diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase.html new file mode 100644 index 0000000..197638e --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase.html @@ -0,0 +1,18 @@ +
+ One of the searches Jenkins does on LDAP is to locate the list of groups for a user. +

+ This field determines the query to be run to identify the organizational unit that + contains groups. The query is almost always "ou=groups" so try that first, + though this field may be left blank to search from the root DN. +

+ If login attempts result in "Administrative Limit Exceeded" or similar error, try to + make this setting as specific as possible for your LDAP structure, to reduce the scope + of the query. If the error persists, you may need to edit the + WEB-INF/security/LDAPBindSecurityRealm.groovy file that is included in + jenkins.war. Change the line with:
+ groupSearchFilter = "(| (member={0}) (uniqueMember={0}) (memberUid={1}))";
+ to query only of the field used in your LDAP for group membership, such as:
+ groupSearchFilter = "(member={0})";
+ Then restart Jenkins and retry the login. +

+
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_de.html new file mode 100644 index 0000000..3cf1211 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_de.html @@ -0,0 +1,23 @@ +
+ Jenkins ermittelt per LDAP die Liste der Gruppen, denen ein Benutzer angehört. + +

+ Dieses Feld enthält die Abfrage zur Identifikation der Organisationseinheit, + welche Gruppen enthält. Die Abfrage ist fast immer "ou=groups", so daß + Sie diesen Wert zuerst versuchen sollten. Sie können das Feld aber auch leer + lassen, um vom Stamm-DN aus zu suchen. +

+ +

+ Wenn Anmeldeversuche mit der Meldung "Administrative Limit Exceeded" oder + ähnlichen Fehlern fehlschlagen, versuchen Sie, die Abfrage so spezifisch wie + möglich für Ihre LDAP-Struktur zu machen, um so den Umfang der Suche zu verringern. + Wenn der Fehler weiterhin besteht, müssen Sie gegebenfalls die Datei + WEB-INF/security/LDAPBindSecurityRealm.groovy ändern, die sich in + jenkins.war befindet. Ändern Sie die Zeile
+ groupSearchFilter = "(| (member={0}) (uniqueMember={0}) (memberUid={1}))";
+ so ab, daß nur das Feld für Gruppenzugehörigkeit in der Stuktur Ihres LDAP-Systems verwendet wird, z.B.:
+ groupSearchFilter = "(member={0})";
+ Dann starten Sie Jenkins neu und versuchen, sich anzumelden. +

+
\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_fr.html new file mode 100644 index 0000000..7813731 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_fr.html @@ -0,0 +1,9 @@ +
+ Une des recherches faites par Jenkins sur LDAP consiste en la localisation de la liste des groupes + d'un utilisateur. + +

+ Ce champ détermine la requète à lancer pour identifier l'unité organisationnelle qui contient des groupes. + La requète est presque toujours "ou=groups"; dans la plupart des cas, vous devriez donc laisser + ce champ vide et laisser cette requète par défaut s'exécuter. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_ja.html new file mode 100644 index 0000000..982b740 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_ja.html @@ -0,0 +1,19 @@ +
+ Jenkinsが行うLDAPの検索の1つに、与えられたユーザー名を持つグループリストの検索があります。 + +

+ この項目は、グループを含むユニット名を特定するクエリーを決めます。 + root DNから検索する際にこの項目が未入力でも、 このクエリーは通常"ou=groups"なので、まず"ou=groups"で検索します。 +

+

+ もし、ログイン時に"Administrative Limit Exceeded"や同様のエラーが発生する場合は、 + できるだけあなたのLDAPの構造にあわせた設定を行って、クエリーの範囲を絞ってください。 + それでもエラーが発生するようであれば、jenkins.warに含まれている + WEB-INF/security/LDAPBindSecurityRealm.groovyを編集します。
+ 次の行:
+ groupSearchFilter = "(| (member={0}) (uniqueMember={0}) (memberUid={1}))";
+ をLDAPで使用されている項目だけを問い合わせるように変更します。
+ groupSearchFilter = "(member={0})";
+ 変更したら、Jenkinsを再起動してログインしてください。 +

+
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_tr.html new file mode 100644 index 0000000..c4b82a7 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_tr.html @@ -0,0 +1,9 @@ +
+ Bir kullanıcının dahil olduğu grupların listesini bulmak için Jenkins'ın LDAP üzerinde yaptığı aramalardan bir tanesidir + +

+ Bu alan, grupları içeren organizasyonel birimlerin belirlenmesi için çalıştırılacak sorguyu belirtir. + Sorgu çoğunlukla "ou=groups" şeklindedir, bazı durumlarda bu kısmı boş bırakmanız ve varsayılan ayarlar ile + çalışmasını sağlamanız gerekebilir. + +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_zh_TW.html new file mode 100644 index 0000000..6accac3 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-groupSearchBase_zh_TW.html @@ -0,0 +1,15 @@ +
+ Jenkins 對 LDAP 的查詢之一,用來找出使用者的群組清單。 +

+ 這個欄位設定用來找出包含群組的單位組織 (Organizational Unit; OU) 的查詢字串。 + 大概都是 "ou=groups",所以就算欄位不填也會先從根 DN 開始用這個查詢字串搜尋。 +

+ 如果登入嘗試結果是 "Administrative Limit Exceeded" 或類似錯誤,請盡可能依據您的 LDAP + 結構將欄位設得越明確越好,縮小查詢查詢的範圍。如果還是一直有錯,說不定您要編輯 + jenkins.war 裡的 WEB-INF/security/LDAPBindSecurityRealm.groovy。將這一行:
+ groupSearchFilter = "(| (member={0}) (uniqueMember={0}) (memberUid={1}))";
+ 改成只查詢您 LDAP 群組成員的欄位,例如:
+ groupSearchFilter = "(member={0})";
+ 之後重新啟動 Jenkins 再登入看看。 +

+
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN.html new file mode 100644 index 0000000..64ac52a --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN.html @@ -0,0 +1,17 @@ +
+ If your LDAP server doesn't support anonymous binding + (IOW, if your LDAP server doesn't even allow a query without authentication), + then Jenkins would have to first authenticate itself against the LDAP server, + and Jenkins does that by sending "manager" DN and password. + +

+ A DN typically looks like CN=MyUser,CN=Users,DC=mydomain,DC=com + although the exact sequence of tokens depends on the LDAP server configuration. + It can be any valid DN as long as LDAP allows this user to query data. + +

+ This configuration is also useful when you are connecting to Active Directory + from a Unix machine, as AD doesn't allow anonymous bind by default. But + if you can't figure this out, you can also change AD setting to allow + anonymous bind. See this document for how to. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_de.html new file mode 100644 index 0000000..6a4d1be --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_de.html @@ -0,0 +1,19 @@ +
+ Wenn Ihr LDAP-Server kein anonymes Binding + unterstützt (mit anderen Worten: Wenn Ihre LDAP-Server keine Abfragen ohne + vorausgehende Authentifizierung erlaubt), muss Jenkins sich zunächst gegenüber + dem LDAP-Server authentifizieren. Dies erfolgt durch Senden eines + "Manager"-DNs mit Passwort. +

+ Ein DN sieht üblicherweise wie CN=MyUser,CN=Users,DC=mydomain,DC=com + aus, wenngleich die genaue Folge der Bestandteile von der Konfiguration des + LDAP-Servers abhängt. Jeder gültige DN ist erlaubt, solange LDAP-Server diesem + Benutzer Abfragen gestattet. +

+ Diese Konfiguration ist insbesondere nützlich wenn Sie von einem Unix-Rechner + auf ein Active Directory zugreifen, da Active Directory standardmäßig kein + anonymes Bindung erlaubt. Sollten Sie diesen Modus nicht zum Laufen bringen, + können Sie auch das Active Directory so konfigurieren, dass es anonymes Binden + erlaubt. Eine Anleitung dazu finden Sie + hier. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_fr.html new file mode 100644 index 0000000..6e98a39 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_fr.html @@ -0,0 +1,20 @@ +
+ Si votre serveur LDAP ne supporte pas le binding anonyme + (c'est-à-dire, si votre serveur LDAP ne permet pas le requêtage sans authentification), + alors Jenkins va devoir s'authentifier auprès du serveur. Il fait cela en envoyant le + DN et le mot de passe du "gestionnaire". + +

+ Un DN ressemble typiquement à CN=MyUser,CN=Users,DC=mydomain,DC=com + bien que la séquence exacte des éléments dépend de la configuration du serveur LDAP. + Cela peut être tout DN valide, tant que LDAP autorise cet utilisateur à lancer des + requêtes sur les données. + +

+ Cette configuration est également utile quand vous êtes connectés à Active Directory + à partir d'une machine Unix, car AD ne permet pas le bind anonyme par défaut. Si cette + configuration vous parait trop complexe, vous pouvez simplement changer les paramètres de + AD afin d'authoriser le binding anonyme. + Voir ce document + pour plus d'explications. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_ja.html new file mode 100644 index 0000000..ac98d58 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_ja.html @@ -0,0 +1,18 @@ +
+ LDAPサーバーが匿名バインドをサポートしない場合 + (言い換えると、LDAPサーバーが認証なしのクエリーを許可しない場合)、 + Jenkinsは。最初にLDAPサーバーに対して自分自身の認証を行う必要があるので、 + "管理者"のDNとパスワードをLDAPセーバーに送信します。 + +

+ DNは、正確な並びはLDAPサーバーの設定に依存しますが、 + 一般的にCN=MyUser,CN=Users,DC=mydomain,DC=comのようなものです。 + クエリーの発行が許可されている限り、有効であればどんなDNでもかまいません。 + +

+ Active Directory(AD)はデフォルトでは匿名バインドを許可していないので、 + UnixマシーンからADに接続するときにも便利です。 + この設定が分からないのであれば、匿名バインドを許可するようにADの設定を変更することもできます。 + 変更方法については、 + このドキュメントを参照してください。 +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_pt_BR.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_pt_BR.html new file mode 100644 index 0000000..8a8d1d1 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_pt_BR.html @@ -0,0 +1,17 @@ +
+ Se seu servidor LDAP não suportar binding anônimo + (Em outras palavras, se seu servidor LDAP não permite uma consulta sem autenticação), + então o Jenkins teria que primeiro se autenticar no servidor LDAP, + e o Jenkins faz isto enviando o DN e senha do "administrador". + +

+ Um DN tipicamente se parece com CN=MeuUsuario,CN=Usuarios,DC=meudominio,DC=com + embora a sequência exata dos valores dependem da configuração do servidor LDAP. + Pode ser qualquer DN válido desde que o LDAP permita que este usuário consulte os dados. + +

+ Esta configuração também é útil quando você estiver conectando ao Active Directory + de uma máquina Unix, já o AD não permite binding anônimo por padrão. Mas + se você não pode resolver isto, você também pode mudar as configurações do AD para + permitir binding anônimo. Veja este documento para saber como. +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_tr.html new file mode 100644 index 0000000..64ac52a --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_tr.html @@ -0,0 +1,17 @@ +
+ If your LDAP server doesn't support anonymous binding + (IOW, if your LDAP server doesn't even allow a query without authentication), + then Jenkins would have to first authenticate itself against the LDAP server, + and Jenkins does that by sending "manager" DN and password. + +

+ A DN typically looks like CN=MyUser,CN=Users,DC=mydomain,DC=com + although the exact sequence of tokens depends on the LDAP server configuration. + It can be any valid DN as long as LDAP allows this user to query data. + +

+ This configuration is also useful when you are connecting to Active Directory + from a Unix machine, as AD doesn't allow anonymous bind by default. But + if you can't figure this out, you can also change AD setting to allow + anonymous bind. See this document for how to. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_zh_TW.html new file mode 100644 index 0000000..a7cfb20 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerDN_zh_TW.html @@ -0,0 +1,14 @@ +
+ 如果您的 LDAP 伺服器不支援匿名繫結 (Anonymous Binding) + (換句話說就是: 如果您的 LDAP 伺服器沒有驗證通過就不能查詢),Jenkins + 就要先在 LDAP 伺服器上認證過自己,Jenkins 的作法就是送出「管理人員」的 DN 及密碼。 + +

+ DN 一般看起來像 CN=MyUser,CN=Users,DC=mydomain,DC=com,但是正確的元素順序跟 LDAP 伺服器設定有關。 + 可以填任何一個有效的 DN,只要 LDAP 允許這個使用者查詢資訊。 + +

+ 由 Unix 主機連線到 Active Directory 時也很有用,因為 AD 預設不支援匿名繫結。 + 如果您不懂,那也可以參考這份文件修改設定讓 + AD 允許匿名繫結。 +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret.html new file mode 100644 index 0000000..426c9d1 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret.html @@ -0,0 +1,3 @@ +
+ Password for the manager DN specified above. +
\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_de.html new file mode 100644 index 0000000..8797d8d --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_de.html @@ -0,0 +1,3 @@ +
+ Passwort für den oben angegebenen Manager-DN. +
\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_fr.html new file mode 100644 index 0000000..4a3e0d6 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_fr.html @@ -0,0 +1,3 @@ +
+ Le mot de passe du gestionnaire DN spécifié ci-dessus. +
\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_ja.html new file mode 100644 index 0000000..6c87555 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_ja.html @@ -0,0 +1,3 @@ +
+ 上記で指定した管理者のDNのパスワードです。 +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_pt_BR.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_pt_BR.html new file mode 100644 index 0000000..36fc8c0 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_pt_BR.html @@ -0,0 +1,3 @@ +
+ Senha para o DN administrador especificado acima. +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_tr.html new file mode 100644 index 0000000..dc2fb6f --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_tr.html @@ -0,0 +1,3 @@ +
+ Yukarıda belirtilen yönetici DN'in şifresidir. +
\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_zh_TW.html new file mode 100644 index 0000000..11561ad --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-managerPasswordSecret_zh_TW.html @@ -0,0 +1,3 @@ +
+ 上列那個管理員 DN 的密碼。 +
\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN.html new file mode 100644 index 0000000..fcb04ba --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN.html @@ -0,0 +1,17 @@ +
+ For authenticating user and determing the roles given to this user, Jenkins performs + multiple LDAP queries. + + Since an LDAP database is conceptually a big tree and the search is performed recursively, + in theory if we can start a search starting at a sub-node (as opposed to root), you get + a better performance because it narrows down the scope of a search. + This field specifies the DN of such a subtree. + +

+ But in practice, LDAP servers maintain an extensive index over the data, so specifying + this field is rarely necessary — you should just let Jenkins figure this out + by talking to LDAP. + +

+ If you do specify this value, the field normally looks something like "dc=sun,dc=com" +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_de.html new file mode 100644 index 0000000..506c3e3 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_de.html @@ -0,0 +1,18 @@ +
+ Zur Authentifizierung eines Benutzers und zur Bestimmung der Rollen, welche diesem + Benutzer zugeordnet sind, führt Jenkins mehrere LDAP-Anfragen durch. + + Da eine LDAP-Datenbank konzeptionell einen großen Baum darstellt und + Suchabfragen rekursiv ausgeführt wird, kann die Suchgeschwindigkeit theoretisch + dadurch gesteigert werden, dass Suchabfragen an einem Unterbaum des Gesamtbaums + (im Gegensatz zur Wurzel) startet. + + Dieses Feld spezifiziert den DN eines solchen Unterastes. +

+ In der Praxis verwaltet ein LDAP-Server umfangreiche Indizes, so daß die + Angabe dieses Feldes nur selten notwendig ist — Sie sollten Jenkins + dies im Kommunikation mit dem LDAP-Server herausfinden lassen. +

+ Ein typischer Wert für dieses Feld wäre beispielsweise + "dc=sun,dc=com". +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_fr.html new file mode 100644 index 0000000..9383bcc --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_fr.html @@ -0,0 +1,22 @@ +
+ Pour authentifier les utilisateurs et déterminer leurs rôles, + Jenkins exécute de multiples requêtes LDAP. + + Comme une base LDAP peut se voir comme une structure arborescente + et que la recherche se fait de façon récursive, en théorie, si nous + pouvons commencer une recherche à partir d'un sous-noeud (plutôt + qu'à partir de la racine), les performances seront meilleures, puisque + le périmètre de la recherche est plus petit. + + Ce champ spécifie le DN de ce sous-arbre. + +

+ En pratique, les serveurs LDAP conservent un index très complet sur les + données, donc peupler ce champ est rarement nécessaire. + Vous devriez laisser Jenkins déterminer cela lors des communications + avec LDAP. + +

+ Si vous fournissez cette valeur, le champ sera du type + "dc=sun,dc=com". +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_ja.html new file mode 100644 index 0000000..edef95f --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_ja.html @@ -0,0 +1,17 @@ +
+ ユーザーを認証し、このユーザーに割り当てられた権限を決定するために、 + Jenkinsは複数のLDAPクエリーを発行します。 + + LDAPのデータベースは、概念的に巨大な木構造で再帰的に検索するので、 + 理論上ルートではなくサブノードから検索できれば、検索する範囲を絞れるので、 + より良いパフォーマンスを得ることができます。 + この項目には、そのサブノードのDN(識別名)を指定します。 + +

+ 実際には、LDAPサーバーはデータ上に豊富なインデックスを持っているので、 + この項目の値が必要になるのはまれです。 + — LDAPと通信して、Jenkinsがこの値を自動的に取得できるようにすべきです。 + +

+ この値を設定する場合は、通常、"dc=sun,dc=com"のようなものになります。 +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_pt_BR.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_pt_BR.html new file mode 100644 index 0000000..94a7e85 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_pt_BR.html @@ -0,0 +1,17 @@ +
+ Para autenticar usuário e determinar os papéis dados ao usuário, Jenkins faz + múltiplas consultas ao LDAP. + + Desde que uma base LDAP é conceitualmente uma grande árvore e a pesquisa é feita recursivamente, + em teoria se nós pudermos inicar uma pesquisa começando em um sub-né (como o oposto a ráiz), você consegue + um melhor desempenho porque isto reduz o escopo da pesquisa. + Este campo especifica o DN de tal sub-árvore. + +

+ Mas na prática, os servidores LDAP mantêm uma extensivo índice sobre os dados, assim especificar + este campo é raramente necessário — você deveria apenas deixar que oJenkins resolva isto + conversando com o LDAP. + +

+ Se você realmente especificar este valor, o campo normalmente parece algo como "dc=sun,dc=com" +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_ru.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_ru.html new file mode 100644 index 0000000..7aecda2 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_ru.html @@ -0,0 +1,19 @@ +
+ Для аутентификации пользователя и определения ролей, присвоенных этому + пользователю Jenkins выполняет несколько LDAP запросов. + + Так как база данных LDAP в своей концепции представляет собой большое дерево и поиск по нему + происходит рекурсивно, теоретически, если мы начнем поиск с поддерева (в противовес к + корню дерева), результат может быть получен быстрее, так как это сужает область поиска. + Это поле устанавливает DN такого поддерева. + +

+ Однако в практике, LDAP серверы поддерживают объемный индекс над данными, так что + явное указание этого поля редко ускоряет аутентификацию в заметной степени - + вам лучше возложить эти обязанности на Jenkins, он выяснит это в процессе опроса + сервера LDAP. + +

+ Если вы все же решите указать значение, обычно оно должно выглядеть примерно так: + "dc=sun,dc=com". +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_tr.html new file mode 100644 index 0000000..497d275 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_tr.html @@ -0,0 +1,14 @@ +
+ Jenkins, kullanıcı ve rolleri yetkilendirirken birden fazla LDAP sorgusu çeker. + + LDAP veritabanının büyük bir veri ağacına sahip olduğunu ve arama sorgularının her dal için + ayrı ayrı yapıldığını göz önüne alarak, eğer sorgulamayı alt-nodlardan birinden başlatırsanız, + arama alanı daralacağı için arama performansı artacaktır. Bu alan, bu tür bir alt-nodun DN'i + içindir. +

+ Pratikte, LDAP sunucular, verileri üzerinde gelişmiş indekslemeye sahip olduklarından, bu alana + herhangi bir değer girmek nadiren gerekli olur. Jenkins, LDAP ile konuşup bu işi halledebilir. + +

+ Eğer bir değer belirleyecek olursanız, "dc=sun,dc=com" gibi bir değer olur. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_zh_TW.html new file mode 100644 index 0000000..935f49e --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-rootDN_zh_TW.html @@ -0,0 +1,14 @@ +
+ 為了驗證使用者及判斷該使用者的角色,Jenkins 會查詢 LDAP 多次。 + + 因為 LDAP 伺服器概念上就是一個大樹狀結構,搜尋會遞迴執行,理論上如果能從子節點開始找 + (而不是每次都從頭開始),效能應該會比較好,因為找到範圍比較小。 + 這個欄位就是用來指定這種子樹的 DN。 + +

+ 但實務上,LDAP 伺服器會對資料做完整索引,設定這個欄位的用處其實不大。 + 您可以用 Jenkins 連到 LDAP 試看看。 + +

+ 如果您還是想要設定,這個欄值的值看起來應該會像 "dc=sun,dc=com" +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_de.html new file mode 100644 index 0000000..290c797 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_de.html @@ -0,0 +1,8 @@ +
+ + Geben Sie den Namen des LDAP-Servers an (z.B. ldap.sun.com). + + Verwendet Ihr LDAP-Server einen von 389 abweichenden Port (dies ist der + Standardport für LDAP), können Sie die Portnummer anhängen + (z.B. ldap.acme.org:1389). +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_fr.html new file mode 100644 index 0000000..aa89b41 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_fr.html @@ -0,0 +1,8 @@ +
+ Spécifie le nom du serveur host LDAP (par exemple ldap.sun.com). + Si votre serveur LDAP utilise un port autre que 389 (le standard pour LDAP), + vous pouvez suffixer un numéro de port ici, par exemple ldap.acme.org:1389. + Pour se connecter à LDAP par SSL (c-à-d LDAPS), utilisez le protocole + ldaps://, par exemple ldaps://ldap.acme.org ou + ldaps://ldap.acme.org:1636 (si le port n'est pas le port par défaut 636). +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_ja.html new file mode 100644 index 0000000..71692bf --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_ja.html @@ -0,0 +1,6 @@ +
+ LDAPサーバーのホスト名(例 ldap.sun.com)を指定します。 + LDAPサーバーのポート番号が(LDAP標準である)389以外の場合は、ポート番号も追加します(例 ldap.acme.org:1389)。 + SSL上のLDAP(LDAPS)で接続するには、ldaps://ldap.acme.orgや、 + ldaps://ldap.acme.org:1636(ポート番号がデフォルトの636でなければ)のように、ldaps://プロトコルを使用して指定してください。 +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_pt_BR.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_pt_BR.html new file mode 100644 index 0000000..48d7678 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_pt_BR.html @@ -0,0 +1,6 @@ +
+ + Especifica o nome do host do servidor LDAP (como ldap.sun.com) + Se seu servidor LDAP usa um porta diferente da 389 (que é a padrão para LDAP), + você também pode adicionar um número de porta aqui, como ldap.acme.org:1389 +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_ru.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_ru.html new file mode 100644 index 0000000..22e3426 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_ru.html @@ -0,0 +1,6 @@ +
+ + Укажите доменное имя LDAP сервера (в виде ldap.sun.com). + Если ваш LDAP сервер использует отличный от стандартного порт (389), + вы также должны добавить его к доменному имени (например, ldap.acme.org:1389). +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_tr.html new file mode 100644 index 0000000..c4b2283 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_tr.html @@ -0,0 +1,6 @@ +
+ + LDAP sunucusunun adını girin (ldap.sun.com şeklinde). Eğer LDAP + sunucunuz 386 portundan (ki LDAP için standart port numarasıdır) çalışmıyorsa, + çalıştığı portu LDAP sunucu isminin sonuna ekleyebilirsiniz (ldap.acme.org:1389 şeklinde) +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_zh_TW.html new file mode 100644 index 0000000..0b11d86 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-server_zh_TW.html @@ -0,0 +1,8 @@ +
+ 設定 LDAP 伺服器的主機名稱 (例如 ldap.sun.com)。 + 如果您的 LDAP 伺服器使用的連接埠不是 389 (LDAP 標準連接埠),可以再加上連接埠編號,例如 + ldap.acme.org:1389。 + 如果要透過 SSL 連到 LDAP (也就是 LDAPS),請在前面加上 ldaps:// 通訊協定,例如 + ldaps://ldap.acme.orgldaps://ldap.acme.org:1636 + (如果不是用預設的 636 連接埠)。 +
diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch.html new file mode 100644 index 0000000..e9d0c78 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch.html @@ -0,0 +1,16 @@ +
+ One of the searches Jenkins does on LDAP is to locate the user record given the user name. + +

+ This field determines the query to be run to identify the user record. The query is + almost always "uid={0}" as per defined in RFC 2798, + so in most cases you should leave this field empty and let this default kick in. + +

+ If your LDAP server doesn't have uid or doesn't use a meaningful uid value, try "mail={0}", + which lets people login by their e-mail address. + +

+ If you do specify a different query, specify an LDAP query string with marker token "{0}", + which is to be replaced by the user name string entered by the user. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase.html new file mode 100644 index 0000000..3c7a8de --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase.html @@ -0,0 +1,12 @@ +
+ One of the searches Jenkins does on LDAP is to locate the user record given the user name. + If you specify a relative DN (from the root DN) here, Jenkins will further narrow down + searches to the sub-tree. + +

+ But in practice, LDAP servers maintain an extensive index over the data, so specifying + this field is rarely necessary. + +

+ If you do specify this value, the field normally looks something like "ou=people" +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_de.html new file mode 100644 index 0000000..83a3d00 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_de.html @@ -0,0 +1,10 @@ +
+ Anhand des Benutzernamens ruft Jenkins per LDAP die zugehörigen Benutzerinformationen + ab. Wenn Sie hier einen relativen DN (ausgehend vom Root DN) angeben, + schränkt Jenkins seine Suche auf diesen Unterbaum ein. +

+ In der Praxis verwaltet ein LDAP-Server umfangreiche Indizes, so daß die + Angabe dieses Feldes nur selten notwendig ist. +

+ Ein typischer Wert für dieses Feld wäre beispielsweise "ou=people". +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_fr.html new file mode 100644 index 0000000..81e69fe --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_fr.html @@ -0,0 +1,14 @@ +
+ Une des recherches faite par Jenkins sur LDAP consiste à obtenir les + informations utilisateur à partir de son nom. + Si vous fournissez ici un DN relatif (au DN racine), Jenkins limitera + le périmètre de la recherche au sous-arbre correspondant. + +

+ En pratique, les serveurs LDAP conservent un index très complet + sur les données, donc ce champ est rarement nécessaire. + +

+ Si vous peuplez cette valeur, elle devrait être du type + "ou=people". +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_ja.html new file mode 100644 index 0000000..aa91dc2 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_ja.html @@ -0,0 +1,11 @@ +
+ Jenkinsが行うLDAPの検索の1つに、与えられたユーザー名を持つユーザーレコードの検索があります。 + (ルートDNからの)相対DN(識別名)を指定すると、Jenkinsは検索範囲をそのサブツリーに絞ります。 + +

+ 実際には、LDAPサーバーはデータ上に豊富なインデックスを持っているので、 + この項目の値が必要になるのはまれです。 + +

+ この値を設定する場合には、通常、"ou=people"のようなものになります。 +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_pt_BR.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_pt_BR.html new file mode 100644 index 0000000..f6dcecc --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_pt_BR.html @@ -0,0 +1,12 @@ +
+ Uma das pesquisas que o Jenkins faz no LDAP é localizar o registro do usuário passando o nome do usuário. + Se você especificar um DN relativo (do DN raíz) aqui, Jenkins estreitará as + pesquisas para a sub-árvore. + +

+ Mas na prática, os servidores LDAP mantêm um extensivo índice sobre os dados, assim especificar + este campo é raramente necessário. + +

+ Se você realmente especificar este valor, o campo normalmente parece algo como "ou=pessoas" +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_ru.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_ru.html new file mode 100644 index 0000000..fc87e81 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_ru.html @@ -0,0 +1,13 @@ +
+ Один из запросов, которые Jenkins делает к LDAP серверу, это поиск записи о пользователе + по его имени. Если вы укажете относительный DN (относительно корня DN), Jenkins далее + будет спускаться только по его поддеревьям. + +

+ Практически, так как большинство LDAP серверов используют индексирование данных, + явное указание поддерева поиска редко дает значительное ускорение. + +

+ Если вы все-же указываете это значение, оно должно выглядеть примерно так: + "ou=people". +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_tr.html new file mode 100644 index 0000000..6379d5d --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_tr.html @@ -0,0 +1,12 @@ +
+ Jenkins'ın yaptığı aramalardan bir tanesi, LDAP üzerinde, verilen kullanıcı adına göre + kullanıcının kaydını bulmaktır. Jenkins'ın aramayı alt-nodlarla kısıtlamasını istiyorsanız, + bu kısıma göreceli bir DN (kök DN'e göre) yazmalısınız. + +

+ Pratikte, LDAP sunucular, verileri üzerinde gelişmiş indekslemeye sahip olduklarından, bu alana + herhangi bir değer girmek nadiren gerekli olur. +

+ Eğer bir değer belirleyecek olursanız, "ou=people" gibi bir değer olur. + +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_zh_TW.html new file mode 100644 index 0000000..aa46aae --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearchBase_zh_TW.html @@ -0,0 +1,10 @@ +
+ Jenkins 對 LDAP 的查詢之一,目的在根據使用者名稱找到使用者資料。 + 如果您設定相對 DN (由根 DN 算起),Jenkins 只會在指定的子樹裡面搜尋。 + +

+ 但實務上,LDAP 伺服器會對資料做完整索引,設定這個欄位的用處其實不大。 + +

+ 如果您還是想要設定,這個欄值的值看起來應該會像 "ou=people"。 +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_de.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_de.html new file mode 100644 index 0000000..27835eb --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_de.html @@ -0,0 +1,14 @@ +
+ Anhand des Benutzernamens ruft Jenkins per LDAP die zugehörigen Benutzerinformationen + ab. +

+ Dieses Feld legt die Abfrage fest, die ausgeführt wird, um den Benutzereintrag + aufzufinden. Die Abfrage ist in den allermeisten Fällen uid={0} + wie in RFC 2798 definiert, + so dass Sie dieses Feld typischerweise leer lassen und mit dem Vorgabewert + arbeiten können. +

+ Wenn Sie eine abweichende Suchabfrage einrichten möchten, geben Sie eine + LDAP-Abfrage mit Platzhalter {0} ein, der dann mit dem vom Anwender + eingegebenen Benutzernamen ersetzt wird. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_fr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_fr.html new file mode 100644 index 0000000..14f0c69 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_fr.html @@ -0,0 +1,17 @@ +
+ Une des recherches faite par Jenkins sur LDAP consiste à obtenir les + informations utilisateur à partir de son nom. + +

+ Ce champ indique quelle requête lancer pour identifier les informations + utilisateur. Cette requête est presque toujours "uid={0}" + comme défini dans la + RFC 2798, donc + dans la majorité des cas, vous devriez laisser ce champ vide + et laisser Jenkins utiliser la requête par défaut. + +

+ Dans le cas où une requête différente est nécessaire, fournissez ici + une requête LDAP avec un marqueur "{0}", + qui sera remplacé par le nom fourni par l'utilisateur. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_ja.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_ja.html new file mode 100644 index 0000000..9f9f81e --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_ja.html @@ -0,0 +1,16 @@ +
+ Jenkinsが行うLDAPの検索の1つに、与えられたユーザー名を持つユーザーレコードの検索があります。 + +

+ この項目は、ユーザーレコードを特定するクエリーを決めます。 + RFC 2798の定義により、 + 多くの場合、クエリーには"uid={0}"を使用するので、 + 多くの場合この項目を空欄のままにして、デフォルトのまま動作するようにします。 +

+ もし、LDAPサーバにuidが設定されていない、もしくは意味のある値を設定していない場合は、 + "mail={0}"を設定してみてください。設定すると、メールアドレスでログインできるようになります。 + +

+ 異なるクエリーを指定する場合、"{0}"を使ったLDAPクエリー文字列を指定します。 + "{0}"は、ユーザーが入力したユーザー名で置き換えられます。 +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_pt_BR.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_pt_BR.html new file mode 100644 index 0000000..7c2653e --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_pt_BR.html @@ -0,0 +1,12 @@ +
+ Uma das pesquisas que o Jenkins faz no LDAP é localizar o registro do usuário passando o nome do usuário. + +

+ Este determina o consulta a ser executada para identificar o registro do usuário. A consulta é + quase sempre "uid={0}" como definido na RFC 2798, + assim na maioria dos casos você deveria deixar este campo vazio. + +

+ Se você realmente especificar uma consulta diferente, especifique uma string de consulta LDAP como o marcador "{0}", + que será trocado pelas string do nome do usuário entrada pelo usuário. +

diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_ru.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_ru.html new file mode 100644 index 0000000..47ff861 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_ru.html @@ -0,0 +1,14 @@ +
+ Один из запросов, которые Jenkins делает к LDAP серверу, это поиск записи о пользователе + по его имени. + +

+ Это поле определяет запрос который будет отправлен для определения записи + пользователя. Почти всегда это "uid={0}", как диктует + RFC 2798, так что в большинстве + случаев вам следует оставить это поле пустым. + +

+ Если вы указываете свое значение, укажите строку запроса LDAP с маркером "{0}", который + будет заменен именем пользователя, выполняющего аутентификацию. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_tr.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_tr.html new file mode 100644 index 0000000..a225a3c --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_tr.html @@ -0,0 +1,13 @@ +
+ Jenkins'ın yaptığı aramalardan bir tanesi, LDAP üzerinde, verilen kullanıcı adına göre + kullanıcının kaydını bulmaktır. + +

+ Bu alan, kullanıcı kaydını bulacak sorguyu belirler. Sorgu RFC 2798'de + tanımlandığı gibi daima "uid={0}" şeklindedir, çoğu durumda bu alanı boş bırakıp, varsayılan şekilde + çalışmasını sağlayabilirsiniz. + +

+ Farklı bir sorgu belirleyecekseniz, LDAP sorgunuzu, belirleyici token "{0}" ile oluşturun. + Token "{0}", kullanıcının girdiği kullanıcı adı değeri olacaktır. +

\ No newline at end of file diff --git a/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_zh_TW.html b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_zh_TW.html new file mode 100644 index 0000000..f50f355 --- /dev/null +++ b/src/main/resources/hudson/security/LDAPSecurityRealm/help-userSearch_zh_TW.html @@ -0,0 +1,14 @@ +
+ Jenkins 對 LDAP 的查詢之一,目的在根據使用者名稱找到使用者資料。 + +

+ 這個欄位設定要用什麼查詢字串來找出使用者資料。 + 查詢字串幾乎都是 RFC 2798 定義設為 + "uid={0}",所以大部分情況下您應該什麼就不要填,用預設值就好。 + +

+ 如果您的 LDAP 伺服器沒有 UID 或是沒有有意義的 UID 值,可以用 "mail={0}",讓使用者以他們的電子郵件信箱登入。 + +

+ 如果您想設定不同的 LDAP 查詢字串,可以使用 "{0}" 表示使用者輸入的使用者名稱字串。 +

\ No newline at end of file