KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /usr/share/locale/zh_CN/LC_MESSAGES/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/locale/zh_CN/LC_MESSAGES/authconfig.mo
3
N
16?PYa	jt

^*(/Xas	4;J
(?Xm EUam
&+4kF
!"'+8DYP	
}h0r="!%"G
ju#<Rr}	  $ @ Q a !
-!8!<!1K!/}!!!!2!	"""6"F"
V"(a"0"0"1"#&#.>#)m#[#_#+S$$$$$$$$	%'%5>% t%%*%,% &+#&%O&1u&.&.&*'%0'(V'*''-'/'$%(<J(5(1(7(+')>S)))+))**$3*0X*-*-*)*$+'4+)\++,+.+#+4",>W, ,1,(,D-)W-0-*---G{.F.D
/4O////'/e/OY111
11111112	22
2)2<2C2J2=W22'2222223'3:3P3h3|33333
3344#444;4L4c4}444444s5
555r5(6	/696F6Y6`6i6Ty66666
77 737:7
>7I7V7Ih7	7777	777
7
7k7h8u88888]899Z9::#;; ;
<<<+<><
P<[<m<
<<<(<<<==v$=======>>>>,>2>)?
;?I?"Q?
t??#????!?*?'*@$R@w@~@*@'@E@H6A'AAAAABB2B"IBlB5BBBBC C8CVCnCC)CCC!	D!+DMD!`D*D!D>D-E$<E$aE/E-EEEF4FRF$jFF)FFF!G!0GRG!bG*G!G-G8G8H$WH|H;H$H'H'$ILIrYI5I8J9;J-uJJJJJ"Cuc=/k3KHGJX4I_@|L<eDbZ;25'q:&\>Av8
gUy+wj^PT1V6tdsl
N!F[#,QSz?{ phmM`o$Y97)xWR*i.-EnB}Ofa]%~(	0r <Tab>/<Alt-Tab> between elements   |   <Space> selects   |  <F12> next screen*<URL><b>Options</b><b>Smart Card</b><dn><domain><lowest-highest><module><realm><server><servers><workgroup>ADS Realm:Admin Server:AlertAuthenticationAuthentication ConfigurationAuthentication module %s/pam_%s.so is missing. Authentication process will not work correctly.BackBad smart card removal action specified.Base DN:Cache InformationCache User _InformationCancelCard Removal _ActionCertificate _URLCon_figure SMB...Configure H_esiod...Configure K_erberos...Configure L_DAP...Configure NI_S...Configure Sma_rt Card...Configure Win_bind...Control how the system verifies users who attempt to log inDo_n't SaveDomainDomain Administrator:Domain Controllers:Domain _AdministratorDomain:Download CA CertificateEnable SMB S_upportEnable Smart _Card SupportEnable _Hesiod SupportEnable _Kerberos SupportEnable _LDAP SupportEnable _NIS SupportEnable _Winbind SupportError downloading CA certificateFor user accounts maintained in local /etc/passwd file system will not check authorization from network services such as LDAP or Kerberos.Hesiod SettingsHesiod _LHSHesiod _RHSHesiod allows a system administrator to publish user and group information in DNS.  It is sometimes used in very large networks.IgnoreJoin DomainJoin SettingsJoining Winbind DomainKDC:KerberosKerberos SettingsKerberos is a trusted third-party authentication system which is commonly used in medium to large networks.LDAPLDAP Search _Base DNLDAP SettingsLDAP _ServerLDAP authenticationLHS:Local authorization is sufficientLockNISNIS SettingsNIS _DomainNIS _ServerNIS is the Network Information Service.  It is commonly used on small to medium networks.NextNoOkOptionsPassword:RHS:Realm:SMB SettingsSMB authenticationSMB authentication verifies user passwords by attempting to connect to a server which uses the SMB (system message block) protocol suite.Save SettingsSecurity Model:Server:Servers:Shell:Smart Card SettingsSmart card authentication allows you to log in using a certificate and key associated with a smart card.Some of the configuration changes you've made should be saved to disk before continuing.  If you do not save them, then your attempt to join the domain may fail.  Save changes?Template Shell:The %s file was not found, but it is required for %s support to work properly.
Install the %s package, which provides this file.The Lightweight Directory Access Protocol is a standard way of searching a directory, which can hold arbitrary data in a structured hierarchy. LDAP is increasingly being used in small to large networks.To connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory.
Then press OK.Use DNS to _locate KDCs for realmsUse DNS to locate KDCs for realmsUse DNS to resolve hosts to realmsUse HesiodUse KerberosUse LDAPUse LDAP AuthenticationUse MD5 PasswordsUse NISUse SMB AuthenticationUse Shadow PasswordsUse TLSUse WinbindUse Winbind AuthenticationUse _DNS to resolve hosts to realmsUse _Shadow PasswordsUse _TLS to encrypt connectionsUser InformationWarningWhen enabled allows network services such as LDAP or Kerberos to authenticate system accounts including root on this machine.WinbindWinbind ADS _RealmWinbind Domain Co_ntrollersWinbind SettingsWinbind _DomainWinbind allows a system to retrieve information about users and to authenticate users by using information stored in an NTDOM or ADS server.  It is used in small to large networks.Winbind authenticationWorkgroup:Yes_Admin Servers_Authenticate system accounts by network services_Check access.conf during account authorization_Domain Controllers_Join Domain_KDCs_Local authorization is sufficient for local users_Password_Realm_Require smart card for login_Security Model_Template Shell_Workgroupaction to be taken on smart card removalauthenticate system accounts by local files onlyauthenticate system accounts by network servicesauthorize local users also through remote servicecachingcan only be run as rootcheck access.conf during account authorizationconfigures winbind to allow offline loginconfigures winbind to assume that users with no domain in their user names are domain usersconfigures winbind to assume that users with no domain in their user names are not domain usersconfigures winbind to prevent offline logindefault LDAP base DNdefault LDAP serverdefault NIS domaindefault NIS serverdefault hesiod LHSdefault hesiod RHSdefault kerberos KDCdefault kerberos admin serverdefault kerberos realmdefault realm for samba and winbind when security=adsdefault smart card module to usedialog was cancelleddisable LDAP for authentication by defaultdisable LDAP for user information by defaultdisable MD5 passwords by defaultdisable NIS for user information by defaultdisable SMB authentication by defaultdisable authentication with smart card by defaultdisable caching of user information by defaultdisable hesiod for user information by defaultdisable kerberos authentication by defaultdisable shadowed passwords by defaultdisable use of DNS to find kerberos KDCsdisable use of DNS to find kerberos realmsdisable use of TLS with LDAPdisable winbind for authentication by defaultdisable winbind for user information by defaultdisable wins for hostname resolutiondisplay Back instead of Cancel in the main dialog of the TUIdo not check access.conf during account authorizationdo not display the deprecated text user interfacedo not require smart card for authentication by defaultdo not start/stop portmap, ypbind, and nscddo not update the configuration files, only print new settingsenable LDAP for authentication by defaultenable LDAP for user information by defaultenable MD5 passwords by defaultenable NIS for user information by defaultenable SMB authentication by defaultenable authentication with smart card by defaultenable caching of user information by defaultenable hesiod for user information by defaultenable kerberos authentication by defaultenable shadowed passwords by defaultenable use of DNS to find kerberos KDCsenable use of DNS to find kerberos realmsenable use of TLS with LDAPenable winbind for authentication by defaultenable winbind for user information by defaultenable wins for hostname resolutiongid range winbind will assign to domain or ads usersjoin the winbind domain or ads realm now as this administratorload CA certificate from the URLlocal authorization is sufficient for local usersnames of servers to authenticate againstopposite of --test, update configuration files with changed settingsprobe network for defaults and print themrequire smart card for authentication by defaultsecurity mode to use for samba and winbindshadow passwordthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabledthe directory which winbind-created users will have as home directoriesthe group which winbind-created users will have as their primary groupthe shell which winbind-created users will have as their login shelluid range winbind will assign to domain or ads usersunexpected argumentupdate all configuration filesusage: %s [options]workgroup authentication servers are inProject-Id-Version: zh_CN
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2008-01-09 21:30+0100
PO-Revision-Date: 2007-09-05 09:54+1000
Last-Translator: Leah Liu <lliu@redhat.com>
Language-Team: Chinese, Simplied(简体中文) <zh_CN@li.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Generator: KBabel 1.11.4
<Tab>/<Alt-Tab> 在元素间切换   |   <Space> 选择   |  <F12> 下一屏幕*<URL><b>选项</b><b>智能卡</b><dn><domain><lowest-highest><module><realm><server><server><workgroup>ADS 域:管理服务器:警告验证验证配置缺少验证模块 %s/pam_%s.so。验证无法正常进行。后退指定的错误的智能卡删除动作基本 DN:缓存信息缓存用户信息 (_I)取消删除卡的操作(_A)证书 URL(_U)配置 SMB (_f)...配置 Hesiod (_e)...配置 Kerberos (_e)...配置 LDAP (_D)...配置 NIS (_S)...配置智能卡(_r)...配置 Winbind (_b)...控制系统对试图登录的用户的校验方式不保存(_n)域域管理员:域控制器:域管理员(_A)域:下载 CA 证书启用 SMB 支持 (_u)启用智能卡支持(_c)启用 Hesiod 支持 (_H)启用 Kerberos 支持 (_K)启用 LDAP 支持 (_L)启用 NIS 支持 (_N)启用 Winbind 支持(_W)下载 CA 证书错误使用本地 /etc/passwd 文件维护的用户账号不使用网络服务(如 LDAP 或 Kerberos)进行验证。Hesiod 设置Hesiod LHS (_L)Hesiod RHS (_R)Hesiod 允许系统管理员在 DNS 中公布用户及组群信息。它有时在非常大型的网络中使用。忽略加入域加入设置加入 Winbind 域KDC:KerberosKerberos 设置Kerberos 是信任的第三方验证系统。它在大中型网络中普遍使用。LDAPLDAP 搜索基点 DN (_B)LDAP 设置LDAP 服务器 (_S)LDAP 验证LHS:使用本地授权锁定NISNIS 设置NIS 域 (_D)NIS 服务器(_S)NIS 是网络信息服务。它在中小型网络系统中普遍使用。下一步否确定选项口令:RHS:域:SMB 设置SMB 验证SMB 验证是通过与使用 SMB(系统消息块)协议套件的服务器连接来校验用户口令。保存设置安全模型:服务器:服务器:Shell:智能卡设置智能卡认证允许您使用一个证书和一个与智能卡相连的密钥进行登录。在继续之前,您应该把所做改变保存到磁盘上。如果您不保存它们,那么您加入域的尝试就会失败。保存改变吗?模板 Shell:没有找到 %s 文件。%s 需要这个文件。
安装提供该文件的 %s 软件包。轻量级目录访问协议(LDAP)是搜索目录的标准方法。这些目录可以用结构化的层次包括任意数据。LDAP 在小型到大型网络中被越来越广泛地使用。要正确连接到使用 TLS 的 LDAP 服务器,您需要用来签署您的服务器证书的 CA 证书。把这个证书以 PEM 的格式复制到“%s”目录中。
然后按“确定”按钮。通过 DNS 查找领域的 KDC (_l)通过 DNS 查找域的 KDC使用 DNS 将主机解析到域使用 Hesiod使用 Kerberos使用 LDAP使用 LDAP 验证使用 MD5 口令使用 NIS使用 SMB 验证使用屏蔽口令使用 TLS使用 Winbind使用 Winbind 验证使用 DNS 将主机解析到领域 (_D)使用屏蔽口令(_S)使用 TLS 来加密连接 (_T)用户信息警告在启动时,允许 LDAP 或者 Kerberos 等网络服务器去认证系统帐号(包含此机器的根帐号)。WinbindWinbind ADS 域(_R)Winbind 域控制器(_n)Winbind 设置Winbind 域 (_D)Winbind 允许系统检索关于用户的信息,并通过贮存在 NTDOM 或 ADS 服务器中的信息来验证用户。它被用在小型到大型的网络中。Winbind 验证工作组:是管理服务器(_A)通过网络服务验证系统帐号(_A)(_C)在帐户验证过程中检查 access.conf域控制器 (_D)加入域(_J)KDC(_K)本地用户使用本地授权(_L)口令(_P)域(_R)要求使用智能卡登录(_R)安全模型(_S)模板 Shell (_T)工作组 (_W)删除智能卡时进行的操作仅通过本地文件认证的系统帐号通过网络服务认证的系统帐号通过远端服务授权本地用户缓存只能以根用户身份运行在帐户验证过程中检查 access.conf将 winbind 配置为允许离线登录配置 winbind 以假定在用户名中没有域的用户是域用户配置 winbind 以假定在用户名中没有域的用户不是域用户将 winbind 配置为阻止离线登录默认的基于 DN 的 LDAP 默认的 LDAP 服务器默认的 NIS 域默认的 NIS 服务器默认的 hesiod LHS默认的 hesiod RHS 默认的 kerberos KDC默认的 kerberos 管理服务器默认的 kerberos 域当 security=ads 时,samba 和 winbind 的默认域默认使用的智能卡模块对话被取消默认禁用 LDAP 验证默认禁用 LDAP 用户信息默认禁用 MD5 口令默认禁用 NIS 用户信息默认禁用 SMB 验证默认禁用智能卡验证默认禁用缓存用户信息默认禁用 hesiod 来获取用户信息默认禁用 kerberos 验证默认禁用屏蔽口令禁用 DNS 来查找 kerberos KDC禁用 DNS 来查找 kerberos 域LDAP 不使用 TLS默认禁用 winbind 进行验证默认禁用 winbind 来获取用户信息禁用 wins 进行主机名解析在 TUI 主要对话框中显示“返回”而非“取消”在帐户验证过程中不检查 access.conf不显示过时的文本用户界面默认不需要使用智能卡验证不要启动或停止 portmap、ypbind 和 nscd不更新配置文件,只输出新的设置默认使用 LDAP 验证默认使用 LDAP 用户信息默认启用 MD5 口令默认使用 NIS 用户信息默认启用 SMB 验证默认状态为启用智能卡验证默认启用缓存用户信息默认启用 hesiod 来获取用户信息默认启用 kerberos 验证默认启用屏蔽口令启用 DNS 来查找 kerberos KDC启用 DNS 来查找 kerberos 域LDAP 使用 TLS默认启用 winbind 进行验证默认启用 winbind 来获取用户信息启用 wins 进行主机名解析winbind 分配域或 ads 用户的 gid 范围立即作为系统管理员加入 winbind 域或 ads 域从这个 URL 加载 CA 证书本地用户可以使用本地授权用来验证的服务器名称与 --test 相反,以修改过的设置升级配置文件探测网络默认值并输出它们默认需要使用验证智能卡验证samba 和 winbind 使用的安全模式屏蔽口令如果没有启用 winbindusedefaultdomain,用来分隔 winbind 创建的用户名中域和用户部分的字符winbind 创建的用户将会作为主目录的目录winbind 创建的用户将会作为主要组群的组群winbind 创建的用户将会作为登录 shell 的 shellwinbind 分配域或 ads 用户的 uid 范围错误的参数更新所有配置文件用法: %s [选项]验证服务器所在的组

Anon7 - 2021