Q N!pr#x##(! /4=NW^f ofyI * 6A Q_qw 6E_b( (x:;+ 1=Sg~" dE@  % 2?EKTg  *8OT]o   !  & 3 @MRUX akszR h2 C S !h";>#"z#!#"###$ $ '$4$=$U$g$o$$t$ % %(%6H%%%[%%%&-&>&O&f&w&L{&&&&'' 3'>'O'(g'0'0'1'$(,(.D()s([(_(+Y)6))#))**.*A*V*t*5* **@**8+,c+ +++S+V1,:,1,6,.,-.[-*-%-(-*.C/.'s.-./.$.</5[/=/1/:07<0-t0+0>0? 1)M1+w11*1M1O<2920252X-3-3)3$3'4)+4BU4&4,4.4#54?5&t5%5>5 61!6(S6;|6D636)170[7)7X7(8*880c88-88G`9F99:D.:4s::::4:'$;|L;L<===2=L=f==========[=UB> > >>>>>]>W?r?? ?J??'? @ %@2@9@W@ni@9@)ATC CWCC C DD)D0D9DIDYD^D {DD D DDDDD DDE E %E/E3E:E AEKEZE#aE<E E EE E]ETFF GrGGGHH1I#II I(J@J VJbJ rJ~JJ JJ JxJEKTKjK.K KKEKLL6LVLeL|LLLNLL M$MQbQ"zQ:Q@Q!R;R*WRR)RRR!S!#S7ES'}S!S*S!S;T-PT3~T$TFT$U CU-dU-U*UU#V(V"@V2cV8V!VV* W?8W)xWWW!W!W7X'TX!|X*X!X-XY9Y8YYY$YY%Y>Z@ZZZ'ZZ0Z,['K[&s[ [%[r[5@\5v\\\6\- ]:]J]c]w]!]G7V(X!?O QY-lHwz#u6%,3ZK/=5k[qhLIoJT.By_|s$Pr;St9cbgvx&mEdM{ \'U*> a< ^ ~N4fin0pWe@])C1}F` DA2j"8R+: / between elements | selects | next screen*Authentication ConfigurationLocal Authentication OptionsOther Authentication OptionsSmart Card Authentication OptionsUser Account ConfigurationTip: Smart cards support logging into both local and centrally managed accounts.Tip: This is managed via /etc/security/access.conf.ADS Realm:Ad_min Servers:Admin Server:Advanced _OptionsAlertAll configuration files which were modified by the previous authentication configuration change will be restored from backup. Revert the changes?Allow offline _loginAut_hentication Method:AuthenticationAuthentication ConfigurationAuthentication module %s/pam_%s.so is missing. Authentication process might not work correctly.BackBad smart card removal action specified.Base DN:Cache InformationCancelCard Re_moval Action:Certificate _URL:Click this button if you did not download a CA certificate yet or you have not set the CA certificate up by other means.Control how the system verifies users who attempt to log inCreate _home directories on the first loginDo not configure _NTPDo_n't SaveDomain Administrator:Domain Controllers:Domain _administrator:Domain:Download CA CertificateEnable _fingerprint reader supportEnable _local access controlEnable _smart card supportError downloading CA certificateFingerprint authentication allows you to log in by scanning your finger with the fingerprint reader.Fingerprint readerHashing or crypto algorithm used for storing passwords of local usersHostname or ldap:// or ldaps:// URI pointing to the LDAP server.IPA R_ealm:IPA _Domain:IPA _Server:IPAv2IPAv2 SettingsIPAv2 domain join was not succesful. The ipa-client-install command failed.IPAv2 passwordIf the home directory of an user doesn't exist yet it will be created automatically on his first login.IgnoreJoin DomainJoin SettingsJoining Winbind DomainKDC:KerberosKerberos SettingsKerberos passwordLDAPLDAP Search _Base DN:LDAP SettingsLDAP _Server:LDAP authenticationLDAP passwordLocal accounts onlyLocal authorization is sufficientLockNISNIS SettingsNIS _Domain:NIS _Server:NIS passwordNextNoOkPasswordPassword:R_ealm:Realm:Require smart car_d for loginRestore the configuration files backed up before the previous configuration changeRevertSave SettingsSecurity Model:Server:Smart card authentication allows you to log in using a certificate and key associated with a smart card.Some of the configuration changes you've made should be saved to disk before continuing. If you do not save them, then your attempt to join the domain may fail. Save changes?Te_mplate Shell:Template Shell:The %s file was not found, but it is required for %s support to work properly. Install the %s package, which provides this file.To connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory. Then press OK.To verify the LDAP server with TLS protocol enabled you need a CA certificate which signed the server's certificate. Please fill in the URL where the CA certificate in the PEM format can be downloaded from.Unable to initialize graphical environment. Most likely cause of failure is that the tool was not run using a graphical environment. Please either start your graphical user interface or set your DISPLAY variable. Unknown password hashing algorithm specified, using sha256.Use DNS to _locate KDCs for realmsUse DNS to locate KDCs for realmsUse DNS to resolve hosts to realmsUse D_NS to resolve hosts to realmsUse Fingerprint readerUse IPAv2Use KerberosUse LDAPUse LDAP AuthenticationUse MD5 PasswordsUse NISUse Shadow PasswordsUse TLSUse Transport Layer Security extension for LDAP as defined by RFC-2830. It must not be ticked with ldaps server URI.Use WinbindUse Winbind AuthenticationUse _TLS to encrypt connectionsUse the "Join Domain" button to join the IPAv2 domain.User InformationWarningWhen enabled /etc/security/access.conf will be consulted for authorization of users access.WinbindWinbind ADS R_ealm:Winbind Domain Co_ntrollers:Winbind SettingsWinbind _Domain:Winbind authenticationWinbind passwordYesYou must provide ldaps:// server address or use TLS for LDAP authentication._Download CA Certificate..._Identity & Authentication_Join Domain..._KDCs:_Password Hashing Algorithm:_Password:_Security Model:_User Account Database:action to be taken on smart card removalauthenticate system accounts by local files onlyauthenticate system accounts by network servicesauthorize local users also through remote servicecachingcan only be run as rootcheck access.conf during account authorizationconfigures winbind to allow offline loginconfigures winbind to assume that users with no domain in their user names are domain usersconfigures winbind to assume that users with no domain in their user names are not domain usersconfigures winbind to prevent offline logincreate home directories for users on their first logindefault LDAP base DNdefault LDAP server hostname or URIdefault NIS domaindefault NIS serverdefault hesiod LHSdefault hesiod RHSdefault kerberos KDCdefault kerberos admin serverdefault kerberos realmdefault realm for samba and winbind when security=adsdefault smart card module to usedialog was cancelleddisable IPAv2 for user information and authentication by defaultdisable LDAP for authentication by defaultdisable LDAP for user information by defaultdisable MD5 passwords by defaultdisable NIS for user information by defaultdisable SSSD for authentication by default (still used for supported configurationsdisable SSSD for user information by default (still used for supported configurations)disable authentication with fingerprint readers by defaultdisable authentication with smart card by defaultdisable caching of user credentials in SSSD by defaultdisable caching of user information by defaultdisable hesiod for user information by defaultdisable kerberos authentication by defaultdisable shadowed passwords by defaultdisable use of DNS to find kerberos KDCsdisable use of DNS to find kerberos realmsdisable use of RFC-2307bis schema for LDAP user information lookupsdisable use of TLS with LDAP (RFC-2830)disable winbind for authentication by defaultdisable winbind for user information by defaultdisable wins for hostname resolutiondisplay Back instead of Cancel in the main dialog of the TUIdo not check access.conf during account authorizationdo not create home directories for users on their first logindo not display the deprecated text user interfacedo not prefer dns over wins or nis for hostname resolutiondo not require smart card for authentication by defaultdo not setup the NTP against the IPAv2 domaindo not start/stop portmap, ypbind, and nscddo not update the configuration files, only print new settingsenable IPAv2 for user information and authentication by defaultenable LDAP for authentication by defaultenable LDAP for user information by defaultenable MD5 passwords by defaultenable NIS for user information by defaultenable SSSD for authentication by default with manually managed configurationenable SSSD for user information by default with manually managed configurationenable authentication with fingerprint readers by defaultenable authentication with smart card by defaultenable caching of user credentials in SSSD by defaultenable caching of user information by default (automatically disabled when SSSD is used)enable hesiod for user information by defaultenable kerberos authentication by defaultenable shadowed passwords by defaultenable use of DNS to find kerberos KDCsenable use of DNS to find kerberos realmsenable use of RFC-2307bis schema for LDAP user information lookupsenable use of TLS with LDAP (RFC-2830)enable winbind for authentication by defaultenable winbind for user information by defaultenable wins for hostname resolutiongid range winbind will assign to domain or ads usershash/crypt algorithm for new passwordsjoin the IPAv2 domain as this accountjoin the winbind domain or ads realm now as this administratorload CA certificate from the URLlocal authorization is sufficient for local usersnames of servers to authenticate againstnever use SSSD implicitly even for supported configurationsopposite of --test, update configuration files with changed settingsprefer dns over wins or nis for hostname resolutionprobe network for defaults and print themrequire smart card for authentication by defaultrestore the backup of configuration filesrestore the backup of configuration files saved before the previous configuration changesave a backup of all configuration filessecurity mode to use for samba and winbindsetup the NTP against the IPAv2 domain (default)shadow passwordthe IPAv2 domain the system should be part ofthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabledthe directory which winbind-created users will have as home directoriesthe group which winbind-created users will have as their primary groupthe realm for the IPAv2 domainthe server for the IPAv2 domainthe shell which winbind-created users will have as their login shelluid range winbind will assign to domain or ads usersunexpected argumentupdate all configuration filesusage: %s [options]use SSSD implicitly if it supports the configurationworkgroup authentication servers are inProject-Id-Version: authconfig.default Report-Msgid-Bugs-To: POT-Creation-Date: 2012-05-02 17:32+0200 PO-Revision-Date: 2012-05-21 01:28-0400 Last-Translator: Leah Liu Language-Team: Wei Liu MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Language: zh-Hans Plural-Forms: nplurals=1; plural=0; X-Generator: Zanata 1.5.0 / 在元素间切换 | 选择 | 下一页*验证配置本地验证选项其它验证选项智能卡验证选项用户帐户配置提示:智能卡可支持登录到本地和集中管理的帐户。提示:这是使用 /etc/security/access.conf 进行管理。ADS 域:管理服务器(_m):管理服务器:高级选项(_O)警告将从备份中恢复之前由验证配置更改修改的所有配置文件。恢复修改?允许离线登录(_l)验证(_h)方法:验证验证配置缺少验证模块 %s/pam_%s.so 。验证进程可能无法正常进行。返回指定的错误智能卡删除动作。基点 DN:缓存信息取消删除卡的操作(_m):证书 URL(_U):如果您还没有下载 CA 证书或者还没有使用其它方法设置 CA 证书,请点击这个按钮。控制系统对试图登录的用户进行校验的方式在首次登录时创建主目录(_h)不要配置 NTP(_N)不保存(_n)域管理员:域控制器:域管理员(_a):域:下载 CA 证书启用指纹读取器支持(_f)启用本地访问控制(_l)启用智能卡支持(_s)下载 CA 证书错误指纹验证允许您通过使用指纹读取器扫描指纹登录。指纹读取器保存本地用户密码的散列或者加密算法指向 LDAP 服务器的主机名或者 ldap:// 或者 ldaps:// URI。IPA 范围(_e):IPA 域(_D):IPA 服务器 (_S):IPAv2IPAv2 设置加入 IPAv2 域不成功。ipa-client-install 命令失败。IPAv2 密码如果某个用户的主目录还不存在,就会在该用户首次登录时创建。忽略加入域加入设置加入 Winbind 域KDC:KerberosKerberos 设置Kerberos 密码LDAPLDAP 搜索基点 DN (_B):LDAP 设置LDAP 服务器 (_S):LDAP 验证LDAP 密码仅限于本地帐户本地授权即可锁定NISNIS 设置NIS 域 (_D):NIS 服务器(_S):NIS 密码下一步否确定密码密码:域(_e):域:要求使用智能卡登录(_d)恢复在之前进行的配置更改前备份的配置文件恢复:保存设置安全模型:服务器:智能卡认证允许您使用一个证书和一个与智能卡关联的密钥进行登录。在继续操作前,您应该将所做配置修改保存到磁盘中。如果您不保存它们,那么您加入域的尝试就会失败。保存修改吗?模板 Shell(_m):模板 Shell:没有找到 %s 文件。%s 支持需要这个文件方可正常工作。 安装提供该文件的 %s 软件包。要连接到使用 TLS 的 LDAP 服务器,您需要用来签署您服务器证书的 CA 证书。将这个证书以 PEM 的格式复制到 '%s' 目录中。 然后按“确定”。要确定启用了带有 TLS 协议的 LDAP 服务器,您需要签署了服务器证书的 CA证书。请填写可下载 PEM 格式 CA 证书的 URL。无法初始化图形化环境。可能的原因 是工具并非在图形化环境下运行。请 启动您的图形化环境或者设置您的 DISPLAY 变量。 指定未知密码散列算法,使用 sha256。通过 DNS 查找领域的 KDC (_l)通过 DNS 查找域的 KDC使用 DNS 将主机解析到域使用 DNS 将主机解析到域(_N)使用指纹读取器使用 IPA2使用 Kerberos使用 LDAP使用 LDAP 验证使用 MD5 密码使用 NIS使用影子密码使用 TLS使用 RFC-2830 为 LDAP 定义的传输层安全性扩展。一定不要将其与 ldaps 服务器 URI 一同选择。使用 Winbind使用 Winbind 验证使用 TLS 来加密连接 (_T)使用“加入域”按钮加入 IPAv2 域。用户信息警告启用 /etc/security/access.conf 将在用户访问时询问授权。WinbindWinbind ADS 域(_r):Winbind 域控制器(_n):Winbind 设置Winbind 域(_D):Winbind 验证Winbind 密码是您必须提供 ldaps:// 服务器地址或者使用 TLS 进行 LDAP 验证。下载 CA 证书(_D)......识别(_I)和验证加入域(_J)......KDC(_K):密码散列算法(_P):密码(_P):安全模型(_S):用户帐户数据库(_U):删除智能卡时进行的操作仅通过本地文件验证系统帐户通过网络服务认证系统帐户也可通过远程服务授权本地用户缓存只能以根用户身份运行在帐户验证过程中检查 access.conf将 winbind 配置为允许离线登录将 winbind 配置为假设那些用户名中没有域的用户为域用户将 winbind 配置为假设那些用户名中没有域的用户不是域用户将 winbind 配置为阻止离线登录在用户首次登录时为其创建主目录默认 LDAP 基点 DN默认 LDAP 服务器主机名或者 URI默认 NIS 域默认 NIS 服务器默认的 hesiod LHS默认的 hesiod RHS 默认的 kerberos KDC默认的 kerberos 管理服务器默认的 kerberos 域当 security=ads 时 samba 和 winbind 的默认域默认使用的智能卡模块对话被取消默认为用户信息和认证禁用 IPAv2默认禁用 LDAP 验证默认在用户信息中禁用 LDAP默认禁用 MD5 密码默认在用户信息中禁用 NIS在验证中默认禁用SSSD(仍然用于支持配置)在用户信息中默认禁用SSSD(仍然用于支持配置)默认禁用指纹读取器验证默认禁用智能卡验证在 SSSD 中默认禁用用户信用缓存默认禁用用户信息缓存默认禁用 hesiod 来获取用户信息默认禁用 kerberos 验证默认禁用影子密码禁用 DNS 来查找 kerberos KDC禁用 DNS 来查找 kerberos 域在 LDAP 用户信息查询中禁用 RFC-2307bis 方案禁用使用 LDAP 的 TLS(RFC-2830)默认禁用 winbind 进行验证默认禁用 winbind 来获取用户信息禁用 wins 进行主机名解析在 TUI 主对话框中显示“返回”而非“取消”在帐户验证过程中不检查 access.conf不要为用户在其首次登录时创建主目录不显示过时的文本用户界面在 dns、wins 或者 nis 中不首选使用 dns 进行主机名解析默认不需要使用智能卡验证不要根据 IPAv2 域设置 NTP不要启动/停止 portmap、ypbind 和 nscd不更新配置文件,只输出新的设置默认为用户信息和认证启用 IPAv2默认启用 LDAP 验证默认在用户信息中启用 LDAP默认启用 MD5 密码默认在用户信息中启用 NIS手动管理配置时在验证中默认启用 SSSD手动管理配置时在用户信息中默认启用 SSSD默认启用指纹读取器验证默认启用智能卡验证在 SSSD 中默认启用用户信用缓存默认启用用户信息缓存(使用 SSSD 时自动禁用)默认启用 hesiod 来获取用户信息默认启用 kerberos 验证默认启用影子密码启用 DNS 来查找 kerberos KDC启用 DNS 来查找 kerberos 域在 LDAP 用户信息查询中启用 RFC-2307bis 方案启用使用 LDAP 的 TLS(RFC-2830)默认启用 winbind 进行验证默认启用 winbind 来获取用户信息启用 wins 进行主机名解析winbind 分配域或 ads 用户的 gid 范围新密码的散列/加密算法以这个帐户加入 IPAv2 域立即作为系统管理员加入 winbind 域或 ads 域从这个 URL 载入 CA 证书本地用户使用本地授权即可用来验证的服务器名称即使配置支持也不要使用SSSD与 --test 相反,使用修改过的设置升级配置文件首选使用 dns 而不是 wins 或者 nis 进行主机名解析探测网络默认值并打印默认需要使用验证智能卡验证恢复配置文件备份在更改之前配置前恢复配置文件备份保存所有配置文件备份samba 和 winbind 使用的安全模式根据 IPAv2 域设置 NTP(默认)影子密码系统应为其一部分的 IPAv2 域如果没有启用 winbindusedefaultdomain,用来分隔 winbind 创建的用户名中域和用户部分的字符winbind 创建的用户的目录将会作为主目录winbind 创建的用户组群将会作为主要组群IPAv2 域的 realmIPAv2 域的服务器winbind 创建的用户 shell 将会作为登录 shellwinbind 分配域或 ads 用户的 uid 范围错误的参数更新所有配置文件用法: %s [选项]如果配置支持就是用SSSD验证服务器所在的工作组