Þ•üüQÜ N!pr#x#œ#À(ä! /4=NW^f ofyIà * 6A Q_q‘w 6E_bÂ(Çðù (x:;³+ï 1=Sg~†"žÁÞ ùdE’@Ø  % 2?EKT g¯  *8OT]o† œ ª¸ ÌÚ!î  & 3 @MRUX akszR˜ë òh°2 C €S ÄÔ Î™!Õh";>#"z#!#"¿##â#$ $ '$4$=$U$g$o$„$tŒ$ % %(%6H%%%[˜%ô%ü%&-&>&O&f&w&L{&È&ä&ÿ&'' 3'>'O'(g'0'0Á'1ò'$(,(.D()s([(_ù(+Y)6…)¼)#Ñ)õ)**.*A*V*t*5‹* Á*â*@÷**8+,c+ ++±+SÝ+V1,:ˆ,1Ã,6õ,.,-.[-*Š-%µ-(Û-*.C/.'s.-›./É.$ù.</5[/=‘/1Ï/:07<0-t0+¢0>Î0? 1)M1+w1£1*Ã1Mî1O<29Œ20Æ25÷2X-3-†3)´3$Þ3'4)+4BU4&˜4,¿4.ì4#54?5&t5%›5>Á5 61!6(S6;|6D¸63ý6)170[7)Œ7X¶7(8*880c8”8-¤8Ò8G`9F¨9ï9:D.:4s:¨:¼:Û:4ï:'$;†L;OÓ<#=%=+=+B=%n=4”=+É=õ=ú=>>>$>,> 5>¨?>fè> O?[?q?? ¡?Â?­É?,w@¤@½@Ä@}Ô@RAKYA ¥A³A ÉA&ÖAýA­B]¿BXCvC‘C(¥CÎCîC D'D5CD8yD8²D-ëDœE¶EgÉE[1FF F¶FÌFÒFsâFVGxlGåGìG ÿG H)H.H7HGH`HeH ƒHH §H³H!ÈH!êH II I%I ¦û‚Þaä<Ä ½^Õ³é ~Nã‰4£òƒÈ™fiÜn0pWe@¿èúŽÖ]ñ)”ÁC÷1}FÔó` áDAêç2j¤ "…ù8õâÎRÓ+®¶¡É: / between elements | selects | next screen*Authentication ConfigurationLocal Authentication OptionsOther Authentication OptionsSmart Card Authentication OptionsUser Account ConfigurationTip: Smart cards support logging into both local and centrally managed accounts.Tip: This is managed via /etc/security/access.conf.ADS Realm:Ad_min Servers:Admin Server:Advanced _OptionsAlertAll configuration files which were modified by the previous authentication configuration change will be restored from backup. Revert the changes?Allow offline _loginAut_hentication Method:AuthenticationAuthentication ConfigurationAuthentication module %s/pam_%s.so is missing. Authentication process might not work correctly.BackBad smart card removal action specified.Base DN:Cache InformationCancelCard Re_moval Action:Certificate _URL:Click this button if you did not download a CA certificate yet or you have not set the CA certificate up by other means.Control how the system verifies users who attempt to log inCreate _home directories on the first loginDo not configure _NTPDo_n't SaveDomain Administrator:Domain Controllers:Domain _administrator:Domain:Download CA CertificateEnable _fingerprint reader supportEnable _local access controlEnable _smart card supportError downloading CA certificateFingerprint authentication allows you to log in by scanning your finger with the fingerprint reader.Fingerprint readerHashing or crypto algorithm used for storing passwords of local usersHostname or ldap:// or ldaps:// URI pointing to the LDAP server.IPA R_ealm:IPA _Domain:IPA _Server:IPAv2IPAv2 SettingsIPAv2 domain join was not succesful. The ipa-client-install command failed.IPAv2 passwordIf the home directory of an user doesn't exist yet it will be created automatically on his first login.IgnoreJoin DomainJoin SettingsJoining Winbind DomainKDC:KerberosKerberos SettingsKerberos passwordLDAPLDAP Search _Base DN:LDAP SettingsLDAP _Server:LDAP authenticationLDAP passwordLocal accounts onlyLocal authorization is sufficientLockNISNIS SettingsNIS _Domain:NIS _Server:NIS passwordNextNoOkPasswordPassword:R_ealm:Realm:Require smart car_d for loginRestore the configuration files backed up before the previous configuration changeRevertSave SettingsSecurity Model:Server:Smart card authentication allows you to log in using a certificate and key associated with a smart card.Some of the configuration changes you've made should be saved to disk before continuing. If you do not save them, then your attempt to join the domain may fail. Save changes?Te_mplate Shell:Template Shell:The %s file was not found, but it is required for %s support to work properly. Install the %s package, which provides this file.To connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory. Then press OK.To verify the LDAP server with TLS protocol enabled you need a CA certificate which signed the server's certificate. Please fill in the URL where the CA certificate in the PEM format can be downloaded from.Unable to initialize graphical environment. Most likely cause of failure is that the tool was not run using a graphical environment. Please either start your graphical user interface or set your DISPLAY variable. Unknown password hashing algorithm specified, using sha256.Use DNS to _locate KDCs for realmsUse DNS to locate KDCs for realmsUse DNS to resolve hosts to realmsUse D_NS to resolve hosts to realmsUse Fingerprint readerUse IPAv2Use KerberosUse LDAPUse LDAP AuthenticationUse MD5 PasswordsUse NISUse Shadow PasswordsUse TLSUse Transport Layer Security extension for LDAP as defined by RFC-2830. It must not be ticked with ldaps server URI.Use WinbindUse Winbind AuthenticationUse _TLS to encrypt connectionsUse the "Join Domain" button to join the IPAv2 domain.User InformationWarningWhen enabled /etc/security/access.conf will be consulted for authorization of users access.WinbindWinbind ADS R_ealm:Winbind Domain Co_ntrollers:Winbind SettingsWinbind _Domain:Winbind authenticationWinbind passwordYesYou must provide ldaps:// server address or use TLS for LDAP authentication._Download CA Certificate..._Identity & Authentication_Join Domain..._KDCs:_Password Hashing Algorithm:_Password:_Security Model:_User Account Database:action to be taken on smart card removalauthenticate system accounts by local files onlyauthenticate system accounts by network servicesauthorize local users also through remote servicecachingcan only be run as rootcheck access.conf during account authorizationconfigures winbind to allow offline loginconfigures winbind to assume that users with no domain in their user names are domain usersconfigures winbind to assume that users with no domain in their user names are not domain usersconfigures winbind to prevent offline logincreate home directories for users on their first logindefault LDAP base DNdefault LDAP server hostname or URIdefault NIS domaindefault NIS serverdefault hesiod LHSdefault hesiod RHSdefault kerberos KDCdefault kerberos admin serverdefault kerberos realmdefault realm for samba and winbind when security=adsdefault smart card module to usedialog was cancelleddisable IPAv2 for user information and authentication by defaultdisable LDAP for authentication by defaultdisable LDAP for user information by defaultdisable MD5 passwords by defaultdisable NIS for user information by defaultdisable SSSD for authentication by default (still used for supported configurationsdisable SSSD for user information by default (still used for supported configurations)disable authentication with fingerprint readers by defaultdisable authentication with smart card by defaultdisable caching of user credentials in SSSD by defaultdisable caching of user information by defaultdisable hesiod for user information by defaultdisable kerberos authentication by defaultdisable shadowed passwords by defaultdisable use of DNS to find kerberos KDCsdisable use of DNS to find kerberos realmsdisable use of RFC-2307bis schema for LDAP user information lookupsdisable use of TLS with LDAP (RFC-2830)disable winbind for authentication by defaultdisable winbind for user information by defaultdisable wins for hostname resolutiondisplay Back instead of Cancel in the main dialog of the TUIdo not check access.conf during account authorizationdo not create home directories for users on their first logindo not display the deprecated text user interfacedo not prefer dns over wins or nis for hostname resolutiondo not require smart card for authentication by defaultdo not setup the NTP against the IPAv2 domaindo not start/stop portmap, ypbind, and nscddo not update the configuration files, only print new settingsenable IPAv2 for user information and authentication by defaultenable LDAP for authentication by defaultenable LDAP for user information by defaultenable MD5 passwords by defaultenable NIS for user information by defaultenable SSSD for authentication by default with manually managed configurationenable SSSD for user information by default with manually managed configurationenable authentication with fingerprint readers by defaultenable authentication with smart card by defaultenable caching of user credentials in SSSD by defaultenable caching of user information by default (automatically disabled when SSSD is used)enable hesiod for user information by defaultenable kerberos authentication by defaultenable shadowed passwords by defaultenable use of DNS to find kerberos KDCsenable use of DNS to find kerberos realmsenable use of RFC-2307bis schema for LDAP user information lookupsenable use of TLS with LDAP (RFC-2830)enable winbind for authentication by defaultenable winbind for user information by defaultenable wins for hostname resolutiongid range winbind will assign to domain or ads usershash/crypt algorithm for new passwordsjoin the IPAv2 domain as this accountjoin the winbind domain or ads realm now as this administratorload CA certificate from the URLlocal authorization is sufficient for local usersnames of servers to authenticate againstnever use SSSD implicitly even for supported configurationsopposite of --test, update configuration files with changed settingsprefer dns over wins or nis for hostname resolutionprobe network for defaults and print themrequire smart card for authentication by defaultrestore the backup of configuration filesrestore the backup of configuration files saved before the previous configuration changesave a backup of all configuration filessecurity mode to use for samba and winbindsetup the NTP against the IPAv2 domain (default)shadow passwordthe IPAv2 domain the system should be part ofthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabledthe directory which winbind-created users will have as home directoriesthe group which winbind-created users will have as their primary groupthe realm for the IPAv2 domainthe server for the IPAv2 domainthe shell which winbind-created users will have as their login shelluid range winbind will assign to domain or ads usersunexpected argumentupdate all configuration filesusage: %s [options]use SSSD implicitly if it supports the configurationworkgroup authentication servers are inProject-Id-Version: ja Report-Msgid-Bugs-To: POT-Creation-Date: 2012-05-02 17:32+0200 PO-Revision-Date: 2012-05-09 09:19-0400 Last-Translator: khashida Language-Team: Japanese MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Language: ja Plural-Forms: Plural-Forms: nplurals=1; plural=0; X-Generator: Zanata 1.5.0 / 項目間ã®ç§»å‹• | é¸æŠž | 次ã®ç”»é¢*èªè¨¼ã®è¨­å®šãƒ­ãƒ¼ã‚«ãƒ«èªè¨¼ã®ã‚ªãƒ—ション他ã®èªè¨¼ã®ã‚ªãƒ—ションスマートカードèªè¨¼ã®ã‚ªãƒ—ションユーザーアカウントã®èªè¨¼ãƒ’ント:スマートカードã¯ãƒ­ãƒ¼ã‚«ãƒ«ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã¨ä¸­å¤®ç®¡ç†ã®ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã®ä¸¡æ–¹ã®ãƒ­ã‚®ãƒ³ã‚°ã‚’ サãƒãƒ¼ãƒˆã—ã¾ã™ã€‚ヒント: ã“れ㯠/etc/security/access.conf を介ã—ã¦ç®¡ç†ã•れã¾ã™ã€‚ADS レルム(Realm):管ç†ã‚µãƒ¼ãƒãƒ¼ï¼ˆ_M):管ç†ã‚µãƒ¼ãƒãƒ¼:高度ãªã‚ªãƒ—ション(_O)忠告å‰å›žã®èªè¨¼è¨­å®šå¤‰æ›´ã«ã‚ˆã‚Šä¿®æ­£ã•れãŸå…¨ã¦ã®è¨­å®šãƒ•ァイルã¯ãƒãƒƒã‚¯ã‚¢ãƒƒãƒ—ã‹ã‚‰ 以å‰ã®è¨­å®šã«å¾©å…ƒã§ãã¾ã™ã€‚変更を戻ã—ã¾ã™ã‹ ?オフラインログインを許å¯ï¼ˆ_L)èªè¨¼ã®æ–¹æ³•(_H):èªè¨¼èªè¨¼ã®è¨­å®šèªè¨¼ãƒ¢ã‚¸ãƒ¥ãƒ¼ãƒ« %s/pam_%s.so ãŒã‚りã¾ã›ã‚“。èªè¨¼ãƒ—ãƒ­ã‚»ã‚¹ãŒæ­£å¸¸ã«å‹•作ã—ãªã„ã‹ã‚‚知れã¾ã›ã‚“ã€‚æˆ»ã‚‹ä¸æ­£ãªã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰å–り出ã—å‹•ä½œãŒæŒ‡å®šã•れã¾ã—ãŸã€‚ベース DN:キャッシュ情報å–り消ã—カード削除ã®ã‚¢ã‚¯ã‚·ãƒ§ãƒ³(_M):証明書 URL (_U):CA 証明書をã¾ã ãƒ€ã‚¦ãƒ³ãƒ­ãƒ¼ãƒ‰ã—ã¦ã„ãªã„å ´åˆã‚„ã€ä»–ã®æ–¹æ³•ã§ CA 証明書を 設定ã—ã¦ã„ãªã„å ´åˆã¯ã€ã“ã®ãƒœã‚¿ãƒ³ã‚’クリックã—ã¾ã™ã€‚ログインã—よã†ã¨ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚’システムãŒç¢ºè¨¼ã™ã‚‹æ–¹æ³•を制御ã™ã‚‹åˆ©ç”¨è€…ã®æœ€åˆã®ãƒ­ã‚°ã‚¤ãƒ³æ™‚ã«ãƒ›ãƒ¼ãƒ ãƒ‡ã‚£ãƒ¬ã‚¯ãƒˆãƒªãƒ¼ã‚’作æˆã™ã‚‹(_H)NTP を設定ã—ãªã„(_N)ä¿å­˜ã—ãªã„(_N)ドメインアドミニストレータ:ドメインコントローラ:ドメイン管ç†è€…(_A):ドメイン:CA 証明書をダウンロードã™ã‚‹æŒ‡ç´‹èª­ã¿å–りサãƒãƒ¼ãƒˆã‚’有効ã«ã™ã‚‹ (_F)ローカルアクセス制御を有効ã«ã™ã‚‹ï¼ˆ_L)スマートカードサãƒãƒ¼ãƒˆã‚’有効ã«ã™ã‚‹ (_S)CA 証明書ã®ãƒ€ã‚¦ãƒ³ãƒ­ãƒ¼ãƒ‰ã§ã‚¨ãƒ©ãƒ¼æŒ‡ç´‹èª­ã¿å–りèªè¨¼ã‚’使用ã™ã‚‹ã¨ã€æŒ‡ç´‹èª­ã¿å–りã¨é–¢é€£ä»˜ã‘られãŸè‡ªåˆ†ã®æŒ‡ã®ã‚¹ã‚­ãƒ£ãƒ³ã§ãƒ­ã‚°ã‚¤ãƒ³ãŒå¯èƒ½ã«ãªã‚Šã¾ã™ã€‚指紋読ã¿å–りローカルユーザーã®ãƒ‘スワードä¿å­˜ã«ä½¿ç”¨ã™ã‚‹ãƒãƒƒã‚·ãƒ¥/æš—å·åŒ–アルゴリズムホストåã¾ãŸã¯ ldap:// ã¾ãŸã¯ ldaps:// LDAP サーãƒãƒ¼ã‚’ãƒã‚¤ãƒ³ãƒˆã™ã‚‹ URIIPA レルム(_E):IPA ドメイン(_D):IPA サーãƒãƒ¼(_S):IPAv2IPAv2 ã®è¨­å®šIPAv2 ドメインã®å‚åŠ ãŒæˆåŠŸã—ã¾ã›ã‚“ã§ã—ãŸã€‚ipa-client-install コマンドã«å¤±æ•—ã—ã¾ã—ãŸã€‚IPAv2 パスワード利用者ã®ãƒ›ãƒ¼ãƒ ãƒ‡ã‚£ãƒ¬ã‚¯ãƒˆãƒªãƒ¼ãŒãªã‘れã°ã€æœ€åˆã®ãƒ­ã‚°ã‚¤ãƒ³æ™‚ã«è‡ªå‹•çš„ã«ä½œæˆã•れã¾ã™ã€‚無視ドメインå‚加Join 設定Winbind ドメインã«å‚加KDC:KerberosKerberos 設定Kerberos パスワードLDAPLDAP 検索ベース DN (_B):LDAP 設定LDAP サーãƒãƒ¼ (_S):LDAP èªè¨¼LDAP パスワードローカルアカウント専用ローカルèªè¨¼ã¯å分ã§ã™ãƒ­ãƒƒã‚¯NISNIS 設定NIS ドメイン (_D):NIS サーãƒãƒ¼ (_S):NIS パスワード次ã„ã„ãˆOKパスワードパスワード:レルム (_):レルム(Realm):ログインã«ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ã‚’å¿…è¦ã¨ã™ã‚‹ (_D)å‰å›žã®è¨­å®šå¤‰æ›´ã®å‰ã«ãƒãƒƒã‚¯ã‚¢ãƒƒãƒ—ã•れã¦ã„る設定ファイルを復元戻ã™è¨­å®šã®ä¿å­˜ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¢ãƒ‡ãƒ«:サーãƒãƒ¼:スマートカードèªè¨¼ã‚’使用ã™ã‚‹ã¨ã€ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ã¨é–¢é€£ä»˜ã‘られãŸè¨¼æ˜Žè¨¼åŠã³ã‚­ãƒ¼ã‚’使用ã—ãŸãƒ­ã‚°ã‚¤ãƒ³ãŒå¯èƒ½ã«ãªã‚Šã¾ã™ã€‚設定変更ã®å†…ã®å¹¾ã¤ã‹ã¯ã€ç¶™ç¶šã™ã‚‹å‰ã«ãƒ‡ã‚£ã‚¹ã‚¯ã«ä¿å­˜ã™ã‚‹å¿…è¦ãŒã‚りã¾ã™ã€‚ 変更をä¿å­˜ã—ãªã„å ´åˆã€ãƒ‰ãƒ¡ã‚¤ãƒ³ã«å‚加ã™ã‚‹æ“作ãŒå¤±æ•—ã™ã‚‹ã“ã¨ãŒã‚りã¾ã™ã€‚ 変更をä¿å­˜ã—ã¾ã™ã‹?テンプレートシェル(_M):テンプレートシェル:%s ファイルãŒè¦‹ã¤ã‹ã‚Šã¾ã›ã‚“ãŒã€ã“ã®ãƒ•ァイル㯠%s ç”¨ã«æ­£ã—ã動作ã•ã›ã‚‹ã®ã‚’サãƒãƒ¼ãƒˆã™ã‚‹ãŸã‚å¿…è¦ã§ã™ã€‚ ã“ã®ãƒ•ァイルをæä¾›ã—ã¦ã„ã‚‹ %s パッケージをインストールã—ã¦ãã ã•ã„。LDAP サーãƒãƒ¼ã« TLS プロトコルを使ã£ã¦æŽ¥ç¶šã™ã‚‹ã«ã¯ã€ã‚ãªãŸã®ã‚µãƒ¼ãƒãƒ¼èªè¨¼ã®ç½²åãŒã‚ã‚‹ CA èªè¨¼ãŒå¿…è¦ã§ã™ã€‚証明を '%s' ディレクトリ㫠PEM フォーマットã®èªè¨¼ã‚’コピーã—ã¦ãã ã•ã„。 ãã—㦠OK を押ã—ã¾ã™ã€‚LDAP サーãƒãƒ¼ã« TLS プロトコルを使ã£ã¦æŽ¥ç¶šã™ã‚‹ã«ã¯ã€ã‚ãªãŸã®ã‚µãƒ¼ãƒãƒ¼èªè¨¼ã®ç½²åãŒã‚ã‚‹ CA èªè¨¼ãŒå¿…è¦ã§ã™ã€‚PEM フォーマット㮠CA èªè¨¼ã‚’ダウンロードã§ãã‚‹ URL を記入ã—ã¦ãã ã•ã„ã€‚ã‚°ãƒ©ãƒ•ã‚£ã‚«ãƒ«ç’°å¢ƒã‚’åˆæœŸåŒ–ã§ãã¾ã›ã‚“。最もå¯èƒ½æ€§ã®é«˜ã„原因ã¯ã€ã‚°ãƒ©ãƒ•ィカルモードã§èµ·å‹•ã•れã¦ã„ãªã„ã“ã¨ã§ã™ã€‚GUIã‚’èµ·å‹•ã™ã‚‹ã‹ã€DISPLAY 値を設定ã—ã¦ãã ã•ã„。 䏿˜Žãªãƒ‘スワードãƒãƒƒã‚·ãƒ¥ã‚¢ãƒ«ã‚´ãƒªã‚ºãƒ ãŒæŒ‡å®šã•れãŸã®ã§ã€sha256を使用ã—ã¾ã™ã€‚DNS を使用ã—ã¦ãƒ¬ãƒ«ãƒ ç”¨ã® KDC を見付ã‘ã‚‹(_l)DNS を使用ã—ã¦ãƒ¬ãƒ«ãƒ ç”¨ã® KDC を見付ã‘ã‚‹DNS を使用ã—ã¦ãƒ¬ãƒ«ãƒ ã®ãƒ›ã‚¹ãƒˆã‚’解決ã™ã‚‹DNS を使用ã—ã¦ãƒ¬ãƒ«ãƒ ã®ãƒ›ã‚¹ãƒˆã‚’解決ã™ã‚‹ï¼ˆ_N)指紋読ã¿å–りを使用IPAv2 ã®ä½¿ç”¨Kerberos 5 を使用LDAP を使用LDAP èªè¨¼ã‚’使用MD5 パスワードを使用NIS を使用シャドウパスワードを使用TLS を使用RFC-2830 ã§å®šç¾©ã•れã¦ã„るよã†ã« LDAP ã« TLS 拡張を使用ã™ã‚‹ã€‚ ldaps サーãƒãƒ¼ URI ã§å°ã‚’付ã‘ã¦ã¯ã„ã‘ãªã„。Winbind を使用Winbind èªè¨¼ã‚’使用TLS を使用ã—ã¦æŽ¥ç¶šã‚’æš—å·åŒ–ã™ã‚‹(_T)IPAv2 ドメインã«å‚加ã™ã‚‹ã«ã¯ "ドメインå‚加" ボタンを使用ã—ã¾ã™ã€‚ユーザー情報警告有効ãªã‚‰ã°ã€/etc/security/access.conf ãŒãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚¢ã‚¯ã‚»ã‚¹ã®è¨±å¯ã®ãŸã‚ã«åˆ©ç”¨ã•れã¾ã™ã€‚WinbindWinbind ADS レルム (_E)Winbind ドメインコントローラ (_n):Winbind 設定Winbind ドメイン (_D):Winbind èªè¨¼Winbind パスワードã¯ã„ldaps:// サーãƒãƒ¼ã‚¢ãƒ‰ãƒ¬ã‚¹ã‚’記入ã™ã‚‹ã‹ã€ã¾ãŸã¯ LDAP èªè¨¼ç”¨ã® TLS を使用ã—ãªã‘れã°ãªã‚Šã¾ã›ã‚“。CA 証明書をダウンロードã™ã‚‹...(_D)識別ã¨èªè¨¼ï¼ˆ_I)ドメインã«å‚加... (_J)KDCs (_K):パスワードãƒãƒƒã‚·ãƒ¥ã‚¢ãƒ«ã‚´ãƒªã‚ºãƒ ï¼ˆ_P):パスワード(_P):セキュリティモデル(_S):ユーザーアカウントデータベース (_U) :スマートカードã®å–ã‚Šå‡ºã—æ™‚ã«è¡Œã†å‹•作ローカルファイルã ã‘ã«ã‚ˆã‚‹èªè¨¼ã‚·ã‚¹ãƒ†ãƒ ã‚¢ã‚«ã‚¦ãƒ³ãƒˆãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‚µãƒ¼ãƒ“スã«ã‚ˆã‚‹èªè¨¼ã‚·ã‚¹ãƒ†ãƒ ã‚¢ã‚«ã‚¦ãƒ³ãƒˆãƒªãƒ¢ãƒ¼ãƒˆã‚µãƒ¼ãƒ“スを通ã—ã¦ã®ãƒ­ãƒ¼ã‚«ãƒ«ãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚’èªè¨¼ã‚­ãƒ£ãƒƒã‚·ãƒ¥åŒ–root ã¨ã—ã¦ã®ã¿å®Ÿè¡Œå¯èƒ½ã‚¢ã‚«ã‚¦ãƒ³ãƒˆèªè¨¼ä¸­ã« access.conf ã‚’ãƒã‚§ãƒƒã‚¯ã™ã‚‹ã‚ªãƒ•ラインã§ãƒ­ã‚°ã‚¤ãƒ³ã§ãるよã†ã« winbind を設定ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼åã®ä¸­ã«ãƒ‰ãƒ¡ã‚¤ãƒ³ã‚’æŒãŸãªã„ãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚’ãƒ‰ãƒ¡ã‚¤ãƒ³ãƒ¦ãƒ¼ã‚¶ãƒ¼ã¨æƒ³å®šã™ã‚‹ã‚ˆã†ã«winbind を設定ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼åã®ä¸­ã«ãƒ‰ãƒ¡ã‚¤ãƒ³ã‚’æŒãŸãªã„ãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚’ãƒ‰ãƒ¡ã‚¤ãƒ³ãƒ¦ãƒ¼ã‚¶ãƒ¼ã¨æƒ³å®šã—ãªã„様ã«winbind を設定ã™ã‚‹ã‚ªãƒ•ラインã§ãƒ­ã‚°ã‚¤ãƒ³ã§ããªã„よã†ã« winbind を設定ã™ã‚‹åˆ©ç”¨è€…ã®æœ€åˆã®ãƒ­ã‚°ã‚¤ãƒ³æ™‚ã«ãƒ›ãƒ¼ãƒ ãƒ‡ã‚£ãƒ¬ã‚¯ãƒˆãƒªãƒ¼ã‚’作æˆã™ã‚‹ãƒ‡ãƒ•ォルト㮠LDAP ベース DNデフォルト㮠LDAP サーãƒãƒ¼ãƒ›ã‚¹ãƒˆåã¾ãŸã¯ URIデフォルト㮠NIS ドメインデフォルト㮠NIS サーãƒãƒ¼ãƒ‡ãƒ•ォルト㮠hesiod LHSデフォルト㮠hesiod RHSデフォルト㮠Kerberos KDCデフォルト㮠Kerberos 管ç†ã‚µãƒ¼ãƒãƒ¼ãƒ‡ãƒ•ォルト㮠kerberos レルム(realm)セキュリティ㌠ads ã®æ™‚ã® samba 㨠winbind 用ã®ãƒ‡ãƒ•ォルトã®ãƒ¬ãƒ«ãƒ (realm)デフォルトã§ä½¿ç”¨ã™ã‚‹ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ãƒ¢ã‚¸ãƒ¥ãƒ¼ãƒ«ãƒ€ã‚¤ã‚¢ãƒ­ã‚°ã¯ã‚­ãƒ£ãƒ³ã‚»ãƒ«ã•れã¾ã—ãŸãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã¨èªè¨¼ã®ãŸã‚ã« IPAv2 をデフォルトã§ç„¡åйã«ã—ã¾ã™LDAP èªè¨¼ã‚’デフォルトã§ç„¡åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠LDAP をデフォルトã§ç„¡åйã«ã™ã‚‹MD5 パスワードをデフォルトã§ç„¡åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠NIS をデフォルトã§ç„¡åйã«ã™ã‚‹èªè¨¼ã® SSSD をデフォルトã§ç„¡åйã«ã™ã‚‹ã€‚(ã¾ã ã‚µãƒãƒ¼ãƒˆã•れã¦ã„ãªã„設定ã§ã™)ユーザー情報ã«é–¢ã—㦠SSSD をデフォルトã§ç„¡åйã«ã™ã‚‹ã€‚(ã¾ã ã‚µãƒãƒ¼ãƒˆã•れã¦ã„ãªã„設定ã§ã™)指紋読ã¿å–りã«ã‚ˆã‚‹èªè¨¼ã‚’デフォルトã§ç„¡åйã«ã™ã‚‹ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ã«ã‚ˆã‚‹èªè¨¼ã‚’デフォルトã§ç„¡åйã«ã™ã‚‹SSSD 内ã®ãƒ¦ãƒ¼ã‚¶ãƒ¼ä¿¡ä»»æƒ…å ±ã®ã‚­ãƒ£ãƒƒã‚·ãƒ¥ã‚’デフォルトã§ç„¡åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã®ã‚­ãƒ£ãƒƒã‚·ãƒ¥ã‚’デフォルトã§ç„¡åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠hesiod をデフォルトã§ç„¡åйã«ã™ã‚‹Kerberos èªè¨¼ã‚’デフォルトã§ç„¡åйã«ã™ã‚‹ã‚·ãƒ£ãƒ‰ã‚¦ãƒ‘スワードをデフォルトã§ç„¡åйã«ã™ã‚‹kerberos KDC 検索用㮠DNS 使用を無効ã«ã™ã‚‹Kerberos レルム (realm) 検索用㮠DNS 使用を無効ã«ã™ã‚‹ LDAP ユーザー情報ルックアップ用㮠RFC-2307bis schema ã®ä½¿ç”¨ã‚’無効ã«ã™ã‚‹TLS 㨠LDAP ã®ä½µç”¨ã‚’無効ã«ã™ã‚‹ (RFC-2830)èªè¨¼ã§ winbind をデフォルトã§ç„¡åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠winbind をデフォルトã§ç„¡åйã«ã™ã‚‹ãƒ›ã‚¹ãƒˆå解決用㮠wins を無効ã«ã™ã‚‹TUI ã®ãƒ¡ã‚¤ãƒ³ãƒ€ã‚¤ã‚¢ãƒ­ã‚°ã®ä¸­ã«ã€Œã‚­ãƒ£ãƒ³ã‚»ãƒ«ã€ã®ä»£ã‚りã«ã€Œæˆ»ã‚‹ã€ã‚’表示ã™ã‚‹ã‚¢ã‚«ã‚¦ãƒ³ãƒˆèªè¨¼ä¸­ã« access.conf ã‚’ãƒã‚§ãƒƒã‚¯ã—ãªã„åˆ©ç”¨è€…ã®æœ€åˆã®ãƒ­ã‚°ã‚¤ãƒ³æ™‚ã«ãƒ›ãƒ¼ãƒ ãƒ‡ã‚£ãƒ¬ã‚¯ãƒˆãƒªãƒ¼ã‚’作æˆã—ãªã„ä¸é©åˆ‡ãªãƒ†ã‚­ã‚¹ãƒˆãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚¤ãƒ³ã‚¿ãƒ•ェースを表示ã—ãªã„ホストå解決㫠wins ã¾ãŸã¯ nis より dns を優先ã—ãªã„èªè¨¼ç”¨ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ã‚’デフォルトã§è¦æ±‚ã—ãªã„IPAv2 ドメインã«å¯¾ã—㦠NTP をセットアップã—ã¾ã›ã‚“portmapã€ypbindã€nscd ã‚’èµ·å‹•/åœæ­¢ã—ãªã„設定ファイルをアップデートã›ãšã«ã€æ–°ã—ã„設定をãŸã è¡¨ç¤ºã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã¨èªè¨¼ã®ãŸã‚ã« IPAv2 ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã—ã¾ã™LDAP èªè¨¼ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠LDAP ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹MD5 ãƒ‘ã‚¹ãƒ¯ãƒ¼ãƒ‰ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠NIS ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹èªè¨¼ã® SSSD ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ã€‚(手動管ç†ã®è¨­å®šã¨ä¸€ç·’ã«)ユーザー情報ã«é–¢ã—㦠SSSD ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ã€‚(手動管ç†ã®è¨­å®šã¨ä¸€ç·’ã«)指紋読ã¿å–りã«ã‚ˆã‚‹èªè¨¼ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ã«ã‚ˆã‚‹èªè¨¼ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹SSSD 内ã®ãƒ¦ãƒ¼ã‚¶ãƒ¼ä¿¡ä»»æƒ…å ±ã®ã‚­ãƒ£ãƒƒã‚·ãƒ¥ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã®ã‚­ãƒ£ãƒƒã‚·ãƒ¥ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ï¼ˆSSSD ãŒä½¿ç”¨ã•れる時㫠自動的ã«ç„¡åйã«ã™ã‚‹ï¼‰ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠hesiod ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹Kerberos èªè¨¼ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ã‚·ãƒ£ãƒ‰ã‚¦ãƒ‘ã‚¹ãƒ¯ãƒ¼ãƒ‰ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹kerberos KDC 検索用㮠DNS 使用を有効ã«ã™ã‚‹kerberos レルム検索用㮠DNS 使用を有効ã«ã™ã‚‹LDAP ユーザー情報ルックアップ用㮠RFC-2307bis schema ã®ä½¿ç”¨ã‚’有効ã«ã™ã‚‹TLS 㨠LDAP ã®ä½µç”¨ã‚’有効ã«ã™ã‚‹ (RFC-2830)èªè¨¼ã§ winbind ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ãƒ¦ãƒ¼ã‚¶ãƒ¼æƒ…å ±ã«é–¢ã—㦠winbind ã‚’ãƒ‡ãƒ•ã‚©ãƒ«ãƒˆã§æœ‰åйã«ã™ã‚‹ãƒ›ã‚¹ãƒˆå解決用㮠wins を有効ã«ã™ã‚‹winbind ㌠domain åˆã¯ ads ユーザーã«å‰²ã‚Šå½“ã¦ã‚‹ gid ã®ç¯„囲新ã—ã„パスワードã®ãŸã‚ã®ãƒãƒƒã‚·ãƒ¥/æš—å·åŒ–アルゴリズムã“ã®ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã¨ã—㦠IPAv2 ドメインã«å‚加管ç†è€…ã¨ã—ã¦ä»Š winbind ドメインã‹åˆã¯ ads realm ã«å‚加ã™ã‚‹URL ã‹ã‚‰ CA 証明書をロードã™ã‚‹ãƒ­ãƒ¼ã‚«ãƒ«èªè¨¼ã¯ãƒ­ãƒ¼ã‚«ãƒ«ãƒ¦ãƒ¼ã‚¶ãƒ¼ç”¨ã¨ã—ã¦å•題ã‚りã¾ã›ã‚“èªè¨¼ã™ã‚‹å¯¾è±¡ã®ã‚µãƒ¼ãƒãƒ¼åã‚‚ã—サãƒãƒ¼ãƒˆã•れã¦ã„る設定ã§ã‚ã£ã¦ã‚‚ã€æš—é»™ã®ã†ã¡ã« SSSD を利用ã—ãªã„ã§ãã ã•ã„。--test ã®å対ã€å¤‰æ›´ã•れãŸè¨­å®šã«å¯¾ã™ã‚‹è¨­å®šãƒ•ァイルã®ã‚¢ãƒƒãƒ—デートホストå解決㫠wins ã¾ãŸã¯ nis より dns を優先ã™ã‚‹ãƒ‡ãƒ•ォルトã®ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‚’検出ã—ã¦è¡¨ç¤ºã™ã‚‹èªè¨¼ç”¨ã‚¹ãƒžãƒ¼ãƒˆã‚«ãƒ¼ãƒ‰ã‚’デフォルトã§è¦æ±‚ã™ã‚‹è¨­å®šãƒ•ァイルã®ãƒãƒƒã‚¯ã‚¢ãƒƒãƒ—を復元å‰å›žã®è¨­å®šå¤‰æ›´ã®å‰ã«ä¿å­˜ã•れã¦ã„る設定ファイルã®ãƒãƒƒã‚¯ã‚¢ãƒƒãƒ—を復元全ã¦ã®è¨­å®šãƒ•ァイルã®ãƒãƒƒã‚¯ã‚¢ãƒƒãƒ—ã‚’ä¿å­˜samba 㨠winbind 用ã«ä½¿ç”¨ã™ã‚‹ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¢ãƒ¼ãƒ‰IPAv2 ドメインã«å¯¾ã—㦠NTP をセットアップã—ã¾ã™ï¼ˆãƒ‡ãƒ•ォルト)シャドウパスワードシステムãŒå‚加ã™ã‚‹ IPAv2 ドメインwinbindusedefaultdomain ãŒæœ‰åйã§ãªã„å ´åˆã«ã€winbind 作æˆã®ãƒ¦ãƒ¼ã‚¶ãƒ¼å内ã§ãƒ‰ãƒ¡ã‚¤ãƒ³ã¨ãƒ¦ãƒ¼ã‚¶ãƒ¼ã®éƒ¨åˆ†ã‚’分離ã™ã‚‹ã®ã«ä½¿ç”¨ã™ã‚‹æ–‡å­—。ユーザーãŒãƒ›ãƒ¼ãƒ ãƒ‡ã‚£ãƒ¬ã‚¯ãƒˆãƒªã¨ã—ã¦æŒã¤ winbind 作æˆã®ãƒ‡ã‚£ãƒ¬ã‚¯ãƒˆãƒªãƒ¦ãƒ¼ã‚¶ãƒ¼ãŒãã®ãƒ—ライマリグループã¨ã—ã¦æŒã¤ winbind 作æˆã®ã‚°ãƒ«ãƒ¼ãƒ—IPAv2 ドメインã®ãƒ¬ãƒ«ãƒ IPAv2 ドメインã®ã‚µãƒ¼ãƒãƒ¼ãƒ¦ãƒ¼ã‚¶ãƒ¼ãŒãã®ãƒ­ã‚°ã‚¤ãƒ³ã‚·ã‚§ãƒ«ã¨ã—ã¦æŒã¤ winbind 作æˆã®ã‚·ã‚§ãƒ«winbind ㌠domain åˆã¯ ads ユーザーã«å‰²ã‚Šå½“ã¦ã‚‹ uid ã®ç¯„囲予期ã—ãªã„引数全ã¦ã®è¨­å®šãƒ•ァイルã®ã‚¢ãƒƒãƒ—デート使用方法: %s [オプション]ã‚‚ã—サãƒãƒ¼ãƒˆã•れã¦ã„る設定ã§ã‚れã°ã€æš—é»™ã®ã†ã¡ã« SSSD を利用ã™ã‚‹ã€‚ワークグループèªè¨¼ã‚µãƒ¼ãƒãƒ¼