admin-messages_de.properties 115 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627
  1. consoleTitle=Keycloak Admin Konsole
  2. # Common messages
  3. enabled=Aktiv
  4. hidden=Versteckt
  5. link-only-column=Nur Link
  6. name=Name
  7. displayName=Anzeigename
  8. displayNameHtml=HTML-Anzeigename
  9. save=Speichern
  10. cancel=Abbrechen
  11. onText=EIN
  12. offText=AUS
  13. client=Client
  14. clients=Clients
  15. clear=Zur\u00FCcksetzen
  16. selectOne=Bitte w\u00E4hlen...
  17. true=Ja
  18. false=Nein
  19. endpoints=Endpoints
  20. dateFormat=dd.MM.yyyy
  21. timeFormat=HH:mm:ss
  22. # Realm settings
  23. realm-detail.enabled.tooltip=Benutzer und Clients k\u00F6nnen das Realm nur verwenden, wenn es aktiviert ist
  24. #realm-detail.oidc-endpoints.tooltip=Shows the configuration of the OpenID Connect endpoints
  25. #realm-detail.userManagedAccess.tooltip=If enabled, users are allowed to manage their resources and permissions using the Account Management Console.
  26. #userManagedAccess=User-Managed Access
  27. registrationAllowed=Benutzerregistrierung
  28. registrationAllowed.tooltip=Aktiviere/deaktiviere die Seite zur Benutzerregistrierung. Auf der Loginseite wird ein entsprechender Link angezeigt.
  29. registrationEmailAsUsername=E-Mail-Adresse als Benutzername
  30. registrationEmailAsUsername.tooltip=Wenn aktiviert, wird das Feld "Benutzername" auf der Registrierungsformular nicht angezeigt und als Benutzername wird stattdessen die E-Mail verwendet.
  31. editUsernameAllowed=Benutzername editierbar
  32. editUsernameAllowed.tooltip=Wenn aktiv, kann der Benutzername editiert werden.
  33. resetPasswordAllowed=Passwort-Vergessen
  34. resetPasswordAllowed.tooltip=Zeigt einen Link auf der Loginseite, auf den die Benutzer klicken k\u00F6nnen, wenn sie ihr Passwort vergessen haben.
  35. rememberMe=Angemeldet bleiben
  36. rememberMe.tooltip=Zeigt eine Auswahlbox auf der Loginseite, die es dem Benutzer erlaubt, zwischen Browser-Neustarts eingeloggt zu bleiben, bis die Session abl\u00E4uft.
  37. #loginWithEmailAllowed=Login with email
  38. #loginWithEmailAllowed.tooltip=Allow users to log in with their email address.
  39. #duplicateEmailsAllowed=Duplicate emails
  40. #duplicateEmailsAllowed.tooltip=Allow multiple users to have the same email address. Changing this setting will also clear the users cache. It is recommended to manually update email constraints of existing users in the database after switching off support for duplicate email addresses.
  41. verifyEmail=E-Mail verifizieren
  42. #verifyEmail.tooltip=Require users to verify their email address after initial login or after address changes are submitted.
  43. #sslRequired=Require SSL
  44. #sslRequired.option.all=all requests
  45. #sslRequired.option.external=external requests
  46. #sslRequired.option.none=none
  47. #sslRequired.tooltip=Is HTTPS required? 'None' means HTTPS is not required for any client IP address. 'External requests' means localhost and private IP addresses can access without HTTPS. 'All requests' means HTTPS is required for all IP addresses.
  48. #publicKeys=Public keys
  49. #publicKey=Public key
  50. #privateKey=Private key
  51. #gen-new-keys=Generate new keys
  52. certificate=Zertifikat
  53. host=Host
  54. smtp-host=SMTP Host
  55. port=Port
  56. smtp-port=SMTP Port (Standardwert ist 25)
  57. from=Von
  58. #fromDisplayName=From Display Name
  59. #fromDisplayName.tooltip=A user-friendly name for the 'From' address (optional).
  60. #replyTo=Reply To
  61. #replyToDisplayName=Reply To Display Name
  62. #replyToDisplayName.tooltip=A user-friendly name for the 'Reply-To' address (optional).
  63. #envelopeFrom=Envelope From
  64. #envelopeFrom.tooltip=An email address used for bounces (optional).
  65. sender-email-addr=E-Mail-Adresse des Absenders
  66. #sender-email-addr-display=Display Name for Sender Email Address
  67. #reply-to-email-addr=Reply To Email Address
  68. #reply-to-email-addr-display=Display Name for Reply To Email Address
  69. #sender-envelope-email-addr=Sender Envelope Email Address
  70. enable-ssl=SSL aktivieren
  71. #enable-start-tls=Enable StartTLS
  72. #enable-auth=Enable Authentication
  73. username=Benutzername
  74. login-username=Login Benutzername
  75. password=Passwort
  76. login-password=Login Passwort
  77. #login-theme=Login Theme
  78. #login-theme.tooltip=Select theme for login, OTP, grant, registration, and forgot password pages.
  79. #account-theme=Account Theme
  80. #account-theme.tooltip=Select theme for user account management pages.
  81. #admin-console-theme=Admin Console Theme
  82. #select-theme-admin-console=Select theme for admin console.
  83. #email-theme=Email Theme
  84. #select-theme-email=Select theme for emails that are sent by the server.
  85. i18n-enabled=Internationalisierung aktiv
  86. supported-locales=Unterst\u00FCtzte Sprachen
  87. #supported-locales.placeholder=Type a locale and enter
  88. #default-locale=Default Locale
  89. localization-upload-file=Hochladen einer JSON Datei mit Lokalisierungstexten
  90. missing-locale=Locale fehlt.
  91. missing-file=Datei fehlt. Bitte eine Datei f\u00FCr den Upload ausw\u00E4hlen.
  92. localization-file.upload.success=Die Internationalisierungstexte wurden importiert.
  93. localization-file.upload.error=Die Datei konnte nicht hochgeladen werden. Bitte \u00FCberpr\u00FCfen Sie die Datei.
  94. localization-show=Realm-spezifische Lokalisierungstexte
  95. no-localizations-configured=Es sind zur Zeit keine realm-spezifischen Lokalisierungstexte vorhanden.
  96. add-localization-text=Lokalisierungstext hinzuf\u00FCgen
  97. locale.create.success=Die Locale wurde ertellt.
  98. localization-text.create.success=Der Lokalisierungstext wurde erstellt.
  99. localization-text.update.success=Der Lokalisierungstext wurde aktualisiert.
  100. localization-text.remove.success=Der Lokalisierungstext wurde gel\u00F6scht.
  101. #realm-cache-clear=Realm Cache
  102. #realm-cache-clear.tooltip=Clears all entries from the realm cache (this will clear entries for all realms)
  103. #user-cache-clear=User Cache
  104. #user-cache-clear.tooltip=Clears all entries from the user cache (this will clear entries for all realms)
  105. #keys-cache-clear=Keys Cache
  106. #keys-cache-clear.tooltip=Clears all entries from the cache of external public keys. These are keys of external clients or identity providers. (this will clear entries for all realms)
  107. #revoke-refresh-token=Revoke Refresh Token
  108. #revoke-refresh-token.tooltip=If enabled a refresh token can only be used up to 'Refresh Token Max Reuse' and is revoked when a different token is used. Otherwise refresh tokens are not revoked when used and can be used multiple times.
  109. #refresh-token-max-reuse=Refresh Token Max Reuse
  110. #refresh-token-max-reuse.tooltip=Maximum number of times a refresh token can be reused. When a different token is used, revocation is immediate.
  111. #sso-session-idle=SSO Session Idle
  112. seconds=Sekunden
  113. minutes=Minuten
  114. hours=Stunden
  115. days=Tage
  116. #sso-session-max=SSO Session Max
  117. #sso-session-idle.tooltip=Time a session is allowed to be idle before it expires. Tokens and browser sessions are invalidated when a session is expired.
  118. #sso-session-max.tooltip=Max time before a session is expired. Tokens and browser sessions are invalidated when a session is expired.
  119. #offline-session-idle=Offline Session Idle
  120. #offline-session-idle.tooltip=Time an offline session is allowed to be idle before it expires. You need to use offline token to refresh at least once within this period, otherwise offline session will expire.
  121. #realm-detail.hostname=Hostname
  122. #realm-detail.hostname.tooltip=Set the hostname for the realm. Use in combination with the fixed hostname provider to override the server hostname for a specific realm.
  123. ## KEYCLOAK-7688 Offline Session Max for Offline Token
  124. #offline-session-max-limited=Offline Session Max Limited
  125. #offline-session-max-limited.tooltip=Enable Offline Session Max.
  126. #offline-session-max=Offline Session Max
  127. #offline-session-max.tooltip=Max time before an offline session is expired regardless of activity.
  128. #access-token-lifespan=Access Token Lifespan
  129. #access-token-lifespan.tooltip=Max time before an access token is expired. This value is recommended to be short relative to the SSO timeout.
  130. #access-token-lifespan-for-implicit-flow=Access Token Lifespan For Implicit Flow
  131. #access-token-lifespan-for-implicit-flow.tooltip=Max time before an access token issued during OpenID Connect Implicit Flow is expired. This value is recommended to be shorter than SSO timeout. There is no possibility to refresh token during implicit flow, that's why there is separate timeout different to 'Access Token Lifespan'.
  132. #action-token-generated-by-admin-lifespan=Default Admin-Initiated Action Lifespan
  133. #action-token-generated-by-admin-lifespan.tooltip=Maximum time before an action permit sent to a user by admin is expired. This value is recommended to be long to allow admins send e-mails for users that are currently offline. The default timeout can be overridden right before issuing the token.
  134. #action-token-generated-by-user-lifespan=User-Initiated Action Lifespan
  135. #action-token-generated-by-user-lifespan.tooltip=Maximum time before an action permit sent by a user (e.g. forgot password e-mail) is expired. This value is recommended to be short because it is expected that the user would react to self-created action quickly.
  136. #action-token-generated-by-user.execute-actions=Execute Actions
  137. #action-token-generated-by-user.idp-verify-account-via-email=IdP Account E-mail Verification
  138. #action-token-generated-by-user.reset-credentials=Forgot Password
  139. #action-token-generated-by-user.verify-email=E-mail Verification
  140. #action-token-generated-by-user.tooltip=Override default settings of maximum time before an action permit sent by a user (e.g. forgot password e-mail) is expired for specific action. This value is recommended to be short because it is expected that the user would react to self-created action quickly.
  141. #action-token-generated-by-user.reset=Reset
  142. #action-token-generated-by-user.operation=Override User-Initiated Action Lifespan
  143. #client-login-timeout=Client login timeout
  144. #client-login-timeout.tooltip=Max time a client has to finish the access token protocol. This should normally be 1 minute.
  145. #login-timeout=Login timeout
  146. #login-timeout.tooltip=Max time a user has to complete a login. This is recommended to be relatively long. 30 minutes or more.
  147. #login-action-timeout=Login action timeout
  148. #login-action-timeout.tooltip=Max time a user has to complete login related actions like update password or configure totp. This is recommended to be relatively long. 5 minutes or more.
  149. #headers=Headers
  150. #brute-force-detection=Brute Force Detection
  151. #x-frame-options=X-Frame-Options
  152. #x-frame-options-tooltip=Default value prevents pages from being included via non-origin iframes (click label for more information)
  153. #content-sec-policy=Content-Security-Policy
  154. #content-sec-policy-tooltip=Default value prevents pages from being included via non-origin iframes (click label for more information)
  155. #content-type-options=X-Content-Type-Options
  156. #content-type-options-tooltip=Default value prevents Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type (click label for more information)
  157. #robots-tag=X-Robots-Tag
  158. #robots-tag-tooltip=Prevent pages from appearing in search engines (click label for more information)
  159. #x-xss-protection=X-XSS-Protection
  160. #x-xss-protection-tooltip=This header configures the Cross-site scripting (XSS) filter in your browser. Using the default behavior, the browser will prevent rendering of the page when a XSS attack is detected (click label for more information)
  161. #strict-transport-security=HTTP Strict Transport Security (HSTS)
  162. #strict-transport-security-tooltip=The Strict-Transport-Security HTTP header tells browsers to always use HTTPS. Once a browser sees this header, it will only visit the site over HTTPS for the time specified (1 year) at max-age, including the subdomains.
  163. #permanent-lockout=Permanent Lockout
  164. #permanent-lockout.tooltip=Lock the user permanently when the user exceeds the maximum login failures.
  165. #max-login-failures=Max Login Failures
  166. #max-login-failures.tooltip=How many failures before wait is triggered.
  167. #wait-increment=Wait Increment
  168. #wait-increment.tooltip=When failure threshold has been met, how much time should the user be locked out?
  169. #quick-login-check-millis=Quick Login Check Milli Seconds
  170. #quick-login-check-millis.tooltip=If a failure happens concurrently too quickly, lock out the user.
  171. #min-quick-login-wait=Minimum Quick Login Wait
  172. #min-quick-login-wait.tooltip=How long to wait after a quick login failure.
  173. #max-wait=Max Wait
  174. #max-wait.tooltip=Max time a user will be locked out.
  175. #failure-reset-time=Failure Reset Time
  176. #failure-reset-time.tooltip=When will failure count be reset?
  177. #realm-tab-login=Login
  178. #realm-tab-keys=Keys
  179. #realm-tab-email=Email
  180. #realm-tab-themes=Themes
  181. realm-tab-localization=Internationalisierung
  182. #realm-tab-cache=Cache
  183. #realm-tab-tokens=Tokens
  184. #realm-tab-client-registration=Client Registration
  185. #realm-tab-security-defenses=Security Defenses
  186. #realm-tab-general=General
  187. #add-realm=Add realm
  188. #Session settings
  189. realm-sessions=Realm-Sessions
  190. #revocation=Revocation
  191. logout-all=Alle ausloggen
  192. active-sessions=Aktive Sessions
  193. offline-sessions=Offline-Sessions
  194. sessions=Sessions
  195. #not-before=Not Before
  196. #not-before.tooltip=Revoke any tokens issued before this date.
  197. #set-to-now=Set to now
  198. #push=Push
  199. #push.tooltip=For every client that has an admin URL, notify them of the new revocation policy.
  200. #Protocol Mapper
  201. #usermodel.prop.label=Property
  202. #usermodel.prop.tooltip=Name of the property method in the UserModel interface. For example, a value of 'email' would reference the UserModel.getEmail() method.
  203. #usermodel.attr.label=User Attribute
  204. #usermodel.attr.tooltip=Name of stored user attribute which is the name of an attribute within the UserModel.attribute map.
  205. #userSession.modelNote.label=User Session Note
  206. #userSession.modelNote.tooltip=Name of stored user session note within the UserSessionModel.note map.
  207. #multivalued.label=Multivalued
  208. #multivalued.tooltip=Indicates if attribute supports multiple values. If true, then the list of all values of this attribute will be set as claim. If false, then just first value will be set as claim
  209. #selectRole.label=Select Role
  210. #selectRole.tooltip=Enter role in the textbox to the left, or click this button to browse and select the role you want.
  211. #tokenClaimName.label=Token Claim Name
  212. #tokenClaimName.tooltip=Name of the claim to insert into the token. This can be a fully qualified name like 'address.street'. In this case, a nested json object will be created. To prevent nesting and use dot literally, escape the dot with backslash (\\.).
  213. #jsonType.label=Claim JSON Type
  214. #jsonType.tooltip=JSON type that should be used to populate the json claim in the token. long, int, boolean, and String are valid values.
  215. #includeInIdToken.label=Add to ID token
  216. #includeInIdToken.tooltip=Should the claim be added to the ID token?
  217. #includeInAccessToken.label=Add to access token
  218. #includeInAccessToken.tooltip=Should the claim be added to the access token?
  219. #includeInUserInfo.label=Add to userinfo
  220. #includeInUserInfo.tooltip=Should the claim be added to the userinfo?
  221. #usermodel.clientRoleMapping.clientId.label=Client ID
  222. #usermodel.clientRoleMapping.clientId.tooltip=Client ID for role mappings
  223. #usermodel.clientRoleMapping.rolePrefix.label=Client Role prefix
  224. #usermodel.clientRoleMapping.rolePrefix.tooltip=A prefix for each client role (optional).
  225. #usermodel.realmRoleMapping.rolePrefix.label=Realm Role prefix
  226. #usermodel.realmRoleMapping.rolePrefix.tooltip=A prefix for each Realm Role (optional).
  227. #sectorIdentifierUri.label=Sector Identifier URI
  228. #sectorIdentifierUri.tooltip=Providers that use pairwise sub values and support Dynamic Client Registration SHOULD use the sector_identifier_uri parameter. It provides a way for a group of websites under common administrative control to have consistent pairwise sub values independent of the individual domain names. It also provides a way for Clients to change redirect_uri domains without having to reregister all of their users.
  229. #pairwiseSubAlgorithmSalt.label=Salt
  230. #pairwiseSubAlgorithmSalt.tooltip=Salt used when calculating the pairwise subject identifier. If left blank, a salt will be generated.
  231. #addressClaim.street.label=User Attribute Name for Street
  232. #addressClaim.street.tooltip=Name of User Attribute, which will be used to map to 'street_address' subclaim inside 'address' token claim. Defaults to 'street' .
  233. #addressClaim.locality.label=User Attribute Name for Locality
  234. #addressClaim.locality.tooltip=Name of User Attribute, which will be used to map to 'locality' subclaim inside 'address' token claim. Defaults to 'locality' .
  235. #addressClaim.region.label=User Attribute Name for Region
  236. #addressClaim.region.tooltip=Name of User Attribute, which will be used to map to 'region' subclaim inside 'address' token claim. Defaults to 'region' .
  237. #addressClaim.postal_code.label=User Attribute Name for Postal Code
  238. #addressClaim.postal_code.tooltip=Name of User Attribute, which will be used to map to 'postal_code' subclaim inside 'address' token claim. Defaults to 'postal_code' .
  239. #addressClaim.country.label=User Attribute Name for Country
  240. #addressClaim.country.tooltip=Name of User Attribute, which will be used to map to 'country' subclaim inside 'address' token claim. Defaults to 'country' .
  241. #addressClaim.formatted.label=User Attribute Name for Formatted Address
  242. #addressClaim.formatted.tooltip=Name of User Attribute, which will be used to map to 'formatted' subclaim inside 'address' token claim. Defaults to 'formatted' .
  243. # client details
  244. #clients.tooltip=Clients are trusted browser apps and web services in a realm. These clients can request a login. You can also define client specific roles.
  245. search.placeholder=Suchen...
  246. create=Erstellen
  247. import=Importieren
  248. client-id=Client-ID
  249. base-url=Basis-URL
  250. actions=Aktionen
  251. not-defined=Nicht definiert
  252. edit=Bearbeiten
  253. delete=L\u00F6schen
  254. no-results=Keine Resultate
  255. no-clients-available=Keine Clients verf\u00FCgbar
  256. add-client=Client hinzuf\u00FCgen
  257. #select-file=Select file
  258. #view-details=View details
  259. #clear-import=Clear import
  260. #client-id.tooltip=Specifies ID referenced in URI and tokens. For example 'my-client'. For SAML this is also the expected issuer value from authn requests
  261. #client.name.tooltip=Specifies display name of the client. For example 'My Client'. Supports keys for localized values as well. For example\: ${my_client}
  262. #client.enabled.tooltip=Disabled clients cannot initiate a login or have obtain access tokens.
  263. #consent-required=Consent Required
  264. #consent-required.tooltip=If enabled users have to consent to client access.
  265. #client.display-on-consent-screen=Display Client On Consent Screen
  266. #client.display-on-consent-screen.tooltip=Applicable just if Consent Required is on. If this switch is off, then consent screen will contain just the consents corresponding to configured client scopes. If on, then there will be also one item on consent screen about this client itself
  267. #client.consent-screen-text=Client Consent Screen Text
  268. #client.consent-screen-text.tooltip=Applicable just if 'Display Client On Consent Screen' is on for this client. Contains the text, which will be on consent screen about permissions specific just for this client
  269. #client-protocol=Client Protocol
  270. #client-protocol.tooltip='OpenID connect' allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server.'SAML' enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO) and uses security tokens containing assertions to pass information.
  271. #access-type=Access Type
  272. #access-type.tooltip='Confidential' clients require a secret to initiate login protocol. 'Public' clients do not require a secret. 'Bearer-only' clients are web services that never initiate a login.
  273. #standard-flow-enabled=Standard Flow Enabled
  274. #standard-flow-enabled.tooltip=This enables standard OpenID Connect redirect based authentication with authorization code. In terms of OpenID Connect or OAuth2 specifications, this enables support of 'Authorization Code Flow' for this client.
  275. #implicit-flow-enabled=Implicit Flow Enabled
  276. #implicit-flow-enabled.tooltip=This enables support for OpenID Connect redirect based authentication without authorization code. In terms of OpenID Connect or OAuth2 specifications, this enables support of 'Implicit Flow' for this client.
  277. #direct-access-grants-enabled=Direct Access Grants Enabled
  278. #direct-access-grants-enabled.tooltip=This enables support for Direct Access Grants, which means that client has access to username/password of user and exchange it directly with Keycloak server for access token. In terms of OAuth2 specification, this enables support of 'Resource Owner Password Credentials Grant' for this client.
  279. #service-accounts-enabled=Service Accounts Enabled
  280. #service-accounts-enabled.tooltip=Allows you to authenticate this client to Keycloak and retrieve access token dedicated to this client. In terms of OAuth2 specification, this enables support of 'Client Credentials Grant' for this client.
  281. #include-authnstatement=Include AuthnStatement
  282. #include-authnstatement.tooltip=Should a statement specifying the method and timestamp be included in login responses?
  283. #include-onetimeuse-condition=Include OneTimeUse Condition
  284. #include-onetimeuse-condition.tooltip=Should a OneTimeUse Condition be included in login responses?
  285. #sign-documents=Sign Documents
  286. #sign-documents.tooltip=Should SAML documents be signed by the realm?
  287. #sign-documents-redirect-enable-key-info-ext=Optimize REDIRECT signing key lookup
  288. #sign-documents-redirect-enable-key-info-ext.tooltip=When signing SAML documents in REDIRECT binding for SP that is secured by Keycloak adapter, should the ID of the signing key be included in SAML protocol message in <Extensions> element? This optimizes validation of the signature as the validating party uses a single key instead of trying every known key for validation.
  289. #sign-assertions=Sign Assertions
  290. #sign-assertions.tooltip=Should assertions inside SAML documents be signed? This setting isn't needed if document is already being signed.
  291. #signature-algorithm=Signature Algorithm
  292. #signature-algorithm.tooltip=The signature algorithm to use to sign documents.
  293. #canonicalization-method=Canonicalization Method
  294. #canonicalization-method.tooltip=Canonicalization Method for XML signatures.
  295. #encrypt-assertions=Encrypt Assertions
  296. #encrypt-assertions.tooltip=Should SAML assertions be encrypted with client's public key using AES?
  297. #client-signature-required=Client Signature Required
  298. #client-signature-required.tooltip=Will the client sign their saml requests and responses? And should they be validated?
  299. #force-post-binding=Force POST Binding
  300. #force-post-binding.tooltip=Always use POST binding for responses.
  301. #front-channel-logout=Front Channel Logout
  302. #front-channel-logout.tooltip=When true, logout requires a browser redirect to client. When false, server performs a background invocation for logout.
  303. #force-name-id-format=Force Name ID Format
  304. #force-name-id-format.tooltip=Ignore requested NameID subject format and use admin console configured one.
  305. #name-id-format=Name ID Format
  306. #name-id-format.tooltip=The name ID format to use for the subject.
  307. #root-url=Root URL
  308. #root-url.tooltip=Root URL appended to relative URLs
  309. #valid-redirect-uris=Valid Redirect URIs
  310. #valid-redirect-uris.tooltip=Valid URI pattern a browser can redirect to after a successful login or logout. Simple wildcards are allowed i.e. 'http://example.com/*'. Relative path can be specified too i.e. /my/relative/path/*. Relative paths are relative to the client root URL, or if none is specified the auth server root URL is used. For SAML, you must set valid URI patterns if you are relying on the consumer service URL embedded with the login request.
  311. #base-url.tooltip=Default URL to use when the auth server needs to redirect or link back to the client.
  312. #admin-url=Admin URL
  313. #admin-url.tooltip=URL to the admin interface of the client. Set this if the client supports the adapter REST API. This REST API allows the auth server to push revocation policies and other administrative tasks. Usually this is set to the base URL of the client.
  314. #master-saml-processing-url=Master SAML Processing URL
  315. #master-saml-processing-url.tooltip=If configured, this URL will be used for every binding to both the SP's Assertion Consumer and Single Logout Services. This can be individually overiden for each binding and service in the Fine Grain SAML Endpoint Configuration.
  316. #idp-sso-url-ref=IDP Initiated SSO URL Name
  317. #idp-sso-url-ref.tooltip=URL fragment name to reference client when you want to do IDP Initiated SSO. Leaving this empty will disable IDP Initiated SSO. The URL you will reference from your browser will be: {server-root}/realms/{realm}/protocol/saml/clients/{client-url-name}
  318. #idp-sso-url-ref.urlhint=Target IDP initiated SSO URL:
  319. #idp-sso-relay-state=IDP Initiated SSO Relay State
  320. #idp-sso-relay-state.tooltip=Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
  321. web-origins=Web Origins
  322. web-origins.tooltip=Erlaubte CORS Origins. Um alle Origins der Valid Redirect URIs zu erlauben, f\u00FCgen Sie ein '+' hinzu. Dabei wird der '*' Platzhalter nicht mit \u00FCbernommen. Um alle Origins zu erlauben, geben Sie explizit einen Eintrag mit '*' an.
  323. #fine-oidc-endpoint-conf=Fine Grain OpenID Connect Configuration
  324. #fine-oidc-endpoint-conf.tooltip=Expand this section to configure advanced settings of this client related to OpenID Connect protocol
  325. #user-info-signed-response-alg=User Info Signed Response Algorithm
  326. #user-info-signed-response-alg.tooltip=JWA algorithm used for signed User Info Endpoint response. If set to 'unsigned', then User Info Response won't be signed and will be returned in application/json format.
  327. #request-object-signature-alg=Request Object Signature Algorithm
  328. #request-object-signature-alg.tooltip=JWA algorithm, which client needs to use when sending OIDC request object specified by 'request' or 'request_uri' parameters. If set to 'any', then Request object can be signed by any algorithm (including 'none' ).
  329. #request-object-required=Request Object Required
  330. #request-object-required-alg.tooltip=Specifies if the client needs to provide a request object with their authorization requests, and what method they can use for this. If set to "not required", providing a request object is optional. In all other cases providing a request object is mandatory. If set to "request", the request object must be provided by value. If set to "request_uri", the request object must be provided by reference. If set to "request or request_uri", either method can be used.
  331. #fine-saml-endpoint-conf=Fine Grain SAML Endpoint Configuration
  332. #fine-saml-endpoint-conf.tooltip=Expand this section to configure exact URLs for Assertion Consumer and Single Logout Service.
  333. #assertion-consumer-post-binding-url=Assertion Consumer Service POST Binding URL
  334. #assertion-consumer-post-binding-url.tooltip=SAML POST Binding URL for the client's assertion consumer service (login responses). You can leave this blank if you do not have a URL for this binding.
  335. #assertion-consumer-redirect-binding-url=Assertion Consumer Service Redirect Binding URL
  336. #assertion-consumer-redirect-binding-url.tooltip=SAML Redirect Binding URL for the client's assertion consumer service (login responses). You can leave this blank if you do not have a URL for this binding.
  337. #logout-service-post-binding-url=Logout Service POST Binding URL
  338. #logout-service-post-binding-url.tooltip=SAML POST Binding URL for the client's single logout service. You can leave this blank if you are using a different binding
  339. #logout-service-redir-binding-url=Logout Service Redirect Binding URL
  340. #logout-service-redir-binding-url.tooltip=SAML Redirect Binding URL for the client's single logout service. You can leave this blank if you are using a different binding.
  341. #saml-signature-keyName-transformer=SAML Signature Key Name
  342. #saml-signature-keyName-transformer.tooltip=Signed SAML documents contain identification of signing key in KeyName element. For Keycloak / RH-SSO counterparty, use KEY_ID, for MS AD FS use CERT_SUBJECT, for others check and use NONE if no other option works.
  343. #oidc-compatibility-modes=OpenID Connect Compatibility Modes
  344. #oidc-compatibility-modes.tooltip=Expand this section to configure settings for backwards compatibility with older OpenID Connect / OAuth2 adapters. It is useful especially if your client uses older version of Keycloak / RH-SSO adapter.
  345. #exclude-session-state-from-auth-response=Exclude Session State From Authentication Response
  346. #exclude-session-state-from-auth-response.tooltip=If this is on, the parameter 'session_state' will not be included in OpenID Connect Authentication Response. It is useful if your client uses older OIDC / OAuth2 adapter, which does not support 'session_state' parameter.
  347. # client import
  348. #import-client=Import Client
  349. #format-option=Format Option
  350. #select-format=Select a Format
  351. #import-file=Import File
  352. # client tabs
  353. settings=Einstellungen
  354. credentials=Passw\u00F6rter
  355. roles=Rollen
  356. #mappers=Mappers
  357. #mappers.tooltip=Protocol mappers perform transformation on tokens and documents. They can do things like map user data into protocol claims, or just transform any requests going between the client and auth server.
  358. #scope=Scope
  359. #scope.tooltip=Scope mappings allow you to restrict which user role mappings are included within the access token requested by the client.
  360. #sessions.tooltip=View active sessions for this client. Allows you to see which users are active and when they logged in.
  361. #offline-access=Offline Access
  362. #offline-access.tooltip=View offline sessions for this client. Allows you to see which users retrieve offline token and when they retrieve it. To revoke all tokens for the client, go to Revocation tab and set not before value to now.
  363. #clustering=Clustering
  364. #installation=Installation
  365. #installation.tooltip=Helper utility for generating various client adapter configuration formats which you can download or cut and paste to configure your clients.
  366. #service-account-roles=Service Account Roles
  367. #service-account-roles.tooltip=Allows you to authenticate role mappings for the service account dedicated to this client.
  368. # client credentials
  369. #client-authenticator=Client Authenticator
  370. #client-authenticator.tooltip=Client Authenticator used for authentication this client against Keycloak server
  371. #certificate.tooltip=Client Certificate for validate JWT issued by client and signed by Client private key from your keystore.
  372. #publicKey.tooltip=Public Key for validate JWT issued by client and signed by Client private key.
  373. #no-client-certificate-configured=No client certificate configured
  374. #gen-new-keys-and-cert=Generate new keys and certificate
  375. #import-certificate=Import Certificate
  376. #gen-client-private-key=Generate Client Private Key
  377. #generate-private-key=Generate Private Key
  378. #kid=Kid
  379. #kid.tooltip=KID (Key ID) of the client public key from imported JWKS.
  380. #use-jwks-url=Use JWKS URL
  381. #use-jwks-url.tooltip=If the switch is on, then client public keys will be downloaded from given JWKS URL. This allows great flexibility because new keys will be always re-downloaded again when client generates new keypair. If the switch is off, then public key (or certificate) from the Keycloak DB is used, so when client keypair changes, you always need to import new key (or certificate) to the Keycloak DB as well.
  382. #jwks-url=JWKS URL
  383. #jwks-url.tooltip=URL where client keys in JWK format are stored. See JWK specification for more details. If you use Keycloak client adapter with "jwt" credential, then you can use URL of your app with '/k_jwks' suffix. For example 'http://www.myhost.com/myapp/k_jwks' .
  384. #archive-format=Archive Format
  385. #archive-format.tooltip=Java keystore or PKCS12 archive format.
  386. #key-alias=Key Alias
  387. #key-alias.tooltip=Archive alias for your private key and certificate.
  388. #key-password=Key Password
  389. #key-password.tooltip=Password to access the private key in the archive
  390. #store-password=Store Password
  391. #store-password.tooltip=Password to access the archive itself
  392. #generate-and-download=Generate and Download
  393. #client-certificate-import=Client Certificate Import
  394. #import-client-certificate=Import Client Certificate
  395. #jwt-import.key-alias.tooltip=Archive alias for your certificate.
  396. #secret=Secret
  397. #regenerate-secret=Regenerate Secret
  398. #registrationAccessToken=Registration access token
  399. #registrationAccessToken.regenerate=Regenerate registration access token
  400. #registrationAccessToken.tooltip=The registration access token provides access for clients to the client registration service.
  401. add-role=Rolle hinzuf\u00FCgen
  402. role-name=Rollenname
  403. #composite=Composite
  404. description=Beschreibung
  405. no-client-roles-available=Keine Client-Rollen verf\u00FCgbar
  406. #composite-roles=Composite Roles
  407. #composite-roles.tooltip=When this role is (un)assigned to a user any role associated with it will be (un)assigned implicitly.
  408. realm-roles=Realm-Rollen
  409. available-roles=Verf\u00FCgbare Rollen
  410. add-selected=Ausgew\u00E4hlte hinzuf\u00FCgen
  411. #associated-roles=Associated Roles
  412. #composite.associated-realm-roles.tooltip=Realm level roles associated with this composite role.
  413. #composite.available-realm-roles.tooltip=Realm level roles that you can associate to this composite role.
  414. remove-selected=Ausgew\u00E4hlte entfernen
  415. client-roles=Client-Rollen
  416. select-client-to-view-roles=W\u00E4hlen Sie einen Client um die Rollen daf\u00FCr zu sehen
  417. #available-roles.tooltip=Roles from this client that you can associate to this composite role.
  418. #client.associated-roles.tooltip=Client roles associated with this composite role.
  419. #add-builtin=Add Builtin
  420. category=Kategorie
  421. type=Typ
  422. #no-mappers-available=No mappers available
  423. #add-builtin-protocol-mappers=Add Builtin Protocol Mappers
  424. #add-builtin-protocol-mapper=Add Builtin Protocol Mapper
  425. #scope-mappings=Scope Mappings
  426. #full-scope-allowed=Full Scope Allowed
  427. #full-scope-allowed.tooltip=Allows you to disable all restrictions.
  428. #scope.available-roles.tooltip=Realm level roles that can be assigned to scope. Contains effectively assigned roles which are not directly assigned.
  429. assigned-roles=Zugewiesene Rollen
  430. #assigned-roles.tooltip=Realm level roles assigned to scope.
  431. effective-roles=Effektive Rollen
  432. #realm.effective-roles.tooltip=Assigned realm level roles that may have been inherited from a composite role.
  433. #select-client-roles.tooltip=Select client to view roles for client
  434. #assign.available-roles.tooltip=Client roles available to be assigned.
  435. #client.assigned-roles.tooltip=Assigned client roles.
  436. #client.effective-roles.tooltip=Assigned client roles that may have been inherited from a composite role.
  437. #basic-configuration=Basic configuration
  438. #node-reregistration-timeout=Node Re-registration Timeout
  439. #node-reregistration-timeout.tooltip=Interval to specify max time for registered clients cluster nodes to re-register. If cluster node won't send re-registration request to Keycloak within this time, it will be unregistered from Keycloak
  440. #registered-cluster-nodes=Registered cluster nodes
  441. #register-node-manually=Register node manually
  442. #test-cluster-availability=Test cluster availability
  443. #last-registration=Last registration
  444. #node-host=Node host
  445. #no-registered-cluster-nodes=No registered cluster nodes available
  446. #cluster-nodes=Cluster Nodes
  447. #add-node=Add Node
  448. #active-sessions.tooltip=Total number of active user sessions for this client.
  449. #show-sessions=Show Sessions
  450. #show-sessions.tooltip=Warning, this is a potentially expensive operation depending on number of active sessions.
  451. user=Benutzer
  452. #from-ip=From IP
  453. #session-start=Session Start
  454. first-page=Erste Seite
  455. previous-page=Vorherige Seite
  456. next-page=N\u00E4chste Seite
  457. #client-revoke.not-before.tooltip=Revoke any tokens issued before this date for this client.
  458. #client-revoke.push.tooltip=If admin URL is configured for this client, push this policy to that client.
  459. #select-a-format=Select a Format
  460. #download=Download
  461. #offline-tokens=Offline Tokens
  462. #offline-tokens.tooltip=Total number of offline tokens for this client.
  463. #show-offline-tokens=Show Offline Tokens
  464. #show-offline-tokens.tooltip=Warning, this is a potentially expensive operation depending on number of offline tokens.
  465. #token-issued=Token Issued
  466. last-access=Letzter Zugriff
  467. last-refresh=Letzte Aktualisierung
  468. #key-export=Key Export
  469. #key-import=Key Import
  470. #export-saml-key=Export SAML Key
  471. #import-saml-key=Import SAML Key
  472. #realm-certificate-alias=Realm Certificate Alias
  473. #realm-certificate-alias.tooltip=Realm certificate is stored in archive too. This is the alias to it.
  474. #signing-key=Signing Key
  475. #saml-signing-key=SAML Signing Key.
  476. #private-key=Private Key
  477. #generate-new-keys=Generate new keys
  478. #export=Export
  479. #encryption-key=Encryption Key
  480. #saml-encryption-key.tooltip=SAML Encryption Key.
  481. #service-accounts=Service Accounts
  482. #service-account.available-roles.tooltip=Realm level roles that can be assigned to service account. Contains effectively assigned roles which are not directly assigned.
  483. #service-account.assigned-roles.tooltip=Realm level roles assigned to service account.
  484. #service-account-is-not-enabled-for=Service account is not enabled for {{client}}
  485. #create-protocol-mappers=Create Protocol Mappers
  486. #create-protocol-mapper=Create Protocol Mapper
  487. #protocol=Protocol
  488. #protocol.tooltip=Protocol...
  489. #id=ID
  490. #mapper.name.tooltip=Name of the mapper.
  491. #mapper.consent-required.tooltip=When granting temporary access, must the user consent to providing this data to the client?
  492. #consent-text=Consent Text
  493. #consent-text.tooltip=Text to display on consent page.
  494. #mapper-type=Mapper Type
  495. #mapper-type.tooltip=Type of the mapper
  496. # realm identity providers
  497. #identity-providers=Identity Providers
  498. #table-of-identity-providers=Table of identity providers
  499. #add-provider.placeholder=Add provider...
  500. #provider=Provider
  501. #gui-order=GUI order
  502. #first-broker-login-flow=First Login Flow
  503. #post-broker-login-flow=Post Login Flow
  504. sync-mode=Synchronisationsmodus
  505. sync-mode.tooltip=Standardsyncmodus f\u00FCr alle Mapper. M\u00F6gliche Werte sind: 'Legacy' um das alte Verhalten beizubehalten, 'Importieren' um den Nutzer einmalig zu importieren, 'Erzwingen' um den Nutzer immer zu importieren.
  506. sync-mode.inherit=Standard erben
  507. sync-mode.legacy=Legacy
  508. sync-mode.import=Importieren
  509. sync-mode.force=Erzwingen
  510. sync-mode-override=\u00DCberschriebene Synchronisation
  511. sync-mode-override.tooltip=\u00DCberschreibt den normalen Synchronisationsmodus des IDP f\u00FCr diesen Mapper. Were sind 'Legacy' um das alte Verhalten beizubehalten, 'Importieren' um den Nutzer einmalig zu importieren, 'Erzwingen' um den Nutzer immer zu updaten.
  512. #redirect-uri=Redirect URI
  513. #redirect-uri.tooltip=The redirect uri to use when configuring the identity provider.
  514. #alias=Alias
  515. #display-name=Display Name
  516. #identity-provider.alias.tooltip=The alias uniquely identifies an identity provider and it is also used to build the redirect uri.
  517. #identity-provider.display-name.tooltip=Friendly name for Identity Providers.
  518. #identity-provider.enabled.tooltip=Enable/disable this identity provider.
  519. #authenticate-by-default=Authenticate by Default
  520. #identity-provider.authenticate-by-default.tooltip=Indicates if this provider should be tried by default for authentication even before displaying login screen.
  521. #store-tokens=Store Tokens
  522. #identity-provider.store-tokens.tooltip=Enable/disable if tokens must be stored after authenticating users.
  523. #stored-tokens-readable=Stored Tokens Readable
  524. #identity-provider.stored-tokens-readable.tooltip=Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.
  525. #disableUserInfo=Disable User Info
  526. #identity-provider.disableUserInfo.tooltip=Disable usage of User Info service to obtain additional user information? Default is to use this OIDC service.
  527. #userIp=Use userIp Param
  528. #identity-provider.google-userIp.tooltip=Set 'userIp' query parameter when invoking on Google's User Info service. This will use the user's ip address. Useful if Google is throttling access to the User Info service.
  529. #hostedDomain=Hosted Domain
  530. #identity-provider.google-hostedDomain.tooltip=Set 'hd' query parameter when logging in with Google. Google will only list accounts for this domain. Keycloak validates that the returned identity token has a claim for this domain. When '*' is entered any hosted account can be used.
  531. #sandbox=Target Sandbox
  532. #identity-provider.paypal-sandbox.tooltip=Target PayPal's sandbox environment
  533. #update-profile-on-first-login=Update Profile on First Login
  534. #on=On
  535. #on-missing-info=On missing info
  536. #off=Off
  537. #update-profile-on-first-login.tooltip=Define conditions under which a user has to update their profile during first-time login.
  538. #trust-email=Trust Email
  539. #trust-email.tooltip=If enabled then email provided by this provider is not verified even if verification is enabled for the realm.
  540. #link-only=Account Linking Only
  541. #link-only.tooltip=If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider
  542. #hide-on-login-page=Hide on Login Page
  543. #hide-on-login-page.tooltip=If hidden, then login with this provider is possible only if requested explicitly, e.g. using the 'kc_idp_hint' parameter.
  544. #gui-order.tooltip=Number defining order of the provider in GUI (eg. on Login page).
  545. #first-broker-login-flow.tooltip=Alias of authentication flow, which is triggered after first login with this identity provider. Term 'First Login' means that there is not yet existing Keycloak account linked with the authenticated identity provider account.
  546. #post-broker-login-flow.tooltip=Alias of authentication flow, which is triggered after each login with this identity provider. Useful if you want additional verification of each user authenticated with this identity provider (for example OTP). Leave this empty if you don't want any additional authenticators to be triggered after login with this identity provider. Also note, that authenticator implementations must assume that user is already set in ClientSession as identity provider already set it.
  547. #openid-connect-config=OpenID Connect Config
  548. #openid-connect-config.tooltip=OIDC SP and external IDP configuration.
  549. #authorization-url=Authorization URL
  550. #authorization-url.tooltip=The Authorization Url.
  551. #token-url=Token URL
  552. #token-url.tooltip=The Token URL.
  553. #loginHint=Pass login_hint
  554. #loginHint.tooltip=Pass login_hint to identity provider.
  555. logout-url=Logout-URL
  556. #identity-provider.logout-url.tooltip=End session endpoint to use to logout user from external IDP.
  557. #backchannel-logout=Backchannel Logout
  558. #backchannel-logout.tooltip=Does the external IDP support backchannel logout?
  559. #user-info-url=User Info URL
  560. #user-info-url.tooltip=The User Info Url. This is optional.
  561. #identity-provider.client-id.tooltip=The client or client identifier registered within the identity provider.
  562. #client-secret=Client Secret
  563. #show-secret=Show secret
  564. #hide-secret=Hide secret
  565. #client-secret.tooltip=The client or client secret registered within the identity provider.
  566. #issuer=Issuer
  567. #issuer.tooltip=The issuer identifier for the issuer of the response. If not provided, no validation will be performed.
  568. #default-scopes=Default Scopes
  569. #identity-provider.default-scopes.tooltip=The scopes to be sent when asking for authorization. It can be a space-separated list of scopes. Defaults to 'openid'.
  570. #prompt=Prompt
  571. #unspecified.option=unspecified
  572. #none.option=none
  573. #consent.option=consent
  574. #login.option=login
  575. #select-account.option=select_account
  576. #prompt.tooltip=Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
  577. #validate-signatures=Validate Signatures
  578. #identity-provider.validate-signatures.tooltip=Enable/disable signature validation of external IDP signatures.
  579. #identity-provider.use-jwks-url.tooltip=If the switch is on, then identity provider public keys will be downloaded from given JWKS URL. This allows great flexibility because new keys will be always re-downloaded again when identity provider generates new keypair. If the switch is off, then public key (or certificate) from the Keycloak DB is used, so when identity provider keypair changes, you always need to import new key to the Keycloak DB as well.
  580. #identity-provider.jwks-url.tooltip=URL where identity provider keys in JWK format are stored. See JWK specification for more details. If you use external Keycloak identity provider, then you can use URL like 'http://broker-keycloak:8180/auth/realms/test/protocol/openid-connect/certs' assuming your brokered Keycloak is running on 'http://broker-keycloak:8180' and its realm is 'test' .
  581. #validating-public-key=Validating Public Key
  582. #identity-provider.validating-public-key.tooltip=The public key in PEM format that must be used to verify external IDP signatures.
  583. #validating-public-key-id=Validating Public Key Id
  584. #identity-provider.validating-public-key-id.tooltip=Explicit ID of the validating public key given above if the key ID. Leave blank if the key above should be used always, regardless of key ID specified by external IDP; set it if the key should only be used for verifying if key ID from external IDP matches.
  585. #allowed-clock-skew=Allowed clock skew
  586. #identity-provider.allowed-clock-skew.tooltip=Clock skew in seconds that is tolerated when validating identity provider tokens. Default value is zero.
  587. #forwarded-query-parameters=Forwarded Query Parameters
  588. #identity-provider.forwarded-query-parameters.tooltip=Non OpenID Connect/OAuth standard query parameters to be forwarded to external IDP from the initial application request to Authorization Endpoint. Multiple parameters can be entered, separated by comma (,).
  589. #import-external-idp-config=Import External IDP Config
  590. #import-external-idp-config.tooltip=Allows you to load external IDP metadata from a config file or to download it from a URL.
  591. #import-from-url=Import from URL
  592. #identity-provider.import-from-url.tooltip=Import metadata from a remote IDP discovery descriptor.
  593. #import-from-file=Import from file
  594. #identity-provider.import-from-file.tooltip=Import metadata from a downloaded IDP discovery descriptor.
  595. #saml-config=SAML Config
  596. #identity-provider.saml-config.tooltip=SAML SP and external IDP configuration.
  597. #single-signon-service-url=Single Sign-On Service URL
  598. #saml.single-signon-service-url.tooltip=The Url that must be used to send authentication requests (SAML AuthnRequest).
  599. #single-logout-service-url=Single Logout Service URL
  600. #saml.single-logout-service-url.tooltip=The Url that must be used to send logout requests.
  601. #nameid-policy-format=NameID Policy Format
  602. #nameid-policy-format.tooltip=Specifies the URI reference corresponding to a name identifier format. Defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:persistent.
  603. #http-post-binding-response=HTTP-POST Binding Response
  604. #http-post-binding-response.tooltip=Indicates whether to respond to requests using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
  605. #http-post-binding-for-authn-request=HTTP-POST Binding for AuthnRequest
  606. #http-post-binding-for-authn-request.tooltip=Indicates whether the AuthnRequest must be sent using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
  607. #http-post-binding-logout=HTTP-POST Binding Logout
  608. #http-post-binding-logout.tooltip=Indicates whether to respond to requests using HTTP-POST binding. If false, HTTP-REDIRECT binding will be used.
  609. #want-authn-requests-signed=Want AuthnRequests Signed
  610. #want-authn-requests-signed.tooltip=Indicates whether the identity provider expects a signed AuthnRequest.
  611. #want-assertions-signed=Want Assertions Signed
  612. #want-assertions-signed.tooltip=Indicates whether this service provider expects a signed Assertion.
  613. #want-assertions-encrypted=Want Assertions Encrypted
  614. #want-assertions-encrypted.tooltip=Indicates whether this service provider expects an encrypted Assertion.
  615. #force-authentication=Force Authentication
  616. #identity-provider.force-authentication.tooltip=Indicates whether the identity provider must authenticate the presenter directly rather than rely on a previous security context.
  617. #validate-signature=Validate Signature
  618. #saml.validate-signature.tooltip=Enable/disable signature validation of SAML responses.
  619. #validating-x509-certificate=Validating X509 Certificates
  620. #validating-x509-certificate.tooltip=The certificate in PEM format that must be used to check for signatures. Multiple certificates can be entered, separated by comma (,).
  621. #saml.import-from-url.tooltip=Import metadata from a remote IDP SAML entity descriptor.
  622. #social.client-id.tooltip=The client identifier registered with the identity provider.
  623. #social.client-secret.tooltip=The client secret registered with the identity provider.
  624. #social.default-scopes.tooltip=The scopes to be sent when asking for authorization. See documentation for possible values, separator and default value'.
  625. key=Key
  626. #stackoverflow.key.tooltip=The Key obtained from Stack Overflow client registration.
  627. #openshift.base-url=Base Url
  628. #openshift.base-url.tooltip=Base Url to OpenShift Online API
  629. #openshift4.base-url=Base Url
  630. #openshift4.base-url.tooltip=Base Url to OpenShift Online API
  631. #gitlab-application-id=Application Id
  632. #gitlab-application-secret=Application Secret
  633. #gitlab.application-id.tooltip=Application Id for the application you created in your GitLab Applications account menu
  634. #gitlab.application-secret.tooltip=Secret for the application that you created in your GitLab Applications account menu
  635. #gitlab.default-scopes.tooltip=Scopes to ask for on login. Will always ask for openid. Additionally adds read_user if you do not specify anything.
  636. #bitbucket-consumer-key=Consumer Key
  637. #bitbucket-consumer-secret=Consumer Secret
  638. #bitbucket.key.tooltip=Bitbucket OAuth Consumer Key
  639. #bitbucket.secret.tooltip=Bitbucket OAuth Consumer Secret
  640. #bitbucket.default-scopes.tooltip=Scopes to ask for on login. If you do not specify anything, scope defaults to 'email'.
  641. # User federation
  642. #sync-ldap-roles-to-keycloak=Sync LDAP Roles To Keycloak
  643. #sync-keycloak-roles-to-ldap=Sync Keycloak Roles To LDAP
  644. #sync-ldap-groups-to-keycloak=Sync LDAP Groups To Keycloak
  645. #sync-keycloak-groups-to-ldap=Sync Keycloak Groups To LDAP
  646. realms=Realms
  647. #realm=Realm
  648. #identity-provider-mappers=Identity Provider Mappers
  649. #create-identity-provider-mapper=Create Identity Provider Mapper
  650. #add-identity-provider-mapper=Add Identity Provider Mapper
  651. #client.description.tooltip=Specifies description of the client. For example 'My Client for TimeSheets'. Supports keys for localized values as well. For example\: ${my_client_description}
  652. #expires=Expires
  653. #expiration=Expiration
  654. #expiration.tooltip=Specifies how long the token should be valid
  655. #count=Count
  656. #count.tooltip=Specifies how many clients can be created using the token
  657. #remainingCount=Remaining Count
  658. #created=Created
  659. #back=Back
  660. #initial-access-tokens=Initial Access Tokens
  661. #add-initial-access-tokens=Add Initial Access Token
  662. #initial-access-token=Initial Access Token
  663. #initial-access.copyPaste.tooltip=Copy/paste the initial access token before navigating away from this page as it's not possible to retrieve later
  664. #continue=Continue
  665. #initial-access-token.confirm.title=Copy Initial Access Token
  666. #initial-access-token.confirm.text=Please copy and paste the initial access token before confirming as it can't be retrieved later
  667. #no-initial-access-available=No Initial Access Tokens available
  668. #client-reg-policies=Client Registration Policies
  669. #client-reg-policy.name.tooltip=Display Name of the policy
  670. #anonymous-policies=Anonymous Access Policies
  671. #anonymous-policies.tooltip=Those Policies are used when Client Registration Service is invoked by unauthenticated request. This means request doesn't contain Initial Access Token nor Bearer Token.
  672. #auth-policies=Authenticated Access Policies
  673. #auth-policies.tooltip=Those Policies are used when Client Registration Service is invoked by authenticated request. This means request contains Initial Access Token or Bearer Token.
  674. #policy-name=Policy Name
  675. #no-client-reg-policies-configured=No Client Registration Policies
  676. #trusted-hosts.label=Trusted Hosts
  677. #trusted-hosts.tooltip=List of Hosts, which are trusted and are allowed to invoke Client Registration Service and/or be used as values of Client URIs. You can use hostnames or IP addresses. If you use star at the beginning (for example '*.example.com' ) then whole domain example.com will be trusted.
  678. #host-sending-registration-request-must-match.label=Host Sending Client Registration Request Must Match
  679. #host-sending-registration-request-must-match.tooltip=If on, then any request to Client Registration Service is allowed just if it was sent from some trusted host or domain.
  680. #client-uris-must-match.label=Client URIs Must Match
  681. #client-uris-must-match.tooltip=If on, then all Client URIs (Redirect URIs and others) are allowed just if they match some trusted host or domain.
  682. #allowed-protocol-mappers.label=Allowed Protocol Mappers
  683. #allowed-protocol-mappers.tooltip=Whitelist of allowed protocol mapper providers. If there is an attempt to register client, which contains some protocol mappers, which were not whitelisted, then registration request will be rejected.
  684. #consent-required-for-all-mappers.label=Consent Required For Mappers
  685. #consent-required-for-all-mappers.tooltip=If on, then all newly registered protocol mappers will automatically have consentRequired switch on. This means that user will need to approve consent screen. NOTE: Consent screen is shown just if client has consentRequired switch on. So it's usually good to use this switch together with consent-required policy.
  686. #allowed-client-scopes.label=Allowed Client Scopes
  687. #allowed-client-scopes.tooltip=Whitelist of the client scopes, which can be used on newly registered client. Attempt to register client with some client scope, which is not whitelisted, will be rejected. By default, the whitelist is either empty or contains just realm default client scopes (based on 'Allow Default Scopes' configuration property)
  688. #allow-default-scopes.label=Allow Default Scopes
  689. #allow-default-scopes.tooltip=If on, then newly registered clients will be allowed to have client scopes mentioned in realm default client scopes or realm optional client scopes
  690. #max-clients.label=Max Clients Per Realm
  691. #max-clients.tooltip=It won't be allowed to register new client if count of existing clients in realm is same or bigger than configured limit.
  692. #client-scopes=Client Scopes
  693. #client-scopes.tooltip=Client scopes allow you to define common set of protocol mappers and roles, that are shared between multiple clients
  694. groups=Gruppen
  695. group.add-selected.tooltip=Realm-Rollen die zu der Gruppen hinzugef\u00FCgt werden k\u00F6nnen.
  696. group.assigned-roles.tooltip=Realm-Rollen die zur Gruppe zugeordnet sind
  697. #group.effective-roles.tooltip=All realm role mappings. Some roles here might be inherited from a mapped composite role.
  698. #group.available-roles.tooltip=Assignable roles from this client. Contains effectively assigned roles which are not directly assigned.
  699. #group.assigned-roles-client.tooltip=Role mappings for this client.
  700. #group.effective-roles-client.tooltip=Role mappings for this client. Some roles here might be inherited from a mapped composite role.
  701. group.move.success=Gruppe verschoben.
  702. group.remove.confirm.title=Gruppe l\u00F6schen
  703. group.remove.confirm.message=Sind Sie sicher, dass Sie die Gruppe \u201E{{name}}\u201C l\u00F6schen m\u00F6chten?
  704. group.remove.success=Die Gruppe wurde gel\u00F6scht.
  705. group.fetch.fail=Fehler beim Laden: {{params}}
  706. group.create.success=Gruppe erstellt.
  707. group.edit.success=Die \u00C4nderungen wurde gespeichert.
  708. group.roles.add.success=Rollenzuweisung hinzugef\u00FCgt.
  709. group.roles.remove.success=Rollenzuweisung entfernt.
  710. group.default.add.error=Bitte eine Gruppe ausw\u00E4hlen.
  711. group.default.add.success=Standardgruppe hinzugef\u00FCgt.
  712. group.default.remove.success=Standardgruppe entfernt.
  713. default-roles=Standardrollen
  714. no-realm-roles-available=Keine Realm-Rollen verf\u00FCgbar
  715. users=Benutzer
  716. user.add-selected.tooltip=Realm-Rollen, die dem Benutzer zugewiesen werden k\u00F6nnen.
  717. user.assigned-roles.tooltip=Realm-Rollen, die dem Benutzer zugewiesen sind.
  718. user.effective-roles.tooltip=Alle Realm-Rollen-Zuweisungen. Einige Rollen hier k\u00F6nnen von zusammengesetzten Rollen geerbt sein.
  719. #user.available-roles.tooltip=Assignable roles from this client. Contains effectively assigned roles which are not directly assigned.
  720. #user.assigned-roles-client.tooltip=Role mappings for this client.
  721. #user.effective-roles-client.tooltip=Role mappings for this client. Some roles here might be inherited from a mapped composite role.
  722. user.roles.add.success=Rollenzuweisung hinzugef\u00FCgt.
  723. user.roles.remove.success=Rollenzuweisung entfernt.
  724. user.logout.all.success=Benutzer von allen Sitzungen abgemeldet.
  725. user.logout.session.success=Benutzer von Sitzung abgemeldet.
  726. user.fedid.link.remove.confirm.title=Verkn\u00FCpfung mit Identity Provider entfernen
  727. user.fedid.link.remove.confirm.message=Sind Sie sicher, dass Sie die Verkn\u00FCpfung mit dem Identity Provider \u201E{{name}}\u201C entfernen m\u00F6chten?
  728. user.fedid.link.remove.success=Verkn\u00FCpfung mit Identity Provider entfernt.
  729. user.fedid.link.add.success=Verkn\u00FCpfung mit Identity Provider angelegt.
  730. user.consent.revoke.success=Einwilligung widerrufen.
  731. user.consent.revoke.error=Einwilligung konnte nicht widerrufen werden.
  732. user.unlock.success=Alle vor\u00FCbergehend gesperrten Benutzer wurden entsperrt.
  733. user.remove.confirm.title=Benutzer l\u00F6schen
  734. user.remove.confirm.message=Sind Sie sicher, dass Sie den Benutzer \u201E{{name}}\u201C l\u00F6schen m\u00F6chten?
  735. user.remove.success=Der Benutzer wurde gel\u00F6scht.
  736. user.remove.error=Der Benutzer konnte nicht gel\u00F6scht werden.
  737. user.create.success=Der Benutzer wurde angelegt.
  738. user.edit.success=Die \u00C4nderungen wurden gespeichert.
  739. user.credential.update.success=Die Zugangsdaten wurdern gespeichert.
  740. user.credential.update.error=Beim Speichern der Zugangsdaten ist ein Fehler aufgetreten.
  741. user.credential.remove.confirm.title=Zugangsdaten l\u00F6schen
  742. user.credential.remove.confirm.message=Sind Sie sicher, dass Sie die Zugangsdaten l\u00F6schen m\u00F6chten?
  743. user.credential.remove.success=Die Zugangsdaten wurden gel\u00F6scht.
  744. user.credential.remove.error=Beim L\u00F6schen der Zugangsdaten ist ein Fehler aufgetreten.
  745. user.credential.move-top.error=Beim Verschieben der Zugangsdaten ist ein Fehler aufgetreten.
  746. user.credential.move-up.error=Beim Verschieben der Zugangsdaten ist ein Fehler aufgetreten.
  747. user.credential.move-down.error=Beim Verschieben der Zugangsdaten ist ein Fehler aufgetreten.
  748. user.credential.fetch.error=Beim Laden der Zugangsdaten ist ein Fehler aufgetreten.
  749. #user.credential.storage.fetch.error=Error while loading user storage credentials. See console for more information.
  750. user.password.error.not-matching=Die Passw\u00F6rter stimmen nicht \u00FCberein.
  751. user.password.reset.confirm.title=Passwort zur\u00FCcksetzen
  752. user.password.reset.confirm.message=Sind Sie sicher, dass Sie das Passwort f\u00FCr diesen Benutzer zur\u00FCcksetzen m\u00F6chten?
  753. user.password.reset.success=Das Passwort wurde zur\u00FCckgesetzt.
  754. user.password.set.confirm.title=Passwort setzen
  755. user.password.set.confirm.message=Sind Sie sicher, dass Sie ein Passwort f\u00FCr diesen Benutzer setzen m\u00F6chten?
  756. user.password.set.success=Das Passwort wurde gesetzt.
  757. user.credential.disable.confirm.title=Zugangsdaten deaktivieren
  758. user.credential.disable.confirm.message=Sind Sie sicher, dass Sie diese Zugangsdaten deaktivieren m\u00F6chten?
  759. user.credential.disable.confirm.success=Zugangsdaten deaktiviert.
  760. user.credential.disable.confirm.error=Fehler beim Deaktivieren der Zugangsdaten
  761. user.actions-email.send.pending-changes.title=E-Mail kann nicht gesendet werden.
  762. user.actions-email.send.pending-changes.message=Bitte speichern Sie Ihre \u00C4nderungen bevor Sie die E-Mail senden.
  763. user.actions-email.send.confirm.title=E-Mail senden
  764. user.actions-email.send.confirm.message=Sind Sie sicher, dass Sie die E-Mail an den Benutzer senden m\u00F6chten?
  765. user.actions-email.send.confirm.success=E-Mail an Benutzer gesendet.
  766. user.actions-email.send.confirm.error=Fehler beim Senden der E-Mail
  767. #user.storage.remove.confirm.title=Delete User storage provider
  768. #user.storage.remove.confirm.message=Are you sure you want to permanently delete the user storage provider {{name}}?
  769. #user.storage.remove.success=The provider has been deleted.
  770. #user.storage.create.success=The provider has been created.
  771. #user.storage.edit.success=The provider has been updated.
  772. #user.storage.sync.success=Sync of users finished successfully. {{status}}
  773. #user.storage.sync.error=Error during sync of users
  774. #user.storage.remove-users.success=Remove imported users finished successfully.
  775. #user.storage.remove-users.error=Error during remove
  776. #user.storage.unlink.success=Unlink of users finished successfully.
  777. #user.storage.unlink.error=Error during unlink
  778. user.groups.fetch.all.error=Fehler beim Laden alle Gruppen: {{params}}
  779. user.groups.fetch.error=Fehler beim Laden: {{params}}
  780. user.groups.join.error.no-group-selected=Bitte w\u00E4hlen Sie eine Gruppe aus!
  781. user.groups.join.error.already-added=Benutzer geh\u00F6rt der Gruppe bereits an.
  782. user.groups.join.success=Zur Gruppe hinzugef\u00FCgt.
  783. user.groups.leave.error.no-group-selected=Bitte w\u00E4hlen Sie eine Gruppe aus!
  784. user.groups.leave.success=Aus Gruppe entfernt.
  785. #default.available-roles.tooltip=Realm level roles that can be assigned.
  786. #realm-default-roles=Realm Default Roles
  787. #realm-default-roles.tooltip=Realm level roles assigned to new users.
  788. #default.available-roles-client.tooltip=Roles from this client that are assignable as a default.
  789. #client-default-roles=Client Default Roles
  790. #client-default-roles.tooltip=Roles from this client assigned as a default role.
  791. #composite.available-roles.tooltip=Realm level roles that you can associate to this composite role.
  792. #composite.associated-roles.tooltip=Realm level roles associated with this composite role.
  793. #composite.available-roles-client.tooltip=Roles from this client that you can associate to this composite role.
  794. #composite.associated-roles-client.tooltip=Client roles associated with this composite role.
  795. #partial-import=Partial Import
  796. #partial-import.tooltip=Partial import allows you to import users, clients, and other resources from a previously exported json file.
  797. #file=File
  798. #exported-json-file=Exported json file
  799. #import-from-realm=Import from realm
  800. #import-users=Import users
  801. #import-groups=Import groups
  802. #import-clients=Import clients
  803. #import-identity-providers=Import identity providers
  804. #import-realm-roles=Import realm roles
  805. #import-client-roles=Import client roles
  806. #if-resource-exists=If a resource exists
  807. #fail=Fail
  808. #skip=Skip
  809. #overwrite=Overwrite
  810. #if-resource-exists.tooltip=Specify what should be done if you try to import a resource that already exists.
  811. #partial-export=Partial Export
  812. #partial-export.tooltip=Partial export allows you to export realm configuration, and other associated resources into a json file.
  813. #export-groups-and-roles=Export groups and roles
  814. #export-clients=Export clients
  815. action=Aktion
  816. #role-selector=Role Selector
  817. #realm-roles.tooltip=Realm roles that can be selected.
  818. #select-a-role=Select a role
  819. #select-realm-role=Select realm role
  820. #client-roles.tooltip=Client roles that can be selected.
  821. #select-client-role=Select client role
  822. #client-saml-endpoint=Client SAML Endpoint
  823. #add-client-scope=Add client scope
  824. #default-client-scopes=Default Client Scopes
  825. #default-client-scopes.tooltip=Client Scopes, which will be added automatically to each created client
  826. #default-client-scopes.default=Default Client Scopes
  827. #default-client-scopes.default.tooltip=Allow to define client scopes, which will be added as default scopes to each created client
  828. #default-client-scopes.default.available=Available Client Scopes
  829. #default-client-scopes.default.available.tooltip=Client scopes, which are not yet assigned as realm default scopes or realm optional scopes
  830. #default-client-scopes.default.assigned=Assigned Default Client Scopes
  831. #default-client-scopes.default.assigned.tooltip=Client scopes, which will be added as default scopes to each created client
  832. #default-client-scopes.optional=Optional Client Scopes
  833. #default-client-scopes.optional.tooltip=Allow to define client scopes, which will be added as optional scopes to each created client
  834. #default-client-scopes.optional.available=Available Client Scopes
  835. #default-client-scopes.optional.available.tooltip=Client scopes, which are not yet assigned as realm default scopes or realm optional scopes
  836. #default-client-scopes.optional.assigned=Assigned Optional Client Scopes
  837. #default-client-scopes.optional.assigned.tooltip=Client scopes, which will be added as optional scopes to each created client
  838. #client-scopes.setup=Setup
  839. #client-scopes.setup.tooltip=Allow to setup client scopes linked to this client
  840. #client-scopes.default=Default Client Scopes
  841. #client-scopes.default.tooltip=Default client scopes are always applied when issuing tokens for this client. Protocol mappers and role scope mappings are always applied regardless of value of used scope parameter in OIDC Authorization request
  842. #client-scopes.default.available=Available Client Scopes
  843. #client-scopes.default.available.tooltip=Client scopes, which are not yet assigned as default scopes or optional scopes
  844. #client-scopes.default.assigned=Assigned Default Client Scopes
  845. #client-scopes.default.assigned.tooltip=Client scopes, which will be used as default scopes when generating tokens for this client
  846. #client-scopes.optional=Optional Client Scopes
  847. #client-scopes.optional.tooltip=Optional client scopes are applied when issuing tokens for this client, however just in case when they are requested by scope parameter in OIDC Authorization request
  848. #client-scopes.optional.available=Available Client Scopes
  849. #client-scopes.optional.available.tooltip=Client scopes, which are not yet assigned as default scopes or optional scopes
  850. #client-scopes.optional.assigned=Assigned Optional Client Scopes
  851. #client-scopes.optional.assigned.tooltip=Client scopes, which may be used as optional scopes when generating tokens for this client
  852. #client-scopes.evaluate=Evaluate
  853. #client-scopes.evaluate.tooltip=Allow to see all protocol mappers and role scope mappings, which will be used in the tokens issued to this client. Also allow to generate example access token based on provided scope parameter
  854. #scope-parameter=Scope Parameter
  855. #scope-parameter.tooltip=You can copy/paste this value of scope parameter and use it in initial OpenID Connect Authentication Request sent from this client adapter. Default client scopes and selected optional client scopes will be used when generating token issued for this client
  856. #client-scopes.evaluate.scopes=Client Scopes
  857. #client-scopes.evaluate.scopes.tooltip=Allow to select optional client scopes, which may be used when generating token issued for this client
  858. #client-scopes.evaluate.scopes.available=Available Optional Client Scopes
  859. #client-scopes.evaluate.scopes.available.tooltip=This contains Optional Client Scopes, which can be optionally used when issuing access token for this client
  860. #client-scopes.evaluate.scopes.assigned=Selected Optional Client Scopes
  861. #client-scopes.evaluate.scopes.assigned.tooltip=Selected Optional Client Scopes, which will be used when issuing access token for this client. You can see above what value of OAuth Scope Parameter need to be used when you want to have these optional client scopes applied when the initial OpenID Connect Authentication request will be sent from your client adapter
  862. #client-scopes.evaluate.scopes.effective=Effective Client Scopes
  863. #client-scopes.evaluate.scopes.effective.tooltip=Contains all default client scopes and selected optional scopes. All protocol mappers and role scope mappings of all those client scopes will be used when generating access token issued for your client
  864. #client-scopes.evaluate.user.tooltip=Optionally select user, for whom the example access token will be generated. If you don't select any user, then example access token won't be generated during evaluation
  865. #send-evaluation-request=Evaluate
  866. #send-evaluation-request.tooltip=Click this to see all protocol mappers and role scope mappings, which will be used when issuing access token for this client. It will also optionally generate example access token in case that some user was selected
  867. #evaluated-protocol-mappers=Effective Protocol Mappers
  868. #evaluated-protocol-mappers.tooltip=Allow you to see all effective protocol mappers, which will be used when issuing token for this client. Contains also protocol mappers of selected optional client scopes. For each protocol mapper, you can see from which client scope it is inherited from
  869. #evaluated-roles=Effective Role Scope Mappings
  870. #evaluated-roles.tooltip=Allow you to see all effective roles scope mappings, which will be used when issuing token for this client. Contains also role scope mappings of selected optional client scopes
  871. #parent-client-scope=Parent Client Scope
  872. #client-scopes.evaluate.not-granted-roles=Not Granted Roles
  873. #client-scopes.evaluate.not-granted-roles.tooltip=Client doesn't have scope mappings for these roles. Those roles won't be in the access token issued to this client even if authenticated user is member of them
  874. #client-scopes.evaluate.granted-realm-effective-roles=Granted Effective Realm Roles
  875. #client-scopes.evaluate.granted-realm-effective-roles.tooltip=Client has scope mappings for these roles. Those roles will be in the access token issued to this client if authenticated user is member of them
  876. #client-scopes.evaluate.granted-client-effective-roles=Granted Effective Client Roles
  877. #generated-access-token=Generated Access Token
  878. #generated-access-token.tooltip=See the example token, which will be generated and sent to the client when selected user is authenticated. You can see claims and roles, which the token will contain based on the effective protocol mappers and role scope mappings and also based on the claims/roles assigned to user himself
  879. manage=Verwalten
  880. authentication=Authentifizierung
  881. #user-federation=User Federation
  882. #user-storage=User Storage
  883. events=Ereignisse
  884. realm-settings=Realm-Einstellungen
  885. configure=Konfigurieren
  886. select-realm=Realm ausw\u00E4hlen
  887. add=Hinzuf\u00FCgen
  888. #client-storage=Client Storage
  889. #no-client-storage-providers-configured=No client storage providers configured
  890. #client-stores.tooltip=Keycloak can retrieve clients and their details from external stores.
  891. #client-scope.name.tooltip=Name of the client scope. Must be unique in the realm. Name shouldn't contain space characters as it's used as value of scope parameter
  892. #client-scope.description.tooltip=Description of the client scope
  893. #client-scope.protocol.tooltip=Which SSO protocol configuration is being supplied by this client scope
  894. #client-scope.display-on-consent-screen=Display On Consent Screen
  895. #client-scope.display-on-consent-screen.tooltip=If on, and this client scope is added to some client with consent required, then the text specified by 'Consent Screen Text' will be displayed on consent screen. If off, then this client scope won't be displayed on consent screen
  896. #client-scope.consent-screen-text=Consent Screen Text
  897. #client-scope.consent-screen-text.tooltip=Text, which will be shown on consent screen when this client scope is added to some client with consent required. Defaults to name of client scope if it's not filled
  898. #add-user-federation-provider=Add user federation provider
  899. #add-user-storage-provider=Add user storage provider
  900. #required-settings=Required Settings
  901. #provider-id=Provider ID
  902. #console-display-name=Console Display Name
  903. #console-display-name.tooltip=Display name of provider when linked in admin console.
  904. #priority=Priority
  905. #priority.tooltip=Priority of provider when doing a user lookup. Lowest first.
  906. #user-storage.enabled.tooltip=If provider is disabled it will not be considered for queries and imported users will be disabled and read-only until the provider is enabled again.
  907. #sync-settings=Sync Settings
  908. #periodic-full-sync=Periodic Full Sync
  909. #periodic-full-sync.tooltip=Does periodic full synchronization of provider users to Keycloak should be enabled or not
  910. #full-sync-period=Full Sync Period
  911. #full-sync-period.tooltip=Period for full synchronization in seconds
  912. #periodic-changed-users-sync=Periodic Changed Users Sync
  913. #periodic-changed-users-sync.tooltip=Does periodic synchronization of changed or newly created provider users to Keycloak should be enabled or not
  914. #changed-users-sync-period=Changed Users Sync Period
  915. #changed-users-sync-period.tooltip=Period for synchronization of changed or newly created provider users in seconds
  916. #synchronize-changed-users=Synchronize changed users
  917. #synchronize-all-users=Synchronize all users
  918. #remove-imported-users=Remove imported
  919. unlink-users=Benutzer entsperren
  920. #kerberos-realm=Kerberos Realm
  921. #kerberos-realm.tooltip=Name of kerberos realm. For example FOO.ORG
  922. #server-principal=Server Principal
  923. #server-principal.tooltip=Full name of server principal for HTTP service including server and domain name. For example HTTP/host.foo.org@FOO.ORG
  924. #keytab=KeyTab
  925. #keytab.tooltip=Location of Kerberos KeyTab file containing the credentials of server principal. For example /etc/krb5.keytab
  926. #debug=Debug
  927. #debug.tooltip=Enable/disable debug logging to standard output for Krb5LoginModule.
  928. #allow-password-authentication=Allow Password Authentication
  929. #allow-password-authentication.tooltip=Enable/disable possibility of username/password authentication against Kerberos database
  930. #edit-mode=Edit Mode
  931. #edit-mode.tooltip=READ_ONLY means that password updates are not allowed and user always authenticates with Kerberos password. UNSYNCED means user can change his password in Keycloak database and this one will be used instead of Kerberos password then
  932. #ldap.edit-mode.tooltip=READ_ONLY is a read-only LDAP store. WRITABLE means data will be synced back to LDAP on demand. UNSYNCED means user data will be imported, but not synced back to LDAP.
  933. #update-profile-first-login=Update Profile First Login
  934. #update-profile-first-login.tooltip=Update profile on first login
  935. #sync-registrations=Sync Registrations
  936. #ldap.sync-registrations.tooltip=Should newly created users be created within LDAP store? Priority effects which provider is chose to sync the new user.
  937. #import-enabled=Import Users
  938. #ldap.import-enabled.tooltip=If true, LDAP users will be imported into Keycloak DB and synced via the configured sync policies.
  939. #vendor=Vendor
  940. #ldap.vendor.tooltip=LDAP vendor (provider)
  941. #username-ldap-attribute=Username LDAP attribute
  942. #ldap-attribute-name-for-username=LDAP attribute name for username
  943. #username-ldap-attribute.tooltip=Name of LDAP attribute, which is mapped as Keycloak username. For many LDAP server vendors it can be 'uid'. For Active directory it can be 'sAMAccountName' or 'cn'. The attribute should be filled for all LDAP user records you want to import from LDAP to Keycloak.
  944. #rdn-ldap-attribute=RDN LDAP attribute
  945. #ldap-attribute-name-for-user-rdn=LDAP attribute name for user RDN
  946. #rdn-ldap-attribute.tooltip=Name of LDAP attribute, which is used as RDN (top attribute) of typical user DN. Usually it's the same as Username LDAP attribute, however it's not required. For example for Active directory it's common to use 'cn' as RDN attribute when username attribute might be 'sAMAccountName'.
  947. #uuid-ldap-attribute=UUID LDAP attribute
  948. #ldap-attribute-name-for-uuid=LDAP attribute name for UUID
  949. #uuid-ldap-attribute.tooltip=Name of LDAP attribute, which is used as unique object identifier (UUID) for objects in LDAP. For many LDAP server vendors it's 'entryUUID' however some are different. For example for Active directory it should be 'objectGUID'. If your LDAP server really doesn't support the notion of UUID, you can use any other attribute, which is supposed to be unique among LDAP users in tree. For example 'uid' or 'entryDN'.
  950. #user-object-classes=User Object Classes
  951. #ldap-user-object-classes.placeholder=LDAP User Object Classes (div. by comma)
  952. #ldap-connection-url=LDAP connection URL
  953. #ldap-users-dn=LDAP Users DN
  954. #ldap-bind-dn=LDAP Bind DN
  955. #ldap-bind-credentials=LDAP Bind Credentials
  956. #ldap-filter=LDAP Filter
  957. #ldap.user-object-classes.tooltip=All values of LDAP objectClass attribute for users in LDAP divided by comma. For example: 'inetOrgPerson, organizationalPerson' . Newly created Keycloak users will be written to LDAP with all those object classes and existing LDAP user records are found just if they contain all those object classes.
  958. #connection-url=Connection URL
  959. #ldap.connection-url.tooltip=Connection URL to your LDAP server
  960. #test-connection=Test connection
  961. #users-dn=Users DN
  962. #ldap.users-dn.tooltip=Full DN of LDAP tree where your users are. This DN is parent of LDAP users. It could be for example 'ou=users,dc=example,dc=com' assuming that your typical user will have DN like 'uid=john,ou=users,dc=example,dc=com'
  963. #authentication-type=Authentication Type
  964. #ldap.authentication-type.tooltip=LDAP Authentication type. Right now just 'none' (anonymous LDAP authentication) or 'simple' (Bind credential + Bind password authentication) mechanisms are available
  965. #bind-dn=Bind DN
  966. #ldap.bind-dn.tooltip=DN of LDAP admin, which will be used by Keycloak to access LDAP server
  967. #bind-credential=Bind Credential
  968. #ldap.bind-credential.tooltip=Password of LDAP admin
  969. #test-authentication=Test authentication
  970. #custom-user-ldap-filter=Custom User LDAP Filter
  971. #ldap.custom-user-ldap-filter.tooltip=Additional LDAP Filter for filtering searched users. Leave this empty if you don't need additional filter. Make sure that it starts with '(' and ends with ')'
  972. #search-scope=Search Scope
  973. #ldap.search-scope.tooltip=For one level, we search for users just in DNs specified by User DNs. For subtree, we search in whole of their subtree. See LDAP documentation for more details
  974. #use-truststore-spi=Use Truststore SPI
  975. #ldap.use-truststore-spi.tooltip=Specifies whether LDAP connection will use the truststore SPI with the truststore configured in standalone.xml/domain.xml. 'Always' means that it will always use it. 'Never' means that it won't use it. 'Only for ldaps' means that it will use if your connection URL use ldaps. Note even if standalone.xml/domain.xml is not configured, the default Java cacerts or certificate specified by 'javax.net.ssl.trustStore' property will be used.
  976. #validate-password-policy=Validate Password Policy
  977. #connection-pooling=Connection Pooling
  978. #connection-pooling-settings=Connection Pooling Settings
  979. #connection-pooling-authentication=Connection Pooling Authentication
  980. #connection-pooling-authentication-default=none simple
  981. #connection-pooling-debug=Connection Pool Debug Level
  982. #connection-pooling-debug-default=off
  983. #connection-pooling-initsize=Connection Pool Initial Size
  984. #connection-pooling-initsize-default=1
  985. #connection-pooling-maxsize=Connection Pool Maximum Size
  986. #connection-pooling-maxsize-default=1000
  987. #connection-pooling-prefsize=Connection Pool Preferred Size
  988. #connection-pooling-prefsize-default=5
  989. #connection-pooling-protocol=Connection Pool Protocol
  990. #connection-pooling-protocol-default=plain ssl
  991. #connection-pooling-timeout=Connection Pool Timeout
  992. #connection-pooling-timeout-default=300000
  993. #ldap-connection-timeout=Connection Timeout
  994. #ldap.connection-timeout.tooltip=LDAP Connection Timeout in milliseconds
  995. #ldap-read-timeout=Read Timeout
  996. #ldap.read-timeout.tooltip=LDAP Read Timeout in milliseconds. This timeout applies for LDAP read operations
  997. #ldap.validate-password-policy.tooltip=Does Keycloak should validate the password with the realm password policy before updating it
  998. #ldap.connection-pooling.tooltip=Does Keycloak should use connection pooling for accessing LDAP server
  999. #ldap.connection-pooling.authentication.tooltip=A list of space-separated authentication types of connections that may be pooled. Valid types are "none", "simple", and "DIGEST-MD5".
  1000. #ldap.connection-pooling.debug.tooltip=A string that indicates the level of debug output to produce. Valid values are "fine" (trace connection creation and removal) and "all" (all debugging information).
  1001. #ldap.connection-pooling.initsize.tooltip=The string representation of an integer that represents the number of connections per connection identity to create when initially creating a connection for the identity.
  1002. #ldap.connection-pooling.maxsize.tooltip=The string representation of an integer that represents the maximum number of connections per connection identity that can be maintained concurrently.
  1003. #ldap.connection-pooling.prefsize.tooltip=The string representation of an integer that represents the preferred number of connections per connection identity that should be maintained concurrently.
  1004. #ldap.connection-pooling.protocol.tooltip=A list of space-separated protocol types of connections that may be pooled. Valid types are "plain" and "ssl".
  1005. #ldap.connection-pooling.timeout.tooltip=The string representation of an integer that represents the number of milliseconds that an idle connection may remain in the pool without being closed and removed from the pool.
  1006. #ldap.pagination.tooltip=Does the LDAP server support pagination.
  1007. #kerberos-integration=Kerberos Integration
  1008. #allow-kerberos-authentication=Allow Kerberos authentication
  1009. #ldap.allow-kerberos-authentication.tooltip=Enable/disable HTTP authentication of users with SPNEGO/Kerberos tokens. The data about authenticated users will be provisioned from this LDAP server
  1010. #use-kerberos-for-password-authentication=Use Kerberos For Password Authentication
  1011. #ldap.use-kerberos-for-password-authentication.tooltip=Use Kerberos login module for authenticate username/password against Kerberos server instead of authenticating against LDAP server with Directory Service API
  1012. #batch-size=Batch Size
  1013. #ldap.batch-size.tooltip=Count of LDAP users to be imported from LDAP to Keycloak within single transaction.
  1014. #ldap.periodic-full-sync.tooltip=Does periodic full synchronization of LDAP users to Keycloak should be enabled or not
  1015. #ldap.periodic-changed-users-sync.tooltip=Does periodic synchronization of changed or newly created LDAP users to Keycloak should be enabled or not
  1016. #ldap.changed-users-sync-period.tooltip=Period for synchronization of changed or newly created LDAP users in seconds
  1017. #user-federation-mappers=User Federation Mappers
  1018. #create-user-federation-mapper=Create user federation mapper
  1019. #add-user-federation-mapper=Add user federation mapper
  1020. #provider-name=Provider Name
  1021. #no-user-federation-providers-configured=No user federation providers configured
  1022. #no-user-storage-providers-configured=No user storage providers configured
  1023. #add-identity-provider=Add identity provider
  1024. #add-identity-provider-link=Add identity provider link
  1025. #identity-provider=Identity Provider
  1026. #identity-provider-user-id=Identity Provider User ID
  1027. #identity-provider-user-id.tooltip=Unique ID of the user on the Identity Provider side
  1028. #identity-provider-username=Identity Provider Username
  1029. #identity-provider-username.tooltip=Username on the Identity Provider side
  1030. #pagination=Pagination
  1031. #browser-flow=Browser Flow
  1032. #browser-flow.tooltip=Select the flow you want to use for browser authentication.
  1033. #registration-flow=Registration Flow
  1034. #registration-flow.tooltip=Select the flow you want to use for registration.
  1035. #direct-grant-flow=Direct Grant Flow
  1036. #direct-grant-flow.tooltip=Select the flow you want to use for direct grant authentication.
  1037. #reset-credentials=Reset Credentials
  1038. #reset-credentials.tooltip=Select the flow you want to use when the user has forgotten their credentials.
  1039. #client-authentication=Client Authentication
  1040. #client-authentication.tooltip=Select the flow you want to use for authentication of clients.
  1041. #docker-auth=Docker Authentication
  1042. #docker-auth.tooltip=Select the flow you want to use for authentication against a docker client.
  1043. new=Neu
  1044. copy=Kopieren
  1045. #add-execution=Add execution
  1046. #add-flow=Add flow
  1047. #auth-type=Auth Type
  1048. #requirement=Requirement
  1049. #config=Config
  1050. #no-executions-available=No executions available
  1051. #authentication-flows=Authentication Flows
  1052. #create-authenticator-config=Create authenticator config
  1053. #authenticator.alias.tooltip=Name of the configuration
  1054. #otp-type=OTP Type
  1055. #time-based=Time Based
  1056. #counter-based=Counter Based
  1057. #otp-type.tooltip=totp is Time-Based One Time Password. 'hotp' is a counter base one time password in which the server keeps a counter to hash against.
  1058. #otp-hash-algorithm=OTP Hash Algorithm
  1059. #otp-hash-algorithm.tooltip=What hashing algorithm should be used to generate the OTP.
  1060. #number-of-digits=Number of Digits
  1061. #otp.number-of-digits.tooltip=How many digits should the OTP have?
  1062. #look-ahead-window=Look Ahead Window
  1063. #otp.look-ahead-window.tooltip=How far ahead should the server look just in case the token generator and server are out of time sync or counter sync?
  1064. #initial-counter=Initial Counter
  1065. #otp.initial-counter.tooltip=What should the initial counter value be?
  1066. #otp-token-period=OTP Token Period
  1067. #otp-token-period.tooltip=How many seconds should an OTP token be valid? Defaults to 30 seconds.
  1068. #otp-supported-applications=Supported Applications
  1069. #otp-supported-applications.tooltip=Applications that are known to work with the current OTP policy
  1070. #table-of-password-policies=Table of Password Policies
  1071. #add-policy.placeholder=Add policy...
  1072. #policy-type=Policy Type
  1073. #policy-value=Policy Value
  1074. #admin-events=Admin Events
  1075. #admin-events.tooltip=Displays saved admin events for the realm. Events are related to admin account, for example a realm creation. To enable persisted events go to config.
  1076. #login-events=Login Events
  1077. #filter=Filter
  1078. #update=Update
  1079. #reset=Reset
  1080. #operation-types=Operation Types
  1081. #resource-types=Resource Types
  1082. #select-operations.placeholder=Select operations...
  1083. #select-resource-types.placeholder=Select resource types...
  1084. #resource-path=Resource Path
  1085. #resource-path.tooltip=Filter by resource path. Supports wildcard '*' (for example 'users/*').
  1086. #date-(from)=Date (From)
  1087. #date-(to)=Date (To)
  1088. #authentication-details=Authentication Details
  1089. ip-address=IP-Adresse
  1090. time=Zeit
  1091. #operation-type=Operation Type
  1092. #resource-type=Resource Type
  1093. #auth=Auth
  1094. #representation=Representation
  1095. register=Registrieren
  1096. #required-action=Required Action
  1097. #default-action=Default Action
  1098. #auth.default-action.tooltip=If enabled, any new user will have this required action assigned to it.
  1099. #no-required-actions-configured=No required actions configured
  1100. #defaults-to-id=Defaults to id
  1101. #flows=Flows
  1102. #bindings=Bindings
  1103. #client-flow-bindings=Authentication Flow Overrides
  1104. #client-flow-bindings.tooltip=Override realm authentication flow bindings.
  1105. #required-actions=Required Actions
  1106. #password-policy=Password Policy
  1107. #otp-policy=OTP Policy
  1108. user-groups=Benutzergruppen
  1109. default-groups=Standardgruppen
  1110. #groups.default-groups.tooltip=Set of groups that new users will automatically join.
  1111. cut=Ausschneiden
  1112. paste=Einf\u00FCgen
  1113. create-group=Gruppe erstellen
  1114. #create-authenticator-execution=Create Authenticator Execution
  1115. #create-form-action-execution=Create Form Action Execution
  1116. #create-top-level-form=Create Top Level Form
  1117. #flow.alias.tooltip=Specifies display name for the flow.
  1118. #top-level-flow-type=Top Level Flow Type
  1119. #flow.generic=generic
  1120. #flow.client=client
  1121. #top-level-flow-type.tooltip=What kind of top level flow is it? Type 'client' is used for authentication of clients (applications) when generic is for users and everything else
  1122. #create-execution-flow=Create Execution Flow
  1123. #flow-type=Flow Type
  1124. #flow.form.type=form
  1125. #flow.generic.type=generic
  1126. #flow-type.tooltip=What kind of form is it
  1127. #form-provider=Form Provider
  1128. #default-groups.tooltip=Newly created or registered users will automatically be added to these groups
  1129. select-a-type.placeholder=Typ ausw\u00E4hlen
  1130. available-groups=Verf\u00FCgbare Gruppen
  1131. #available-groups.tooltip=Select a group you want to add as a default.
  1132. value=Wert
  1133. #table-of-group-members=Table of group members
  1134. #table-of-role-members=Table of role members
  1135. last-name=Nachname
  1136. first-name=Vorname
  1137. email=Email
  1138. toggle-navigation=Navigation ein-/ausschalten
  1139. manage-account=Konto verwalten
  1140. sign-out=Abmelden
  1141. server-info=Server-Info
  1142. #resource-not-found=Resource <strong>not found</strong>...
  1143. #resource-not-found.instruction=We could not find the resource you are looking for. Please make sure the URL you entered is correct.
  1144. #go-to-the-home-page=Go to the home page &raquo;
  1145. #page-not-found=Page <strong>not found</strong>...
  1146. #page-not-found.instruction=We could not find the page you are looking for. Please make sure the URL you entered is correct.
  1147. #events.tooltip=Displays saved events for the realm. Events are related to user accounts, for example a user login. To enable persisted events go to config.
  1148. #select-event-types.placeholder=Select event types...
  1149. #events-config.tooltip=Displays configuration options to enable persistence of user and admin events.
  1150. select-an-action.placeholder=Aktion w\u00E4hlen...
  1151. #event-listeners.tooltip=Configure what listeners receive events for the realm.
  1152. #login.save-events.tooltip=If enabled login events are saved to the database which makes events available to the admin and account management consoles.
  1153. #clear-events.tooltip=Deletes all events in the database.
  1154. #events.expiration.tooltip=Sets the expiration for events. Expired events are periodically deleted from the database.
  1155. #admin-events-settings=Admin Events Settings
  1156. #save-events=Save Events
  1157. #admin.save-events.tooltip=If enabled admin events are saved to the database which makes events available to the admin console.
  1158. #saved-types.tooltip=Configure what event types are saved.
  1159. #include-representation=Include Representation
  1160. #include-representation.tooltip=Include JSON representation for create and update requests.
  1161. #clear-admin-events.tooltip=Deletes all admin events in the database.
  1162. #server-version=Server Version
  1163. #server-profile=Server Profile
  1164. #server-disabled=Server Disabled Features
  1165. #info=Info
  1166. #providers=Providers
  1167. #server-time=Server Time
  1168. #server-uptime=Server Uptime
  1169. #memory=Memory
  1170. #total-memory=Total Memory
  1171. #free-memory=Free Memory
  1172. #used-memory=Used Memory
  1173. #system=System
  1174. #current-working-directory=Current Working Directory
  1175. #java-version=Java Version
  1176. #java-vendor=Java Vendor
  1177. #java-runtime=Java Runtime
  1178. #java-vm=Java VM
  1179. #java-vm-version=Java VM Version
  1180. #java-home=Java Home
  1181. #user-name=User Name
  1182. #user-timezone=User Timezone
  1183. #user-locale=User Locale
  1184. #system-encoding=System Encoding
  1185. #operating-system=Operating System
  1186. #os-architecture=OS Architecture
  1187. #spi=SPI
  1188. granted-client-scopes=Gew\u00E4hrte Client-Scopes
  1189. additional-grants=Zus\u00E4tzliche Befugnisse
  1190. consent-created-date=Erstellt
  1191. consent-last-updated-date=Zuletzt aktualisiert
  1192. revoke=Widerrufen
  1193. new-password=Neues Passwort
  1194. password-confirmation=Passwort best\u00E4tigen
  1195. reset-password=Passwort zur\u00FCcksetzen
  1196. credentials.temporary.tooltip=Wenn eingeschaltet, ist der Benutzer beim n\u00E4chsten Login aufgefordert, dass Passwort zu \u00E4ndern.
  1197. #remove-totp=Remove OTP
  1198. #credentials.remove-totp.tooltip=Remove one time password generator for user.
  1199. reset-actions=Zur\u00FCcksetz-Aktionen
  1200. credentials.reset-actions.tooltip=Liste von Aktionen, die der Benutzer ausf\u00FChren soll, wenn er eine E-Mail zum Zur\u00FCcksetzen des Passworts erh\u00E4lt. 'Verify email' sendet bem Benutzer eine E-Mail um seine E-Mail-Adresse zu verifizieren. 'Update profile' verlangt vom Benutzer, dass er seine Profil-Informationen eingibt. 'Update password' verlangt vom Benutzer, dass er ein neues Passwort definiert. 'Configure OTP' verlangt vom Benutzer, dass er einen mobilen Passwort-Generator aufsetzt.
  1201. reset-actions-email=E-Mail zum Zur\u00FCcksetzen des Passworts senden
  1202. send-email=E-Mail senden
  1203. credentials.reset-actions-email.tooltip=Sendet eine E-Mail an den Benutzer mit einem eingebetteten Link. Wenn der Benutzer auf den Link klickt, kann er die Zur\u00FCcksetz-Aktion auszuf\u00FChren. Vorher muss sich der Benutzer nicht einloggen. Z.B. kann die Aktion 'update password' ausgew\u00E4hlt werden und dieser Button geklickt werden. Der Benutzer kann dann sein Passwort \u00E4ndern, ohne sich einzuloggen.
  1204. add-user=Benutzer hinzuf\u00FCgen
  1205. created-at=Erstellt am
  1206. user-enabled=Benutzer aktiv
  1207. user-enabled.tooltip=Ein deaktivierter Benutzer kann sich nicht einloggen
  1208. user-temporarily-locked=Benutzer tempor\u00E4r gesperrt
  1209. user-temporarily-locked.tooltip=Der Benutzer wurde vor\u00FCbergehend wegen zuvieler ung\u00FCltiger Loginversuche gesperrt.
  1210. unlock-user=Benutzer entsperren
  1211. #federation-link=Federation Link
  1212. email-verified=E-Mail verifiziert
  1213. email-verified.tooltip=Wurde die E-Mail des Benutzers verifiziert?
  1214. required-user-actions=Verlangte Benutzeraktionen
  1215. required-user-actions.tooltip=Verlangt eine Aktion wenn sich der Benutzer einloggt. 'E-Mail Verifizieren' sendet eine E-Mail an den Benutzer, um die G\u00FCltigkeit seiner E-Mailadresse zu pr\u00FCfen. 'Profil aktualisieren' verlangt, dass Benutzer ihre pers\u00F6nlichen Angaben eingeben. 'Passwort aktualisieren' zwingt Benutzer ein neues Passwort zu setzen. 'OTP konfigurieren' zwingt Benutzer einen mobilen Passwort-Generator einzurichten (i.e. Google Authenticator)
  1216. locale=Locale
  1217. #select-one.placeholder=Select one...
  1218. #impersonate=Impersonate
  1219. #impersonate-user=Impersonate user
  1220. #impersonate-user.tooltip=Login as this user. If user is in same realm as you, your current login session will be logged out before you are logged in as this user.
  1221. #identity-provider-alias=Identity Provider Alias
  1222. #provider-user-id=Provider User ID
  1223. #provider-username=Provider Username
  1224. #no-identity-provider-links-available=No identity provider links available
  1225. group-membership=Gruppen-Mitglied
  1226. leave=Verlassen
  1227. #group-membership.tooltip=Groups user is a member of. Select a listed group and click the Leave button to leave the group.
  1228. #membership.available-groups.tooltip=Groups a user can join. Select a group and click the join button.
  1229. #table-of-realm-users=Table of Realm Users
  1230. view-all-users=Zeige alle Benutzer
  1231. view-all-groups=Zeige alle Rollen
  1232. unlock-users=Benutzer entsperren
  1233. no-users-available=Keine Benutzer verf\u00FCgbar
  1234. #users.instruction=Please enter a search, or click on view all users
  1235. consents=Einwilligungen
  1236. started=Gestartet
  1237. logout-all-sessions=Alle Sessions ausloggen
  1238. logout=Ausloggen
  1239. new-name=Neuer Name
  1240. ok=Ok
  1241. attributes=Attribute
  1242. role-mappings=Rollenzuweisungen
  1243. members=Mitglieder
  1244. details=Details
  1245. #identity-provider-links=Identity Provider Links
  1246. #register-required-action=Register required action
  1247. gender=Geschlecht
  1248. address=Adresse
  1249. phone=Telefon
  1250. #profile-url=Profile URL
  1251. #picture-url=Picture URL
  1252. #website=Website
  1253. #import-keys-and-cert=Import keys and cert
  1254. #import-keys-and-cert.tooltip=Upload the client's key pair and cert.
  1255. #upload-keys=Upload Keys
  1256. #download-keys-and-cert=Download keys and cert
  1257. #no-value-assigned.placeholder=No value assigned
  1258. remove=Entfernen
  1259. #no-group-members=No group members
  1260. #no-role-members=No role members
  1261. temporary=Tempor\u00E4r
  1262. join=Beitreten
  1263. #event-type=Event Type
  1264. #events-config=Events Config
  1265. #event-listeners=Event Listeners
  1266. #login-events-settings=Login Events Settings
  1267. #clear-events=Clear events
  1268. #saved-types=Saved Types
  1269. #clear-admin-events=Clear admin events
  1270. #clear-changes=Clear changes
  1271. #error=Error
  1272. # Authz
  1273. # Authz Common
  1274. #authz-authorization=Authorization
  1275. #authz-owner=Owner
  1276. #authz-uri=URI
  1277. #authz-uris=URIS
  1278. #authz-scopes=Scopes
  1279. #authz-resource=Resource
  1280. #authz-resource-type=Resource Type
  1281. #authz-resources=Resources
  1282. #authz-scope=Scope
  1283. #authz-authz-scopes=Authorization Scopes
  1284. #authz-policies=Policies
  1285. #authz-policy=Policy
  1286. #authz-permissions=Permissions
  1287. #authz-users=Users in Role
  1288. #authz-evaluate=Evaluate
  1289. #authz-icon-uri=Icon URI
  1290. #authz-icon-uri.tooltip=An URI pointing to an icon.
  1291. #authz-select-scope=Select a scope
  1292. #authz-select-resource=Select a resource
  1293. #authz-associated-policies=Associated Policies
  1294. #authz-any-resource=Any resource
  1295. #authz-any-scope=Any scope
  1296. #authz-any-role=Any role
  1297. #authz-policy-evaluation=Policy Evaluation
  1298. #authz-select-client=Select a client
  1299. #authz-select-user=Select a user
  1300. #authz-entitlements=Entitlements
  1301. #authz-no-resources=No resources
  1302. #authz-result=Result
  1303. #authz-authorization-services-enabled=Authorization Enabled
  1304. #authz-authorization-services-enabled.tooltip=Enable/Disable fine-grained authorization support for a client
  1305. #authz-required=Required
  1306. #authz-show-details=Show Details
  1307. #authz-hide-details=Hide Details
  1308. #authz-associated-permissions=Associated Permissions
  1309. #authz-no-permission-associated=No permissions associated
  1310. # Authz Settings
  1311. #authz-import-config.tooltip=Import a JSON file containing authorization settings for this resource server.
  1312. #authz-policy-enforcement-mode=Policy Enforcement Mode
  1313. #authz-policy-enforcement-mode.tooltip=The policy enforcement mode dictates how policies are enforced when evaluating authorization requests. 'Enforcing' means requests are denied by default even when there is no policy associated with a given resource. 'Permissive' means requests are allowed even when there is no policy associated with a given resource. 'Disabled' completely disables the evaluation of policies and allows access to any resource.
  1314. #authz-policy-enforcement-mode-enforcing=Enforcing
  1315. #authz-policy-enforcement-mode-permissive=Permissive
  1316. #authz-policy-enforcement-mode-disabled=Disabled
  1317. #authz-remote-resource-management=Remote Resource Management
  1318. #authz-remote-resource-management.tooltip=Should resources be managed remotely by the resource server? If false, resources can be managed only from this admin console.
  1319. #authz-export-settings=Export Settings
  1320. #authz-export-settings.tooltip=Export and download all authorization settings for this resource server.
  1321. # Authz Resource List
  1322. #authz-no-resources-available=No resources available.
  1323. #authz-no-scopes-assigned=No scopes assigned.
  1324. #authz-no-type-defined=No type defined.
  1325. #authz-no-uri-defined=No URI defined.
  1326. #authz-no-permission-assigned=No permission assigned.
  1327. #authz-no-policy-assigned=No policy assigned.
  1328. #authz-create-permission=Create Permission
  1329. # Authz Resource Detail
  1330. #authz-add-resource=Add Resource
  1331. #authz-resource-name.tooltip=A unique name for this resource. The name can be used to uniquely identify a resource, useful when querying for a specific resource.
  1332. #authz-resource-owner.tooltip=The owner of this resource.
  1333. #authz-resource-type.tooltip=The type of this resource. It can be used to group different resource instances with the same type.
  1334. #authz-resource-uri.tooltip=Set of URIs which are protected by resource.
  1335. #authz-resource-scopes.tooltip=The scopes associated with this resource.
  1336. #authz-resource-attributes=Resource Attributes
  1337. #authz-resource-attributes.tooltip=The attributes associated wth the resource.
  1338. #authz-resource-user-managed-access-enabled=User-Managed Access Enabled
  1339. #authz-resource-user-managed-access-enabled.tooltip=If enabled this access to this resource can be managed by the resource owner.
  1340. # Authz Scope List
  1341. #authz-add-scope=Add Scope
  1342. #authz-no-scopes-available=No scopes available.
  1343. # Authz Scope Detail
  1344. #authz-scope-name.tooltip=A unique name for this scope. The name can be used to uniquely identify a scope, useful when querying for a specific scope.
  1345. # Authz Policy List
  1346. #authz-all-types=All types
  1347. #authz-create-policy=Create Policy
  1348. #authz-no-policies-available=No policies available.
  1349. # Authz Policy Detail
  1350. #authz-policy-name.tooltip=The name of this policy.
  1351. #authz-policy-description.tooltip=A description for this policy.
  1352. #authz-policy-logic=Logic
  1353. #authz-policy-logic-positive=Positive
  1354. #authz-policy-logic-negative=Negative
  1355. #authz-policy-logic.tooltip=The logic dictates how the policy decision should be made. If 'Positive', the resulting effect (permit or deny) obtained during the evaluation of this policy will be used to perform a decision. If 'Negative', the resulting effect will be negated, in other words, a permit becomes a deny and vice-versa.
  1356. #authz-policy-apply-policy=Apply Policy
  1357. #authz-policy-apply-policy.tooltip=Specifies all the policies that must be applied to the scopes defined by this policy or permission.
  1358. #authz-policy-decision-strategy=Decision Strategy
  1359. #authz-policy-decision-strategy.tooltip=The decision strategy dictates how the policies associated with a given permission are evaluated and how a final decision is obtained. 'Affirmative' means that at least one policy must evaluate to a positive decision in order for the final decision to be also positive. 'Unanimous' means that all policies must evaluate to a positive decision in order for the final decision to be also positive. 'Consensus' means that the number of positive decisions must be greater than the number of negative decisions. If the number of positive and negative is the same, the final decision will be negative.
  1360. #authz-policy-decision-strategy-affirmative=Affirmative
  1361. #authz-policy-decision-strategy-unanimous=Unanimous
  1362. #authz-policy-decision-strategy-consensus=Consensus
  1363. #authz-select-a-policy=Select existing policy
  1364. #authz-no-policies-assigned=No policies assigned.
  1365. # Authz Role Policy Detail
  1366. #authz-add-role-policy=Add Role Policy
  1367. #authz-no-roles-assigned=No roles assigned.
  1368. #authz-policy-role-realm-roles.tooltip=Specifies the *realm* roles allowed by this policy.
  1369. #authz-policy-role-clients.tooltip=Selects a client in order to filter the client roles that can be applied to this policy.
  1370. #authz-policy-role-client-roles.tooltip=Specifies the client roles allowed by this policy.
  1371. # Authz User Policy Detail
  1372. #authz-add-user-policy=Add User Policy
  1373. #authz-no-users-assigned=No users assigned.
  1374. #authz-policy-user-users.tooltip=Specifies which user(s) are allowed by this policy.
  1375. # Authz Client Policy Detail
  1376. #authz-add-client-policy=Add Client Policy
  1377. #authz-no-clients-assigned=No clients assigned.
  1378. #authz-policy-client-clients.tooltip=Specifies which client(s) are allowed by this policy.
  1379. # Authz Time Policy Detail
  1380. #authz-add-time-policy=Add Time Policy
  1381. #authz-policy-time-not-before.tooltip=Defines the time before which the policy MUST NOT be granted. Only granted if current date/time is after or equal to this value.
  1382. #authz-policy-time-not-on-after=Not On or After
  1383. #authz-policy-time-not-on-after.tooltip=Defines the time after which the policy MUST NOT be granted. Only granted if current date/time is before or equal to this value.
  1384. #authz-policy-time-day-month=Day of Month
  1385. #authz-policy-time-day-month.tooltip=Defines the day of month which the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current day of month is between or equal to the two values you provided.
  1386. #authz-policy-time-month=Month
  1387. #authz-policy-time-month.tooltip=Defines the month which the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current month is between or equal to the two values you provided.
  1388. #authz-policy-time-year=Year
  1389. #authz-policy-time-year.tooltip=Defines the year which the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current year is between or equal to the two values you provided.
  1390. #authz-policy-time-hour=Hour
  1391. #authz-policy-time-hour.tooltip=Defines the hour which the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current hour is between or equal to the two values you provided.
  1392. #authz-policy-time-minute=Minute
  1393. #authz-policy-time-minute.tooltip=Defines the minute which the policy MUST be granted. You can also provide a range by filling the second field. In this case, permission is granted only if current minute is between or equal to the two values you provided.
  1394. # Authz Drools Policy Detail
  1395. #authz-add-drools-policy=Add Rules Policy
  1396. #authz-policy-drools-maven-artifact-resolve=Resolve
  1397. #authz-policy-drools-maven-artifact=Policy Maven Artifact
  1398. #authz-policy-drools-maven-artifact.tooltip=A Maven GAV pointing to an artifact from where the rules would be loaded from. Once you have provided the GAV, you can click *Resolve* to load both *Module* and *Session* fields.
  1399. #authz-policy-drools-module=Module
  1400. #authz-policy-drools-module.tooltip=The module used by this policy. You must provide a module in order to select a specific session from where rules will be loaded from.
  1401. #authz-policy-drools-session=Session
  1402. #authz-policy-drools-session.tooltip=The session used by this policy. The session provides all the rules to evaluate when processing the policy.
  1403. #authz-policy-drools-update-period=Update Period
  1404. #authz-policy-drools-update-period.tooltip=Specifies an interval for scanning for artifact updates.
  1405. # Authz JS Policy Detail
  1406. #authz-add-js-policy=Add JavaScript Policy
  1407. #authz-policy-js-code=Code
  1408. #authz-policy-js-code.tooltip=The JavaScript code providing the conditions for this policy.
  1409. # Authz Aggregated Policy Detail
  1410. #authz-aggregated=Aggregated
  1411. #authz-add-aggregated-policy=Add Aggregated Policy
  1412. # Authz Group Policy Detail
  1413. #authz-add-group-policy=Add Group Policy
  1414. #authz-no-groups-assigned=No groups assigned.
  1415. #authz-policy-group-claim=Groups Claim
  1416. #authz-policy-group-claim.tooltip=If defined, the policy will fetch user's groups from the given claim within an access token or ID token representing the identity asking permissions. If not defined, user's groups are obtained from your realm configuration.
  1417. #authz-policy-group-groups.tooltip=Specifies the groups allowed by this policy.
  1418. # Authz Permission List
  1419. #authz-no-permissions-available=No permissions available.
  1420. # Authz Permission Detail
  1421. #authz-permission-name.tooltip=The name of this permission.
  1422. #authz-permission-description.tooltip=A description for this permission.
  1423. # Authz Resource Permission Detail
  1424. #authz-add-resource-permission=Add Resource Permission
  1425. #authz-permission-resource-apply-to-resource-type=Apply to Resource Type
  1426. #authz-permission-resource-apply-to-resource-type.tooltip=Specifies if this permission would be applied to all resources with a given type. In this case, this permission will be evaluated for all instances of a given resource type.
  1427. #authz-permission-resource-resource.tooltip=Specifies that this permission must be applied to a specific resource instance.
  1428. #authz-permission-resource-type.tooltip=Specifies that this permission must be applied to all resources instances of a given type.
  1429. # Authz Scope Permission Detail
  1430. #authz-add-scope-permission=Add Scope Permission
  1431. #authz-permission-scope-resource.tooltip=Restrict the scopes to those associated with the selected resource. If not selected all scopes would be available.
  1432. #authz-permission-scope-scope.tooltip=Specifies that this permission must be applied to one or more scopes.
  1433. # Authz Evaluation
  1434. #authz-evaluation-identity-information=Identity Information
  1435. #authz-evaluation-identity-information.tooltip=The available options to configure the identity information that will be used when evaluating policies.
  1436. #authz-evaluation-client.tooltip=Select the client making this authorization request. If not provided, authorization requests would be done based on the client you are in.
  1437. #authz-evaluation-user.tooltip=Select a user whose identity is going to be used to query permissions from the server.
  1438. #authz-evaluation-role.tooltip=Select the roles you want to associate with the selected user.
  1439. #authz-evaluation-new=New Evaluation
  1440. #authz-evaluation-re-evaluate=Re-Evaluate
  1441. #authz-evaluation-previous=Previous Evaluation
  1442. #authz-evaluation-contextual-info=Contextual Information
  1443. #authz-evaluation-contextual-info.tooltip=The available options to configure any contextual information that will be used when evaluating policies.
  1444. #authz-evaluation-contextual-attributes=Contextual Attributes
  1445. #authz-evaluation-contextual-attributes.tooltip=Any attribute provided by a running environment or execution context.
  1446. #authz-evaluation-permissions.tooltip=The available options to configure the permissions to which policies will be applied.
  1447. #authz-evaluation-evaluate=Evaluate
  1448. #authz-evaluation-any-resource-with-scopes=Any resource with scope(s)
  1449. #authz-evaluation-no-result=Could not obtain any result for the given authorization request. Check if the provided resource(s) or scope(s) are associated with any policy.
  1450. #authz-evaluation-no-policies-resource=No policies were found for this resource.
  1451. #authz-evaluation-result.tooltip=The overall result for this permission request.
  1452. #authz-evaluation-scopes.tooltip=The list of allowed scopes.
  1453. #authz-evaluation-policies.tooltip=Details about which policies were evaluated and their decisions.
  1454. #authz-evaluation-authorization-data=Response
  1455. #authz-evaluation-authorization-data.tooltip=Represents a token carrying authorization data as a result of the processing of an authorization request. This representation is basically what Keycloak issues to clients asking for permissions. Check the 'authorization' claim for the permissions that were granted based on the current authorization request.
  1456. #authz-show-authorization-data=Show Authorization Data
  1457. keys=Keys
  1458. status=Status
  1459. #keystore=Keystore
  1460. #keystores=Keystores
  1461. #add-keystore=Add Keystore
  1462. #add-keystore.placeholder=Add keystore...
  1463. #view=View
  1464. active=Aktiv
  1465. #passive=Passive
  1466. #disabled=Disabled
  1467. #algorithms=Algorithms
  1468. #providerHelpText=Provider description
  1469. Sunday=Sonntag
  1470. Monday=Montag
  1471. Tuesday=Dienstag
  1472. Wednesday=Mittwoch
  1473. Thursday=Donnerstag
  1474. Friday=Freitag
  1475. Saturday=Samstag
  1476. #user-storage-cache-policy=Cache Settings
  1477. #userStorage.cachePolicy=Cache Policy
  1478. #userStorage.cachePolicy.option.DEFAULT=DEFAULT
  1479. #userStorage.cachePolicy.option.EVICT_WEEKLY=EVICT_WEEKLY
  1480. #userStorage.cachePolicy.option.EVICT_DAILY=EVICT_DAILY
  1481. #userStorage.cachePolicy.option.MAX_LIFESPAN=MAX_LIFESPAN
  1482. #userStorage.cachePolicy.option.NO_CACHE=NO_CACHE
  1483. #userStorage.cachePolicy.tooltip=Cache Policy for this storage provider. 'DEFAULT' is whatever the default settings are for the global cache. 'EVICT_DAILY' is a time of day every day that the cache will be invalidated. 'EVICT_WEEKLY' is a day of the week and time the cache will be invalidated. 'MAX-LIFESPAN' is the time in milliseconds that will be the lifespan of a cache entry.
  1484. #userStorage.cachePolicy.evictionDay=Eviction Day
  1485. #userStorage.cachePolicy.evictionDay.tooltip=Day of the week the entry will become invalid on
  1486. #userStorage.cachePolicy.evictionHour=Eviction Hour
  1487. #userStorage.cachePolicy.evictionHour.tooltip=Hour of day the entry will become invalid on.
  1488. #userStorage.cachePolicy.evictionMinute=Eviction Minute
  1489. #userStorage.cachePolicy.evictionMinute.tooltip=Minute of day the entry will become invalid on.
  1490. #userStorage.cachePolicy.maxLifespan=Max Lifespan
  1491. #userStorage.cachePolicy.maxLifespan.tooltip=Max lifespan of cache entry in milliseconds.
  1492. #user-origin-link=Storage Origin
  1493. #user-origin.tooltip=UserStorageProvider the user was loaded from
  1494. #user-link.tooltip=UserStorageProvider this locally stored user was imported from.
  1495. #client-origin-link=Storage Origin
  1496. #client-origin.tooltip=Provider the client was loaded from
  1497. #client-storage-cache-policy=Cache Settings
  1498. #clientStorage.cachePolicy=Cache Policy
  1499. #clientStorage.cachePolicy.option.DEFAULT=DEFAULT
  1500. #clientStorage.cachePolicy.option.EVICT_WEEKLY=EVICT_WEEKLY
  1501. #clientStorage.cachePolicy.option.EVICT_DAILY=EVICT_DAILY
  1502. #clientStorage.cachePolicy.option.MAX_LIFESPAN=MAX_LIFESPAN
  1503. #clientStorage.cachePolicy.option.NO_CACHE=NO_CACHE
  1504. #clientStorage.cachePolicy.tooltip=Cache Policy for this storage provider. 'DEFAULT' is whatever the default settings are for the global cache. 'EVICT_DAILY' is a time of day every day that the cache will be invalidated. 'EVICT_WEEKLY' is a day of the week and time the cache will be invalidated. 'MAX-LIFESPAN' is the time in milliseconds that will be the lifespan of a cache entry.
  1505. #clientStorage.cachePolicy.evictionDay=Eviction Day
  1506. #clientStorage.cachePolicy.evictionDay.tooltip=Day of the week the entry will become invalid on
  1507. #clientStorage.cachePolicy.evictionHour=Eviction Hour
  1508. #clientStorage.cachePolicy.evictionHour.tooltip=Hour of day the entry will become invalid on.
  1509. #clientStorage.cachePolicy.evictionMinute=Eviction Minute
  1510. #clientStorage.cachePolicy.evictionMinute.tooltip=Minute of day the entry will become invalid on.
  1511. #clientStorage.cachePolicy.maxLifespan=Max Lifespan
  1512. #clientStorage.cachePolicy.maxLifespan.tooltip=Max lifespan of cache entry in milliseconds.
  1513. #client-storage-list-no-entries=Keycloak can federate external client databases. Out of the box we have support for Openshift OAuth clients and service accounts. To get started select a provider from the dropdown below:
  1514. disable=Deaktivieren
  1515. disableable-credential-types=Deaktivierbare Typen
  1516. credentials.disableable.tooltip=Liste von Zugangstypen, die deaktiviert werden k\u00F6nnen.
  1517. disable-credential-types=Zugangstypen deaktivieren
  1518. credentials.disable.tooltip=Dr\u00FCcken Sie den Button, um die ausgew\u00E4hlten Zugangstypen zu sperren.
  1519. credential-types=Zugangstypen
  1520. manage-user-password=Zugang verwalten
  1521. disable-credentials=Zugang deaktivieren
  1522. credential-reset-actions=Zugang zur\u00FCcksetzen
  1523. credential-reset-actions-timeout=L\u00E4uft ab in
  1524. credential-reset-actions-timeout.tooltip=Maximale Zeit in der die Aktion zugelassen ist.
  1525. #ldap-mappers=LDAP Mappers
  1526. #create-ldap-mapper=Create LDAP mapper
  1527. #map-role-mgmt-scope-description=Policies that decide if an admin can map this role to a user or group
  1528. #manage-authz-users-scope-description=Policies that decide if an admin can manage all users in the realm
  1529. #view-authz-users-scope-description=Policies that decide if an admin can view all users in realm
  1530. permissions-enabled-role=Berechtigungen aktiv
  1531. permissions-enabled-role.tooltip=Legt fest, ob feingranulare Berechtigungen f\u00FCr diese Rolle aktiv sein sollen. Wird diese Option deaktiviert, werden alle aktuell aufgesetzten Berechtigungen gel\u00F6scht.
  1532. manage-permissions-role.tooltip=Feingranulare Berechtigungen f\u00FCr Rollen. Zum Beispiel k\u00F6nnen Berechtigungen eingerichtet werden, die festlegen, wer berechtigt, ist eine Rolle zuzuweisen.
  1533. lookup=Suche
  1534. manage-permissions-users.tooltip=Feingranulare Berechtigungen f\u00FCr alle Benutzer in diesem Realm. Es k\u00F6nnen verschiedene Einstellungen definiert werden, wer in diesem Realm berechtigt ist, Benutzer zu verwalten.
  1535. permissions-enabled-users=Berechtigungen aktiv
  1536. permissions-enabled-users.tooltip=Legt fest, ob feingranulare Berechtigungen f\u00FCr Benutzer aktiv sein sollen. Wird diese Option deaktiviert, werden alle aktuell aufgesetzten Berechtigungen gel\u00F6scht.
  1537. #manage-permissions-client.tooltip=Fine grain permissions for admins that want to manage this client or apply roles defined by this client.
  1538. #manage-permissions-group.tooltip=Fine grain permissions for admins that want to manage this group or the members of this group.
  1539. #manage-authz-group-scope-description=Policies that decide if an admin can manage this group
  1540. #view-authz-group-scope-description=Policies that decide if an admin can view this group
  1541. #view-members-authz-group-scope-description=Policies that decide if an admin can view the members of this group
  1542. #token-exchange-authz-client-scope-description=Policies that decide which clients are allowed exchange tokens for a token that is targeted to this client.
  1543. #token-exchange-authz-idp-scope-description=Policies that decide which clients are allowed exchange tokens for an external token minted by this identity provider.
  1544. #manage-authz-client-scope-description=Policies that decide if an admin can manage this client
  1545. #configure-authz-client-scope-description=Reduced management permissions for admin. Cannot set scope, template, or protocol mappers.
  1546. #view-authz-client-scope-description=Policies that decide if an admin can view this client
  1547. #map-roles-authz-client-scope-description=Policies that decide if an admin can map roles defined by this client
  1548. #map-roles-client-scope-authz-client-scope-description=Policies that decide if an admin can apply roles defined by this client to the client scope of another client
  1549. #map-roles-composite-authz-client-scope-description=Policies that decide if an admin can apply roles defined by this client as a composite to another role
  1550. #map-role-authz-role-scope-description=Policies that decide if an admin can map this role to a user or group
  1551. #map-role-client-scope-authz-role-scope-description=Policies that decide if an admin can apply this role to the client scope of a client
  1552. #map-role-composite-authz-role-scope-description=Policies that decide if an admin can apply this role as a composite to another role
  1553. #manage-group-membership-authz-users-scope-description=Policies that decide if an admin can manage group membership for all users in the realm. This is used in conjunction with specific group policy
  1554. #impersonate-authz-users-scope-description=Policies that decide if admin can impersonate other users
  1555. #map-roles-authz-users-scope-description=Policies that decide if admin can map roles for all users
  1556. #user-impersonated-authz-users-scope-description=Policies that decide which users can be impersonated. These policies are applied to the user being impersonated.
  1557. #manage-membership-authz-group-scope-description=Policies that decide if an admin can add or remove users from this group
  1558. #manage-members-authz-group-scope-description=Policies that decide if an admin can manage the members of this group
  1559. # KEYCLOAK-6771 Certificate Bound Token
  1560. # https://tools.ietf.org/html/draft-ietf-oauth-mtls-08#section-3
  1561. #advanced-client-settings=Advanced Settings
  1562. #advanced-client-settings.tooltip=Expand this section to configure advanced settings of this client
  1563. #tls-client-certificate-bound-access-tokens=OAuth 2.0 Mutual TLS Certificate Bound Access Tokens Enabled
  1564. #tls-client-certificate-bound-access-tokens.tooltip=This enables support for OAuth 2.0 Mutual TLS Certificate Bound Access Tokens, which means that keycloak bind an access token and a refresh token with a X.509 certificate of a token requesting client exchanged in mutual TLS between keycloak's Token Endpoint and this client. These tokens can be treated as Holder-of-Key tokens instead of bearer tokens.
  1565. #subjectdn=Subject DN
  1566. #subjectdn-tooltip=A regular expression for validating Subject DN in the Client Certificate. Use "(.*?)(?:$)" to match all kind of expressions.
  1567. notifications.info.header=Information!
  1568. notifications.success.header=Erfolg!
  1569. notifications.error.header=Fehler!
  1570. notifications.warn.header=Warnung!
  1571. dialogs.delete.title={{type}} l\u00F6schen
  1572. dialogs.delete.message=Sind Sie sicher, dass Sie {{type}} {{name}} l\u00F6schen m\u00F6chten?
  1573. dialogs.delete.confirm=L\u00F6schen
  1574. dialogs.cancel=Abbrechen
  1575. dialogs.ok=OK