module instance is required.
policy.condition.section.app=Application Timeout Properties
policy.condition.attribute.label.appname=Application Name
policy.condition.attribute.label.apptimeout=Timeout Value
policy.condition.attribute.timeout.help=Time to live for the application session.<br>Set the value to 0 to never timeout.
# Session Condition
policy.condition.attribute.label.max.session.time=Maximum Session Time (minutes)
policy.condition.attribute.label.terminate.session=Terminate Session
policy.condition.missing.session.max.time=Maximum Session Time is required.
session_condition_false_value=No
session_condition_true_value=Yes
# IP Condition
policy.condition.section.ip=IP Address
policy.condition.missing.ip.dns.message=IP Address or DNS Name is required.
policy.condition.attribute.label.ipAddressVersion=IP Address Version
# Authenticate To Realm Condition
policy.condition.attribute.label.authtorealm=Realm where user authenticated
policy.condition.attribute.label.authtorealm.search=Search Filter
policy.condition.missing.authtorealm.message=Realm is required.
policy.condition.authtorealm.no.search.result.message=The search filter does not match any realms.
# Identity Subject Condition
policy.condition.missing.identity.membership.message=At least one Identity must be selected.
# Time Condition
policy.condition.help=A time condition must contain one of the following values: Date, Time, Day, or Time Zone.
policy.condition.section.timezone=Timezone
policy.condition.attribute.label.startdate=Start Date
policy.condition.attribute.label.starttime=Start Time
# Change the value to a desired format according to
# the preferred locale, so that console will display
# the format correctly.
# Change the value to a desired format according to
# the preferred locale, so that console will display
# the format correctly.
# Change the value of
# policy.condition.time.dateformat to a desired format
# according to the preferred locale, so that console
# will display date correctly according to
# preferred locale.
policy.condition.missing.time.condition.value=One of the date/time condition values is required.
policy.condition.time.invalid.startdate=Invalid Start Date.
policy.condition.time.invalid.enddate=Invalid End Date.
policy.condition.time.invalid.starttime=Invalid Start Time.
policy.condition.time.invalid.endtime=Invalid End Time.
policy.condition.time.invalid.timezone=Invalid Timezone.
# Session Property Condition
policy.condition.attribute.label.caseInsensitive=Ignore Case of Values
policy.condition.missing.session.property.message=Property Value is required.
policy.condition.attribute.label.session.property.condition.noentries=There are no values.
policy.table.condition.session.property.column.name=Property Name
policy.condition.session.property.add=New Property
policy.condition.session.property.edit=Edit Property
policy.condition.missing.session.property.name.message=Property Name is required.
policy.condition.session.property.reserved.name.message=Property Name is reserved.
policy.condition.session.property.name.already.exists.message=Property Name already exists.
policy.name.change=The policy name entered is invalid. Enter a new name.
policy.create.name=<enter policy name>
# Authenticate to Service Condition
policy.condition.attribute.label.service=Authentication Chain
policy.condition.missing.auth.service=An authentication chain is required.
policy.resources.empty.message=[ empty ]
policy.resources.active.true=Enabled
policy.resources.active.false=Disabled
policy.no.service.types=Cannot create rules because there are no service types configured.
policy.no.subject.types=Cannot create subjects because there are no subject types configured.
policy.no.condition.types=Cannot create conditions because there are no condition types configured.
policy.no.response.providers.types=Cannot create response providers because there are no response providers types configured.
table.agent.title.name=Agents
table.agent.summary=Agents
table.agent.empty.message=There are no agents to display.
removed.service=The service was removed.
removed.multiple.services=The services were removed.
page.title.user.change.password=Change Password for {0}
user.change.password.help=Type in the new password, then re-enter it.
user.change.password.label=New Password
user.change.password.confirm.label=Re-Enter Password
user.change.password.missing.password.message=Value for the new password is required.
user.change.password.mismatch.password.message=The passwords you entered do not match.
user.change.password.modified.password.message=Password was changed.
user.change.password.missing.old.password.message=Value for the old password is required.
user.change.old.password.label=Old Password
user.change.old.password.help=Type in your old password.
title.user.resource.offering=User Discovery Resource Offering for {0}
table.user.resource.offerings.column.service.name=Service Type
table.user.resource.offering.title=Discovery Resource Offering
table.user.resource.offering.empty.message=There are no resource offerings.
createFailure.message=An error occurred while creating the entry.
################################################################################
#
# Configuration
#
################################################################################
page.title.config=Configuration
config.auth.label=Authentication
config.console.label=Console Properties
config.global.label=Global Properties
config.system.label=System Properties
################################################################################
#
# Service Management
#
################################################################################
service.name=Service Name
subconfig.message.deleted=Sub Configuration has been deleted.
subconfig.message.deleted.pural=Sub Configurations have been deleted.
page.title.services.sub.schema.select=Select Sub Schema
services.attribute.label.subConfiguration.selection.message=Select one sub configuration type for creation.
subconfig.missing.subconfiguration.name.message=Sub Configuration name is required.
page.title.services.add.subconfig=Add Sub Configuration
page.title.services.edit.subconfig=Edit Sub Configuration - {0}
policy.service.table.resource.comparator.create.page.title=New Resource Comparator
policy.service.table.resource.comparator.edit.page.title=Edit Resource Comparator = {0}.
policy.service.resource.comparator.create.page.title=New Resource Comparator
policy.service.resource.comparator.edit.page.title=Edit Resource Comparator
policy.service.resource.comparator.invalid.resourceComparator.message=Service Type and at least one of Class, Wildcard, Delimiter and Case Sensitive attributes are required.
policy.service.resource.comparator.service.type=Service Type
policy.service.resource.comparator.service.type.help=The name of the service to be associated with the resource comparator
policy.service.resource.comparator.clazz.help=The class name of the resource comparator
policy.service.resource.comparator.clazz.help.txt=Resource comparators are used to compare the resource name from the incoming \
policy evaluation request against the resource name set in the policy. Resource comparators confirm if the resource names match, sub or \
super match, wildcard match or no match. Custom resource comparators can be implemented; typically for custom policy services. Custom \
resource comparators must implement the following interface:<br/><br/>\
<code>com.sun.identity.policy.interfaces.ResourceName</code>
policy.service.resource.comparator.delimiter.help=The delimiter used in the resource name
policy.service.resource.comparator.delimiter.help.txt=Resource names can be hierarchial (such as URLs or file name). Hierarchial \
resource names use delimiters such as <code>/</code> to denote the different levels in the hierarchy.
policy.service.resource.comparator.oneLevelWildcard=One Level Wildcard
policy.service.resource.comparator.case.sensitive=Case Sensitive
policy.service.resource.comparator.missing.service.type.message=Service Type is required
################################################################################
#
# Core Services
#
################################################################################
page.title.coreServices=Core Services
table.coreservices.title.name=Core Services
table.coreservices.summary=Core Services
table.coreservices.empty.message=There are no core services.
table.name.column.name=Service
table.action.column.name=Action
table.action.edit=Edit
################################################################################
#
# General Services
#
################################################################################
page.title.generalServices=General Services
table.generalservices.title.name=General Services
table.generalservices.summary=General Services
table.generalservices.empty.message=There are no general services.
################################################################################
#
# Client Detection Service
#
################################################################################
map.client.manager.window.title=Client Manager
table.clientDetection.client.title.name=Client Type
table.clientDetection.client.title.summary=List of Client Types.
table.clientDetection.client.empty.message=There are no client types.
clientDetection.customizable.legend=Indicates customized device.
clientDetection.client.deleted.message=Device was deleted.
clientDetection.client.defaulted.message=Device profile was set to default setting.
map.client.manager.selectDevice.window.title=Step 1 of 2: Select Device Type
map.client.manager.createDevice.window.title=Step 2 of 2: New Device
map.client.manager.createDevice.style.deviceUserAgent.label=Device User Agent
map.client.manager.duplicateDevice.window.title=Duplicate Device
map.client.manager.duplicateDevice.style.deviceUserAgent.label=Device User Agent
mapClientExist.message=Client, {0} already exists.
mapInvalidClientType.message=Client Type is required and cannot contain the following characters: whitespace , + " \\ / < > = : ;
mapMissingDeviceUserAgent.message=Device user agent is required.
mapMissingClientType.message=Client type is required.
mapCloneFailed.message=Unable to duplicate device.
mapCloneClient.name=Copy of
mapCloneClient.prefix=Copy_of_
map.no.profiles=There are no profiles.
################################################################################
#
# Globalization Service
#
################################################################################
globalization.service.table.SupportedCharsets.name=Charsets Supported by Each Locale
globalization.service.table.SupportedCharsets.noentries=There are no supported charsets.
globalization.service.table.SupportedCharsets.locale.help=The name of the locale
globalization.service.table.SupportedCharsets.charsets=Supported Charsets
globalization.service.table.SupportedCharsets.charsets.help=One or more charsets supported by the locale
globalization.service.table.SupportedCharsets.charsets.help.txt=Format for the attribute is as follows:<br/><br/>\
<code>charset_1;charset_2</code>
globalization.service.SupportedCharsets.missing.locale.message=Locale is required.
globalization.service.SupportedCharsets.missing.charsets.message=One or more charsets are required.
globalization.service.SupportedCharsets.create.page.title=New Supported Charsets
globalization.service.SupportedCharsets.edit.page.title=Edit Supported Charsets
globalization.service.table.CharsetAlias.name=Charset Aliases
globalization.service.table.CharsetAlias.noentries=There are no charset aliases.
globalization.service.CharsetAlias.missing.mimeName.message=MIME name is required.
globalization.service.CharsetAlias.missing.javaName.message=Java name is required.
globalization.service.CharsetAlias.create.page.title=New Charset Alias
globalization.service.CharsetAlias.create.page.existing=Existing Charset Alias
globalization.service.CharsetAlias.edit.page.title=Edit Charset Alias
globalization.service.locale.already.exists=Locale already exists. Edit it to modify its supported charsets.
################################################################################
#
# Server and Site Configuration Management
#
################################################################################
page.title.serversite.config=Servers and Sites
table.server.button.new=New ...
table.server.button.clone=Clone ...
table.server.button.delete=Delete
table.server.name.column.name=Server Name
table.server.site.column.name=Site Name
serverconfig.message.deleted=Server is deleted.
serverconfig.message.deleted.pural=Servers are deleted.
breadcrumbs.server.config=Server Configuration
table.server.title.name=Servers
table.server.summary=Servers
table.server.empty.message=There are no servers.
page.title.site.create=New Site
serverconfig.site.attribute.label.primary.url=Primary URL
serverconfig.create.site.missing.attributes=Site must have a name and a URL.
serverconfig.create.site.invalid.url=Invalid URL
breadcrumbs.addsite=New Site
page.title.site.edit=Edit {0}
serverconfig.site.attribute.label.site.profile=Site Profile
serverconfig.site.attribute.label.failover.urls=Secondary URLs
serverconfig.site.attribute.label.site.servers=Assigned Servers
serverconfig.site.attribute.no.servers=There are no assigned servers.
siteconfig.updated=Site Profile was updated.
table.site.button.new=New ...
table.site.button.delete=Delete
table.site.name.column.name=Site Name
table.site.url.column.name=Primary URL
table.site.servers.column.name=Assigned Servers
siteconfig.message.deleted=Site is deleted.
siteconfig.message.deleted.pural=Sites are deleted.
breadcrumbs.site.config=Site Configuration
table.site.title.name=Sites
table.site.summary=Sites
table.site.empty.message=There are no sites.
serverconfig.server.attribute.label.name=Server URL
serverconfig.server.attribute.label.name.helpserverurl=The FQDN should be in the format of http(s)://host.domain:port/uri.
serverconfig.server.clone.help.name=This will create a new server entry which uses all of the settings from the original server, {0}.
page.title.server.clone=Clone Server {0}
serverconfig.clone.server.missing.atributes=Server Name is required.
breadcrumbs.clone.server=Clone Server
breadcrumbs.edit.server=Edit Server
page.title.server.edit=Edit {0}
none.site=___None___
serverconfig.server.attribute.label.parent.site=Parent Site
serverconfig.updated=Server Profile was updated.
serverconfig.updated.with.invalid.properties=Server Profile was updated. {0}
serverconfig.server.button.defaultserver=Default Server Settings
amconfig.header.datastore=Data Store
amconfig.header.eventservice=Event Service
amconfig.header.ldapconnection=LDAP Connection
amconfig.header.cachingreplica=Caching and Replica
amconfig.header.sdktimetoliveconfig=Time To Live Configuration
amconfig.header.encryption=Encryption
amconfig.header.validation=Validation
amconfig.header.cookie=Cookie
amconfig.header.securitykey=Key Store
amconfig.header.crlcache=Certificate Revocation List Caching
amconfig.header.ocsp.check=Online Certificate Status Protocol Check
amconfig.header.fips=Federal Information Processing Standards
amconfig.header.deserialisationwhitelist=Object Deserialisation Class Whitelist
amconfig.header.site=Site
amconfig.header.installdir=System
amconfig.header.debug=Debugging
amconfig.header.mailserver=Mail Server
amconfig.header.sessionthresholds=Session Limits
amconfig.header.sessionlogging=Statistics
amconfig.header.sessionnotification=Notification
amconfig.header.sessionvalidation=Validation
amconfig.com.iplanet.am.locale=Default Locale
amconfig.help.com.iplanet.am.locale=Default locale for the product. (property name: com.iplanet.am.locale)
amconfig.com.iplanet.services.configpath=Base installation directory
amconfig.help.com.iplanet.services.configpath=Base directory where product's data resides. (property name: com.iplanet.services.configpath)
amconfig.com.iplanet.services.debug.level=Debug Level
amconfig.com.sun.services.debug.mergeall=Merge Debug Files
amconfig.help.com.iplanet.services.debug.level=Debug level for all components in the product. (property name: com.iplanet.services.debug.level)
amconfig.help.com.sun.services.debug.mergeall=On : Directs all debug data to a single file (debug.out); Off : creates separate per-component debug files (property name : com.sun.services.debug.mergeall)
amconfig.com.iplanet.services.debug.directory=Debug Directory
amconfig.help.com.iplanet.services.debug.directory=Directory where debug files reside. (property name: com.iplanet.services.debug.directory)
amconfig.com.iplanet.services.comm.server.pllrequest.maxContentLength=Platform Low Level Comm. Max. Content Length
amconfig.help.com.iplanet.services.comm.server.pllrequest.maxContentLength=Maximum content-length for an HttpRequest. (property name: com.iplanet.services.comm.server.pllrequest.maxContentLength)
amconfig.com.iplanet.am.stats.interval=Logging Interval (in seconds)
amconfig.help.com.iplanet.am.stats.interval=Number of seconds to elapse between statistics logging. The interval should be at least 5 seconds to avoid CPU saturation. An interval value less than 5 seconds will be interpreted as 5 seconds. (property name: com.iplanet.am.stats.interval)
amconfig.help.com.iplanet.services.stats.state=Statistics state 'file' will write to a file under the specified directory, and 'console' will write into webserver log files. (property name: com.iplanet.services.stats.state)
amconfig.help.com.iplanet.services.stats.directory=Directory where the statistic files will be created. Use forward slashes "/" to separate directories, not backslash "\\". Spaces in the file name are allowed for Windows. (property name: com.iplanet.services.stats.directory)
amconfig.org.forgerock.services.cts.store.common.section=CTS Token Store
amconfig.org.forgerock.services.cts.store.external.section=External Store Configuration
amconfig.org.forgerock.services.resourcesets.store.common.section=Resource Sets Store
amconfig.org.forgerock.services.resourcesets.store.external.section=External Resource Sets Store Configuration
amconfig.org.forgerock.services.umaaudit.store.common.section=UMA Audit Store
amconfig.org.forgerock.services.umaaudit.store.external.section=External UMA Audit Store Configuration
amconfig.org.forgerock.services.uma.pendingrequests.store.common.section=Pending Requests Store
amconfig.org.forgerock.services.uma.pendingrequests.store.external.section=External Pending Requests Store Configuration
amconfig.org.forgerock.services.uma.labels.store.common.section=UMA Resource Set Labels Store
amconfig.org.forgerock.services.uma.labels.store.external.section=External Resource Set Labels Store Configuration
amconfig.org.forgerock.services.store.location.default=Default Token Store
amconfig.org.forgerock.services.store.location.external=External Token Store
amconfig.org.forgerock.services.store.max.connections=Max Connections
amconfig.org.forgerock.services.store.directory.name=Connection String(s)
amconfig.help.org.forgerock.services.store.directory.name=An ordered list of connection strings for LDAP directories. \
Each connection string is composed as follows: <code>HOST:PORT[|SERVERID[|SITEID]]</code>, where \
server and site IDs are optional parameters that will prioritize that connection to use from the specified nodes. Multiple \
connection strings should be comma-separated, e.g. <code>host1:389,host2:50389|server1|site1,host3:50389</code>.
amconfig.org.forgerock.services.cts.store.max.connections=Max Connections
amconfig.org.forgerock.services.cts.store.directory.name=Connection String(s)
amconfig.org.forgerock.services.resourcesets.store.location=Resource Sets - Store Mode
amconfig.org.forgerock.services.resourcesets.store.root.suffix=Resource Sets - Root Suffix
amconfig.org.forgerock.services.resourcesets.store.ssl.enabled=Resource Sets - SSL/TLS Enabled
amconfig.org.forgerock.services.resourcesets.store.loginid=Resource Sets - Login Id
amconfig.org.forgerock.services.resourcesets.store.password=Resource Sets - Password
amconfig.org.forgerock.services.resourcesets.store.max.connections=Resource Sets - Max Connections
amconfig.org.forgerock.services.resourcesets.store.heartbeat=Resource Sets - Heartbeat
amconfig.org.forgerock.services.resourcesets.store.directory.name=Resource Sets - Connection String(s)
amconfig.org.forgerock.services.umaaudit.store.location=Audit - Store Mode
amconfig.org.forgerock.services.umaaudit.store.root.suffix=Audit - Root Suffix
amconfig.org.forgerock.services.umaaudit.store.ssl.enabled=Audit - SSL/TLS Enabled
amconfig.org.forgerock.services.umaaudit.store.loginid=Audit - Login Id
amconfig.org.forgerock.services.umaaudit.store.password=Audit - Password
amconfig.org.forgerock.services.umaaudit.store.max.connections=Audit - Max Connections
amconfig.org.forgerock.services.umaaudit.store.heartbeat=Audit - Heartbeat
amconfig.org.forgerock.services.umaaudit.store.directory.name=Audit - Connection String(s)
amconfig.org.forgerock.services.uma.pendingrequests.store.location=Pending Requests - Store Mode
amconfig.org.forgerock.services.uma.pendingrequests.store.root.suffix=Pending Requests - Root Suffix
amconfig.org.forgerock.services.uma.pendingrequests.store.ssl.enabled=Pending Requests - SSL/TLS Enabled
amconfig.org.forgerock.services.uma.pendingrequests.store.loginid=Pending Requests - Login Id
amconfig.org.forgerock.services.uma.pendingrequests.store.password=Pending Requests - Password
amconfig.org.forgerock.services.uma.pendingrequests.store.max.connections=Pending Requests - Max Connections
amconfig.org.forgerock.services.uma.pendingrequests.store.heartbeat=Pending Requests - Heartbeat
amconfig.org.forgerock.services.uma.pendingrequests.store.directory.name=Pending Requests - Connection String(s)
amconfig.org.forgerock.services.uma.labels.store.location=Labels - Store Mode
amconfig.org.forgerock.services.uma.labels.store.root.suffix=Labels - Root Suffix
amconfig.org.forgerock.services.uma.labels.store.ssl.enabled=Labels - SSL/TLS Enabled
amconfig.org.forgerock.services.uma.labels.store.loginid=Labels - Login Id
amconfig.org.forgerock.services.uma.labels.store.password=Labels - Password
amconfig.org.forgerock.services.uma.labels.store.max.connections=Labels - Max Connections
amconfig.org.forgerock.services.uma.labels.store.heartbeat=Labels - Heartbeat
amconfig.org.forgerock.services.uma.labels.store.directory.name=Labels - Connection String(s)
amconfig.com.iplanet.am.clientIPCheckEnabled=Client IP Address Check
amconfig.help.com.iplanet.am.clientIPCheckEnabled=Specifies whether or not the IP address of the client is checked in all single sign on token creations or validations. (property name: com.iplanet.am.clientIPCheckEnabled)
amconfig.com.iplanet.am.cookie.name=Cookie Name
amconfig.help.com.iplanet.am.cookie.name=The cookie name used by Authentication Service to set the valid session handler ID. This name is used to retrieve the valid session information. (property name: com.iplanet.am.cookie.name)
amconfig.com.iplanet.am.cookie.secure=Secure Cookie
amconfig.help.com.iplanet.am.cookie.secure=Specifies whether to set cookie in a secure mode in which the browser will only return the cookie when a secure protocol such as HTTP(s) is used. (property name: com.iplanet.am.cookie.secure)
amconfig.com.iplanet.am.cookie.encode=Encode Cookie Value
amconfig.help.com.iplanet.am.cookie.encode=Specifies whether to URL encode the cookie value. (property name: com.iplanet.am.cookie.encode)
amconfig.com.sun.identity.saml.xmlsig.keystore=Keystore File
amconfig.help.com.sun.identity.saml.xmlsig.keystore=Specifies the location of the keystore file. (property name: com.sun.identity.saml.xmlsig.keystore)
amconfig.com.sun.identity.saml.xmlsig.storepass=Keystore Password File
amconfig.help.com.sun.identity.saml.xmlsig.storepass=Specifies the location of the file that contains the password used to access the keystore file. (property name: com.sun.identity.saml.xmlsig.storepass)
amconfig.com.sun.identity.saml.xmlsig.keypass=Private Key Password File
amconfig.help.com.sun.identity.saml.xmlsig.keypass=Specifies the location of the file that contains the password used to protect the private key of a generated key pair. (property name: com.sun.identity.saml.xmlsig.keypass)
amconfig.com.sun.identity.saml.xmlsig.certalias=Certificate Alias
amconfig.help.com.sun.identity.saml.xmlsig.certalias=(property name: com.sun.identity.saml.xmlsig.certalias)
amconfig.am.encryption.pwd=Password Encryption Key
amconfig.help.am.encryption.pwd=The encryption key value for decrypting passwords stored in the Service Management System configuration. (property name: am.encryption.pwd)
amconfig.com.iplanet.am.service.secret=Authentication Service Shared Secret
amconfig.help.com.iplanet.am.service.secret=The shared secret for application authentication module. (property name: com.iplanet.am.service.secret)
amconfig.com.iplanet.security.encryptor=Encryption class
amconfig.help.com.iplanet.security.encryptor=The default encryption class. (property name: com.iplanet.security.encryptor)
amconfig.com.iplanet.security.SecureRandomFactoryImpl=Secure Random Factory Class
amconfig.help.com.iplanet.security.SecureRandomFactoryImpl=This property is used for specifying SecureRandomFactory class. Available values for this property are com.iplanet.am.util.JSSSecureRandomFactoryImpl that is using JSS and com.iplanet.am.util.SecureRandomFactoryImpl that is using pure Java only. (property name: com.iplanet.security.SecureRandomFactoryImpl)
amconfig.com.sun.identity.client.notification.url=Notification URL
amconfig.help.com.iplanet.am.notification.url=The location of notification service end point. It is usually the product's deployment URI/notificationservice. (property name: com.sun.identity.client.notification.url)
amconfig.com.iplanet.am.directory.host=Directory Server Host Name
amconfig.help.com.iplanet.am.directory.host=The host name of the directory server
amconfig.com.iplanet.am.directory.port=Directory Server Port Number
amconfig.help.com.iplanet.am.directory.port=The port number of the directory server
amconfig.com.iplanet.am.smtphost=Mail Server Host Name
amconfig.help.com.iplanet.am.smtphost=(property name: com.iplanet.am.smtphost)
amconfig.com.iplanet.am.smtpport=Mail Server Port Number
amconfig.help.com.iplanet.am.smtpport=(property name: com.iplanet.am.smtpport)
amconfig.com.iplanet.am.session.maxSessions=Maximum Sessions
amconfig.help.com.iplanet.am.session.maxSessions=The maximum number of allowable concurrent sessions. (property name: com.iplanet.am.session.maxSessions)
amconfig.com.sun.am.session.enableHostLookUp=Enable Host Lookup
amconfig.help.com.sun.am.session.enableHostLookUp=Enables or disables host lookup during session logging. (property name: com.sun.am.session.enableHostLookUp)
amconfig.com.iplanet.am.session.invalidsessionmaxtime=Invalidate Session Max Time
amconfig.help.com.iplanet.am.session.invalidsessionmaxtime=Duration in minutes after which the invalid session will be removed from the session table if it is created and the user does not login. This value should always be greater than the timeout value in the Authentication module properties file. (property name: com.iplanet.am.session.invalidsessionmaxtime)
amconfig.com.iplanet.am.session.purgedelay=Sessions Purge Delay
amconfig.help.com.iplanet.am.session.purgedelay=The time (in minutes) to delay to purge sessions. (property name: com.iplanet.am.session.purgedelay)
amconfig.com.sun.am.session.caseInsensitiveDN=Case Insensitive client DN comparison
amconfig.help.com.sun.am.session.caseInsensitiveDN=Specifies if client distinguished name comparison is case insensitive/sensitive. (property name: com.sun.am.session.caseInsensitiveDN)
amconfig.com.iplanet.am.sdk.cache.maxSize=SDK Caching Max. Size
amconfig.help.com.iplanet.am.sdk.cache.maxSize=Specifies the size of the cache when SDK caching is enabled. The size should be an integer greater than 0, or default size (10000) will be used. Changing this value will reset (clear) the contents of the cache. (property name: com.iplanet.am.sdk.cache.maxSize)
amconfig.com.iplanet.am.replica.num.retries=SDK Replica Retries
amconfig.help.com.iplanet.am.replica.num.retries=Specifies the number of times to retry when an Entry Not Found error is returned to the SDK. (property name: com.iplanet.am.replica.num.retries)
amconfig.com.iplanet.am.replica.delay.between.retries=Delay between SDK Replica Retries
amconfig.help.com.iplanet.am.replica.delay.between.retries=Specifies the delay time in milliseconds between the retries. (property name: com.iplanet.am.replica.delay.between.retries)
amconfig.com.iplanet.am.event.connection.num.retries=Number of retries for Event Service connections
amconfig.help.com.iplanet.am.event.connection.num.retries=Specifies the number of attempts made to successfully re-establish the Event Service connections. (property name: com.iplanet.am.event.connection.num.retries)
amconfig.com.iplanet.am.event.connection.delay.between.retries=Delay between Event Service connection retries
amconfig.help.com.iplanet.am.event.connection.delay.between.retries=Specifies the delay in milliseconds between retries to re-establish the Event Service connections. (property name: com.iplanet.am.event.connection.delay.between.retries)
amconfig.com.iplanet.am.event.connection.ldap.error.codes.retries=Error codes for Event Service connection retries
amconfig.help.com.iplanet.am.event.connection.ldap.error.codes.retries=This secifies the LDAP exception error codes for which retries to re-establish Event Service connections will trigger. (property name: com.iplanet.am.event.connection.ldap.error.codes.retries)
amconfig.com.sun.am.event.connection.idle.timeout=Idle Time Out
amconfig.help.com.sun.am.event.connection.idle.timeout=Specifies the number of minutes after which the persistent searches will be restarted. (property name: com.sun.am.event.connection.idle.timeout)
amconfig.com.sun.am.event.connection.disable.list=Disabled Event Service Connection
amconfig.help.com.sun.am.event.connection.disable.list=Specifies which event connection (persistent search) to be disabled. There are three valid values - aci, sm and um (case insensitive). Multiple values should be separated with ",". (property name: com.sun.am.event.connection.disable.list)
amconfig.com.iplanet.am.notification.threadpool.size=Notification Pool Size
amconfig.help.com.iplanet.am.notification.threadpool.size=Specifies the size of the notification thread pool (total number of threads). (property name: com.iplanet.am.notification.threadpool.size)
amconfig.com.iplanet.am.notification.threadpool.threshold=Notification Thread Pool Threshold
amconfig.help.com.iplanet.am.notification.threadpool.threshold=Specifies the maximum task queue length for serving notification threads. (property name: com.iplanet.am.notification.threadpool.threshold)
amconfig.com.iplanet.am.notification.url=Notification URL
amconfig.com.iplanet.am.sdk.cache.entry.expire.enabled=Cache Entry Expiration Enabled
amconfig.help.com.iplanet.am.sdk.cache.entry.expire.enabled=If this property is set, the cache entries will expire based on the time specified in User Entry Expiration Time property. (property name: com.iplanet.am.sdk.cache.entry.expire.enabled)
amconfig.com.iplanet.am.sdk.cache.entry.user.expire.time=User Entry Expiration Time
amconfig.help.com.iplanet.am.sdk.cache.entry.user.expire.time=This property specifies time in minutes for which the user entries remain valid in cache after their last modification. After this specified period of time elapses (after the last modification/read from the directory), the data for the entry that is cached will expire. At that instant new requests for data for these user entries will result in reading from the Directory. (property name: com.iplanet.am.sdk.cache.entry.user.expire.time)
amconfig.com.iplanet.am.sdk.cache.entry.default.expire.time=Default Entry Expiration Time
amconfig.help.com.iplanet.am.sdk.cache.entry.default.expire.time=This property specifies time in minutes for which the non-user entries remain valid in cache after their last modification. After this specified period of time elapses (after the last modification/read from the directory), the data for the entry that is cached will expire. At that instant new requests for data for these non-user entries will result in reading from the Directory. (property name: com.iplanet.am.sdk.cache.entry.default.expire.time)
amconfig.com.iplanet.am.ldap.connection.num.retries=Number of retries for LDAP Connection
amconfig.help.com.iplanet.am.ldap.connection.delay.between.retries=Specifies the delay in milliseconds between retries to re-establish the LDAP connections. (property name: com.iplanet.am.ldap.connection.delay.between.retries)
amconfig.com.iplanet.am.ldap.connection.delay.between.retries=Delay between LDAP connection retries
amconfig.help.com.iplanet.am.ldap.connection.num.retries=Specifies the number of attempts made to successfully re-establish LDAP Connection. (property name: com.iplanet.am.ldap.connection.num.retries)
amconfig.com.iplanet.am.ldap.connection.ldap.error.codes.retries=Error codes for LDAP connection retries
amconfig.help.com.iplanet.am.ldap.connection.ldap.error.codes.retries=This secifies the LDAP exception error codes for which retries to re-establish LDAP connections will trigger. (property name: com.iplanet.am.ldap.connection.ldap.error.codes.retries)
amconfig.com.sun.identity.sm.ldap.enableProxy=Enable Directory Proxy
amconfig.help.com.sun.identity.sm.ldap.enableProxy=This indicates to Service Management that the Directory Proxy must be used for read, write, and/or modify operations to the Directory Server. This flag also determines if ACIs or delegation privileges are to be used. (property name: com.sun.identity.sm.ldap.enableProxy)
amconfig.com.iplanet.am.util.xml.validating=XML Validation
amconfig.help.com.iplanet.am.util.xml.validating=Specifies if validation is required when parsing XML documents. (property name: com.iplanet.am.util.xml.validating)
amconfig.com.sun.identity.sm.enableDataStoreNotification=Enable Datastore Notification
amconfig.help.com.sun.identity.sm.enableDataStoreNotification=Specifies if backend datastore notification is enabled. If this value is set to 'false', then in-memory notification is enabled. (property name: com.sun.identity.sm.enableDataStoreNotification)
amconfig.com.sun.identity.sm.notification.threadpool.size=Notification Pool Size
amconfig.help.com.sun.identity.sm.notification.threadpool.size=Specifies the size of the sm notification thread pool (total number of threads). (property name: com.sun.identity.sm.notification.threadpool.size)
amconfig.com.sun.identity.crl.cache.directory.host=LDAP server host name
amconfig.com.sun.identity.crl.cache.directory.port=LDAP server port number
amconfig.com.sun.identity.crl.cache.directory.user=LDAP server bind user name
amconfig.com.sun.identity.crl.cache.directory.password=LDAP server bind password
amconfig.com.sun.identity.crl.cache.directory.searchlocs=LDAP search base DN
amconfig.com.sun.identity.crl.cache.directory.searchattr=Search Attributes
amconfig.help.com.sun.identity.crl.cache.directory.searchattr=Any DN component of issuer's subjectDN can be used to retrieve CRL from local LDAP server. It is single value string, like, "cn". All Root CA need to use the same search attribute.
amconfig.com.sun.identity.authentication.ocspCheck=Check Enabled
amconfig.com.sun.identity.authentication.ocsp.responder.nickname=Certificate Nickname
amconfig.help.openam.deserialisation.classes.whitelist=The list of classes that are considered valid when OpenAM performs Object deserialisation operations. The defaults should work for most installations. (property name: openam.deserialisation.classes.whitelist)
exception.cannot.delete.this.server.instance=Cannot delete current server.
serverconfig.button.inherit=Inheritance Settings
tab.serverconfiguration.showmenu.general.tooltip=Click to go to General Configuration.
tab.serverconfiguration.showmenu.security.tooltip=Click to go to Security Configuration.
tab.serverconfiguration.showmenu.session.tooltip=Click to go to Session Configuration.
tab.serverconfiguration.showmenu.connection.tooltip=Click to go to Connection Configuration.
tab.serverconfiguration.showmenu.sdk.tooltip=Click to go to SDK Configuration.
tab.serverconfiguration.showmenu.cts.tooltip=Click to go to CTS Configuration.
tab.serverconfiguration.showmenu.uma.tooltip=Click to go to UMA Configuration.
serverconfiguration.showmenu.label.serverconfigxml.properties=Directory Configuration
tab.serverconfiguration.showmenu.serverconfigxml.tooltip=Click to go to Data Access Configuration
tab.serverconfiguration.showmenu.advanced.tooltip=Click to go to Advanced Configuration
breadcrumbs.editserver=Edit Server
amconfig.choice.true=true
amconfig.choice.false=false
table.inherit.property.name.column.name=Property Name
table.inherit.property.name.column.value=Default Value
page.title.server.config=Server Profile
page.title.server.inheritance=Server Property Inheritance Setting
table.server.inherit.inline.help=The Inheritance Settings allow you to select which default values can be overwritten for each server instance. Make sure that the attributes that you wish to define for the server instance are unchecked, and then click Save.
table.server.inherit.title.name=Inheritance Setting
table.server.inherit.summary=Inheritance Setting
table.server.inherit.empty.message=There are no properties.
servercfg.inheritance.updated=Server Property Inheritance Setting was updated.
page.title.server.create=New Server
table.serverconfig.advanced.property.title.name=Advanced Properties
table.serverconfig.advanced.property.summary=Advanced Properties
table.serverconfig.advanced.property.empty.message=There are no properties
table.serverconfig.advanced.properties.name.column.name=Property Name
table.serverconfig.advanced.properties.value.column.name=Property Value
amconfig.serverconfig.xml.server.header=Directory Configuration
amconfig.serverconfig.server.min.pool=Minimum Connection Pool
amconfig.serverconfig.server.max.pool=Maximum Connection Pool
amconfig.serverconfig.xml.server.table.header.noentries=There are no entries.
amconfig.serverconfig.xml.server.table.column.type=Connection Type
amconfig.serverconfig.xml.user.header=Access Manager Repository Plug-in Configuration
amconfig.serverconfig.user.min.pool=Minimum Connection Pool
amconfig.serverconfig.user.max.pool=Maximum Connection Pool
amconfig.serverconfig.user.amsdkrootsuffix=Root Suffix
amconfig.serverconfig.user.adminpwd=Admin User Password
amconfig.serverconfig.user.proxypwd=Proxy User Password
amconfig.serverconfig.xml.user.table.header.noentries=There are no entries.
amconfig.serverconfig.xml.user.table.column.port=Port Number
amconfig.serverconfig.xml.user.table.column.type=Connection Type
amconfig.serverconfig.user.bindpwd=Bind Password
exception.thread.pool.no.integer=Thread Pool size need an integer.
exception.cannot,delete.all.servers=Unable to delete all instances.
serverconfig.serverconfig.xml.attribute.label.type=Connection Type
breadcrumbs.addserver=Add Server
serverconfig.create.server.missing.atributes=Values are required for all fields.
################################################################################
#
# Current Sessions
#
################################################################################
page.title.currentSessions=Sessions
label.serverName=View
button.invalidate=Invalidate Session
table.session.userid.column.name=User Id
table.session.timeleft.column.name=Time Remaining (minutes)
table.session.maxsessiontime.column.name=Max Session Time (minutes)
table.session.idletime.column.name=Time Idle(minutes)
table.session.maxidletime.column.name=Max Idle Time (minutes)
table.sessions.title.name=Sessions
table.sessions.summary=Session
table.sessions.empty.message=There are no sessions.
page.title.sessionha=Session HA
page.title.sessionha.properties=Session HA Configuration Properties
page.title.sessionha.statistics=Session HA Statistics
table.sessionha.button.new=New...
table.sessionha.name.column.name=Session HA
table.sessionha.path.column.name=Location
table.sessionha.title.name=Session HA
table.sessionha.summary=Session HA
page.title.back.sessionha.properties=Session HA Configuration Properties
page.title.back.sessionha.statistics=Session HA Statistics
################################################################################
#
# Error Messages
#
################################################################################
sizeLimitExceeded.message=Too many entries were found to display. Narrow your search criteria.
timeLimitExceeded.message=Search stopped because time limit was exceeded. Narrow your search criteria.
cannotSetAttributeDefault=Cannot set default values for attribute(s), {0}.
################################################################################
#
# Logging
#
################################################################################
realm.subrealm.created=Created Sub Realm, {0}.
realm.subrealm.deleted=Deleted Sub Realm, {0}.
idrepo.created=Created data store, {0} under realm {1}.
idrepo.deleted=Deleted data store, {0} under realm {1}.
idrepo.modified=Modified data store, {0} under realm {1}.
entity.created=Created entity, {0} of type {1} under realm {2}.
entity.deleted=Deleted entity, {0} of type {1} under realm {2}.
entity.modified=Modified entity, {0} of type {1} under realm {2}.
entity.member.added=Made entity, {0} a member of {1}.
entity.member.removed=Removed membership of entity, {0} from {1}.
realm.service.assigned=Assigned service, {0} to realm, {1}.
realm.service.unassigned=Unassigned service, {0} from realm, {1}.
realm.service.modified=Modified service, {0} in realm, {1}.
policy.policy.created=Created policy, {0} under realm, {1}.
policy.policy.modified=Modified policy, {0} under realm, {1}.
policy.policy.deleted=Deleted policy, {0} under realm, {1}.
authenticationDomain.created=Created Authentication Domain, {0}.
authenticationDomain.deleted=Deleted Authentication Domain, {0}.
authenticationDomain.modified=Modified Authentication Domain, {0}.
entityDescriptor.created=Created Entity Descriptor, {0}.
entityDescriptor.deleted=Deleted Entity Descriptor, {0}.
entityDescriptor.modified=Modified Entity Descriptor, {0}.
affiliateProfile.modified=Modified Entity Descriptor, {0}, Affiliate Descriptor, {1}.
identityProvider.created=Created Identity Provider, {0} of role. {1}.
identityProvider.modified=Modified Identity Provider, {0} of role {1}.
identityProvider.deleted=Deleted Identity Provider, {0} of role. {1}.
servicemanagement.attribute.default.modified=Modified default values of attribute, {0} for service, {1}.
destroyedSession.message=Destroyed Session for user {0}
################################################################################
#
# Authentication Pages
#
################################################################################
page.title.realm.authentication.properties=Authentication
authentication.core.properties=General
authentication.module.instances=Instances
authentication.module.configurations=Configurations
page.title.auth.instance.create=New Module Instance
authentication.missing.instance.name=The Module Instance must have a name.
authentication.missing.instance.type=The Module Instance must have a type.
authentication.instance.create.failed=A new Module Instance could not be created.
authentication.instance.create.succeeded=A new Module Instance was created.
authentication.instance.deleted=The Module Instance was removed.
authentication.instance.deleted.multiple=The Module Instances were removed.
authentication.instance.delete.failed=An error occurred trying to remove {0} : {1}
page.title.auth.config.create=New Authentication Chain
authentication.configuration.created=A new Authentication Chain was created.
authentication.config.deleted=The Authentication Chain was deleted.
authentication.config.deleted.multiple=The Authentication Chains were deleted.
page.title.auth.config.edit={0} - Properties
authentication.config.entries.table.noentries=There are no values defined for this chain. Press the Add button to create one.
authentication.config.entry.successURL=Successful Login URL
authentication.config.entry.failureURL=Failed Login URL
authentication.config.entry.postprocess.class=Post Authentication Processing Class
authentication.config.required.label=REQUIRED
authentication.config.optional.label=OPTIONAL
authentication.config.requisite.label=REQUISITE
authentication.config.sufficient.label=SUFFICIENT
authentication.config.update.suceeded=Configuration was successfully updated.
authentication.config.missing.name=Enter a name for the Authentication Configuration entry.
authentication.module.config.reorder.label=Module Instances
page.title.auth.config.reorder=Reorder Authentication Chains
no.module.instance=The selected module instance no longer exists.
#logging messages for auth pages
auth.entry.added=Added new authentication entry to {0}.
auth.entry.removed=Removed authentication entry from {0}.
named.auth.config.changed=Authentication configuration {0} was updated in {1}.
reading.named.configs={0} is reading the named configurations in {1}.
named.config.created=Created new auth configuration {0} in {1}.
################################################################################
# Agent Configuration
################################################################################
tab.configuration.agentconfig.tooltip=Click to go to Agents Configuration
tab.configuration.agentconfig.status=Click to go to Agents Configuration
agenttype.J2EEAgent=J2EE
agenttype.SharedAgent=Agent Authenticator
agenttype.2.2_Agent=2.2 Agents
agenttype.OAuth2Client=OAuth 2.0/OpenID Connect Client
agenttype.SoapSTSAgent=SOAP STS Agent
agenttype.WebAgent.help=Web agents protect web servers such as Apache Web Server and Microsoft IIS.
agenttype.J2EEAgent.help=J2EE agents protect Java application servers such as Glassfish, IBM WebSphere Application Server and Oracle WebLogic Application Server.
agenttype.SharedAgent.help=Special type of agents with privilege to read the profiles of selected agents of other types.
agenttype.2.2_Agent.help=Agent profiles for Policy Agent version 2.2 including both Web and Java EE.
agenttype.OAuth2Client.help=OAuth 2.0 clients use access tokens issued by OpenAM to access protected resources.
agenttype.SoapSTSAgent.help=This agent corresponds to the remote SOAP STS deployment.
table.agents.title.name=Agent
table.agents.summary=Agent(s)
table.agents.empty.message=There are no entities.
table.agents.button.new=New...
table.agents.button.delete=Delete
table.agents.name.column.repo=Repository's Location
page.title.agents.create=New {0}
page.title.agents.edit=Edit {0} - {1}
agents.missing.entityName={0} Name is required.
agents.message.deleted=Agent has been deleted.
agents.message.deleted.pural=Agents have been deleted.
table.agent.groups.summary=Group(s)
table.agent.groups.empty.message=There are no entities.
agent.groups.message.deleted=Agent Group has been deleted.
agent.groups.message.deleted.pural=Agent Groups have been deleted.
agentconfig.button.inherit=Inheritance Settings
agentconfig.button.dump=Export Configuration
agentconfig.button.export.policy=Export Policy
page.title.agent.config=Agent Profile
page.title.agent.inheritance=Agent Property Inheritance Setting
page.title.agent.dump=Agent Configuration Export: {0}
page.title.agent.policy.export=Agent Policy: {0}
agent.attribute.password=Password
agent.attribute.password.confirm=Re-Enter Password
agent.attribute.server.url.name=Server URL
agent.attribute.server.url.help=protocol://host:port/deploymentUri e.g. http://opensso.sample.com:58080/opensso
agent.attribute.agent.url.name=Agent URL
agent.attribute.J2EEagent.url.help=protocol://host:port/deploymentUri e.g. http://agent1.sample.com:1234/agentapp
agents.passwords.not.match=The passwords you entered do not match.
agents.password.blank=Password is required.
agent.attribute.label.meta.question=Configuration
agent.attribute.help.choice=Where agent properties are stored. Local is the server on which the agent is running. Centralized is the OpenAM Server
agent.attribute.option.centr=Centralized
agenttype.select.type=Select one of the following agent types
page.title.create.agent=New Agent
page.title.create.agent.group=New Agent Group
agentcfg.inheritance.updated=Agent Property Inheritance Setting was updated.
table.agent.inherit.inline.help=The Inheritance Settings allow you to select which default values can be overwritten for each agent. Make sure that the attributes that you wish to define for the agent are unchecked, and then click Save.
table.agent.inherit.title.name=Inheritance Setting
table.agent.inherit.summary=Inheritance Setting
table.agent.inherit.empty.message=There are no properties.
tab.label.J2EEAgent.global=Global
tab.label.J2EEAgent.application=Application
tab.label.J2EEAgent.fam=OpenAM Services
tab.label.J2EEAgent.misc=Miscellaneous
tab.label.J2EEAgent.advanced=Advanced
section.label.J2EEAgent.global.usermapping=User Mapping
section.label.J2EEAgent.global.fqdn=Fully Qualified Domain Name Checking
section.label.J2EEAgent.application.loginprocessing=Login Processing
section.label.J2EEAgent.application.logoutprocessing=Logout Processing
section.label.J2EEAgent.application.accessdenyuriprocessing=Access Denied URI Processing
section.label.J2EEAgent.application.uriprocessing=Not Enforced URI Processing
section.label.J2EEAgent.application.ipprocessing=Not Enforced IP Processing
section.label.J2EEAgent.application.profileattrprocessing=Profile Attributes Processing
section.label.J2EEAgent.application.responseattrprocessing=Response Attributes Processing
section.label.J2EEAgent.application.commonattrfetchprocessing=Common Attributes Fetching Processing
section.label.J2EEAgent.application.sessionattrprocessing=Session Attributes Processing
section.label.J2EEAgent.application.privilegeattrprocessing=Privilege Attributes Processing
section.label.J2EEAgent.application.authprocessing=Custom Authentication Processing
section.label.J2EEAgent.sso.cookiename=Cookie Name
section.label.J2EEAgent.sso.cdsso=Cross Domain SSO
section.label.J2EEAgent.sso.cookiereset=Cookie Reset
section.label.J2EEAgent.fam.loginurl=Login URL
section.label.J2EEAgent.fam.logouturl=Logout URL
section.label.J2EEAgent.fam.authservices=Authentication Service
section.label.J2EEAgent.fam.policyclientservices=Policy Client Service
section.label.J2EEAgent.fam.cacheservices=User Data Cache Service
section.label.J2EEAgent.fam.clientservices=Session Client Service
section.label.J2EEAgent.misc.portcheckprocessing=Port Check Processing
section.label.J2EEAgent.misc.bypassprincipallist=Bypass Principal List
section.label.J2EEAgent.misc.agentencryptor=Agent Password Encryptor
section.label.J2EEAgent.misc.ignorepathinfo=Ignore Path Info
section.label.J2EEAgent.misc.deprecated=Deprecated Agent Properties
section.label.J2EEAgent.advanced.clientid=Client Identification
section.label.J2EEAgent.advanced.webserviceprocessing=Web Service Processing
section.label.J2EEAgent.advanced.agenturl=Alternate Agent URL
section.label.J2EEAgent.advanced.jboss=JBoss Application Server
section.label.J2EEAgent.advanced.xss=Cross Site Scripting Detection
section.label.J2EEAgent.advanced.pdp=Post Data Preservation
section.label.J2EEAgent.advanced.freeform=Custom Properties
tab.label.WebAgent.global=Global
tab.label.WebAgent.application=Application
tab.label.WebAgent.fam=OpenAM Services
tab.label.WebAgent.misc=Miscellaneous
tab.label.WebAgent.advanced=Advanced
section.label.WebAgent.global.fqdn=Fully Qualified Domain Name Checking
section.label.WebAgent.application.urlprocessing=Not Enforced URL Processing
section.label.WebAgent.application.ipprocessing=Not Enforced IP Processing
section.label.WebAgent.application.profileattrprocessing=Profile Attributes Processing
section.label.WebAgent.application.responseattrprocessing=Response Attributes Processing
section.label.WebAgent.application.sessionattrprocessing=Session Attributes Processing
section.label.WebAgent.application.commonattrfetchprocessing=Common Attributes Fetching Processing
section.label.WebAgent.sso.cdsso=Cross Domain SSO
section.label.WebAgent.sso.cookiereset=Cookie Reset
section.label.WebAgent.fam.loginurl=Login URL
section.label.WebAgent.fam.logouturl=Logout URL
section.label.WebAgent.fam.agentlogouturl=Agent Logout URL
section.label.WebAgent.fam.policyclientservices=Policy Client Service
section.label.WebAgent.misc.anonymous=Anonymous user
section.label.WebAgent.misc.cookieprocessing=Cookie Processing
section.label.WebAgent.misc.urlhandling=URL Handling
section.label.WebAgent.misc.ignorenamingurl=Ignore Naming URL
section.label.WebAgent.misc.ignoreservercheck=Ignore Server Check
section.label.WebAgent.misc.ignorepathinfo=Ignore Path Info
section.label.WebAgent.misc.denyonlogfailure=Deny On Log Failure
section.label.WebAgent.misc.multibyteenable=Multi-byte Enable
section.label.WebAgent.misc.redirectparam=Goto Parameter Name
section.label.WebAgent.misc.deprecated=Deprecated Agent Properties
section.label.WebAgent.advanced.clientid=Client Identification
section.label.WebAgent.advanced.loadbalancer=Load Balancer
section.label.WebAgent.advanced.postdatapreserve=Post Data Preservation
section.label.WebAgent.advanced.proxy=Sun Java System Proxy Server
section.label.WebAgent.advanced.iis=Microsoft IIS Server
section.label.WebAgent.advanced.domino=IBM Lotus Domino Server
section.label.WebAgent.advanced.freeform=Custom Properties
label.agentgroup=Group
agentgroup.none=[None]
edit.agentconfig.title=Edit {0}
edit.agentconfig.group.members.title=Members of {0}
agentconfig.group.members.nomembers=There are no members.
agentconfig.btn.back=Back to Main Page
tab.general=General
tab.group=Group
agent.group.does.not.exist=Group, {0} does not exist.
################################################################################
#
# Password Reset - User Profile View
#
################################################################################
page.title.UMUserPasswordResetOptions=Password Reset Options
profile.updated=The properties were saved successfully.
table.UMUserPasswordResetOptions.empty.message=There are no questions.
label.question=Questions
user.password.reset.force.reset.next.login=Force Change Password on Next Login
user.password.reset.missing.personal.question.answer.message=Personal question and answer are required.
user.password.reset.missing.answer.message=Answer is required.
password.existing.label=Existing Password
password.existing.message=Type in your existing password.
password.existing.value.label=Existing Password
password.new.label=New Password
password.new.message=Type in the new password, then re-enter it.
password.new.value.label=New Password
password.new.value.confirm.label=Re-Enter Password
password.error.no.existing.password=No changes were made. You must enter your existing password.
password.error.invalid.existing.password=No changes were made. The value entered for your existing password does not match the current value.
password.error.value.mismatch=No changes were made. The passwords you entered do not match.
password.error.new.password.missing=No changes made. You must enter a value for the new password.
################################################################################
#
# User Search
#
################################################################################
page.title.search.users=Step 1 of 2: Search for Users
logicalAND.label=All
logicalOR.label=Any
search.return.field.label=Return Users By
search.user.logical.operator.label=of the following conditions:
table.search.results.title.name=Search Results
search.results.pages=Step 2 of 2: Search Results
page.title.search.groups=Step 1 of 2: Search for Groups
search.scope.label=Scope of Search
search.scope.current=Current Organization
search.scope.sub=Current and Sub-Organizations
search.group.help.label=Enter search criteria to locate groups.
################################################################################
#
# Time zone display names. When changing/updating display names for timezone,
# please contact console team for a script to generate display name since
# display name listed in this property file must be unique.
# If the display name is same, then we append key to the display name.
# e.g: EST=Eastern Standard Time (EST)
# EST5EDT=Eastern Standard Time (EST5EDT)
#
################################################################################
ACT=Central Standard Time (Northern Territory) (ACT)
AET=Eastern Standard Time (New South Wales) (AET)
AGT=Argentine Time (AGT)
ART=Eastern European Time (ART)
AST=Alaska Standard Time (AST)
Africa/Abidjan=Greenwich Mean Time (Africa/Abidjan)
Africa/Accra=Greenwich Mean Time (Africa/Accra)
Africa/Addis_Ababa=Eastern African Time (Africa/Addis_Ababa)
Africa/Algiers=Central European Time (Africa/Algiers)
Africa/Asmera=Eastern African Time (Africa/Asmera)
Africa/Bamako=Greenwich Mean Time (Africa/Bamako)
Africa/Bangui=Western African Time (Africa/Bangui)
Africa/Banjul=Greenwich Mean Time (Africa/Banjul)
Africa/Bissau=Greenwich Mean Time (Africa/Bissau)
Africa/Blantyre=Central African Time (Africa/Blantyre)
Africa/Brazzaville=Western African Time (Africa/Brazzaville)
Africa/Bujumbura=Central African Time (Africa/Bujumbura)
Africa/Cairo=Eastern European Time (Africa/Cairo)
Africa/Casablanca=Western European Time (Africa/Casablanca)
Africa/Ceuta=Central European Time (Africa/Ceuta)
Africa/Conakry=Greenwich Mean Time (Africa/Conakry)
Africa/Dakar=Greenwich Mean Time (Africa/Dakar)
Africa/Dar_es_Salaam=Eastern African Time (Africa/Dar_es_Salaam)
Africa/Djibouti=Eastern African Time (Africa/Djibouti)
Africa/Douala=Western African Time (Africa/Douala)
Africa/El_Aaiun=Western European Time (Africa/El_Aaiun)
Africa/Freetown=Greenwich Mean Time (Africa/Freetown)
Africa/Gaborone=Central African Time (Africa/Gaborone)
Africa/Harare=Central African Time (Africa/Harare)
Africa/Johannesburg=South Africa Standard Time (Africa/Johannesburg)
Africa/Kampala=Eastern African Time (Africa/Kampala)
Africa/Khartoum=Eastern African Time (Africa/Khartoum)
Africa/Kigali=Central African Time (Africa/Kigali)
Africa/Kinshasa=Western African Time (Africa/Kinshasa)
Africa/Lagos=Western African Time (Africa/Lagos)
Africa/Libreville=Western African Time (Africa/Libreville)
Africa/Lome=Greenwich Mean Time (Africa/Lome)
Africa/Luanda=Western African Time (Africa/Luanda)
Africa/Lubumbashi=Central African Time (Africa/Lubumbashi)
Africa/Lusaka=Central African Time (Africa/Lusaka)
Africa/Malabo=Western African Time (Africa/Malabo)
Africa/Maputo=Central African Time (Africa/Maputo)
Africa/Maseru=South Africa Standard Time (Africa/Maseru)
Africa/Mbabane=South Africa Standard Time (Africa/Mbabane)
Africa/Mogadishu=Eastern African Time (Africa/Mogadishu)
Africa/Monrovia=Greenwich Mean Time (Africa/Monrovia)
Africa/Nairobi=Eastern African Time (Africa/Nairobi)
Africa/Ndjamena=Western African Time (Africa/Ndjamena)
Africa/Niamey=Western African Time (Africa/Niamey)
Africa/Nouakchott=Greenwich Mean Time (Africa/Nouakchott)
Africa/Ouagadougou=Greenwich Mean Time (Africa/Ouagadougou)
Africa/Porto-Novo=Western African Time (Africa/Porto-Novo)
Africa/Sao_Tome=Greenwich Mean Time (Africa/Sao_Tome)
Africa/Timbuktu=Greenwich Mean Time (Africa/Timbuktu)
Africa/Tripoli=Eastern European Time (Africa/Tripoli)
Africa/Tunis=Central European Time (Africa/Tunis)
Africa/Windhoek=Western African Time (Africa/Windhoek)
America/Adak=Hawaii-Aleutian Standard Time (America/Adak)
America/Anchorage=Alaska Standard Time (America/Anchorage)
America/Anguilla=Atlantic Standard Time (America/Anguilla)
America/Antigua=Atlantic Standard Time (America/Antigua)
America/Araguaina=Brazil Time (America/Araguaina)
America/Aruba=Atlantic Standard Time (America/Aruba)
America/Asuncion=Paraguay Time
America/Atka=Hawaii-Aleutian Standard Time (America/Atka)
America/Barbados=Atlantic Standard Time (America/Barbados)
America/Belem=Brazil Time (America/Belem)
America/Belize=Central Standard Time (America/Belize)
America/Boa_Vista=Amazon Standard Time (America/Boa_Vista)
America/Bogota=Colombia Time
America/Boise=Mountain Standard Time (America/Boise)
America/Buenos_Aires=Argentine Time (America/Buenos_Aires)
America/Cambridge_Bay=Mountain Standard Time (America/Cambridge_Bay)
America/Cancun=Central Standard Time (America/Cancun)
America/Caracas=Venezuela Time
America/Catamarca=Argentine Time (America/Catamarca)
America/Cayenne=French Guiana Time
America/Cayman=Eastern Standard Time (America/Cayman)
America/Chicago=Central Standard Time (America/Chicago)
America/Chihuahua=Mountain Standard Time (America/Chihuahua)
America/Cordoba=Argentine Time (America/Cordoba)
America/Costa_Rica=Central Standard Time (America/Costa_Rica)
America/Cuiaba=Amazon Standard Time (America/Cuiaba)
America/Curacao=Atlantic Standard Time (America/Curacao)
America/Danmarkshavn=Greenwich Mean Time (America/Danmarkshavn)
America/Dawson=Pacific Standard Time (America/Dawson)
America/Dawson_Creek=Mountain Standard Time (America/Dawson_Creek)
America/Denver=Mountain Standard Time (America/Denver)
America/Detroit=Eastern Standard Time (America/Detroit)
America/Dominica=Atlantic Standard Time (America/Dominica)
America/Edmonton=Mountain Standard Time (America/Edmonton)
America/Eirunepe=Acre Time (America/Eirunepe)
America/El_Salvador=Central Standard Time (America/El_Salvador)
America/Ensenada=Pacific Standard Time (America/Ensenada)
America/Fort_Wayne=Eastern Standard Time (America/Fort_Wayne)
America/Fortaleza=Brazil Time (America/Fortaleza)
America/Glace_Bay=Atlantic Standard Time (America/Glace_Bay)
America/Godthab=Western Greenland Time
America/Goose_Bay=Atlantic Standard Time (America/Goose_Bay)
America/Grand_Turk=Eastern Standard Time (America/Grand_Turk)
America/Grenada=Atlantic Standard Time (America/Grenada)
America/Guadeloupe=Atlantic Standard Time (America/Guadeloupe)
America/Guatemala=Central Standard Time (America/Guatemala)
America/Guayaquil=Ecuador Time
America/Guyana=Guyana Time
America/Halifax=Atlantic Standard Time (America/Halifax)
America/Havana=Central Standard Time (America/Havana)
America/Hermosillo=Mountain Standard Time (America/Hermosillo)
America/Indiana/Indianapolis=Eastern Standard Time (America/Indiana/Indianapolis)
America/Indiana/Knox=Eastern Standard Time (America/Indiana/Knox)
America/Indiana/Marengo=Eastern Standard Time (America/Indiana/Marengo)
America/Indiana/Vevay=Eastern Standard Time (America/Indiana/Vevay)
America/Indianapolis=Eastern Standard Time (America/Indianapolis)
America/Inuvik=Mountain Standard Time (America/Inuvik)
America/Iqaluit=Eastern Standard Time (America/Iqaluit)
America/Jamaica=Eastern Standard Time (America/Jamaica)
America/Jujuy=Argentine Time (America/Jujuy)
America/Juneau=Alaska Standard Time (America/Juneau)
America/Kentucky/Louisville=Eastern Standard Time (America/Kentucky/Louisville)
America/Kentucky/Monticello=Eastern Standard Time (America/Kentucky/Monticello)
America/Knox_IN=Eastern Standard Time (America/Knox_IN)
America/La_Paz=Bolivia Time
America/Lima=Peru Time
America/Los_Angeles=Pacific Standard Time (America/Los_Angeles)
America/Louisville=Eastern Standard Time (America/Louisville)
America/Maceio=Brazil Time (America/Maceio)
America/Managua=Central Standard Time (America/Managua)
America/Manaus=Amazon Standard Time (America/Manaus)
America/Martinique=Atlantic Standard Time (America/Martinique)
America/Mazatlan=Mountain Standard Time (America/Mazatlan)
America/Mendoza=Argentine Time (America/Mendoza)
America/Menominee=Central Standard Time (America/Menominee)
America/Merida=Central Standard Time (America/Merida)
America/Mexico_City=Central Standard Time (America/Mexico_City)
America/Miquelon=Pierre & Miquelon Standard Time
America/Monterrey=Central Standard Time (America/Monterrey)
America/Montevideo=Uruguay Time
America/Montreal=Eastern Standard Time (America/Montreal)
America/Montserrat=Atlantic Standard Time (America/Montserrat)
America/Nassau=Eastern Standard Time (America/Nassau)
America/New_York=Eastern Standard Time (America/New_York)
America/Nipigon=Eastern Standard Time (America/Nipigon)
America/Nome=Alaska Standard Time (America/Nome)
America/Noronha=Fernando de Noronha Time (America/Noronha)
America/North_Dakota/Center=Central Standard Time (America/North_Dakota/Center)
America/Panama=Eastern Standard Time (America/Panama)
America/Pangnirtung=Eastern Standard Time (America/Pangnirtung)
America/Paramaribo=Suriname Time
America/Phoenix=Mountain Standard Time (America/Phoenix)
America/Port-au-Prince=Eastern Standard Time (America/Port-au-Prince)
America/Port_of_Spain=Atlantic Standard Time (America/Port_of_Spain)
America/Porto_Acre=Acre Time (America/Porto_Acre)
America/Porto_Velho=Amazon Standard Time (America/Porto_Velho)
America/Puerto_Rico=Atlantic Standard Time (America/Puerto_Rico)
America/Rainy_River=Central Standard Time (America/Rainy_River)
America/Rankin_Inlet=Eastern Standard Time (America/Rankin_Inlet)
America/Recife=Brazil Time (America/Recife)
America/Regina=Central Standard Time (America/Regina)
America/Rio_Branco=Acre Time (America/Rio_Branco)
America/Rosario=Argentine Time (America/Rosario)
America/Santiago=Chile Time (America/Santiago)
America/Santo_Domingo=Atlantic Standard Time (America/Santo_Domingo)
America/Sao_Paulo=Brazil Time (America/Sao_Paulo)
America/Scoresbysund=Eastern Greenland Time (America/Scoresbysund)
America/Shiprock=Mountain Standard Time (America/Shiprock)
America/St_Johns=Newfoundland Standard Time (America/St_Johns)
America/St_Kitts=Atlantic Standard Time (America/St_Kitts)
America/St_Lucia=Atlantic Standard Time (America/St_Lucia)
America/St_Thomas=Atlantic Standard Time (America/St_Thomas)
America/St_Vincent=Atlantic Standard Time (America/St_Vincent)
America/Swift_Current=Central Standard Time (America/Swift_Current)
America/Tegucigalpa=Central Standard Time (America/Tegucigalpa)
America/Thule=Atlantic Standard Time (America/Thule)
America/Thunder_Bay=Eastern Standard Time (America/Thunder_Bay)
America/Tijuana=Pacific Standard Time (America/Tijuana)
America/Tortola=Atlantic Standard Time (America/Tortola)
America/Vancouver=Pacific Standard Time (America/Vancouver)
America/Virgin=Atlantic Standard Time (America/Virgin)
America/Whitehorse=Pacific Standard Time (America/Whitehorse)
America/Winnipeg=Central Standard Time (America/Winnipeg)
America/Yakutat=Alaska Standard Time (America/Yakutat)
America/Yellowknife=Mountain Standard Time (America/Yellowknife)
Antarctica/Casey=Western Standard Time (Australia) (Antarctica/Casey)
Antarctica/Davis=Davis Time
Antarctica/DumontDUrville=Dumont-d'Urville Time
Antarctica/Mawson=Mawson Time
Antarctica/McMurdo=New Zealand Standard Time (Antarctica/McMurdo)
Antarctica/Palmer=Chile Time (Antarctica/Palmer)
Antarctica/Rothera=Rothera Time
Antarctica/South_Pole=New Zealand Standard Time (Antarctica/South_Pole)
Antarctica/Syowa=Syowa Time
Antarctica/Vostok=Vostok time
Arctic/Longyearbyen=Central European Time (Arctic/Longyearbyen)
Asia/Almaty=Alma-Ata Time
Asia/Amman=Eastern European Time (Asia/Amman)
Asia/Anadyr=Anadyr Time
Asia/Aqtau=Aqtau Time
Asia/Aqtobe=Aqtobe Time
Asia/Ashgabat=Turkmenistan Time (Asia/Ashgabat)
Asia/Ashkhabad=Turkmenistan Time (Asia/Ashkhabad)
Asia/Baghdad=Arabia Standard Time (Asia/Baghdad)
Asia/Bahrain=Arabia Standard Time (Asia/Bahrain)
Asia/Baku=Azerbaijan Time
Asia/Bangkok=Indochina Time (Asia/Bangkok)
Asia/Beirut=Eastern European Time (Asia/Beirut)
Asia/Bishkek=Kirgizstan Time
Asia/Brunei=Brunei Time
Asia/Calcutta=India Standard Time (Asia/Calcutta)
Asia/Choibalsan=Choibalsan Time
Asia/Chongqing=China Standard Time (Asia/Chongqing)
Asia/Chungking=China Standard Time (Asia/Chungking)
Asia/Colombo=Sri Lanka Time
Asia/Dacca=Bangladesh Time (Asia/Dacca)
Asia/Damascus=Eastern European Time (Asia/Damascus)
Asia/Dhaka=Bangladesh Time (Asia/Dhaka)
Asia/Dili=East Timor Time
Asia/Dubai=Gulf Standard Time (Asia/Dubai)
Asia/Dushanbe=Tajikistan Time
Asia/Harbin=China Standard Time (Asia/Harbin)
Asia/Hong_Kong=Hong Kong Time (Asia/Hong_Kong)
Asia/Hovd=Hovd Time
Asia/Irkutsk=Irkutsk Time
Asia/Istanbul=Eastern European Time (Asia/Istanbul)
Asia/Jakarta=West Indonesia Time (Asia/Jakarta)
Asia/Jayapura=East Indonesia Time
Asia/Jerusalem=Israel Standard Time (Asia/Jerusalem)
Asia/Kabul=Afghanistan Time
Asia/Kamchatka=Petropavlovsk-Kamchatski Time
Asia/Karachi=Pakistan Time (Asia/Karachi)
Asia/Kashgar=China Standard Time (Asia/Kashgar)
Asia/Katmandu=Nepal Time
Asia/Krasnoyarsk=Krasnoyarsk Time
Asia/Kuala_Lumpur=Malaysia Time (Asia/Kuala_Lumpur)
Asia/Kuching=Malaysia Time (Asia/Kuching)
Asia/Kuwait=Arabia Standard Time (Asia/Kuwait)
Asia/Macao=China Standard Time (Asia/Macao)
Asia/Macau=China Standard Time (Asia/Macau)
Asia/Magadan=Magadan Time
Asia/Makassar=Central Indonesia Time (Asia/Makassar)
Asia/Manila=Philippines Time
Asia/Muscat=Gulf Standard Time (Asia/Muscat)
Asia/Nicosia=Eastern European Time (Asia/Nicosia)
Asia/Novosibirsk=Novosibirsk Time
Asia/Omsk=Omsk Time
Asia/Oral=Oral Time
Asia/Phnom_Penh=Indochina Time (Asia/Phnom_Penh)
Asia/Pontianak=West Indonesia Time (Asia/Pontianak)
Asia/Pyongyang=Korea Standard Time (Asia/Pyongyang)
Asia/Qatar=Arabia Standard Time (Asia/Qatar)
Asia/Qyzylorda=Qyzylorda Time
Asia/Rangoon=Myanmar Time
Asia/Riyadh87=GMT+03:07 (Asia/Riyadh87)
Asia/Riyadh88=GMT+03:07 (Asia/Riyadh88)
Asia/Riyadh89=GMT+03:07 (Asia/Riyadh89)
Asia/Riyadh=Arabia Standard Time (Asia/Riyadh)
Asia/Saigon=Indochina Time (Asia/Saigon)
Asia/Sakhalin=Sakhalin Time
Asia/Samarkand=Turkmenistan Time (Asia/Samarkand)
Asia/Seoul=Korea Standard Time (Asia/Seoul)
Asia/Shanghai=China Standard Time (Asia/Shanghai)
Asia/Singapore=Singapore Time (Asia/Singapore)
Asia/Taipei=China Standard Time (Asia/Taipei)
Asia/Tashkent=Uzbekistan Time
Asia/Tbilisi=Georgia Time
Asia/Tehran=Iran Time (Asia/Tehran)
Asia/Tel_Aviv=Israel Standard Time (Asia/Tel_Aviv)
Asia/Thimbu=Bhutan Time (Asia/Thimbu)
Asia/Thimphu=Bhutan Time (Asia/Thimphu)
Asia/Tokyo=Japan Standard Time (Asia/Tokyo)
Asia/Ujung_Pandang=Central Indonesia Time (Asia/Ujung_Pandang)
Asia/Ulaanbaatar=Ulaanbaatar Time (Asia/Ulaanbaatar)
Asia/Ulan_Bator=Ulaanbaatar Time (Asia/Ulan_Bator)
Asia/Urumqi=China Standard Time (Asia/Urumqi)
Asia/Vientiane=Indochina Time (Asia/Vientiane)
Asia/Vladivostok=Vladivostok Time
Asia/Yakutsk=Yakutsk Time
Asia/Yekaterinburg=Yekaterinburg Time
Asia/Yerevan=Armenia Time (Asia/Yerevan)
Atlantic/Azores=Azores Time
Atlantic/Bermuda=Atlantic Standard Time (Atlantic/Bermuda)
Atlantic/Canary=Western European Time (Atlantic/Canary)
Atlantic/Cape_Verde=Cape Verde Time
Atlantic/Faeroe=Western European Time (Atlantic/Faeroe)
Atlantic/Jan_Mayen=Eastern Greenland Time (Atlantic/Jan_Mayen)
Atlantic/Madeira=Western European Time (Atlantic/Madeira)
Atlantic/Reykjavik=Greenwich Mean Time (Atlantic/Reykjavik)
Atlantic/South_Georgia=South Georgia Standard Time
Atlantic/St_Helena=Greenwich Mean Time (Atlantic/St_Helena)
Atlantic/Stanley=Falkland Is. Time
Australia/ACT=Eastern Standard Time (New South Wales) (Australia/ACT)
Australia/Adelaide=Central Standard Time (South Australia) (Australia/Adelaide)
Australia/Brisbane=Eastern Standard Time (Queensland) (Australia/Brisbane)
Australia/Broken_Hill=Central Standard Time (South Australia/New South Wales) (Australia/Broken_Hill)
Australia/Canberra=Eastern Standard Time (New South Wales) (Australia/Canberra)
Australia/Darwin=Central Standard Time (Northern Territory) (Australia/Darwin)
Australia/Hobart=Eastern Standard Time (Tasmania) (Australia/Hobart)
Australia/LHI=Load Howe Standard Time (Australia/LHI)
Australia/Lindeman=Eastern Standard Time (Queensland) (Australia/Lindeman)
Australia/Lord_Howe=Load Howe Standard Time (Australia/Lord_Howe)
Australia/Melbourne=Eastern Standard Time (Victoria) (Australia/Melbourne)
Australia/NSW=Eastern Standard Time (New South Wales) (Australia/NSW)
Australia/North=Central Standard Time (Northern Territory) (Australia/North)
Australia/Perth=Western Standard Time (Australia) (Australia/Perth)
Australia/Queensland=Eastern Standard Time (Queensland) (Australia/Queensland)
Australia/South=Central Standard Time (South Australia) (Australia/South)
Australia/Sydney=Eastern Standard Time (New South Wales) (Australia/Sydney)
Australia/Tasmania=Eastern Standard Time (Tasmania) (Australia/Tasmania)
Australia/Victoria=Eastern Standard Time (Victoria) (Australia/Victoria)
Australia/West=Western Standard Time (Australia) (Australia/West)
BET=Brazil Time (BET)
BST=Bangladesh Time (BST)
Brazil/Acre=Acre Time (Brazil/Acre)
Brazil/DeNoronha=Fernando de Noronha Time (Brazil/DeNoronha)
Brazil/East=Brazil Time (Brazil/East)
Brazil/West=Amazon Standard Time (Brazil/West)
CAT=Central African Time (CAT)
CET=Central European Time (CET)
CNT=Newfoundland Standard Time (CNT)
CST6CDT=Central Standard Time (CST6CDT)
CST=Central Standard Time (CST)
CTT=China Standard Time (CTT)
Canada/Atlantic=Atlantic Standard Time (Canada/Atlantic)
Canada/Central=Central Standard Time (Canada/Central)
Canada/East-Saskatchewan=Central Standard Time (Canada/East-Saskatchewan)
Canada/Eastern=Eastern Standard Time (Canada/Eastern)
Canada/Mountain=Mountain Standard Time (Canada/Mountain)
Canada/Newfoundland=Newfoundland Standard Time (Canada/Newfoundland)
Canada/Pacific=Pacific Standard Time (Canada/Pacific)
Canada/Saskatchewan=Central Standard Time (Canada/Saskatchewan)
Canada/Yukon=Pacific Standard Time (Canada/Yukon)
Chile/Continental=Chile Time (Chile/Continental)
Chile/EasterIsland=Easter Is. Time (Chile/EasterIsland)
Cuba=Central Standard Time (Cuba)
EAT=Eastern African Time (EAT)
ECT=Central European Time (ECT)
EET=Eastern European Time (EET)
EST5EDT=Eastern Standard Time (EST5EDT)
EST=Eastern Standard Time (EST)
Egypt=Eastern European Time (Egypt)
Eire=Greenwich Mean Time (Eire)
Etc/GMT+10=GMT-10:00
Etc/GMT+11=GMT-11:00
Etc/GMT+12=GMT-12:00
Etc/GMT+1=GMT-01:00
Etc/GMT+2=GMT-02:00
Etc/GMT+3=GMT-03:00
Etc/GMT+4=GMT-04:00
Etc/GMT+5=GMT-05:00
Etc/GMT+6=GMT-06:00
Etc/GMT+7=GMT-07:00
Etc/GMT+8=GMT-08:00
Etc/GMT+9=GMT-09:00
Etc/GMT-10=GMT+10:00
Etc/GMT-11=GMT+11:00
Etc/GMT-12=GMT+12:00
Etc/GMT-13=GMT+13:00
Etc/GMT-14=GMT+14:00
Etc/GMT-1=GMT+01:00
Etc/GMT-2=GMT+02:00
Etc/GMT-3=GMT+03:00
Etc/GMT-4=GMT+04:00
Etc/GMT-5=GMT+05:00
Etc/GMT-6=GMT+06:00
Etc/GMT-7=GMT+07:00
Etc/GMT-8=GMT+08:00
Etc/GMT-9=GMT+09:00
Etc/Greenwich=Greenwich Mean Time (Etc/Greenwich)
Etc/Universal=Coordinated Universal Time (Etc/Universal)
Europe/Amsterdam=Central European Time (Europe/Amsterdam)
Europe/Andorra=Central European Time (Europe/Andorra)
Europe/Athens=Eastern European Time (Europe/Athens)
Europe/Belfast=Greenwich Mean Time (Europe/Belfast)
Europe/Belgrade=Central European Time (Europe/Belgrade)
Europe/Berlin=Central European Time (Europe/Berlin)
Europe/Bratislava=Central European Time (Europe/Bratislava)
Europe/Brussels=Central European Time (Europe/Brussels)
Europe/Bucharest=Eastern European Time (Europe/Bucharest)
Europe/Budapest=Central European Time (Europe/Budapest)
Europe/Chisinau=Eastern European Time (Europe/Chisinau)
Europe/Copenhagen=Central European Time (Europe/Copenhagen)
Europe/Dublin=Greenwich Mean Time (Europe/Dublin)
Europe/Gibraltar=Central European Time (Europe/Gibraltar)
Europe/Helsinki=Eastern European Time (Europe/Helsinki)
Europe/Istanbul=Eastern European Time (Europe/Istanbul)
Europe/Kaliningrad=Eastern European Time (Europe/Kaliningrad)
Europe/Kiev=Eastern European Time (Europe/Kiev)
Europe/Lisbon=Western European Time (Europe/Lisbon)
Europe/Ljubljana=Central European Time (Europe/Ljubljana)
Europe/London=Greenwich Mean Time (Europe/London)
Europe/Luxembourg=Central European Time (Europe/Luxembourg)
Europe/Madrid=Central European Time (Europe/Madrid)
Europe/Malta=Central European Time (Europe/Malta)
Europe/Minsk=Eastern European Time (Europe/Minsk)
Europe/Monaco=Central European Time (Europe/Monaco)
Europe/Moscow=Moscow Standard Time (Europe/Moscow)
Europe/Nicosia=Eastern European Time (Europe/Nicosia)
Europe/Oslo=Central European Time (Europe/Oslo)
Europe/Paris=Central European Time (Europe/Paris)
Europe/Prague=Central European Time (Europe/Prague)
Europe/Riga=Eastern European Time (Europe/Riga)
Europe/Rome=Central European Time (Europe/Rome)
Europe/Samara=Samara Time
Europe/San_Marino=Central European Time (Europe/San_Marino)
Europe/Sarajevo=Central European Time (Europe/Sarajevo)
Europe/Simferopol=Eastern European Time (Europe/Simferopol)
Europe/Skopje=Central European Time (Europe/Skopje)
Europe/Sofia=Eastern European Time (Europe/Sofia)
Europe/Stockholm=Central European Time (Europe/Stockholm)
Europe/Tallinn=Eastern European Time (Europe/Tallinn)
Europe/Tirane=Central European Time (Europe/Tirane)
Europe/Tiraspol=Eastern European Time (Europe/Tiraspol)
Europe/Uzhgorod=Eastern European Time (Europe/Uzhgorod)
Europe/Vaduz=Central European Time (Europe/Vaduz)
Europe/Vatican=Central European Time (Europe/Vatican)
Europe/Vienna=Central European Time (Europe/Vienna)
Europe/Vilnius=Eastern European Time (Europe/Vilnius)
Europe/Warsaw=Central European Time (Europe/Warsaw)
Europe/Zagreb=Central European Time (Europe/Zagreb)
Europe/Zaporozhye=Eastern European Time (Europe/Zaporozhye)
Europe/Zurich=Central European Time (Europe/Zurich)
GB-Eire=Greenwich Mean Time (GB-Eire)
GB=Greenwich Mean Time (GB)
GMT0=GMT+00:00 (GMT0)
GMT=Greenwich Mean Time (GMT)
Greenwich=Greenwich Mean Time (Greenwich)
HST=Hawaii Standard Time (HST)
Hongkong=Hong Kong Time (Hongkong)
IET=Eastern Standard Time (IET)
IST=India Standard Time (IST)
Iceland=Greenwich Mean Time (Iceland)
Indian/Antananarivo=Eastern African Time (Indian/Antananarivo)
Indian/Chagos=Indian Ocean Territory Time
Indian/Christmas=Christmas Island Time
Indian/Cocos=Cocos Islands Time
Indian/Comoro=Eastern African Time (Indian/Comoro)
Indian/Kerguelen=French Southern & Antarctic Lands Time
Indian/Mahe=Seychelles Time
Indian/Maldives=Maldives Time
Indian/Mauritius=Mauritius Time
Indian/Mayotte=Eastern African Time (Indian/Mayotte)
Indian/Reunion=Reunion Time
Iran=Iran Time (Iran)
Israel=Israel Standard Time (Israel)
JST=Japan Standard Time (JST)
Jamaica=Eastern Standard Time (Jamaica)
Japan=Japan Standard Time (Japan)
Kwajalein=Marshall Islands Time (Kwajalein)
Libya=Eastern European Time (Libya)
MET=Middle Europe Time
MIT=West Samoa Time (MIT)
MST7MDT=Mountain Standard Time (MST7MDT)
MST=Mountain Standard Time (MST)
Mexico/BajaNorte=Pacific Standard Time (Mexico/BajaNorte)
Mexico/BajaSur=Mountain Standard Time (Mexico/BajaSur)
Mexico/General=Central Standard Time (Mexico/General)
Mideast/Riyadh87=GMT+03:07 (Mideast/Riyadh87)
Mideast/Riyadh88=GMT+03:07 (Mideast/Riyadh88)
Mideast/Riyadh89=GMT+03:07 (Mideast/Riyadh89)
NET=Armenia Time (NET)
NST=New Zealand Standard Time (NST)
NZ-CHAT=Chatham Standard Time (NZ-CHAT)
NZ=New Zealand Standard Time (NZ)
Navajo=Mountain Standard Time (Navajo)
PLT=Pakistan Time (PLT)
PNT=Mountain Standard Time (PNT)
PRC=China Standard Time (PRC)
PRT=Atlantic Standard Time (PRT)
PST8PDT=Pacific Standard Time (PST8PDT)
PST=Pacific Standard Time (PST)
Pacific/Apia=West Samoa Time (Pacific/Apia)
Pacific/Auckland=New Zealand Standard Time (Pacific/Auckland)
Pacific/Chatham=Chatham Standard Time (Pacific/Chatham)
Pacific/Easter=Easter Is. Time (Pacific/Easter)
Pacific/Efate=Vanuatu Time
Pacific/Enderbury=Phoenix Is. Time
Pacific/Fakaofo=Tokelau Time
Pacific/Fiji=Fiji Time
Pacific/Funafuti=Tuvalu Time
Pacific/Galapagos=Galapagos Time
Pacific/Gambier=Gambier Time (Pacific/Gambier)
Pacific/Guadalcanal=Solomon Is. Time (Pacific/Guadalcanal)
Pacific/Guam=Chamorro Standard Time (Pacific/Guam)
Pacific/Honolulu=Hawaii Standard Time (Pacific/Honolulu)
Pacific/Johnston=Hawaii Standard Time (Pacific/Johnston)
Pacific/Kiritimati=Line Is. Time
Pacific/Kosrae=Kosrae Time
Pacific/Kwajalein=Marshall Islands Time (Pacific/Kwajalein)
Pacific/Majuro=Marshall Islands Time (Pacific/Majuro)
Pacific/Marquesas=Marquesas Time
Pacific/Midway=Samoa Standard Time (Pacific/Midway)
Pacific/Nauru=Nauru Time
Pacific/Niue=Niue Time
Pacific/Norfolk=Norfolk Time
Pacific/Noumea=New Caledonia Time
Pacific/Pago_Pago=Samoa Standard Time (Pacific/Pago_Pago)
Pacific/Palau=Palau Time
Pacific/Pitcairn=Pitcairn Standard Time (Pacific/Pitcairn)
Pacific/Ponape=Ponape Time
Pacific/Port_Moresby=Papua New Guinea Time
Pacific/Rarotonga=Cook Is. Time
Pacific/Saipan=Chamorro Standard Time (Pacific/Saipan)
Pacific/Samoa=Samoa Standard Time (Pacific/Samoa)
Pacific/Tahiti=Tahiti Time
Pacific/Tarawa=Gilbert Is. Time
Pacific/Tongatapu=Tonga Time
Pacific/Truk=Truk Time
Pacific/Wake=Wake Time
Pacific/Wallis=Wallis & Futuna Time
Pacific/Yap=Yap Time
Poland=Central European Time (Poland)
Portugal=Western European Time (Portugal)
ROK=Korea Standard Time (ROK)
SST=Solomon Is. Time (SST)
Singapore=Singapore Time (Singapore)
SystemV/AST4=Atlantic Standard Time (SystemV/AST4)
SystemV/AST4ADT=Atlantic Standard Time (SystemV/AST4ADT)
SystemV/CST6=Central Standard Time (SystemV/CST6)
SystemV/CST6CDT=Central Standard Time (SystemV/CST6CDT)
SystemV/EST5=Eastern Standard Time (SystemV/EST5)
SystemV/EST5EDT=Eastern Standard Time (SystemV/EST5EDT)
SystemV/HST10=Hawaii Standard Time (SystemV/HST10)
SystemV/MST7=Mountain Standard Time (SystemV/MST7)
SystemV/MST7MDT=Mountain Standard Time (SystemV/MST7MDT)
SystemV/PST8=Pitcairn Standard Time (SystemV/PST8)
SystemV/PST8PDT=Pacific Standard Time (SystemV/PST8PDT)
SystemV/YST9=Gambier Time (SystemV/YST9)
SystemV/YST9YDT=Alaska Standard Time (SystemV/YST9YDT)
Turkey=Eastern European Time (Turkey)
UCT=Coordinated Universal Time (UCT)
US/Aleutian=Hawaii-Aleutian Standard Time (US/Aleutian)
US/Arizona=Mountain Standard Time (US/Arizona)
US/Central=Central Standard Time (US/Central)
US/East-Indiana=Eastern Standard Time (US/East-Indiana)
US/Eastern=Eastern Standard Time (US/Eastern)
US/Indiana-Starke=Eastern Standard Time (US/Indiana-Starke)
US/Michigan=Eastern Standard Time (US/Michigan)
US/Mountain=Mountain Standard Time (US/Mountain)
US/Pacific-New=Pacific Standard Time (US/Pacific-New)
US/Pacific=Pacific Standard Time (US/Pacific)
UTC=Coordinated Universal Time (UTC)
Universal=Coordinated Universal Time (Universal)
VST=Indochina Time (VST)
W-SU=Moscow Standard Time (W-SU)
WET=Western European Time (WET)
Zulu=Coordinated Universal Time (Zulu)
##############################################################
# DO NOT NEED TO LOCALIZE THESE. THEY ARE SUPPOSED TO BE BLANK
##############################################################
#################################################################################
#
# Common Task
#
################################################################################
click.to.see.info=Click to see more information
commontask.label.create.hosted.idp=Create Hosted Identity Provider
commontask.create.hosted.idp=This allows you to configure this instance of OpenAM server as an Identity Provider (IDP). You need three things: Name, Circle of Trust (COT) and optionally Signing Certificate. Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg SPs) in a COT. A COT is a group of IDPs and SPs that trust each other and in effect represents the confines within which all federation communications are performed.
commontask.label.create.hosted.sp=Create Hosted Service Provider
commontask.create.hosted.sp=This allows you to configure this instance of OpenAM server as an Service Provider (SP). You need three things: Name, Circle of Trust (COT). Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg IDPs) in a COT. A COT is a group of IDPs and SPs that trust each other and in effect represents the confines within which all federation communications are performed.
commontask.label.create.remote.idp=Register Remote Identity Provider
commontask.create.remote.idp=This allows you to register a remote Identity Provider (IDP). You need two things: Circle of Trust (COT). Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg SPs) in a COT. A COT is a group of IDPs and SPs that trust each other and in effect represents the confines within which all federation communications are performed.
commontask.label.create.remote.sp=Register Remote Service Provider
commontask.create.remote.sp=This allows you to register a remote Service Provider (SP). You need two things: Circle of Trust (COT). Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg SPs) in a COT. A COT is a group of IDPs and SPs that trust each other and in effect represents the confines within which all federation communications are performed.
commontask.label.create.fedlet=Create Fedlet
commontask.create.fedlet=Fedlet is ideal for an identity provider that needs to enable a service provider that does not have any kind of federation solution in place. A Fedlet is a very small zip file that you can provide a service provider so they can instantaneously federate with you. The service provider simply adds the Fedlet to their application, deploys their application and they are federation enabled.
page.title.common.tasks.section.configure.social.authn=Configure Social Authentication
page.title.common.tasks.section.desc.configure.social.authn=Add social authentication options per realm. This task configures authentication through third parties such as Facebook, Google and Microsoft.
commontask.label.configure.facebook.authn=Configure Facebook Authentication
commontask.configure.facebook.authn=This task guides you through the process of adding Facebook as an authentication option for a particular realm. Once configured, the OpenAM login page for the chosen realm will include a link to authenticate using a Facebook account.
commontask.label.configure.google.authn=Configure Google Authentication
commontask.configure.google.authn=This task guides you through the process of adding Google as an authentication option for a particular realm. Once configured, the OpenAM login page for the chosen realm will include a link to authenticate using a Google account.
commontask.label.configure.microsoft.authn=Configure Microsoft Authentication
commontask.configure.microsoft.authn=This task guides you through the process of adding Microsoft as an authentication option for a particular realm. Once configured, the OpenAM login page for the chosen realm will include a link to authenticate using a Microsoft account.
commontask.label.configure.other.social.authn=Configure Other Authentication
commontask.configure.other.social.authn=This task guides you through the process of adding another third party as an authentication option for a particular realm. Once configured, the OpenAM login page for the chosen realm will include a link to authenticate using an account held with this third party.
commontask.label.saml2.validate=Test Federation Connectivity
commontask.saml2.validate=Whether you have just set up your Federated accounts or are interested in troubleshooting an issue with your existing accounts, this test will show you if the connections are being made successfully or identify where the troubles are located.
commontask.label.doc=Get Product Documentation
commontask.doc=This link launches the OpenAM product documentation page. For additional information, visit the OpenAM community site at http://openam.forgerock.org/ and the OpenAM Wiki at https://wikis.forgerock.org/confluence/display/OPENAM/Home
commontask.label.register.product=Register This Product
commontask.register.product=This allows you to register this OpenAM Product to Sun Connection. You must have a Sun Online Account in order to complete the registration. If you do not already have one, you may request one as part of this process.
page.title.common.tasks.section.configure.google.apps=Configure Google Apps
commontask.label.configure.google.apps=Configure Google Apps
page.title.common.tasks.section.desc.configure.google.apps=Integrate OpenAM with Google Apps web applications to create a single sign-on environment. Before beginning, a hosted identity provider and Circle of Trust must be configured.
commontask.configure.google.apps=For instructions on integrating Google Apps with OpenAM, see https://wikis.forgerock.org/confluence/display/openam/Integrate+With+Google+Apps
commontask.label.create.soap.sts.deployment=Create A Soap STS Deployment
commontask.create.soap.sts.deployment=Create A Soap STS Deployment corresponding to a soap STS agent in a specific realm. Before beginning, a directory with the name of soapstsdeployment must be created in the OpenAM config directory, and the openam-soap-sts-server*.war file which will be the basis for the agent-specific .war file copied into this directory. In addition, any custom wsdl files specified in soap-sts instances published to the realm in question must be in the soapstsdeployment directory, as well as any keystore specified in the 'Soap Keystore Configuration' Admin UI section of the soap-STS instances published in this realm.
configure.google.apps.label.domain.id=Domain Name
configure.google.apps.help.domainName=This is the primary domain you have registered at Google Apps. Example: domain.com
create.google.apps.missing.cot=Unable to configure because there are no circle of trust with Identity Provider.
configure.google.apps.label.cot=Circle of Trust
configure.google.apps.label.idp=Identity Provider
configure.google.apps.section.setup=Configure the Remote SP
configure.google.apps.section.idp.setup=Configure the IDP
configure.google.apps.help.domainName.msg1=If you do not already have a Google Apps account, you must create one now.
configure.google.apps.help.domainName.msg2=Go to <a href="http://www.google.com/apps/intl/en/business/index.html" target="_blank" >http://www.google.com/apps/intl/en/business/index.html</a>, and follow the instructions for creating a Premier Edition Account.
page.title.configure.google.apps=Configure Google Apps for Single Sign-On
configure.google.apps.entity.exist=A google.com entity already exists. Go to the Federation tab, and delete the existing google.com entity. Then you return to the Configure Google Apps workflow to reconfigure it.
configuring.google.apps.waiting=Configuring the meta. Please wait...
google.apps.configured.msg=Metadata now configured successfully. Click OK to retrieve the parameters for configuring the Service Provider.
page.desc.configure.google.apps=You must provide Identity Provider and remote Service Provider information before the metadata can be configured. OpenAM acts as the Identity Provider, and Google Apps acts as the Service Provider. SAMLv2 is the single sign-on protocol for creating a circle of trust at the Identity Provider.
configure.google.apps.complete.label.name=Google Apps Single Sign-On Configuration
configure.google.apps.complete.label.description=You must supply the following information to Google Apps when you configure Google Apps Single Sign-On. Save these URLs and Verification Certificate information before proceeding to Google Apps Single Sign-On setup.
configure.google.apps.complete.label.SigninPageURL=Sign-in Page URL
configure.google.apps.complete.help.SigninPageURL=URL for signing in to OpenAM and Google Apps
configure.google.apps.complete.label.SignoutPageURL=Sign-out Page URL
configure.google.apps.complete.help.SignoutPageURL=URL to refirect users to when they sign out
configure.google.apps.complete.label.ChangePasswordURL=Change Password URL
configure.google.apps.complete.help.ChangePasswordURL=URL to let users change their password in OpenAM
configure.google.apps.complete.certificate.section=Verification Certificate
configure.google.apps.complete.label.PubKey=Verification Certificate
configure.google.apps.complete.help.PubKey=Copy this text to a text file, and upload the new text file to the Google Apps Verification Certificate.
configure.google.apps.complete.certificate.download=Click here to download
configure.google.apps.complete.certificate.download.error=An error occurred while downloading Verification Certificate.
configure.google.apps.complete.instruction.section=To Enable Access to the Google Apps API:
configure.google.apps.complete.step1=1. Click a domain name in the following list to open the Google Apps administration page in a new browser window.
configure.google.apps.complete.urllist=<a href="https://www.google.com/a/{0}/" target="_blank"> {1}</a></br>
configure.google.apps.complete.step2=2. Log in to your Google dashboard as a Google Apps administrator.
configure.google.apps.complete.step3=3. Click the Advanced Tools tab, and then click the "Set up Single Sign-on (SSO)" link.
configure.google.apps.complete.step4=4. Mark the "Enable Single Sign-On" checkbox.
configure.google.apps.complete.step5=5. Copy the URLs from OpenAM (above) and paste them into the Google Apps setup screen.
configure.google.apps.complete.step6=6. Copy the Verification Certificate text into a file, and upload the new text file to the Google Apps Verification Certificate.
configure.google.apps.complete.step7=7. Mark the "Use a domain specific issuer" checkbox.
configure.google.apps.complete.step8=8. Save the changes in the Google Apps setup screen.
configure.google.apps.complete.step.others=If you have configured multiple domains, then you must enable access for each domain you have configured. Repeat steps 1 to 8 above until all domains have been configured.
##Common Task - Salesforce CRM
complete.create.host.idp.create.salesforce.title=Configure Salesforce CRM
complete.create.host.idp.create.salesforce.text=Use this workflow to integrate the Salesforce CRM in an OpenAM single sign-on environment. You can <a href="javascript:configureSalesForceApps()">configure Salesforce CRM as a service provider now</a> or configure it later using the link on the Common Tasks page.
page.title.common.tasks.section.configure.salesforce.apps=Configure Salesforce CRM
commontask.label.configure.salesforce.apps=Configure Salesforce CRM
page.title.common.tasks.section.desc.configure.salesforce.apps=Integrate OpenAM with Salesforce CRM to create a single sign-on environment. Before beginning, a SAMLv2 hosted identity provider and Circle of Trust must be configured.
commontask.configure.salesforce.apps=See the OpenAM Wiki for more information.
salesforce.link=Salesforce
configure.salesforce.attributesmapping.title= Remote to Local Attribute Mapping Table
configure.salesforce.apps.complete.details=You can configure single sign-on between this instance of OpenAM and a Salesforce CRM account with different user identifiers. These identifiers are defined in the Salesforce CRM account and mapped using OpenAM.<br /><br />Follow the procedure below to identify the user with the Federation ID from the User object in an Assertion located in an Attribute element. Make sure the attribute chosen as the value of the user's "Federation Id" in the Salesforce account configuration matches the attribute selected as the Local Attribute Name in the Remote to Local Attribute Mapping Table of the OpenAM Salesforce CRM Common Task.<br /> <br />See the Salesforce CRM documentation to use a Salesforce user name as the user identifier or if the user identifier is located in the NameIdentifier element of the Subject statement (rather than an Attribute element).
create.salesforce.apps.missing.cot=Unable to configure because there are no circle of trust with Identity Provider.
configure.salesforce.apps.label.salesforceSPId=Salesforce Service Provider entityID
configure.salesforce.apps.help.salesforceSPId=Please enter the entityID for the Salesforce Service Provider
configure.salesforce.apps.label.cot=Circle of Trust
configure.salesforce.apps.label.idp=Identity Provider
configure.salesforce.apps.section.setup=Configure the Remote SP
configure.salesforce.apps.section.idp.setup=Configure the IDP
configure.salesforce.apps.help.domainName.msg1=If you do not have a Salesforce CRM account, you must create one now.
configure.salesforce.apps.help.domainName.msg2=Go to <a href="http://www.salesforce.com/apps/intl/en/business/index.html" target="_blank" >http://www.salesforce.com/apps/intl/en/business/index.html</a>, and follow the instructions for creating a Premier Edition Account.
page.title.configure.salesforce.apps=Configure Salesforce CRM for Single Sign-On
configuring.salesforce.apps.waiting=Configuring the meta. Please wait...
salesforce.apps.configured.msg=Metadata now configured successfully. Click OK to retrieve the parameters for configuring the Service Provider.
page.desc.configure.salesforce.apps=You must provide SAMLv2 identity provider and service provider information to configure a circle of trust. OpenAM acts as the identity provider and Salesforce acts as the service provider. This configuration requires mapping of one attribute on the OpenAM side to one attribute on the Salesforce side.
configure.salesforce.apps.complete.label.name=Salesforce CRM Single Sign-On Configuration
configure.salesforce.apps.complete.label.description=Configure your Salesforce.com account using the following information.
configure.salesforce.apps.complete.label.AttributeName=Attribute Name
configure.salesforce.apps.help.attributeName=Type the Sales force attribute and select the OpenAM attribute from the drop down list. You may type an OpenAM attribute not in the drop down list as long as it is defined in the identity data store configured for OpenAM.
configure.salesforce.apps.complete.help.IssuerID=Copy this value to the Issuer field of the account's single sign-on settings at Salesforce.com
configure.salesforce.apps.complete.help.AttributeName= Copy this value to the Attribute Name field of the account's single sign-on settings at Salesforce.com
configure.salesforce.apps.complete.values.section=Copy these values over to Salesforce
configure.salesforce.apps.complete.certificate.section=Verification Certificate
configure.salesforce.apps.complete.label.PubKey=Verification Certificate
configure.salesforce.apps.complete.help.PubKey=Save the Verfication Certificate information to a plain text file before uploading it as the Identity Provider Certificate at Salesforce.com.
configure.salesforce.apps.complete.certificate.download=Click here to download
configure.salesforce.apps.complete.certificate.download.error=An error occurred while downloading Verification Certificate.
configure.salesforce.apps.complete.instruction.section=To Enable Access to the Salesforce CRM:
configure.salesforce.apps.complete.urllist=<a href="https://login.salesforce.com/" target="_blank"> {0}</a></br>
create.salesforce.apps.finish.message=A valid Salesforce Login URL has not been provided. Without this information, the single sign-on configuration has not been completed. To add this URL, change and save the value of the Assertion Consumer Service Location attribute for the Salesforce service provider entity created using the OpenAM console. This is under the Federation tab.
configure.salesforce.apps.complete.step1=1. Click the Salesforce link to open the application's single sign-on set up page in a new browser window.
configure.salesforce.apps.complete.step2=2. Log in with your administrator user name and password. If you do not have an administrator account, create one.
configure.salesforce.apps.complete.step3=3. Click on the "Setup" link at the top of the Salesforce landing page.
configure.salesforce.apps.complete.step4=4. Click on "Single Sign-On Settings", under "Administartion Setup" -> "Security Controls" on the left side of the Salesforce page.
configure.salesforce.apps.complete.step5=5. Click on the "Edit" button under "Single Sign-On Settings".
configure.salesforce.apps.complete.step6=6. Check the "SAML Enabled" box.
configure.salesforce.apps.complete.step7=7. Choose SAML Version as 2.0
configure.salesforce.apps.complete.step8=8. Copy the issuer name generated below to the Issuer field on the Salesforce CRM set up page.
configure.salesforce.apps.complete.step9=9. Copy, paste and save the Verification Certificate text generated below into a plain text file.
configure.salesforce.apps.complete.step10=10. Upload the Verification Certificate text file as the Identity Provider Certificate on the Salesforce CRM set up page.
configure.salesforce.apps.complete.step11=11. Choose the "Assertion contains the Federation ID from the User object" option as the value for the "SAML User ID Type" field.
configure.salesforce.apps.complete.step12=12. Choose the "User ID is in an Attribute element" option as the value for the "SAML User ID Location" field.
configure.salesforce.apps.complete.step13=13. One of the attributes below should identify the Federation Id and configured on the Salesforce CRM set up page.
configure.salesforce.apps.complete.step14=14. Leave the NameID Format field empty.
configure.salesforce.apps.complete.step15=15. Save your changes. A "Salesforce Login URL" will be displayed on the Salesforce CRM screen.
configure.salesforce.apps.complete.step16=16. Copy and paste the "Salesforce Login URL" into the textbox below. This value will be used as the new value for the Assertion Consumer Service Location attribute of the Salesforce service provider entity created using the OpenAM console.
configure.salesforce.apps.complete.step17=17. Click on "Users", under "Administration Setup" -> "Manage Users" on the left side of the Salesforce page.
configure.salesforce.apps.complete.step18=18. Add new users if necessary. Make sure the attribute chosen as the value of the user's "Federation Id" matches the attribute selected as the Local Attribute Name in the Remote to Local Attribute Mapping Table of the OpenAM Salesforce Common Task.
## Social Authentication Tasks
page.title.configure.social.authentication=Configure Social Authentication
page.desc.configure.social.authentication=Configure a social authentication provider via OpenID Connect.
configure.social.authentication.title.message=Configure {0} Authentication
configure.social.authentication.help.message=Configure authentication using {0} as an identity provider.
configure.social.authentication.section.provider=Provider Details
configure.social.authentication.section.setup=Client Details
configure.social.authentication.client.id.help.txt=For more information on the OAuth client_id parameter refer to the \
<a href="http://tools.ietf.org/pdf/draft-ietf-oauth-v2-12.pdf" target="_blank">OAuth IETF draft</a>, chapter 2.1
configure.social.authentication.label.client.secret=Client Secret
configure.social.authentication.client.secret.help.txt=For more information on the OAuth client_secret parameter refer \
to the <a href="http://tools.ietf.org/pdf/draft-ietf-oauth-v2-12.pdf" target="_blank">OAuth IETF draft</a>, chapter \
2.1
configure.social.authentication.label.confirm.secret=Confirm Client Secret
configure.social.authentication.label.redirect.url=Redirect URL
configure.social.authentication.redirect.url.help.txt=This URL should only be changed from the default, if an external \
server is performing the GET to POST proxying. The default is <code>/openam/oauth2c/OAuthProxy.jsp</code>
configure.social.authentication.label.discovery.url=OpenID Discovery URL
configure.social.authentication.discovery.url.help.txt=For more information on the Discovery Document \
URL, refer to the <a href="http://openid.net/specs/openid-connect-discovery-1_0.html" target="_blank">OpenID Connect \
Discovery 1.0 Specification</a>
configure.social.authentication.label.provider.name=Provider Name
configure.social.authentication.provider.name.help.txt=Name of the Social Authentication Provider to display to users \
on the login page.
configure.social.authentication.image.url.help.txt=A path to a logo image to display to users on the login page. \
Must be an absolute URL or relative path. e.g. /openam/XUI/images/logos/googleplus.png or http://example.com/myimage.png
configure.social.authentication.success=Social Authentication Provider Successfully Configured
## Social AuthN Providers
configure.social.authentication.help.facebook=Configure Social Authentication using Facebook as the identity provider. \
Use the <a href="https://developers.facebook.com/quickstarts/?platform=web" target="_blank">Facebook App Quickstart</a> to register \
your application with Facebook. Once registered, enter the App ID and App Secret fields from the developer dashboard \
into the Client ID and Client Secret fields below to complete the configuration.
configure.social.authentication.help.google=Configure Social Authentication using Google as the identity provider. \
Use the <a href="https://console.developers.google.com/project" target="_blank">Google Developers Console</a> to register your \
application with Google. Once created, select "Credentials" in the "APIs & auth" section and then click the \
"Create new Client ID" button under "OAuth" to be guided through creating an OAuth 2.0 client ID. Once created, \
copy the CLIENT ID and CLIENT SECRET values into the respective fields below to complete the configuration.
social.authentication.provider.microsoft=Microsoft
configure.social.authentication.help.microsoft=Configure Social Authentication using Microsoft. Follow \
<a href="http://msdn.microsoft.com/en-us/library/dn659750.aspx" target="_blank">Microsoft's guide on Signing in with REST</a> to \
generate a Client ID. Once created, copy the Client ID and Client Secret values into the fields below to complete \
the configuration.
## Soap STS Deployment Creation Entries
# keys referenced in propertyCreateSoapSTSDeployment.xml
create.soap.sts.deployment.section.config=Soap STS Deployment Configuration
create.soap.sts.deployment.label.realm=Realm of Soap STS Deployment
create.soap.sts.deployment.realm.help=Must match the realm of the Soap STS agent
create.soap.sts.deployment.label.openam.url=OpenAM URL
create.soap.sts.deployment.openam.url.help=Site/Server URL which the Soap STS will use to obtain published Soap STS instance state.
create.soap.sts.deployment.label.soap.agent.name=Soap STS Agent Name
create.soap.sts.deployment.soap.agent.name.help=Value must match name of Soap STS agent in this realm
create.soap.sts.deployment.label.soap.agent.password=Soap STS Agent Password
create.soap.sts.deployment.soap.agent.password.help=Value must match password of Soap STS agent in this realm
create.soap.sts.deployment.label.soap.agent.password.confirm=Confirm Soap STS Agent Password
create.soap.sts.deployment.label.custom.wsdl.file.names=Custom wsdl file names
create.soap.sts.deployment.custom.wsdl.file.names.help=If any of the Soap STS instances published in the realm reference custom \
wsdl files, these files must be specified here.
create.soap.sts.deployment.custom.wsdl.file.names.help.txt=The custom wsdl files will be deposited in the WEB-INF/classes directory of the deployment .war. \
They must be placed in the soapstsdeployment subdirectory of the OpenAM config directory so that they can be included in the generated .war.
create.soap.sts.deployment.label.keystore.file.names=KeyStore file names
create.soap.sts.deployment.keystore.file.names.help=Any KeyStores configured in the Soap Keystore Configuration section of \
any Soap STS instances published in this realm must be specified here.
create.soap.sts.deployment.keystore.file.names.help.txt=The KeyStore files will be deposited in the WEB-INF/classes directory of \
the deployment .war. They must be placed in the soapstsdeployment subdirectory of the OpenAM config directory so that they can be \
included in the generated .war.
# keys referenced in the CreateSoapSTSDeployment.jsp
page.title.configure.soapstsdeployment=Configure a Soap STS Deployment
page.desc.configure.soapstsdeployment=This page will provide the configuration state necessary to create a opeanam-soap-sts-server \
.war file specific to a given realm.
configuring.soapstsdeployment.waiting=Please wait while the Soap STS Deployment .war is created.
soapstsdeployment.configured.title=A Soap STS agent specific .war file has been created.
##############################################################
tab.federation.label=Federation
tab.federation.tooltip=Click to go to Federation
tab.federation.status=Federation Properties View
tab.webservices.label=Web Services
tab.webservices.tooltip=Click to go to Web Services
tab.webservices.status=Click to go to Web Services
tab.webservices.personalprofile.label=Personal Profile
tab.webservices.personalprofile.tooltip=Click to go to Personal Profile Service
tab.webservices.personalprofile.status=Click to go to Personal Profile Service
tab.webservices.discoveryservice.label=Discovery Service
tab.webservices.discoveryservice.tooltip=Click to go to Discovery Service
tab.webservices.discoveryservice.status=Click to go to Discovery Service
tab.webservices.soapbidingservice.label=SOAP Binding Service
tab.webservices.soapbidingservice.tooltip=Click to go to SOAP Binding Service
tab.webservices.soapbidingservice.status=Click to go to SOAP Binding Service
tab.webservices.authentication.label=Authentication Web Service
tab.webservices.authentication.tooltip=Click to go to Authentication Web Service
tab.webservices.authentication.status=Click to go to Authentication Web Service
tab.webservices.LibertyIDWSFSecurityService.label=Liberty ID-WSF Security Service
tab.webservices.LibertyIDWSFSecurityService.tooltip=Click to go to Liberty ID-WSF Security Service
tab.webservices.LibertyIDWSFSecurityService.status=Click to go to SLiberty ID-WSF Security Service
tab.webservices.LibertyInteractionService.label=Liberty Interaction Service
tab.webservices.LibertyInteractionService.tooltip=Click to go to Liberty Interaction Service
tab.webservices.LibertyInteractionService.status=Click to go to Liberty Interaction Service
tab.webservices.SecurityTokenService.label=Security Token Service
tab.webservices.SecurityTokenService.tooltip=Click to go to Security Token Service
tab.webservices.SecurityTokenService.status=Click to go to Security Token Service
#################################################################################
#
# Main Federation View
#
################################################################################
# COT Properties
cot.configuration.section=Circle of Trust Configuration
cot.table.help.message=This section can be used to configure the properties for a Circle of Trust. The Entities table can be used for managing entity providers including importing and exporting of providers. Entities can be added to a Circle of Trust after they are created in the Entities table.
cot.table.title=Circle of Trust
cot.new.button=New...
cot.delete.button=Delete
cot.entity.column.label=Entities
cot.realm.column.label=Realm
cot.status.column.label=Status
cot.empty.table.message=There are no COT's available. Select the New... button to create one.
# Entity Properties
entity.table.title=Entity Providers
entity.new.button=New...
entity.delete.button=Delete
entity.import.button=Import Entity...
entity.protocol.column.label=Protocol
entity.location.column.label=Location
entity.empty.table.message=There are no entities available. Select the New... button to create one.
more.actions.label=- More Actions -
separator.label=----------------
add.sp.label=Add Service Provider
add.idp.label=Add Identity Provider
remove.sp.label=Remove Service Provider
remove.idp.label=Remove Identity Provider
export.entity.label=Export Entity
# SAML Trusted Partner Properties
saml1x.configuration.section=SAML 1.x Configuration
saml.locale.site.button=Local Site Properties
saml.table.title=Trusted Partners
saml.table.help.message=This section will be used to configure the properties defining a SAML1.x SSO Circle. Use the 'Local Site Properties' button to access the configuration properties of the local site. Trusted Partner information can be added to the table below.
saml.new.button=New...
saml.delete.button=Delete
saml.empty.table.message=There are no trusted partners configured. Select the New... button to create one.
saml.trusted.partner.source.column.label=Source Profile
saml.trusted.partner.destination.column.label=Destination Profile
################################################################################
#
# SAML Service
#
################################################################################
page.title.SAML.profile=Local Site Properties
saml.profile.properties.target.specifier.help=This attribute assigns a name to the destination site URL used in SAML redirects.
saml.profile.properties.siteid.help=This attribute defines any site hosted by the server on which OpenAM is installed. A default value and an automatically generated Site ID are defined for the host during installation (with values retrieved from AMConfig.properties). Multiple entries are possible. For example, load balancing or multiple instances of OpenAM sharing the same Directory Server would all need to be defined. The starting point is the Site Identifiers attribute on the SAML screen under the Federation interface.
saml.profile.properties.targeturl.help=The following subattributes can be defined (or modified) for each Target URL that will receive assertions via POST.
saml.profile.properties.header=Properties
saml.profile.assertion.header=Assertion
saml.profile.assertion.version=Default Assertion Version
saml.profile.assertion.help.version=Default value is 1.1. Specifies default SAML version used. Possible values are 1.0 or 1.1.
saml.profile.assertion.remove=Remove Assertion
saml.profile.assertion.help.remove=Selecting the check box to remove assertion.
saml.profile.assertion.help.iplanet-am-saml-assertion-timeout=In seconds. This attribute specifies the period of time an assertion that is created for an artifact will be valid. The default is 400.
saml.profile.assertion.help.iplanet-am-saml-notbefore-timeskew=This attribute is used to calculate the notBefore time of an assertion. For example, if IssueInstant is 2002-09024T21:39:49Z, and Assertion Skew Factor For notBefore Time is set to 300 seconds (180 is the default value), the notBefore attribute of the conditions element for the assertion would be 2002-09-24T21:34:49Z.
saml.profile.artifact.header=Artifact
saml.profile.assertion.help.iplanet-am-saml-artifact-name=This attribute assigns a variable name to a SAML artifact. The artifact is bounded-size data that identifies an assertion and a source site. It is carried as part of a URL query string and conveyed by redirection to the destination site.
saml.profile.assertion.help.signassertion=This attribute specifies whether all SAML assertions will be digitally signed (XML DSIG) before being delivered. Selecting the check box enables this feature.
saml.profile.assertion.help.signrequest=This attribute specifies whether all SAML requests will be digitally signed (XML DSIG) before being delivered. Selecting the check box enables this feature.
saml.profile.assertion.help.signresponse=This attribute specifies whether all SAML responses will be digitally signed (XML DSIG) before being delivered. Selecting the check box enables this feature.
saml.profile.name.id.attribute.map.header=NameID Format
saml.profile.name.id.attribute.map.label=NameID Format List
saml.profile.name.id.attribute.map.inlinehelp=Defines mapping between the Name ID format and user's profile attribute. Example urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress=mail. If the defined Name ID format is used in protocol, the profile attribute value will be used as NameID value for the format in the Subject.
saml.profile.attribute.map.header=Attribute Map
saml.profile.attribute.map.label=Attribute Map List
saml.profile.attribute.map.inlinehelp=This mapping is the configuration used by the Site Attribue Mapper of Trusted Partner. Mapping should be defined as [SAML Attribute Namespace|]SAML ATTRIBUTE NAME=PROFILE ATTRIBUTE NAME. Example: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress|EmailAddress=mail
saml.profile.signing.header=Signing
saml.profile.version.header=Version
saml.profile.protocol.header=Protocol
saml.profile.protocol.version=Default Protocol Version
saml.profile.protocol.help.version=Default value is 1.1. Specifies default SAML version used. Possible values are 1.0 or 1.1.
saml.profile.attribute.query.header=Attribute Query
saml.profile.attribute.query.label=Attribute List For Attribute Query
saml.profile.siteid.table.header=Site Identifiers
saml.profile.siteid.table.column.instance=Instance ID
saml.profile.siteid.table.noentries=There are no site identifiers.
saml.profile.trustedPartners.table.header=Trusted Partners
saml.profile.trustedPartners.table.column.url=Instance ID
saml.profile.trustedPartners.noentries=There are no trusted partners.
saml.profile.targetURLs.table.header=Target URLs
saml.profile.targetURLs.table.noentries=There are no target URLs.
page.title.SAML.addSiteID=New Site Identifier
saml.profile.siteid.instanceid.label=Instance ID
saml.profile.siteid.instanceid.help=The value of this property is protocol://host:port.
saml.profile.siteid.siteid.label=Site ID
saml.profile.siteid.siteid.help=The site ID is an identifier generated for each site (although the value will be the same for multiple servers behind a load balancer).
saml.profile.siteid.issuername.label=Issuer Name
saml.profile.siteid.issuername.help=The default value of this property is host:port, but it could be any URI.
saml.profile.siteid.create.page.title=Add New Site Identifier
saml.profile.siteid.edit.page.title=Edit Site Identifier
saml.profile.siteid.missing.instanceid.message=Instance ID is required.
saml.profile.siteid.missing.siteid.message=Site ID is required.
saml.profile.siteid.missing.issuername.message=Issuer name is required.
saml.profile.siteid.already.exists.siteId=Site ID already existed.
saml.profile.trustedPartners.selectType.page.title=Select trusted partner type and profile
saml.profile.trustedPartners.selectType.profile.label=Select the type of profile and binding method you are trying to create
saml.profile.trustedPartners.selectType.profile.help=The first step in configuring a trusted partner is to determine the partner's role in the trust relationship. A trusted partner can be a source site (one that generates a single sign-on assertion) or a destination site (one that consumes a single sign-on assertion). For example, if the partner is the source site, this attribute is configured based on how it will send assertions. If the partner is the destination site, this attribute is configured based on the profile in which it will be receiving assertions. Following is the first part of the procedure for configuring a trusted partner. The starting point is the SAML screen under Federation.
saml.profile.trustedPartners.setType.profile.label=Select profile and binding method
saml.profile.trustedPartners.selectType.profile.common.label=Common Settings
saml.profile.trustedPartners.selectType.profile.destination.help=The destination sites is the one that consumes a single sign-on assertion.
saml.profile.trustedPartners.selectType.profile.source.help=The source site is the one that generates a single sign-on assertion.
saml.profile.trustedPartners.manage.profile.message=To change the trusted partner settings select the
saml.profile.trustedPartners.selectType.profile.artifact.help=The <b>Web Browser Artifact Profile</b> is used when there is a back channel available to process an artifact. (An artifact is carried as part of the URL and points to an assertion which contains the security information regarding the requestor.)
saml.profile.trustedPartners.selectType.profile.post.help=The <b>Web Browser POST Profile</b> is a front-channel profile that sends responses via the browser. It allows security information to be supplied to a trusted partner site using the HTTP POST method (without the use of an artifact).
saml.profile.trustedPartners.selectType.profile.soap.help=SAML SOAP Receiver. Assertions are exchanged between OpenAM and inquiring parties using the <Request> and <Response> XML constructs defined in the SAML specification. These SAML constructs are then integrated into SOAP messages for transport.
saml.profile.trustedpartners.create.page.title=Add New Trusted Partner
saml.profile.trustedpartners.edit.page.title=Edit Trusted Partner
saml.profile.trustedPartners.partnerName.help=The name of trusted partner which be displayed on trusted partner table. For example: sun, ibm or hp.
saml.profile.trustedPartners.sourceID.help=This is a 20 byte sequence (encoded using the Base64 format) that comes from the partner site. It is generally the same value as that used for the Site ID attribute when configuring the Site Identifiers attribute.
saml.profile.trustedPartners.target.help=This is the domain of the partner site (with or without a port number).
saml.profile.trustedPartners.postURL.help=The URL that points to the servlet that implements the Web Browser POST Profile.
saml.profile.trustedPartners.siteAttributeMapper.label=Site Attribute Mapper
saml.profile.trustedPartners.siteAttributeMapper.help=The class is used to return a list of attribute values defined as AttributeStatements elements in an Authentication Assertion. A site attribute mapper needs to be implemented from the com.sun.identity.saml.plugins.PartnerSiteAttributeMapper interface. If no class is defined, no attributes will be included in the assertion.
saml.profile.trustedPartners.nameIdentifierMapper.label=Name Identifier Mapper
saml.profile.trustedPartners.nameIdentifierMapper.help=The class is an interface that is implemented to map user account to name identifier in assertion subject. The default is com.sun.identity.saml.plugins.DefaultNameIdentifierMapper.
saml.profile.trustedPartners.soapURL.help=The URL to the SAML SOAP Receiver.
saml.profile.trustedPartners.accountMapper.label=Account Mapper
saml.profile.trustedPartners.accountMapper.help=The class is an interface that is implemented to map partner account to user account. The default is com.sun.identity.saml.plugins.DefaultPartnerAccountMapper.
saml.profile.trustedPartners.authenticationType.label=Authentication Type
saml.profile.trustedPartners.authenticationType.help=Authentication types that can be used with SAML. This attribute is optional. If not specified, the default is NOAUTH. If BASICAUTH or https is specified, the Trusted Partners attribute is required and should be HTTPS.
saml.profile.trustedPartners.user.help=When BASICAUTH is chosen as the Authentication Type, the value of this attribute defines the user identifier of the partner being used to protect the partner's SOAP receiver.
saml.profile.trustedPartners.password.label=User's Password
saml.profile.trustedPartners.password.help=When BASICAUTH is chosen as the Authentication Type, the value of this attribute defines the password for the user identifier of the partner being used to protect the partner's SOAP receiver.
saml.profile.trustedPartners.passwordConfirm.label=User's Password (re-enter)
saml.profile.trustedPartners.certificate.label=Signing Certificate Alias
saml.profile.trustedPartners.certificate.help=A certificate alias that is used to verify the signature in an assertion when it is signed by the partner and the certificate cannot be found in the KeyInfo portion of the signed assertion.
saml.profile.trustedPartners.issuer.help=The creator of a generated assertion. The default syntax is hostname:port.
saml.profile.trustedPartners.samlURL.help=The URL that points to the servlet that implements the Web Browser Artifact Profile.
saml.profile.trustedPartners.hostList.help=A list of the IP addresses, the DNS host name, or the alias of the client authentication certificate used by the partner. This is configured for all hosts within the partner site that can send requests to this authority. This list helps to ensure that the requestor is indeed the intended receiver of the artifact. If the requester is defined in this list, the interaction will continue. If the requester's information does not match any hosts defined in the host list, the request will be rejected.
saml.profile.trustedPartners.attributeMapper.label=Attribute Mapper
saml.profile.trustedPartners.attributeMapper.help=The class that is used to obtain single sign-on information from a query. You need to implement an attribute mapper from the included interface. If no class is specified, the DefaultAttributeMapper will be used.
saml.profile.trustedPartners.actionMapper.label=Action Mapper
saml.profile.trustedPartners.actionMapper.help=The class that is used to get single sign-on information and map partner actions to authorization decisions. You need to implement an action mapper from the included interface. If no class is specified, the DefaultActionMapper will be used.
saml.profile.trustedPartners.user.password.mismatchedmessage=Password mismatched. Re-enter password fields.
saml.profile.trustedPartners.version.help=The SAML version used (1.0 or 1.1) to send SAML requests.
saml.profile.trustedPartner.missing.partnerName.message=Name is required.
saml.profile.trustedPartner.missing.sourceid.message=Source ID is required.
saml.profile.trustedPartner.missing.target.message=Target is required.
saml.profile.trustedPartner.missing.postURL.message=POST URL is required.
saml.profile.trustedPartner.missing.soapURL.message=SOAP URL is required.
saml.profile.trustedPartner.missing.issuer.message=Issuer is required.
saml.profile.trustedPartner.missing.hostList.message=Host list is required.
saml.profile.trustedPartner.missing.samlURL.message=SAML URL is required.
saml.profile.trustedPartner.already.exists=Trusted Partner already exists.
saml.profile.trustedPartner.missing.profile=One or more profiles is required.
saml.profile.trustedPartners.noattribute.message=All settings under this section are common.
saml.profile.targetURLs.create.page.title=Add New Post To Target URL
saml.profile.targetURLs.edit.page.title=Edit Post To Target URL
saml.profile.targetURLs.target.label=Server Name
saml.profile.targetURLs.target.help=The name of the server on which the TARGET URL resides, such as www.example.com
saml.profile.targetURLs.protocol.help=Choose either http or https
saml.profile.targetURLs.port.help=This attribute contains the port number such as 58080.
saml.profile.targetURLs.path.help=This attribute contains the URI such as /amserver/console.
saml.profile.targetURLs.incorrect.url=URL is incorrect.
saml.profile.targetURLs.already.exists=Target URL already exists.
breadcrumbs.saml.selectPartnerType=Select Partner Type
breadcrumbs.saml=Local Site Properties
breadcrumbs.saml.addSiteId=Add Site Identifier
breadcrumbs.saml.editSiteId=Edit Site Identifier
breadcrumbs.saml.addTargetURLs=Add Target URLs
breadcrumbs.saml.editTargetURLs=Edit Target URLs
breadcrumbs.saml.addTrustedPartner=Add Trusted Partner
breadcrumbs.saml.editTrustedPartner=Edit Trusted Partner
saml.message.trusted.partner.deleted=Trusted Partner deleted.
saml.message.trusted.partner.deleted.pural=Trusted Partners deleted.
saml.message.trusted.partner.updated=Trusted partner was updated.
button.previous=Previous
################################################################################
#
# New Entity Provider
#
################################################################################
entity.protocol.label=Protocol
entity.type.label=Type
entity.location.label=Location
idff.label=IDFF
wsfed.label=WSFederation
samlv2.label=SAMLv2
serviceProvider=Service Provider (SP)
identityProvider=Identity Provider (IDP)
affiliate=Affiliate
xacmlPEP=XACML (PEP)
xacmlPDP=XACML (PDP)
location.hosted=Hosted
location.remote=Remote
create.entity.title=Create Entity Provider
################################################################################
#
# IDFF General
#
################################################################################
idff.entityDescriptor.provider.general.updated = IDFF General properties are updated
idff.entityDescriptor.general.title=IDFF General Properties Page
idff.entityDescriptor.section.title.commonAttributes=Entity Common Attributes
idff.entityDescriptor.attribute.label.name=Entity Name:
idff.entityDescriptor.attribute.label.description=Description:
################################################################################
#
# IDFF IDP
#
################################################################################
idff.entityDescriptor.provider.idp.updated = IDFF Identity Provider properties are updated
idff.entityDescriptor.provider.section.title.commonAttributes=Common Attributes
idff.entityDescriptor.provider.attribute.label.protocolSupportEnum=Protocol Support Enumeration
idff.entityDescriptor.provider.attribute.label.serverNameIdentifierMapping=Server Name Identifier Mapping Binding
idff.entityDescriptor.provider.attribute.help.serverNameIdentifierMapping=URI describing the SAML authority binding at the identity provider to which identifier mapping queries can be sent.
idff.entityDescriptor.provider.attribute.label.Encryption=Encryption Key
idff.entityDescriptor.provider.attribute.help.Encryption.KeySize=Constraints the length of keys used by the consumer when interacting with another entity.
idff.entityDescriptor.provider.attribute.label.Encryption.Method=Encryption Method
idff.entityDescriptor.provider.attribute.help.Encryption.Method=Encryption preferences URI
idff.entityDescriptor.provider.attribute.label.enableNameIdentifierEncryption=Name Identifier Encryption
idff.entityDescriptor.provider.attribute.label.certificateAliases=Certificate Aliases
idff.entityDescriptor.provider.attribute.label.signingCertAlias=Sign Certificate Alias
idff.entityDescriptor.provider.attribute.label.encryptionCertAlias=Encryption Cert Alias
idff.entityDescriptor.provider.section.title.communicationURLs=Communication URLs
idff.entityDescriptor.provider.attribute.help.SOAPEndpointURL=Provider's SOAP Endpoint URL
idff.entityDescriptor.provider.attribute.label.singleSignOnServiceURL=Single Sign-On Service URL
idff.entityDescriptor.provider.attribute.label.singleLogoutServiceURL=Single Logout Service
idff.entityDescriptor.provider.attribute.help.singleLogoutServiceURL=URL used for user-agent-based Single Logout Protocol profiles.
idff.entityDescriptor.provider.attribute.label.singleLogoutReturnURL=Single Logout Return
idff.entityDescriptor.provider.attribute.help.singleLogoutReturnURL=URL to which the provider redirects at the end of the user-agent based Single Logout Protocol profiles.
idff.entityDescriptor.provider.attribute.label.federationTerminationServiceURL=Federation Termination Service
idff.entityDescriptor.provider.attribute.help.federationTerminationServiceURL=URL used for user-agent-based Federation Termination Notification Protocol profiles.
idff.entityDescriptor.provider.attribute.label.federationTerminationReturnURL=Federation Termination Return
idff.entityDescriptor.provider.attribute.help.federationTerminationReturnURL=URL to which the provider redirects at the end of user-agent-based Federation Termination Notification Protocol profiles.
idff.entityDescriptor.provider.attribute.label.nameRegistrationServiceURL=Name Registration Service
idff.entityDescriptor.provider.attribute.help.nameRegistrationServiceURL=URL used for user-agent-based Register Name Identifier Protocol Profiles.
idff.entityDescriptor.provider.attribute.label.nameRegistrationReturnURL=Name Registration Return
idff.entityDescriptor.provider.attribute.help.nameRegistrationReturnURL=Provider's redirecting URL for use after HTTP name registration has taken places.
idff.entityDescriptor.provider.section.title.communicationProfile=Communication Profiles
idff.entityDescriptor.provider.attribute.label.federationTerminationProfile=Federation Termination
idff.entityDescriptor.provider.attribute.help.federationTerminationProfile=This field specifies if the SOAP or HTTP/Redicect profile is to be used to notify of federation termination.
idff.entityDescriptor.provider.attribute.help.singleLogoutProfile=This field specifies if SOAP or HTTP Redirect is to be used to notify a logout event.
idff.entityDescriptor.provider.attribute.label.nameRegistrationProfile=Name Registration
idff.entityDescriptor.provider.attribute.help.nameRegistrationProfile=This field specifies if the SOAP or HTTP/Redirects profile is to be used for name registration.
idff.entityDescriptor.provider.attribute.help.federationProfile=This field specifies the profile used by the hosted provider for sending authentication requests.
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.MobileDigitalID=Mobile Digital ID
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.Smartcard-PKI=Smart Card PKI
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.MobileUnregistered=Mobile Unregistered
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.Software-PKI=Software PKI
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.Previous-Session=Previous Session
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.MobileContract=Mobile Contract
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.Time-Sync-Token=Time Sync Token
idff.entityDescriptor.provider.attribute.option.defaultAuthenticationContext.PasswordProtectedTransport=Password Protected Transport
idff.entityDescriptor.provider.section.title.idpConfiguration=Identity Provider Configuration
idff.entityDescriptor.provider.section.title.spConfiguration=Service Provider Configuration
idff.entityDescriptor.provider.section.title.autoFederation=Auto Federation
idff.entityDescriptor.provider.section.title.idpAttributeMapper=Identity Provider Attribute Mapper
idff.entityDescriptor.provider.section.title.spAttributeMapper=Service Provider Attribute Mapper
# Entended metadata
idff.entityDescriptor.provider.section.title.accessManagerConfigurations=OpenAM Configuration
idff.entityDescriptor.provider.attribute.label.alias=Provider Alias
idff.entityDescriptor.provider.attribute.label.authenticationType=Authentication Type
idff.entityDescriptor.provider.attribute.label.defaultAuthenticationContext=Default Authentication Context
idff.entityDescriptor.provider.attribute.label.libertyVersionURI=Liberty Version URI
idff.entityDescriptor.provider.attribute.label.nameIdentifierImplementation=Name Identifier Implementation
idff.entityDescriptor.provider.attribute.label.singleSignOnFailureRedirectURL=Single Sign-On Failure Redirect URL
idff.entityDescriptor.provider.attribute.label.assertionIssuer=Assertion Issuer
idff.entityDescriptor.provider.attribute.help.assertionIssuer=This host issues assertion. This can be load balancer's host name if OpenAM is behind a load balancer.
idff.entityDescriptor.provider.attribute.label.generateDiscoveryBootstrappingResOffering=Generate Discovery Bootstrapping Resource Offering
idff.entityDescriptor.provider.attribute.help.generateDiscoveryBootstrappingResOffering=When selected, Bootstrapping Discovery Service Resource Offering will be generated during single sign on process.
idff.entityDescriptor.provider.attribute.help.enableAutoFederation=Enable Auto Federation if not already federated.
idff.entityDescriptor.provider.attribute.label.autoFederationCommonAttributeName=Auto Federation Common Attribute Name
idff.entityDescriptor.provider.attribute.help.autoFederationCommonAttributeName=User's common LDAP attribute name such as telephonenumber. For creating an Auto Federation Attribute Statement. The statement will have "AutoFedAttribute" as the attribute name and value of this common attribute.
idff.entityDescriptor.provider.attribute.label.attributeStatementPlugin=Attribute Statement Plug-in
idff.entityDescriptor.provider.attribute.help.attributeStatementPlugin=This plug-in is used for adding attribute statements in the assertion which is generated during Liberty single sign-on process.
idff.entityDescriptor.provider.attribute.label.sunIdentityServerProviderIDPAttributeMap=Identity Provider Attribute Mapping
idff.entityDescriptor.provider.attribute.help.sunIdentityServerProviderIDPAttributeMap=This mapping will be used by the default IDP Attribute Plug-in. Mapping should be defined as SAML attribute to local attribute. Example: EmailAddress=mail Address=postaladdress.
idff.entityDescriptor.provider.section.title.SAMLAttributes=SAML Attributes
idff.entityDescriptor.provider.attribute.label.assertionInterval=Assertion Interval
idff.entityDescriptor.provider.attribute.label.cleanupInterval=Cleanup Interval
idff.entityDescriptor.provider.attribute.label.artifactTimeout=Artifact Timeout
idff.entityDescriptor.provider.attribute.label.assertionLimit=Assertion Limit
idff.entityDescriptor.provider.section.title.authenticationContext=Authentication Context
idff.entityDescriptor.provider.table.title.authenticationContexts=Authentication Context
idff.sp.authenticationContext.table.name.contextReference.name=Context Reference
idff.idp.authenticationContext.table.name.contextReference.name=Context Reference
idff.authenticationContext.MobileContract.label=MobileContract
idff.authenticationContext.MobileDigitalID.label=MobileDigitalID
idff.authenticationContext.MobileUnregistered.label=MobileUnregistered
idff.authenticationContext.PasswordProtectedTransport.label=Password-ProtectedTransport
idff.authenticationContext.Previous-Session.label=Previous-Session
idff.authenticationContext.Smartcard-PKI.label=Smartcard-PKI
idff.authenticationContext.Software-PKI.label=Software-PKI
idff.authenticationContext.Time-Sync-Token.label=Time-Sync-Token
idff.authenticationContext.key.option.level=Authentication Level
################################################################################
#
# IDFF SP
#
################################################################################
idff.entityDescriptor.provider.sp.updated = IDFF Service Provider properties are updated
idff.entityDescriptor.provider.section.title.serviceProfile=Service Provider
idff.entityDescriptor.provider.attribute.label.assertionConsumerURL=Assertion Consumer URL
idff.entityDescriptor.provider.attribute.help.assertionConsumerURL=This field defines the provider end-point to which a provider will send SAML assertions.
idff.entityDescriptor.provider.attribute.label.assertionConsumerServiceURLID=Assertion Consumer Service URL ID
idff.entityDescriptor.provider.attribute.help.assertionConsumerServiceURLID=This ID is required if Protocol Support Enum is urn:liberty:iff:2003-08.
idff.entityDescriptor.provider.attribute.label.setAssertionConsumerServiceURLasDefault=Set Assertion Consumer Service URL as Default
idff.entityDescriptor.provider.attribute.help.setAssertionConsumerServiceURLasDefault=Use the Assertion Consumer Service URL as the default value when no identifier is provided in the request.
idff.entityDescriptor.provider.attribute.label.signAuthenticationRequest=Sign Authentication Request
idff.entityDescriptor.provider.attribute.help.signAuthenticationRequest=Service Provider will always sign Authentication Request.
idff.entityDescriptor.provider.attribute.label.nameIDPolicy=Name ID Policy
idff.entityDescriptor.provider.attribute.help.nameIDPolicy=An enumeration permitting requester influence over name identifier policy at the identity provider.
idff.entityDescriptor.provider.attribute.label.enableAffiliationFederation=Affiliation Federation
idff.entityDescriptor.provider.attribute.label.doFederatePageURL=Federate Page URL
idff.entityDescriptor.provider.attribute.label.spAuthnContextMapping=SP Authn Context Mapping
idff.entityDescriptor.provider.attribute.label.federationSPAdapterEnv=Federation SP Adapter Env
idff.entityDescriptor.provider.attribute.label.ListOfCOTsPageURL=List of COTs Page URL
idff.entityDescriptor.provider.attribute.label.userProviderClass=User Provider Class
idff.entityDescriptor.provider.attribute.label.federationDoneURL=Federation Done URL
idff.entityDescriptor.provider.attribute.label.terminationDoneURL=Termination Done URL
idff.entityDescriptor.provider.attribute.label.errorPageURL=Error Page URL
idff.entityDescriptor.provider.attribute.label.providerStatus=Provider Status
idff.entityDescriptor.provider.attribute.label.logoutDoneURL=Logout Done URL
idff.entityDescriptor.provider.attribute.label.supportedSSOProfile=Supported SSO Profile
idff.entityDescriptor.provider.attribute.label.attributeMapperClass=Attribute Mapper Class
idff.entityDescriptor.provider.attribute.label.registrationDoneURL=Registration Done URL
idff.entityDescriptor.provider.attribute.label.idpAuthnContextMapping=IDP Auth Context Mapping
idff.entityDescriptor.provider.attribute.label.sunIdentityServerProviderSPAdapter=Service Provider Adapter
idff.entityDescriptor.provider.attribute.help.sunIdentityServerProviderSPAdapter=Implementation class for the FederationSPAdapter which is used to add application specific processing logic during federation process.
idff.entityDescriptor.provider.attribute.label.forcedAuthenticationAtIdentityProvider=Identity Provider Forced Authentication
idff.entityDescriptor.provider.attribute.label.requestIdentityProviderToBePassive=Request Identity Provider to be Passive
idff.entityDescriptor.provider.attribute.label.sunIdentityServerProviderAttributeMapperClass=Attribute Mapper Class
idff.entityDescriptor.provider.attribute.help.sunIdentityServerProviderAttributeMapperClass=Attribute Mapper at the service provider to map the SAML Attributes from the assertion to local user attributes.
idff.entityDescriptor.provider.attribute.label.sunIdentityServerProviderSPAttributeMap=Service Provider Attribute Mapping
idff.entityDescriptor.provider.attribute.help.sunIdentityServerProviderSPAttributeMap=This mapping will be used by the default attribute mapper. Values should be defined as SAML attribute to local attribute. Example: EmailAddress=mail Address=postaladdress.
idff.entityDescriptor.provider.section.title.proxyAuthenticationConfiguration=Proxy Authentication Configuration
idff.entityDescriptor.provider.attribute.label.enableProxyAuthentication=Proxy Authentication
idff.entityDescriptor.provider.attribute.label.proxyIdentityProviders=Proxy Identity Providers List
idff.entityDescriptor.provider.attribute.help.proxyIdentityProviders=This list is required if Proxy Authentication Configuration is enabled.
idff.entityDescriptor.provider.attribute.label.maximumNumberOfProxies=Maximum Number of Proxies
idff.entityDescriptor.provider.attribute.help.maximumNumberOfProxies=Maximum number of Identity Providers to be proxied.
idff.entityDescriptor.provider.attribute.label.useIntroductionCookieForProxying=Use Introduction Cookie for Proxying
################################################################################
#
# IDFF Afffiliate
#
################################################################################
idff.page.title.entityDescriptors.profile={0} - General
idff.page.title.entityDescriptors.Affiliate={0} - Affiliate
idff.entityDescriptor.affiliate.section.title.commonAttributes=Common Attributes
idff.invalid.affiliateId.affiliateOwnerId=Invalid values for Affiliate and/or Affiliate Owner.
idff.entityDescriptor.Affiliate.updated=IDFF Affiliation properties are updated.
################################################################################
#
# Circle of Trust Properties
#
################################################################################
authDomain.attribute.label.description=Description
authDomain.attribute.label.idffWriterServiceURL=IDFF Writer Service URL
authDomain.attribute.help.idffWriterServiceURL=Location of the IDFF Writer service that writes the cookie to the Common Domain.
authDomain.attribute.label.idffReaderServiceURL=IDFF Reader Service URL
authDomain.attribute.help.idffReaderServiceURL=Location of the IDFF Reader service that reads the cookie from the Common Domain.
authDomain.attribute.label.saml2WriterServiceURL=SAML2 Writer Service URL
authDomain.attribute.help.saml2WriterServiceURL=Location of the SAML2 Writer service that writes the cookie to the Common Domain.
authDomain.attribute.label.saml2ReaderServiceURL=SAML2 Reader Service URL
authDomain.attribute.help.saml2ReaderServiceURL=Location of the SAML2 Reader service that reads the cookie from the Common Domain.
authDomain.attribute.help.realm=The name of the realm where this cot will be created.
authDomain.attribute.label.addRemoveProviders=Entity Providers
authDomain.attribute.help.addRemoveProviders=Minimum requirements for a circle of trust are one identity provider and one service provider. Providers will be assigned to the realm that is specified above.
authDomain.create.title=Create Circle of Trust
authDomain.edit.title=Edit Circle of Trust
authdomain.authentication.domain.name.missing.message=Circle of Trust Name is required.
authDomain.message.deleted.pural=Circles of Trust deleted.
authDomain.message.deleted={0} was/were removed.
authentication.domain.updated=Circle of Trust profile was updated.
authentication.domain.create.message={0} was created
breadcrumbs.federation.authdomains=Federation
saml2.label=SAMLv2
################################################################################
#
# SAMLv2 Properties
#
################################################################################
samlv2.attribute.label.EncryptDetails=Encryption
#IDP
samlv2idp.attribute.label.IDPMetaAlias=MetaAlias
samlv2idp.attribute.label.IDPMetaAlias.help=The MetaAlias attribute is specific to providers using OpenAM therefore, a null value for a remote provider configuration is possible.
samlv2idp.provider.section.title.idpcommonServices=IDP Service Attributes
samlv2idp.provider.section.title.nameidformat=NameID Format
samlv2idp.provider.section.title.signnencrypt=Signing and Encryption
samlv2idp.provider.section.title.remsignnencrypt=Signing and Encryption
samlv2idp.provider.section.title.federation=Auto Federation
samlv2idp.provider.section.title.basicauth=Basic Authentication
samlv2idp.provider.section.title.authcont=Authentication Context
samlv2idp.provider.section.title.bootstrap=Bootstrapping
samlv2idp.provider.section.title.assertion=Assertion Time
samlv2idp.provider.section.title.spcommonServices=SP Service Attributes
samlv2idp.attribute.label.protocolsupportenumeration=Protocol Support Enumeration
samlv2idp.attribute.label.artifactresolution=Artifact Resolution Service
samlv2idp.attribute.label.singlelogout=Single Logout Service
samlv2idp.attribute.label.httpredirectsinglelogout=HTTP-REDIRECT
samlv2idp.attribute.label.httpredirectresplocation=Response Location
samlv2idp.attribute.label.managenameid=Manage NameID Service
samlv2idp.attribute.label.httpredirectmanagenameidserviceresplocation=Response Location
samlv2idp.attribute.label.singlesignon=Single SignOn Service
samlv2idp.attribute.label.httpredirectsinglesignon=HTTP-REDIRECT
samlv2.attribute.label.keysize=Key Size
samlv2.attribute.label.algorithm=Algorithm
samlv2idp.attribute.label.signcertialias=Certificate Aliases
samlv2idp.attribute.label.nameidlist=NameID Format List
samlv2idp.attribute.label.nameIDFormatMap=NameID Value Map
samlv2idp.attribute.label.idpAccountMapper=Account Mapper
samlv2idp.attribute.label.idpDisableNameIDPersistence=Disable NameID Persistence
samlv2idp.attribute.label.idpAttributeMapper=Attribute Mapper
samlv2idp.attribute.label.idpattributeMap=Attribute Map
help.signing=Select the checkbox for each request/response that should be signed
samlv2idp.attribute.label.idpwantauthnrequestssigned=Authentication Request
samlv2idp.attribute.label.idpwantartifactresolvesigned=Artifact Resolve
samlv2idp.attribute.label.idpwantlogoutrequestsigned=Logout Request
samlv2idp.attribute.label.idpwantlogoutresponsesigned=Logout Response
samlv2idp.attribute.label.idpwantmnirequestsigned=Manage Name ID Request
samlv2idp.attribute.label.idpwantmniresponsesigned=Manage Name ID Response
samlv2idp.attribute.label.idpwantnameidencrypted=NameID Encryption
samlv2idp.attribute.label.idpdiscoveryBootstrappingEnabled=Discovery Bootstrapping
samlv2idp.attribute.label.idpassertionEffectiveTime=Effective Time
samlv2idp.attribute.label.idpassertionnotbeforetimeskew=Not-Before Time Skew
samlv2.idp.property.updated=SAMLv2 Identity Provider properties are updated
samlv2idp.attribute.label.localConfiguration=Local Configuration
samlv2idp.attribute.label.authUrl=Auth URL
samlv2idp.attribute.label.RpUrl=Reverse Proxy URL
samlv2idp.attribute.label.nameIDMappingService=NameID Mapping
samlv2idp.provider.section.title.assertioncache= Assertion Cache
samlv2idp.attribute.label.appLogoutUrl=External Application Logout URL
samlv2idp.attribute.help.idpappLogoutUrl=This is the logout URL for an external application. Once the server receives logout request from the remote partner, a request will be sent to the logout URL using back channel HTTP POST with all cookies. Optionally, a user session property could be sent as HTTP header and POST parameter if a query parameter "appsessionproperty" (set to the session property name) is included in the URL. e.g. "http://www.app.domain.com/uri/logout?appsessionproperty=mail".
#ECP
samlv2idp.attribute.label.ecp=ECP Configuration
samlv2idp.attribute.label.ecp.idpECPSessionMapper=IDP Session Mapper
#SAE
samlv2idp.attribute.label.sae=SAE Configuration
#Relay State URL List IDP
samlv2idp.attribute.label.relayState=Relay State URL List
samlv2idp.attribute.label.relayState.relayStateUrlList= Relay State URL List
#IDPAdapter
samlv2idp.attribute.label.idpadapter=IDP Adapter
samlv2idp.attribute.label.idpadapter.IDPAdapterClass=IDP Adapter Class
samlv2idp.attribute.help.IdpIDPAdapter=The name of the IDP Adapter class; this class is invoked immediately before the SAML2 response is sent.
#SP
samlv2idp.attribute.label.SPMetaAlias=MetaAlias
samlv2idp.attribute.label.SPMetaAlias.help=The MetaAlias attribute is specific to providers using OpenAM therefore, a null value for a remote provider configuration is possible.
samlv2sp.provider.section.title.idpproxy=IDP Proxy
samlv2sp.attribute.label.idpProxyList=IDP Proxy List
samlv2sp.attribute.label.spauthnrequestssigned=Authentication Requests Signed
samlv2sp.attribute.label.spwantassertionssigned=Assertions Signed
samlv2sp.attribute.label.protocolsupportenumeration=Protocol Support Enumeration
samlv2sp.attribute.label.httpredirectsinglelogout=HTTP-REDIRECT
samlv2sp.attribute.label.httpredirectresplocation=Response Location
samlv2sp.attribute.label.httpredirectmanagenameidservice=HTTP-REDIRECT
samlv2sp.attribute.label.httpredirectmanagenameidserviceresplocation=Response Location
samlv2sp.attribute.label.soapmanagenameidserviceresplocation=Response Location
samlv2sp.attribute.help.addRemoveNameIdFormat=These are the available list of NameIdFormats
samlv2idp.attribute.label.artifactassertconsumerservice=Assertion Consumer Service
label.artifact=Artifact
label.post=Post
samlv2sp.attribute.label.introidpproxy=Introduction
samlv2sp.attribute.label.useproxyidpfinder=Use IDP Finder
samlv2sp.attribute.label.idpproxy=IDP Proxy
samlv2sp.attribute.label.alwaysIdpProxy=Proxy all requests
samlv2sp.attribute.label.idpProxyCount=Proxy Count
samlv2sp.attribute.label.encryptionCertAlias=Encryption
samlv2sp.attribute.label.spbasicauthuser=User Name
samlv2sp.attribute.label.sptransientUser=Transient User
samlv2sp.attribute.label.spAccountMapper=Account Mapper
samlv2sp.attribute.label.spuseNameidasspUserID=Use Name ID as User ID
samlv2sp.attribute.label.spAttributeMapper=Attribute Mapper
samlv2sp.attribute.label.spattributeMap=Attribute Map
samlv2sp.attribute.label.spAdapterEnv=Adapter Environment
samlv2sp.attribute.label.spDoNotWriteFederationInfoSection=NameID Format urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified and Federation info persistance
samlv2sp.attribute.label.spDoNotWriteFederationInfo=Disable NameID persistence
samlv2sp.attribute.label.spsaml2authmodulename=Authentication Module Name
samlv2sp.attribute.label.splocalauthurl=Local Authentication Url
samlv2sp.attribute.label.spintermediateurl=Intermediate Url
samlv2sp.attribute.label.spdefaultrelaystate=Default Relay State URL
samlv2sp.attribute.label.spassertiontimeskew=Assertion Time Skew
samlv2idp.attribute.label.encrypted=Encryption
samlv2sp.attribute.label.spwantartifactresponsesigned=Artifact Response Signed
samlv2sp.attribute.label.spwantlogoutrequestsigned=Logout Request Signed
samlv2sp.attribute.label.spwantlogoutresponsesigned=Logout Response Signed
samlv2sp.attribute.label.spwantmnirequestsigned=Manage Name ID Request Signed
samlv2sp.attribute.label.spwantmniresponsesigned=Manage Name ID Response Signed
samlv2sp.attribute.label.spwantpOSTresponseSigned=Post Response Signed
samlv2.sp.property.updated=SAMLv2 Service Provider properties are updated
samlv2sp.attribute.label.spArtMsgEncoding=Artifact Message Encoding
samlv2.sp.provider.table.title.assertionconsumerservice=Assertion Consumer Service
samlv2.sppacse.help.SpAssertionConsumerService=Location denotes the URL to accept the respective request type. Index denotes the index of the URL in the standard metadata.
samlv2sp.attribute.help.SPuseNameIDAsSPUserID=Use value of Name ID from the incoming Assertion to find the local user as the final resort, if other means do not apply
samlv2sp.attribute.help.hosted.spDoNotWriteFederationInfo=Instructs the SP to not persist the SAML NameID into the \
User Data Store when the NameID Format is not urn:oasis:names:tc:SAML:2.0:nameid-format:persistent in the received \
Assertion and the Account Mapper has identified the local user. When local authentication is utilized for account \
linking purposes, enabling this feature will require end-users to locally authenticate for each SAML-based login.
samlv2sp.attribute.help.remote.spDoNotWriteFederationInfo=Instructs the hosted IdP to not persist the NameID into the \
User Data Store when the NameID Format is not urn:oasis:names:tc:SAML:2.0:nameid-format:persistent in the Assertion.
#authentication Context
samlv2.entityDescriptor.provider.section.title.authenticationContext=Authentication Context
samlv2.entityDescriptor.provider.table.title.authenticationContexts=Authentication Context
samlv2.entityDescriptor.provider.attribute.label.defaultAuthenticationContext=Default Authentication Context
samlv2.sp.attribute.label.spAuthncontextClassrefMapping=Class Reference Mapping
samlv2.sp.attribute.label.spAuthncontextComparisonType=Comparison Type
samlv2.sp.authenticationContext.table.name.contextReference.name=Context Reference
samlv2.idp.attribute.label.idpAuthncontextClassrefMapping=ClassrefMapping
samlv2.idp.authenticationContext.table.name.contextReference.name=Context Reference
samlv2.authenticationContext.none.label=------ none ------
samlv2.authenticationContext.InternetProtocol.label=InternetProtocol
samlv2.authenticationContext.InternetProtocolPassword.label=InternetProtocolPassword
samlv2.authenticationContext.MobileOneFactorUnregistered.label=MobileOneFactorUnregistered
samlv2.authenticationContext.MobileTwoFactorUnregistered.label=MobileTwoFactorUnregistered
samlv2.authenticationContext.MobileOneFactorContract.label=MobileOneFactorContract
samlv2.authenticationContext.MobileTwoFactorContract.label=MobileTwoFactorContract
samlv2.authenticationContext.PasswordProtectedTransport.label=PasswordProtectedTransport
samlv2.authenticationContext.PreviousSession.label=PreviousSession
samlv2.authenticationContext.SmartcardPKI.label=SmartcardPKI
samlv2.authenticationContext.SoftwarePKI.label=SoftwarePKI
samlv2.authenticationContext.NomadTelephony.label=NomadTelephony
samlv2.authenticationContext.PersonalTelephony.label=PersonalTelephony
samlv2.authenticationContext.AuthenticatedTelephony.label=AuthenticatedTelephony
samlv2.authenticationContext.SecureRemotePassword.label=SecureRemotePassword
samlv2.authenticationContext.TimeSyncToken.label=TimeSyncToken
samlv2.authenticationContext.unspecified.label=unspecified
samlv2.authenticationContext.key.option.level=Authentication Level
samlv2.authenticationContext.key.option.resourceURL=Resource URL
samlv2.none.label=- none -
samlv2.exact.label=exact
samlv2.minimum.label=minimum
samlv2.maximum.label=maximum
samlv2.better.label=better
samlv2.sp.attribute.label.spincludereqauthnctx=Include Request Authentication Context
samlv2sp.authnctx.help.spIncludeReqAuthnContext=Enable to include the Requested Authentication Context in the Authentication Request, enabled by default.
#ECP
samlv2sp.attribute.label.ecp=ECP Configuration
samlv2sp.attribute.label.ecp.ECPRequestIDPListFinderImpl=Request IDP List Finder Implementation
samlv2sp.attribute.label.ecp.ECPRequestIDPListGetComplete=Request IDP List Get Complete
samlv2sp.attribute.label.ecp.ECPRequestIDPList=Request IDP List
#SAE
samlv2sp.attribute.label.sae=SAE Configuration
samlv2sp.attribute.label.sae.saeSPLogoutUrl=SP Logout URL
samlv2sp.attribute.label.sae.saeAppSecretList=Application Security Configuration
#Relay State URL List SP
samlv2sp.attribute.label.relayState=Relay State URL List
samlv2sp.attribute.label.relayState.relayStateUrlList= Relay State URL List
#Session Sync between IDP and SP
samlv2.attribute.label.SessionSyncEnabled=Session Synchronization
samlv2.attribute.label.help.idpSessionSyncEnabled=If this is enabled, when a session times out, the Identity Provider notifies all Service Providers to log out. A session may time out, for example, when max-idle time or max-session time is reached.
samlv2.attribute.label.help.spSessionSyncEnabled=If this is enabled, when a session times out, the Service Provider notifies all Identity Providers to log out. A session may time out, for example, when max-idle time or max-session time is reached.
# IDP Finder Implementation
samlv2.attribute.label.enableidpfinderforallsps=Enable Proxy IDP Finder for all SPs
samlv2.attribute.label.help.enableProxyIDPFinderForAllSPs=If this is enabled the proxy idp finder will be enabled for all the remote SPs regardless of what they have configured in their extended metadata
samlv2idp.attribute.label.proxy.idpfinderimplementation=IDP Finder Implementation
samlv2.attribute.label.proxyidpfinderimplementation=IDP Finder Implementation
samlv2idp.attribute.label.proxy.idpfinderjsp=IdP Finder JSP
samlv2idp.attribute.help.proxyIDPFinderJSP=Specify the JSP that will present the IdP List to the user, if required by the class implementation (example: proxyidpfinder.jsp)
samlv2idp.attribute.label.proxy.idpfinderclass=IDP Finder implementation class
samlv2idp.attribute.help.proxyIDPFinderClass=Defines an implementation class for the Proxy IDP Finder SPI. The implementation is used to find a preferred IdP to send the proxied Authentication Request
#XACML
samlv2.entityDescriptor.provider.attribute.label.providerLocation=Provider Location
samlv2.entityDescriptor.provider.attribute.label.protocolSupportEnum=Protocol Support Enumeration
samlv2.entityDescriptor.provider.attribute.label.Signing.KeyAlias=Signing Key Alias
samlv2.entityDescriptor.provider.attribute.label.Encryption.KeyAlias=Encryption Key Alias
samlv2.entityDescriptor.provider.attribute.label.basicAuth=Basic Authorization
samlv2.entityDescriptor.provider.attribute.label.wantXACMLAuthzDecisionQuerySigned=Authorization Decision Query Signed
samlv2.entityDescriptor.provider.attribute.label.wantXACMLAuthzDecisionResponseSigned=Authorization Decision Response Signed
samlv2.entityDescriptor.provider.attribute.label.wantAssertionEncrypted=Assertion Encrypted
samlv2.entityDescriptor.provider.attribute.label.XACMLAuthzService=Authorization Service
samlv2.entityDescriptor.pep.provider.attribute.help.protocolSupportEnum=Defines protocol specification supported by this PEP provider.
samlv2.entityDescriptor.pdp.provider.attribute.help.protocolSupportEnum=Defines protocol specification supported by this PDP provider.
samlv2.entityDescriptor.provider.attribute.help.Signing.KeyAlias=Defines the key alias that is used to sign requests and responses.
samlv2.entityDescriptor.provider.attribute.help.Encryption.KeyAlias=Defines the key alias to XACML encryption.
samlv2.entityDescriptor.provider.attribute.help.basicAuth=Basic authorization can be enabled to protect SOAP endpoints. Any provider accessing these endpoints must have the user and password defined in the following two properties: User Name and Password.
samlv2.entityDescriptor.provider.attribute.help.wantXACMLAuthzDecisionQuerySigned=When enabled, this attribute enforces that all queries be signed for the XACML authorization decision.
samlv2.entityDescriptor.provider.attribute.help.wantXACMLAuthzDecisionResponseSigned=When enabled, this attribute enforces that all response be signed for the XACML authorization decision.
samlv2.entityDescriptor.provider.attribute.help.XACMLAuthzServiceLocation=This attribute defines the type (binding) of the authorization request, and the URL endpoint for receiving the request. By default, the binding type is SOAP.
samlv2.entityDescriptor.provider.attribute.help.wantAssertionEncrypted=When enabled, this attribute enforces that all assection be encrypted.
samlv2.entityDescriptor.provider.pdp.updated=SAMLv2 XACML PDP properties are updated
samlv2.entityDescriptor.provider.pep.updated=SAMLv2 XACML PEP properties are updated
#Authority
samlv2idp.attribute.label.signandencrypt=Signing and Encryption
samlv2idp.attribute.label.attributeservice=Attribute Service
samlv2sp.attribute.label.supportsx=Supports X.509
samlv2idp.attribute.label.idpattributeProfile=Attribute Profile
samlv2idp.attribute.label.idpdefaultattributeAuthorityMapper=Attribute Authority Mapper
samlv2idp.attribute.label.idpdefattriAuthMapper=Default Mapper
samlv2idp.attribute.label.idpx509attrAuthMapper=X.509 Mapper
samlv2idp.attribute.label.idpx509SubjectDataStoreAttrName=Subject Data Store
samlv2idp.provider.section.title.certalias=Cert Aliases, Signing and Encryption
samlv2idp.attribute.label.assertionIDRequestService=AssertionID Request
samlv2.attrauth.property.updated=SAMLv2 Attribute Authority properties are updated
samlv2idp.attribute.label.authnqueryservice=Authn Query Service URL
samlv2.authnauth.property.updated=SAMLv2 Authn Authority properties are updated
samlv2.attrquery.property.updated=SAMLv2 Attribute Query properties are updated
samlv2.attribute.label.metaAlias=Metaalias
samlv2.affiliation.property.updated=SAMLv2 Affiliation properties are updated
#inline help
samlv2.attributeauth.help.SubjectDataStoreAttrName=Attribute name which contains X.509 subject DN
samlv2.attributeauth.help.AttributeProfile=Only this profile is supported for both Basic and X.509 binding
samlv2.attributeauth.help.uriAssertionIDRequest=Mapping to find the matching assertion corresponding to assertion ID
samlv2.authnauth.help.authnQueryServLocation=URL which accepts authentication query request
samlv2.authnauth.help.secassertionIDRequestMapper=SPI implementation class to checks if the assertion requester using this URI is valid
samlv2.attributequery.help.attrnameidlist=Specifies NameIDFormats supported by attribute query requester
samlv2.spac.help.nameidlist=List of nameid formats the requestor will use to contact. Order listed shows the order of preference
samlv2.spac.help.tblAuthenticationContext=Defines mapping between IDP authentication context reference and authentication level to be set on SP side session
samlv2.spac.help.basicAuthentication=Configure basic authentication setting for Soap based binding
samlv2sp.attribute.help.SPAttributeMap=This mapping is the configuration used by the Attribue Mapper. Mapping should be defined as SAML ATTRIBUTE NAME=PROFILE ATTRIBUTE NAME in assertion. Example: EmailAddress=mail, Address=postaladdress.
samlv2sp.attribute.help.SPAutofedEnabled=Enable Auto Federation if not already federated
samlv2sp.attribute.help.SPAutofedAttribute=This attribute is used to find the local user to auto federate with from the value of the attribute in the Assertion. If the attribute is not present in the Assertion then the value of the NameID is used instead. If there is a mapping defined for this attribute, it will be used along with the value when searching for the local user. If the local user can not be found and Dynamic or Ignored Profile is enabled, the value will be used as the local user's UID instead.
samlv2sp.attribute.help.SPAccountMapper=Helps to find the user on local side based on incoming assertion
samlv2sp.attribute.help.SPTransientUser=Can be null. If specified this will be the mapped SP user incase of transient federation
samlv2sp.attribute.help.SPlocalAuthURL=For local authentication
samlv2sp.attribute.help.SPintermediateUrl=This is the intermediate point that SP will redirect to before the final relay state
samlv2sp.attribute.help.SPdefaultRelayState=This is the default relay state URL that the SP will redirect to, in case there is no relay state specified in the response
samlv2sp.attribute.help.SPAdapter=Implementation class for the SAML2ServiceProviderAdapter which is used to add application specific processing logic during federation process
samlv2sp.attribute.help.SPECPRequestIDPListFinderImpl=Implementation class of the IDP list finder SPI. This returns a list of preferred IDPs trusted by the ECP
samlv2sp.attribute.help.SPECPRequestIDPListGetComplete=Specify an URI reference that can be used to retrieve the complete IDP list if the IDPList element is not complete
samlv2sp.attribute.help.SPECPRequestIDPList=Defines a list of IDPs for the ECP to contact. This is used by the default implementation of the IDP Finder
samlv2sp.attribute.help.SPenableIDPProxy=Enable IDP Proxy if not enabled
samlv2sp.attribute.help.SPalwaysIdpProxy=Always proxy requests
samlv2sp.attribute.help.SPalwaysIdpProxy.txt=When this option is enabled, the IdP will proxy every single authentication request no matter it contains the Scoping element or not. Note: always proxy mode requires IDP Proxy to be enabled.
samlv2sp.attribute.help.SPidpProxyCount=Number of IDP proxies that the SP can have
samlv2sp.attribute.help.SPidpProxyList=A list of preferred IDPs that the SP would proxy to
samlv2sp.attribute.help.SAESPUrl=URL endpoint on Service Provider that can handle SAE requests. If this URL is empty (not configured), SAE single sign-on will not be enabled. Normal samlv2 single sign-on response will be sent to SP.
samlv2sp.attribute.help.saeSPLogoutUrl=URL endpoint on the Service Provider that can handle SAE global logout requests.
samlv2sp.attribute.help.saeAppSecretList.0=Each application should have one entry using the one of following formats:
samlv2sp.attribute.help.saeAppSecretList.1=\u25cf url= < SPAppURL > |type=symmetric|secret= < encoded_shared_secret >
samlv2sp.attribute.help.saeAppSecretList.2=\u25cf url= < SPAppURL > |type=symmetric|secret= < encoded_shared_secret > |encryptionalgorithm= < enc_alg > |encryptionkeystrength= < enc_strength >
samlv2sp.attribute.help.saeAppSecretList.3=\u25cf url= < SPAppURL > |type=asymmetric|privatekeyalias= < SP_signing_cert_alias >
samlv2sp.attribute.help.saeAppSecretList.4=\u25cf url= < SPAppURL > |type=asymmetric|privatekeyalias= < SP_signing_cert_alias > |encryptionalgorithm= < enc_alg > |encryptionkeystrength= < enc_strength > |pubkeyalias= < SPApp_public_key_alias >
samlv2sp.attribute.help.saeAppSecretList.5=The privatekeyalias attribute can be omitted if the signing cert alias is already configured in the Service Provider metadata configuration.
samlv2idp.attribute.help.nameidmap=Defines mapping between the Name ID format and user's profile attribute. Example urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress=mail. If the defined Name ID format is used in protocol, the profile attribute value will be used as NameID value for the format in the Subject.
samlv2idp.attribute.help.nameidlist=List of nameid formats the requestor will use to contact. Order listed shows the order of preference
samlv2.idpac.help.IdpAuthncontextMapper=Defines mapping between SP requested Authentication Context Reference and IDP authentication scheme and authentication level.
samlv2idp.IDPAassertionNotBeforeTimeSkew.help.inSeconds=Is in seconds. This is the skew time for NotBefore attributes in assertion
samlv2.idpassertionEffectiveTime.help.inSeconds=Is in seconds. Validity time of assertion for NotAfter attributes
samlv2.idpac.help.assertioncache=Enable assertion cache
samlv2.idpac.help.IDPdiscoveryBootstrappingEnabled=When selected, Bootstrapping Discovery Service Resource Offering will be generated for IDWSF.
samlv2idp.attribute.help.IdpAttributeMap=This mapping is the configuration used by the Attribute Mapper. The mapping should be defined as [NameFormatURI|]SAML ATTRIBUTE NAME=PROFILE ATTRIBUTE NAME in assertion. Example: EmailAddress=mail, Address=postaladdress, urn:oasis:names:tc:SAML:2.0:attrname-format:uri|urn:mace:dir:attribute-def:cn=cn The mapper also allows for static values to be defined. To define a static value, enclose the profile attribute name in double quotes. Example: partnerID="staticPartnerIDValue", urn:oasis:names:tc:SAML:2.0:attrname-format:uri|nameID="staticNameIDValue". To flag an attribute as being a binary value and have its value Base64 encoded, add ;binary to the end of the profile attribute name. Example: photo=photo;binary, urn:oasis:names:tc:SAML:2.0:attrname-format:uri|photo=photo;binary
samlv2idp.attribute.help.idpAccountMapper=Used to generate Name Identifier in Single Sign-on assertion and find user's identity from incoming request.
samlv2idp.attribute.help.idpDisableNameIDPersistence=Disables the persistence of the NameID values into the User Data \
Store for non-persistent NameID-Formats. Note that by preventing the storage of the NameID values, the ManageNameID \
and the NameIDMapping SAML profiles will no longer work when using non-persistent NameID-Formats. Existing account \
links that have been established (and persisted) previously, will not be removed when enabling this feature.
samlv2sp.attribute.help.SAEIDPUrl=URL endpoint on the Identity Provider that can handle SAE requests.
samlv2idp.attribute.help.saeAppSecretList.0=Each application should have one entry using the one of following formats:
samlv2idp.attribute.help.saeAppSecretList.1=\u25cf url= < IDPAppURL > |type=symmetric|secret= < encoded_shared_secret >
samlv2idp.attribute.help.saeAppSecretList.2=\u25cf url= < IDPAppURL > |type=symmetric|secret= < encoded_shared_secret > |encryptionalgorithm= < enc_Alg > |encryptionkeystrength= < enc_strength >
samlv2idp.attribute.help.saeAppSecretList.3=\u25cf url= < IDPAppURL > |type=asymmetric|pubkeyalias= < IDPApp_signing_cert >
samlv2idp.attribute.help.saeAppSecretList.4=\u25cf url= < IDPAppURL > |type=asymmetric|pubkeyalias= < IDPApp_signing_cert > |encryptionalgorithm= < enc_Alg > |encryptionkeystrength= < enc_strength >
samlv2idp.attribute.help.idpAuthUrl=URL to redirect for user authentication if required
samlv2idp.attribute.help.idpRpUrl=URL of the Reverse Proxy where the SAML endpoints are available
samlv2idp.attribute.help.idpRpUrl.txt=Used when the SAML endpoints are reverse proxied to a host not part of the OpenAM servers/sites, typically this would be the DAS's domain
samlv2sp.attribute.help.IdpECPSessionMapper=Defines an implementation class for the session mapper SPI. The mapper finds a valid session from HTTP servlet request on IDP with ECP profile.
samlv2idp.attribute.label.none=--None--
################################################################################
#
# Wsfed Properties
#
################################################################################
wsfed.attribute.page.title=General Properties Page
wsfedgen.attribute.label.description=Description
wsfedgen.attribute.label.protocol=Protocol
wsfed.attribute.label.tokenIssuerName=Token Issuer Name
wsfed.attribute.label.tokenIssuerEndpoint=Token Issuer Endpoint
wsfedsp.attribute.label.spdispname=SP Display Name
wsfedsp.attribute.label.idpdispname=IDP Display Name
wsfedsp.attribute.label.wreply.wreplyList=Valid WReply List
wsfedidp.attribute.page.title=Identity Provider Properties Page
wsfedidp.attribute.label.dispname=Display Name
wsfedidp.attribute.label.idpassertionEffectiveTime=Assertion Effective Time
wsfedidp.attribute.label.idpAccountMapper=Account Mapper
wsfedidp.attribute.label.idpAttributeMapper=Attribute Mapper
wsfedidp.attribute.label.idpattributeMap=Attribute Map
wsfedidp.attribute.label.idptokenTypesOffered=Token Types Offered
wsfedidp.attribute.label.idpclaimTypesOffered=Claim Types
wsfedidp.attribute.label.idpclaimTypeOffered=Claim Types
wsfedidp.attribute.label.claimtypeDisplayName=Display Name
wsfedidp.attribute.label.claimtypeDisplayDescr=Description
wsfedidp.attribute.label.wreply.wreplyList=Valid wreply List
wsfed.idp.label1=UPN
wsfed.idp.label2=Email Address
wsfed.idp.label3=Common Name
wsfedsp.attribute.label.spassertionsigned=Assertion Signed
wsfedsp.attribute.label.sphomerealmdiscoveryservice=Home Realm Discovery Service
wsfedsp.attribute.page.title=Service Provider Properties Page
wsfedsp.attribute.label.dispname=Display Name
wsfedsp.attribute.label.spassertionEffectiveTime=Assertion Effective Time
wsfedsp.attribute.label.spAccountMapper=Account Mapper
wsfedsp.attribute.label.spAttributeMapper=Attribute Mapper
wsfedsp.attribute.label.spattributeMap=Attribute Map
wsfedsp.attribute.label.spDefaultRelayState=Default Relay State
wsfedsp.attribute.label.spassertionTimeSkew=Assertion Time Skew
label.cookie=cookie
label.UserAgentKey=UserAgentKey
wsfedsp.attribute.label.acctrealmcookiename=Account Realm Cookie Name
wsfedsp.attribute.label.useragentkey=User Agent Key
wsfed.general.property.updated = WSFED General properties are updated
wsfed.sp.property.updated = WSFED Service Provider properties are updated
wsfed.idp.property.updated = WSFED Identity Provider properties are updated
wsfedidp.provider.section.title.signcertalias=Signing Cert Alias
wsfedidp.provider.section.title.claimtypes=Claim Types
wsfedidp.provider.section.title.acctmapper=Account Mapper
wsfedidp.provider.section.title.attrMapper=Attribute Mapper
wsfedidp.provider.section.title.asserefftime=Assertion Effective Time
wsfedidp.provider.section.title.wreply=Valid wreply List
wsfedsp.provider.section.title.assertionsigned=Assertion Signed
wsfedsp.provider.section.title.spassertimeskew=Assertion Skew Time
wsfedsp.provider.section.title.defaultrelaystate=Default Relay State
wsfedsp.provider.section.title.sphomeRealmDisc=Home Realm Discovery
wsfedsp.provider.section.title.spacctrealmselection=Account Realm Selection
wsfedsp.provider.section.title.help.acctmapper=Helps to find the user on local side based on incoming assertion
wsfedsp.provider.section.title.help.spattributeMap=This mapping is the configuration used by the Attribue Mapper. Mapping should be defined as ASSERTION ATTRIBUTE NAME=LOCAL PROFILE ATTRIBUTE NAME. Example: EmailAddress=mail, Address=postaladdress
wsfedsp.provider.section.title.help.asserefftime=Validity time of assertion for NotAfter attributes
wsfedsp.provider.section.title.help.spassertionTimeSkew=This is the skew time for NotBefore attributes in assertion
wsfedsp.provider.section.title.help.defaultrelaystate=This is the default relay state URL that the SP will redirect to, in case there is no relay state specified in the response
wsfedsp.provider.section.title.help.sphomeRealmDisc=Helps in determining the location of the Identity Provider.
wsfedsp.provider.section.title.help.acctRealmSelection=Specify Identity Provider selection mechanism and configuration. Either cookie or HTTP request header attribute can be used to find the Identity Provider.
wsfed.provider.section.title.help.idpAccountMapper=Used to generate Name Identifier in Single Sign-on assertion and find user's identity from incoming request
wsfed.provider.section.title.help.idpattributeMap=This mapping is the configuration used by the Attribue Mapper. Mapping should be defined as SAML ASSERTION ATTRIBUTE NAME=PROFILE ATTRIBUTE NAME in assertion. Example: EmailAddress=mail, Address=postaladdress
wsfed.provider.section.title.help.idpassertionEffectiveTime=This is the validity time of assertion
wsfedidp.provider.section.title.nameidDomain=Name Identifier and Mappings
wsfedidp.attribute.label.idpNameIDFormat=Name ID Format
wsfedidp.attribute.label.idpnameIDAttribute=Name ID Attribute
wsfed.attribute.label.idpnameincludesDomain=Name Includes Domain
wsfedidp.attribute.label.idpdomainAttribute=Domain Attribute
wsfedidp.attribute.label.idpupnDomain=UPN Domain
wsfed.provider.section.title.help.idpnameIdpFormatMap=nameId format URI - defaults to UPN
wsfed.provider.section.title.help.idpNameIDAttribute=user profile attribute whose value is to be used as the outgoing nameId - if not set, defaults to short user id "uid" (i.e. current functionality);
wsfed.provider.section.title.help.idpdomainAttribute=user profile attribute whose value is to be used as the domain for user principal name (UPN) - no default - should be of the form example.com
wsfed.provider.section.title.help.idpupnDomain=UPN domain - no default
wsfed.provider.section.title.help.idpnameIncludesDomain=(boolean) does the user profile attribute includes the domain? Defaults to false - i.e. we must append '@' and the domain.
wsfed.provider.section.title.help.spNameIDAttribute=attribute to be used in search for match on incoming nameId - if not set, defaults to short user id "uid" (current functionality)
wsfed.provider.section.title.help.spnameIncludesDomain=whether the nameId in the user's profile includes the domain - defaults to false
wsfed.provider.section.title.help.spdomainAttribute=attribute to be used in search for match on incoming domain for UPN - no default
################################################################################
#
# Discovery Service
#
################################################################################
discovery.service.table.providerResourceIdMapper.name=Classes for ResourceID Mapper Plug-in
discovery.service.table.providerResourceIdMapper.noentries=There are no resource ID mapping.
discovery.service.providerResourceIdMapper.create.page.title=New Resource ID Mapping.
discovery.service.providerResourceIdMapper.edit.page.title=Edit Resource ID Mapping.
discovery.service.providerResourceIdMapper.missing.idmapper.message=ID Mapper is required.
discovery.service.providerResourceIdMapper.missing.providerId.message=Provider ID is required.
discovery.service.table.bootstrapResourceOffering.name=Resource Offerings for Bootstrapping
discovery.service.table.bootstrapResourceOffering.noentries=There are no resource offerings
discovery.service.table.bootstrapResOff.abstract=Description
discovery.service.table.bootstrapResOff.resourceId=Resource ID Attribute
discovery.service.table.bootstrapResOff.resourceIdValue=Resource ID Value
discovery.service.serverList.create.page.title=New Resource Offering.
discovery.service.serverList.edit.page.title=Edit Resource Offering.
discovery.service.table.entry.deleted=Resource Offering was deleted.
discovery.service.table.entry.deleted.pural=Resource Offerings were deleted.
discovery.service.table.bootstrapResOff.section.serviceInstance=Service Instance
discovery.service.table.bootstrapResOff.serviceType=Service Type
discovery.service.table.bootstrapResOff.serviceType.help=URI defining the type of service this service instance implements.
discovery.service.table.bootstrapResOff.providerID.help=URI of the provider of the service instance.
discovery.service.table.bootstrapResOff.securityMechID=Service Description
discovery.service.table.bootstrapResOff.securityMechID.help=It is required to define 1 or more service descriptions.
discovery.service.table.bootstrapResOff.securityMechID.noentries=There are no descriptions defined.
discovery.service.table.bootstrapResOff.section.resourceOfferingOptions=Resource Offering Options
discovery.service.table.bootstrapResOff.resourceOfferingOptionsOptions.label=Service has no options to advertise.
discovery.service.table.bootstrapResOff.lblResourceOfferingOptionsRefsFor=Description ID Refs For
discovery.service.table.bootstrapResOff.lblResourceOfferingOptionsDirectivesGenerateBearerToken.label= GenerateBearerToken
discovery.service.table.bootstrapResOff.lblResourceOfferingOptionsDirectivesAuthenticateRequester.label=AuthenticateRequester
discovery.service.table.bootstrapResOff.lblResourceOfferingOptionsDirectivesEncryptResourceID.label=EncryptResourceID
discovery.service.table.bootstrapResOff.lblResourceOfferingOptionsDirectivesAuthenticateSessionContext.label=AuthenticateSessionContext
discovery.service.table.bootstrapResOff.lblResourceOfferingOptionsDirectivesAuthorizeRequester.label=AuthorizeRequester
discovery.service.bootstrapResOff.create.page.title=New Resource Offerings
discovery.service.bootstrapResOff.edit.page.title=Edit Resource Offerings
discovery.service.bootstrapResOff.missing.service.desc.message=One or more service descriptions are required.
discovery.service.bootstrapResOff.missing.serviceType.message=Service type is required.
discovery.service.bootstrapResOff.missing.providerId.message=Provider ID is required.
discovery.service.bootstrapResOff.missing.resourceIdValue.message=Resource ID Value is required.
discovery.service.bootstrapResOff.securityMechID.ID=Security Mechanism ID
discovery.service.bootstrapResOff.securityMechID.add.button=New Description ...
discovery.service.table.description.securityMechID=Security Mechanism ID
discovery.service.table.description.concreteServiceDescription.soapHTTP.label=Brief SoapHttp Description
discovery.service.table.description.concreteServiceDescription=Concrete Service Description
discovery.service.description.create.page.title=New Security Mechanism ID
discovery.service.description.edit.page.title=Edit Security Mechanism ID
discovery.service.description.missing.securityMechId.message=One or more security mechanism IDs are required.
discovery.service.table.description.concreteServiceDescription.wsdlServiceNameSpace.label=Service Name Space
discovery.service.table.description.concreteServiceDescription.wsdlServiceLocalPart.label=Service Local Part
discovery.service.description.missing.endPointUrl.message=End Point URL is required.
discovery.service.description.missing.wsdlURI.message=WSDL URI is required.
discovery.service.description.missing.nameSpace.message=WSDL Service Name Space is required.
discovery.service.description.missing.localPart.message=WSDL Service Local Part is required.
title.realm.resource.offering=Discovery Resource Offering
table.realm.resource.offerings.column.service.name=Service Type
table.realm.resource.offering.title=Discovery Resource Offering
table.realm.resource.offering.empty.message=There are no resource offerings.
title.idm.resource.offering=Discovery Resource Offering
table.idm.resource.offerings.column.service.name=Service Type
table.idm.resource.offering.title=Discovery Resource Offering
table.idm.resource.offering.empty.message=There are no resource offerings.
#################################################################################
#
# SOAP Binding Service
#
################################################################################
soapBinding.service.table.requestHandlerList.name=Request Handler List
soapBinding.service.table.requestHandlerList.noentries=There are no request handlers.
soapBinding.service.requestHandlerList.missing.key.message=Key is required.
soapBinding.service.requestHandlerList.missing.class.message=Class is required.
soapBinding.service.requestHandlerList.create.page.title=New Request Handler
soapBinding.service.requestHandlerList.edit.page.title=Edit Request Handler
soapBinding.service.requestHandlerList.duplicate.page.title=Duplicate Request Handler
soapBinding.service.requestHandlerList.already.exist=Request Handler already exist.
#################################################################################
#
# Web Services Personal Profile
#
################################################################################
webservices.personal.profile.supportedContainers.table.header=Supported Containers
webservices.personal.profile.supportedContainers.table.noentries=There are no supported containers.
webservices.personal.profile.missing.supportedContainerName.message=Container name is required.
webservices.personal.profile.supportedContainer.name.label=Container Name
webservices.personal.profile.supportedContainer.create.page.title=New Supported Container
webservices.personal.profile.supportedContainer.edit.page.title=Edit Supported Container
webservices.personal.profile.dsAttributeMapList.table.header=PPLDAP Attribute Map
webservices.personal.profile.dsAttributeMapList.table.noentries=There are no mappings.
webservices.personal.profile.table.dsAttributeMapList.map=LDAP Attribute
webservices.personal.profile.missing.dsAttributeMapList.name.message=Name prefix is required.
webservices.personal.profile.missing.dsAttributeMapList.attribute.message=LDAP Attribute is required.
webservices.personal.profile.dsAttributeMapList.create.page.title=New LDAP Attribute Mapping
webservices.personal.profile.dsAttributeMapList.edit.page.title=Edit LDAP Attribute Mapping
#################################################################################
#
# Web Service Authentication Service
#
################################################################################
webservices.authentication.service.table.handles.name=Mechanism Handlers List
webservices.authentication.service.table.handles.noentries=There are no handlers.
webservices.authentication.service.handlers.missing.key.message=Key is required.
webservices.authentication.service.handlers.missing.class.message=Class is required.
webservices.authentication.service.handlers.create.page.title=New Mechanism Handler
webservices.authentication.service.handlers.edit.page.title=Edit Mechanism Handler
webservices.authentication.service.handlers.duplicates=Handler with that key already exists. Duplicates are not allowed.
breadcrumbs.webservices.personalprofile=Personal Profile
breadcrumbs.webservices.personalprofile.supportedcontainer.add=New Supported Container
breadcrumbs.webservices.personalprofile.supportedcontainer.edit=Edit Supported Container
breadcrumbs.webservices.personalprofile.ds.attributemaplist.add=New LDAP Attribute Map List
breadcrumbs.webservices.personalprofile.ds.attributemaplist.edit=Edit LDAP Attribute Map List
breadcrumbs.webservices.discovery=Discovery Service
breadcrumbs.webservices.resourceOffering=Resource Offering
breadcrumbs.webservices.discovery.bootstrap.resoffering.add=Add Resource Offering for Bootstrapping
breadcrumbs.webservices.discovery.bootstrap.resoffering.edit=Resource Offering for Bootstrapping
breadcrumbs.webservices.discovery.resourceid.mapper.add=New ResourceID Mapper Plug-in
breadcrumbs.webservices.discovery.resourceid.mapper.edit=Edit Class for ResourceID Mapper Plug-in
breadcrumbs.webservices.discovery.description.add=New Discovery Description
breadcrumbs.webservices.discovery.description.edit=Discovery Description
breadcrumbs.webservices.soapbinding=SOAP Binding
breadcrumbs.webservices.soapbinding.requesthandlerlist.add=Add Request Handler
breadcrumbs.webservices.soapbinding.requesthandlerlist.edit=Request Handler
breadcrumbs.webservices.soapbinding.requesthandlerlist.dup=Duplicate Request Handler
breadcrumbs.webservices.authentication=Authentication Service
breadcrumbs.webservices.authentication.mechanism.handler.add=New Mechanism Handler
breadcrumbs.webservices.authentication.mechanism.handler.edit=Mechanism Handler - {0}
breadcrumbs.webservices.security.token.service=Security Token Service
################################################################################
#
# Import Entity Provider
#
################################################################################
import.entity.title=Import Entity Provider
import.entity.help.message=Use this page to import the metadata...
import.entity.missing.metadata=The standard metadata file is required for importing.
import.entity.error=Invalid metadata file.
import.entity.populaterealmdata.error=Incorrect metadata format.
import.standard.metadata.label=Standard metadata Configuration
import.standard.filename.label=File Name
import.extended.metadata.label=Extended metadata Configuration
import.extended.filename.label=File Name
import.entity.metadata.success={0} was/were successfully imported.
button.choose.file=Choose File
import.entity.realm.name.label=Realm Name
import.standard.url.label=URL Location
import.extended.url.label=URL Location
button.upload.file=Upload File
file.uploader.title=Select File to Upload
################################################################################
#
# Web Service Profile
#
################################################################################
web.services.profile.password=Password
web.services.profile.password-confirm=Password (confirm)
web.services.profile.desc=Description
web.services.profile.security-mech-header=Security Mechanism
web.services.profile.securitytokenendpoint=Security Token Service Endpoint
web.services.profile.securitytokenmetadataendpoint=Security Token metadata Endpoint
web.services.exception.securitytoken.info.missing=Security Token Service Endpoint and Security Token Metadata Endpoint are required.
web.services.profile.device-status=Device Status
web.services.client.profile.isrequestsigned=Is Request Signed
web.services.client.profile.isrequestencrypted=Is Request Encrypted
web.services.client.profile.isresponsesigned=Is Response Signature Verified
web.services.client.profile.isresponsedecrypted=Is Response Decrypted
web.services.client.profile.isRequestHeaderEncrypt=Is Request Header Encrypted
web.services.client.profile.publicKeyAlias=Web Service Provider's public key
web.services.client.profile.publicKeyAlias.help=Key to encrypt Web Service Request.
web.services.provider.profile.isresponsesigned=Is Response Signed
web.services.provider.profile.isresponsedecrypted=Is Response Encrypted
web.services.provider.profile.isrequestsigned=Is Request Signature Verified
web.services.provider.profile.isrequestencrypted=Is Request Decrypted
web.services.provider.profile.isRequestHeaderDecrypted=Is Request Header Decrypted
web.services.provider.profile.publicKeyAlias=Web Service Client's public key
web.services.provider.profile.publicKeyAlias.help=Key to encrypt Web Service Response.
web.services.provider.profile.keyType=Key Type for signing and encryption
web.services.profile.keystoreusage=Keystore Usage
web.services.profile.keystoreusage-default=Use Default
web.services.profile.keystoreusage-custom=Use Custom (enter information below)
web.services.profile.keystore-header=Location of Key Store (Mandatory if Use Default Keystore is not checked).
web.services.profile.keystorelocation=Location of Key Store
web.services.profile.keystorepassword=Password of Key Store
web.services.profile.keypassword=Password of Key
web.services.profile.missing-keystore-info=Key Store Location, Password and Key Password are required.
web.services.profile.certalias=Certificate Alias
web.services.profile.username-token-header=Credential for User Token
web.services.profile.forceuserauthn=User Athentication Required
web.services.profile.authenticationchain=Authentication Chain
web.services.profile.preserve-security-header=Preserve Security Headers in Message
web.services.profile.libertyservicetype=Liberty Service Type URN
web.services.profile.wssproxyEndPoint=Web Service Security Proxy EndPoint
web.services.profile.wssproxyEndPoint.help=This end point is optional unless it is configured to use web security proxy.
web.services.profile.wspendpoint=Web Service Endpoint
web.services.profile.wspendpoint.help=This end point is optional unless the web service client is configured to use tokens from STS OR Liberty tokens.
entity.attribute.label.identityType.provider=Web Service Provider
entity.attribute.label.identityType.client=Web Service Client
web.services.profile.username-token-tblheader=Credential for User Token
breadcrumbs.add-web-service-usercred=Add User Credential
breadcrumbs.edit-web-service-usercred=Edit User Credential
breadcrumbs.add-web-service-usercred-mandate-username-password=User name and password are required.
web.services.profile.username-token-no-entries=There are no entries.
web.services.profile.error-user-cred-exists=User name already existed.
web.services.security.token.token.issuance.attributes.section.title=Token Issuance Attributes
web.services.security.token.stsEndPoint=End Point
web.services.security.token.stsEncryptIssuedKey=Encryption Issued Key
web.services.security.token.stsEncryptIssuedToken=Encryption Issued Token
web.services.security.token.stsLifetime=Lifetime for Security Token
web.services.security.token.stsLifetime.inline.help=Time in Milliseconds
web.services.security.token.stsTokenImplClass=Token Implementation class
web.services.security.token.stsCertAlias=Certificate Alias Name
web.services.security.token.stsCertAlias.inline.help=Key to Sign the Security Token
web.services.security.token.clientusertoken=STS End User Token Plugin class
web.services.security.token.Security.Mechanism=Security Mechanism
web.services.security.token.Security.Mechanism.inline.help=Security Token Accepted by STS services.
web.services.security.token.authenticationchain=Authentication Chain
web.services.security.token.user.credential=User Credential
web.services.security.token.user.credential.table.title=User Credential
web.services.security.token.detect.message.replay=Detect Message Replay
web.services.security.token.detect.user.token.replay=Detect User Token Replay
web.services.security.token.user.credential.edit.page.title=User Credential
web.services.security.token.singing.and.encryption.section.title=Signing and Encryption
web.services.security.token.isRequestSign=Is Request Signature Verified
web.services.security.token.isRequestEncryptionEnabled=Is Request Encryption Enabled
global.configuration.sts.is.request.decrypted=Is Request Decrypted
web.services.security.token.isResponseSign=Is Response Signed Enabled
web.services.security.token.SecurityToken=SecurityToken
web.services.security.token.Timestamp=Timestamp
web.services.security.token.MessageID=MessageID
web.services.security.token.isResponseEncrypt=Is Response Encrypted
web.services.security.token.privateKeyAlias=Private Key Alias
web.services.security.token.privateKeyAlias.inline.help=Key to Sign Web Service (WS-Trust) Response.
web.services.security.token.privateKeyType=Private Key Type
web.services.security.token.publicKeyAlias=Public Key Alias of Web Service (WS-Trust) Client
web.services.security.token.publicKeyAlias.inline.help=Key to encrypt Web Service (WS-Trust) Response.
web.services.security.token.kerberos.configuration.section.title=Kerberos Configuration
web.services.security.token.Kerberos.subtitle=Kerberos Configuration
web.services.security.token.KerberosDomainServer=Kerberos Domain Server
web.services.security.token.KerberosDomain=Kerberos Domain
web.services.security.token.KerberosServicePrincipal=Kerberos Service Principal
web.services.security.token.KerberosKeyTabFile=Kerberos Key Tab File
web.services.security.token.isVerifyKrbSignature=Is Verify Kerberos Signature
web.services.security.token.isVerifyKrbSignature.inline.help=This is optional and must be enabled only when JDK6 is used.
web.services.security.token.signingRefType=Signing Reference Type
web.services.security.token.EncryptionAlgorithm=Encryption Algorithm
web.services.security.token.EncryptionStrength=Encryption Strength
web.services.security.token.EncryptionStrength.inline.help=For AES, key strengths of 128, 192, 256 are supported. For 3DES, 0, 112 or 168 are supported.
web.services.security.token.SAMLConfiguration.section.title=SAML Configuration
web.services.security.token.SAMLConfiguration.section.title.inline.help=This SAML configuration is used to request SAML attribute mapping in the generated Security token (SAML Assertion) when this STS behaves as WSP and gets a SAML Token/Assertion generated from another STS.
web.services.security.token.SAMLAttributeMapping=SAML Attribute Mapping
web.services.security.token.SAMLAttributeMapping.inline.help=The SAML attribute mapping for an assertion that is generated for the STS
web.services.security.token.NameIDMapper=NameID Mapper
web.services.security.token.NameIDMapper.inline.help=The SAML NameID Mapper for an assertion that is generated for the STS
web.services.security.token.includeMemberships=Should Include Memberships
web.services.security.token.includeMemberships.inline.help=When enabled, the generated assertion contains user memberships as SAML attributes.
web.services.security.token.attribute.namespace=Attribute Namespace
web.services.security.token.attribute.namespace.inline.help=The SAML Attribute Namespace for an assertion that is generated for STS.
web.services.security.token.token.validation.attributes.section.title=Token Validation Attributes
web.services.security.token.trustedIssuers=Trusted Issuers
web.services.security.token.trustedIPAddresses=Trusted IP Addresses
sts.button.export.policy=Export Policy
page.title.sts.export.policy=Export Policy
import.entity.information.message=This page can be used to create entity providers based on pre-existing metadata files which define an entity provider. The standard metadata file is mandatory. Importing extended metadata must be entered at the same time as the standard metadata. It cannot be imported separately.
button.browse=Browse...
button.upload=Upload...
file.chooser.title=Select File to Import
entity.deleted.message={0} was/were removed.
entity.deleted.failed.message=Errors occurred while trying to delete {0}.
general.error.message=An error occurred during the previous operation.
generic.error.message=An error occurred during the previous operation {0}.
protocol.mismatch=The extended and standard metadata types are not of the same protocol. Check the metadata and try importing again.
federation.SAMLv2General.label=General
federation.SAMLv2General.status=General properties
federation.SAMLv2General.tooltip=Configure this entities General properties
federation.SAMLv2IDP.status=IDP properties
federation.SAMLv2IDP.tooltip=Configure this entities IDP properties
federation.SAMLv2SP.status=SP properties
federation.SAMLv2SP.tooltip=Configure this entities SP properties
federation.SAMLv2PDP.label=XACML PDP
federation.SAMLv2PDP.status=XACML PDP properties
federation.SAMLv2PDP.tooltip=Configure this entities XACML PDP properties
federation.SAMLv2PEP.label=XACML PEP
federation.SAMLv2PEP.status=XACML PEP properties
federation.SAMLv2PEP.tooltip=Configure this entities XACML PEP properties
federation.SAMLv2AttrAuthority.label=Attribute Authority
federation.SAMLv2AttrAuthority.status=SAML Attribute Authority properties
federation.SAMLv2AttrAuthority.tooltip=Configure this entities Attribute Authority related properties
federation.SAMLv2AuthnAuthority.label=Authn Authority
federation.SAMLv2AuthnAuthority.status=SAML Authn Authority properties
federation.SAMLv2AuthnAuthority.tooltip=Configure this entities Authn Authority related properties
federation.SAMLv2AttrQuery.label=Attribute Query
federation.SAMLv2AttrQuery.status=Attribute Query properties
federation.SAMLv2AttrQuery.tooltip=Configure this entities Attribute Query related properties
federation.SAMLv2IDPAssertionContent.label=Assertion Content
federation.SAMLv2IDPAssertionContent.status=Assertion Content properties
federation.SAMLv2IDPAssertionContent.tooltip=Configure this IDP's Assertion Content related properties
federation.SAMLv2IDPAssertionProcessing.label=Assertion Processing
federation.SAMLv2IDPAssertionProcessing.status=Assertion Processing properties
federation.SAMLv2IDPAssertionProcessing.tooltip=Configure this IDP's Assertion Processing related properties
federation.SAMLv2IDPServices.label=Services
federation.SAMLv2IDPServices.status=IDP Services properties
federation.SAMLv2IDPServices.tooltip=Configure this IDP Services related properties
federation.SAMLv2IDPAdvanced.label=Advanced
federation.SAMLv2IDPAdvanced.status=IDP Advanced properties
federation.SAMLv2IDPAdvanced.tooltip=Configure this IDP's Advanced properties
federation.SAMLv2SPAssertionContent.label=Assertion Content
federation.SAMLv2SPAssertionContent.status=Assertion Content properties
federation.SAMLv2SPAssertionContent.tooltip=Configure this SP's Assertion Content related properties
federation.SAMLv2SPAssertionProcessing.label=Assertion Processing
federation.SAMLv2SPAssertionProcessing.status=Assertion Processing properties
federation.SAMLv2SPAssertionProcessing.tooltip=Configure this SP's Assertion Processing related properties
federation.SAMLv2SPServices.label=Services
federation.SAMLv2SPServices.status=IDP Services properties
federation.SAMLv2SPServices.tooltip=Configure this SP Services related properties
federation.SAMLv2SPAdvanced.label=Advanced
federation.SAMLv2SPAdvanced.status=IDP Advanced properties
federation.SAMLv2SPAdvanced.tooltip=Configure this SP's Advanced properties
federation.SAMLv2Affiliate.label=Affiliate
federation.SAMLv2Affiliate.status=Affiliate properties
federation.SAMLv2Affiliate.tooltip=Configure this entities Affiliation related properties
federation.WSFedGeneral.label=General
federation.IDFFGeneral.label=General
federation.IDFFAffiliate.label=Affiliate
SP.label=SP
IDP.label=IDP
Affiliate.label=Affiliate
PEP.label=XACML PEP
PDP.label=XACML PDP
AttrAuthority.label=AttrAuth
AuthnAuthority.label=AuthnAuth
AttrQuery.label=AttrQuery
remote.label=Remote
hosted.label=Hosted
.label=-
unknown.object.type.title=Invalid Entry Selection
unknown.object.type=The selected entry has an unknown type
################################################################################
#
# Work flow
#
################################################################################
page.title.configure.hosted.idp=Create a SAMLv2 Identity Provider on this Server
page.desc.configure.hosted.idp=This page allows you to configure this instance of OpenAM server as an Identity Provider (IDP). You can provide a Name for the provider, Circle of Trust (COT), its metadata of the provider and optionally Signing Certificate. A COT is a group of IDPs and Service Providers (SPs) that trust each other and in effect represents the confines within which all federation communications are performed. Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg SPs) in a COT. We shall generate the metadata if you do not have one. You are required to pick a realm for this provider if there are more than one realm in the system. Otherwise, this provider will be configured under the root realm.
page.title.configure.hosted.sp=Create a SAMLv2 Service Provider on this Server
page.desc.configure.hosted.sp=This page allows you to configure this instance of OpenAM server as a Service Provider (SP). You can provide a Name for the provider; Circle of Trust (COT), its metadata and its attribute mappings. A COT is a group of Identity Providers (IDPs) and SPs that trust each other and in effect represents the confines within which all federation communications are performed. Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg IDPs) in a COT. We shall generate the metadata if you do not have one. You are required to pick a realm for this provider if there are more than one realm in the system. Otherwise, this provider will be configured under the root realm.
configure.provider.label.hasMetaData=Do you have metadata for this provider?
configure.provider.help.hasMetaData=If you are starting from scratch typically you will not have a metadata. Choosing "No" will allow you to create a basic metadata. If you are familiar with metadata specifications for the federation protocol of our choice you may have created metadata XML files manually by following the specification and OpenAM product documentation, in which case you can choose "Yes" to enter the file and its location.
configure.provider.help.realm=Enter the realm this provider belongs to. A realm is a administrative domain in which this provider will be maintained. You must have write privileges in the realm you choose. Default: root realm provided at installation.
configure.provider.label.signing.key=Signing Key
configure.provider.help.signing.key=Keys available in your keystore are listed - choose one to be used as a signing key to sign assertions issued by this IDP. Digitally Signing assertions is the basis of trust between SPs and IDPs in a COT.
configure.provider.help.signing.key.test=Please note "test" is a selfsigned certificate setup at installation for testing purposes. It is recommended you obtain a certificate from a Certificate Authority for production deployments.
configure.provider.label.encryption.key=Encryption Key
configure.provider.help.encryption.key=Keys available in your keystore are listed - choose one to be used as a encryption key to encrypt assertions issued by this IDP. Digitally encrypting assertions provides higher level of security between SPs and IDPs in a COT. Please note "test" is a selfsigned certificate setup at installation for testing purposes. It is recommended you obtain a certificate from a certificate authority for production deployments.
configure.provider.section.meta=metadata
configure.provider.section.cot=Circle of Trust
configure.provider.section.attributesmapping=Attribute Mapping
configure.provider.label.metadata=URL where metadata is located
configure.provider.help.metadata=A metadata file is a XML file (following SAMLv2 specifications) that contains protocol configuration and trust information for a particular entity (SP/IDP) in a COT. You may have received a metadata file from your partner or you may have created one yourself.
configure.provider.help.metadataurl=The URL where the metadata for the remote provider is located. If the remote provider is also hosted on OpenAM, the URL would be "< protocol >://< server-name >:< port >/< OpenAM-deployment-URI >/saml2/jsp/exportmetadata.jsp". For example, if the remote OpenAM is deployed and running on http://openam.example.com:8080/opensso, the metadata URL for the remote provider will be http://openam.example.com:8080/opensso/saml2/jsp/exportmetadata.jsp
configure.provider.label.extendeddata=URL where extended data is located
configure.provider.help.extendeddata=Extension XML file containing OpenAM specific metadata for a given entity (SP or IDP) in a COT. You may have received a extended file from your partner or you may have created one yourself.
configure.provider.help.entityId=Enter a string - typically a URL you own. It will be used to identify your provider to all the other IDPs and SPs in the circle of trust in accordance with SAMLv2 specifications. Default to server's protocol, host name, port number and deployment URI.
configure.provider.attributesmapping.title=Attributes Mapping
configure.provider.attributesmapping.help=<p>Mapping attributes helps to ensure that both the Service Provider (SP) and the Identity Provider (IDP) can recognize the same attributes that may have unique names. For example, the SP may have an attribute called UserName but the IDP may call it UserID. Eliminating these inconsistencies by mapping the attributes will guarantee that the data will be passed correctly.</p>
configure.provider.attributesmapping.title.empty=There are no mappings.
configure.provider.attributesmapping.default=Use default attribute mapping from Identity Provider
configure.provider.attributesmapping.column.name=Local Attribute Name
configure.provider.attributesmapping.column.assertion=Name in Assertion
configure.provider.missing.attribute.mapping.values=Local Attribute Name and Name in Assertion are required.
configure.provider.help.user.attributes.choices=You can either select one of these user's attribute names or enter other attribute name.
name.attribute.mapping.select=Select an attribute.
configure.provider.label.cot.question=Circles of Trust
configure.provider.option.existing=Add to existing
configure.provider.option.new=Add to new
configure.provider.label.cot.existing=Existing Circle of Trust
configure.provider.label.cot=New Circle of Trust
configure.provider.help.cot=Choose from existing circles of trust listed or provide one to be created in which to include this IDP. A COT is a group of IDPs and SPs that trust each other and provides the confines within which all SAMLv2 communications are performed.
configure.provider.help.sp.cot=Choose from existing circles of trust listed or provide one to be created in which to include this SP. A COT is a group of IDPs and SPs that trust each other and provides the confines within which all SAMLv2 communications are performed.
configure.provider.get.cots=Retrieving Circle of trust information<p> </p><p>Please wait ....</p>
configure.provider.waiting=Configuring the provider.<p> </p><p>Please wait ....</p>
configure.provider.done=Do you want to create a remote service provider or Fedlet?<br />If you choose not to create them, you can always create them later.
configure.sp.done=Service provider is configured.<br />You can modify the provider's profile under the Federation tab.<p> </p>Do you want to create a remote identity provider?
ajax.yes.button=Yes
ajax.neither.button=Neither
ajax.close.button=Close
ajax.upload.file.failed=Unable to upload file.
ajax.yes.fedlet.button=Fedlet
ajax.yes.sp.button=Service Provider
page.title.configure.remote.sp=Create a SAMLv2 Remote Service Provider
page.desc.configure.remote.sp=This page allows you to register a remote Service Provider (SP). You need two things: Circle of Trust (COT) and metadata of the provider. A COT is a group of Identity Providers (IDPs) and SPs that trust each other and in effect represents the confines within which all federation communications are performed. Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg IDPs) in a COT.
page.title.configure.remote.idp=Create a SAMLv2 Remote Identity Provider
page.desc.configure.remote.idp=This page allows you to register a remote Identity Provider (IDP). You need two things: Circle of Trust (COT) and metadata of the provider. A COT is a group of IDPs and Service Providers (SPs) that trust each other and in effect represents the confines within which all federation communications are performed. Metadata represents the configuration necessary to execute federation protocols (eg SAMLv2) as well as the mechanism to communicate this configuration to other entities (eg SPs) in a COT.
configure.provider.label.meta.question=Where does the metadata file reside?
configure.provider.label.extendeddata.question=Where does the extended data file reside?
metadata.saml2.create.title=Create SAMLv2 Entity Provider
metadata.idff.create.title=Create IDFF Entity Provider
metadata.wsfed.create.title=Create WS-Federation Entity Provider
metadata.label.entity.id=Entity Identifier
idff.create.provider.desc=A Provider needs to have at least one role. Enter one or more metaalias under the role sections such as Identity Provider, and Service Provider.
samlv2.create.provider.desc=A Provider needs to have at least one role. Enter one or more metaalias under the role sections such as Identity Provider, Service Provider, Attribute Query Provider, Attribute Authority, Authentication Authority, XACML Policy Enforcement Point and XACML Policy Decision Point.
wsfed.create.provider.desc=A Provider needs to have at least one role. Enter one or more metaalias under the role sections such as Identity Provider, and Service Provider.
samlv2.create.provider.title.idp=Identity Provider
samlv2.create.provider.title.sp=Service Provider
samlv2.create.provider.title.attr.query.provider=Attribute Query Provider
samlv2.create.provider.title.attr.authority=Attribute Authority
samlv2.create.provider.title.auth.authority=Authentication Authority
samlv2.create.provider.title.xacml.pep=XACML Policy Enforcement Point
samlv2.create.provider.title.xacml.pdp=XACML Policy Decision Point
samlv2.create.provider.title.affiliation=Hosted Affiliation
samlv2.create.provider.entityId=Entity Identifier
samlv2.create.provider.serviceprovider=Meta Alias
samlv2.create.provider.identityprovider=Meta Alias
samlv2.create.provider.attrqueryprovider=Meta Alias
samlv2.create.provider.attrauthority=Meta Alias
samlv2.create.provider.authnauthority=Meta Alias
samlv2.create.provider.xacmlpep=Meta Alias
samlv2.create.provider.xacmlpdp=Meta Alias
samlv2.create.provider.affiliation=Meta Alias
samlv2.create.provider.affimembers=Affiliation members
samlv2.create.provider.spscertalias=Signing certificate alias
samlv2.create.provider.idpscertalias=Signing certificate alias
samlv2.create.provider.affilownerid=Owner Id
samlv2.create.provider.attrqscertalias=Signing certificate alias
samlv2.create.provider.attrascertalias=Signing certificate alias
samlv2.create.provider.authnascertalias=Signing certificate alias
samlv2.create.provider.affiscertalias=Signing certificate alias
samlv2.create.provider.xacmlpdpscertalias=Signing certificate alias
samlv2.create.provider.xacmlpepscertalias=Signing certificate alias
samlv2.create.provider.specertalias=Encryption certificate alias
samlv2.create.provider.idpecertalias=Encryption certificate alias
samlv2.create.provider.attrqecertalias=Encryption certificate alias
samlv2.create.provider.attraecertalias=Encryption certificate alias
samlv2.create.provider.authnaecertalias=Encryption certificate alias
samlv2.create.provider.affiecertalias=Encryption certificate alias
samlv2.create.provider.xacmlpdpecertalias=Encryption certificate alias
samlv2.create.provider.xacmlpepecertalias=Encryption certificate alias
samlv2.create.provider.help.affimembers=Members are mandatory for creating an affiliation entity. The possible affiliation members are the existing SP entities under the same realm.
samlv2.create.provider.missing.affiliation.owner=Affiliation Owner is required.
samlv2.create.provider.missing.realm=Realm is required.
samlv2.create.provider.missing.entityId=Entity Identifier is required.
samlv2.create.provider.missing.affiliation.members=Affiliation Members are required.
samlv2.create.provider.missing.roles=At least one role is required. Example, the provider can be an Identity or Service Provider.
federation.entity.select.protocol=Select the protocol of the provider.
validate.entities.realm=Realm
validate.entities.help.realm=Realm where circles of trust reside.
validate.entities.circle.of.trusts=Circles of Trust
validate.entities.circle.of.trusts.title=Circles of Trust
validate.entities.circle.of.trusts.empty=There is no circle of trust in this realm.
federation.create.provider.duplicate.metaAlias=Meta Alias values need to be unique within a realm.
page.title.validate.fed=Validate Federation Setup
validate.entities.cot=Circle of Trust
validate.cot.table.show=Show COT Table
validate.cot.table.hide=Hide COT Table
validate.entities.idp.sp=Providers
cot.table.desc.entities=Pick one idp and then one sp blah...
validate.entities.idp=Identity Provider
validate.entities.sp=Service Provider
button.backtoLogin=Back to Login
validate.cannot.validate.div=You must have both Identity Provider and Service Provider in a Circle of Trust to validate connectivity.
no.providers.to.validate=You have no federation connections to test. Please establish a federated connection by creating an identity and a service provider in the same circle of trust.
page.desc.validate=This page collects the information that is required for validating a SAMLv2 setup. Realm (defaulted to "/"), Circle of Trust, Identity Provider (IDP) and Service Provider (SP) are needed. Inorder the validate a SAMLv2 setup, you can have either a hosted IDP and a remote SP; or a remote SP and a hosted IDP.
cot.table.desc.validate=This circles of trust table shows the name of circle of trust, the number of hosted and remote identity and service providers which are members of it. Select the COT where the providers reside.
validate.logout=Please wait for a moment while we attempt to<br />terminate your session.
validate.entities.get.entities=Please wait. Getting Identity and <br />Server Providers.
validate.ready.for.test=We are ready for testing the federation connectivity.<br />You will be logout of the current session.
validate.entities.help.idp=The parenthesis in the provider name indicates its meta alias. And only hosted providers have meta alias.
validate.entities.help.sp=The parenthesis in the provider name indicates its meta alias. And only hosted providers have meta alias.
page.title.register.product=Register This OpenAM Product
page.desc.register.product=This page allows you to register your OpenAM product with the Sun Connection site. You need a Sun Online Account in order to register. You may request one at the same time, if you do not already have one. By clicking the Register button, you agree with the Sun Online Account terms of use. See http://www.sun.com/termsofuse.jsp.
register.product.account.question=Have an SOA or SDN account?
register.product.option.account=I HAVE a Sun Online Account or Sun Developer Network Account
register.product.option.no.account=I DO NOT HAVE a Sun Online Account or Sun Developer Network Account
register.product.account.info=Sun Online Account/Sun Developer Network Account Information
register.product.label.userName=User Name
register.product.help.userName=Example: Jim123 or jim@company.com
register.product.label.pswd=Password
register.product.label.cfrmPswd=Retype Password
register.product.help.cfrmPswd=At least 6 characters, case sensitive
register.product.label.proxyHost=Proxy Host
register.product.help.proxyHost=Proxy Host of the Server Machine
register.product.label.proxyPort=Proxy Port
register.product.label.emailAddr=Email Address
register.product.help.emailAddr=If no User Name provided, your email address will be your User Name
register.product.label.firstName=First Name
register.product.label.lastName=Last Name
page.desc.register.product.privacy=Sun Microsystems, Inc. respects your desire for privacy. Personal information collected from this form will not be shared with organizations external to Sun without your consent, except to process data on Sun's behalf in connection with this transaction. If you have any questions please refer to the Sun Privacy Policy or contact us at privacy@Sun.com.
page.desc.register.product.terms=By clicking the Register button, you agree with the Sun Online Account terms of use. See http://www.sun.com/termsofuse.jsp.
register.product.label.privacy.terms=Privacy and Terms Of Use
register.product.label.privacy=Sun Microsystems, Inc. respects your desire for privacy. Personal information collected from this form will not be shared with organizations external to Sun without your consent, except to process data on Sun's behalf in connection with this transaction. If you have any questions please refer to the Sun Privacy Policy at http://www.sun.com/privacy or contact us at privacy@Sun.com.
register.product.waiting=Registering the product.<p> </p><p>Please wait ....</p>
register.product.done=Registered the OpenAM product
register.product.get.domains=Please select one of your domains.
fedlet.created.title=Your Fedlet.zip file has been created.
creating.fedlet.waiting=Creating Fedlet. Please wait...
page.title.create.fedlet=Create Fedlet
page.desc.create.fedlet=The Fedlet is ideal for an IDP that needs to enable an SP that does not have any kind of federation solution in place. A Fedlet is a very small zip file that you can provide a service provider (SP) so they can instantaneously federate with you. The SP simply adds the Fedlet to their application, deploys their application and they are federation enabled.
create.fedlet.help.realm=Realm where the Fedlet resides
create.fedlet.label.cot=Circle of Trust
create.fedlet.label.idp=Identity Provider
create.fedlet.attribute.mapping.desc=Mapping attributes helps to ensure that both the Service Provider (SP) and the Identity Provider (IDP) can recognize the same attributes that may have unique names. For example, the SP may have an attribute called UserName but the IDP may call it UserID. Eliminating these inconsistencies by mapping the attributes will guarantee that the data will be passed correctly.
create.fedlet.help.entity.id=A name for this Fedlet. Example http://www.example.com:8080/myapp
create.fedlet.label.assert.consumer=Destination URL of the Service Provider which will include the Fedlet
create.fedlet.missing.cot=Unable to create Fedlet because there are no circle of trust with Identity Provider.
create.fedlet.section.idp=Identity Provider Information
create.fedlet.section.setup=Fedlet information
complete.create.host.idp.title=Your Identity Provider has been configured
complete.create.host.idp.prompt=What would you like to do next?
complete.create.host.idp.reg.remote.sp.title=Register a Remote Service Provider
complete.create.host.idp.reg.remote.sp.text=In order to complete the federated relationship you would need to register the service provider. You can <a href="javascript:createRemoteSP()">register a service provider</a> now or access it later from the common tasks page.
complete.create.host.idp.create.fedlet.title=Create a Fedlet
complete.create.host.idp.create.fedlet.text=The Fedlet is ideal for an IDP that needs to enable a SP that does not have a Federation solution in place. It is a small .zip file that you can provide to the SP in order for them to federate with you. You can <a href="javascript:createFedlet()">create a Fedlet</a> now or access it later from the common tasks page.
complete.create.host.idp.modify.profile.title=Modify this provider's profile
complete.create.host.idp.modify.profile.text=A minimal profile has already been created for this provider, if you would like to create a fuller profile you can <a href="javascript:modifyIDP()">modify the profile</a> now or access it later under the Federation tab.
complete.create.host.idp.create.google.apps.title=Configure Google Apps
complete.create.host.idp.create.google.apps.text=Google Apps is a service that enables you to make web applications available to users in a custom domain. Email, calendaring, and file management are examples of Google Apps you can integrate with OpenAM. Use this workflow to integrate Google Apps in a single sign-on environment. You can <a href="javascript:configureGoogleApps()">configure Google Apps</a> now or configure it later from the common tasks page.
# LICENSE
license=Copyright \u00a9 2010-2016, ForgeRock AS. All Rights Reserved. Use of this software is subject to the terms and conditions of the ForgeRock\u2122 License and Subscription Agreement.
org-chain-list.help=This table lists the authentication modules that make up this authentication chain.
org-chain-list.help.txt=The list of modules that will be presented to the user during authentication. The criteria controls the processing \
of the authentication chain. The available options are as follows<br/>\
<ul><li><code>iplanet-am-auth-shared-state-enabled</code> : true|false</li>\
<li><code>iplanet-am-auth-store-shared-state-enabled</code> : true|false</li>\
<li><code>iplanet-am-auth-shared-state-behavior-pattern</code> : tryFirstPass</li></ul><br/><br/>\
Enabling the shared state allows modules further down the chain to use the credentials captured by previous modules. \
<code>tryFirstPass</code>mode allows said modules to process these credentials before any of their own callbacks are used.
signingCertAlias.help=The alias (name) of the key to be used to sign SAML protocol messages.
signingCertAlias.help.txt=Provide the list of signing certificate aliases that should be available in the SAML \
metadata as "signing" KeyDescriptors (e.g. for key rollover). The first signing key in the list will \
be used by this SAML entity to sign SAML protocol messages.
signingCertKeyPass.help=The password of the private key to be used to sign assertions, leave blank to use the password stored in %BASE_DIR%/%SERVER_URI%/.keypass (or the value defined in the property: com.sun.identity.saml.xmlsig.keypass)
encryptionCertAlias.help=The alias (name) of the key to be used when decrypting SAML protocol messages.
encryptionCertAlias.help.txt=Provide the list of encryption certificate aliases that should be available in the SAML \
metadata as "encryption" KeyDescriptors (e.g. for key rollover). Remote parties are likely to choose \
the first encryption KeyDescriptor when encrypting the SAML protocol messages. The hosted entity will attempt to \
decrypt the messages using the private keys associated with the configured certificate aliases in the order they are \
defined.
a100.help=List of locales recognised by OpenAM and their matching charsets
a100.help.txt=This is the list of locales recognised by OpenAM.\ Add additional locale(s)s to this list it the locale should use \
a character encoding (charset) other than the default.<br/><br/>\
<i>NB </i>If a locale is on this list, it does not necessarily mean that a localisation exists for the same locale.
a101.help=Mapping of MIME charset name to Java charset Name
a101.help.txt=Some Java charset names do not exactly match to their MIME equivilant. This list is used to map between Java and MIME \
charset names.
a133=Default Success Login URL
a133.help=Successful logins will be forwarded to this URL
a133.help.txt=This is the URL to which clients will be forwarded upon successful authentication. Enter a URL or URI relative to the \
local OpenAM. URL or URI can be prefixed with the ClientType|URL if client specific. URL without http(s) protocol will be appended to \
the current URI of OpenAM.
a134=Default Failure Login URL
a134.help=Failed logins will be forwarded to this URL
a134.help.txt=This is the URL to which clients will be forwarded upon failed authentication. Enter a URL or URI relative to the local \
OpenAM. URL or URI can be prefixed with ClientType|URL if client specific. URL without http(s) protocol will be appended to the current \
URI of OpenAM.
a135=Authentication Post Processing Classes
a135.help=A list of post authentication processing classes for all users in this realm.
a135.help.txt=This is a list of Post Processing Classes that will be called by OpenAM for all users that authenticate to this realm. \
Refer to the documentation for the places where the list of post authentication classes can be set and their precedence. \
<br/><br/>For example: org.forgerock.auth.PostProcessClass<br/>\
<i>NB </i>OpenAM must be able to find these classes on the <code>CLASSPATH</code> and must implement the interface \
a135.help.uri=#tbd
userprofile \
persistentcookie \
accountlockout \
general \
security \
postauthprocess
section.label.iPlanetAMAuthService.Organization.persistentcookie=Persistent Cookie
section.label.iPlanetAMAuthService.Organization.accountlockout=Account Lockout
section.label.iPlanetAMAuthService.Organization.postauthprocess=Post Authentication Processing
general \
search \
notifications \
quotas \
stateless
section.label.iPlanetAMSessionService.Global.search=Session Search
section.label.iPlanetAMSessionService.Global.notifications=Session Property Change Notifications
section.label.iPlanetAMSessionService.Global.quotas=Session Quotas
section.label.iPlanetAMSessionService.Global.stateless=Stateless Sessions
ldapsettings \
jdbcsettings \
pluginconfig \
userconfig \
authentication \
groupconfig \
roleconfig \
persistentsearch \
errorhandling \
cachecontrol
# LDAP plugin sections
section.label.sunIdentityRepositoryService.Organization.pluginconfig=Plug-in Configuration
section.label.sunIdentityRepositoryService.Organization.userconfig=User Configuration
section.label.sunIdentityRepositoryService.Organization.authentication=Authentication Configuration
section.label.sunIdentityRepositoryService.Organization.groupconfig=Group Configuration
section.label.sunIdentityRepositoryService.Organization.roleconfig=Role Configuration
section.label.sunIdentityRepositoryService.Organization.persistentsearch=Persistent Search Controls
section.label.sunIdentityRepositoryService.Organization.errorhandling=Error Handling Configuration
# Database plugin sections
# Adaptive risk authentication service sections
general \
authfailed \
iprange \
iphistory \
knowncookie \
devicecookie \
lastlogin \
attributecheck \
geolocation \
requestheader
section.label.sunAMAuthAdaptiveService.Organization.authfailed=Failed Authentications
section.label.sunAMAuthAdaptiveService.Organization.iprange=IP Address Range
section.label.sunAMAuthAdaptiveService.Organization.iphistory=IP Address History
section.label.sunAMAuthAdaptiveService.Organization.lastlogin=Time Since Last Login
section.label.sunAMAuthAdaptiveService.Organization.attributecheck=Profile Attribute
# Device print authentication service sections
general \
useragent \
installedfonts \
installedplugins \
screenparams \
geolocation \
timezone \
onetimepassword
section.label.iPlanetAMAuthDevicePrintModuleService.Organization.onetimepassword=One Time Password Settings
section.label.selfService.Organization.general.config=General Configuration
section.label.selfService.Organization.user.registration=User Registration
section.label.selfService.Organization.forgotten.password=Forgotten Password
section.label.selfService.Organization.forgotten.username=Forgotten Username
section.label.selfService.Organization.profile.management=Profile Management
section.label.selfService.Organization.advanced.config=Advanced Configuration
#Logging sections
sections.iPlanetAMLoggingService.Global=general file database syslog
##################################
# OAuth2 Localization Parameters #
##################################
page.title.common.tasks.section.OAuth2=Configure OAuth Provider
page.title.common.tasks.section.desc.OAuth2=This task configures OAuth2, OpenID Connect, Mobile Connect and UMA per \
realm. Each realm can act as authorization server for these services.
configure.oauth2.section.serv=Configure OAuth2/OpenID Connect Service
configure.oauth2.section.policy=Configure OAuth2 Authorization End Point Protection Policy
configure.oauth2.section.policy.help=A policy to protect the OAuth2 authorization end point will be created. This \
policy will be named OAuth2ProviderPolicy. The policy will protect the endpoint \
http://openam.server.name.com/openam/oauth2/authorize. The purpose of this policy is to redirect clients to the \
OpenAM login page to authenticate a resource owner each time they go to the authorize end point. To do advanced \
policy management can be done using the policies tab for each realm.
configure.oauth2.section.registerClient=Register OAuth2/OpenID Connect Client(s)
configure.oauth2.section.registerClient.help=The last step is to register client(s) for the OAuth2/OpenID Connect \
Provider to issue tokens to. Clients can be registered by navigating to the OpenAM agents tab and selecting \
OAuth 2.0/OpenID Connect Client. A Client can also be registered by visiting the jsp registration page at \
configure.oauth2profile.title.message=Configure {0}
configure.oauth2profile.name.oauth2=OAuth 2.0
configure.oauth2profile.name.oidc=OpenID Connect
configure.oauth2profile.name.mobileconnect=Mobile Connect
configure.oauth2profile.help.oauth2=Configure OpenAM as a plain OAuth 2.0 authorization server. You will need to \
customise the scopes you require in the OAuth 2.0 Provider service settings after creation.
configure.oauth2profile.help.oidc=Configure OpenAM as an OpenID Connect authorization server. The provider service \
will be configured with settings that conform to the \
<a href="http://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect specification</a>, which you can \
modify if required.
configure.oauth2profile.help.mobileconnect=Configure OpenAM as a Mobile Connect authorization server. The provider \
service will be configured with settings that conform to the \
<a href="https://developer.mobileconnect.io/docs">Mobile Connect specification</a>, which you can modify if required.
configure.oauth2profile.help.uma=Configure OpenAM as an UMA authorization server. The provider \
service will be configured with settings that conform to the \
<a href="https://docs.kantarainitiative.org/uma/draft-uma-core-v1_0_1.html">UMA specification</a>, which you can \
modify if required. The required settings to act as an OpenID Connection authorization server will also be applied.
commontask.label.configure.oauth2=Configure OAuth 2.0
commontask.configure.oauth2=You configure the OAuth 2.0 authorization service for a particular realm. \
This process also protects the authorization endpoint using a standard policy.
commontask.label.configure.oidc=Configure OpenID Connect
commontask.configure.oidc=You configure the OpenID Connect profile of the OAuth 2.0 authorization service for a \
particular realm. This process also protects the authorization endpoint using a standard policy.
commontask.label.configure.mobileconnect=Configure Mobile Connect
commontask.configure.mobileconnect=You configure the Mobile Connect profile of the OAuth 2.0 authorization service for \
a particular realm. This process also protects the authorization endpoint using a standard policy.
commontask.label.configure.uma=Configure User Managed Access
commontask.configure.uma=You configure the UMA profile of the OAuth 2.0 authorization service for \
a particular realm. This process also protects the authorization endpoint using a standard policy.
configure.oauth2.label.service.refreshLifetime=Refresh Token Lifetime (seconds)
configure.oauth2.label.service.refreshLifetime.help=The time in seconds a refresh token is valid for
configure.oauth2.label.service.codeLifetime=Authorization Code Lifetime (seconds)
configure.oauth2.label.service.codeLifetime.help=The time in seconds an authorization code is valid for
configure.oauth2.label.service.tokenLifetime=Access Token Lifetime (seconds)
configure.oauth2.label.service.tokenLifetime.help=The time in seconds an access token is valid for
configure.oauth2.label.service.refreshToken=Issue Refresh Tokens
configure.oauth2.label.service.refreshToken.help=Check to enable generation of refresh tokens
configure.oauth2.label.service.refreshTokenOnRefreshing=Issue Refresh Tokens on Refreshing Access Tokens
configure.oauth2.label.service.refreshTokenOnRefreshing.help=Check to enable generation of refresh tokens when \
refreshing access tokens
configure.oauth2.label.service.scopeImpl=Scope Implementation Class
configure.oauth2.label.service.scopeImpl.help=The class that contains the required scope implementation
oauth2.configured.title=OAuth2 Configured for the given realm
configuring.oauth2.waiting=Waiting on OAuth2 profile Configuration
##################################
# Social Authentication wizard #
##################################
social.configuration.waiting=Setting up Social Authentication.<p> </p><p>Please wait ....</p>
##################################
#Rest/Soap STS
##################################
#values for the tab - referenced in amConsoleConfig.xml
tab.configuration.reststs.tooltip=Click to configure rest sts instances
tab.configuration.reststs.status=Click to configure rest sts instances
#Properties for STSHomeViewBean and associated .jsp page.
sts.home.page.title={0} - STS Instances
rest.sts.home.instances.table.name=Rest STS Instances
rest.sts.home.instances.table.summary=Rest STS Instances
rest.sts.home.instances.table.empty.message=No published Rest STS instances
rest.sts.home.instance.deleted=Rest STS instance deleted
rest.sts.home.instances.deleted=Rest STS instances deleted
soap.sts.home.instances.table.name=Soap STS Instances
soap.sts.home.instances.table.summary=Soap STS Instances
soap.sts.home.instances.table.empty.message=No published Soap STS instances
soap.sts.home.instance.deleted=Soap STS instance deleted
soap.sts.home.instances.deleted=Soap STS instances deleted
#Properties for the RestSTSEditViewBean
rest.sts.edit.page.title=update rest sts instance
# Properties for the propertyRest/SoapSecurityTokenService.xml files
sts.persist.issued.tokens.in.cts=Persist Issued Tokens in Core Token Store
sts.persist.issued.tokens.in.cts.help=Necessary to support token validation and cancellation
sts.persist.issued.tokens.in.cts.help.txt=Validation of STS-issued tokens will involve determining whether the token \
has been issued, has not expired, and has not been cancelled. Token cancellation involves removing the record of this \
token from the CTS. Thus CTS persistence of STS-issued tokens is required to support these features.
sts.saml2.section.title=Issued SAML2 Token Configuration
sts.saml2.ServiceProviderEntityId=Service Provider Entity Id
sts.saml2.ServiceProviderEntityId.help=Values will be used to populate the Audiences of the AudienceRestriction \
element of the Conditions element. This value is required when issuing Bearer assertions. See section 4.1.4.2 of \
<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf" target="_blank">\
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0</a> for details.
sts.saml2.ServiceProviderAssertionConsumerServiceUrl=Service Provider Assertion Consumer Service Url
sts.saml2.ServiceProviderAssertionConsumerServiceUrl.help=When issuing bearer assertions, the recipient attribute \
of the SubjectConfirmation element must be set to the Service Provider Assertion Consumer Service Url. See section \
4.1.4.2 of <a href="http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf" target="_blank">\
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0</a> for details. Value required when \
issuing Bearer assertions.
sts.saml2.NameIdFormat=NameIdFormat
sts.saml2.TokenLifetime=Token Lifetime (Seconds)
sts.saml2.CustomConditionsProviderClassName=Custom Conditions Provider Class Name (optional)
sts.saml2.CustomConditionsProviderClassName.help=If the Conditions of the issued SAML2 assertion \
need to be customized, implement the <code>org.forgerock.openam.sts.tokengeneration.saml2.statements.ConditionsProvider</code> \
interface, and specify the class name of the implementation here.
sts.saml2.CustomSubjectProviderClassName=Customs Subject Provider Class Name (optional)
sts.saml2.CustomSubjectProviderClassName.help=If the Subject of the issued SAML2 assertion \
needs to be customized, implement the <code>org.forgerock.openam.sts.tokengeneration.saml2.statements.SubjectProvider</code> \
interface, and specify the class name of the implementation here.
sts.saml2.CustomAuthenticationStatementsClassName=Custom AuthenticationStatements Class Name (optional)
sts.saml2.CustomAuthenticationStatementsClassName.help=If the AuthenticationStatements of the issued SAML2 assertion \
need to be customized, implement the <code>org.forgerock.openam.sts.tokengeneration.saml2.statements.AuthenticationStatementsProvider</code> \
interface, and specify the class name of the implementation here.
sts.saml2.CustomAttributeStatementsClassName=Custom AttributeStatements Class Name (optional)
sts.saml2.CustomAttributeStatementsClassName.help=If the AttributeStatements of the issued SAML2 assertion \
need to be customized, implement the <code>org.forgerock.openam.sts.tokengeneration.saml2.statements.AttributeStatementsProvider</code> \
interface, and specify the class name of the implementation here.
sts.saml2.CustomAuthorizationDecisionStatementsClassName=Custom Authorization Decision Statements Class Name (optional)
sts.saml2.CustomAuthorizationDecisionStatementsClassName.help=If the AuthorizationDecisionStatements of the issued SAML2 assertion \
need to be customized, implement the <code>org.forgerock.openam.sts.tokengeneration.saml2.statements.AuthzDecisionStatementsProvider</code> \
interface, and specify the class name of the implementation here.
sts.saml2.CustomAttributeMapperClassName=Custom Attribute Mapper Class Name (optional)
sts.saml2.CustomAttributeMapperClassName.help=If the class implementing attribute mapping for attributes \
contained in the issued SAML2 assertion needs to be customized, implement the \
<code>org.forgerock.openam.sts.tokengeneration.saml2.statements.AttributeMapper</code> interface, and specify the class name of \
the implementation here.
sts.saml2.CustomAuthenticationContextMapperClassName=Custom Authentication Context Class Name (optional)
sts.saml2.CustomAuthenticationContextMapperClassName.help=If the AuthnContext mapping implemented by the \
<code>org.forgerock.openam.sts.token.provider.AuthnContextMapperImpl</code> class, implement the \
<code>org.forgerock.openam.sts.token.provider.AuthnContextMapper</code> interface, and specify the name of the implementation here.
sts.saml2.SignAssertion=Sign Assertion
sts.saml2.EncryptAssertion=Encrypt Assertion
sts.saml2.EncryptAssertion.help=Check this box if the entire assertion should be encrypted. If this box is checked, \
the Encrypt NameID and Encrypt Attributes boxes cannot be checked.
sts.saml2.EncryptAttributes=Encrypt Attributes
sts.saml2.EncryptAttributes.help=Check this box if the assertion Attributes should be encrypted. If this box is \
checked, the Encrypt Assertion box cannot be checked.
sts.saml2.EncryptNameID=Encrypt NameID
sts.saml2.EncryptNameID.help=Check this box if the assertion NameID should be encrypted. If this box is checked, \
the Encrypt Assertion box cannot be checked.
sts.saml2.EncryptionAlgorithm=Encryption Algorithm
sts.saml2.EncryptionAlgorithm.help=Algorithm used to encrypt generated assertions.
sts.saml2.keystore.filename=KeystorePath
sts.saml2.keystore.filename.help=Path to keystore
sts.saml2.keystore.filename.help.txt=Provide either the full filesystem path to a filesystem resident keystore, or a \
classpath-relative path to a keystore bundled in the OpenAM .war file. This keystore contains the IdP public/private \
keys and SP public key for signed and/or encrypted assertions. If assertions are neither signed nor encrypted, these \
values need not be specified.
sts.saml2.keystore.password=Keystore Password
sts.saml2.keystore.password.confirm=Confirm Keystore Password
sts.saml2.keystore.EncryptionKeyAlias=Encryption Key Alias
sts.saml2.keystore.EncryptionKeyAlias.help=This alias corresponds to the SP's x509 Certificate identified by the \
SP Entity ID for this rest-sts instance. Not necessary unless assertions are to be encrypted.
sts.saml2.keystore.SignatureKeyAlias=Signature Key Alias
sts.saml2.keystore.SignatureKeyAlias.help=Corresponds to the private key of the IdP. Will be used to sign assertions. \
Value can remain unspecified unless assertions are signed.
sts.saml2.keystore.SignatureKeyPassword=Signature Key Password
sts.saml2.keystore.SignatureKeyPassword.confirm= Confirm Signature Key Password
sts.saml2.AttributeMap=Attribute Mappings
sts.saml2.AttributeMap.help=Contains the mapping of assertion attribute names (Map keys) to local OpenAM attributes (Map values) in \
configured data stores. Format: assertion_attr_name=ldap_attr_name
sts.saml2.AttributeMap.help.txt= The DefaultAttributeMapper looks at profile attributes in \
configured data stores, or in Session properties. The keys will define the name of the attributes \
included in the Assertion Attribute statements, and the data pulled from the subject's directory entry or session state \
corresponding to the map value will define the value corresponding to this attribute name. The keys can have the format \
[NameFomatURI|]SAML ATTRIBUTE NAME. If the attribute value is \
enclosed in quotes, that quoted value will be included in the attribute without mapping. Binary attributes should be \
followed by ';binary'. Examples: EmailAddress=mail, Address=postaladdress, \
urn:oasis:names:tc:SAML:2.0:attrname-format:uri|urn:mace:dir:attribute-def:cn=cn, partnerID="staticPartnerIDValue", \
urn:oasis:names:tc:SAML:2.0:attrname-format:uri|nameID="staticNameIDValue", photo=photo;binary, \
urn:oasis:names:tc:SAML:2.0:attrname-format:uri|photo=photo;binary
sts.saml2.nameidformat.unspecified=urn:oasis:names:tc:SAML:1.0:nameid-format:unspecified
sts.saml2.nameidformat.entity=urn:oasis:names:tc:SAML:2.0:nameid-format:entity
sts.saml2.nameidformat.email=urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
sts.saml2.nameidformat.encrypted=urn:oasis:names:tc:SAML:2.0:nameid-format:encrypted
sts.saml2.nameidformat.persistent=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
sts.saml2.nameidformat.transient=urn:oasis:names:tc:SAML:2.0:nameid-format:transient
sts.saml2.nameidformat.x509=urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName
sts.saml2.nameidformat.windowsdomain=urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName
sts.saml2.nameidformat.kerberos=urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos
rest.sts.general.section.title=General Configuration
sts.saml2.issuerName=The SAML2 issuer Id
sts.saml2.issuerName.help=Will appear in the Issuer element of issued SAML2 assertions
rest.sts.tokentransforms=Supported Token Transforms
rest.sts.transform.unt.saml2.true=UNT->SAML2;invalidate interim OpenAM session
rest.sts.transform.unt.saml2.false=UNT->SAML2;don't invalidate interim OpenAM session
rest.sts.transform.oidc.saml2.true=OPENIDCONNECT->SAML2;invalidate interim OpenAM session
rest.sts.transform.oidc.saml2.false=OPENIDCONNECT->SAML2;don't invalidate interim OpenAM session
rest.sts.transform.openam.saml2.true=OPENAM->SAML2;invalidate interim OpenAM session
rest.sts.transform.openam.saml2.false=OPENAM->SAML2;don't invalidate interim OpenAM session
rest.sts.transform.x509.saml2.true=x509->SAML2;invalidate interim OpenAM session
rest.sts.transform.x509.saml2.false=x509->SAML2;don't invalidate interim OpenAM session
rest.sts.transform.unt.oidc.true=USERNAME->OPENIDCONNECT;invalidate interim OpenAM session
rest.sts.transform.unt.oidc.false=USERNAME->OPENIDCONNECT;don't invalidate interim OpenAM session
rest.sts.transform.oidc.oidc.true=OPENIDCONNECT->OPENIDCONNECT;invalidate interim OpenAM session
rest.sts.transform.oidc.oidc.false=OPENIDCONNECT->OPENIDCONNECT;don't invalidate interim OpenAM session
rest.sts.transform.openam.oidc.true=OPENAM->OPENIDCONNECT;invalidate interim OpenAM session
rest.sts.transform.openam.oidc.false=OPENAM->OPENIDCONNECT;don't invalidate interim OpenAM session
rest.sts.transform.x509.oidc.true=X509->OPENIDCONNECT;invalidate interim OpenAM session
rest.sts.transform.x509.oidc.false=X509->OPENIDCONNECT;don't invalidate interim OpenAM session
rest.sts.tokentransforms.help=Supported token transformations
rest.sts.tokentransforms.help.txt=In X->Y, X refers to the input token type, and Y refers to the output token type \
(currently limited to SAML2). The (don't) invalidate interim OpenAM session specifies whether the interim OpenAM session, \
created during the authentication of the presented input token type, should be invalidated following the creation of the \
output token type.
rest.sts.custom.token.validators=Custom Token Validators (optional)
rest.sts.custom.token.validators.help=If validator of a custom token type is desired, specify the name of the custom token \
here, followed by '|', followed by the class name of the org.forgerock.openam.sts.rest.token.validator.RestTokenTransformValidator \
implementation which will be invoked to validate the custom tokens.
rest.sts.custom.token.validators.help.txt=Example: MY_CUSTOM_INPUT_TOKEN|org.mycompany.tokens.MyCustomTokenValidator \
Note that MY_CUSTOM_INPUT_TOKEN would then be specified as the value corresponding to the token_type key in the input_token_state \
json object specified in rest-sts token transformation invocations.
rest.sts.custom.token.providers=Custom Token Providers (optional)
rest.sts.custom.token.providers.help=If a rest-sts instance is to produce a custom token, specify the name of the custom token \
here, followed by '|', followed by the class name of the org.forgerock.openam.sts.rest.token.provider.RestTokenProvider \
implementation which will be invoked to produce an instance of the custom token.
rest.sts.custom.token.providers.help.txt=Example: MY_CUSTOM_OUTPUT_TOKEN|org.mycompany.tokens.MyCustomTokenProvider \
Note that MY_CUSTOM_OUTPUT_TOKEN would then be specified as the value corresponding to the token_type key in the output_token_state \
json object specified in rest-sts token transformation invocations.
rest.sts.custom.token.transforms=Custom Token Transforms (optional)
rest.sts.custom.token.transforms.help=If either custom token validators or providers are specified, they must also be specified \
in a custom rest-sts token transformation. These input or output tokens can be specified in a transformation with standard, \
or other custom, tokens.
rest.sts.custom.token.transforms.help.txt=The format of these token transformation definitions is the same as the standard \
token transformation definitions. The first field defines the input token type, the second the output token type, and the \
third field specifies whether the OpenAM session, produced as part of the validation of the input token type, is invalidated \
following the production of the outupt token. Example 1: MY_CUSTOM_INPUT_TOKEN|SAML2|true \
Example 1 specifies a MY_CUSTOM_INPUT_TOKEN as the input token (requires the specification of a custom token validator) \
SAML2 as the produced token, and that the interim OpenAM Session should be invalidated after the SAML2 token is produces. \
Example 2: OPENIDCONNECT|MY_CUSTOM_OUTPUT_TOKEN|true Example 2 specifies that an OPENIDCONNECT token should be authenticated to assert \
the identity of a token of type MY_CUSTOM_OUTPUT_TOKEN (requires the specification of a custom token provider) and that the \
interim OpenAM Session should be invalidated. Example 3: MY_CUSTOM_INPUT_TOKEN|MY_CUSTOM_OUTPUT_TOKEN|false Example 3 specifies \
that a MY_CUSTOM_INPUT_TOKEN should be transformed into a MY_CUSTOM_OUTPUT_TOKEN (requires the specification of both a custom \
provider and a custom validator), and that the interim OpenAM session should not be invalidated.
rest.sts.deployment.section.title=Deployment Configuration
rest.sts.deployment.UrlElement=Deployment Url Element
rest.sts.deployment.UrlElement.help=STS endpoint Url will be composed of rest-sts/realm/urlElement
rest.sts.deployment.AuthTargetMappings=Authentication Target Mappings
rest.sts.deployment.AuthTargetMappings.help=Configuration of consumption of OpenAM's rest-authN
rest.sts.deployment.AuthTargetMappings.help.txt=Each deployed STS is configured with the authentication targets for each \
input token type for each supported token transformation. For example, if the transformation \
OPENIDCONNECT->SAML2 is supported, the STS instance must be configured with information specifying which elements of \
the OpenAM restful authentication context needs to be consumed to validate the OPENIDCONNECT token. The elements of the \
configuration tuple are separated by '|'. The first element is the input token type in the token transform: i.e. \
X509, OPENIDCONNECT, USERNAME, or OPENAM. The second element is the authentication target - i.e. either 'module' \
or 'service', and the third element is the name of the authentication module or service. The fourth (optional) element provides \
the STS authentication context information about the to-be-consumed authentication context. When transforming OpenID Connect \
Id tokens, the OpenID Connect authentication module must be consumed, and thus a deployed rest-sts instance must be configured \
with the name of the header/cookie element where the OpenID Connect \
Id token will be placed. For this example, the following string would define these configurations: \
OPENIDCONNECT|module|oidc|oidc_id_token_auth_target_header_key=oidc_id_token. In this case, 'oidc' is the name of the \
OpenID Connect authentication module created to authenticate OpenID Connect tokens. When transforming a X509 Certificate, \
the Certificate module must be consumed, and the published rest-sts instance must be configured with the name of the \
Certificate module (or the service containing the module), and the header name configured for the Certificate module \
corresponding to where the Certificate module can expect to find the to-be-validated Certificate. The following string \
would define these configurations: X509|module|cert_module|x509_token_auth_target_header_key=client_cert. In this \
case 'cert_module' is the name of the Certificate module, and client_cert is the header name where Certificate module \
has been configured to find the client's Certificate.
rest.sts.deployment.TwoWayTLSHeaderKey=Client Certificate Header Key
rest.sts.deployment.TwoWayTLSHeaderKey.help=TLS-offload host certificate header key
rest.sts.deployment.TwoWayTLSHeaderKey.help.txt=Token transformation which take X509 Certificates as the input token require that \
the X509 Certificate be presented via two-way TLS, so that the TLS handshake can validate client certificate ownership. \
A standard means of obtaining the client certificate presented via two-way TLS is via the javax.servlet.request.X509Certificate \
attribute in the ServletRequest. However, in TLS-offloaded deployments, the TLS-offloader must communicate the client \
certificate to its ultimate destination via an Http header. If this rest-sts instance is to support token transformations \
with X509 Certificate input, and OpenAM will be deployed in a TLS-offloaded context, then this value must be set to the \
header value which the TLS-offloading engine will use to set client certificates presented via the TLS handshake.
rest.sts.deployment.TLSOffloadEngineHosts=Trusted Remote Hosts
rest.sts.deployment.TLSOffloadEngineHosts.help=IP addresses of TLS-offload hosts
rest.sts.deployment.TLSOffloadEngineHosts.help.txt=Token transformation which take X509 Certificates as the input token require that \
the X509 Certficate be presented via two-way TLS, so that the TLS handshake can validate client certificate ownership. \
If OpenAM is deployed in a TLS-offloaded environment, in which the TLS-offloader must communicate the client certificate \
to the rest-sts via an Http header, this certificate will only be accepted if the ip address(es) of the TLS-offload engines \
are specified in this list. Specify 'any' if a client certificate can be presented in the specified header by any rest-sts \
client.
#message properties displayed by the model and view-beans
rest.sts.validation.output.token.configuration.message=Either the SAML2 and/or OpenIdConnect token configuration state must be specified.
sts.validation.saml2.token.lifetime.message=SAML2 token lifetime must be specified
sts.validation.oidc.token.lifetime.message=OpenIdConnect token lifetime must be specified
rest.sts.validation.deployment.url.message=Deyployment Url element must be specified.
rest.sts.validation.deployment.url.content.message=Deployment Url element can neither start, end, nor contain, the '/' character.
rest.sts.validation.issuername.message=Issuer name must be specified.
sts.validation.saml2.keystore.filename.message=Keystore filename must be specified if assertion signing or encryption is configured.
sts.validation.saml2.keystore.password.message=Keystore password must be specified if assertion signing or encryption is configured.
sts.validation.saml2.keystore.signature.keyalias.message=Keystore signature key alias must be specified if assertion signing is configured.
sts.validation.saml2.keystore.signature.keypassword.message=Keystore signature key password must be specified.
sts.validation.saml2.keystore.encryption.keyalias.message=Keystore encryption key alias must be specified if assertion encryption is configured.
sts.validation.saml2.keystore.encryption.keypassword.message=Keystore encryption key password must be specified.
rest.sts.validation.tokentransforms.message=A set of Supported Token Transforms must be selected.
rest.sts.validation.tokentransforms.duplicate.message=Only a single transform of a specified input token type can be selected.
sts.saml2.encryptioncombinations.message=If Encrypt Assertion is selected, then neither Encrypt NameID nor Encrypt \
Attributes can be selected. Attributes and/or NameIDs can be encrypted, but not in conjunction with assertion encryption.
rest.sts.view.no.instance.message=No state corresponding to id {0}
rest.sts.view.no.updates=Property values have not been updated!
rest.sts.view.no.edit.deployment.url=The deployment url of an existing instance cannot be edited, as it constitutes the STS' \
identifier. If the deployment url must be changed, delete the current instance, and create a new instance with the updated url.
sts.validation.oidc.signature.algorithm.message=A signature algorithm for OpenIdConnect tokens must be specified.
sts.validation.oidc.client.secret.missing.message=The client secret must be specified for HMAC-signed tokens
sts.validation.oidc.keystore.location.message=The KeyStore location must be specified for RSA-signed tokens
sts.validation.oidc.keystore.password.message=The KeyStore password must be specified for RSA-signed tokens
sts.validation.oidc.keystore.signature.keyalias.message=The signature key alias must be specified for RSA-signed tokens
sts.validation.oidc.keystore.signature.keypassword.message=The signature key password must be specified for RSA-signed tokens
sts.validation.oidc.claim.map.incorrect.format.message=The OpenIdConnect claim map must be of format claim-name=attribute-name
sts.validation.saml2.claim.map.incorrect.format.message=The SAML2 attribute map must be of format assertion_attr_name=ldap_attr_name
sts.validation.oidc.audience.not.specified.message=An audience for issued OpenIdConnect tokens must be specified
#entries corresponding to OIDC-related entries in propertyRestSecurityTokenService.xml and propertySoapSecurityTokenService.xml
sts.oidc.section.title=OpenIdConnect Token Configuration
sts.oidc.issuerName=The id of the OpenIdConnect Token Provider
sts.oidc.issuerName.help=Value corresponding to iss claim
sts.oidc.token.lifetime=Token Lifetime (Seconds)
sts.oidc.signature.algorithm=Token signature algorithm
sts.oidc.signature.algorithm.hmac.sha.256=HMAC SHA 256
sts.oidc.signature.algorithm.hmac.sha.384=HMAC SHA 384
sts.oidc.signature.algorithm.hmac.sha.512=HMAC SHA 512
sts.oidc.signature.algorithm.rsa.sha.256=RSA SHA 256
sts.oidc.signature.algorithm.help=Algorithm used to sign issued OIDC tokens
sts.oidc.public.key.reference.type=Public key reference type
sts.oidc.public.key.reference.type.help=For tokens signed with RSA, how should corresponding public key be referenced in the issued jwt
sts.oidc.keystore.location=KeyStore Location
sts.oidc.keystore.location.help=For RSA-signed tokens, the filesystem or classpath location of the KeyStore containing singing key entry
sts.oidc.keystore.location.help.txt=For RSA-signed tokens, the KeyStore location, password, signing-key alias, and signing key \
password must be specified. The client secret is not required for RSA-signed tokens.
sts.oidc.keystore.password=KeyStore password
sts.oidc.keystore.password.confirm=Confirm KeyStore password
sts.oidc.keystore.signature.key.alias=KeyStore signing key alias
sts.oidc.keystore.signature.key.alias.help=For RSA-signed tokens, corresponds to the private key of the OIDC OP. Will be used to sign assertions.
sts.oidc.keystore.signature.key.password=Signature key password
sts.oidc.keystore.signature.key.password.confirm=Confirm signature key password
sts.oidc.client.secret=Client secret
sts.oidc.client.secret.help=For HMAC-signed tokens, the client secret used as the HMAC key
sts.oidc.client.secret.help.txt=For HMAC-signed tokens, the KeyStore location, password, gignature key alias and \
password configurations are not required.
sts.oidc.client.secret.confirm=Confirm client secret
sts.oidc.audience=The audience for issued tokens
sts.oidc.audience.help=Contents will be set in the aud claim
sts.oidc.authorized.party=The authorized party (optional)
sts.oidc.authorized.party.help=Optional. Will be set in the azp claim
sts.oidc.claim.map=Claim map
sts.oidc.claim.map.help=Contains the mapping of OIDC token claim names (Map keys) to local OpenAM attributes (Map values) \
in configured data stores.Format: claim_name=attribute_name
sts.oidc.claim.map.help.txt= The keys in the map will be claim entries in the issued OIDC token, and the \
value of these claims will be the principal attribute state resulting from LDAP datastore lookup of the map values. \
If no values are returned from the the LDAP datastore lookup of the attribute corresponding to the map value, \
no claim will be set in the issued OIDC token.
sts.oidc.custom.claim.mapper.class=Custom claim mapper class (optional)
sts.oidc.custom.claim.mapper.class.help=If the class implementing attribute mapping for attributes contained in \
issued OpenIdConnect tokens needs to be customized, implement the \
<code>org.forgerock.openam.sts.tokengeneration.oidc.OpenIdConnectTokenClaimMapper</code> interface, and specify the class name of \
the implementation here.
sts.oidc.custom.authentication.context.mapper.class=Custom authn context mapper class (optional)
sts.oidc.custom.authentication.context.mapper.class.help=If issued OIDC tokens are to contain acr claims, implement the \
<code>org.forgerock.openam.sts.rest.token.provider.oidc.OpenIdConnectTokenAuthnContextMapper</code> interface, and specify the \
class name of the implementation here.
sts.oidc.custom.authentication.methods.references.mapper.class=Custom authn methods references mapper class (optional)
sts.oidc.custom.authentication.methods.references.mapper.class.help=If issued OIDC tokens are to contain amr claims, implement the \
<code>org.forgerock.openam.sts.rest.token.provider.oidc.OpenIdConnectTokenAuthMethodReferencesMapper</code> interface, and specify the \
class name of the implementation here.
#properties specific to the soap-sts view beans
soap.sts.keystore.section.title=Soap Keystore Configuration
soap.sts.keystore.filename=Soap Keystore Location
soap.sts.keystore.filename.help=The location of the keystore which contains the key state necessary for the CXF and WSS4j \
runtime to enforce the SecurityPolicy bindings associated with this STS instance.
soap.sts.keystore.password=Keystore Password
soap.sts.keystore.password.confirm=Confirm Keystore Password
soap.sts.keystore.signature.key.alias=Signature Key Alias
soap.sts.keystore.signature.key.alias.help=Alias of key used to sign messages from STS. Necessary for asymmetric binding.
soap.sts.keystore.signature.key.password=Signature Key Password
soap.sts.keystore.signature.key.password.confirm=Confirm Signature Key Password
#Note the incongruence between encryption/decryption. This has to do with confusion about the use of key state in the symmetric and
#asymmetric bindings. In general, encryption should be replaced by decryption in the soap-encryption-key-password and soap-encryption-key-alias
#properties defined in soapSTS.xml, and thus in the SoapSTSKeystoreConfig domain object. See the class javadocs in SoapSTSKeystoreConfig
#for details. Only the user-visible values will be changed now, in order to mitigate risk.
soap.sts.keystore.encryption.key.alias=Decryption Key Alias
soap.sts.keystore.encryption.key.alias.help=Alias of key used by the STS to decrypt client messages in the asymmetric \
binding, and to decrypt the client-generated symmetric key in the symmetric binding. Corresponds to an STS PrivateKeyEntry.
soap.sts.keystore.encryption.key.password=Decryption Key Password
soap.sts.keystore.encryption.key.password.confirm=Confirm Decryption Key Password
soap.sts.issued.token.types=Issued Tokens
soap.sts.issued.token.oidc=OpenID Connect
soap.sts.issued.token.help=Determines which tokens this soap STS instance will issue.
soap.sts.security.policy.validated.token.config=Security Policy Validated Token
soap.sts.security.policy.validated.token.config.unt.true=USERNAME;invalidate interim OpenAM session
soap.sts.security.policy.validated.token.config.unt.false=USERNAME;don't invalidate interim OpenAM session
soap.sts.security.policy.validated.token.config.openam.true=OPENAM;invalidate this session
soap.sts.security.policy.validated.token.config.openam.false=OPENAM;don't invalidate this session
soap.sts.security.policy.validated.token.config.x509.true=X509;invalidate interim OpenAM session
soap.sts.security.policy.validated.token.config.x509.false=X509;don't invalidate interim OpenAM session
soap.sts.security.policy.validated.token.config.help=Determines the SupportingToken type in the WS-SecurityPolicy bindings \
in the soap STS' wsdl, and whether the interim OpenAM session resulting from successful SupportingToken validation, should \
be invalidated following token issue.
soap.sts.deployment.section.title=Deployment
soap.sts.deployment.url.element=Deployment Url Element
soap.sts.deployment.url.element.help=STS endpoint Url will be composed of {soap_sts_war_name}/realm/urlElement
soap.sts.deployment.auth.target.mappings=Authentication Target Mappings
soap.sts.deployment.auth.target.mappings.help=Configuration of consumption of OpenAM's rest-authN
soap.sts.deployment.auth.target.mappings.help.txt=Each deployed STS is configured with the authentication targets for each \
input token type for each supported token transformation. For example, if the transformation \
OPENIDCONNECT->SAML2 is supported, the STS instance must be configured with information specifying which elements of \
the OpenAM restful authentication context needs to be consumed to validate the OPENIDCONNECT token. The elements of the \
configuration tuple are separated by '|'. The first element is the input token type in the token transform: i.e. \
X509, OPENIDCONNECT, USERNAME, or OPENAM. The second element is the authentication target - i.e. either 'module' \
or 'service', and the third element is the name of the authentication module or service. The fourth (optional) element provides \
the STS authentication context information about the to-be-consumed authentication context. When transforming OpenID Connect \
Id tokens, the OpenID Connect authentication module must be consumed, and thus a deployed rest-sts instance must be configured \
with the name of the header/cookie element where the OpenID Connect \
Id token will be placed. For this example, the following string would define these configurations: \
OPENIDCONNECT|module|oidc|oidc_id_token_auth_target_header_key=oidc_id_token. In this case, 'oidc' is the name of the \
OpenID Connect authentication module created to authenticate OpenID Connect tokens. When transforming a X509 Certificate, \
the Certificate module must be consumed, and the published rest-sts instance must be configured with the name of the \
Certificate module (or the service containing the module), and the header name configured for the Certificate module \
corresponding to where the Certificate module can expect to find the to-be-validated Certificate. The following string \
would define these configurations: X509|module|cert_module|x509_token_auth_target_header_key=client_cert. In this \
case 'cert_module' is the name of the Certificate module, and client_cert is the header name where Certificate module \
has been configured to find the client's Certificate.
soap.sts.deployment.am.url=Url of OpenAM
soap.sts.deployment.am.url.help=Set to Url of the OpenAM instance or site deployment.
soap.sts.deployment.am.url.help.txt=The OpenAM deployment will be consulted for published soap-sts instances, and to authenticate \
and issue tokens.
soap.sts.deployment.wsdl.location=Wsdl File Referencing Security Policy Binding Selection
soap.sts.deployment.wsdl.location.ut.transport=Username tokens over the transport binding
soap.sts.deployment.wsdl.location.ut.symmetric=Username tokens over the symmetric binding
soap.sts.deployment.wsdl.location.ut.asymmetric=Username tokens over the asymmetric binding
soap.sts.deployment.wsdl.location.am.bare=OpenAM session tokens in the clear
soap.sts.deployment.wsdl.location.am.transport=OpenAM session tokens over the transport binding
soap.sts.deployment.wsdl.location.x509.symmetric=x509 Certificates over the symmetric binding
soap.sts.deployment.wsdl.location.x509.asymmetric=x509 Certificates over the asymmetric binding
soap.sts.deployment.wsdl.location.custom=Custom wsdl file
soap.sts.deployment.wsdl.location.help=Choose the SupportingToken type and corresponding SecurityPolicy binding which will \
protect your sts instance. This choice will determine the SecurityPolicy bindings in the wsdl file defining the WS-Trust API
soap.sts.deployment.wsdl.location.help.txt=Note that the SupportingToken type selected must correspond to the Security Policy \
Validated Token selection. Note if a custom wsdl file is chose, the user is responsible for providing a \
propertly formatted wsdl file. See documentation for details.
soap.sts.deployment.custom.wsdl.location=Custom wsdl File (optional)
soap.sts.deployment.custom.wsdl.location.help=The location (on soap-sts .war accessable filesystem or soap-sts .war classpath) of the custom wsdl file.
soap.sts.deployment.custom.wsdl.location.help.txt=If the signing and/or encryption of the request and/or response messages \
specified in the SecurityPolicy bindings of standard soap-sts wdsl files must be customized, specify the name of the \
customized wsdl file here. See documentation for additional details.
soap.sts.deployment.custom.service.name=Custom Service QName (optional)
soap.sts.deployment.custom.service.name.help=The name attribute of the wsdl:Service element referenced in the Custom wsdl File, in QName format.
soap.sts.deployment.custom.service.name.help.txt=Example: {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}service_name
soap.sts.deployment.custom.port.name=Custom Port QName (optional)
soap.sts.deployment.custom.port.name.help=The name attribute of the wsdl:Port element referenced in the Custom wsdl File, in QName format.
soap.sts.deployment.custom.port.name.help.txt=Example: {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}service_port_name
soap.sts.delegation.relationship.supported=Delegation Relationships Supported
soap.sts.delegation.relationship.supported.help=Check if the RST will include ActAs/OnBehalfOf token elements
soap.sts.delegation.relationship.supported.help.txt=If SAML2 assertions with SenderVouches SubjectConfirmation \
are to be issued, this box must be checked.
soap.sts.delegation.validated.token.config=Delegated Token Types (optional)
soap.sts.delegation.validated.token.config.unt.true=USERNAME;invalidate interim OpenAM session
soap.sts.delegation.validated.token.config.unt.false=USERNAME;don't invalidate interim OpenAM session
soap.sts.delegation.validated.token.config.openam.true=OPENAM;invalidate this session
soap.sts.delegation.validated.token.config.openam.false=OPENAM;don't invalidate this session
soap.sts.delegation.validated.token.config.help=If delegation relationships are supported, out-of-the-box validation support \
for the validation of username and OpenAM session tokens included as the ActAs/OnBehalfOf element is configured here.
soap.sts.delegation.validated.token.config.help.txt=If a value is selected in this list, then no Custom Delegation Handlers \
must be specified. The true/false value indicates whether the the interim OpenAM session, \
created as part of delegated token validation, should be invalidated following token creation.
soap.sts.delgation.custom.token.handlers=Custom Delegation Handlers (optional)
soap.sts.delgation.custom.token.handlers.help=If delegation relationships are supported, the class names soap-sts .war \
file classpath resident implementations of the org.apache.cxf.sts.token.delegation.TokenDelegationHandler interface \
can be specified here.
soap.sts.delgation.custom.token.handlers.help.txt=Custom TokenDelegationHandler implementations will be invoked to validate \
the potentially custom token element included in the ActAs/OnBehalfOf \
element in the RequestSecurityToken invocation. Note that a TokenDelegationHandler does not need to be supplied to \
validate username or OpenAM session tokens. The validation of these tokens are supported out-of-the-box by selecting them \
in the Delegated Token Types list.
soap.sts.validation.security.policy.validated.token.config.missing.message=A value from the Security Policy Validated Token \
list must be selected.
soap.sts.validation.custom.wsdl.specification.inconsistent.message=If a custom wsdl file location is specified, then the Custom wsdl file \
entry must be selected from the Wsdl File Referencing Security Policy Binding Selection list.
soap.sts.validation.custom.wsdl.specification.incomplete.message=If a custom wsdl file location is specified, then the custom \
service name and custom service port must also be specified.
soap.sts.validation.security.policy.validated.token.config.wrong.cardinality.message=When no custom wsdl file location is \
specified, only a single entry in the Security Policy Validated Token list can be selected.
soap.sts.validation.no.wsdl.specified.message=Either a custom wsdl file must be specified, or a entry in the Wsdl File Referencing Security \
Policy Binding Selection list must be selected.
soap.sts.validation.no.congruence.between.wsdl.and.supporting.token.message=The entry selected from the Wsdl File Referencing Security Policy Binding \
Selection list, and the element selected from Security Policy Validated Token must both reference the same token type.
soap.sts.validation.no.custom.port.or.service.specified.message=If a custom wsdl location is specified, so too must the custom \
service name and port.
soap.sts.validation.no.am.deployment.url.message=The url of the OpenAM deployment must be specified.
soap.sts.validation.no.delegation.hanlders.specified.message=If the Delegation Relationships Supported check-box is selected \
then either Custom Delegation Handler(s) must be specified or Delegated Token Types must be selected.
soap.sts.validation.custom.service.or.port.not.qname.message=Both the custom service name and port must be in QName format: {namespace}local_name
# Common Scripting messages
label.select.script=--- Select a script ---