All Downloads are FREE. Search and download functionalities are using the official Maven repository.

ityplatform.openam.openam-auth-cert.15.1.0.source-code.amAuthCert.properties Maven / Gradle / Ivy

The newest version!
#
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
#
# Copyright (c) 2007 Sun Microsystems Inc. All Rights Reserved
#
# The contents of this file are subject to the terms
# of the Common Development and Distribution License
# (the License). You may not use this file except in
# compliance with the License.
#
# You can obtain a copy of the License at
# https://opensso.dev.java.net/public/CDDLv1.0.html or
# opensso/legal/CDDLv1.0.txt
# See the License for the specific language governing
# permission and limitations under the License.
#
# When distributing Covered Code, include this CDDL
# Header Notice in each file and include the License file
# at opensso/legal/CDDLv1.0.txt.
# If applicable, add the following below the CDDL Header,
# with the fields enclosed by brackets [] replaced by
# your own identifying information:
# "Portions Copyrighted [year] [name of copyright owner]"
#
# $Id: amAuthCert.properties,v 1.4 2009/12/11 01:43:23 goodearth Exp $
#
#

# Portions Copyrighted 2011-2016 ForgeRock AS

onlinehelp.doc=certauth.html
authentication=Authentication Modules

CERTex=Unknown Certificate Authority.
CertNoContext=Unable to set up LDAP context.
CertExpired=Certificate Has Expired.
CertVerifyFailed=Could not verify certificate.
CertNoReg=Error locating registered certificate.
CertRevoked=Certificate has been revoked.
iCertNotValidYet=Certificate is not yet valid.
CertIsNotValid=Certificate is not valid.
iplanet-am-auth-cert-service-description=Certificate
a101=Match Certificate in LDAP
a101.help=The client certificate must exist in the directory for the authentication to be successful.
a1011=Subject DN Attribute Used to Search LDAP for Certificates
a1011.help=This is the attribute used to search the directory for the certificate
a1011.help.txt=The Certificate module will search the directory for the certificate using the search filter based on this attribute \
and the value of the Subject DN taken from the certificate.
a102=Match Certificate to CRL
a102.help=The Client Certificate will be checked against the Certificate Revocation list held in the directory
a102.help.txt=A Certificate Revocation List can be provisioned into the directory. Having this option enabled will cause all client \
certificates to be checked against this list.
a102.help.uri=#tbd
a1023=Match CA Certificate to CRL
a1023.help=The CA certificate that issued the client certificate will also be checked against the CRL.
a1024=Cache CRLs in memory
a1024.help=The CRLs will be cached in memory
a1025=Update CA CRLs from CRLDistributionPoint
a1025.help=Fetch new CA CRLs from CRLDistributionPoint and update it in Directory Server
a1025.help.txt=If the CA certificate includes an IssuingDistributionPoint or has an CRLDistributionPoint extension set \
OpenAM tries to update the CRLs if neeed (i.e. CRL is out-of-date). 
This property controls if the update should be performed.
\ This property is only used if CA CRL checking is enabled. a1021=Issuer DN Attribute(s) Used to Search LDAP for CRLs a1021.help=This is the name of the attribute taken from the CA certificate that will be used to search the CRL. a1021.help.txt=If only one attribute name is specified, the ldap searchfilter will be (attrName=Value_of_the_corresponding_Attribute_from_SubjectDN)
\ e.g. SubjectDN of issuer cert 'C=US, CN=Some CA, serialNumber=123456',attribute name specified is 'CN', searchfilter used will be (CN=Some CA)

\ If serveral attribute names are specified, they have to separated by ,. The resulting ldap searchfilter value will \ be a comma separated list of name attribute values, the search attribute will be cn
\ e.g. SubjectDN of issuer cert 'C=US, CN=Some CA, serialNumber=123456',attribute names specified are 'CN,serialNumber', searchfilter used will be \ cn=CN=Some CA,serialNumber=123456
\ The order of the values of the attribute names matter as they must match the value of the cn attribute of a crlDistributionPoint entry in the directory server. a1022=HTTP Parameters for CRL Update a1022.help=These parameters will be included in any HTTP CRL call to the Certificate Authority a1022.help.txt=If the Client or CA certificate contains the Issuing Distribution Point Extension then OpenAM will use this information \ to retrieve the CRL from the distribution point. This property allow custom HTTP parameters to be included in the CRL request.

\ The format of the parameter is as follows:

\ param1=value1,param2=value a103=OCSP Validation a103.help=Enable Online Certificate Status Protocol validation for OCSP aware certificates a103.help.txt=If the certificate contains OCSP validation information then OpenAM will use this information to check the validity \ of the certificate as part of the authentication process.

\ NB The OpenAM server must have Internet connectivity for OCSP to work a104=LDAP Server Where Certificates are Stored a104.help=Use this list to set the LDAP server used to search for certificates. a104.help.txt=The Certificate authentication module will use this list for the LDAP server used to search for certificates. A single entry \ must be in the format:

ldap_server:port

Multiple entries allow associations between OpenAM servers and a \ LDAP server. The format is:

local server name | server:port

\ The local server name is the full name of the server from the list of servers and sites. a105=LDAP Search Start or Base DN a105.help=The start point in the LDAP server for the certificate search a105.help.txt=When entering multiple entries, each entry must be prefixed with a local server name. Multiple entries allow different \ search Base DNs depending on the OpenAM server in use. The format is:

local server name | base dn

\ The local server name is the full name of the server from the list of servers and sites. # unused a106=LDAP Access Authentication Type a107=LDAP Server Authentication User a107.help=DN of the user used by the module to authenticate to the LDAP server a107.help.txt=The Certificate module authenticates to the LDAP server in order to search for a matching certificate. The DN entered here \ represents the account used for said authentication and must have read/search access to the LDAP server. a108=LDAP Server Authentication Password a108.help=The password for the authentication user # unused a109=LDAP Attribute for Profile ID # unused a109.help=Enter any valid attribute in a user entry (CN, SN) that can be used as the user ID. a110=Use SSL/TLS for LDAP Access a110.help=The certificate module will use SSL/TLS to access the LDAP server a111=Certificate Field Used to Access User Profile a111.help=The certificate module needs to read a value from the client certificate that can be used to search the LDAP server for a \ matching certificate. a1111=Other Certificate Field Used to Access User Profile a1111.help=This field is only used if the Certificate Field Used to Access User Profile attribute is set to other. This \ field allows a custom certificate field to be used as the basis of the user search. a1112=SubjectAltNameExt Value Type to Access User Profile a1112.help=Use the Subject Alternative Name Field in preference to one of the standard certificate fields. a1112.help.txt=Selecting RFC822Name or UPN will cause this field to have have precedence over the Certificate Field Used to Access \ User Profile or Other Certificate Field Used to Access User Profile attribute.

\ NB The client certificate must contain the Subject Alternate Name Extension for this function to operate. a500=Authentication Level a500.help=The authentication level associated with this module. a500.help.txt=Each authentication module has an authentication level that can be used to indicate the level of security \ associated with the module; 0 is the lowest (and the default). a113=Trusted Remote Hosts a113.help=A list of IP addresses trusted to supply client certificates. a113.help.txt=If SSL/TLS is being terminated at a load balancer or at the Distributed Authentication server then this option can be used \ to ensure that only specified trusted hosts (identified by IP address) are allowed to supply client certificates to the certificate \ module,

Valid values for this list are as follows:
  • none
  • any
  • multiple IP addresses


\ The default value of none disables this functionality a115=HTTP Header Name for Client Certificate a115.help=The name of the HTTP request header containing the certificate, only used when Trusted Remote Hosts mode is enabled. a1151=Use only Certificate from HTTP request header a1151.help=Strictly use client cert from HTTP header over cert from HTTPS connection/servlet attribute amAuthCert-eeh-debug-desc=Turn on debugging. amAuthCert-ff-aliases-desc=Certificate User Aliases amAuthCert-debug.on=On amAuthCert-debug.off=Off amAuthCert-debug.log=Log Messages emailAddr=emailAddr emailAddrTag=email address noCert=User certificate not found jssSockFactoryFail=Failed to create LDAP connection with JSS NoCallbackHandler=No callback handler available certificate=Certificate wrongLDAPServer=LDAP server and port number are misconfigured. wrongStartDN=LDAP Start Search DN misconfigured. noLDAPAttr=No value provided for attribute name to search LDAP. noCRLAttr=No value provided for attribute name to search CRL. noOtherAttr=No value provided for other field to access user profile. noURLCertAuth=URL certificate authentication not enabled. choiceNone=none choiceSimple=simple choiceCRAM-MD5=CRAM-MD5 choiceIssuerDN=issuer DN choiceIssuerCN=issuer CN choiceIssuer0=issuer O choiceSerialNumber=serial number choiceSubjectDN=subject DN choiceSubjectCN=subject CN choiceSubjectUID=subject UID choiceSubject0=subject O choiceEmail=email address choiceOther=other choiceRFC822Name=RFC822Name choiceUPN=UPN




© 2015 - 2024 Weber Informatics LLC | Privacy Policy