AccessManager.java revision 2fe1e6ab330f5f88e97684012ff29cde7e61c9c4
2362N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. 0N/A * Copyright (c) 2006 Sun Microsystems Inc. All Rights Reserved 0N/A * The contents of this file are subject to the terms 2362N/A * of the Common Development and Distribution License 0N/A * (the License). You may not use this file except in 2362N/A * compliance with the License. 0N/A * You can obtain a copy of the License at 0N/A * See the License for the specific language governing 0N/A * permission and limitations under the License. 0N/A * When distributing Covered Code, include this CDDL 0N/A * Header Notice in each file and include the License file 0N/A * If applicable, add the following below the CDDL Header, 2362N/A * with the fields enclosed by brackets [] replaced by 2362N/A * your own identifying information: 2362N/A * "Portions Copyrighted [year] [name of copyright owner]" 0N/A * Portions Copyrighted 2010-2015 ForgeRock AS. 0N/A * Portions Copyrighted 2014 Nomura Research Institute, Ltd 0N/A "resourcebundle-not-found=Resource Bundle not found.",
0N/A "realm-does-not-exist=Could not process the request because realm {0} did not exist.",
0N/A "identity-does-not-exist=Could not process the request because identity {0} did not exist.",
0N/A "missing-attributevalues=attributevalues and datafile options are missing.",
0N/A "missing-choicevalues=choicevalues and datafile options are missing.",
0N/A "attribute-schema-not-exist=Attribute schema {0} did not exist.",
0N/A "application-type-invalid=Application Type {0} is invalid.",
0N/A "actions-required=actions attributes are required. Example: get=true",
0N/A "resources-required=resources attributes are required. This defines the resources that are supported by this policy set.",
0N/A "subjects-required=subjects attributes are required. This defines the subject plugin classes for administration console.",
0N/A "conditions-required=conditions attributes are required. This defines the condition plugin classes for administration console.",
0N/A "entitlement-combiner-required=entitlementCombiner attribute is required.",
0N/A "entitlement-combiner-class-not-found=entitlementCombiner {0} class not found.",
0N/A "entitlement-combiner-does-not-extend-superclass=entitlementCombiner {0} did not extend EntitlementCombiner base class.",
0N/A "resource-comparator-class-not-found=resourceComparator {0} class not found.",
0N/A "resource-comparator-does-not-extend-interface=resourceComparator {0} did not implement ResourceName interface.",
0N/A "save-index-class-not-found=saveIndexImpl {0} class not found.",
0N/A "save-index-does-not-extend-interface=saveIndexImpl {0} did not implement ISaveIndex interface.",
0N/A "search-index-class-not-found=searchIndexImpl {0} class not found.",
0N/A "search-index-does-not-extend-interface=searchIndexImpl {0} did not implement ISearchIndex interface.",
0N/A "permission-denied=Permission to perform the {0} operation denied to {1}" 0N/A "adminid|u|s|Administrator ID of running the command.",
0N/A "password-file|f|s|File name that contains password of administrator."},
0N/A "batchfile|Z|s|Name of file that contains commands and options."},
0N/A "batchstatus|b|s|Name of status file.",
0N/A "continue|c|u|Continue processing the rest of the request when preceeding request was erroneous."},
0N/A "bulk-op-empty-datafile=Batch file, {0} was empty.",
0N/A "unmatch-quote=Unmatched '.",
0N/A "unmatch-doublequote=Unmatched \"."})
0N/A "host|t|s|Host Name."},
0N/A "filter|x|s|Filter (Pattern).",
0N/A "quiet|q|u|Do not prompt for session invalidation."},
0N/A "session-invalid-host-name=Invalid Host Name {0}. Expected format was <protocol>://<host>:<port>.",
0N/A "sizeLimitExceeded=Search size limit exceeded. Please refine your search.",
0N/A "timeLimitExceeded=Search time limit exceeded. Please refine your search.",
0N/A "session-no-sessions=There were no valid sessions.",
0N/A "session-current-session=[Current Session]",
0N/A "session-index=Index:",
0N/A "session-userId=User Id:",
0N/A "session-time-remain=Time Remain:",
0N/A "session-max-session-time=Max Session Time:",
0N/A "session-idle-time=Idle Time:",
0N/A "session-max-idle-time=Max Idle Time:",
0N/A "session-to-invalidate=To invalidate sessions, enter the index numbers",
0N/A "session-cr-to-exit=[CR without a number to exit]:",
0N/A "session-selection-not-in-list=Your selection was not in the session list.",
0N/A "session-io-exception-reading-input=IO Exception reading input:",
0N/A "session-destroy-session-succeeded=Destroy Session Succeeded."})
0N/A "bundlename|b|s|Resource Bundle Name.",
0N/A "bundlefilename|B|s|Resource bundle physical file name."},
0N/A "bundlelocale|o|s|Locale of the resource bundle."},
0N/A "resourcebundle-added=Resource Bundle was added."})
0N/A "bundlename|b|s|Resource Bundle Name."},
0N/A "bundlelocale|o|s|Locale of the resource bundle."},
0N/A "resourcebundle-returned=Resource Bundle was returned."})
0N/A "bundlename|b|s|Resource Bundle Name."},
0N/A "bundlelocale|o|s|Locale of the resource bundle."},
0N/A "resourcebundle-deleted=Resource Bundle was deleted."})
0N/A "xmlfile|X|m|XML file(s) that contains schema."},
0N/A "continue|c|u|Continue adding service if one or more previous service cannot be added."},
0N/A "subcmd-create-svc-__web__-xmlfile=Service Schema XML",
0N/A "one-or-more-services-not-added=One or more services were not added.",
0N/A "schema-added=Service was added.",
0N/A "schema-failed=Service was not added."})
0N/A "servicename|s|m|Service Name(s)."},
0N/A "continue|c|u|Continue deleting service if one or more previous services cannot be deleted.",
0N/A "deletepolicyrule|r|u|Delete policy rule."},
0N/A "one-or-more-services-not-deleted=One or more services were not deleted.",
0N/A "service-deleted=Service was deleted.",
0N/A "service-deletion-failed=Service was not deleted.",
0N/A "delete-service-no-policy-rules=There were no policy rules.",
0N/A "delete-service-no-policy-schema=There were no policy schema.",
0N/A "delete-service-delete-policy-rules=Delete policy rules."})
0N/A "xmlfile|X|m|XML file(s) that contains schema."},
0N/A "continue|c|u|Continue updating service if one or more previous services cannot be updated."},
0N/A "subcmd-update-svc-__web__-xmlfile=Service Schema XML",
0N/A "service-updated=Schema was updated.",
0N/A "service-updated-failed=Schema was not updated."})
0N/A "servicename|s|s|Service Name.",
0N/A "schematype|t|s|Schema Type.",
0N/A "attributeschemafile|F|m|XML file containing attribute schema definition."},
0N/A "subschemaname|c|s|Name of sub schema."},
0N/A "subcmd-add-attrs-__web__-attributeschemafile=Attribute Schema XML",
0N/A "attribute-schema-added=Attribute schema was added.",
0N/A "add-attribute-schema-failed=Attribute schema was not added."})
0N/A "entrydn|e|s|Distinguished name of organization to be migrated."},
0N/A "sms-migration-succeed=Migration succeeded."})
0N/A "realm|e|s|Name of realm to be created."},
0N/A "create-realm-succeed=Realm was created."})
0N/A "realm|e|s|Name of realm to be deleted."},
0N/A "recursive|r|u|Delete descendent realms recursively."},
0N/A "delete-realm-succeed=Realm was deleted."})
0N/A "realm|e|s|Name of realm where search begins."},
0N/A "filter|x|s|Filter (Pattern).",
0N/A "recursive|r|u|Search recursively"},
0N/A "search-realm-succeed=Search completed.",
0N/A "search-realm-no-results=There were no realms.",
0N/A "search-realm-results={0}"})
0N/A "realm|e|s|Name of realm.",
0N/A "servicename|s|s|Service Name."},
0N/A "attributevalues|a|m|Attribute values e.g. homeaddress=here.",
0N/A "datafile|D|s|Name of file that contains attribute values data."},
0N/A "assign-service-to-realm-succeed=Service, {1} was added to realm, {0}."})
0N/A "realm|e|s|Name of realm."},
0N/A "mandatory|y|u|Include Mandatory services."},
0N/A "realm-get-assigned-services-succeed=Services were returned.",
0N/A "realm-get-assigned-services-no-services=There no services in this realm.",
0N/A "realm-get-assigned-services-results={0}"})
0N/A "realm|e|s|Name of realm."},
0N/A "realm-getassignable-services-succeed=Assignable Services were returned.",
0N/A "realm-getassignable-services-no-services=There were no assignable services for this realm.",
0N/A "realm-getassignable-services-result={0}"})
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service to be removed."},
"unassign-service-from-realm-succeed=Service, {1} was removed from realm, {0}.",
"unassign-service-from-realm-service-not-assigned=Service, {1} was not added to realm, {0}."})
implClassName=
"com.sun.identity.cli.realm.RealmGetAttributeValues",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"get-attr-values-of-realm-no-values={0} had no attributes.",
"get-attr-values-of-realm-result={0}={1}"})
implClassName=
"com.sun.identity.cli.realm.RealmGetServiceAttributeValues",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"get-service-attr-values-of-realm-no-attr=There were no attribute values.",
"get-service-attr-values-of-realm-result={0}={1}"})
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service.",
"attributename|a|s|Name of attribute to be removed."},
"remove-attribute-from-realm-succeed=Attribute was removed."})
description=
"Set service attribute values in a realm.",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"modify-service-of-realm-succeed={1} under {0} was modified.",
"modify-service-of-realm-not-assigned=Service, {1} was not modified because it was not added to {0}."})
implClassName=
"com.sun.identity.cli.realm.RealmRemoveServiceAttributes",
description=
"Remove service attribute values in a realm.",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"attributevalues|a|m|Attribute values to be removed e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values to be removed."},
"realm-remove-service-attributes-succeed=The following attributes were removed.",
"realm-remove-service-attributes-not-assigned=Service, {1} was not modified because it was not added to {0}."})
implClassName=
"com.sun.identity.cli.realm.RealmAddServiceAttributes",
description=
"Add service attribute values in a realm.",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"attributevalues|a|m|Attribute values to be added e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values to be added."},
"realm-add-service-attributes-succeed=The following attributes were added.",
"realm-add-service-attributes-not-assigned=Service, {1} was not modified because it was not added to {0}."})
implClassName=
"com.sun.identity.cli.realm.RealmSetServiceAttributeValues",
description=
"Set attribute values of a service that is assigned to a realm.",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"append|p|u|Set this flag to append the values to existing ones.",
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"realm-set-svc-attr-values-service-not-assigned=Service was not assigned to realm.",
"set-svc-attribute-values-realm-succeed=Attribute values were set."})
implClassName=
"com.sun.identity.cli.realm.RealmSetAttributeValues",
"realm|e|s|Name of realm.",
"servicename|s|s|Name of service."},
"append|p|u|Set this flag to append the values to existing ones.",
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"add-attribute-values-realm-succeed=Attribute values were added.",
"set-attribute-values-realm-succeed=Attribute values were set."})
"realm|e|s|Name of realm.",
"xmlfile|X|s|Name of file that contains policy XML definition."},
"subcmd-create-policies-__web__-xmlfile=Policy XML",
"create-policy-in-realm-succeed=Policies were created under realm, {0}."})
"policynames|p|m|Names of policy to be deleted.",
"file|D|s|Name of file that contains the policy names to be deleted."},
"missing-policy-names=Policy names need to be provided either with --policynames or --file option",
"delete-policy-in-realm-succeed=Policies were deleted under realm, {0}."})
"realm|e|s|Name of realm.",
"xmlfile|X|s|Name of file that contains policy XML definition."},
"update-policy-in-realm-name-not-found=The policy provided did not exist in the policy store with the same name. If this is a new policy then run create-policies.",
"update-policy-in-realm-succeed=Policies were updated under realm, {0}."})
"realm|e|s|Name of realm."},
"policynames|p|m|Names of policy. This can be an wildcard. All policy definition in the realm will be returned if this option is not provided.",
"outfile|o|s|Filename where policy definition will be printed to. Definition will be printed in standard output if this option is not provided.",
"namesonly|n|u|Returns only names of matching policies. Policies are not returned." },
"get-policy-names-in-realm-succeed=Policy names were returned under realm, {0}.",
"get-policy-names-in-realm-no-policies=There were not matching policy names under realm, {0}.",
"get-policy-in-realm-succeed=Policy definitions were returned under realm, {0}.",
"get-policy-in-realm-no-policies=There were not matching policies under realm, {0}."})
implClassName=
"com.sun.identity.cli.schema.RemoveAttributeDefaults",
description=
"Remove default attribute values in schema.",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributenames|a|m|Attribute name(s)."},
"subschemaname|c|s|Name of sub schema."},
"schema-remove-attribute-defaults-succeed=Schema attribute defaults were removed.",
"schema-sub-schema-does-not-exists=Sub Schema did not exist, {0}.",
"supported-schema-type=Unsupported Schema Type, {0}."})
implClassName=
"com.sun.identity.cli.schema.AddAttributeDefaults",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data.",
"subschemaname|c|s|Name of sub schema."},
"schema-add-attribute-defaults-succeed=Schema attribute defaults were added."})
implClassName=
"com.sun.identity.cli.schema.GetAttributeDefaults",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema. One of dynamic, global, or organization (meaning realm)."},
"subschemaname|c|s|Name of sub schema.",
"attributenames|a|m|Attribute name(s)."},
"schema-get-attribute-defaults-succeed=Schema attribute defaults were returned.",
"schema-get-attribute-defaults-no-matching-attr=There were no attribute values.",
"schema-get-attribute-defaults-result={0}={1}"})
implClassName=
"com.sun.identity.cli.schema.SetAttributeDefaults",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema."},
"subschemaname|c|s|Name of sub schema.",
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"schema-set-attribute-defaults-succeed=Schema attribute defaults were set."})
implClassName=
"org.forgerock.openam.cli.schema.GetAttributeSchemaChoiceValues",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributename|a|s|Name of attribute."},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-i18nkey=I18n Key",
"attribute-schema-choice-value=Choice Value"})
implClassName=
"com.sun.identity.cli.schema.SetAttributeSchemaChoiceValues",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributename|a|s|Name of attribute."},
"add|p|u|Set this flag to append the choice values to existing ones.",
"subschemaname|c|s|Name of sub schema.",
"datafile|D|s|Name of file that contains attribute values data.",
"choicevalues|k|m|Choice value e.g. o102=Inactive."},
"attribute-schema-set-choice-value-succeed=Choice Values were set."})
implClassName=
"com.sun.identity.cli.schema.SetAttributeSchemaBooleanValues",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributename|a|s|Name of attribute.",
"truevalue|e|s|Value for true.",
"truei18nkey|k|s|Internationalization key for true value.",
"falsevalue|z|s|Value for false.",
"falsei18nkey|j|s|Internationalization key for false value."},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-set-boolean-values-succeed=Boolean Values were set."})
implClassName=
"com.sun.identity.cli.schema.RemoveAttributeSchemaChoiceValues",
description=
"Remove choice values from attribute schema.",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributename|a|s|Name of attribute.",
"choicevalues|k|m|Choice values e.g. Inactive"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-remove-choice-value-succeed=Choice Values were removed."})
implClassName=
"com.sun.identity.cli.schema.ModifyAttributeSchemaType",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"type|p|s|Attribute Schema Type"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-modify-type-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.ModifyAttributeSchemaUIType",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"uitype|p|s|Attribute Schema UI Type"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-modify-ui-type-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.ModifyAttributeSchemaSyntax",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"syntax|x|s|Attribute Schema Syntax"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-modify-syntax-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.ModifyAttributeSchemaI18nKey",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"i18nkey|k|s|Attribute Schema I18n Key"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-modify-i18n-key-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.ModifyAttributeSchemaPropertiesViewBeanURL",
description=
"Set properties view bean URL member of attribute schema.",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"url|r|s|Attribute Schema Properties View Bean URL"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-modify-properties-view-bean-url-key-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.ModifyAttributeSchemaAny",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"any|y|s|Attribute Schema Any value"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-modify-any-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.RemoveAttributeSchemaDefaultValues",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"defaultvalues|e|m|Default value(s) to be deleted"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-remove-default-values-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.SetAttributeSchemaValidator",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"validator|r|s|validator class name"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-set-validator-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.SetAttributeSchemaStartRange",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"range|r|s|Start range"},
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-set-start-range-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.SetAttributeSchemaEndRange",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|s|Name of attribute schema",
"subschemaname|c|s|Name of sub schema."},
"attribute-schema-set-end-range-succeed=Attribute Schema, {3} was modified."})
implClassName=
"com.sun.identity.cli.schema.RemoveAttributeSchemas",
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"attributeschema|a|m|Name of attribute schema to be removed."},
"subschemaname|c|s|Name of sub schema."},
"remove-attribute-schema-succeed=Attribute schema, {3} was removed."})
implClassName=
"com.sun.identity.cli.schema.SetServiceSchemaI18nKey",
"servicename|s|s|Name of service.",
"i18nkey|k|s|I18n Key."},
"service-schema-set-i18n-key-succeed=Service Schema, {0} was modified."})
implClassName=
"com.sun.identity.cli.schema.SetServiceSchemaPropertiesViewBeanURL",
description=
"Set service schema properties view bean URL.",
"servicename|s|s|Name of service.",
"url|r|s|Service Schema Properties View Bean URL"},
"service-schema-set-properties-view-bean-url-succeed=Service Schema, {0} was modified."})
implClassName=
"com.sun.identity.cli.schema.SetServiceRevisionNumber",
"servicename|s|s|Name of service.",
"revisionnumber|r|s|Revision Number"},
"service-schema-set-revision-number-succeed=Service Schema, {0} was modified."})
implClassName=
"com.sun.identity.cli.schema.GetServiceRevisionNumber",
"servicename|s|s|Name of service."},
"service-schema-get-revision-number-succeed=Revision number of service {0} was {1}."})
"servicename|s|s|Name of service.",
"subconfigname|g|s|Name of sub configuration."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data.",
"realm|e|s|Name of realm (Sub Configuration shall be added to global configuration if this option is not provided).",
"subconfigid|b|s|ID of parent configuration(Sub Configuration shall be added to root configuration if this option is not provided).",
"priority|p|s|Priority of the sub configuration."},
"add-sub-configuration-succeed=Sub Configuration {1} was added.",
"add-sub-configuration-priority-no-integer=Priority needs to be an integer.",
"add-sub-configuration-to-realm-succeed=Sub Configuration {1} was added to realm {0}",
"add-sub-configuration-no-global-config=There were no global configurations for service, {0}"})
implClassName=
"com.sun.identity.cli.schema.DeleteSubConfiguration",
"servicename|s|s|Name of service.",
"subconfigname|g|s|Name of sub configuration."},
"realm|e|s|Name of realm (Sub Configuration shall be deleted from the global configuration if this option is not provided)."},
"delete-sub-configuration-succeed=Sub Configuration {1} was deleted.",
"delete-sub-configuration-to-realm-succeed=Sub Configuration {1} was deleted from realm {0}"})
implClassName=
"org.forgerock.openam.cli.schema.GetSubConfiguration",
"servicename|s|s|Name of service.",
"subconfigname|g|s|Name of sub configuration."},
"realm|e|s|Name of realm (Sub Configuration shall be retrieved from the global configuration if this option is not provided)."},
"get-sub-configuration-succeed=Sub Configuration, {0} was retrieved.",
"get-sub-configuration-to-realm-succeed=Sub Configuration, {1} was retrieved in realm {0}"})
implClassName=
"com.sun.identity.cli.schema.ModifySubConfiguration",
"servicename|s|s|Name of service.",
"subconfigname|g|s|Name of sub configuration.",
"operation|o|s|Operation (either add/set/modify) to be performed on the sub configuration."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data.",
"realm|e|s|Name of realm (Sub Configuration shall be set to global configuration if this option is not provided)."},
"modify-sub-configuration-succeed=Sub Configuration, {0} was modified.",
"modify-sub-configuration-to-realm-succeed=Sub Configuration, {1} was modify in realm, {0}",
"modify-sub-configuration-invalid-operation=Invalid operation, supported operation were 'add', 'delete' and 'set'."})
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"filename|F|s|Name of file that contains the schema"},
"subcmd-add-sub-schema-__web__-filename=Service Schema XML",
"add-subschema-succeed=Sub Schema, {2} of type, {1} was added to service {0}."})
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"subschemanames|a|m|Name(s) of sub schema to be removed."},
"subschemaname|c|s|Name of parent sub schema."},
"remove-subschema-succeed={3} of Sub Schema, {2} of type, {1} was removed from service {0}."})
"servicename|s|s|Name of service.",
"schematype|t|s|Type of schema.",
"subschemaname|c|s|Name of sub schema.",
"inheritance|r|s|Value of Inheritance."},
"modify-inheritance-succeed=Inheritance of Sub Schema, {2} of type, {1} in service {0} was modified."})
"servicename|s|s|Name of service.",
"interfacename|i|s|Name of interface.",
"pluginname|g|s|Name of Plug-in.",
"i18nkey|k|s|Plug-in I18n Key."},
"add-plugin-interface-succeed=Plug-in interface, {1} was add to service, {0}."})
"servicename|s|s|Name of service.",
"interfacename|i|s|Name of interface.",
"pluginname|g|s|Name of Plug-in.",
"i18nkey|k|s|Plug-in I18n Key.",
"i18nname|n|s|Plug-in I18n Name.",
"classname|c|s|Name of the Plugin Schema class implementation"},
"add-plugin-schema-succeed=Plug-in schema, {1} was added to service, {0}.",
"add-plugin-schema-failed=Plug-in schema, {1} was not added to service, {0}: {2}"})
implClassName=
"org.forgerock.openam.cli.schema.RemovePluginSchema",
"servicename|s|s|Name of service.",
"interfacename|i|s|Name of interface.",
"pluginname|g|s|Name of Plug-in."},
"remove-plugin-schema-succeed=Plug-in schema, {1} was removed from the service, {0}.",
"remove-plugin-schema-failed=Plug-in schema, {1} was not removed from the service, {0}: {2}"})
implClassName=
"com.sun.identity.cli.schema.SetPluginSchemaPropertiesViewBeanURL",
description=
"Set properties view bean URL of plug-in schema.",
"servicename|s|s|Name of service.",
"interfacename|i|s|Name of interface.",
"pluginname|g|s|Name of Plug-in.",
"url|r|s|Properties view bean URL."},
"set-properties-viewbean-url-plugin-schema-succeed=Properties View Bean of Plug-in schema, {1} of service, {0} was set."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"attributevalues|a|m|Attribute values e.g. sunIdentityServerDeviceStatus=Active.",
"datafile|D|s|Name of file that contains attribute values data."},
"create-identity-succeed=Identity, {2} of type {1} was created in realm, {0}.",
"multi-identity-failed=Multiple identities of name, {2} of type {1} in realm, {0} found.",
"identity-not-found=Could not find identity of name, {2} of type {1} in realm, {0}.",
"invalid-identity-type=Invalid identity type.",
"does-not-support-creation={0} did not support identity creation of type, {1}."})
"realm|e|s|Name of realm.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"idnames|i|m|Names of identites.",
"file|D|s|Name of file that contains the identity names to be deleted."},
"missing-identity-names=Identity names need to be provided either with --idnames or --file option.",
"delete-identity-succeed=The following {1} was deleted from {0}.",
"delete-identities-succeed=The following {1}s were deleted from {0}."})
"realm|e|s|Name of realm.",
"filter|x|s|Filter (Pattern).",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"search-identities-succeed=Search of Identities of type {1} in realm, {0} succeeded.",
"search-identities-no-entries=There were no entries.",
"format-search-identities-results={0} ({1})"})
implClassName=
"com.sun.identity.cli.idrepo.GetAllowedIdOperations",
description=
"Show the allowed operations of an identity a realm",
"realm|e|s|Name of realm.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"get-allowed-ops-no-ops=No operations were allowed for {1} under {0}.",
"allowed-ops-result={0}"})
implClassName=
"com.sun.identity.cli.realm.GetSupportedDataTypes",
description=
"Show the supported data type in the system.",
"get-supported-no-supported-datatype=There were no supported data type."})
description=
"Show the supported identity type in a realm",
"realm|e|s|Name of realm."},
"supported-type-result={0}",
"no-supported-idtype=There were no supported identity types."})
implClassName=
"com.sun.identity.cli.idrepo.GetAssignableServices",
description=
"List the assignable service to an identity",
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"assignable-service-result={0}",
"realm-does-not-support-service=realm, {0} did not support services.",
"no-service-assignable=There were no assignable services."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"assigned-service-result={0}",
"no-service-assigned=There were no services."})
implClassName=
"com.sun.identity.cli.idrepo.GetServiceAttributes",
description=
"Show the service attribute values of an identity",
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group.",
"servicename|s|s|Name of service."},
"idrepo-service-attribute-result={0}={1}",
"idrepo-no-service-attributes=There were no service attribute values."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"attributenames|a|m|Attribute name(s). All attribute values shall be returned if the option is not provided."},
"idrepo-attribute-result={0}={1}",
"idrepo-no-attributes={0} had no attributes."})
description=
"Show the memberships of an identity. For sample show the memberships of an user.",
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group.",
"membershipidtype|m|s|Membership identity type."},
"idrepo-memberships-result={0} ({1})",
"idrepo-no-memberships=Identity {2} did not have any {3} memberships.",
"idrepo-cannot-be-member={0} could not have {1} membership."})
description=
"Show the members of an identity. For example show the members of a role",
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group.",
"membershipidtype|m|s|Membership identity type."},
"idrepo-members-result={0} ({1})",
"idrepo-no-members={2} did not have any {3} members.",
"idrepo-cannot-be-member={0} could not have {1} members."})
description=
"Add an identity as member of another identity",
"realm|e|s|Name of realm.",
"memberidname|m|s|Name of identity that is member.",
"memberidtype|y|s|Type of Identity of member such as User, Role and Group.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity"},
"idrepo-get-addmember-succeed={0} was added to {1}."})
description=
"Remove membership of identity from another identity",
"realm|e|s|Name of realm.",
"memberidname|m|s|Name of identity that is member.",
"memberidtype|y|s|Type of Identity of member such as User, Role and Group.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity"},
"idrepo-get-removemember-succeed={0} was removed from {1}."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group.",
"servicename|s|s|Name of service."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"idrepo-assign-service-succeed={3} was added to identity {2} of type, {1} in realm, {0}."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group.",
"servicename|s|s|Name of service."},
"idrepo-unassign-service-succeed={3} was removed from identity {2} of type, {1} in realm, {0}."})
description=
"Set service attribute values of an identity",
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group.",
"servicename|s|s|Name of service."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"idrepo-modify-service-succeed=Attribute values of service, {3} of identity {2} of type, {1} in realm, {0} was modified."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as User, Role and Group."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"idrepo-set-attribute-values-succeed=Attribute values of identity, {2} of type, {1} in realm, {0} was modified."})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such Role and Group."},
"identity-does-not-exist=Identity {0} of type {1} does not exist.",
"no-privileges=There were no privileges."})
description=
"Add privileges to an identity. To add a privilege to all authenticated users, use the " +
"\"All Authenticated Users\" idname with \"role\" idtype.",
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as Role and Group.",
"privileges|g|m|Name of privileges to be added. Privilege names are AgentAdmin, ApplicationModifyAccess, ApplicationReadAccess, ApplicationTypesReadAccess, ConditionTypesReadAccess, DecisionCombinersReadAccess, EntitlementRestAccess, FederationAdmin, LogAdmin, LogRead, LogWrite, PolicyAdmin, PrivilegeRestAccess, PrivilegeRestReadAccess, RealmAdmin, RealmReadAccess, ReferralsModifyAccess, ReferralsReadAccess, ResourceTypeModifyAccess, ResourceTypeReadAccess, SubjectAttributesReadAccess, and SubjectTypesReadAccess."},
"idrepo-add-privileges-do-not-exist=Identity {0} of type {1} did not exist.",
"idrepo-add-privileges-succeed=Privileges were add to identity, {2} of type, {1} in realm, {0}.",
"delegation-already-has-privilege={0} already had privilege, {1}"})
"realm|e|s|Name of realm.",
"idname|i|s|Name of identity.",
"idtype|t|s|Type of Identity such as Role and Group.",
"privileges|g|m|Name of privileges to be removed. Privilege names are AgentAdmin, ApplicationModifyAccess, ApplicationReadAccess, ApplicationTypesReadAccess, ConditionTypesReadAccess, DecisionCombinersReadAccess, EntitlementRestAccess, FederationAdmin, LogAdmin, LogRead, LogWrite, PolicyAdmin, PrivilegeRestAccess, PrivilegeRestReadAccess, RealmAdmin, RealmReadAccess, ReferralsModifyAccess, ReferralsReadAccess, ResourceTypeModifyAccess, ResourceTypeReadAccess, SubjectAttributesReadAccess, and SubjectTypesReadAccess."},
"idrepo-remove-privileges-succeed=Privileges were removed from identity, {2} of type, {1} in realm, {0}.",
"delegation-does-not-have-privilege={0} did not have privilege, {1}"})
implClassName=
"com.sun.identity.cli.authentication.ListAuthInstances",
"realm|e|s|Name of realm."},
"authentication-list-auth-instance=Authentication Instances:",
"authentication-list-auth-instance-empty=There were no authentication instances.",
"authentication-list-auth-instance-entry={0}, [type={1}]"}
implClassName=
"com.sun.identity.cli.authentication.CreateAuthInstance",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication module instance.",
"authtype|t|s|Type of authentication module instance. " +
"Possible values include AD, Adaptive, Anonymous, Cert, DataStore, " +
"DeviceIdMatch, DeviceIdSave, Federation, HOTP, HTTPBasic, JDBC, " +
"LDAP, Membership, MSISDN, OATH, OAuth, OpenIdConnect, " +
"PersistentCookie, RADIUS, SAE, Scripted, WindowsDesktopSSO, " +
"NT, and WSSAuthModule." },
"authentication-created-auth-instance-succeeded=Authentication Instance was created."}
implClassName=
"com.sun.identity.cli.authentication.DeleteAuthInstances",
"realm|e|s|Name of realm.",
"names|m|m|Name of authentication instances."},
"authentication-delete-auth-instance-succeeded=Authentication Instance was deleted.",
"authentication-delete-auth-instances-succeeded=Authentication Instances were deleted." implClassName=
"com.sun.identity.cli.authentication.UpdateAuthInstance",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication instance."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"authentication-update-auth-instance-succeeded=Authentication Instance was updated.",
"authentication-update-auth-instance-not-found=Authentication Instance was not found."}
implClassName=
"com.sun.identity.cli.authentication.GetAuthInstance",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication instance."},
"authentication-get-auth-instance-succeeded=Authentication Instance profile:",
"authentication-get-auth-instance-result={0}={1}",
"authentication-get-auth-instance-no-values=There were no attribute values.",
"authentication-get-auth-instance-not-found=Authentication Instance was not found."}
implClassName=
"com.sun.identity.cli.authentication.ListAuthConfigurations",
"realm|e|s|Name of realm."},
"authentication-list-auth-configurations-succeeded=Authentication Configurations:",
"authentication-list-auth-configurations-no-configurations=There were no configurations." implClassName=
"com.sun.identity.cli.authentication.CreateAuthConfiguration",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication configuration."},
"authentication-created-auth-configuration-succeeded=Authentication Configuration was created."}
implClassName=
"com.sun.identity.cli.authentication.DeleteAuthConfigurations",
"realm|e|s|Name of realm.",
"names|m|m|Name of authentication configurations."},
"authentication-delete-auth-configuration-succeeded=Authentication Configuration was deleted.",
"authentication-delete-auth-configurations-succeeded=Authentication Configurations were deleted." implClassName=
"com.sun.identity.cli.authentication.GetAuthConfigurationEntries",
description=
"Get authentication configuration entries",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication configuration."},
"authentication-get-auth-config-entries-succeeded=Authentication Configuration's entries:",
"authentication-get-auth-config-entries-entry=[name={0}] [flag={1}] [options={2}]",
"authentication-get-auth-config-entries-no-values=There were no entries.",
"authentication-get-auth-config-entries-not-found=Authentication Configuration was not found."}
implClassName=
"com.sun.identity.cli.authentication.AddAuthConfigurationEntry",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication configuration.",
"modulename|o|s|Module Name.",
"criteria|c|s|Criteria for this entry. Possible values are REQUIRED, OPTIONAL, SUFFICIENT, REQUISITE"},
"options|t|s|Options for this entry.",
"position|p|s|Position where the new entry is to be added. This is option is not set, entry shall be added to the end of the list. If value of this option is 0, it will be inserted to the front of the list. If value is greater of the length of the list, entry shall be added to the end of the list."},
"authentication-add-auth-config-entry-criteria.invalid=Invalid value for criteria.",
"authentication-add-auth-config-entry-position.invalid=Invalid value for position. Value must be either 0 or a positive integer.",
"authentication-add-auth-config-entry-succeeded=Authentication Configuration's entry was created",
"authentication-add-auth-config-entry-not-found=Authentication Configuration {0} was not found."}
implClassName=
"com.sun.identity.cli.authentication.UpdateAuthConfigurationEntries",
description=
"Set authentication configuration entries",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication configuration."},
"entries|a|m|formatted authentication configuration entries in this format name&pipe;flag&pipe;options. option can be REQUIRED, OPTIONAL, SUFFICIENT, REQUISITE. e.g. myauthmodule&pipe;REQUIRED&pipe;my options.",
"datafile|D|s|Name of file that contains formatted authentication configuration entries in this format name&pipe;flag&pipe;options. option can be REQUIRED, OPTIONAL, SUFFICIENT, REQUISITE. e.g. myauthmodule&pipe;REQUIRED&pipe;my options."},
"authentication-set-auth-config-entries-succeeded=Authentication Configuration's entries were updated",
"authentication-set-auth-config-entries-not-found=Authentication Configuration was not found.",
"authentication-set-auth-config-entries-instance-not-found=Authentication instance {0} was not found.",
"authentication-set-auth-config-entries-missing-data=Entries and datafile were missing."}
implClassName=
"org.forgerock.openam.cli.authentication.UpdateAuthConfigProperties",
description=
"Set authentication configuration properties",
"realm|e|s|Name of realm.",
"name|m|s|Name of authentication configuration."},
"attributevalues|a|m|authentication configuration properties, valid configuration keys are: iplanet-am-auth-login-failure-url, iplanet-am-auth-login-success-url and iplanet-am-auth-post-login-process-class.",
"datafile|D|s|Name of file that contains authentication configuration properties."},
"authentication-set-auth-config-props-succeeded=Authentication Configuration properties were updated",
"authentication-set-auth-config-props-invalid-key=Invalid configuration property key provided: {0}",
"authentication-set-auth-config-props-missing-data=Entries and datafile were missing."}
implClassName=
"com.sun.identity.cli.datastore.ListDataStoreTypes",
"datastore-list-datastore-types-desc=Description",
"datastore-list-datastore-types-type=Type",
"datastore-list-datastore-types-succeeded=Supported Datastore Types:",
"datastore-list-datastore-types-no-entries=There were no supported datastore types." "realm|e|s|Name of realm."},
"datastore-list-datastores-succeeded=Datastore:",
"datastore-list-datastores-no-entries=There were no datastores." implClassName=
"com.sun.identity.cli.datastore.AddAMSDKIdRepoPlugin",
"directory-servers|s|m|directory servers <protocol>://<hostname>:<port>. Can have multiple entries.",
"binddn|e|s|Directory Server bind distinguished name.",
"bind-password-file|m|s|File that contains password of bind password.",
"basedn|b|s|Directory Server base distinguished name.",
"dsame-password-file|x|s|File that contains password of the dsameuser",
"puser-password-file|p|s|File that contains password of the puser"},
"user|a|s|User objects naming attribute (defaults to 'uid')",
"org|o|s|Organization objects naming attribute (defaults to 'o')"},
"datastore-add-amsdk-idrepo-plugin-succeeded=AMSDK Plugin created successfully.",
"datastore-add-amsdk-idrepo-plugin-failed=AMSDK Plugin creation failed",
"datastore-add-amsdk-idrepo-plugin-policies-failed=Adding Delegation policies failed" "realm|e|s|Name of realm.",
"name|m|s|Name of datastore.",
"datatype|t|s|Type of datastore. Use the list-datastore-types subcommand to get a list of supported datastore types."},
"attributevalues|a|m|Attribute values e.g. sunIdRepoClass=com.sun.identity.idm.plugins.files.FilesRepo.",
"datafile|D|s|Name of file that contains attribute values data."},
"datastore-create-datastore-succeeded=Datastore was created.",
"datastore-create-datastore-missing-data=Attribute values and datafile were missing." "realm|e|s|Name of realm.",
"names|m|m|Names of datastore."},
"datastore-delete-datastore-not-found=Datastores were not found.",
"datastore-delete-datastore-succeeded=Datastore was deleted.",
"datastore-delete-datastores-succeeded=Datastores were deleted." "realm|e|s|Name of realm.",
"name|m|s|Name of datastore."},
"attributevalues|a|m|Attribute values e.g. sunIdRepoClass=com.sun.identity.idm.plugins.files.FilesRepo.",
"datafile|D|s|Name of file that contains attribute values data."},
"datastore-update-datastore-succeeded=Datastore profile was updated.",
"datastore-update-datastore-not-found=Datastore was not found.",
"datastore-update-datastore-missing-data=Attribute values and datafile were missing." "realm|e|s|Name of realm.",
"name|m|s|Name of datastore."},
"datastore-show-datastore-not-found=Datastore was not found." implClassName=
"com.sun.identity.cli.schema.ExportServiceConfiguration",
description=
"Export service configuration. In production environments, you should back up the service configuration using file system utilities or the export-ldif command.",
"encryptsecret|e|s|Secret key for encrypting password. Any arbitrary value can be specified."},
"export-service-configuration-succeeded=Service Configuration was exported." implClassName=
"com.sun.identity.cli.schema.ImportServiceConfiguration",
description=
"Import service configuration. In production environments, you should restore the service configuration using file system utilities or the import-ldif command.",
"encryptsecret|e|s|Secret key for decrypting password.",
"xmlfile|X|s|XML file that contains configuration data."},
"import-service-configuration-unknown-ds=Unable to import service configuration because we are unable to recognize the data store type. We support Sun Directory Server and Embedded OpenDJ as service configuration data store.",
"import-service-configuration-processing=Please wait while we import the service configuration...",
"import-service-configuration-succeeded=Service Configuration was imported.",
"import-service-configuration-invalid-ds-type=Invalid datastore type.",
"import-service-configuration-invalid-port=Invalid port number.",
"import-service-configuration-not-connect-to-ds=Unable to connect to directory server.",
"import-service-configuration-connecting-to-ds=Connecting to directory server.",
"import-service-configuration-connected-to-ds=Connected to directory server.",
"import-service-configuration-prompt-delete=Directory Service contains existing data. Do you want to delete it? [y|N]",
"import-service-configuration-cannot-load-lidf=Could not locate LDIF, {0}.",
"import-service-configuration-unable-to-locate-hash-secret=Cannot locate hashed encryption key, please make sure that the last line of importing XML file have it.",
"import-service-configuration-secret-key=The provided encryptsecret is invalid." implClassName=
"com.sun.identity.cli.schema.CreateServerConfigXML",
"dshost|t|s|Directory Server host name",
"dsport|p|s|Directory Server port number",
"basedn|b|s|Directory Server base distinguished name.",
"dsadmin|a|s|Directory Server administrator distinguished name",
"dspassword-file|x|s|File that contains Directory Server administrator password",
"outfile|o|s|File name where serverconfig XML is written." "create-serverconfig-xml-succeeded=Server Configuration XML was created." implClassName=
"com.sun.identity.cli.serverconfig.GetServerConfigXML",
description=
"Get server configuration XML from centralized data store",
"outfile|o|s|File name where serverconfig XML is written." "server-config-port-missing=Port number in server name is required.",
"server-config-uri-missing=URI in server name is required.",
"get-server-config-xml-no-result-no-results=Could not locate server configuration XML for this server.",
"get-serverconfig-xml-succeeded=Server Configuration XML was returned." implClassName=
"com.sun.identity.cli.serverconfig.SetServerConfigXML",
description=
"Set server configuration XML to centralized data store",
"xmlfile|X|m|XML file that contains configuration."},
"set-serverconfig-xml-succeeded=Server Configuration XML was set." "realm|e|s|Name of realm.",
"agentname|b|s|Name of agent.",
"agenttype|t|s|Type of agent. Possible values: J2EEAgent, WebAgent, 2.2_Agent, SharedAgent, OAuth2Client" +
" WebAgent agent types, and is required when the agent type is J2EEAgent or WebAgent.",
+
"and is required when the agent type is J2EEAgent or WebAgent.",
"datafile|D|s|Name of file that contains properties."},
"server-url-missing=Server URL is needed.",
"agent-url-missing=Agent URL is needed.",
"does-not-support-server-url=Server URL is only supported for J2EEAgent and WebAgent.",
"does-not-support-agent-url=Agent URL is only supported for J2EEAgent and WebAgent.",
"server-url-invalid=Server URL is invalid.",
"agent-url-invalid=Agent URL is invalid.",
"does-not-support-agent-creation={0} did not support agent creation.",
"agent-creation-pwd-needed=An agent password is required when you create the agent configuration. Either datafile or attributevalues must include a value for the userpassword attribute.",
"create-agent-succeeded=Agent configuration was created.",
"missing-urls=Server URL and Agent URL must be provided when attributes/datafile are not available." "agentnames|s|m|Separate multiple agent names with spaces.",
"file|D|s|File containing agent names, with multiple agent names separated by spaces."},
"missing-agent-names=Agent names need to be provided either with --agentnames or --file option.",
"delete-agent-succeeded=The following agents were deleted." "realm|e|s|Name of realm.",
"agentname|b|s|Name of agent."},
"set|s|u|Set this flag to overwrite properties values.",
"attributevalues|a|m|Properties e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains properties."},
"update-agent-does-not-exist=Agent {0} did not exist.",
"update-agent-succeeded=Agent configuration was updated." implClassName=
"com.sun.identity.cli.agentconfig.RemoveAgentProperties",
"realm|e|s|Name of realm.",
"agentname|b|s|Name of agent.",
"attributenames|a|m|properties name(s)."},
"agent-remove-properties-succeeded=Properties were removed." "realm|e|s|Name of realm."},
"filter|x|s|Filter (Pattern).",
"agenttype|t|s|Type of agent. e.g. J2EEAgent, WebAgent"},
"search-agent-no-entries=There were no agents.",
"format-search-agent-results={0} ({1})" "realm|e|s|Name of realm.",
"agentname|b|s|Name of agent."},
"outfile|o|s|Filename where configuration is written to.",
"inherit|i|u|Set this to inherit properties from parent group.",
"includepassword|p|u|Include the hashed password in the export."},
"show-agent-agent-does-not-exist=Agent {0} does not exist.",
"show-agent-to-file=Agent properties were written to file.",
"show-agent-no-attributes=There were no attribute values." "show-agent-type-no-results=There were no supported agent types." "realm|e|s|Name of realm.",
"agentgroupname|b|s|Name of agent group."},
"outfile|o|s|Filename where configuration is written to."},
"show-agent-group-does-not-exist=Agent group {0} does not exist.",
"show-agent-group-to-file=Agent group properties were written to file.",
"show-agent-group-no-attributes=There were no attribute values." implClassName=
"com.sun.identity.cli.agentconfig.CreateAgentGroup",
"realm|e|s|Name of realm.",
"agentgroupname|b|s|Name of agent group.",
"agenttype|t|s|Type of agent group. e.g. J2EEAgent, WebAgent"},
"attributevalues|a|m|Properties e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains properties."},
"does-not-support-agent-group-creation={0} did not support agent group creation.",
"create-agent-group-succeeded=Agent group was created." implClassName=
"com.sun.identity.cli.agentconfig.DeleteAgentGroups",
"agentgroupnames|s|m|Separate multiple agent group names with spaces.",
"file|D|s|File containing agent group names, with multiple group names separated by spaces."},
"missing-agent-group-names=Agent group names need to be provided either with --agentgroupnames or --file option.",
"delete-agent-group-succeeded=The following agent groups were deleted." implClassName=
"com.sun.identity.cli.agentconfig.ListAgentGroups",
"realm|e|s|Name of realm."},
"filter|x|s|Filter (Pattern).",
"agenttype|t|s|Type of agent. e.g. J2EEAgent, WebAgent"},
"search-agent-group-no-entries=There were no agent groups.",
"format-search-agent-group-results={0} ({1})" implClassName=
"com.sun.identity.cli.agentconfig.ListAgentGroupMembers",
"realm|e|s|Name of realm.",
"agentgroupname|b|s|Name of agent group."},
"filter|x|s|Filter (Pattern)."},
"list-agent-group-member-group-does-not-exist=Agent group {0} did not exist.",
"list-agent-group-members-no-members=There were no members.",
"format-list-agent-group-members-results={0} ({1})" implClassName=
"com.sun.identity.cli.agentconfig.ListAgentMembership",
"realm|e|s|Name of realm.",
"agentname|b|s|Name of agent."},
"list-agent-membership-succeeded=Agent belongs to {0} ({1}).",
"list-agent-membership-agent-not-found={0} did not exist.",
"list-agent-membership-no-members=Agent had no memberships." implClassName=
"com.sun.identity.cli.agentconfig.AddAgentsToGroup",
"realm|e|s|Name of realm.",
"agentgroupname|b|s|Name of agent group.",
"agentnames|s|m|Names of agents."},
"add-agent-to-group-succeeded=Agent was added to group.",
"add-agent-to-group-succeeded-pural=Agents were added to group." implClassName=
"com.sun.identity.cli.agentconfig.RemoveAgentsFromGroup",
"realm|e|s|Name of realm.",
"agentgroupname|b|s|Name of agent group.",
"agentnames|s|m|Names of agents."},
"remove-agent-to-group-succeeded=Agent was removed from group.",
"remove-agent-to-group-agent-invalid-group={0} did not exist.",
"remove-agent-to-group-agent-not-member={0} was not a member of {1}.",
"remove-agent-to-group-succeeded-pural=Agents were removed from group." implClassName=
"com.sun.identity.cli.agentconfig.UpdateAgentGroup",
"realm|e|s|Name of realm.",
"agentgroupname|b|s|Name of agent group."},
"set|s|u|Set this flag to overwrite properties values.",
"attributevalues|a|m|Properties e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains properties."},
"update-agent-group-does-not-exist=Agent group {0} did not exist.",
"update-agent-group-succeeded=Agent group configuration was updated." implClassName=
"com.sun.identity.cli.serverconfig.ListServerConfig",
"withdefaults|w|u|Set this flag to get default configuration." "list-server-site-name=Site Name: {0}",
"list-server-id=Server ID: {0}",
"list-server-config-no-results=There were no configuration." implClassName=
"com.sun.identity.cli.serverconfig.UpdateServerConfig",
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"update-server-config-unknown=Update succeeded with unknown property values.",
"update-server-config-succeeded=The configuration of {0} was updated.",
"update-server-config-does-not-exists={0} did not exist." implClassName=
"com.sun.identity.cli.serverconfig.RemoveServerConfig",
"propertynames|a|m|Name of properties to be removed."},
"remove-server-config-succeeded=Properties were removed.",
"remove-server-config-does-not-exists={0} did not exist." "serverconfigxml|X|s|Server Configuration XML file name."},
"attributevalues|a|m|Attribute values e.g. homeaddress=here.",
"datafile|D|s|Name of file that contains attribute values data."},
"create-server-config-succeeded=Server was created.",
"create-server-config-already-exists=Server already existed." "delete-server-config-succeeded=Server was deleted.",
"delete-server-config-dont-exists=Server did not exist." "list-servers-no-instances=There were no servers." implClassName=
"com.sun.identity.cli.serverconfig.EmbeddedStatus",
"embedded-status-status=STATUS: {0}"}
"sitename|s|s|Site name, e.g. mysite",
"create-site-succeeded=Site was created.",
"create-site-already-exists=Site already existed." "sitename|s|s|Site name, e.g. mysite"},
"delete-site-succeeded=Site was deleted.",
"delete-site-no-exists=Site did not exist." "list-sites-no-instances=There were no sites." implClassName=
"com.sun.identity.cli.serverconfig.ShowSiteMembers",
"show-site-members-no-members=There were no members." implClassName=
"com.sun.identity.cli.serverconfig.AddSiteMembers",
"add-site-members-succeeded=Servers were added to site",
"add-site-members-site-not-exist=Site did not exist." implClassName=
"com.sun.identity.cli.serverconfig.RemoveSiteMembers",
"remove-site-members-succeeded=Servers were removed from site",
"remove-site-members-site-not-exist=Site did not exist." "sitename|s|s|Site name, e.g. mysite",
"siteid|i|s|Site's ID, e.g. 10"},
"set-site-id-succeeded=Site ID was modified.",
"set-site-id-no-exists=Site did not exist." implClassName=
"com.sun.identity.cli.serverconfig.SetSitePrimaryURL",
"sitename|s|s|Site name, e.g. mysite",
"set-site-primary-url-succeeded=Site primary URL was modified.",
"set-site-primary-url-no-exists=Site did not exist." "sitename|s|s|Site name, e.g. mysite"},
"show-site-primaryURL=Site primary URL: {0}.",
"show-site-ID=Site ID: {0}.",
"show-site-no-secondaryURL=There were no secondary URLs.",
"show-site-secondaryURL=Site secondary URLs:",
"show-site-no-exists=Site did not exist." implClassName=
"com.sun.identity.cli.serverconfig.SetSiteFailoverURLs",
"sitename|s|s|Site name, e.g. mysite",
"secondaryurls|a|m|Secondary URLs"},
"set-site-secondary-urls-succeeded=Site secondary URLs were set.",
"set-site-secondary-urls-no-exists=Site did not exist." implClassName=
"com.sun.identity.cli.serverconfig.AddSiteFailoverURLs",
"sitename|s|s|Site name, e.g. mysite",
"secondaryurls|a|m|Secondary URLs"},
"add-site-secondary-urls-succeeded=Site secondary URLs were added.",
"add-site-secondary-urls-no-exists=Site did not exist." implClassName=
"com.sun.identity.cli.serverconfig.RemoveSiteFailoverURLs",
"sitename|s|s|Site name, e.g. mysite",
"secondaryurls|a|m|Secondary URLs"},
"remove-site-secondary-urls-succeeded=Site secondary URLs were removed.",
"remove-site-secondary-urls-no-exists=Site did not exist." "servername|s|s|Server name",
"cloneservername|o|s|Clone server name"},
"clone-server-succeeded=Server was cloned.",
"clone-server-exists=Clone server already existed.",
"clone-server-no-exists=Server did not exist." "servername|s|s|Server name"},
"export-server-succeeded=Server was exported.",
"export-server-no-exists=Server did not exist." "servername|s|s|Server name",
"xmlfile|X|m|XML file that contains configuration."},
"import-server-succeeded=Server was imported.",
"import-server-already-exists=Server already existed." implClassName=
"com.sun.identity.cli.realm.GetSupportedAuthModules",
description=
"Show the supported authentication modules in the system.",
"get-supported-no-supported-authtype=There were no supported authentication modules."})
implClassName=
"com.sun.identity.cli.authentication.RegisterAuthModule",
"authmodule|a|s|Java class name of authentication module."},
"register-auth-module-succeeded=Authentication module was registered." implClassName=
"com.sun.identity.cli.authentication.UnregisterAuthModule",
"authmodule|a|s|Java class name of authentication module."},
"unregister-auth-module-succeeded=Authentication module was unregistered.",
"unregister-auth-module-notfound=Authentication module was not registered." implClassName=
"com.sun.identity.cli.entitlement.CreateApplication",
"applicationtype|t|s|Application type name",
"name|m|s|Policy set name"},
"attributevalues|a|m|Attribute values e.g. applicationType=iPlanetAMWebAgentService.",
"datafile|D|s|Name of file that contains attribute values data. Mandatory attributes are resources, subjects, conditions and entitlementCombiner. Optional ones are actions, searchIndexImpl, saveIndexImpl, resourceComparator, subjectAttributeNames."},
"create-application-succeeded={0} was created."})
implClassName=
"com.sun.identity.cli.entitlement.ListApplicationTypes",
"list-applications-type-no-entries=There were no application types."})
implClassName=
"org.forgerock.openam.cli.entitlement.ShowApplicationType",
"name|m|s|Application Type name"},
"show-application-type-not-found=Application Type {0} did not exist."})
implClassName=
"org.forgerock.openam.cli.entitlement.DeleteApplicationTypes",
"names|m|m|Application Type names"},
"delete-application-types-succeeded=Application Types {0} were deleted."})
implClassName=
"org.forgerock.openam.cli.entitlement.CreateApplicationType",
"name|m|s|Application Type name"},
"attributevalues|a|m|Application Type attribute values e.g. actions=enabled=true.",
"datafile|D|s|Name of file that contains attribute type values data. Mandatory attributes are actions, searchIndexImpl and saveIndexImpl. Optional are resourceComparator."},
"create-application-type-succeeded=Application Type {0} was created."})
implClassName=
"com.sun.identity.cli.entitlement.ListApplications",
"list-applications-no-entries=There were no policy sets."})
implClassName=
"com.sun.identity.cli.entitlement.ShowApplication",
"name|m|s|Policy set name"},
"show-application-not-found={0} did not exist."})
"name|m|s|Policy set name"},
"attributevalues|a|m|Attribute values e.g. applicationType=iPlanetAMWebAgentService.",
"datafile|D|s|Name of file that contains attribute values data. Possible attributes are resources, subjects, conditions, actions, searchIndexImpl, saveIndexImpl, resourceComparator, subjectAttributeNames and entitlementCombiner."},
"set-application-not-found={0} did not exist.",
"set-application-modified={0} was modified."})
implClassName=
"com.sun.identity.cli.entitlement.DeleteApplications",
"names|m|m|Policy set names"},
"delete-applications-succeeded=Policy sets were deleted."})
implClassName=
"com.sun.identity.cli.entitlement.ShowConfigurations",
description=
"Display entitlements service configuration",
implClassName=
"com.sun.identity.cli.entitlement.SetConfigurations",
"attributevalues|a|m|Attribute values e.g. evalThreadSize=4.",
"datafile|D|s|Name of file that contains attribute values data. Possible attributes are evalThreadSize, searchThreadSize, policyCacheSize and indexCacheSize."},
"set-entitlement-config-unidentified-attr={0} was unidentified.",
"set-entitlement-config-succeeded=Entitlements Service configuration is updated."})
implClassName=
"com.sun.identity.cli.entitlement.CreateApplicationPrivilege",
description=
"Add a policy set privilege to delegate resources of a given policy set.",
"name|m|s|Name for the this delegation",
"application|t|s|Policy set name",
"actions|a|s|Possible values are READ, MODIFY, DELEGATE, ALL",
"subjecttype|b|s|Possible values are User or Group",
"subjects|s|m|Subject name"},
"description|p|s|Description for the this delegation.",
"resources|r|m|Resources to delegate, All resources in the policy set will be delegated if this option is absent."},
"privilege-application-action-invalid={0} was invalid. Supported ones are READ, MODIFY, DELEGATE, ALL.",
"privilege-application-subject-type-invalid={0} was invalid. Supported ones are User and Group",
"privilege-application-application-invalid={0} was invalid. Either the policy set did not exist or you did not have permissions to delegate it.",
"create-application-privilege-succeeded={0} was added."})
implClassName=
"com.sun.identity.cli.entitlement.DeleteApplicationPrivilege",
"names|m|m|Names of policy set privileges to be removed"},
"delete-application-privilege-succeeded=Privilege was removed",
"delete-application-privileges-succeeded=Privileges were removed"})
implClassName=
"com.sun.identity.cli.entitlement.ShowApplicationPrivilege",
"name|m|s|Name of policy set privilege"},
"show-application-privilege-output-name=Privilege name: {0}",
"show-application-privilege-output-description=Description: {0}",
"show-application-privilege-output-actions=Actions: {0}",
"show-application-privilege-output-subjects=Subject: {0} ({1})",
"show-application-privilege-output-resources=Resource: {0} ({1})"})
implClassName=
"com.sun.identity.cli.entitlement.ListApplicationPrivileges",
"list-application-privileges-no-privileges=There were no privileges."})
implClassName=
"com.sun.identity.cli.entitlement.UpdateApplicationPrivilege",
"name|m|s|Name for the this delegation"},
"actions|a|s|Possible values are READ, MODIFY, DELEGATE, ALL",
"description|p|s|Description for the this delegation."},
"update-application-privilege-invalid=description or actions option is needed..",
"update-application-privilege-succeeded={0} was updated."})
implClassName=
"com.sun.identity.cli.entitlement.SetApplicationPrivilegeSubjects",
"name|m|s|Name for the this delegation",
"subjecttype|b|s|Possible values are User or Group",
"subjects|s|m|Subject name"},
"add|p|u|Subjects are added to this policy set if this option is set. Otherwise, subjects in the current policy set privilege will be overwritten."},
implClassName=
"com.sun.identity.cli.entitlement.SetApplicationPrivilegeResources",
"name|m|s|Name for the this delegation",
"application|t|s|Policy set name"},
"add|p|u|Resources are added to this policy set if this option is set. Otherwise, resources in the current policy set privilege will be overwritten.",
"resources|r|m|Resources to delegate, All resources in the policy set will be delegated if this option is absent."},
implClassName=
"com.sun.identity.cli.entitlement.RemoveApplicationPrivilegeSubjects",
"name|m|s|Name for the this delegation",
"subjecttype|b|s|Possible values are User or Group",
"subjects|s|m|Subject name"},
"remove-application-privilege-subjects-emptied-subjects=Unable to process this request because you have removed all the subjects in the policy set privilege."})
implClassName=
"com.sun.identity.cli.entitlement.RemoveApplicationPrivilegeResources",
"name|m|s|Name for the this delegation",
"application|t|s|Policy set name"},
"resources|r|m|Resources to removed, All resources in the policy set will be removed if this option is absent."},
"remove-application-privilege-resources-emptied-resources=Unable to process this request because you have removed all the resources in the policy set privilege."})
"realm|e|s|Name of realm."},
"policynames|p|m|Names of policy. This can be a wildcard. All policy definition in the realm will be returned if this option is not provided.",
"outfile|o|s|Filename where policy definition will be printed to. Definition will be printed in standard output if this option is not provided.",
"namesonly|n|u|Returns only names of matching policies. Policies are not returned." },
"list-xacml-not-supported-in-legacy-policy-mode=list-xacml not supported in legacy policy mode",
"get-policy-names-in-realm-succeed=Policy names were returned under realm, {0}.",
"get-policy-names-in-realm-no-policies=There were no matching policy names under realm, {0}.",
"get-policy-in-realm-succeed=Policy definitions were returned under realm, {0}.",
"get-policy-in-realm-no-policies=There were no matching policies under realm, {0}."})
description=
"Create policies in a realm with XACML input.",
"realm|e|s|Name of realm.",
"xmlfile|X|s|File that contains the policy XACML definition. In the console, paste the XML into the text field instead."},
"dryrun|n|u|Provide a summary of the policies and referral policies which would be updated, and those which would be added, as a result of the create-xacml command without the 'dryrun' option specified. Nothing will be updated or added when using this option.",
"outfile|o|s|Filename where the output of a 'dryrun' command will be sent to. If no 'dryrun' command is specified, the outfile will not be used for anything." "create-xacml-not-supported-in-legacy-policy-mode=add-xacml not supported in legacy policy mode",
"subcmd-create-policies-__web__-xmlfile=Policy XML",
"create-policy-in-realm-succeed=Policies were created under realm, {0}.",
"no-policies-provided=No policies provided"})
"policynames|p|m|Names of policy to be deleted.",
"file|D|s|Name of file that contains the policy names to be deleted." "delete-xacml-not-supported-in-legacy-policy-mode=delete-xacml not supported in legacy policy mode",
"missing-policy-names=Policy names need to be provided either with --policynames or --file option",
"delete-policy-in-realm-succeed=Policies were deleted under realm, {0}."})
description=
"Start recording a bundle that contains troubleshooting information, including " +
"debug logs, thread dumps, and environment information.",
"jsonfile|J|s|JSON control file for a recording operation."},