
messages.saml.messages.properties Maven / Gradle / Ivy
WebSAMLRetrievalFactory.desc=Retrieves SAML2 assertions from a remote SAML IdP.
WebSAMLRetrieval.selectIdp=Select your home identity service:
WebSAMLRetrieval.selectedIdp=Log in with identity service {0}
WebSAMLRetrieval.authnFailedError=External authentication failed.
WebSAMLRetrieval.authnFailedDetailInfo=Information for IT personnel:
{0}
WebSAMLRetrieval.configurationError=This SAML authentication is not configured correctly.
SamlIdPWebUI.rememberSettings=Remember my decision and do not ask again
SamlIdPWebUI.allowForSignInInfo=\u25CF Signing in
SamlIdPWebUI.allowForReadingUserProfile=\u25CF Read access to your user profile
SAMLPreferences.label=SAML Authentication
SAMLPreferences.spSettings=Relying service provider (SP)
SAMLPreferences.autoConfirm=Auto confirm web authentication:
SAMLPreferences.defaultIdentity=Identity to be used:
SAMLPreferences.hiddenAttributes=Hidden attributes:
SAMLPreferences.accept=Yes, ACCEPT
SAMLPreferences.decline=Yes, DECLINE
SAMLPreferences.editAction=Edit
SAMLPreferences.deleteAction=Delete
SAMLPreferences.addAction=Add
SAMLPreferences.SPprompt=Enter a new service provider ID or choose an existing one or left empty to define default
SAMLPreferences.SPdesc=Enter a new service provider ID or choose an existing one or left empty to define default settings
SAMLPreferences.SP=Service provider:
SAMLPreferences.defaultSP=Default settings
SAMLPreferences.decision=Action:
SAMLPreferences.autoAccept=Accept automatically
SAMLPreferences.autoDeny=Deny automatically
SAMLPreferences.noAuto=Show confirmation page (web authentication only)
SAMLPreferences.identity=Selected identity:
SAMLPreferences.hidden=Hidden attributes:
SAMLPreferences.deleteAction=Remove
SAMLPreferences.addAction=Add
SAMLPreferences.selectAttribute=Select attribute type
SAMLPreferences.spDialogCaption=Service provider settings
SAMLPreferences.errorLoadindSystemInfo=Error loading system information
SAMLPreferences.allSelected=All available attributes are already selected
SAMLAuthenticatorEditor.defaultName=saml
SAMLAuthenticatorEditor.requesterId=Our SAML entity ID:
SAMLAuthenticatorEditor.credential=Credential:
SAMLAuthenticatorEditor.additionalCredential=Additional credential:
SAMLAuthenticatorEditor.additionalCredentialDesc=This credential can be used for decryption but won''t be used for signing of requests (if configured elsewhere). Useful for certificate rollover, where a credential with a new certificate is configured in here for the time of metadata propagation to IdPs.
SAMLAuthenticatorEditor.includeAddtionalCredentialInMetadata=Include additional credential in metadata
SAMLAuthenticatorEditor.acceptedNameFormats=Accepted name formats:
SAMLAuthenticatorEditor.requireSignedAssertion=Require signed assertion
SAMLAuthenticatorEditor.defSignRequest=Sign requests by default
SAMLAuthenticatorEditor.defaultRequestedNameFormat=Default requested name format:
SAMLAuthenticatorEditor.registrationForm=Registration form:
SAMLAuthenticatorEditor.defAccountAssociation=Enable account association by default
SAMLAuthenticatorEditor.trustedFederations=Trusted Federations
SAMLAuthenticatorEditor.individualTrustedIdPs=Individual trusted IdPs
SAMLAuthenticatorEditor.metadataPublishing=SAML metadata publishing
SAMLAuthenticatorEditor.publishMetadata=Publish metadata
SAMLAuthenticatorEditor.metadataPath=Published metadata path suffix:
SAMLAuthenticatorEditor.signMetadata=Sign metadata
SAMLAuthenticatorEditor.autoGenerateMetadata=Automatically generate metadata
SAMLAuthenticatorEditor.metadataFile=SP metadata:
SAMLAuthenticatorEditor.invalidMetadataFile=Invalid metadata file
SAMLAuthenticatorEditor.spMetaEmpty=SP metadata can not be empty
SAMLAuthenticatorEditor.metadataUrl=Metadata URL:
SAMLAuthenticatorEditor.singleLogout=Single logout (SLO)
SAMLAuthenticatorEditor.sloPath=SLO path suffix:
SAMLAuthenticatorEditor.sloRealm=SLO realm:
SAMLAuthenticatorEditor.sloMappings=SLO identity mapping:
SAMLAuthenticatorEditor.sloMappings.unityId=Unity Identity
SAMLAuthenticatorEditor.sloMappings.samlId=SAML Identity
TrustedFederationComponent.name=Name
EditTrustedFederationSubView.trustedFederation=Trusted federation
EditTrustedFederationSubView.newTrustedFederation=New trusted federation
EditTrustedFederationSubView.name=Name:
EditTrustedFederationSubView.url=Metadata URL:
EditTrustedFederationSubView.excludedIdps=Exclude IdPs:
EditTrustedFederationSubView.httpsTruststore=Truststore for metadata downloads:
EditTrustedFederationSubView.ignoreSignatureVerification=Ignore metadata signature checking (insecure)
EditTrustedFederationSubView.signatureVerificationCertificate=Metadata verification certificate:
EditTrustedFederationSubView.refreshInterval=Metadata refresh interval(s):
EditTrustedFederationSubView.registrationForm=Registration form
EditTrustedFederationSubView.nameExists=Trusted Federation with this name already exists
EditTrustedFederationSubView.invalidConfiguration=Invalid trusted federation configuration.
EditTrustedFederationSubView.serviceProviders=Federations''s Service Providers
EditTrustedFederationSubView.fetch=Fetch
EditTrustedFederationSubView.logo=Logo
EditTrustedFederationSubView.name=Name
EditTrustedFederationSubView.entityIdentifier=Entity Identifier
EditTrustedFederationSubView.federationIdpsFilter=Federation IdPs filter:
EditTrustedFederationSubView.federationIdpsFilterTitle=Federation IdPs filter
EditTrustedFederationSubView.federationIdpsFilterDesc=If a filter is configured then all federation IdPs will be tested against it. Filter expression can use IdP attributes, as obtained from federation metadata, to decide whether to include it or not. If expression returns true the IdP will be trusted, and otherwise will be excluded.
FederationIdpsFilterMVELContextKey.entityID=SAML entity id
FederationIdpsFilterMVELContextKey.attributes=Map indexed by attribute names as obtained from EntityAttributes element from metadata.
IndividualTrustedIdpComponent.name=Name
EditIndividualTrustedIdpSubView.trustedIdp=Trusted IdP
EditIndividualTrustedIdpSubView.newTrustedIdp=New trusted IdP
EditIndividualTrustedIdpSubView.singleLogout=Single Logout
EditIndividualTrustedIdpSubView.name=Name:
EditIndividualTrustedIdpSubView.displayedName=Displayed name:
EditIndividualTrustedIdpSubView.logo=Logo:
EditIndividualTrustedIdpSubView.id=IdP entity identifier:
EditIndividualTrustedSPSubView.X500NameUse=SP uses X.500 name as its identifier
EditIndividualTrustedSPSubView.invalidX500Name=Invalid X.500 identifier
EditIndividualTrustedIdpSubView.address=IdP address:
EditIndividualTrustedIdpSubView.signRequest=Sign requests
EditIndividualTrustedIdpSubView.signRequestValidationError=Sign request is unsupported for HTTP Redirect binding or SOAP binding
EditIndividualTrustedIdpSubView.requestedNameFormats=Requested name formats:
EditIndividualTrustedIdpSubView.binding=Binding:
EditIndividualTrustedIdpSubView.certificates= IdP certificates:
EditIndividualTrustedIdpSubView.groupMembershipAttribute=SAML group membership attribute:
EditIndividualTrustedIdpSubView.registrationForm=Registration form:
EditIndividualTrustedIdpSubView.accountAssociation=Account association
EditIndividualTrustedIdpSubView.postLogoutEndpoint=POST binding logout endpoint:
EditIndividualTrustedIdpSubView.postLogoutResponseEndpoint=POST binding response logout endpoint:
EditIndividualTrustedIdpSubView.redirectLogoutEndpoint=Redirect binding logout endpoint:
EditIndividualTrustedIdpSubView.redirectLogoutResponseEndpoint=Redirect binding logout response endpoint:
EditIndividualTrustedIdpSubView.soapLogoutEndpoint=SOAP binding logout endpoint:
EditIndividualTrustedIdpSubView.nameExists=Trusted IdP with this name already exists
EditIndividualTrustedIdpSubView.invalidConfiguration=Invalid trusted IdP configuration.
Verificator.saml2=SAML 2
SAMLEditorGeneralTab.advanced=Advanced configuration
SAMLEditorGeneralTab.metadata=Metadata
SAMLEditorGeneralTab.idenityTypeMapping=Identity Type mapping
SAMLEditorGeneralTab.importantURLs=Important URLs:
SAMLEditorGeneralTab.userAuthnEndpointPath=User AuthN Endpoint
SAMLEditorGeneralTab.metadataEndpointPath=Metadata Endpoint
SAMLEditorGeneralTab.singleLogoutUserPath=Single Logout user
SAMLEditorGeneralTab.singleLogoutPath=Single Logout
SAMLEditorGeneralTab.metadataLink=SAML metadata:
SAMLEditorGeneralTab.metadataOff=Metadata publishing is turned off
SAMLEditorGeneralTab.contextPath=Context Path:
SAMLEditorGeneralTab.issuerURI=Issuer URI:
SAMLEditorGeneralTab.signAssertionPolicy=Sign Assertions:
SAMLEditorGeneralTab.signResponcePolicy=Sign Responses:
SAMLEditorGeneralTab.httpsTruststore=Truststore to verify issuer signature:
SAMLEditorGeneralTab.signResponseCredential=Signing response credential:
SAMLEditorGeneralTab.additionallyAdvertisedCredential=Additionally advertised credential:
SAMLEditorGeneralTab.additionallyAdvertisedCredentialDesc=This credential will be placed in generated metadata but won\u2019t be used for signing. Useful for certificate rollover, where a credential with a new certificate is configured in here for the time of metadata propagation to SPs.
SAMLEditorGeneralTab.skipConsentScreen=Skip Consent screen
SAMLEditorGeneralTab.editableConsentScreen=User editable consent screen
SAMLEditorGeneralTab.acceptPolicy=Accept policy:
SAMLEditorGeneralTab.metadataPublishing=SAML metadata publishing
SAMLEditorGeneralTab.publishMetadata=Publish metadata
SAMLEditorGeneralTab.signMetadata=Sign metadata
SAMLEditorGeneralTab.autoGenerateMetadata=Automatically generate metadata
SAMLEditorGeneralTab.metadataFile=IdP metadata:
SAMLEditorGeneralTab.invalidMetadataFile=Invalid metadata file
SAMLEditorGeneralTab.idpMetaEmpty=IdP metadata can not be empty
SAMLEditorGeneralTab.authenticationTimeout=Max time to complete authentication:
SAMLEditorGeneralTab.requestValidity=Accept requests not older than (s):
SAMLEditorGeneralTab.attributeAssertionValidity=Default attribute assertion validity (s):
SAMLEditorGeneralTab.returnSingleAssertion=Return single authN+attr assertion
SAMLEditorGeneralTab.idMappings.unityId=Unity Identity
SAMLEditorGeneralTab.idMappings.samlId=SAML Identity
SAMLEditorClientsTab.trustedFederations=Trusted federations
SAMLEditorClientsTab.trustedFederations.button=Add new federation
SAMLEditorClientsTab.individualTrustedSps=Individual Service Providers
SAMLEditorClientsTab.individualTrustedSps.button=Add new Service Provider
SAMLEditorGeneralTab.setNotBefore=Set notBefore constraint
IndividualTrustedSPComponent.name=Name
EditIndividualTrustedSPSubView.authorizedURIs=Authorized redirect URIs:
EditIndividualTrustedSPSubView.encryptAssertions=Encrypt assertions to this SP
EditIndividualTrustedSPSubView.trustedSP=Trusted SP
EditIndividualTrustedSPSubView.newTrustedSP=New trusted SP
EditIndividualTrustedSPSubView.singleLogout=Single Logout
EditIndividualTrustedSPSubView.name=Name:
EditIndividualTrustedSPSubView.displayedName=Displayed name:
EditIndividualTrustedSPSubView.logo=Logo:
EditIndividualTrustedSPSubView.id=SP entity identifier:
EditIndividualTrustedSPSubView.certificates=SP certificates:
EditIndividualTrustedSPSubView.postLogoutEndpoint=POST logout endpoint:
EditIndividualTrustedSPSubView.postLogoutResponseEndpoint=POST response logout endpoint:
EditIndividualTrustedSPSubView.redirectLogoutEndpoint=Redirect logout endpoint:
EditIndividualTrustedSPSubView.redirectLogoutResponseEndpoint=Redirect logout response endpoint:
EditIndividualTrustedSPSubView.soapLogoutEndpoint=SOAP logout endpoint:
EditIndividualTrustedSPSubView.nameExists=Trusted SP with this name already exists
EditIndividualTrustedSPSubView.invalidConfiguration=Invalid trusted SP configuration.
SAMLUsersEditorTab.groupMapping=Advanced group mapping
SAMLUsersEditorTab.group=Group
SamlMessageAreaProvider.displayedName=Saml
© 2015 - 2025 Weber Informatics LLC | Privacy Policy