All Downloads are FREE. Search and download functionalities are using the official Maven repository.

messages.saml.messages.properties Maven / Gradle / Ivy

There is a newer version: 4.0.5
Show newest version
WebSAMLRetrievalFactory.desc=Retrieves SAML2 assertions from a remote SAML IdP.
WebSAMLRetrieval.selectIdp=Select your home identity service:
WebSAMLRetrieval.selectedIdp=Log in with identity service {0}
WebSAMLRetrieval.authnFailedError=External authentication failed.
WebSAMLRetrieval.authnFailedDetailInfo=Information for IT personnel:
{0} WebSAMLRetrieval.configurationError=This SAML authentication is not configured correctly. SamlIdPWebUI.rememberSettings=Remember my decision and do not ask again SamlIdPWebUI.allowForSignInInfo=\u25CF Signing in SamlIdPWebUI.allowForReadingUserProfile=\u25CF Read access to your user profile SAMLPreferences.label=SAML Authentication SAMLPreferences.spSettings=Relying service provider (SP) SAMLPreferences.autoConfirm=Auto confirm web authentication: SAMLPreferences.defaultIdentity=Identity to be used: SAMLPreferences.hiddenAttributes=Hidden attributes: SAMLPreferences.accept=Yes, ACCEPT SAMLPreferences.decline=Yes, DECLINE SAMLPreferences.editAction=Edit SAMLPreferences.deleteAction=Delete SAMLPreferences.addAction=Add SAMLPreferences.SPprompt=Enter a new service provider ID or choose an existing one or left empty to define default SAMLPreferences.SPdesc=Enter a new service provider ID or choose an existing one or left empty to define default settings SAMLPreferences.SP=Service provider: SAMLPreferences.defaultSP=Default settings SAMLPreferences.decision=Action: SAMLPreferences.autoAccept=Accept automatically SAMLPreferences.autoDeny=Deny automatically SAMLPreferences.noAuto=Show confirmation page (web authentication only) SAMLPreferences.identity=Selected identity: SAMLPreferences.hidden=Hidden attributes: SAMLPreferences.deleteAction=Remove SAMLPreferences.addAction=Add SAMLPreferences.selectAttribute=Select attribute type SAMLPreferences.spDialogCaption=Service provider settings SAMLPreferences.errorLoadindSystemInfo=Error loading system information SAMLPreferences.allSelected=All available attributes are already selected SAMLAuthenticatorEditor.defaultName=saml SAMLAuthenticatorEditor.requesterId=Our SAML entity ID: SAMLAuthenticatorEditor.credential=Credential: SAMLAuthenticatorEditor.additionalCredential=Additional credential: SAMLAuthenticatorEditor.additionalCredentialDesc=This credential can be used for decryption but won''t be used for signing of requests (if configured elsewhere). Useful for certificate rollover, where a credential with a new certificate is configured in here for the time of metadata propagation to IdPs. SAMLAuthenticatorEditor.includeAddtionalCredentialInMetadata=Include additional credential in metadata SAMLAuthenticatorEditor.acceptedNameFormats=Accepted name formats: SAMLAuthenticatorEditor.requireSignedAssertion=Require signed assertion SAMLAuthenticatorEditor.defSignRequest=Sign requests by default SAMLAuthenticatorEditor.defaultRequestedNameFormat=Default requested name format: SAMLAuthenticatorEditor.registrationForm=Registration form: SAMLAuthenticatorEditor.defAccountAssociation=Enable account association by default SAMLAuthenticatorEditor.trustedFederations=Trusted Federations SAMLAuthenticatorEditor.individualTrustedIdPs=Individual trusted IdPs SAMLAuthenticatorEditor.metadataPublishing=SAML metadata publishing SAMLAuthenticatorEditor.publishMetadata=Publish metadata SAMLAuthenticatorEditor.metadataPath=Published metadata path suffix: SAMLAuthenticatorEditor.signMetadata=Sign metadata SAMLAuthenticatorEditor.autoGenerateMetadata=Automatically generate metadata SAMLAuthenticatorEditor.metadataFile=SP metadata: SAMLAuthenticatorEditor.invalidMetadataFile=Invalid metadata file SAMLAuthenticatorEditor.spMetaEmpty=SP metadata can not be empty SAMLAuthenticatorEditor.metadataUrl=Metadata URL: SAMLAuthenticatorEditor.singleLogout=Single logout (SLO) SAMLAuthenticatorEditor.sloPath=SLO path suffix: SAMLAuthenticatorEditor.sloRealm=SLO realm: SAMLAuthenticatorEditor.sloMappings=SLO identity mapping: SAMLAuthenticatorEditor.sloMappings.unityId=Unity Identity SAMLAuthenticatorEditor.sloMappings.samlId=SAML Identity TrustedFederationComponent.name=Name EditTrustedFederationSubView.trustedFederation=Trusted federation EditTrustedFederationSubView.newTrustedFederation=New trusted federation EditTrustedFederationSubView.name=Name: EditTrustedFederationSubView.url=Metadata URL: EditTrustedFederationSubView.excludedIdps=Exclude IdPs: EditTrustedFederationSubView.httpsTruststore=Truststore for metadata downloads: EditTrustedFederationSubView.ignoreSignatureVerification=Ignore metadata signature checking (insecure) EditTrustedFederationSubView.signatureVerificationCertificate=Metadata verification certificate: EditTrustedFederationSubView.refreshInterval=Metadata refresh interval(s): EditTrustedFederationSubView.registrationForm=Registration form EditTrustedFederationSubView.nameExists=Trusted Federation with this name already exists EditTrustedFederationSubView.invalidConfiguration=Invalid trusted federation configuration. EditTrustedFederationSubView.serviceProviders=Federations''s Service Providers EditTrustedFederationSubView.fetch=Fetch EditTrustedFederationSubView.logo=Logo EditTrustedFederationSubView.name=Name EditTrustedFederationSubView.entityIdentifier=Entity Identifier EditTrustedFederationSubView.federationIdpsFilter=Federation IdPs filter: EditTrustedFederationSubView.federationIdpsFilterTitle=Federation IdPs filter EditTrustedFederationSubView.federationIdpsFilterDesc=If a filter is configured then all federation IdPs will be tested against it. Filter expression can use IdP attributes, as obtained from federation metadata, to decide whether to include it or not. If expression returns true the IdP will be trusted, and otherwise will be excluded. FederationIdpsFilterMVELContextKey.entityID=SAML entity id FederationIdpsFilterMVELContextKey.attributes=Map indexed by attribute names as obtained from EntityAttributes element from metadata. IndividualTrustedIdpComponent.name=Name EditIndividualTrustedIdpSubView.trustedIdp=Trusted IdP EditIndividualTrustedIdpSubView.newTrustedIdp=New trusted IdP EditIndividualTrustedIdpSubView.singleLogout=Single Logout EditIndividualTrustedIdpSubView.name=Name: EditIndividualTrustedIdpSubView.displayedName=Displayed name: EditIndividualTrustedIdpSubView.logo=Logo: EditIndividualTrustedIdpSubView.id=IdP entity identifier: EditIndividualTrustedSPSubView.X500NameUse=SP uses X.500 name as its identifier EditIndividualTrustedSPSubView.invalidX500Name=Invalid X.500 identifier EditIndividualTrustedIdpSubView.address=IdP address: EditIndividualTrustedIdpSubView.signRequest=Sign requests EditIndividualTrustedIdpSubView.signRequestValidationError=Sign request is unsupported for HTTP Redirect binding or SOAP binding EditIndividualTrustedIdpSubView.requestedNameFormats=Requested name formats: EditIndividualTrustedIdpSubView.binding=Binding: EditIndividualTrustedIdpSubView.certificates= IdP certificates: EditIndividualTrustedIdpSubView.groupMembershipAttribute=SAML group membership attribute: EditIndividualTrustedIdpSubView.registrationForm=Registration form: EditIndividualTrustedIdpSubView.accountAssociation=Account association EditIndividualTrustedIdpSubView.postLogoutEndpoint=POST binding logout endpoint: EditIndividualTrustedIdpSubView.postLogoutResponseEndpoint=POST binding response logout endpoint: EditIndividualTrustedIdpSubView.redirectLogoutEndpoint=Redirect binding logout endpoint: EditIndividualTrustedIdpSubView.redirectLogoutResponseEndpoint=Redirect binding logout response endpoint: EditIndividualTrustedIdpSubView.soapLogoutEndpoint=SOAP binding logout endpoint: EditIndividualTrustedIdpSubView.nameExists=Trusted IdP with this name already exists EditIndividualTrustedIdpSubView.invalidConfiguration=Invalid trusted IdP configuration. Verificator.saml2=SAML 2 SAMLEditorGeneralTab.advanced=Advanced configuration SAMLEditorGeneralTab.metadata=Metadata SAMLEditorGeneralTab.idenityTypeMapping=Identity Type mapping SAMLEditorGeneralTab.importantURLs=Important URLs: SAMLEditorGeneralTab.userAuthnEndpointPath=User AuthN Endpoint SAMLEditorGeneralTab.metadataEndpointPath=Metadata Endpoint SAMLEditorGeneralTab.singleLogoutUserPath=Single Logout user SAMLEditorGeneralTab.singleLogoutPath=Single Logout SAMLEditorGeneralTab.metadataLink=SAML metadata: SAMLEditorGeneralTab.metadataOff=Metadata publishing is turned off SAMLEditorGeneralTab.contextPath=Context Path: SAMLEditorGeneralTab.issuerURI=Issuer URI: SAMLEditorGeneralTab.signAssertionPolicy=Sign Assertions: SAMLEditorGeneralTab.signResponcePolicy=Sign Responses: SAMLEditorGeneralTab.httpsTruststore=Truststore to verify issuer signature: SAMLEditorGeneralTab.signResponseCredential=Signing response credential: SAMLEditorGeneralTab.additionallyAdvertisedCredential=Additionally advertised credential: SAMLEditorGeneralTab.additionallyAdvertisedCredentialDesc=This credential will be placed in generated metadata but won\u2019t be used for signing. Useful for certificate rollover, where a credential with a new certificate is configured in here for the time of metadata propagation to SPs. SAMLEditorGeneralTab.skipConsentScreen=Skip Consent screen SAMLEditorGeneralTab.editableConsentScreen=User editable consent screen SAMLEditorGeneralTab.acceptPolicy=Accept policy: SAMLEditorGeneralTab.metadataPublishing=SAML metadata publishing SAMLEditorGeneralTab.publishMetadata=Publish metadata SAMLEditorGeneralTab.signMetadata=Sign metadata SAMLEditorGeneralTab.autoGenerateMetadata=Automatically generate metadata SAMLEditorGeneralTab.metadataFile=IdP metadata: SAMLEditorGeneralTab.invalidMetadataFile=Invalid metadata file SAMLEditorGeneralTab.idpMetaEmpty=IdP metadata can not be empty SAMLEditorGeneralTab.authenticationTimeout=Max time to complete authentication: SAMLEditorGeneralTab.requestValidity=Accept requests not older than (s): SAMLEditorGeneralTab.attributeAssertionValidity=Default attribute assertion validity (s): SAMLEditorGeneralTab.returnSingleAssertion=Return single authN+attr assertion SAMLEditorGeneralTab.idMappings.unityId=Unity Identity SAMLEditorGeneralTab.idMappings.samlId=SAML Identity SAMLEditorClientsTab.trustedFederations=Trusted federations SAMLEditorClientsTab.trustedFederations.button=Add new federation SAMLEditorClientsTab.individualTrustedSps=Individual Service Providers SAMLEditorClientsTab.individualTrustedSps.button=Add new Service Provider SAMLEditorGeneralTab.setNotBefore=Set notBefore constraint IndividualTrustedSPComponent.name=Name EditIndividualTrustedSPSubView.authorizedURIs=Authorized redirect URIs: EditIndividualTrustedSPSubView.encryptAssertions=Encrypt assertions to this SP EditIndividualTrustedSPSubView.trustedSP=Trusted SP EditIndividualTrustedSPSubView.newTrustedSP=New trusted SP EditIndividualTrustedSPSubView.singleLogout=Single Logout EditIndividualTrustedSPSubView.name=Name: EditIndividualTrustedSPSubView.displayedName=Displayed name: EditIndividualTrustedSPSubView.logo=Logo: EditIndividualTrustedSPSubView.id=SP entity identifier: EditIndividualTrustedSPSubView.certificates=SP certificates: EditIndividualTrustedSPSubView.postLogoutEndpoint=POST logout endpoint: EditIndividualTrustedSPSubView.postLogoutResponseEndpoint=POST response logout endpoint: EditIndividualTrustedSPSubView.redirectLogoutEndpoint=Redirect logout endpoint: EditIndividualTrustedSPSubView.redirectLogoutResponseEndpoint=Redirect logout response endpoint: EditIndividualTrustedSPSubView.soapLogoutEndpoint=SOAP logout endpoint: EditIndividualTrustedSPSubView.nameExists=Trusted SP with this name already exists EditIndividualTrustedSPSubView.invalidConfiguration=Invalid trusted SP configuration. SAMLUsersEditorTab.groupMapping=Advanced group mapping SAMLUsersEditorTab.group=Group SamlMessageAreaProvider.displayedName=Saml




© 2015 - 2025 Weber Informatics LLC | Privacy Policy