Translations by Andi Chandler

Andi Chandler has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

150 of 61 results
1.
Set the verbosity of the debug logging
2015-11-22
Set the verbosity of the debug logging
2.
Include timestamps in debug logs
2015-11-22
Include timestamps in debug logs
3.
Include microseconds in timestamps in debug logs
2015-11-22
Include microseconds in timestamps in debug logs
4.
Write debug messages to logfiles
2015-11-22
Write debug messages to logfiles
6.
Command to start service
2015-11-22
Command to start service
7.
Number of times to attempt connection to Data Providers
2015-11-22
Number of times to attempt connection to Data Providers
8.
The number of file descriptors that may be opened by this responder
2015-11-22
The number of file descriptors that may be opened by this responder
9.
Idle time before automatic disconnection of a client
2015-11-22
Idle time before automatic disconnection of a client
12.
SSSD Services to start
2015-11-22
SSSD Services to start
13.
SSSD Domains to start
2015-11-22
SSSD Domains to start
14.
Timeout for messages sent over the SBUS
2015-11-22
Timeout for messages sent over the SBUS
15.
Regex to parse username and domain
2015-11-22
Regex to parse username and domain
16.
Printf-compatible format for displaying fully-qualified names
2015-11-22
Printf-compatible format for displaying fully-qualified names
17.
Directory on the filesystem where SSSD should store Kerberos replay cache files.
2015-11-22
Directory on the filesystem where SSSD should store Kerberos replay cache files.
18.
Domain to add to names without a domain component.
2015-11-22
Domain to add to names without a domain component.
19.
The user to drop privileges to
2015-11-22
The user to drop privileges to
21.
All spaces in group or user names will be replaced with this character
2015-11-22
All spaces in group or user names will be replaced with this character
25.
Enumeration cache timeout length (seconds)
2015-11-22
Enumeration cache timeout length (seconds)
26.
Entry cache background update timeout length (seconds)
2015-11-22
Entry cache background update timeout length (seconds)
27.
Negative cache timeout length (seconds)
2015-11-22
Negative cache timeout length (seconds)
29.
Users that SSSD should explicitly ignore
2015-11-22
Users that SSSD should explicitly ignore
30.
Groups that SSSD should explicitly ignore
2015-11-22
Groups that SSSD should explicitly ignore
31.
Should filtered users appear in groups
2015-11-22
Should filtered users appear in groups
32.
The value of the password field the NSS provider should return
2015-11-22
The value of the password field the NSS provider should return
33.
Override homedir value from the identity provider with this value
2015-11-22
Override homedir value from the identity provider with this value
34.
Substitute empty homedir value from the identity provider with this value
2015-11-22
Substitute empty homedir value from the identity provider with this value
35.
Override shell value from the identity provider with this value
2015-11-22
Override shell value from the identity provider with this value
36.
The list of shells users are allowed to log in with
2015-11-22
The list of shells users are allowed to log in with
37.
The list of shells that will be vetoed, and replaced with the fallback shell
2015-11-22
The list of shells that will be vetoed, and replaced with the fallback shell
38.
If a shell stored in central directory is allowed but not available, use this fallback
2015-11-22
If a shell stored in central directory is allowed but not available, use this fallback
39.
Shell to use if the provider does not list one
2015-11-22
Shell to use if the provider does not list one
40.
How long will be in-memory cache records valid
2015-11-22
How long will be in-memory cache records valid
42.
How long to allow cached logins between online logins (days)
2015-11-22
How long to allow cached logins between online logins (days)
43.
How many failed logins attempts are allowed when offline
2015-11-22
How many failed logins attempts are allowed when offline
44.
How long (minutes) to deny login after offline_failed_login_attempts has been reached
2015-11-22
How long (minutes) to deny login after offline_failed_login_attempts has been reached
45.
What kind of messages are displayed to the user during authentication
2015-11-22
What kind of messages are displayed to the user during authentication
46.
Filter PAM responses sent to the pam_sss
2018-02-15
Filter PAM responses sent to the pam_sss
47.
How many seconds to keep identity information cached for PAM requests
2015-11-22
How many seconds to keep identity information cached for PAM requests
48.
How many days before password expiration a warning should be displayed
2015-11-22
How many days before password expiration a warning should be displayed
49.
List of trusted uids or user's name
2015-11-22
List of trusted uids or user's name
50.
List of domains accessible even for untrusted users.
2015-11-22
List of domains accessible even for untrusted users.
51.
Message printed when user account is expired.
2015-11-22
Message printed when user account is expired.
54.
Path to certificate database with PKCS#11 modules.
2018-02-15
Path to certificate database with PKCS#11 modules.
55.
How many seconds will pam_sss wait for p11_child to finish
2015-11-22
How many seconds will pam_sss wait for p11_child to finish
57.
Whether to evaluate the time-based attributes in sudo rules
2015-11-22
Whether to evaluate the time-based attributes in sudo rules
58.
If true, SSSD will switch back to lower-wins ordering logic
2015-11-22
If true, SSSD will switch back to lower-wins ordering logic
59.
Maximum number of rules that can be refreshed at once. If this is exceeded, full refresh is performed.
2018-02-15
Maximum number of rules that can be refreshed at once. If this is exceeded, full refresh is performed.
60.
Whether to hash host names and addresses in the known_hosts file
2015-11-22
Whether to hash host names and addresses in the known_hosts file
61.
How many seconds to keep a host in the known_hosts file after its host keys were requested
2015-11-22
How many seconds to keep a host in the known_hosts file after its host keys were requested
70.
The maximum number of secrets that can be stored per UID
2018-02-15
The maximum number of secrets that can be stored per UID