You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: js/apps/admin-ui/maven-resources/theme/keycloak.v2/admin/messages/messages_en.properties
+40-18Lines changed: 40 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ requiredUserActions=Required user actions
86
86
noConsentsText=The consents will only be recorded when users try to access a client that is configured to require consent. In that case, users will get a consent page which asks them to grant access to the client.
87
87
addStep=Add step
88
88
clientAssertionAudience=Client assertion audience
89
-
permissionPoliciesHelp=Specifies all the policies that must be applied to the scopes defined by this policy or permission.
89
+
permissionPoliciesHelp=Specifies all the policies that must be applied to the permission permission.
90
90
userInitiatedActionLifespanHelp=Maximum time before an action permit sent by a user (such as a forgot password e-mail) is expired. This value is recommended to be short because it is expected that the user would react to a self-created action quickly.
91
91
clearFileExplain=Are you sure you want to clear this file?
92
92
userModelAttribute=User model attribute
@@ -3332,7 +3332,7 @@ deleteConfirmUsers_one=Delete user {{name}}?
3332
3332
deleteConfirmUsers_other=Delete {{count}} users?
3333
3333
downloadThemeJar=Download theme JAR
3334
3334
themeColorInfo=Here you can set the patternfly color variables and create a "theme jar" file that you can download and put in your providers folder to apply the theme to your realm.
3335
-
permissionsSubTitle=Fine-grained admin permissions allow assigning detailed, specific access rights, controlling which resources and actions can be managed.
3335
+
permissionsSubTitle=Permissions control access to a resource or multiple resources of one type.
authorizationScopeDetailsSubtitle=Authorization scope is ...
3383
+
authorizationScopeDetailsSubtitle=Authorization scope defines the actions that can be performed on a resource.
3385
3384
authorizationScopeDetailsName=Name
3386
3385
authorizationScopeDetailsDescription=Description
3387
3386
authorizationScopeDetailsDescriptionText=Lorem ipsum
3388
-
applyPermissionTo=Apply persmission to
3389
-
applyPermissionToHelpText=Apply permission to helpp text
3390
3387
allResources=All resources
3391
3388
currentRealm=Current realm
3392
3389
recentlyUsed=Recently used
3393
3390
viewAll=View all
3394
3391
currentRealmExplain=This realm is selected
3395
3392
removeInvalidUsers=Remove invalid users during searches
3396
-
removeInvalidUsersHelp=Remove users from the local database if they are not available from the user storage when executing searches. If this is true, users no longer available from their corresponding user storage will be deleted from the local database whenever trying to look up users. If false, then users previously imported from the user storage will be kept in the local database, as read-only and disabled, even if that user is no longer available from the user storage. For example, user was deleted directly from LDAP or the `Users DN` is invalid. Note that this behavior will only happen when the user is not yet cached.
3393
+
removeInvalidUsersHelp=Remove users from the local database if they are not available from the user storage when executing searches. If this is true, users no longer available from their corresponding user storage will be deleted from the local database whenever trying to look up users. If false, then users previously imported from the user storage will be kept in the local database, as read-only and disabled, even if that user is no longer available from the user storage. For example, user was deleted directly from LDAP or the `Users DN` is invalid. Note that this behavior will only happen when the user is not yet cached.
3394
+
createPermissionPolicy=Create permission policy
3395
+
applyPermissionTo=Enforce access to
3396
+
applyPermissionToHelpText=Specifies the resource that the permission is applied to.
3397
+
emptyPermissionPoliciesInstructions=No policies exist in this realm.
3398
+
noPermissionSearchResultsInstructions=No permissions matched your filters.
3399
+
deleteAdminPermissionConfirm=If you delete permission {{ permission }}, administrators cannot perform the actions on resources that were defined by the permission.
3400
+
authorizationScope.Clients.configure=Performs basic management of a client
3401
+
authorizationScope.Clients.manage=Fully manages a client
3402
+
authorizationScope.Clients.map-roles=Map roles defined by this client to resources such as users and groups
3403
+
authorizationScope.Clients.map-roles-client-scope=Applies roles defined by this client to the client scope of another client
3404
+
authorizationScope.Clients.map-roles-composite=Applies roles defined by this client as a composite to another role
3405
+
authorizationScope.Clients.token-exchange=Controls which clients can exchange tokens for a token that is targeted to this client
3406
+
authorizationScope.Clients.view=Views this client
3407
+
authorizationScope.Users.impersonate=Impersonates other users
3408
+
authorizationScope.Users.manage=Manages all users in the realm
3409
+
authorizationScope.Users.manage-group-membership=Manages group membership for all users in the realm (used in conjunction with a group policy)
3410
+
authorizationScope.Users.map-roles=Maps roles for all users
3411
+
authorizationScope.Users.user-impersonated=Controls which users can be impersonated
3412
+
authorizationScope.Users.view=Views all users in the realm
3413
+
authorizationScope.Groups.manage=Manages this group
3414
+
authorizationScope.Groups.manage-members=Manages group members
3415
+
authorizationScope.Groups.manage-membership=Adds or removes group members
3416
+
authorizationScope.Groups.view=Views this group
3417
+
authorizationScope.Groups.view-members=Views group members
3418
+
authorizationScope.IdentityProviders.token-exchange=Allows clients to exchange tokens for tokens issued by this identity provider
0 commit comments