All Downloads are FREE. Search and download functionalities are using the official Maven repository.

.unboundid-ldapsdk-commercial-edition.3.2.1.source-code.unboundid-ldapsdk-tools.properties Maven / Gradle / Ivy

# Copyright 2008-2017 UnboundID Corp.
# All Rights Reserved.

# The fully-qualified name of the class to create.
class.name=com.unboundid.ldap.sdk.unboundidds.tools.ToolMessages

INFO_MANAGE_ACCT_TOOL_DESC=Retrieve or update information about the current \
  state of a user account.  Processing will be performed using the password \
  policy state extended operation, and you must have the password-reset \
  privilege to use this extended operation.
INFO_MANAGE_ACCT_ARG_GROUP_TARGET_USER_ARGS=Arguments for Identifying Target \
  Users
INFO_MANAGE_ACCT_ARG_GROUP_PERFORMANCE=Arguments for Adjusting Performance
INFO_MANAGE_ACCT_ARG_DESC_TARGET_DN=The DN of the user entry on which to \
  operate.  This argument may be provided multiple times to specify multiple \
  user DNs.
INFO_MANAGE_ACCT_ARG_DESC_DN_FILE=The path to a file containing the DNs of \
  the user entries on which to operate.  The DN file must contain one DN per \
  line, and blank lines and lines starting with an octothorpe (#) will be \
  ignored.  This argument may be provided multiple times to use multiple DN \
  files.
INFO_MANAGE_ACCT_ARG_DESC_TARGET_FILTER=An LDAP filter that may be used to \
  identify the user entries on which to operate.  The {0} argument may be \
  used to specify the base DN for the search.  This argument may be provided \
  multiple times to specify multiple target filters.
INFO_MANAGE_ACCT_ARG_DESC_FILTER_INPUT_FILE=The path to a file containing a \
  set of LDAP filters to use to identify the user entries on which to \
  operate.  The {0} argument may be used to specify the base DN for the \
  searches.  The filter file must contain one filter per line, and blank \
  lines and lines starting with an octothorpe (#) will be ignored.  This \
  argument may be provided multiple times to use multiple filter files.
INFO_MANAGE_ACCT_ARG_DESC_TARGET_USER_ID=A string that identifies a user on \
  which to operate.  The tool will search for the user with a base DN \
  specified by the {0} argument and a user ID attribute specified by the {1} \
  argument.  This argument may be provided multiple times to specify multiple \
  target user IDs.
INFO_MANAGE_ACCT_ARG_DESC_USER_ID_INPUT_FILE=The path to a file containing a \
  set of user ID values.  The file must contain one user ID per line, and \
  blank lines and lines starting with an octothorpe (#) will be ignored.  The \
  tool will search for the users with a base DN specified by the {0} argument \
  and a user ID attribute specified by the {1} argument.  This argument may \
  be provided multiple times to use multiple user ID files.
INFO_MANAGE_ACCT_ARG_DESC_USER_ID_ATTR=The name or OID of the attribute used \
  to identify users with IDs specified using the {0} and {1} arguments.  If \
  this argument is not provided, a default user ID attribute of {2} will be \
  used.
INFO_MANAGE_ACCT_ARG_DESC_BASE_DN=The base DN to use when searching for user \
  entries when using any of the {0}, {1}, {2}, or {3} arguments.  If this \
  argument is not provided, the default base DN will be the null DN.
INFO_MANAGE_ACCT_ARG_DESC_SIMPLE_PAGE_SIZE=Indicates that any searches \
  performed to identify which users to target should make use of the simple \
  paged results control to cause the entries to be returned in sets of no \
  more than the specified number of entries.  When processing searches that \
  may return a large number of entries, setting a page size can help reduce \
  the likelihood that the server will need to block while sending results \
  to the client if matching entries are identified much more quickly than \
  the client can process the desired {0} operations against those entries.  \
  Further, when performing searches that may return a large number of \
  entries, and especially for unindexed searches, setting a page size can \
  help the client more efficiently resume processing in the event that the \
  connection used to process the search becomes unusable.
INFO_MANAGE_ACCT_ARG_DESC_NUM_THREADS=The number of concurrent threads to use \
  when performing {0} operations against user entries.  If this argument is \
  not provided, a default value of one will be used.
INFO_MANAGE_ACCT_ARG_DESC_NUM_SEARCH_THREADS=The number of concurrent threads \
  to use when searching for entries to target with {0} operations.  This will \
  only be used if arguments are provided that require the tool to perform \
  searches to identify which entries to target (and will primarily be useful \
  only in cases in which there will be multiple searches, as when reading \
  filters or user IDs from a file).  If this argument is not provided, a \
  default value of one will be used.
INFO_MANAGE_ACCT_ARG_DESC_RATE_PER_SECOND=The maximum rate, in operations per \
  second, at which to target user entries.  If neither this nor the {0} \
  argument is provided, then the tool will not perform any rate limiting.
INFO_MANAGE_ACCT_ARG_DESC_VARIABLE_RATE_DATA=The path to a file containing a \
  variable rate definition that may be used to cause the tool to vary the \
  amount of load it generates over time.  If neither this nor the {0} \
  argument is provided, then the tool will not perform any rate limiting.
INFO_MANAGE_ACCT_ARG_DESC_GENERATE_SAMPLE_RATE_FILE=The path to a file to \
  create with a sample variable rate definition.  This file will contain \
  comments that describe the expected format for the file to use with the {0} \
  argument.
INFO_MANAGE_ACCT_ARG_DESC_REJECT_FILE=The path to a file to write with a \
  record of any unsuccessful attempts to retrieve or update account \
  information for a user.
INFO_MANAGE_ACCT_ARG_DESC_APPEND_TO_REJECT_FILE=Indicates that the tool \
  should append to the file specified by the {0} argument if it already \
  exists.  If this argument is not provided and the reject file already \
  exists, it will be overwritten.
INFO_MANAGE_ACCT_ARG_DESC_SUPPRESS_EMPTY_RESULT_OPERATIONS=Indicates that the \
  result information for each {0} operation processed should suppress \
  information about password policy state operations included in the result \
  that do not have any values.  Operations presented without values generally \
  indicated that the user's password policy is not configured for the \
  associated functionality (e.g., if the password expiration time was \
  requested but password expiration is not enabled in the user's password \
  policy).
INFO_MANAGE_ACCT_SC_DESC_GET_ALL=Retrieve all available state information for \
  a user.
INFO_MANAGE_ACCT_SC_GET_ALL_EXAMPLE=Retrieve all available state information \
  for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_POLICY_DN=Retrieve the DN of the password policy \
  that governs a user.
INFO_MANAGE_ACCT_SC_GET_POLICY_DN_EXAMPLE=Retrieve the DN of the password \
  policy that governs user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_IS_USABLE=Determine whether a user account will \
  be allowed to authenticate or be used as an alternate authorization identity.
INFO_MANAGE_ACCT_SC_GET_IS_USABLE_EXAMPLE=Determine whether user ''{0}'' will \
  be permitted to authenticate or be used as an alternate authorization \
  identity.
INFO_MANAGE_ACCT_SC_DESC_GET_USABILITY_NOTICES=Retrieve any password policy \
  state account usability notice messages for a user.  These messages may \
  provide useful information about the state of the user account, but do not \
  necessarily represent a current or imminent problem with the account.
INFO_MANAGE_ACCT_SC_GET_USABILITY_NOTICES_EXAMPLE=Retrieve any password \
  policy state account usability notice messages for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_USABILITY_WARNINGS=Retrieve any password policy \
  state account usability warning messages for a user.  The messages may \
  provide information about conditions that may leave a user account unusable \
  in the near future unless corrective action is taken.
INFO_MANAGE_ACCT_SC_GET_USABILITY_WARNINGS_EXAMPLE=Retrieve any password \
  policy state account usability warning messages for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_USABILITY_ERRORS=Retrieve any password policy \
  state account usability error messages for a user.  The messages may \
  provide information about conditions that prevent a user account from \
  authenticating, being used as an alternate authorization identity, or \
  otherwise functioning normally.
INFO_MANAGE_ACCT_SC_GET_USABILITY_ERRORS_EXAMPLE=Retrieve any password \
  policy state account usability error messages for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_CHANGED_TIME=Retrieve the time that a user's \
  password was last changed, whether via a self change or an administrative \
  reset.
INFO_MANAGE_ACCT_SC_GET_PW_CHANGED_TIME_EXAMPLE=Retrieve the time that the \
  password for user ''{0}'' was last changed.
INFO_MANAGE_ACCT_SC_DESC_SET_PW_CHANGED_TIME=Set the password changed time \
  value for a user.
INFO_MANAGE_ACCT_SC_SET_PW_CHANGED_TIME_ARG_VALUE=The new value for the \
  password changed time.  It must be a timestamp formatted either in \
  generalized time form or in the local time zone using one of the following \
  formats:  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or YYYYMMDDhhmm.  If this \
  argument is not provided, the password changed time will be set to the \
  current time.
INFO_MANAGE_ACCT_SC_SET_PW_CHANGED_TIME_EXAMPLE=Set the password changed time \
  for user ''{0}'' to ''{1}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_PW_CHANGED_TIME=Clear the password changed \
  time value for a user.  For password policy evaluations that require \
  knowing when the user's password was last changed, the server will attempt \
  to fall back to using the create timestamp, if available.
INFO_MANAGE_ACCT_SC_CLEAR_PW_CHANGED_TIME_EXAMPLE=Clear the password changed \
  time for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_IS_DISABLED=Determine whether a user account has \
  been disabled by an administrator and cannot authenticate or be used as an \
  alternate authorization identity.  This can also be accomplished with a \
  standard LDAP search operation by determining whether the user entry has a \
  ds-pwp-account-disabled operational attribute with a value of true.
INFO_MANAGE_ACCT_SC_GET_IS_DISABLED_EXAMPLE=Determine whether the account \
  for user ''{0}'' has been disabled by an administrator.
INFO_MANAGE_ACCT_SC_DESC_SET_IS_DISABLED=Specify whether a user account is \
  administratively disabled.  A disabled account cannot authenticate or be \
  used as an alternate authorization identity.  This can also be accomplished \
  with a standard LDAP modify operation by setting the value of the \
  ds-pwp-account-disabled operational attribute in the user's entry with a \
  value of either true or false (or by removing the attribute from the user's \
  entry, which is equivalent to giving it a value of false).
INFO_MANAGE_ACCT_SC_SET_IS_DISABLED_ARG_VALUE=The new value for the flag \
  indicating whether the user's account is disabled.  The value must be \
  either 'true' or 'false'.
INFO_MANAGE_ACCT_SC_SET_IS_DISABLED_EXAMPLE=Update user ''{0}'' to make the \
  account administratively disabled.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_IS_DISABLED=Clear the account disabled state \
  information from a user entry, which is logically equivalent to using the \
  {0} subcommand with an {1} value of false.  This can also be accomplished \
  with a standard LDAP modify operation by removing the \
  ds-pwp-account-disabled operational attribute from the user's entry.
INFO_MANAGE_ACCT_SC_CLEAR_IS_DISABLED_EXAMPLE=Clear the account disabled \
  state information for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_ACT_TIME=Retrieve the account activation \
  time for a user.  If the activation time is in the future, the user cannot \
  authenticate or be used as an alternate authorization identity.  This can \
  also be accomplished with a standard LDAP search operation by retrieving \
  the ds-pwp-account-activation-time operational attribute from the user's \
  entry.
INFO_MANAGE_ACCT_SC_GET_ACCT_ACT_TIME_EXAMPLE=Retrieve the account activation \
  time for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_SET_ACCT_ACT_TIME=Set the account activation time \
  for a user.  If the activation time is in the future, the user cannot \
  authenticate or be used as an alternate authorization identity.  This can \
  also be accomplished with a standard LDAP modify operation by setting the \
  ds-pwp-account-activation-time attribute to have a generalized time \
  representation of the desired activation time.
INFO_MANAGE_ACCT_SC_SET_ACCT_ACT_TIME_ARG_VALUE=The new value for the account \
  activation time.  It must be a timestamp formatted either in generalized \
  time form or in the local time zone using one of the following formats:  \
  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or YYYYMMDDhhmm.  If this argument is \
  not provided, the account activation time will be set to the current time.
INFO_MANAGE_ACCT_SC_SET_ACCT_ACT_TIME_EXAMPLE=Set the account activation time \
  for user ''{0}'' to ''{1}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_ACCT_ACT_TIME=Clear the account activation \
  time for a user.  If the account previously had an activation time in the \
  future, this will make it immediately eligible for use.  This can also be \
  accomplished with a standard LDAP modify operation by removing the \
  ds-pwp-account-activation-time attribute from the user's entry.
INFO_MANAGE_ACCT_SC_CLEAR_ACCT_ACT_TIME_EXAMPLE=Clear the account activation \
  time for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_ACCT_ACT=Retrieve the length of \
  time in seconds until a user's account is eligible for use.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_ACCT_ACT_EXAMPLE=Retrieve the length of \
  time in seconds until user account ''{0}'' will be eligible for use.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_NOT_YET_ACTIVE=Determine whether a user \
  account has an activation time in the future and therefore cannot \
  authenticate or be used as an alternate authorization identity.
INFO_MANAGE_ACCT_SC_GET_ACCT_NOT_YET_ACTIVE_EXAMPLE=Determine whether user \
  ''{0}'' has an account activation time in the future.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_EXP_TIME=Retrieve the account expiration \
  time for a user.  If the expiration time is in the past, the user cannot \
  authenticate or be used as an alternate authorization identity.  This can \
  also be accomplished with a standard LDAP search operation by retrieving \
  the ds-pwp-account-expiration-time operational attribute from the user's \
  entry.
INFO_MANAGE_ACCT_SC_GET_ACCT_EXP_TIME_EXAMPLE=Retrieve the account expiration \
  time for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_SET_ACCT_EXP_TIME=Set the account expiration time \
  for a user.  If the expiration time is in the past, the user cannot \
  authenticate or be used as an alternate authorization identity.  This can \
  also be accomplished with a standard LDAP modify operation by setting the \
  ds-pwp-account-expiration-time attribute to have a generalized time \
  representation of the desired expiration time.
INFO_MANAGE_ACCT_SC_SET_ACCT_EXP_TIME_ARG_VALUE=The new value for the account \
  expiration time.  It must be a timestamp formatted either in generalized \
  time form or in the local time zone using one of the following formats:  \
  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or YYYYMMDDhhmm.  If this argument is \
  not provided, the account expiration time will be set to the current time.
INFO_MANAGE_ACCT_SC_SET_ACCT_EXP_TIME_EXAMPLE=Set the account expiration time \
  for user ''{0}'' to ''{1}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_ACCT_EXP_TIME=Clear the account expiration \
  time for a user.  If the account previously had an expiration time in the \
  past, this will make it immediately eligible for use.  This can also be \
  accomplished with a standard LDAP modify operation by removing the \
  ds-pwp-account-expiration-time attribute from the user's entry.
INFO_MANAGE_ACCT_SC_CLEAR_ACCT_EXP_TIME_EXAMPLE=Clear the account expiration \
  time for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_ACCT_EXP=Retrieve the length of \
  time in seconds until a user's account expires.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_ACCT_EXP_EXAMPLE=Retrieve the length \
  of time in seconds until user account ''{0}'' expires.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_IS_EXPIRED=Determine whether a user account \
  has an expiration time in the past and therefore cannot authenticate or be \
  used as an alternate authorization identity.
INFO_MANAGE_ACCT_SC_GET_ACCT_IS_EXPIRED_EXAMPLE=Determine whether user \
  ''{0}'' has an account expiration time in the past.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_EXP_WARNED_TIME=Retrieve the time that a user \
  received the first warning about an upcoming password expiration.  This \
  will only be available if password expiration is enabled in the user's \
  password policy.
INFO_MANAGE_ACCT_SC_GET_PW_EXP_WARNED_TIME_EXAMPLE=Retrieve the time that \
  user ''{0}'' received the first warning about an upcoming password \
  expiration.
INFO_MANAGE_ACCT_SC_DESC_SET_PW_EXP_WARNED_TIME=Specify the time that a user \
  received the first warning about an upcoming password expiration.  Note \
  that this will not in itself trigger a password expiration warning nor \
  cause any account status notification handlers to be invoked.  This will \
  have no effect if password expiration is not enabled in the user's password \
  policy.
INFO_MANAGE_ACCT_SC_SET_PW_EXP_WARNED_TIME_ARG_VALUE=The new value for the \
  password expiration warned time.  It must be a timestamp formatted either \
  in generalized time form or in the local time zone using one of the \
  following formats:  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or YYYYMMDDhhmm.  \
  If this argument is not provided, the password expiration warned time will \
  be set to the current time.
INFO_MANAGE_ACCT_SC_SET_PW_EXP_WARNED_TIME_EXAMPLE=Set the password \
  expiration warned time for user ''{0}'' to ''{1}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_PW_EXP_WARNED_TIME=Clear a record of any \
  password expiration warning from a user's entry.
INFO_MANAGE_ACCT_SC_CLEAR_PW_EXP_WARNED_TIME_EXAMPLE=Clear the password \
  expiration warned time for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_PW_EXP_WARNING=Retrieve the length \
  of time in seconds until a user will be eligible to start receiving \
  warnings about an upcoming password expiration.  This will only be \
  available if password expiration is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_PW_EXP_WARNING_EXAMPLE=Retrieve the \
  length of time in seconds until user ''{0}'' will be eligible to start \
  receiving password expiration warnings.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_EXP_TIME=Retrieves the time that a user's \
  password will expire.  This will only be available if password expiration \
  is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_PW_EXP_TIME_EXAMPLE=Retrieves the time that the \
  password for user ''{0}'' will expire.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_PW_EXP=Retrieves the length of \
  time in seconds until a user's password will expire.  This will only be \
  available if password expiration is available in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_PW_EXP_EXAMPLE=Retrieves the length of \
  time in seconds until the password for user ''{0}'' expires.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_IS_EXPIRED=Determine whether a user account \
  has an expired password and therefore cannot authenticate or be used as an \
  alternate authorization identity.
INFO_MANAGE_ACCT_SC_GET_PW_IS_EXPIRED_EXAMPLE=Determine whether user ''{0}'' \
  has an expired password.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_FAILURE_LOCKED=Determines whether a user's \
  account is locked as a result of too many failed authentication attempts.  \
  This will only be available if failure lockout is enabled in the user's \
  password policy.
INFO_MANAGE_ACCT_SC_GET_ACCT_FAILURE_LOCKED_EXAMPLE=Determines whether the \
  account for user ''{0}'' is locked as a result of too many failed \
  authentication attempts.
INFO_MANAGE_ACCT_SC_DESC_SET_ACCT_FAILURE_LOCKED=Specifies whether a user's \
  account should be locked as a result of too many failed authentication \
  attempts.  This will have no effect if failure lockout is not enabled in \
  the user's password policy.
INFO_MANAGE_ACCT_SC_SET_ACCT_FAILURE_LOCKED_ARG_VALUE=Indicates whether the \
  user's account should be locked as a result of too many failed \
  authentication attempts.  The value must be either 'true' (in which case \
  the server will update the user's entry to include the necessary number of \
  failed authentication attempts) or 'false' (in which case the server will \
  clear information about any authentication failures from a user's entry).
INFO_MANAGE_ACCT_SC_SET_ACCT_FAILURE_LOCKED_EXAMPLE=Forces the account for \
  user ''{0}'' to be locked as a result of too many failed authentication \
  attempts.
INFO_MANAGE_ACCT_SC_DESC_GET_FAILURE_LOCKED_TIME=Retrieves the time that a \
  user's account was locked as a result of too many failed authentication \
  attempts.  This will only be available if failure lockout is enabled in \
  the user's password policy.
INFO_MANAGE_ACCT_SC_GET_FAILURE_LOCKED_TIME_EXAMPLE=Retrieves the time that \
  the account for user ''{0}'' was locked as a result of too many failed \
  authentication attempts.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_FAILURE_UNLOCK=Retrieves the \
  length of time in seconds until a user's temporary failure lockout \
  expires.  This will only be available if failure lockout is enabled in the \
  user's password policy.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_FAILURE_UNLOCK_EXAMPLE=Retrieves the \
  length of time in seconds until the temporary failure lockout for user \
  ''{0}'' expires.
INFO_MANAGE_ACCT_SC_DESC_GET_AUTH_FAILURE_TIMES=Retrieves the timestamps for \
  any failed authentication attempts for a user since the user's last \
  successful authentication.  This will only be available if failure lockout \
  is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_AUTH_FAILURE_TIMES_EXAMPLE=Retrieves the timestamps \
  for any failed authentication attempts for user ''{0}'' since that user's \
  last successful authentication.
INFO_MANAGE_ACCT_SC_DESC_ADD_AUTH_FAILURE_TIME=Adds one or more new values \
  to the set of authentication failure times for a user.  If the resulting \
  set of authentication failure times has reached the configured lockout \
  failure count, the user's account will be locked.  This will have no effect \
  if failure lockout is not enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_ADD_AUTH_FAILURE_TIME_ARG_VALUE=A timestamp for an \
  authentication failure time to add to the user's entry.  It must be a \
  timestamp formatted either in generalized time form or in the local time \
  zone using one of the following formats:  YYYYMMDDhhmmss.uuu, \
  YYYYMMDDhhmmss, or YYYYMMDDhhmm.  This argument may be provided multiple \
  times to specify multiple authentication failure times.  If this argument \
  is not provided, the current time will be added to the set of \
  authentication failure times.
INFO_MANAGE_ACCT_SC_ADD_AUTH_FAILURE_TIME_EXAMPLE=Adds the current time to \
  the set of authentication failure times for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_SET_AUTH_FAILURE_TIMES=Sets the timestamps for \
  failed authentication attempts for a user.  If the number of authentication \
  failure times provided is greater than or equal to the lockout failure \
  count for the user's password policy, the user's account will be locked.  \
  This will have no effect if failure lockout is not enabled in the user's \
  password policy.
INFO_MANAGE_ACCT_SC_SET_AUTH_FAILURE_TIMES_ARG_VALUE=A timestamp for an \
  authentication failure time to set in the user's entry.  It must be a \
  timestamp formatted either in generalized time form or in the local time \
  zone using one of the following formats:  YYYYMMDDhhmmss.uuu, \
  YYYYMMDDhhmmss, or YYYYMMDDhhmm.  This argument may be provided multiple \
  times to specify multiple authentication failure times.  If this argument \
  is not provided, the set of authentication failure times will be updated \
  to include only the current time.
INFO_MANAGE_ACCT_SC_SET_AUTH_FAILURE_TIMES_EXAMPLE=Sets the authentication \
  failure times for user ''{0}'' to include values of ''{1}'' and ''{2}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_AUTH_FAILURE_TIMES=Clears the set of \
  authentication failure times for a user.  If the user's account had been \
  locked be of too many failed authentication attempts, this will also clear \
  that lockout.
INFO_MANAGE_ACCT_SC_CLEAR_AUTH_FAILURE_TIMES_EXAMPLE=Clears the \
  authentication failure times for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_REMAINING_FAILURE_COUNT=Retrieves the number of \
  additional failed authentication attempts that will be required to lock a \
  user's account.  This will only be available if failure lockout is enabled \
  in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_REMAINING_FAILURE_COUNT_EXAMPLE=Retrieves the \
  remaining number of failed authentication attempts that will be required to \
  lock the account for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_IDLE_LOCKED=Determines whether a user's \
  account is locked because it has been too long since the user last \
  authenticated.  This will only be available if idle lockout is enabled in \
  the user's password policy.
INFO_MANAGE_ACCT_SC_GET_ACCT_IDLE_LOCKED_EXAMPLE=Determines whether the \
  account for user ''{0}'' is locked because it has been too long since the \
  user last authenticated.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_IDLE_LOCKOUT=Retrieves the length \
  of time in seconds until the user's account will be locked because it has \
  been too long since the user last authenticated.  This will only be \
  available if idle lockout is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_IDLE_LOCKOUT_EXAMPLE=Retrieves the \
  length of time until the account for user ''{0}'' will be locked because \
  it has been too long since the user last authenticated.
INFO_MANAGE_ACCT_SC_DESC_GET_IDLE_LOCKOUT_TIME=Retrieves the time at which \
  the user's account was locked because it had been too long since the user \
  last authenticated, or the time it will be locked unless the user \
  authenticates before that time.  This will only be available if idle \
  lockout is enabled in the user's password policy
INFO_MANAGE_ACCT_SC_GET_IDLE_LOCKOUT_TIME_EXAMPLE=Retrieves the time at which \
  the account for user ''{0}'' was locked because it had been too long since \
  the user had last authenticated.
INFO_MANAGE_ACCT_SC_DESC_GET_MUST_CHANGE_PW=Determines whether a user's \
  password has been reset by an administrator and the user must choose a new \
  password before they will be allowed to perform any other operations.  This \
  will only be available if force change on add or force change on reset is \
  enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_MUST_CHANGE_PW_EXAMPLE=Determines whether the \
  password for user ''{0}'' has been reset and must be changed before any \
  other operations will be allowed.
INFO_MANAGE_ACCT_SC_DESC_SET_MUST_CHANGE_PW=Specifies whether a user's \
  password has been reset by an administrator and the user must choose a new \
  password before they will be allowed to perform any other operations.  This \
  will have no effect if neither force change on add nor force change on \
  reset is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_SET_MUST_CHANGE_PW_ARG_VALUE=Indicates whether the user \
  should be forced to choose a new password before being permitted to \
  perform any other operations.  The value must be either 'true' or 'false'.
INFO_MANAGE_ACCT_SC_SET_MUST_CHANGE_PW_EXAMPLE=Specifies that the password \
  for user ''{0}'' has been reset by an administrator and must be changed \
  before they will be allowed to perform any other operations.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_MUST_CHANGE_PW=Clears the password reset state \
  information from a user's account.  If the account had previously been \
  locked because the user failed to choose a new password in a timely manner \
  after an administrative reset, that lockout will be lifted.  This will have \
  no effect if neither force change on add nor force change on reset is \
  enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_CLEAR_MUST_CHANGE_PW_EXAMPLE=Clears the password reset \
  state information from the account for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_ACCT_IS_RESET_LOCKED=Determines whether the \
  user's account is locked because the user failed to choose a new password \
  in a timely manner after an administrative reset.  This will only be \
  available if either force change on add or force change on reset is enabled \
  in the user's password policy, and if a maximum password reset age is \
  defined in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_ACCT_IS_RESET_LOCKED_EXAMPLE=Determines whether the \
  account for user ''{0}'' is locked because the user failed to choose a new \
  password in a timely manner after an administrative reset.
INFO_MANAGE_ACCT_SC_DESC_GET_SECONDS_UNTIL_RESET_LOCKOUT=Determines the \
  length of time in seconds until the user's account will be locked unless \
  they choose a new password after an administrative password reset.  This \
  will only be available if either force change on add or force change on \
  reset is enabled in the user's password policy, and if a maximum password \
  reset age is defined in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_SECONDS_UNTIL_RESET_LOCKOUT_EXAMPLE=Determines the \
  length of time in seconds until the account for user ''{0}'' will be \
  locked unless they choose a new password.
INFO_MANAGE_ACCT_SC_DESC_GET_RESET_LOCKOUT_TIME=Retrieves the time that a \
  user's account was or will be locked for failing to choose a new password \
  in a timely manner after an administrative reset.  This will only be \
  available if either force change on add or force change on reset is enabled \
  in the user's password policy, and if a maximum password reset age is \
  defined in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_RESET_LOCKOUT_TIME_EXAMPLE=Retrieves the time that \
  the account for user ''{0}'' was or will be locked for failing to choose a \
  new password in a timely manner after an administrative reset.
INFO_MANAGE_ACCT_SC_DESC_GET_LAST_LOGIN_TIME=Retrieves the time that a user \
  last authenticated.  This will only be available if last login time \
  tracking is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_LAST_LOGIN_TIME_EXAMPLE=Retrieves the time that user \
  ''{0}'' last authenticated.
INFO_MANAGE_ACCT_SC_DESC_SET_LAST_LOGIN_TIME=Specifies the time that a user \
  last authenticated.  This will have no effect if last login time tracking \
  is not enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_SET_LAST_LOGIN_TIME_ARG_VALUE=The timestamp to use for \
  the last login time value.  It must be a timestamp formatted either in \
  generalized time form or in the local time zone using one of the following \
  formats:  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or YYYYMMDDhhmm.  If this \
  argument is not provided, the last login time will be set to the current \
  time.
INFO_MANAGE_ACCT_SC_SET_LAST_LOGIN_TIME_EXAMPLE=Sets the last login time for \
  user ''{0}'' to ''{1}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_LAST_LOGIN_TIME=Clears the last login time \
  from a user's entry.  This will have no effect if last login time tracking \
  is not enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_CLEAR_LAST_LOGIN_TIME_EXAMPLE=Clears the last login time \
  for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_LAST_LOGIN_IP=Retrieves the IP address of the \
  client from which a user last authenticated.  This will only be available \
  if last login IP address tracking is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_LAST_LOGIN_IP_EXAMPLE=Retrieves the IP address of the \
  client from which  user ''{0}'' last authenticated.
INFO_MANAGE_ACCT_SC_DESC_SET_LAST_LOGIN_IP=Specifies the IP address of the \
  client from which a user last authenticated.  This will have no effect if \
  last login IP address tracking is not enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_SET_LAST_LOGIN_IP_ARG_VALUE=The last login IP address \
  value to use.  It may be an IPv4 or IPv6 address.
INFO_MANAGE_ACCT_SC_SET_LAST_LOGIN_IP_EXAMPLE=Sets the last login IP address \
  for user ''{0}'' to ''{1}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_LAST_LOGIN_IP=Clears the last login IP address \
  from a user's entry.  This will have no effect if last login IP address \
  tracking is not enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_CLEAR_LAST_LOGIN_IP_EXAMPLE=Clears the last login IP \
  address for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_GRACE_LOGIN_TIMES=Retrieves the times that a \
  user has authenticated with grace logins after their password had expired.  \
  This will only be available if both password expiration and grace login \
  supports are configured in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_GRACE_LOGIN_TIMES_EXAMPLE=Retrieves the grace login \
  times for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_ADD_GRACE_LOGIN_TIME=Adds one or more new values to \
  the set of grace login use times for a user.  This will have no effect \
  unless both password expiration and grace login support are configured in \
  the user's password policy.
INFO_MANAGE_ACCT_SC_ADD_GRACE_LOGIN_TIME_ARG_VALUE=A timestamp for a grace \
  login use time to add to the user's entry.  It must be a timestamp \
  formatted either in generalized time form or in the local time zone using \
  one of the following formats:  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or \
  YYYYMMDDhhmm.  This argument may be provided multiple times to specify \
  multiple grace login use times.  If this argument is not provided, the \
  current time will be used.
INFO_MANAGE_ACCT_SC_ADD_GRACE_LOGIN_TIME_EXAMPLE=Adds the current time to the \
  set of grace login use times for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_SET_GRACE_LOGIN_TIMES=Replaces the set of grace \
  login use times for a user.  This will have no effect unless both password \
  expiration and grace login support are configured in the user's password \
  policy.
INFO_MANAGE_ACCT_SC_SET_GRACE_LOGIN_TIMES_ARG_VALUE=A timestamp for a grace \
  login use time to set in the user's entry.  It must be a timestamp \
  formatted either in generalized time form or in the local time zone using \
  one of the following formats:  YYYYMMDDhhmmss.uuu, YYYYMMDDhhmmss, or \
  YYYYMMDDhhmm.  This argument may be provided multiple times to specify \
  multiple grace login use times.  If this argument is not provided, the \
  set of grace login use times will be updated to contain only the current \
  time.
INFO_MANAGE_ACCT_SC_SET_GRACE_LOGIN_TIMES_EXAMPLE=Sets the grace login use \
  times for user ''{0}'' to be ''{1}'' and ''{2}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_GRACE_LOGIN_TIMES=Clears the set of grace \
  login use times for a user.  This will have no effect unless both password \
  expiration and grace login support are configured in the user's password \
  policy.
INFO_MANAGE_ACCT_SC_CLEAR_GRACE_LOGIN_TIMES_EXAMPLE=Clears the set of grace \
  login use times for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_REMAINING_GRACE_LOGIN_COUNT=Retrieves the number \
  of additional grace logins that will be available to a user before they \
  will be unable to authenticate with an expired password.  This will only be \
  available if both password expiration and grace login support are enabled \
  in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_REMAINING_GRACE_LOGIN_COUNT_EXAMPLE=Retrieves the \
  remaining number of grace logins that for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_CHANGED_BY_REQ_TIME=Retrieves the most recent \
  required change time with which a user has complied.  This will only be \
  available if a required change time is configured in the user's password \
  policy.
INFO_MANAGE_ACCT_SC_GET_PW_CHANGED_BY_REQ_TIME_EXAMPLE=Retrieves the most \
  recent required change time with which user ''{0}'' has complied.
INFO_MANAGE_ACCT_SC_DESC_SET_PW_CHANGED_BY_REQ_TIME=Specifies the most recent \
  required change time with which a user has complied.  This will not have \
  any effect unless a required change time is configured in the user's \
  password policy.
INFO_MANAGE_ACCT_SC_SET_PW_CHANGED_BY_REQ_TIME_ARG_VALUE=The most recent \
  required change time with which the user has complied.  It must be a \
  timestamp formatted either in generalized time form or in the local time \
  zone using one of the following formats:  YYYYMMDDhhmmss.uuu, \
  YYYYMMDDhhmmss, or YYYYMMDDhhmm.  If this argument is not provided, the \
  most recent required change time will be used.
INFO_MANAGE_ACCT_SC_SET_PW_CHANGED_BY_REQ_TIME_EXAMPLE=Specifies that user \
  ''{0}'' has most recently complied with the most recent required change time.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_PW_CHANGED_BY_REQ_TIME=Clears the record of \
  the most recent required change time with which a user has complied.  This \
  will not have any effect unless a required change time is configured in the \
  user's password policy.
INFO_MANAGE_ACCT_SC_CLEAR_PW_CHANGED_BY_REQ_TIME_EXAMPLE=Clears the record of \
  the most recent required change time with which user ''{0}'' complied.
INFO_MANAGE_ACCT_SC_DESC_GET_SECS_UNTIL_REQ_CHANGE_TIME=Retrieves the length \
  of time in seconds until the user account is locked for failure to comply \
  with a required change time.  This will only be available if a required \
  change time is configured in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_SECS_UNTIL_REQ_CHANGE_TIME_EXAMPLE=Retrieves the \
  length of time in seconds until the account for user ''{0}'' is locked for \
  failure to comply with a required change time.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_HISTORY_COUNT=Retrieves the number of \
  passwords in a user's password history.  This will only be available if the \
  password history is enabled in the user's password policy.
INFO_MANAGE_ACCT_SC_GET_PW_HISTORY_COUNT_EXAMPLE=Retrieves the number of \
  passwords in the password history for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_PW_HISTORY=Clears the password history for a \
  user.  This will have no effect if the password history is not enabled in \
  the user's password policy.
INFO_MANAGE_ACCT_SC_CLEAR_PW_HISTORY_EXAMPLE=Clears the password history for \
  user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_HAS_RETIRED_PW=Determines whether a user has an \
  active retired password.
INFO_MANAGE_ACCT_SC_GET_HAS_RETIRED_PW_EXAMPLE=Determines whether user \
  ''{0}'' has a retired password.
INFO_MANAGE_ACCT_SC_DESC_GET_PW_RETIRED_TIME=Retrieves the time that a user's \
  former password was retired.
INFO_MANAGE_ACCT_SC_GET_PW_RETIRED_TIME_EXAMPLE=Retrieves the time the former \
  password for user ''{0}'' was retired.
INFO_MANAGE_ACCT_SC_DESC_GET_RETIRED_PW_EXP_TIME=Retrieves the time that a \
  user's retired password will expire.
INFO_MANAGE_ACCT_SC_GET_RETIRED_PW_EXP_TIME_EXAMPLE=Retrieves the time that \
  the retired password for user ''{0}'' will expire.
INFO_MANAGE_ACCT_SC_DESC_PURGE_RETIRED_PW=Purges a retired password from a \
  user's entry so that it may no longer be used to authenticate.
INFO_MANAGE_ACCT_SC_PURGE_RETIRED_PW_EXAMPLE=Purges a retired password for \
  user ''{0}''.
ERR_MANAGE_ACCT_CANNOT_GENERATE_SAMPLE_RATE_FILE=An error occurred while \
  attempting to write a sample variable rate definition to file ''{0}'':  {1}
ERR_MANAGE_ACCT_CANNOT_CREATE_RATE_ADJUSTOR=An error occurred while \
  attempting to initialize the variable-rate adjustor to alter the maximum \
  load over time based on the definitions contained in file ''{0}'':  {1}
ERR_MANAGE_ACCT_CANNOT_CREATE_CONNECTION_POOL=An error occurred while \
  attempting to create a connection pool to perform {0} processing:  {1}
ERR_MANAGE_ACCT_CANNOT_CREATE_REJECT_WRITER=An error occurred while \
  attempting to create a reject writer to write information about failed \
  operation attempts to file ''{0}'':  {1}
ERR_MANAGE_ACCT_CANNOT_CREATE_PROCESSOR=An error occurred while attempting to \
  initialize the password policy state operation processor:  {0}
ERR_MANAGE_ACCT_CANNOT_BASE64_DECODE_DN=An error occurred while attempting to \
  base64-decode the DN in line ''{0}'' read from file ''{1}'':  {2}
ERR_MANAGE_ACCT_ERROR_READING_DN_FILE=An error occurred while attempting to \
  read from DN file ''{0}'':  {1}
ERR_MANAGE_ACCT_MALFORMED_FILTER_FROM_FILE=Filter file ''{0}'' contains \
  line ''{1}'' that cannot be parsed as a valid search filter:  {2}
ERR_MANAGE_ACCT_ERROR_READING_FILTER_FILE=An error occurred while attempting \
  to read from filter file ''{0}'':  {1}
ERR_MANAGE_ACCT_ERROR_READING_USER_ID_FILE=An error occurred while attempting \
  to read from user ID file ''{0}'':  {1}
NOTE_MANAGE_ACCT_UNSOLICITED_NOTIFICATION=NOTICE:  Received an unsolicited \
  notification on connection {0}:  {1}
ERR_MANAGE_ACCT_PROCESSOR_NO_SUBCOMMAND=Unable to perform any {0} processing \
  because no subcommand was selected.
ERR_MANAGE_ACCT_PROCESSOR_UNSUPPORTED_SUBCOMMAND=Support for the ''{0}'' \
  subcommand is not currently implemented in the {1} tool.
ERR_MANAGE_ACCT_SEARCH_OP_ERROR_READING_PAGE_RESPONSE=An error occurred \
  while attempting to retrieve a simple paged results response control from \
  search result {0} for filter {1}:  {2}
ERR_MANAGE_ACCT_SEARCH_OP_CANNOT_GET_CONNECTION=Unable to get an LDAP \
  connection to use to process search request {0}:  {1}
INFO_MANAGE_ACCT_SEARCH_OP_SUCCESSFUL_PAGE=Successfully retrieved a page of \
  entries matching filter {0}.  Entries returned:  {1}.
INFO_MANAGE_ACCT_SEARCH_OP_SUCCESSFUL_FULL=Successfully completed the search \
  matching filter {0}.  Entries returned:  {1}.
ERR_MANAGE_ACCT_SEARCH_OP_FAILED_NO_RETRY=An error occurred while attempting \
  to search for entries matching filter {0}:  {1} {2}.  No retry attempt will \
  be made for this search.
ERR_MANAGE_ACCT_SEARCH_OP_FAILED_SECOND_ATTEMPT=An error occurred while \
  attempting to search for entries matching filter {0}:  {1} {2}.  This was \
  the second attempt to process the search and no further retry attempts \
  will be made.
ERR_MANAGE_ACCT_SEARCH_OP_EXCEPTION=An unexpected exception was raised while \
  attempting to process search request {0}:  {1}
WARN_MANAGE_ACCT_SEARCH_OP_REFERRAL=WARNING:  Search result reference \
  returned while searching for entries matching filter ''{0}'':  {1}.  This \
  referral will not be followed, so entries only accessible via this referral \
  will not be processed.
INFO_MANAGE_ACCT_SC_DESC_GET_AVAILABLE_SASL_MECHS=Retrieves a list of the \
  SASL mechanisms that are available for a user.  This will take into account \
  the server configuration, the types of credentials the user has, and the \
  authentication constraints defined for the user.
INFO_MANAGE_ACCT_SC_GET_AVAILABLE_SASL_MECHS_EXAMPLE=Retrieves a list of the \
  SASL mechanisms that are available for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_AVAILABLE_OTP_MECHS=Retrieves a list of the \
  one-time password delivery mechanisms that are available for a user.  If \
  the user's entry includes information about which OTP delivery mechanisms \
  are preferred, then the values will be returned in order of most preferred \
  to least preferred.
INFO_MANAGE_ACCT_SC_GET_AVAILABLE_OTP_MECHS_EXAMPLE=Retrieves a list of the \
  one-time password delivery mechanisms that are available for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_HAS_TOTP_SHARED_SECRET=Determines whether a user \
  has at least one TOTP shared secret that may be used in conjunction with \
  the UNBOUNDID-TOTP SASL mechanism or the Verify TOTP extended operation.
INFO_MANAGE_ACCT_SC_GET_HAS_TOTP_SHARED_SECRET_EXAMPLE=Determines whether \
  user ''{0}'' has at least one TOTP shared secret.
INFO_MANAGE_ACCT_SC_DESC_ADD_TOTP_SHARED_SECRET=Adds a value to the set of \
  TOTP shared secrets for a user.
INFO_MANAGE_ACCT_SC_ADD_TOTP_SHARED_SECRET_EXAMPLE=Adds value ''{0}'' to the \
  set of TOTP shared secrets for user ''{1}''.
INFO_MANAGE_ACCT_SC_ADD_TOTP_SHARED_SECRET_ARG_VALUE=The TOTP shared secret \
  to register for a user.  This argument must be provided at least once, but \
  may be provided multiple times to specify multiple TOTP shared secrets to \
  register.
INFO_MANAGE_ACCT_SC_DESC_REMOVE_TOTP_SHARED_SECRET=Removes a value from the \
  set of TOTP shared secrets for a user.
INFO_MANAGE_ACCT_SC_REMOVE_TOTP_SHARED_SECRET_EXAMPLE=Removes value ''{0}'' \
  from the set of TOTP shared secrets for user ''{1}''.
INFO_MANAGE_ACCT_SC_REMOVE_TOTP_SHARED_SECRET_ARG_VALUE=The TOTP shared \
  secret to deregister for a user.  This argument must be provided at least \
  once, but may be provided multiple times to specify multiple TOTP shared \
  secrets to deregister.
INFO_MANAGE_ACCT_SC_DESC_SET_TOTP_SHARED_SECRETS=Replaces the set of TOTP \
  shared secrets registered for a user.
INFO_MANAGE_ACCT_SC_SET_TOTP_SHARED_SECRETS_EXAMPLE=Replaces the set of TOTP \
  shared secrets for user ''{0}'' with a single value of ''{1}''.
INFO_MANAGE_ACCT_SC_SET_TOTP_SHARED_SECRETS_ARG_VALUE=The TOTP shared secret \
  to register for a user.  This argument must be provided at least once, but \
  may be provided multiple times to specify multiple TOTP shared secrets to \
  register.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_TOTP_SHARED_SECRETS=Clears the set of TOTP \
  shared secrets registered for a user.
INFO_MANAGE_ACCT_SC_CLEAR_TOTP_SHARED_SECRETS_EXAMPLE=Clears the set of TOTP \
  shared secrets registered for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_GET_HAS_YUBIKEY_ID=Determines whether a user has at \
  least one registered YubiKey OTP device public ID.
INFO_MANAGE_ACCT_SC_GET_HAS_YUBIKEY_ID_EXAMPLE=Determines whether user \
  ''{0}'' has at least one registered YubiKey OTP device public ID.
INFO_MANAGE_ACCT_SC_DESC_GET_YUBIKEY_IDS=Retrieves a list of the public IDs \
  of the YubiKey OTP devices registered for a user.
INFO_MANAGE_ACCT_SC_GET_YUBIKEY_IDS_EXAMPLE=Retrieves a list of the public \
  IDs of the YubiKey OTP devices registered for user ''{0}''.
INFO_MANAGE_ACCT_SC_DESC_ADD_YUBIKEY_ID=Adds a value to the set of registered \
  YubiKey OTP public IDs for a user.
INFO_MANAGE_ACCT_SC_ADD_YUBIKEY_ID_EXAMPLE=Adds value ''{0}'' to the set of \
  registered YubiKey OTP public IDs for user ''{1}''.
INFO_MANAGE_ACCT_SC_ADD_YUBIKEY_ID_ARG_VALUE=The public ID for a YubiKey OTP \
  device to register for a user.  This argument must be provided at least \
  once, but may be provided multiple times to specify multiple public IDs to \
  register.
INFO_MANAGE_ACCT_SC_DESC_REMOVE_YUBIKEY_ID=Removes a value from the set of \
  registered YubiKey OTP public IDs for a user.
INFO_MANAGE_ACCT_SC_REMOVE_YUBIKEY_ID_EXAMPLE=Removes value ''{0}'' from the \
  set of registered YubiKey OTP public IDs for user ''{1}''.
INFO_MANAGE_ACCT_SC_REMOVE_YUBIKEY_ID_ARG_VALUE=The public ID for a YubiKey \
  OTP device to deregister for a user.  This argument must be provided at \
  least once, but may be provided multiple times to specify multiple public \
  IDs to deregister.
INFO_MANAGE_ACCT_SC_DESC_SET_YUBIKEY_IDS=Replaces the list of the public \
  IDs of the YubiKey OTP devices registered for a user.
INFO_MANAGE_ACCT_SC_SET_YUBIKEY_IDS_EXAMPLE=Replaces the list of the public \
  IDs of the YubiKey OTP devices registered for user ''{0}'' with a single \
  public ID of ''{1}''.
INFO_MANAGE_ACCT_SC_SET_YUBIKEY_IDS_ARG_VALUE=The public ID for a YubiKey OTP \
  device to register for a user.  This argument must be provided at least \
  once, but may be provided multiple times to specify multiple public IDs to \
  register.
INFO_MANAGE_ACCT_SC_DESC_CLEAR_YUBIKEY_IDS=Clears the list of the public IDs \
  of the YubiKey OTP devices registered for a user.
INFO_MANAGE_ACCT_SC_CLEAR_YUBIKEY_IDS_EXAMPLE=Clears the list of the public \
  IDs of the YubiKey OTP devices registered for user ''{0}''.
INFO_GEN_TOTP_SECRET_TOOL_DESC=Generate a shared secret that may be used to \
  generate time-based one-time password (TOTP) authentication codes for use \
  in authenticating with the UNBOUNDID-TOTP SASL mechanism, or in conjunction \
  with the validate TOTP password extended operation.
INFO_GEN_TOTP_SECRET_PLACEHOLDER_AUTH_ID={authID}
INFO_GEN_TOTP_SECRET_DESCRIPTION_AUTH_ID=An authentication ID that identifies \
  the user for whom the TOTP shared secret should be generated.  This must \
  be provided, and it should either be in the form "dn:" followed by the DN \
  of the target user's entry, or in the form "u:" followed by the username \
  for the target user.
INFO_GEN_TOTP_SECRET_PLACEHOLDER_USER_PW={password}
INFO_GEN_TOTP_SECRET_DESCRIPTION_USER_PW=The static password for the user \
  targeted by the {0} argument.
INFO_GEN_TOTP_SECRET_DESCRIPTION_USER_PW_FILE=The path to a file containing \
  the static password for the user targeted by the {0} argument.
INFO_GEN_TOTP_SECRET_DESCRIPTION_PROMPT_FOR_USER_PW=Indicates that the tool \
  should interactively prompt for the static password for the user targeted \
  by the {0} argument.
INFO_GEN_TOTP_SECRET_PLACEHOLDER_SECRET={totpSharedSecret}
INFO_GEN_TOTP_SECRET_DESCRIPTION_REVOKE=Indicates that the server should \
  revoke the provided TOTP shared secret rather than generating a new secret \
  for the specified user.
INFO_GEN_TOTP_SECRET_DESCRIPTION_REVOKE_ALL=Indicates that the server \
  should revoke all existing TOTP shared secrets for the specified user \
  rather than generating a new secret.
ERR_GEN_TOTP_SECRET_CANNOT_CONNECT=An error occurred while attempting to \
  establish a connection to use to communicate with the server:  {0}
ERR_GEN_TOTP_SECRET_CANNOT_READ_PW_FROM_FILE=An error occurred while \
  attempting to read the static password from file ''{0}'':  {1}
INFO_GEN_TOTP_SECRET_ENTER_PW=Enter the static password for user ''{0}'':
ERR_GEN_TOTP_SECRET_CANNOT_READ_PW_FROM_STDIN=An error occurred while \
  attempting to read the static password from standard input:  {0}
INFO_GEN_TOTP_SECRET_REVOKE_SUCCESS=Successfully revoked TOTP shared secret \
  ''{0}''.
ERR_GEN_TOTP_SECRET_REVOKE_FAILURE=Unable to revoke TOTP shared secret {0}.
INFO_GEN_TOTP_SECRET_REVOKE_ALL_SUCCESS=Successfully revoked all TOTP shared \
  secrets.
ERR_GEN_TOTP_SECRET_REVOKE_ALL_FAILURE=Unable to revoke all TOTP shared \
  secrets.
INFO_GEN_TOTP_SECRET_GEN_SUCCESS=Successfully generated TOTP shared secret \
  ''{0}''.
ERR_GEN_TOTP_SECRET_GEN_FAILURE=Unable to generate a TOTP shared secret.
ERR_GEN_TOTP_SECRET_RESULT_CODE=Result code:  {0}
ERR_GEN_TOTP_SECRET_DIAGNOSTIC_MESSAGE=Diagnostic Message:  {0}
ERR_GEN_TOTP_SECRET_MATCHED_DN=Matched DN:  {0}
ERR_GEN_TOTP_SECRET_REFERRAL_URL=Referral URL:  {0}
INFO_GEN_TOTP_SECRET_GEN_EXAMPLE=Generate a TOTP secret for the user with \
  username 'john.doe' and a password entered at an interactive prompt.
INFO_GEN_TOTP_SECRET_REVOKE_ALL_EXAMPLE=Revoke all TOTP shared secrets for \
  for the user with username 'john.doe' whose password is contained in file \
  'password.txt'.
INFO_PLACEHOLDER_ATTR={attr}
INFO_PLACEHOLDER_AUTHZID={authzID}
INFO_PLACEHOLDER_FIELD_NAME={fieldName}
INFO_PLACEHOLDER_FILTER={filter}
INFO_PLACEHOLDER_LEVEL={level}
INFO_PLACEHOLDER_NUM={num}
INFO_PLACEHOLDER_PATH={path}
INFO_PLACEHOLDER_PURPOSE={purpose}
INFO_PLACEHOLDER_TIMEOUT={timeout}
INFO_RESULT_UTILS_RESULT_CODE=Result Code:  {0}
INFO_RESULT_UTILS_SUCCESS_WITH_TXN=NOTE:  No changes will actually be applied \
  to the server until the transaction is committed.
INFO_RESULT_UTILS_DIAGNOSTIC_MESSAGE:  Diagnostic Message:  {0}
INFO_RESULT_UTILS_MATCHED_DN=Matched DN:  {0}
INFO_RESULT_UTILS_REFERRAL_URL=Referral URL:  {0}
INFO_RESULT_UTILS_NUM_SEARCH_ENTRIES=Number of Entries Returned:  {0,number,0}
INFO_RESULT_UTILS_NUM_SEARCH_REFERENCES=Number of References Returned:  \
  {0,number,0}
INFO_RESULT_UTILS_START_TXN_RESULT_TXN_ID=Start Transaction Extended Result \
  Transaction ID:  {0}
INFO_RESULT_UTILS_END_TXN_RESULT_FAILED_MSG_ID=End Transaction Extended \
  Result Failed Operation Message ID:  {0}
INFO_RESULT_UTILS_END_TXN_RESULT_OP_CONTROL=End Transaction Extended Result \
  Response Control for Message ID {0}:
INFO_RESULT_UTILS_MULTI_UPDATE_CHANGES_APPLIED=Multi-Update Changes Applied:  \
  {0}
INFO_RESULT_UTILS_MULTI_UPDATE_RESULT_HEADER=Multi-Update {0} Operation Result:
INFO_RESULT_UTILS_PASSWORD_MODIFY_RESULT_GENERATED_PW=Password Modify \
  Extended Result Generated Password:  {0}
INFO_RESULT_UTILS_NOTICE_OF_DISCONNECTION_HEADER=Notice of Disconnection \
  Unsolicited Notification
INFO_RESULT_UTILS_ABORTED_TXN_HEADER=Aborted Transaction Unsolicited \
  Notification
INFO_RESULT_UTILS_TXN_ID_HEADER=Transaction ID:  {0}
INFO_RESULT_UTILS_UNSOLICITED_NOTIFICATION_HEADER=Unsolicited Notification
INFO_RESULT_UTILS_RESPONSE_EXTOP_OID=Extended Result OID:  {0}
INFO_RESULT_UTILS_RESPONSE_EXTOP_RAW_VALUE_HEADER=Extended Result Raw Value:
INFO_RESULT_UTILS_GENERIC_RESPONSE_CONTROL_HEADER=Response Control:
INFO_RESULT_UTILS_RESPONSE_CONTROL_OID=OID:  {0}
INFO_RESULT_UTILS_RESPONSE_CONTROL_IS_CRITICAL=Is Critical:  {0}
INFO_RESULT_UTILS_RESPONSE_CONTROL_RAW_VALUE_HEADER=Raw Value:
INFO_RESULT_UTILS_AUTHZ_ID_RESPONSE_HEADER=Authorization Identity Response \
  Control:
INFO_RESULT_UTILS_AUTHZ_ID_RESPONSE_ID=Authorization ID:  {0}
INFO_RESULT_UTILS_CONTENT_SYNC_DONE_RESPONSE_HEADER=Content Synchronization \
  Done Response Control:
INFO_RESULT_UTILS_CONTENT_SYNC_DONE_REFRESH_DELETES:Refresh Deletes:  {0}
INFO_RESULT_UTILS_CONTENT_SYNC_DONE_COOKIE_HEADER:Cookie Data:
INFO_RESULT_UTILS_CONTENT_SYNC_STATE_RESPONSE_HEADER=Content Synchronization \
  State Response Control:
INFO_RESULT_UTILS_CONTENT_SYNC_STATE_ENTRY_UUID:Entry UUID:  {0}
INFO_RESULT_UTILS_CONTENT_SYNC_STATE_NAME=Synchronization State:  {0}
INFO_RESULT_UTILS_CONTENT_SYNC_STATE_COOKIE_HEADER:Cookie Data:
INFO_RESULT_UTILS_ECN_HEADER=Entry Change Notification Control:
INFO_RESULT_UTILS_ECN_CHANGE_TYPE=Change Type:  {0}
INFO_RESULT_UTILS_ECN_CHANGE_NUMBER=Change Number:  {0,number,0}
INFO_RESULT_UTILS_ECN_PREVIOUS_DN=Previous DN:  {0}
INFO_RESULT_UTILS_PASSWORD_EXPIRED_HEADER=Password Expired Response Control:
INFO_RESULT_UTILS_PASSWORD_EXPIRING_HEADER=Password Expiring Response Control:
INFO_RESULT_UTILS_PASSWORD_EXPIRING_SECONDS_UNTIL_EXPIRATION=Seconds Until \
  Expiration:  {0,number,0}
INFO_RESULT_UTILS_POST_READ_HEADER=Post-Read Response Control:
INFO_RESULT_UTILS_POST_READ_ENTRY_HEADER=Post-Read Entry:
INFO_RESULT_UTILS_PRE_READ_HEADER=Pre-Read Response Control:
INFO_RESULT_UTILS_PRE_READ_ENTRY_HEADER=Pre-Read Entry:
INFO_RESULT_UTILS_SORT_HEADER=Server-Side Sort Response Control:
INFO_RESULT_UTILS_SORT_RESULT_CODE=Result Code:  {0}
INFO_RESULT_UTILS_SORT_ATTRIBUTE_NAME=Attribute Name:  {0}
INFO_RESULT_UTILS_PAGED_RESULTS_HEADER=Simple Paged Results Response Control:
INFO_RESULT_UTILS_PAGED_RESULTS_COUNT=Estimated Total Result Set Size:  \
  {0,number,0}
INFO_RESULT_UTILS_PAGED_RESULTS_COOKIE_HEADER=Cookie Data:
INFO_RESULT_UTILS_VLV_HEADER=Virtual List View Response Control:
INFO_RESULT_UTILS_VLV_RESULT_CODE=Result Code:  {0}
INFO_RESULT_UTILS_VLV_CONTENT_COUNT=Estimated Content Count:  {0,number,0}
INFO_RESULT_UTILS_VLV_TARGET_POSITION=Target Position:  {0,number,0}
INFO_RESULT_UTILS_VLV_CONTEXT_ID_HEADER=Context ID:
INFO_RESULT_UTILS_ACCOUNT_USABLE_HEADER=Account Usable Response Control:
INFO_RESULT_UTILS_ACCOUNT_USABLE_IS_USABLE:Account Is Usable:  {0}
INFO_RESULT_UTILS_ACCOUNT_USABLE_UNUSABLE_REASONS_HEADER:Unusable Reasons:
INFO_RESULT_UTILS_ACCOUNT_USABLE_PW_EXPIRED=Password Is Expired:  {0}
INFO_RESULT_UTILS_ACCOUNT_USABLE_MUST_CHANGE_PW=Must Change Password:  {0}
INFO_RESULT_UTILS_ACCOUNT_USABLE_IS_INACTIVE=Account Is Inactive:  {0}
INFO_RESULT_UTILS_ACCOUNT_USABLE_REMAINING_GRACE=Remaining Grace Logins:  \
  {0,number,0}
INFO_RESULT_UTILS_ACCOUNT_USABLE_SECONDS_UNTIL_EXPIRATION=Seconds Until \
  Password Expiration:  {0,number,0}
INFO_RESULT_UTILS_ACCOUNT_USABLE_SECONDS_UNTIL_UNLOCK=Seconds Until Account \
  Unlock:  {0,number,0}
INFO_RESULT_UTILS_ASSURED_REPL_HEADER=Assured Replication Response Control:
INFO_RESULT_UTILS_ASSURED_REPL_CSN=Change Sequence Number:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_LOCAL_LEVEL=Local Assurance Level:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_LOCAL_SATISFIED=Local Assurance Satisfied:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_LOCAL_MESSAGE=Local Assurance Message:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_REMOTE_LEVEL=Remote Assurance Level:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_REMOTE_SATISFIED=Remote Assurance Satisfied:  \
  {0}
INFO_RESULT_UTILS_ASSURED_REPL_REMOTE_MESSAGE=Remote Assurance Message:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_SERVER_RESULT_HEADER=Server Result:
INFO_RESULT_UTILS_ASSURED_REPL_SERVER_RESULT_CODE=Server Result Code:  {0}
INFO_RESULT_UTILS_ASSURED_REPL_SERVER_RESULT_REPL_SERVER_ID=Replication \
  Server ID:  {0,number,0}
INFO_RESULT_UTILS_ASSURED_REPL_SERVER_RESULT_REPL_ID=Replica ID:  {0,number,0}
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_HEADER=Get Authorization Entry Response \
  Control:
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_IS_AUTHENTICATED=Is Authenticated:  {0}
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_IDS_MATCH=Authentication and Authorization \
  Identities Match:  {0}
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_AUTHN_ID=Authentication Identity ID:  {0}
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_AUTHN_ENTRY_HEADER=Authentication Identity \
  Entry:
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_AUTHZ_ID=Authorization Identity ID:  {0}
INFO_RESULT_UTILS_GET_AUTHZ_ENTRY_AUTHZ_ENTRY_HEADER=Authorization Identity \
  Entry:
INFO_RESULT_UTILS_GET_BACKEND_SET_ID_HEADER=Get Backend Set ID Response \
  Control:
INFO_RESULT_UTILS_GET_BACKEND_SET_ID_EB_RP_ID=Entry-Balancing Request \
  Processor ID:  {0}
INFO_RESULT_UTILS_GET_BACKEND_SET_ID=Backend Set ID:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_HEADER=Get Password Policy State Issues \
  Response Control:
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_FAILURE_REASON_HEADER=Authentication \
  Failure Reason:
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_FAILURE_TYPE=Failure Type:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_FAILURE_MESSAGE=Failure Message:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_ERROR_HEADER=Account Usability Error:
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_ERROR_NAME=Error Name:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_ERROR_MESSAGE=Error Message:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_WARNING_HEADER=Account Usability Warning:
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_WARNING_NAME=Warning Name:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_WARNING_MESSAGE=Warning Message:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_NOTICE_HEADER=Account Usability Notice:
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_NOTICE_NAME=Notice Name:  {0}
INFO_RESULT_UTILS_GET_PW_STATE_ISSUES_NOTICE_MESSAGE=Notice Message:  {0}
INFO_RESULT_UTILS_GET_SERVER_ID_HEADER=Get Server ID Response Control:
INFO_RESULT_UTILS_GET_SERVER_ID=Server ID:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_HEADER=Get User Resource Limits Response \
  Control:
INFO_RESULT_UTILS_GET_USER_RLIM_VALUE_UNLIMITED=Unlimited
INFO_RESULT_UTILS_GET_USER_RLIM_UNIT_SECONDS=seconds
INFO_RESULT_UTILS_GET_USER_RLIM_SIZE_LIMIT=Size Limit:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_TIME_LIMIT=Time Limit:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_IDLE_TIME_LIMIT=Idle Time Limit:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_LOOKTHROUGH_LIMIT=Lookthrough Limit:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_EQUIVALENT_AUTHZ_USER_DN=Equivalent \
  Authorization User DN:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_CCP_NAME=Client Connection Policy Name:  {0}
INFO_RESULT_UTILS_GET_USER_RLIM_GROUP_DNS_HEADER=Group DNs:
INFO_RESULT_UTILS_GET_USER_RLIM_PRIVILEGES_HEADER=Privileges:
INFO_RESULT_UTILS_GET_USER_RLIM_OTHER_ATTIBUTES_HEADER=Other Attributes:
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_HEADER=Intermediate Client Response \
  Control:
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_UPSTREAM_ADDRESS=Upstream Server \
  Address:  {0}
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_UPSTREAM_SECURE=Upstream Server \
  Secure:  {0}
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_SERVER_NAME=Server Name:  {0}
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_SESSION_ID=Server Session ID:  {0}
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_RESPONSE_ID=Server Response ID:  {0}
INFO_RESULT_UTILS_INTERMEDIATE_CLIENT_UPSTREAM_RESPONSE_HEADER=Upstream \
  Response:
INFO_RESULT_UTILS_JOIN_HEADER=Join Result Control:
INFO_RESULT_UTILS_JOIN_RESULT_CODE=Join Result Code:  {0}
INFO_RESULT_UTILS_JOIN_DIAGNOSTIC_MESSAGE=Join Diagnostic Message:  {0}
INFO_RESULT_UTILS_JOIN_MATCHED_DN=Join Matched DN:  {0}
INFO_RESULT_UTILS_JOIN_REFERRAL_URL=Join Referral URL:  {0}
INFO_RESULT_UTILS_JOINED_WITH_ENTRY_HEADER=Joined With Entry:
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_HEADER=Matching Entry Count Response \
  Control:
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_TYPE_EXAMINED=Count Type:  Examined
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_TYPE_UNEXAMINED=Count Type:  Unexamined
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_TYPE_UPPER_BOUND=Count Type:  Upper \
  Bound
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_TYPE_UNKNOWN=Count Type:  Unknown
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_VALUE=Count Value:  {0,number,0}
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_INDEXED=Search Is Indexed:  {0}
INFO_RESULT_UTILS_MATCHING_ENTRY_COUNT_DEBUG_HEADER=Debug Info:
INFO_RESULT_UTILS_PW_POLICY_HEADER=Password Policy Response Control:
INFO_RESULT_UTILS_PW_POLICY_ERROR_TYPE=Error Type:  {0}
INFO_RESULT_UTILS_PW_POLICY_ERROR_TYPE_NONE=Error Type:  None
INFO_RESULT_UTILS_PW_POLICY_WARNING_TYPE=Warning Type:  {0}
INFO_RESULT_UTILS_PW_POLICY_WARNING_TYPE_NONE=Warning Type:  None
INFO_RESULT_UTILS_PW_POLICY_WARNING_VALUE=Warning Value:  {0,number,0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_HEADER=Password Validation Details \
  Response Control:
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_RESULT_TYPE_RESULT=Result Type:  \
  Validation Result
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_RESULT_TYPE_NO_PW=Result Type:  No \
  Password Provided
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_RESULT_TYPE_MULTIPLE_PW=Result \
  Type:  Multiple Passwords Provided
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_RESULT_TYPE_NO_VALIDATION=Result \
  Type:  No Validation Attempted
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_RESULT_TYPE_DEFAULT=Result Type:  {0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_MISSING_CURRENT=Missing Current \
  Password:  {0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_MUST_CHANGE=Must Change Password:  {0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_SECONDS_TO_EXP=Seconds Until \
  Expiration:  {0,number,0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_PQR_HEADER=Password Quality \
  Requirement Validation Result:
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_PQR_DESC=Password Quality \
  Requirement Description:  {0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_PQR_TYPE=Client-Side Validation \
  Type:  {0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_PQR_PROP=Client-Side Validation \
  Property:  {0}={1}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_PQR_SATISFIED=Requirement Satisfied:  \
  {0}
INFO_RESULT_UTILS_PW_VALIDATION_DETAILS_PQR_INFO=Additional Validation Info:  \
  {0}
INFO_RESULT_UTILS_SOFT_DELETE_HEADER=Soft Delete Response Control:
INFO_RESULT_UTILS_SOFT_DELETED_DN=Soft-Deleted Entry DN:  {0}
INFO_RESULT_UTILS_TXN_SETTINGS_HEADER=Transaction Settings Response Control:
INFO_RESULT_UTILS_TXN_SETTINGS_NUM_CONFLICTS=Number of Lock Conflicts:  \
  {0,number,0}
INFO_RESULT_UTILS_TXN_SETTINGS_BACKEND_LOCK_ACQUIRED=Backend Lock Acquired:  \
  {0}
INFO_RESULT_UTILS_SEARCH_REFERENCE_HEADER=Search Result Reference:
INFO_REPORT_BIND_RESULT_HEADER=Bind Result:
INFO_LDAPMODIFY_ARG_GROUP_CONTROLS=Control Arguments
INFO_LDAPMODIFY_ARG_GROUP_DATA=Data Arguments
INFO_LDAPMODIFY_ARG_GROUP_OPS=Operation Arguments
INFO_LDAPMODIFY_TOOL_DESCRIPTION=Applies a set of add, delete, modify, and/or \
  modify DN operations to a directory server.  The changes to apply should be \
  supplied in LDIF format, either via standard input or from a file specified \
  with the ''{0}'' argument.  Change records must be separated by at least \
  one blank line.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ALLOW_UNDELETE=Treat any add operation that \
  includes the ''{0}'' attribute as an undelete operation.  Undelete requests \
  may be used to restore a soft-deleted entry, optionally using a different \
  DN than was originally assigned to the entry.  The server must be \
  configured to allow soft delete operations, and the requester must have the \
  soft-delete-read privilege.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ASSURED_REPLICATION=Indicates that all \
  operation requests should include the UnboundID-proprietary 'assured \
  replication' request control to indicate that the server should delay \
  returning a response to the client until a minimum amount of replication \
  processing has been performed for the operation.  The ''--{0}'', ''--{1}'', \
  and ''--{2}'' arguments may be used to configure the settings to use for \
  the assured replication control, but the server will automatically \
  determine an appropriate value for any argument that is not provided.
INFO_LDAPMODIFY_ARG_DESCRIPTION_AUTHZ_IDENTITY=Indicates that all bind \
  requests should include the 'authorization identity' request control as \
  defined in RFC 3829.  With this control, a successful bind result should \
  include the authorization identity assigned to the connection.
INFO_LDAPMODIFY_ARG_DESCRIPTION_CONTINUE_ON_ERROR=Continue processing changes \
  even if an error is encountered.  If this is not provided, then processing \
  will abort after the first failed operation.
INFO_LDAPMODIFY_ARG_DESCRIPTION_DEFAULT_ADD=Assume that any LDIF change \
  record without a changeType represents an add operation.  If this is not \
  provided, then any change record without a changeType will be considered an \
  error.
INFO_LDAPMODIFY_ARG_DESCRIPTION_DRY_RUN=Parse the LDIF representations of the \
  changes to apply but don't actually perform any LDAP communication.
INFO_LDAPMODIFY_ARG_DESCRIPTION_FOLLOW_REFERRALS=Attempt to follow any \
  referrals encountered while processing changes.  If this is not provided, \
  then any referral received will be considered an error.
INFO_LDAPMODIFY_ARG_DESCRIPTION_GET_AUTHZ_ENTRY_ATTR=Indicates that all bind \
  requests should include the UnboundID-proprietary 'get authorization \
  entry' request control to request that the server return the specified \
  attribute (or collection of attributes, in the case of a special identifier \
  like '*' to indicate all user attributes or '+' to indicate all \
  operational attributes) from the authenticated user's entry.  This argument \
  may be provided multiple times to specify multiple attributes to request.
INFO_LDAPMODIFY_ARG_DESCRIPTION_GET_USER_RESOURCE_LIMITS=Indicates that all \
  bind requests should include the UnboundID-proprietary 'get user resource \
  limits' request control to request that the server return  information \
  about resource limits (e.g., size limit, time limit, idle time limit, etc.) \
  imposed for the user.
INFO_LDAPMODIFY_ARG_DESCRIPTION_HARD_DELETE=Indicates that all delete \
  requests should include the UnboundID-proprietary 'hard delete' request \
  control, which will permanently delete the target entry even if the \
  server would have otherwise performed a soft delete operation to hide the \
  entry for a period of time before deleting it.
INFO_LDAPMODIFY_ARG_DESCRIPTION_IGNORE_NO_USER_MOD=Indicates that all add \
  requests should include the UnboundID-proprietary 'ignore \
  NO-USER-MODIFICATION' request control to permit setting values for certain \
  operational attributes not normally permitted to be provided by external \
  clients.
INFO_LDAPMODIFY_ARG_DESCRIPTION_LDAP_VERSION=Specifies the LDAP protocol \
  version that the tool should use when communicating with the directory \
  server.  This argument has no effect and is provided only for the purpose \
  of compatibility with other ldapmodify tools.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MANAGE_DSA_IT=Indicates that all \
  requests should include the manageDsaIT request control to indicate that \
  referral entries should be treated as regular entries.
INFO_LDAPMODIFY_ARG_DESCRIPTION_NAME_WITH_ENTRY_UUID=Include the \
  UnboundID-proprietary 'name with entryUUID' request control in all add \
  requests sent to the server to indicate that the server should use the \
  entryUUID operational attribute as the naming attribute for the resulting \
  entry instead of the provided RDN.
INFO_LDAPMODIFY_ARG_DESCRIPTION_NO_OPERATION=Include the LDAP no-operation \
  control in all add, delete, modify, and modify DN requests sent to the \
  server to indicate that the operation should be validated but no changes \
  should actually be applied.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PASSWORD_POLICY=Indicates that all add, bind \
  and modify requests should include the 'password policy' request control \
  (as defined in draft-behera-ldap-password-policy-10) to request that the \
  response include password policy-related information about the target entry.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PASSWORD_VALIDATION_DETAILS=Indicates that \
  all add and modify requests that target either the ''{0}'' or ''{1}'' \
  attribute should include the UnboundID-proprietary 'password validation \
  details' request control to indicate that the response should include \
  information about the password quality requirements that the server will \
  impose for the target user's password and whether the provided password \
  satisfies each of those constraints.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PERMISSIVE_MODIFY=Indicates that all modify \
  operation requests should include the 'permissive modify' request \
  control, which indicates that the server should be more lenient for certain \
  types of changes (e.g., trying to add an attribute value that already \
  exists, or trying to remove a value that does not exist) that would \
  normally cause the modify operation to be rejected.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PURGE_CURRENT_PASSWORD=Indicates that any \
  modify operation that targets either the ''{0}'' or ''{1}'' attribute \
  should include the UnboundID-proprietary 'purge current password' request \
  control.  This will indicate that the server should could purge the \
  current password from the entry (even if it would have otherwise been \
  retired for a brief period of time).
INFO_LDAPMODIFY_ARG_DESCRIPTION_REPLICATION_REPAIR=Indicates that all \
  operation requests should include the UnboundID-proprietary 'replication \
  repair' request control.  This will cause the change to be applied only to \
  the target directory server instance but not to any other server in the \
  replication topology.
INFO_LDAPMODIFY_ARG_DESCRIPTION_RETIRE_CURRENT_PASSWORD=Indicates that any \
  modify operation that targets either the ''{0}'' or ''{1}'' attribute \
  should include the UnboundID-proprietary 'retire current password' \
  request control.  This will indicate that the server should continue to \
  allow the user to authenticate with their current password (in addition to \
  the new password) for a brief period of time.
INFO_LDAPMODIFY_ARG_DESCRIPTION_RETRY_FAILED_OPERATIONS=Indicates that, if an \
  operation fails in a way that indicates the connection to the server may no \
  longer be valid, the tool should automatically create a new connection and \
  re-try the operation before reporting it as a failure.
INFO_LDAPMODIFY_ARG_DESCRIPTION_SCRIPT_FRIENDLY=Indicates that the tool \
  should operate in script-friendly mode.  This argument has no effect and is \
  provided only for the purpose of compatibility with other ldapmodify tools.
INFO_LDAPMODIFY_ARG_DESCRIPTION_SOFT_DELETE=Indicates that all delete \
  requests should include the UnboundID-proprietary 'soft delete' request \
  control, which indicates that the server should hide the entry for a \
  period of time before deleting it so that it may be restored with an \
  undelete operation if the delete should be reverted.
INFO_LDAPMODIFY_ARG_DESCRIPTION_STRIP_TRAILING_SPACES=Indicates that the tool \
  should strip any illegal trailing spaces from LDIF records before \
  attempting to process them.  If this is not provided, then any LDIF record \
  with one or more illegal trailing spaces will be considered an error.
INFO_LDAPMODIFY_ARG_DESCRIPTION_SUBTREE_DELETE=Indicates that all delete \
  requests should include the 'subtree delete' request control.  In the \
  event that the target entry includes one or more subordinate entries, this \
  control will indicate that the server should automatically remove all of \
  those entries as well.  If an entry has one or more subordinates but this \
  control is not provided, then an attempt to delete that entry will fail.
INFO_LDAPMODIFY_ARG_DESCRIPTION_SUPPRESS_REFERINT_UPDATES=Indicates that the \
  tool should include the UnboundID-proprietary 'suppress referential \
  integrity updates' request control in all delete and modify DN operations \
  to indicate that the server should not perform any referential integrity \
  processing for those operations.
INFO_LDAPMODIFY_ARG_DESCRIPTION_USE_ADMIN_SESSION=Indicates that the tool \
  should attempt to use an administrative session to process all operations \
  using a dedicated pool of worker threads.  This may be useful when trying \
  to diagnose problems in a server that is unresponsive because all normal \
  worker threads are busy processing other requests.
INFO_LDAPMODIFY_ARG_DESCRIPTION_USE_TRANSACTION=Indicates that the server \
  should create a transaction to process all operations as a single atomic \
  unit.  This should generally only be used with a relatively small number of \
  changes, and it is recommended that the changes be supplied in an LDIF file \
  rather than via standard input.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ASSURED_REPL_TIMEOUT=Specifies the timeout to \
  use for assured replication processing.  This should only be used if the \
  ''{0}'' argument is also provided.  If assured replication is to be used \
  but this argument is not provided, then the server will automatically \
  determine the timeout to use.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ADD_CONTROL=Specifies a control that should \
  be included in all add requests sent to the server.
INFO_LDAPMODIFY_ARG_DESCRIPTION_BIND_CONTROL=Specifies a control that should \
  be included in all bind requests used to authenticate to the server.
INFO_LDAPMODIFY_ARG_DESCRIPTION_DELETE_CONTROL=Specifies a control that \
  should be included in all delete requests sent to the server.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MODIFY_CONTROL=Specifies a control that \
  should be included in all modify requests sent to the server.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MODIFY_DN_CONTROL=Specifies a control that \
  should be included in all modify DN requests sent to the server.
INFO_LDAPMODIFY_ARG_DESCRIPTION_OP_CONTROL=Specifies a control that should be \
  included in all add, delete, modify, and modify DN requests sent to the \
  server.
INFO_LDAPMODIFY_ARG_DESCRIPTION_LDIF_FILE=The path to the LDIF file \
  containing the changes to process.  If this is not provided, then the \
  changes will be read from standard input.  If this argument is provided \
  multiple times to supply multiple LDIF files, then they will be processed \
  in the order they were provided on the command line.
INFO_LDAPMODIFY_PLACEHOLDER_CHARSET={charset}
INFO_LDAPMODIFY_ARG_DESCRIPTION_CHARACTER_SET=The character set for the \
  LDIF data to be read.  If this argument is not provided, a default encoding \
  of UTF-8 will be used.
INFO_LDAPMODIFY_ARG_DESCRIPTION_REJECT_FILE=The path to a file to which \
  the tool should write information about any rejected changes.
INFO_LDAPMODIFY_ARG_DESCRIPTION_VERBOSE=Provide verbose output for \
  operations processed.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ASSERTION_FILTER=A filter that will be used \
  in conjunction with the LDAP assertion request control (as described in RFC \
  4528) to indicate that the server should only apply changes to entries that \
  match this filter.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MODIFY_ENTRIES_MATCHING_FILTER=Indicates that \
  the changes read from standard input or the specified LDIF file should be \
  applied to all entries that match the specified filter.  Only modify \
  operations will be processed when this argument is provided, and the DN of \
  the modify change record will be used as the base DN for the search used to \
  identify the entires to modify.  If the filter may match a large number of \
  entries, then it is strongly recommended that the {0} argument be provided \
  to process the search in batches.  This argument may be provided multiple \
  times to specify multiple filters to use to search for entries to modify.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MODIFY_FILTER_FILE=Indicates that the changes \
  read from standard input or the specified LDIF file should be applied to \
  all entries that match a filter read from the specified file.  Only modify \
  operations will be processed when this argument is provided, and the DN of \
  the modify change record will be used as the base DN for the search used to \
  identify the entires to modify.  If any of the filters may match a large \
  number of entries, then it is strongly recommended that the {0} argument be \
  provided to process the search in batches.  This argument may be provided \
  multiple times to specify multiple filter files to use to search for \
  entries to modify.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MODIFY_ENTRY_DN=Indicates that the changes \
  read from standard input or the specified LDIF file should be applied to \
  the entry with the specified DN rather than the DN contained in the change \
  record.  Only modify operations will be processed when this argument is \
  provided, and it may be provided multiple times to specify the DNs of \
  multiple entries to modify.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MODIFY_DN_FILE=Indicates that the changes \
  read from standard input or the specified LDIF file should be applied to \
  the entries whose DNs are contained in the specified file rather than the \
  DN contained in the change record.  Only modify operations will be \
  processed when this argument is provided, and it may be provided multiple \
  times to specify multiple DN files.
INFO_LDAPMODIFY_ARG_DESCRIPTION_SEARCH_PAGE_SIZE=Specifies the page size to \
  use in conjunction with the simple paged results control when searching \
  for entries to modify based on the filter provided in the {0} or {1} \
  argument.  If this argument is not provided, then the simple paged results \
  control will not be used.
INFO_LDAPMODIFY_ARG_DESCRIPTION_RATE_PER_SECOND=Specifies a maximum operation \
  rate that the tool should be permitted to achieve.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ASSURED_REPL_LOCAL_LEVEL=Specifies the local \
  assurance level to use for the assured replication request control.  This \
  should only be used if the ''{0}'' argument is provided.    The value \
  should be one of 'none', 'received-any-server', or \
  'processed-all-servers'.  If assured replication is to be used but this \
  argument is not provided, then the server will automatically determine the \
  local assurance level to use.
INFO_LDAPMODIFY_ARG_DESCRIPTION_ASSURED_REPL_REMOTE_LEVEL=Specifies the \
  remote assurance level to use for the assured replication request control.  \
  This should only be used if the ''{0}'' argument is provided.    The value \
  should be one of 'none', 'received-any-remote-location', \
  'received-all-remote-locations', or 'processed-all-remote-servers'.  If \
  assured replication is to be used but this argument is not provided, then \
  the server will automatically determine the remote assurance level to use.
INFO_LDAPMODIFY_ARG_DESCRIPTION_OPERATION_PURPOSE=Indicates that all \
  operations should include the UnboundID-proprietary 'operation purpose' \
  request control to provide the specified reason for the operation.
INFO_LDAPMODIFY_ARG_DESCRIPTION_MULTI_UPDATE_ERROR_BEHAVIOR=Indicates that \
  all add, delete, modify, and modify DN requests should be sent to the \
  server in a single multi-update request with the specified error behavior.  \
  The value for this argument must be one of 'atomic' (to indicate that all \
  updates should be processed atomically so that they will either all \
  succeed or all fail), 'abort-on-error' (to indicate that the server \
  should only process changes until the first error is encountered and ignore \
  any remaining changes after that error), or 'continue-on-error' (to \
  indicate that the server should continue attempting to process changes, \
  even after one of them has resulted in a failure).
INFO_LDAPMODIFY_ARG_DESCRIPTION_POST_READ_ATTRIBUTE=Indicates that all \
  add, modify, and modify DN requests should include the post-read control \
  (as described in RFC 4527) to retrieve the value(s) of the specified \
  attribute as they appear immediately after the operation has been processed.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PRE_READ_ATTRIBUTE=Indicates that all delete, \
  modify, and modify DN requests should include the pre-read control (as \
  described in RFC 4527) to retrieve the value(s) of the specified attribute \
  as they appear immediately before the operation has been processed.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PROXY_AS=Indicates that all requests should \
  include the proxied authorization request control (as described in RFC \
  4370) to process the operation under an alternate authorization identity.  \
  The authorization ID should generally be specified in the form 'dn:' \
  followed by the target user's DN, or 'u:' followed by the username.
INFO_LDAPMODIFY_ARG_DESCRIPTION_PROXY_V1_AS=Indicates that all requests \
  should include the legacy proxied authorization v1 request control (as \
  described in draft-weltman-ldapv3-proxy-04) to process the operation \
  under an alternate authorization identity, specified as the DN of the \
  desired user.
INFO_LDAPMODIFY_ARG_DESCRIPTION_SUPPRESS_OP_ATTR_UPDATES=Indicates that \
  all operations should include the UnboundID-proprietary 'suppress \
  operational attribute updates' request control to indicate that the \
  server should not apply any updates to the specified operational \
  attributes.  The value may be one of 'last-access-time', \
  'last-login-time', 'last-login-ip', or 'lastmod'.
ERR_LDAPMODIFY_CANNOT_CREATE_CONNECTION_POOL=An error occurred while \
  attempting to create a connection pool to communicate with the directory \
  server:  {0}
INFO_LDAPMODIFY_CONNECTION_ESTABLISHED=Successfully connected to {0}.
INFO_LDAPMODIFY_STARTED_TXN=Successfully started a transaction with ID {0}
ERR_LDAPMODIFY_CANNOT_START_TXN=An error occurred while trying to start an \
  LDAP transaction:  {0}
ERR_LDAPMODIFY_CANNOT_CREATE_LDIF_READER=An error occurred while attempting \
  to create an LDIF reader to obtain the changes to process:  {0}
ERR_LDAPMODIFY_CANNOT_CREATE_REJECT_WRITER=An error occurred while attempting \
  to create a reject writer to write rejected changes to file ''{0}'':  {1}
ERR_LDAPMODIFY_IO_ERROR_READING_CHANGE=An I/O error occurred while attempting \
  to read an LDIF change record:  {0}.  It is not possible to continue \
  processing changes.
ERR_LDAPMODIFY_RECOVERABLE_LDIF_ERROR_READING_CHANGE=An invalid LDIF change \
  record was encountered while reading changes at or near line {0}:  {1}.  \
  That change will be skipped, but the ldapmodify tool will continue trying \
  to read additional changes to process.
ERR_LDAPMODIFY_UNRECOVERABLE_LDIF_ERROR_READING_CHANGE=An invalid LDIF change \
  record was encountered while reading changes at or near line {0}:  {1}.  \
  That change will be skipped, and the ldapmodify tool cannot continue \
  processing changes.
ERR_LDAPMODIFY_INVALID_LINES=The lines that comprise the invalid change \
  record are as follows:
ERR_LDAPMODIFY_ERROR_OPENING_FILTER_FILE=An error occurred while attempting \
  to open filter file ''{0}'' for reading:  {1}
ERR_LDAPMODIFY_IO_ERROR_READING_FILTER_FILE=An I/O error occurred while \
  attempting to read from filter file ''{0}'':  {1}
ERR_LDAPMODIFY_ERROR_OPENING_DN_FILE=An error occurred while attempting to \
  open DN file ''{0}'' for reading:  {1}
ERR_LDAPMODIFY_IO_ERROR_READING_DN_FILE=An I/O error occurred while \
  attempting to read from filter file ''{0}'':  {1}
ERR_LDAPMODIFY_NON_MODIFY_WITH_BULK=Refusing to process a non-modify \
  operation when the {0} argument was provided.
ERR_LDAPMODIFY_CANNOT_GET_SEARCH_CONNECTION=Unable to obtain an LDAP \
  connection to use to search for entries beneath ''{0}'' that match filter \
  ''{1}'':  {2}
ERR_LDAPMODIFY_SEARCH_FAILED=A search operation used to identify entries \
  below ''{0}'' matching filter ''{1}'' returned a non-success result.
ERR_LDAPMODIFY_SEARCH_FAILED_CANNOT_RECONNECT=A search operation used to \
  identify entries below ''{0}'' matching filter ''{1}'' returned a \
  non-success result indicating that the connection may no longer be valid, \
  but it was not possible to obtain a replacement connection to re-try the \
  search.
ERR_LDAPMODIFY_CANNOT_DECODE_PAGED_RESULTS_CONTROL=A search operation used to \
  identify entries below ''{0}'' matching filter ''{1}'' succeeded, but an \
  error occurred while attempting to decode the simple paged results \
  response control contained in the search result.  Search processing \
  cannot continue.
ERR_LDAPMODIFY_MISSING_PAGED_RESULTS_RESPONSE=A search operation used to \
  identify entries below ''{0}'' matching filter ''{1}'' succeeded, but the \
  search result did not include the expected simple paged results response \
  control needed to determine whether there are more entries to be \
  processed.  Search processing cannot continue.
INFO_LDAPMODIFY_SEARCH_COMPLETED_MORE_PAGES=Completed search processing for \
  a page of results for entries below ''{0}'' matching filter ''{1}'', but \
  there are still more entries to process.  {2,number,0} entries processed \
  so far.
INFO_LDAPMODIFY_SEARCH_COMPLETED=Completed search processing for {0,number,0} \
  entries below ''{1}'' matching filter ''{2}''.
ERR_LDAPMODIFY_UNSUPPORTED_CHANGE_RECORD_HEADER=Unsupported change record:
INFO_LDAPMODIFY_SENDING_MULTI_UPDATE_REQUEST=Sending the changes to the \
  server in a multi-update request ...
INFO_LDAPMODIFY_DRY_RUN_ADD=Would have attempted to add entry {0} if \
  argument {1} had not been provided.
INFO_LDAPMODIFY_ADDING_ENTRY=Adding entry {0} ...
INFO_LDAPMODIFY_DRY_RUN_DELETE=Would have attempted to delete entry {0} if \
  argument {1} had not been provided.
INFO_LDAPMODIFY_DELETING_ENTRY=Deleting entry {0} ...
INFO_LDAPMODIFY_DRY_RUN_MODIFY=Would have attempted to modify entry {0} if \
  argument {1} had not been provided.
INFO_LDAPMODIFY_MODIFYING_ENTRY=Modifying entry {0} ...
INFO_LDAPMODIFY_DRY_RUN_RENAME=Would have attempted to rename entry {0} if \
  argument {1} had not been provided.
INFO_LDAPMODIFY_RENAMING_ENTRY=Renaming entry {0} ...
INFO_LDAPMODIFY_DRY_RUN_RENAME_TO=Would have attempted to rename entry {0} to \
  {1} if argument {2} had not been provided.
INFO_LDAPMODIFY_RENAMING_ENTRY_TO=Renaming entry {0} to {1} ...
INFO_LDAPMODIFY_DRY_RUN_MOVE=Would have attempted to move entry {0} if \
  argument {1} had not been provided.
INFO_LDAPMODIFY_MOVING_ENTRY=Moving entry {0} ...
INFO_LDAPMODIFY_DRY_RUN_MOVE_TO=Would have attempted to move entry {0} to \
  {1} if argument {2} had not been provided.
INFO_LDAPMODIFY_MOVING_ENTRY_TO=Moving entry {0} to {1} ...
INFO_LDAPMODIFY_ADD_ADDED_TO_MULTI_UPDATE=Add request for entry {0} added to \
  the set of operations to be included in the multi-update request.
INFO_LDAPMODIFY_DELETE_ADDED_TO_MULTI_UPDATE=Delete request for entry {0} \
  added to the set of operations to be included in the multi-update request.
INFO_LDAPMODIFY_MODIFY_ADDED_TO_MULTI_UPDATE=Modify request for entry {0} \
  added to the set of operations to be included in the multi-update request.
INFO_LDAPMODIFY_MODIFY_DN_ADDED_TO_MULTI_UPDATE=Modify DN request for entry \
  {0} added to the set of operations to be included in the multi-update \
  request.
INFO_LDAPMODIFY_NO_OP=The operation was accepted by the server but no change \
  was applied because the request included the LDAP no-op control.
INFO_LDAPMODIFY_ASSERTION_FAILED=The server refused to process the operation \
  because entry ''{0}'' did not match assertion filter ''{1}''.
ERR_LDAPMODIFY_UNABLE_TO_WRITE_REJECTED_CHANGE=Unable to write information \
  about the rejected change to file ''{0}'':  {1}
INFO_LDAPMODIFY_EXAMPLE_1=Read the changes to apply from standard input and \
  send them to the target directory server over an unencrypted LDAP \
  connection.  Any change records that don't include a changetype will be \
  treated as entries to be added.
INFO_LDAPMODIFY_EXAMPLE_2=Read the changes to apply from the specified LDIF \
  and apply them to all entries matching filter '(objectClass=person)' \
  using the simple paged results control to retrieve no more than 100 entries \
  at a time.  The communication will be encrypted with SSL, and if the first \
  server is unavailable, the second server will be tried.
ERR_LDAPMODIFY_SEARCH_LISTENER_REFERRAL=A search result reference was \
  returned while attempting to modify entries below ''{0}'' matching \
  filter ''{1}''.  The referral will not be followed.  The reference \
  included the following referral URL(s):  {2}.
INFO_LDAPSEARCH_ARG_GROUP_CONTROLS=Control Arguments
INFO_LDAPSEARCH_ARG_GROUP_DATA=Data Arguments
INFO_LDAPSEARCH_ARG_GROUP_OPS=Operation Arguments
INFO_LDAPSEARCH_ARG_GROUP_TRANSFORMATIONS=Entry Transformation Arguments
INFO_LDAPSEARCH_TOOL_DESCRIPTION=Issues one or more searches to an LDAP \
  directory server.  The criteria for the search request can be specified in \
  a number of different ways, including providing all of the details directly \
  via command-line arguments, providing all of the arguments except the \
  filter via command-line arguments and specifying a file that holds the \
  filters to use, or specifying a file that includes a set of LDAP URLs with \
  the base DN, scope, filter, and attributes to return.  See the examples \
  below for a number of sample command lines for this tool.
INFO_LDAPSEARCH_ARG_DESCRIPTION_ACCOUNT_USABLE=Indicates that all search \
  requests should include the UnboundID-proprietary account usable request \
  control to request that each search result entry returned include a \
  response control with information about the password policy usability \
  state for the entry.
INFO_LDAPSEARCH_ARG_DESCRIPTION_AUTHZ_IDENTITY=Indicates that all bind \
  requests should include the 'authorization identity' request control as \
  defined in RFC 3829.  With this control, a successful bind result should \
  include the authorization identity assigned to the connection.
INFO_LDAPSEARCH_ARG_DESCRIPTION_CONTINUE_ON_ERROR=Continue processing \
  searches even if an error is encountered.  If this is not provided, then \
  processing will abort after the first failed search.
INFO_LDAPSEARCH_ARG_DESCRIPTION_COUNT_ENTRIES=Indicates that the tool exit \
  code should represent the number of entries returned during search \
  processing.  If this is not provided, or if an error is encountered while \
  processing the search, then the tool exit code will reflect the LDAP result \
  code received during search processing (or an appropriate client-side \
  result code if a problem was encountered before sending any searches).  \
  Note that because some operating systems do not allow exit code values \
  greater than 255, that will be the maximum exit value for this tool even if \
  more than 255 entries are returned.  Also note that this argument can only \
  be used when processing a single search.
INFO_LDAPSEARCH_ARG_DESCRIPTION_WRAP_COLUMN=The column at which long lines in \
  the LDIF representation of an entry should be wrapped.  A value of zero \
  indicates that no wrapping should be performed.  If this is not provided, \
  then the wrap column will be based on the width of the terminal used to \
  run the tool.
INFO_LDAPSEARCH_ARG_DESCRIPTION_DONT_WRAP=Indicates that no line wrapping \
  should be performed when displaying the LDIF representations of matching \
  entries.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SUPPRESS_BASE64_COMMENTS=Indicates that the \
  tool should not include any comments that attempt to provide a \
  human-readable representation of any base64-encoded attribute values in \
  the search results.  If this argument is not provided, then any attribute \
  value whose LDIF representation requires base64 encoding will be \
  immediately followed by a comment that attempts to provide a human-readable \
  representation of the raw bytes that comprise that base64-encoded value.
INFO_LDAPSEARCH_ARG_DESCRIPTION_DRY_RUN=Indicate which searches would be \
  issued but do not actually send them to the server.
INFO_LDAPSEARCH_ARG_DESCRIPTION_FOLLOW_REFERRALS=Attempt to follow any \
  referrals and search result references encountered during search \
  processing.  If this is not provided, then referrals and search references \
  will be displayed in the output.10
INFO_LDAPSEARCH_ARG_DESCRIPTION_GET_USER_RESOURCE_LIMITS=Indicates that all \
  bind requests should include the UnboundID-proprietary 'get user resource \
  limits' request control to request that the server return  information \
  about resource limits (e.g., size limit, time limit, idle time limit, etc.) \
  imposed for the user.
INFO_LDAPSEARCH_ARG_DESCRIPTION_INCLUDE_REPL_CONFLICTS=Indicates that all \
  search requests should include the UnboundID-proprietary 'return conflict \
  entries request control' to indicate that the server may return any \
  replication conflict entries that match the search criteria.  Replication \
  conflict entries are normally excluded from search results.
INFO_LDAPSEARCH_ARG_DESCRIPTION_INCLUDE_SOFT_DELETED=Indicates that all \
  search requests should include the UnboundID-proprietary 'soft-deleted \
  entry access' request control to indicate that the server may return any \
  soft-deleted entries that match the search criteria.  Soft-deleted entries \
  are normally excluded from search results.  The value for this argument \
  must be one of:  'with-non-deleted-entries' (indicates that both regular \
  and soft-deleted entries should be returned), 'without-non-deleted-entries' \
  (indicates that only soft-deleted entries should be returned), or \
  'deleted-entries-in-undeleted-form' (returns only soft-deleted entries in \
  the form in the form the entry had before it was deleted).
INFO_LDAPSEARCH_ARG_DESCRIPTION_INCLUDE_SUBENTRIES=Indicates that all search \
  requests should include the 'subentries' request control (as  described \
  in draft-ietf-ldup-subentry) to indicate that the server may return any \
  LDAP subentries that match the search criteria.  LDAP subentries are \
  normally excluded from search results.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_RULE=Indicates that all search requests \
  should include the join request control to indicate that matching entries \
  should be joined with related entries based on the specified criteria.  \
  Allowed values include 'dn:' followed by the name of an attribute in the \
  source entry containing the DNs of the entries with which to join; \
  'reverse-dn:' followed by the name of an attribute in the target entries \
  whose value is the DN of the source entry; 'equals:' followed by the \
  name of an attribute in the source entry, a colon, and the name of an \
  attribute in target entries that must exactly match the source attribute; \
  or 'contains:' followed by the name of an attribute in the source entry, a \
  colon, and the name of an attribute in target entries that must match or \
  contain the value of the source attribute.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_BASE_DN=Specifies the base DN to use \
  for searches used to join search result entries with related entries.  \
  The value may be one of 'search-base' to use the base DN of the search \
  request, 'source-entry-dn' to use the DN of the source entry as the base \
  DN for join searches, or any valid LDAP DN to use a custom base DN for join \
  searches.  If this is not specified, then the default join base DN will be \
  the search base DN.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_SCOPE=Specifies the scope to use for \
  searches used to join search result entries with related entries.  The \
  value may be one of 'base', 'one', 'sub', or 'subordinates'.  If this is \
  not specified, then the scope of the search request will be used as the \
  join scope.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_SIZE_LIMIT=Specifies the maximum number \
  of entries that the server will permit to be joined with any single search \
  result entry.  If this is not provided, the size limit from the search \
  request will be used.  Note that the server will impose a maximum join size \
  limit of 1000 entries, so any join size limit greater than that will be \
  limited to 1000.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_FILTER=Specifies an additional filter \
  that the server will require target entries to match in order to be joined \
  with the source entry.  If this is not provided, no additional join filter \
  will be used.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_ATTR=Specifies an identifier that \
  indicates which attribute(s) should be included in entries joined with \
  search result entries.  The value may be an attribute name or OID, a \
  special token like '*' to indicate all user attributes or '+' to indicate \
  all operational attributes, or an object class name prefixed by an '@' \
  symbol to indicate all attributes associated with the specified object \
  class.  This may be provided multiple times to specify multiple requested \
  attributes.  If this is not specified, then the server will behave as if \
  all user attributes had been requested.
INFO_LDAPSEARCH_ARG_DESCRIPTION_JOIN_REQUIRE_MATCH=Indicates that the server \
  should not return an entry that matches the search criteria if it is not \
  joined with at least one additional entry.  If this is not provided, then \
  entries matching the search criteria will be returned even if they are not \
  joined with any other entries.
INFO_LDAPSEARCH_ARG_DESCRIPTION_MANAGE_DSA_IT=Indicates that all search \
  requests should include the manageDsaIT request control to indicate that \
  any referral entries in the scope of the search should be treated as \
  regular entries rather than causing the server to send search result \
  references.
INFO_LDAPSEARCH_ARG_DESCRIPTION_REAL_ATTRS_ONLY=Indicates that all search \
  requests should include the UnboundID-proprietary 'real attributes only' \
  request control to indicate that the server should not include any \
  virtual attributes in entries that are returned.
INFO_LDAPSEARCH_ARG_DESCRIPTION_RETRY_FAILED_OPERATIONS=Indicates that, if a \
  search fails in a way that indicates the connection to the server may no \
  longer be valid, the tool should automatically create a new connection and \
  re-try the search before reporting it as a failure.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SCRIPT_FRIENDLY=Indicates that the tool \
  should operate in script-friendly mode.  This argument has no effect and is \
  provided only for the purpose of compatibility with other ldapsearch tools.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SEPARATE_OUTPUT_FILES=Indicates that the tool \
  should generate a spearate output file for each search rather than \
  combining all results into a single file.
INFO_LDAPSEARCH_ARG_DESCRIPTION_TEE=Indicates that search results should be \
  written to standard output as well as to the output file specified via the \
  ''{0}'' argument.
INFO_LDAPSEARCH_ARG_DESCRIPTION_USE_ADMIN_SESSION=Indicates that the tool \
  should attempt to use an administrative session to process all operations \
  using a dedicated pool of worker threads.  This may be useful when trying \
  to diagnose problems in a server that is unresponsive because all normal \
  worker threads are busy processing other requests.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SUPPRESS_OP_ATTR_UPDATES=Indicates that \
  all operations should include the UnboundID-proprietary 'suppress \
  operational attribute updates' request control to indicate that the \
  server should not apply any updates to the specified operational \
  attributes.  The value may be one of 'last-access-time', \
  'last-login-time', 'last-login-ip', or 'lastmod'.
INFO_LDAPSEARCH_ARG_DESCRIPTION_PASSWORD_POLICY=Indicates that bind requests \
  should include the 'password policy' request control (as defined in \
  draft-behera-ldap-password-policy-10) to request that the response include \
  password policy-related information about the target entry.
INFO_LDAPSEARCH_ARG_DESCRIPTION_TYPES_ONLY=Indicates that the server should \
  only include the names of the attributes contained in the entry rather than \
  both names and values.
INFO_LDAPSEARCH_ARG_DESCRIPTION_TERSE=Indicates that the tool should generate \
  terse output.  The only thing written to standard output will be search \
  result entries and references, without any summary messages.  Standard \
  error will not be affected.
INFO_LDAPSEARCH_ARG_DESCRIPTION_VERBOSE=Indicates that the tool should \
  generate verbose output.
INFO_LDAPSEARCH_ARG_DESCRIPTION_VIRTUAL_ATTRS_ONLY=Indicates that all search \
  requests should include the UnboundID-proprietary 'virtual attributes \
  only' request control to indicate that the server should only include \
  virtual attributes in entries that are returned.
INFO_LDAPSEARCH_ARG_DESCRIPTION_BIND_CONTROL=Specifies a control that should \
  be included in all bind requests used to authenticate to the server.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SEARCH_CONTROL=Specifies a control that \
  should be included in all search requests sent to the server.
INFO_LDAPSEARCH_ARG_DESCRIPTION_BASE_DN=Specifies the base DN that should be \
  used for the search.  If a filter file is provided, then this base DN will \
  be used for each search with a filter read from that file.
INFO_LDAPSEARCH_ARG_DESCRIPTION_EXCLUDE_BRANCH=Indicates that all search \
  requests should include the UnboundID-proprietary 'exclude branch' \
  request control to indicate that matching entries below the specified \
  base DN should be excluded from search results.  This argument may be \
  provided multiple times if multiple branches should be excluded.
INFO_LDAPSEARCH_ARG_DESCRIPTION_FILTER_FILE=Specifies the path to a file \
  containing the search filters to issue.  Each filter should be on a \
  separate line.  Blank lines and lines beginning with the '#' character \
  will be ignored.  This argument may be provided multiple times to specify \
  multiple filter files.  If a filter file is provided, then the first \
  trailing argument will not be interpreted as a search filter (all trailing \
  arguments will be interpreted as requested attributes).
INFO_LDAPSEARCH_ARG_DESCRIPTION_LDAP_URL_FILE=Specifies the path to a file \
  containing LDAP URLs that define the search requests to issue.  The LDAP \
  URLs will specify the base DN, scope, filter, and attributes to return for \
  each search (any hostnames and port numbers included in the URLs will be \
  ignored).  Each URL should be on a separate line.  Blank lines and lines \
  beginning with the '#' character will be ignored.  This argument may be \
  provided multiple times to specify multiple LDAP URL files.
INFO_LDAPSEARCH_ARG_DESCRIPTION_OUTPUT_FORMAT=Specifies the format that \
  should be used for the output generated by this tool.  Allowed values are \
  'LDIF' (LDAP Data Interchange Format, which is the standard string \
  representation for LDAP data), 'JSON' (JavaScript Object Notation, which is \
  a popular format used by web services), 'CSV' (comma-separated values, \
  which is a commonly-used format for text processing, and 'tab-delimited' \
  (another commonly-used general text format).  If either the 'CSV' or \
  'tab-delimited' format is selected, the set of requested attributes must be \
  provided with the ''{0}'' argument, the order in which the attributes are \
  provided on the command line specifies the order in which they will be \
  listed in the output, and if any of those attributes has multiple values \
  then only the first value will be used.  Further, the 'CSV' and \
  'tab-delimited' formats cannot be used in conjunction with the ''{1}'' \
  argument.  If no output format is specified, a default of 'LDIF' will be \
  used.
INFO_LDAPSEARCH_ARG_DESCRIPTION_OUTPUT_FILE=Specifies the path to the file to \
  which search results should be written.  If this argument is not provided \
  then results will be written to standard output.
INFO_LDAPSEARCH_ARG_DESCRIPTION_ASSERTION_FILTER=A filter that will be used \
  in conjunction with the LDAP assertion request control (as described in RFC \
  4528) to indicate that the server should only process searches in which the \
  entry specified as the base DN matches this filter.
INFO_LDAPSEARCH_ARG_DESCRIPTION_FILTER=Specifies a filter to use when \
  processing a search.  This may be provided multiple times to issue multiple \
  searches with different filters.  If this argument is provided, then the \
  first trailing argument will not be interpreted as a search filter (all \
  trailing arguments will be interpreted as requested attributes).
INFO_LDAPSEARCH_ARG_DESCRIPTION_MATCHED_VALUES_FILTER=Indicates that all \
  search requests should include the 'matched values' request control (as \
  described in RFC 3876) to indicate that search result entries should only \
  include values for a given attribute that match the provided filter.  This \
  argument may be provided multiple times to specify multiple matched values \
  filters.
INFO_LDAPSEARCH_ARG_DESCRIPTION_RATE_PER_SECOND=Specifies a maximum search \
  rate that the tool should be permitted to achieve.  Note that this limit \
  applies only to the rate at which the client issues search requests and not \
  to the rate at which the server may send matching entries.
INFO_LDAPSEARCH_ARG_DESCRIPTION_PAGE_SIZE=Indicates that all search requests \
  should include the 'simple paged results' control (as described in RFC \
  2696) to indicate that the search should return entries in pages of no more \
  than the specified size.  This can be useful for searches that must return \
  a large number of entries but the server restricts the number of entries \
  that may be returned for any search.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SIZE_LIMIT=Specifies the maximum number of \
  entries that the server should return for each search.  A value of zero \
  (which is the default if this argument is not used) indicates that no \
  client-side size limit should be imposed.  Note that the server may impose \
  its own limit on the number of entries that may be returned for a search.
INFO_LDAPSEARCH_ARG_DESCRIPTION_TIME_LIMIT=Specifies the maximum length of \
  time in seconds that the server should spend processing each search.  A \
  value of zero (which is the default if this argument is not provided) \
  indicates that no client-side time limit should be imposed.  Note that the \
  server may impose its own time limit for search requests.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SCOPE=Specifies the scope that to use for \
  search requests.  The value should be one of 'base', 'one', 'sub', or \
  'subordinates'.  If this argument is not provided, a default of 'sub' \
  will be used.
INFO_LDAPSEARCH_ARG_DESCRIPTION_DEREFERENCE_POLICY=Specifies the alias \
  dereferencing policy to use for search requests.  The value should be one \
  of 'never', 'always', 'search', or 'find'.  If this argument is not \
  provided, a default of 'never' will be used.
INFO_LDAPSEARCH_ARG_DESCRIPTION_GET_AUTHZ_ENTRY_ATTR=Indicates that all bind \
  requests should include the UnboundID-proprietary 'get authorization \
  entry' request control to request that the server return the specified \
  attribute (or collection of attributes, in the case of a special identifier \
  like '*' to indicate all user attributes or '+' to indicate all \
  operational attributes) from the authenticated user's entry.  This argument \
  may be provided multiple times to specify multiple attributes to request.
INFO_LDAPSEARCH_ARG_DESCRIPTION_GET_EFFECTIVE_RIGHTS_ATTR=Indicates that all \
  search requests should include the UnboundID-proprietary 'get effective \
  rights' request control to return information about the access control \
  rights that a user has when interacting with each matching entry.  This \
  argument may be provided multiple times to specify multiple attributes.
INFO_LDAPSEARCH_ARG_DESCRIPTION_GET_EFFECTIVE_RIGHTS_AUTHZID=Indicates that \
  all search requests should include the UnboundID-proprietary 'get \
  effective rights' request control to return information about the \
  access control rights the specified user has when interacting with each \
  matching entry.
INFO_LDAPSEARCH_ARG_DESCRIPTION_MATCHING_ENTRY_COUNT_CONTROL=Indicates that \
  all search requests should include the UnboundID-proprietary 'matching \
  entry count' request control, which indicates that the server should \
  return information about the number of entries that match the search \
  criteria.  The maximum number of entries to examine must be specified, \
  which helps indicate whether an exact count or an estimate will be \
  returned.  If alwaysExamine is specified and the number of candidates is \
  less than the examine count, then each candidate will be examined to verify \
  that it matches the criteria and would actually be returned to the client \
  in a search.  If allowUnindexed is specified, then the count will be \
  allowed to be processed even if the search is unindexed (and may take a \
  very long time to complete).  If debug is specified, then additional debug \
  information may be included in the output.
INFO_LDAPSEARCH_ARG_DESCRIPTION_OPERATION_PURPOSE=Indicates that all search \
  requests should include the UnboundID-proprietary 'operation purpose' \
  request control to provide the specified reason for the operation.
INFO_LDAPSEARCH_ARG_DESCRIPTION_PERSISTENT_SEARCH=Indicates that the search \
  request should include the persistent search request control (as described \
  in draft-ietf-ldapext-psearch) to indicate that the server should return \
  information about changes to entries that match the search criteria as \
  they are processed.  This argument may only be used when processing a \
  single search operation.
INFO_LDAPSEARCH_ARG_DESCRIPTION_PROXY_AS=Indicates that all search requests \
  should include the proxied authorization request control (as described in \
  RFC 4370) to process the operation under an alternate authorization \
  identity.  The authorization ID should generally be specified in the form \
  'dn:' followed by the target user's DN, or 'u:' followed by the username.
INFO_LDAPSEARCH_ARG_DESCRIPTION_PROXY_V1_AS=Indicates that all search \
  requests should include the legacy proxied authorization v1 request control \
  (as described in draft-weltman-ldapv3-proxy-04) to process the search under \
  an alternate authorization identity, specified as the DN of the desired user.
INFO_LDAPSEARCH_ARG_DESCRIPTION_REQUESTED_ATTR=Specifies an identifier that \
  indicates which attribute(s) should be included in entries that match the \
  search criteria.  The value may be an attribute name or OID, a special \
  token like '*' to indicate all user attributes or '+' to indicate all \
  operational attributes, or an object class name prefixed by an '@' symbol \
  to indicate all attributes associated with the specified object class.  \
  This may be provided multiple times to specify multiple requested \
  attributes, and it may be provided instead of or in addition to the set of \
  requested attributes in the set of trailing arguments.  If this is not \
  specified, then the server will behave as if all user attributes had been \
  requested.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SORT_ORDER=Indicates that all search requests \
  should include the server-side sort request control (as described in RFC \
  2891) to request that the server sort results before returning them to the \
  client.  The sort order should be a comma-separated list of attribute \
  names, each of which may be optionally prefixed by '+' (to indicate that \
  sorting should be in ascending order for that attribute) or '-' (for \
  descending order), and may be optionally followed by a colon and the name \
  or OID for the ordering matching rule that should be used when sorting.  \
  Ascending order will be used if neither '+' or '-' is specified, and if no \
  matching rule ID is given then the attribute type's own ordering rule will \
  be used.
INFO_LDAPSEARCH_ARG_DESCRIPTION_VLV=Indicates that all search requests should \
  include the virtual list view (VLV) request control (as described in \
  draft-ietf-ldapext-ldapv3-vlv) to indicate that the server should return \
  the specified subset of the sorted search results (and the ''{0}'' argument \
  must also be given to specify the sort order).  The value should be a \
  colon-delimited list indicating which page of results to return, and it may \
  take one of two forms.  In either case, the first element specifies the \
  number of elements to return before the entry identified as the start of \
  the results, and the second is the number of entries after the "start" \
  entry.  The third element identifies the start of the result set, and it \
  may be either an integer offset (in which the first entry in the result \
  set has an offset of one), or a string that provides a value for which the \
  server should identify the first entry whose value for the primary sort \
  attribute is greater than or equal to the given string.  In the event that \
  an offset is provided, a fourth element must also be given to indicate the \
  expected number of entries in the result set, or zero if that is not \
  known.  For example, a value of '0:9:1:0' indicates that the server should \
  return the first ten entries of the result set (starting at offset 1, which \
  is the first entry, return the zero previous entries and the nine following \
  entries, with no indication of how many entries match the search \
  criteria).  Alternately, a value of '0:99:smith' indicates that the server \
  should the first 100 entries in the result set for which the primary sort \
  attribute has a value that is greater than or equal to 'smith'.
INFO_LDAPSEARCH_ARG_DESCRIPTION_EXCLUDE_ATTRIBUTE=Specifies the name or OID \
  of an attribute that should be excluded from search result entries.  This \
  argument may be provided multiple times to specify multiple attributes to \
  exclude.
INFO_LDAPSEARCH_ARG_DESCRIPTION_REDACT_ATTRIBUTE=Specifies the name or OID of \
  an attribute whose values should be redacted to indicate that the attribute \
  is present in search result entries but to hide the actual values for that \
  attribute.  This argument may be provided multiple times to specify \
  multiple attributes to redact.
INFO_LDAPSEARCH_ARG_DESCRIPTION_HIDE_REDACTED_VALUE_COUNT=Indicates that the \
  output should not reveal the number of values contained in redacted \
  attributes.  If this argument is present, then a redacted attribute will \
  only ever have a single value of '***REDACTED***'.  If this argument is not \
  present, then a redacted attribute with multiple values will still have \
  the same number of values that it originally had, but those values will \
  be '***REDACTED1***', '***REDACTED2***', etc.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SCRAMBLE_ATTRIBUTE=Specifies the name or OID \
  of an attribute whose values should be scrambled.  Scrambling will be \
  performed in a manner that attempts to preserve the associated attribute \
  syntax and that will generally try to ensure that a given input value will \
  consistently yield the same scrambled output.  This argument may be \
  provided multiple times to specify multiple attributes to scramble.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SCRAMBLE_JSON_FIELD=Specifies the name of a \
  JSON field whose values should be scrambled.  If the --scrambleAttribute \
  argument is used to scramble any attributes whose values may be JSON \
  objects, then all JSON field names will be preserved and only the values of \
  the specified fields will be scrambled.  If this argument is given (and it \
  may be provided multiple times to target multiple JSON fields), then only \
  the specified fields will have their values scrambled.  If this argument \
  is not provided, then any of the scramble attribute values that are JSON \
  objects will have all values scrambled.  JSON field names will be treated \
  in a case-insensitive manner.
INFO_LDAPSEARCH_ARG_DESCRIPTION_SCRAMBLE_RANDOM_SEED=Specifies the value that \
  will be used to seed the random number generator used in the course of \
  scrambling attribute values.  If a random seed is provided, then scrambling \
  the same entry with the same seed should consistently yield the same \
  scrambled representations.  If no random seed is specified, an appropriate \
  value will be selected automatically.
INFO_LDAPSEARCH_ARG_DESCRIPTION_RENAME_ATTRIBUTE_FROM=Specifies the name or \
  OID of an attribute that should have its name replaced with the value \
  specified in the --renameAttributeTo argument.  This argument may be \
  provided multiple times as long as the --renameAttributeTo argument is also \
  provided the same number of times, and the order of --renameAttributeFrom \
  values must correspond to the order of --renameAttributeTo values.
INFO_LDAPSEARCH_ARG_DESCRIPTION_RENAME_ATTRIBUTE_TO=Specifies the new name \
  to use for an attribute to be renamed.  This argument must be provided the \
  same number of times as the --renameAttributeFrom argument.
INFO_LDAPSEARCH_ARG_DESCRIPTION_MOVE_SUBTREE_FROM=Specifies the base DN for \
  a subtree to be moved to another location in the DIT, with this source DN \
  being replaced with the base DN specified using the --moveSubtreeTo \
  argument.  This argument may be provided multiple times as long as the \
  --moveSubtreeTo argument is also provided the same number of times, and the \
  order of --moveSubtreeFrom values must correspond to the order of \
  --moveSubtreeTo values.
INFO_LDAPSEARCH_ARG_DESCRIPTION_MOVE_SUBTREE_TO=Specifies the new base DN for \
  a subtree to be moved.  This argument must be provided the same number of \
  times as the --moveSubtreeFrom argument.
INFO_LDAPSEARCH_ARG_DESCRIPTION_LDAP_VERSION=Specifies the LDAP protocol \
  version that the tool should use when communicating with the directory \
  server.  This argument has no effect and is provided only for the purpose \
  of compatibility with other ldapsearch tools.
INFO_LDAPSEARCH_TRAILING_ARGS_PLACEHOLDER={filter} [{attr1} [{attr2} ...]]
ERR_LDAPSEARCH_TRAILING_ARGS_WITH_URL_FILE=Trailing arguments are not allowed \
  when the ''{0}'' argument is provided.
ERR_LDAPSEARCH_TRAILING_FILTER_WITH_FILTER_FILE=If a filter file is \
  specified, then a filter cannot be provided as a trailing argument.
ERR_LDAPSEARCH_NO_TRAILING_ARGS=If neither the ''{0}'' nor the ''{1}'' \
  argument is provided, the filter to use for the search must be provided as \
  a trailing argument.
ERR_LDAPSEARCH_FIRST_TRAILING_ARG_NOT_FILTER=The first trailing argument \
  ''{0}'' is not a valid LDAP search filter.
WARN_LDAPSEARCH_TRAILING_ARG_STARTS_WITH_DASH=WARNING:  Unnamed trailing \
  argument ''{0}'' starts with a dash.  Trailing arguments should only be \
  used for the search filter (unless a different argument is used to specify \
  the filters) and set of requested attributes to include in search result \
  entries.  If this was intended to be a named argument, it should be \
  placed earlier in the argument list.
ERR_LDAPSEARCH_INVALID_MATCHED_VALUES_FILTER=Filter ''{0}'' is a valid \
  search filter, but is not valid for use with the matched values request \
  control.
ERR_LDAPSEARCH_MATCHING_ENTRY_COUNT_INVALID_VALUE=The value provided for the \
  ''{0}'' argument is invalid.  The value must start with 'examineCount=' \
  followed by an integer greater than or equal to zero.  It may optionally \
  also contain ':alwaysExamine' (to indicate that it should always attempt \
  to examine candidate entries to determine whether they actually match), \
  ':allowUnindexed' (to indicate that the server should attempt to \
  determine the matching entry count even if the search criteria is not \
  indexed), and/or ':debug' (to indicate that the response control should \
  include debug information about the processing performed in the course of \
  making the determination.
ERR_LDAPSEARCH_PERSISTENT_SEARCH_INVALID_VALUE=The value provided for the \
  ''{0}'' argument is invalid.  The value must start with 'ps'.  That may be \
  followed by a colon and a comma-delimited list of change types ('add', \
  'delete', 'modify', or 'modifydn'), or 'any' to indicate that all change \
  types should be included.  That may be followed by a colon and a '1' to \
  indicate that the search should only return matching entries when they are \
  targeted by an appropriate operation, or '0' to indicate that the search \
  should first return all existing entries that match the criteria before \
  transitioning to returning to returning entries as updates occur.  That may \
  be followed by a colon and a '1' to request that the server include entry \
  change notification controls with search result entries, or '0' to request \
  no such controls.  A value of just 'ps' is equivalent to 'ps:any:1:1'.
ERR_LDAPSEARCH_SORT_ORDER_INVALID_VALUE=The value provided for the ''{0}'' \
  argument is invalid.  The value must be a comma-delimited list of one or \
  more attribute names or OIDs, each of which may be prefixed by '-' to \
  indicate that sorting for that attribute should be in descending order, or \
  '+' to indicate that sorting for that attribute should be in ascending \
  order.  If an attribute name is not prefixed with either '-' or '+', then \
  sorting for that attribute will be in ascending order.
ERR_LDAPSEARCH_VLV_INVALID_VALUE=The value provided for the ''{0}'' argument \
  is invalid.  The value must either be a colon-delimited list of four \
  integers (representing the before count; after count; offset index; and \
  expected result set size, with zero used if the expected result set size is \
  not knonw), or a colon-delimited list of two integers and one string \
  (representing the before count, after count, and the primary sort attribute \
  value that should be used as the start of the result set).
ERR_LDAPSEARCH_JOIN_RULE_INVALID_VALUE=The value provided for the ''{0}'' \
  argument is invalid.  The value must be one of the following:  the string \
  'dn:' followed by the name or OID of an attribute in the source entry whose \
  values are the DNs of the entries with which to join; the string \
  'reverse-dn:' followed by the name or OID of an attribute in the target \
  entry with a value that matches the DN of the source entry; the string \
  'equals:' followed by the name or OID of an attribute in the source entry, \
  a colon, and the name or OID of an attribute in target entries that must \
  have a value that equals at least one value of the source attribute; or the \
  string 'contains:' followed by the name or OID of an attribute in the \
  source entry, a colon, and the name or OID of an attribute in target \
  entries that must have a value that matches or contains as a substring at \
  least one value of the source attribute.
ERR_LDAPSEARCH_JOIN_BASE_DN_INVALID_VALUE=The value provided for the ''{0}'' \
  argument is invalid.  The value may be 'search-base' to use the base DN \
  from the search request as the base DN for join searches, 'source-entry-dn' \
  to use the DN of the source entry as the base DN for join searches, or any \
  valid DN to use that DN as the base DN for join searches.
ERR_LDAPSEARCH_RENAME_ATTRIBUTE_MISMATCH=The --renameAttributeFrom argument \
  must be provided the same number of times as the --renameAttributeTo \
  argument.
ERR_LDAPSEARCH_MOVE_SUBTREE_MISMATCH=The --moveSubtreeFrom argument must be \
  provided the same number of times as the --moveSubtreeTo argument.
ERR_LDAPSEARCH_OUTPUT_FORMAT_NOT_SUPPORTED_WITH_URLS=The ''{0}'' output \
  format cannot be used in conjunction with the ''{1}'' argument.
ERR_LDAPSEARCH_OUTPUT_FORMAT_REQUIRES_REQUESTED_ATTR_ARG=The ''{0}'' output \
   format requires that the set of requested arguments be identified with the \
   ''{1}'' argument rather than as unnamed trailing arguments.
ERR_LDAPSEARCH_CANNOT_OPEN_OUTPUT_FILE=Unable to open output file ''{0}'' \
  for writing:  {1}
ERR_LDAPSEARCH_CANNOT_CREATE_CONNECTION_POOL=An error occurred while \
  attempting to create a connection pool to communicate with the directory \
  server:  {0}
ERR_LDAPSEARCH_MALFORMED_LDAP_URL=LDAP URL file ''{0}'' contains value \
  ''{1}'' that cannot be parsed as a valid LDAP URL.
ERR_LDAPSEARCH_CANNOT_READ_LDAP_URL_FILE=An error occurred while attempting \
  to read from LDAP URL file ''{0}'':  {1}
ERR_LDAPSEARCH_MALFORMED_FILTER=Filter file ''{0}'' contains a value that \
  cannot be parsed as a valid LDAP search filter:  {1}
ERR_LDAPSEARCH_CANNOT_READ_FILTER_FILE=An error occurred while attempting \
  to read from filter URL file ''{0}'':  {1}
INFO_LDAPSEARCH_DRY_RUN_REQUEST_NOT_SENT=No search operation was actually \
  processed because the {0} argument was provided.  The request that would \
  have been sent is:  {1}
INFO_LDAPSEARCH_SENDING_SEARCH_REQUEST=Sending search request {0}
ERR_LDAPSEARCH_MISSING_PAGED_RESULTS_RESPONSE_CONTROL=The search request \
  included the simple paged results request control, but the corresponding \
  search result did not include the expected response control.  It is not \
  possible to continue paging through the search results.
ERR_LDAPSEARCH_CANNOT_DECODE_PAGED_RESULTS_RESPONSE_CONTROL=An error occurred \
  while attempting to decode the simple paged results response control \
  included in the search result:  {0}.  It is not possible to continue \
  paging through the search results.
INFO_LDAPSEARCH_INTERMEDIATE_PAGED_SEARCH_RESULT=Intermediate search result \
  with more pages to retrieve:
INFO_LDAPSEARCH_TOTAL_SEARCH_ENTRIES=Total Entries Returned:  {0,number,0}
INFO_LDAPSEARCH_TOTAL_SEARCH_REFERENCES=Total References Returned:  \
  {0,number,0}
INFO_LDAPSEARCH_EXAMPLE_1=Establishes an unencrypted LDAP connection to \
  directory.example.com:389, performs a simple bind to authenticate as user \
  'uid=jdoe,ou=People,dc=example,dc=com', and issues a search request to \
  retrieve the givenName, sn, and mail attributes for the user with uid \
  'jqpublic' below dc=example,dc=com.  The search results will be written to \
  standard output.
INFO_LDAPSEARCH_EXAMPLE_2=Establishes an SSL-encrypted LDAP connection to \
  directory.example.com:636, interactively prompting the user about whether \
  to trust the certificate presented by the directory server.  The tool \
  will then bind with the SASL PLAIN mechanism using an authentication ID of \
  "u:jdoe" and a password read from a file.  It will then issue a search \
  request for each filter in a given file, writing the results for each \
  search into a separate output file.
INFO_LDAPSEARCH_EXAMPLE_3=Establishes an LDAP connection to \
  directory.example.com:389 that is secured with the StartTLS extended \
  operation, using the information in the provided trust store file to \
  determine whether to trust the certificate presented by the directory \
  server.  It will then issue an unauthenticated search to retrieve all \
  user and operational attributes from the server's root DSE.  The output \
  will be written to a specified output file as well as displayed on standard \
  output.
INFO_LDAPSEARCH_EXAMPLE_4=Issues a search request to retrieve all entries at \
  or below 'dc=example,dc=com', using the simple paged results control to \
  retrieve up to 100 entries at a time.  The search will use an unencrypted \
  LDAP connection, and the tool will interactively prompt the user for the \
  password to use when performing simple authentication.
INFO_LDAPSEARCH_EXAMPLE_5=Issues a search request to retrieve a \
  special entry that provides details about the server's use of indexes to \
  determine the candidate set of potential matching entries.  This feature \
  is only supported in the UnboundID/Ping Identity Directory Server, and \
  the user must have access control rights to retrieve the 'cn=debugsearch' \
  entry and the 'debugsearchindex' operational attribute.
INFO_SPLIT_LDIF_TOOL_DESCRIPTION=Splits a single LDIF file into multiple \
  sets by separating entries below a specified base DN into different \
  mutually-exclusive collections of entries.  A number of algorithms are \
  available to determine how entries should be split, and entries outside the \
  split base DN may be included in all sets or added to a dedicated LDIF file.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_SOURCE_LDIF=The path to an LDIF file \
  containing the data to be split into multiple sets.  This argument may be \
  provided multiple times to specify multiple LDIF files, and the files will \
  be processed in the order they were provided on the command line.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_SOURCE_COMPRESSED=Indicates that the source \
  LDIF files are gzip-compressed.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_TARGET_LDIF_BASE=The path and base name to \
  use for the LDIF files containing the data that has been split.  The \
  resulting LDIF files will use this path with different extensions ('.set1' \
  for the first set, '.set2' for the second set, and so on, and \
  '.outside-split-base-dn' if a file is to be created to hold entries that \
  exist outside of the split base DN).  If this is not provided, then the \
  source LDIF path will be used as the base name.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_COMPRESS_TARGET=Indicates that the target \
  LDIF files should be gzip-compressed.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_SPLIT_BASE_DN=The base DN below which entries \
  should be split.  The entry with this DN will appear in all sets, but each \
  entry below this base DN will appear in exactly one set.  This must be \
  provided.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_OUTSIDE_TO_ALL_SETS=Indicates that entries \
  outside the split base DN should be added to all sets containing split data.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_OUTSIDE_TO_DEDICATED_SET=Indicates that \
  entries outside the split base DN should be added to a dedicated set in its \
  own file.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_SCHEMA_PATH=The path to a file or directory \
  from which to read schema definitions to use when processing.  If the \
  provided path is a file, then it must be an LDIF file containing the \
  definitions to read.  If the provided path is a directory, then schema \
  definitions will be read from all files with an extension of '.ldif' in \
  that directory.  If this argument is provided multiple times, then the \
  paths will be processed in the order they were provided on the command \
  line.  If this argument is not provided, then a default standard schema \
  will be used.
INFO_SPLIT_LDIF_GLOBAL_ARG_DESC_NUM_THREADS=The number of threads to use when \
  processing.  If this is not specified, a single thread will be used.
INFO_SPLIT_LDIF_SC_HASH_ON_RDN_DESC=Splits the data by computing a hash on \
  the normalized representation of the DN component immediately below the \
  split base DN, and using a modulus operation to determine the set in which \
  to place the entry.  This split algorithm does not require any caching to \
  ensure that a subordinate entry is placed in the same set as its parent.
INFO_SPLIT_LDIF_SC_HASH_ON_RDN_ARG_DESC_NUM_SETS=The number of sets into \
  which the data should be split.  This must be provided, and the value must \
  be greater than or equal to two.
INFO_SPLIT_LDIF_SC_HASH_ON_RDN_EXAMPLE=Splits LDIF file 'whole.ldif' so that \
  entries below 'ou=People,dc=example,dc=com' will be split into four sets, \
  selected by computing a digest of the RDN component immediately below \
  'ou=People,dc=example,dc=com', with names starting with 'split.ldif'.
INFO_SPLIT_LDIF_SC_HASH_ON_ATTR_DESC=Splits the data by computing a hash on \
  the value(s) of a specified attribute in entries immediately below the \
  split base DN, and using a modulus operation to determine the set in which \
  to place the entry.  If an entry does not contain the target attribute, the \
  set will be chosen based on a hash of the DN component immediately below \
  the split base DN.  Unless the --assumeFlatDIT argument is provided, a \
  cache will be used to ensure that subordinate entries are added into the \
  same set as their parents.
INFO_SPLIT_LDIF_SC_HASH_ON_ATTR_ARG_DESC_ATTR_NAME=The name or OID of the \
  attribute for which to compute the hash.  This must be provided.
INFO_SPLIT_LDIF_SC_HASH_ON_ATTR_ARG_DESC_NUM_SETS=The number of sets into \
  which the data should be split.  This must be provided, and the value must \
  be greater than or equal to two.
INFO_SPLIT_LDIF_SC_HASH_ON_ATTR_ARG_DESC_ALL_VALUES=Indicates that the \
  hashing process should examine all values for the target attribute.  If \
  this argument is not provided, then only the first value for the attribute \
  will be used to determine the set in which an entry should be placed.
INFO_SPLIT_LDIF_SC_HASH_ON_ATTR_ARG_DESC_ASSUME_FLAT_DIT=Indicates that the \
  tool should assume that all entries below the split base DN will be exactly \
  one level below that entry, so that it is not necessary to maintain a cache \
  to determine where a subordinate entry's parent resides.  If this argument \
  is provided but one or more subordinate entries are found, then then will \
  be added to a separate file so the appropriate set can be manually \
  identified.
INFO_SPLIT_LDIF_SC_HASH_ON_ATTR_EXAMPLE=Splits LDIF file 'whole.ldif' so that \
  entries below 'ou=People,dc=example,dc=com' will be split into four sets, \
  selected by computing a digest of the first value of the 'uid' attribute, \
  with names starting with 'split.ldif'.
INFO_SPLIT_LDIF_SC_FEWEST_ENTRIES_DESC=Splits the data by selecting the \
  set with the fewest number of entries.  When processing data in a flat DIT, \
  this will essentially be a round-robin distribution.  When processing data \
  in a DIT with branches of varying sizes, this can help ensure that the \
  resulting LDIF files will have roughly the same number of entries (although \
  running the tool with multiple threads may make this less accurate).  \
  Unless the --assumeFlatDIT argument is provided, a cache will be used to \
  ensure that subordinate entries are added into the same set as their parents.
INFO_SPLIT_LDIF_SC_FEWEST_ENTRIES_ARG_DESC_NUM_SETS=The number of sets into \
  which the data should be split.  This must be provided, and the value must \
  be greater than or equal to two.
INFO_SPLIT_LDIF_SC_FEWEST_ENTRIES_ARG_DESC_ASSUME_FLAT_DIT=Indicates that the \
  tool should assume that all entries below the split base DN will be exactly \
  one level below that entry, so that it is not necessary to maintain a cache \
  to determine where a subordinate entry's parent resides.  If this argument \
  is provided but one or more subordinate entries are found, then then will \
  be added to a separate file so the appropriate set can be manually \
  identified.
INFO_SPLIT_LDIF_SC_FEWEST_ENTRIES_EXAMPLE=Splits LDIF file 'whole.ldif' into \
  four sets, with names starting with 'split.ldif', so that each entry \
  immediately below 'ou=People,dc=example,dc=com' will be placed in the set \
  that currently has the fewest entries.
INFO_SPLIT_LDIF_SC_FILTER_DESC=Splits the data by using search filters to \
  select the appropriate set.  The filters will be evaluated in the order \
  they were provided on the command line, and the entry will be added to the \
  first set for which a matching filter is found.  If the entry doesn't match \
  any of the provided filters, then the appropriate set will be determined by \
  computing a hash on the RDN.  Unless the --assumeFlatDIT argument is \
  provided, a cache will be used to ensure that subordinate entries are added \
  into the same set as their parents.
INFO_SPLIT_LDIF_SC_FILTER_ARG_DESC_FILTER=A filter to evaluate against \
  entries exactly one level below the split base DN to determine which set \
  should be used to hold the entry.  This argument should be provided \
  multiple times, once for each set into which the data should be split, and \
  the filters will be evaluated in the order they were provided on the \
  command line until one is found that matches the target entry.
INFO_SPLIT_LDIF_SC_FILTER_ARG_DESC_ASSUME_FLAT_DIT=Indicates that the tool \
  should assume that all entries below the split base DN will be exactly one \
  level below that entry, so that it is not necessary to maintain a cache to \
  determine where a subordinate entry's parent resides.  If this argument is \
  provided but one or more subordinate entries are found, then then will be \
  added to a separate file so the appropriate set can be manually identified.
INFO_SPLIT_LDIF_SC_FILTER_EXAMPLE=Splits LDIF file 'whole.ldif' into four \
  sets, with names starting with 'split.ldif', so that each entry \
  immediately below 'ou=People,dc=example,dc=com' will be selected by \
  matching that entry against a search filter.  Entries matching \
  '(timeZone=Eastern)' will go into the first set, entries matching \
  '(timeZone=Central)' into the second set, '(timeZone=Mountain)' into the \
  third set, and '(timeZone=Pacific)' into the fourth.  Any entries not \
  matching any of those filters will be placed by computing a hash on its RDN.
ERR_SPLIT_LDIF_NO_TARGET_BASE_PATH=If the {0} argument is provided multiple \
  times, then the {1} argument must also be provided to specify the base \
  path and name for the file to be written.
ERR_SPLIT_LDIF_NON_UNIQUE_FILTER=All values provided for the ''{0}'' argument \
  must be unique.  Filter ''{1}'' was provided multiple times.
ERR_SPLIT_LDIF_NOT_ENOUGH_FILTERS=If the ''{0}'' subcommand is used, the \
  ''{1}'' argument must be provided multiple times, with each occurrence \
  defining the criteria for a different set.
ERR_SPLIT_LDIF_CANNOT_DETERMINE_SPLIT_ALGORITHM=Unable to determine which \
  algorithm should be used to split the data.  One of the following \
  subcommands must be used to specify the algorithm:  {0}
ERR_SPLIT_LDIF_ERROR_CREATING_LDIF_READER=An error occurred while attempting \
  to create the LDIF reader:  {0}
ERR_SPLIT_LDIF_INVALID_LDIF_RECORD_RECOVERABLE=A malformed LDIF record was \
  encountered while in the source data:  {0}.  This record will be skipped, \
  but processing will continue.
ERR_SPLIT_LDIF_INVALID_LDIF_RECORD_UNRECOVERABLE=A malformed LDIF record was \
  encountered while in the source data:  {0}.  Processing cannot continue.
ERR_SPLIT_LDIF_IO_READ_ERROR=An I/O error occurred while attempting \
  to read the source data:  {0}.  Processing cannot continue.
ERR_SPLIT_LDIF_UNEXPECTED_READ_ERROR=An unexpected error was encountered \
  while attempting to read the source data:  {0}.  Processing cannot continue.
ERR_SPLIT_LDIF_ENTRY_WITHOUT_PARENT=Unable to determine which set should hold \
  entry ''{0}'' because it is more than one level below split base DN ''{1}'' \
  but one or more of its superiors does not exist in the LDIF file.
INFO_SPLIT_LDIF_PROGRESS=Processed {0,number,0} entries
ERR_SPLIT_LDIF_CANNOT_OPEN_OUTPUT_FILE=An error occurred while attempting to \
  open output file ''{0}'' for writing:  {1}
ERR_SPLIT_LDIF_ERROR_WRITING_ERROR_TO_FILE=An error occurred while attempting \
  to write information about error ''{0}'' to output file ''{1}'':  {2}
ERR_SPLIT_LDIF_ERROR_WRITING_TO_FILE=An error occurred while attempting to \
  write entry ''{0}'' to output file ''{1}'':  {2}
INFO_SPLIT_LDIF_PROCESSING_COMPLETE=Processing complete.  Read {0,number,0} \
  entries.
INFO_SPLIT_LDIF_EXCLUDED_COUNT=Excluded {0,number,0} entries that were not \
  within the split base DN.
INFO_SPLIT_LDIF_COUNT_TO_FILE=Wrote {0,number,0} entries to file {1}.
ERR_SPLIT_LDIF_ERROR_CLOSING_FILE=An error was encountered while attempting \
  to close output file ''{0}'':  {1}.  The file may be incomplete.
ERR_SPLIT_LDIF_NO_SCHEMA_FILES=The {0} argument was provided, but no schema \
  files were found in the specified path(s).
ERR_SPLIT_LDIF_ERROR_LOADING_SCHEMA=An error occurred while attempting to \
  read schema information from the specified schema path(s):  {0}
ERR_SPLIT_LDIF_TRANSLATOR_CANNOT_GET_MD5=Unable to obtain an MD5 message \
  digest generator:  {0}
ERR_SPLIT_LDIF_RDN_HASH_TRANSLATOR_CANNOT_PARSE_DN=Unable to parse the entry \
  DN:  {0}
ERR_SPLIT_LDIF_ATTR_HASH_TRANSLATOR_CANNOT_PARSE_DN=Unable to parse the \
  entry DN:  {0}
ERR_SPLIT_LDIF_ATTR_HASH_TRANSLATOR_NON_FLAT_DIT=Unable to determine which \
  set should hold an entry more than one level below split base DN ''{0}'' \
  because the tool was configured to assume a flat DIT and therefore is not \
  maintaining the cache needed to ensure that a subordinate entry is placed \
  in the same set as its parent.
ERR_SPLIT_LDIF_FEWEST_ENTRIES_TRANSLATOR_CANNOT_PARSE_DN=Unable to parse the \
  entry DN:  {0}
ERR_SPLIT_LDIF_FEWEST_ENTRIES_TRANSLATOR_NON_FLAT_DIT=Unable to determine \
  which set should hold an entry more than one level below split base DN \
  ''{0}'' because the tool was configured to assume a flat DIT and therefore \
  is not maintaining the cache needed to ensure that a subordinate entry is \
  placed in the same set as its parent.
ERR_SPLIT_LDIF_FILTER_TRANSLATOR_CANNOT_PARSE_DN=Unable to parse the entry \
  DN:  {0}
ERR_SPLIT_LDIF_FILTER_TRANSLATOR_NON_FLAT_DIT=Unable to determine which \
  set should hold an entry more than one level below split base DN ''{0}'' \
  because the tool was configured to assume a flat DIT and therefore is not \
  maintaining the cache needed to ensure that a subordinate entry is placed \
  in the same set as its parent.





© 2015 - 2024 Weber Informatics LLC | Privacy Policy