MSV FM

Path : /usr/share/locale/zh_TW/LC_MESSAGES/
File Upload :
Current < : //usr/share/locale/zh_TW/LC_MESSAGES/authconfig.mo

��(\	���N� "#(#L/p$�#�!�(!4V[du~���	�f�GIX�
��
���������_�:(?hq����x�;?+{�����
"*Mj �d�  E& @l � � � � � %� e!t!g�!�!�!"
""1"H"M"V"h"z""
�"
�"�"
�"�"!�"	#
###*#7#D#Q#V#Y#k#n#�#	�#�#�#�#R�#$$
'$5$E$hM$��$g%x%��%5	&1?&0q&,�&/�&0�&+0'!\'-~'��'�q(�@);*"R*!u*"�*#�*�*	�*�*++-+?+G+\+td+�+�+,6 ,W,h,[p,�,�,�,--'-'>-]f-�-�-L�-&...J.e.u.|.�.
�.�.�.
�.�.(�.0/0L/1}/�/�/.�/)�/[(0_�0+�061G1#\1�1�1�1�1�1�1�152 L2m2@�2*�2,�2 3+<3Th3V�3:41O4#�46�4.�4.5*:5%e5(�5*�5C�5'#6-K6/y6$�6<�657=A717:�7#�718-B87p81�8-�8+9>49?s9)�9+�9	:*):MT:O�:9�:0,;"];5�;X�;-<)=<$g<'�<)�<B�<&!=,H=.u=#�=&�=%�=>> T>1u>D�>;�>(?1E?(w?;�?D�?3!@)U@(@6�@2�@6A0IA)zAX�A(�A*&B0QB�B�B-�B��BGnC�C�CD�C4:DoD�D�D4�D+�D2E'JE�rEM@G�G�G�G�G"�G�GHH8HUHrHwH�H�H�H�H�H�H�HU�HH"I^kI�I
�I�I�IJ"Jx)J�J�J�J�JO�J	1K-;KiKvK�K�K�K�Kq�K-AL+oL�L
�L�L�L�L	�LMM3MPMjMT�M�M�M?�ML7N�N�N�N�N�N�NI�N9OlFO�O�O�O�O�OP$$PIPRPePuPzP�P�P�P�P�P�P�P
�P
Q
QQ.Q
CQ	NQXQ\QmQtQ�Q	�Q
�Q	�Q�QB�QRR)R9RIRKVR��RBSVSgfS%�S(�S T#>TbT!�T�T�T�T��T��U�TV@W(GW$pW#�W*�W�W�WXX#X6X
HXSX
hXxsX�X�X!Y73YkY{Y_�Y�Y�YZ#Z5ZKZZZDxZ�Z�ZN�Z
[*[B[\[p[
|[�[
�[�[�[
�[�[$\--\$[\-�\�\&�\*�\!]Z)]]�]!�]6^;^+T^�^�^�^�^�^"�^_6_V_u_4�_�_-�_`,`<I`A�`*�`�`!a61a*ha/�a�a�a!�a$b@Bb�b�b0�b!�bQc-cc9�c-�cC�c=d'Yd!�d�d'�d#�d.e0:e4ke�e-�e�e,�e<,f>if*�f�f!�f6gQHg/�g�g�gh!!h@Ch$�h�h0�h"�h"i<i;\i�i0�i0�i'j<j!Rj$tj5�j5�j,k$2k!Wk-yk'�k-�k�klE8l~l+�l,�l
�l�l+m|Fm6�m�mn9)n?cn�n�n�n)�n5o,Ao!no'bG8����$?Z�v/w"�ph�r�������&g�Jm����q-�!A���}��	;!���fa�����3��#`�N�jD�:�_��E� @|��%���*5�����l�c����]�e\�Y,H�
�.�(OK��d��X	�TF
u�������I���V~=R���P�#�6��B
����L��
"x�iz���U)'%��$�1WS��y��&�2������M���(79s0t>C4^��Q<�k���� n���[����{�+�o� <Tab>/<Alt-Tab> between elements   |   <Space> selects   |  <F12> next screen*<URL><b>Authentication Configuration</b><b>Local Authentication Options</b><b>Maximal Consecutive Character Repetition</b><b>Minimal Password Requirements</b><b>Other Authentication Options</b><b>Required Character Classes</b><b>Smart Card Authentication Options</b><b>User Account Configuration</b><dn><domain><lowest-highest><module><name><number><realm><server><servers><small><b>Tip:</b> Smart cards support logging into both local and centrally managed accounts.</small><small><b>Tip:</b> These checks are disabled if the value is 0.</small><small><b>Tip:</b> This is managed via /etc/security/access.conf.</small><workgroup>ADS Realm:Ad_min Servers:Admin Server:Advanced _OptionsAlertAll configuration files which were modified by the previous authentication configuration change will be restored from backup. Revert the changes?Allow offline _loginAut_hentication Method:AuthenticationAuthentication ConfigurationAuthentication module %s/pam_%s.so is missing. Authentication process might not work correctly.BackBad smart card removal action specified.Base DN:C_haracter Classes:Cache InformationCancelCard Re_moval Action:Certificate _URL:Click this button if you did not download a CA certificate yet or you have not set the CA certificate up by other means.Control how the system verifies users who attempt to log inCreate _home directories on the first loginDo not configure _NTPDo_n't SaveDomain Administrator:Domain Controllers:Domain _administrator:Domain:Download CA CertificateEnable _fingerprint reader supportEnable _local access controlEnable _smart card supportError downloading CA certificateFingerprint authentication allows you to log in by scanning your finger with the fingerprint reader.Fingerprint readerFreeIPAHashing or crypto algorithm used for storing passwords of local usersHostname or ldap:// or ldaps:// URI pointing to the LDAP server.IPA R_ealm:IPA _Domain:IPA _Server:IPAv2IPAv2 SettingsIPAv2 domain join was not successful.IPAv2 domain join was not successful. The ipa-client-install command failed with the following error:IPAv2 passwordIf the home directory of an user doesn't exist yet it will be created automatically on his first login.IgnoreInvalid LDAP URI.Join DomainJoin SettingsJoining IPA DomainJoining Winbind DomainKDC:KerberosKerberos SettingsKerberos passwordLDAPLDAP Search _Base DN:LDAP SettingsLDAP _Server:LDAP authenticationLDAP passwordLocal accounts onlyLocal authorization is sufficientLockLow_ercaseNISNIS SettingsNIS _Domain:NIS _Server:NIS passwordNextNoO_ther charactersOkPass_word OptionsPasswordPassword:R_ealm:Realm:Require smart car_d for loginRestore the configuration files backed up before the previous configuration changeRevertSa_me Class:Save SettingsSecurity Model:Server:Smart card authentication allows you to log in using a certificate and key associated with a smart card.Some of the configuration changes you've made should be saved to disk before continuing.  If you do not save them, then your attempt to join the domain may fail.  Save changes?Te_mplate Shell:Template Shell:The %s file was not found, but it is required for %s support to work properly.
Install the %s package, which provides this file.The passmaxclassrepeat option value is not an integerThe passmaxclassrepeat value must not be negativeThe passmaxrepeat option value is not an integerThe passmaxrepeat value must not be negativeThe passminclass option value is not an integerThe passminclass value must not be higher than 4The passminclass value must not be negativeThe passminlen minimum value is 6The passminlen option value is not an integerTo connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory.
Then press OK.To verify the LDAP server with TLS protocol enabled you need a CA certificate which signed the server's certificate. Please fill in the URL where the CA certificate in the PEM format can be downloaded from.Unable to initialize graphical environment. Most likely cause of failure
is that the tool was not run using a graphical environment. Please either
start your graphical user interface or set your DISPLAY variable.
Unknown password hashing algorithm specified, using sha256.Use DNS to _locate KDCs for realmsUse DNS to locate KDCs for realmsUse DNS to resolve hosts to realmsUse D_NS to resolve hosts to realmsUse Fingerprint readerUse IPAv2Use KerberosUse LDAPUse LDAP AuthenticationUse MD5 PasswordsUse NISUse Shadow PasswordsUse TLSUse Transport Layer Security extension for LDAP as defined by RFC-2830. It must not be ticked with ldaps server URI.Use WinbindUse Winbind AuthenticationUse _TLS to encrypt connectionsUse the "Join Domain" button to join the IPAv2 domain.User InformationWarningWhen enabled /etc/security/access.conf will be consulted for authorization of users access.WinbindWinbind ADS R_ealm:Winbind Domain Co_ntrollers:Winbind SettingsWinbind _Domain:Winbind authenticationWinbind domain join was not successful.Winbind domain join was not successful. The net join command failed with the following error:Winbind passwordYesYou must provide ldaps:// server address or use TLS for LDAP authentication._Digits_Download CA Certificate..._Identity & Authentication_Join Domain..._KDCs:_Length:_Password Hashing Algorithm:_Password:_Same Character:_Security Model:_Uppercase_User Account Database:action to be taken on smart card removalauthenticate system accounts by local files onlyauthenticate system accounts by network servicesauthorize local users also through remote servicecachingcan only be run as rootcheck access.conf during account authorizationconfigures winbind to allow offline loginconfigures winbind to assume that users with no domain in their user names are domain usersconfigures winbind to assume that users with no domain in their user names are not domain usersconfigures winbind to prevent offline logincreate home directories for users on their first logindefault LDAP base DNdefault LDAP server hostname or URIdefault NIS domaindefault NIS serverdefault hesiod LHSdefault hesiod RHSdefault kerberos KDCdefault kerberos admin serverdefault kerberos realmdefault realm for samba and winbind when security=adsdefault smart card module to usedialog was cancelleddisable IPAv2 for user information and authentication by defaultdisable LDAP for authentication by defaultdisable LDAP for user information by defaultdisable MD5 passwords by defaultdisable NIS for user information by defaultdisable SSSD for authentication by default (still used for supported configurations)disable SSSD for user information by default (still used for supported configurations)disable authentication with fingerprint readers by defaultdisable authentication with smart card by defaultdisable automatic per-user ecryptfsdisable caching of user credentials in SSSD by defaultdisable caching of user information by defaultdisable hesiod for user information by defaultdisable kerberos authentication by defaultdisable shadowed passwords by defaultdisable use of DNS to find kerberos KDCsdisable use of DNS to find kerberos realmsdisable use of RFC-2307bis schema for LDAP user information lookupsdisable use of TLS with LDAP (RFC-2830)disable winbind for authentication by defaultdisable winbind for user information by defaultdisable wins for hostname resolutiondisplay Back instead of Cancel in the main dialog of the TUIdo not check access.conf during account authorizationdo not create home directories for users on their first logindo not display the deprecated text user interfacedo not prefer dns over wins or nis for hostname resolutiondo not require digits in a passworddo not require lowercase characters in a passworddo not require other characters in a passworddo not require smart card for authentication by defaultdo not require uppercase characters in a passworddo not setup the NTP against the IPAv2 domaindo not start/stop portmap, ypbind, and nscddo not update the configuration files, only print new settingsenable IPAv2 for user information and authentication by defaultenable LDAP for authentication by defaultenable LDAP for user information by defaultenable MD5 passwords by defaultenable NIS for user information by defaultenable SSSD for authentication by default with manually managed configurationenable SSSD for user information by default with manually managed configurationenable authentication with fingerprint readers by defaultenable authentication with smart card by defaultenable automatic per-user ecryptfsenable caching of user credentials in SSSD by defaultenable caching of user information by default (automatically disabled when SSSD is used)enable hesiod for user information by defaultenable kerberos authentication by defaultenable shadowed passwords by defaultenable use of DNS to find kerberos KDCsenable use of DNS to find kerberos realmsenable use of RFC-2307bis schema for LDAP user information lookupsenable use of TLS with LDAP (RFC-2830)enable winbind for authentication by defaultenable winbind for user information by defaultenable wins for hostname resolutionhash/crypt algorithm for new passwordsjoin the IPAv2 domain as this accountjoin the winbind domain or ads realm now as this administratorload CA certificate from the URLlocal authorization is sufficient for local usersmaximum number of consecutive characters of same class in a passwordmaximum number of same consecutive characters in a passwordminimum length of a passwordminimum number of character classes in a passwordnames of servers to authenticate againstnever use SSSD implicitly even for supported configurationsopposite of --test, update configuration files with changed settingsprefer dns over wins or nis for hostname resolutionprobe network for defaults and print themrequire at least one digit in a passwordrequire at least one lowercase character in a passwordrequire at least one other character in a passwordrequire at least one uppercase character in a passwordrequire smart card for authentication by defaultrestore the backup of configuration filesrestore the backup of configuration files saved before the previous configuration changesave a backup of all configuration filessecurity mode to use for samba and winbindsetup the NTP against the IPAv2 domain (default)shadow passwordshow this help message and exitthe IPAv2 domain the system should be part ofthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabledthe directory which winbind-created users will have as home directoriesthe realm for the IPAv2 domainthe server for the IPAv2 domainthe shell which winbind-created users will have as their login shelluid range winbind will assign to domain or ads usersunexpected argumentupdate all configuration filesusage: %s [options]use SSSD implicitly if it supports the configurationwinbind will use Kerberos 5 to authenticatewinbind will use the default authentication methodworkgroup authentication servers are inProject-Id-Version: PACKAGE VERSION
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2016-06-17 11:35+0200
PO-Revision-Date: 2014-11-04 09:55-0500
Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>
Language-Team: Chinese (Taiwan) (http://www.transifex.com/projects/p/authconfig/language/zh_TW/)
Language: zh-TW
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=1; plural=0;
X-Generator: Zanata 3.8.4
 <Tab>/<Alt-Tab> 移動游標   |   <Space> 選取   |  <F12> 下一個畫面*<URL><b>認證設定</b><b>本機認證選項</b><b>最大連續字元重複數</b><b>最小密碼需求</b><b>其他認證選項</b><b>需求的字元型別</b><b>智慧卡認證選項</b><b>使用者帳號設定</b><dn><網域><最低-最高><模組><名稱><數字><領域><伺服器><伺服器><small><b>提示:</b>智慧卡支援登入本機與中央管理的帳號。</small><small><b>秘訣:</b>如果值為 0,會停用這些檢查。</small><small><b>提示:</b>這是透過了 /etc/security/access.conf 來進行管理的。</small><工作群組>ADS 領域:管理伺服器(_M):管理伺服器:進階選項(_O)警示所有透過先前驗證配置變更所修改的配置檔案都將會由備份復原。請問您要將變更復原嗎?允許離線登入(_L)認證方法(_H):認證認證設定找不到認證模組 %s/pam_%s.so。認證程序可能無法正確地進行。上一步指定了不正確的智慧卡移除動作。基底 DN:字元型別(_H):緩衝區資訊取消卡片移除動作(_M):憑證網址(_U):若您尚未下載 CA 憑證,或是您沒有利用其它方式來設置 CA 憑證的話,請點選此按鈕。控制系統如何驗證欲登入的使用者第一次進行登入時建立家目錄(_H)不要設定 _NTP不儲存(_N)網域管理員:網域控制器:網域管理員(_A):網域:下載 CA 憑證啟用指紋掃描器支援(_F)啟用本機存取控制(_L)啟用智慧卡支援(_S)下載 CA 憑證時發生錯誤指紋驗證能讓您透過使用指紋讀取器掃描您的指紋來進行登入。指紋讀取器FreeIPA使用於儲存本機使用者密碼的雜湊或加密演算法指向了 LDAP 伺服器的主機名稱或是 ldap:// 或是 ldaps:// URI。IPA 領域(_E):IPA 網域(_D):IPA 伺服器(_S):IPAv2IPAv2 設定值IPAv2 網域結合失敗。IPAv2 網域結合失敗。ipa-client-install 指令失敗,錯誤為:IPAv2 密碼若某個使用者的家目錄不存在的話,這將會在該使用者第一次登入時被自動建立。忽略不合乎規定的 LDAP URI。結合網域結合設定值結合 IPA 網域正在結合 Winbind 網域Kerberos 機碼配送中心 (KDC):KerberosKerberos 設定值Kerberos 密碼LDAPLDAP 查詢 Base DN(_B):LDAP 設定值LDAP 伺服器(_S):LDAP 認證LDAP 密碼唯有本機帳號本機認證即可鎖定小寫(_E)NISNIS 設定值NIS 網域(_D):NIS 伺服器(_S):NIS 密碼下一步否其他字元(_T)確定密碼選項(_W)密碼密碼:領域(_E):領域:登入時需要智慧卡(_D)在進行先前的配置變更前,先復原備份的配置檔案復原相同型別(_M):儲存設定值安全模型:伺服器:智慧卡身份認證能讓您使用智慧卡的認證與金鑰來登入。在繼續之前,必須儲存您所做的設定變更到磁碟中,假如不儲存的話,當您試著加入網域時將會失敗。是否要儲存變更?範本 Shell(_M):模板 Shell:找不到 %s 檔案,不過 %s 需要它才能順利執行。
請安裝提供此檔案的 %s 套件。passmaxclassrepeat 選項值非數字passmaxclassrepeat 的值必須為正數passmaxrepeat 選項值非數字passmaxrepeat 的值必須為正數passminclass 選項值非數字passminclass 的值不能大於 4passminclass 必須為負值passminlen 的最小值為 6passminlen 選項值非數字要使用 TLS 連上 LDAP 伺服器,您需要一個簽署您伺服器認證的 CA 認證。請將 PEM 格式的認證複製到「%s」目錄。
然後按下「確定」。若要驗證啟用了 TLS 通訊協定的 LDAP 伺服器,您將需要一個簽署您伺服器認證的 CA 憑證。請填入可下載 PEM 格式的 CA 憑證的 URL。無法初始化圖形環境。導致失敗的原因很可能
是該工具不是採用圖形環境執行。請啟動您的
圖形使用者界面或設定您的 DISPLAY 變數。
指定了不明的密碼雜湊演算法則,使用了 sha256。使用 DNS 來定位領域中的 KDC(_L)使用 DNS 來定位領域中的 KDC使用 DNS 將主機解析為領域使用 DNS 來將主機解析為領域(_N)使用指紋讀取器使用 IPAv2使用 Kerberos使用 LDAP使用 LDAP 認證使用 MD5 密碼使用 NIS使用 Shadow 密碼使用 TLS請依照 RFC-2830 所指定地來使用 LDAP 的傳輸層安全性延伸。請勿將它勾選為 ldaps 伺服器 URI。使用 Winbind使用 Winbind 認證使用 TLS 來為連線加密(_T)使用「結合網域」按鈕來加入 IPAv2 網域。使用者資訊警告當啟用時,/etc/security/access.conf 將會被檢查來進行使用者存取上的認證。WinbindWinbind ADS 領域(_E):Winbind 網域控制器(_N):Winbind 設定值Winbind 網域(_D):Winbind 認證Winbind 網域結合失敗。Winbind 網域結合失敗。網路結合指令失敗,錯誤為:Winbind 密碼是您必須提供 ldaps:// 伺服器位址或使用 TLS 以進行 LDAP 認證。數字(_D)下載 CA 憑證(_D)…辨識身份和認證(_I)結合網域(_J)…KDCs(_K):長度(_L):密碼雜湊演算法(_P):密碼(_P):相同字元(_S):安全模型(_S):大寫(_U)使用者帳號資料庫(_U):智慧卡移除時所採取的動作僅供本機檔案使用的認證系統帳號網路服務用的認證系統帳號本機使用者也要通過遠端服務認證快取只能由系統管理者 (root) 執行在進行帳號驗證時檢查 access.conf設定 winbind 允許離線登入設定 winbind 以假設使用者名稱不含網域資訊的使用者為網域的使用者設定 winbind 以假設使用者名稱不含網域資訊的使用者非為網域的使用者設定 winbind 避免離線登入當使用者第一次登入時為他們建立家目錄預設的 LDAP 基底 DN預設的 LDAP 伺服器主機名稱或 URI預設 NIS 網域預設 NIS 伺服器預設 hesiod LHS預設 hesiod RHS預設的 kerberos KDC預設的 kerberos 管理伺服器預設的 kerberos 領域當 security=ads 時 samba 與 winbind 的預設領域預設使用的智慧卡模組對話窗已取消就預設值停用使用者資訊與認證的 IPAv2 預設停用 LDAP 認證預設停用 LDAP 作為使用者資訊來源預設停用 MD5 密碼預設停用 NIS 作為使用者資訊來源預設停用透過 SSSD 驗證 (仍對支援的組態使用)預設停用使用者資訊的 SSSD (仍然用於支援的組態)預設停用透過指紋掃描器的認證預設停用智慧卡認證停用自動各使用者 ecryptfs預設停用對 SSSD 中的使用者憑證進行快起預設停用對使用者資訊進行快取預設停用 hesiod 作為使用者資訊來源預設停用 kerberos 認證預設停用 Shadow 密碼不使用 DNS 搜尋 kerberos KDC不使用 DNS 搜尋 kerberos 領域停用使用於 LDAP 使用者資訊搜尋的 RFC-2307bis schema停用 LDAP (RFC-2830) 的 TLS預設停用 winbind 認證預設停用 winbind 作為使用者資訊來源停用 wins 作主機名稱解析在文字使用者介面的主對話窗視顯示「上一步」而非「取消」不在進行帳號驗證時檢查 access.conf當使用者第一次登入時不為他們建立家目錄不要顯示已過時的文字使用者介面不使用 dns 而是使用 wins 或 nis 來作為主機名稱解析密碼中無需使用數字密碼中無需使用小寫字母字元密碼中無需使用其他字元預設不需智慧卡認證密碼中無需使用大寫字母字元不針對於 IPAv2 區域設定 NTP請勿啟用/停用 portmap、 ypbind 和 nscd不要更新設定檔,只列出新的設定值就預設值啟用使用者資訊與認證的 IPAv2 預設啟用 LDAP 認證預設啟用 LDAP 作為使用者資訊來源預設啟用 MD5 密碼預設啟用 NIS 作為使用者資訊來源預設以手動管理的組態來啟用 SSSD 以進行認證預設以手動管理的組態來啟用使用者資訊的 SSSD預設啟用透過指紋掃描器的認證預設啟用智慧卡認證啟用自動各使用者 ecryptfs預設啟用對 SSSD 中的使用者憑證進行快取預設啟用對使用者資訊進行快取 (當使用 SSSD 時將會自動停用)預設啟用 hesiod 作為使用者資訊來源預設啟用 kerberos 認證預設啟用 Shadow 密碼使用 DNS 搜尋 kerberos KDC使用 DNS 搜尋 kerberos 領域啟用使用於 LDAP 使用者資訊搜尋的 RFC-2307bis schema啟用 LDAP (RFC-2830) 並使用 TLS預設啟用 winbind 認證預設啟用 winbind 作為使用者資訊來源啟用 wins 作主機名稱解析 新密碼的雜湊/加密演算法以此帳號加入 IPAv2 區域現在以管理員身份結合 winbind 網域或 ads 領域從網址載入 CA 憑證對本機使用者使用本機認證即已足夠密碼中連續的相同型別字元的最大數密碼中相同連續字元的最大數密碼的最小長度密碼中字元型別的最小數用來比對認證的伺服器名稱即使用於支援的組態也絕不隱含使用 SSSD與 --test 選項相反,將改動更新到設定值使用 wins 或 nis 作為主機名稱解析探測預設的網路然後列出來密碼中需要至少一個數字密碼中需要至少一個小寫字母字元密碼中需要至少一個其他字元密碼中需要至少一個大寫字母字元預設需要智慧卡認證復原所有備份的設定檔在進行先前的配置變更前復原所有儲存的備份設定檔備份所有設定檔用於 samba 與 winbind 的安全性模式針對於 IPAv2 區域設定 NTP (預設值)shadow 密碼顯示此幫助訊息並離開系統應屬於其一部分的 IPAv2 區域當停用 winbindusedefaultdomain 時,用來分隔由 winbind 建立之使用者名稱的網域與使用者部份的字元將成為由 winbind 所建立之使用者的家目錄IPAv2 網域的領域IPAv2 網域的伺服器將成為由 winbind 所建立之使用者的登入 shelluid 範圍的 winbind 將會指派給網域或 ads 的使用者非預期的參數更新所有組態檔用法:%s [選項]如果它支援組態就隱含使用 SSSDwinbind 會使用 Kerberos 5 作為身份認證方法winbind 會使用預設的身份認證方法工作群組認證伺服器是在
jlklyejr@51.89.254.255: ~ $