summaryrefslogtreecommitdiffstats
path: root/src/config/SSSDConfig/sssdoptions.py
diff options
context:
space:
mode:
Diffstat (limited to 'src/config/SSSDConfig/sssdoptions.py')
-rw-r--r--src/config/SSSDConfig/sssdoptions.py578
1 files changed, 578 insertions, 0 deletions
diff --git a/src/config/SSSDConfig/sssdoptions.py b/src/config/SSSDConfig/sssdoptions.py
new file mode 100644
index 0000000..0d75e6d
--- /dev/null
+++ b/src/config/SSSDConfig/sssdoptions.py
@@ -0,0 +1,578 @@
+import sys
+import gettext
+
+PACKAGE = 'sss_daemon'
+LOCALEDIR = '/usr/share/locale'
+
+translation = gettext.translation(PACKAGE, LOCALEDIR, fallback=True)
+if sys.version_info[0] > 2:
+ _ = translation.gettext
+else:
+ _ = translation.ugettext
+
+
+class SSSDOptions(object):
+ def __init__(self):
+ pass
+
+ option_strings = {
+ # [service]
+ 'debug': _('Set the verbosity of the debug logging'),
+ 'debug_level': _('Set the verbosity of the debug logging'),
+ 'debug_timestamps': _('Include timestamps in debug logs'),
+ 'debug_microseconds': _('Include microseconds in timestamps in debug logs'),
+ 'debug_backtrace_enabled': _('Enable/disable debug backtrace'),
+ 'timeout': _('Watchdog timeout before restarting service'),
+ 'command': _('Command to start service'),
+ 'reconnection_retries': _('Number of times to attempt connection to Data Providers'),
+ 'fd_limit': _('The number of file descriptors that may be opened by this responder'),
+ 'client_idle_timeout': _('Idle time before automatic disconnection of a client'),
+ 'responder_idle_timeout': _('Idle time before automatic shutdown of the responder'),
+ 'cache_first': _('Always query all the caches before querying the Data Providers'),
+ 'offline_timeout': _('When SSSD switches to offline mode the amount of time before it tries to go back online '
+ 'will increase based upon the time spent disconnected. This value is in seconds and '
+ 'calculated by the following: offline_timeout + random_offset.'),
+
+ # [sssd]
+ 'config_file_version': _(
+ 'Indicates what is the syntax of the config file. SSSD 0.6.0 and later use version 2.'),
+ 'services': _('SSSD Services to start'),
+ 'domains': _('SSSD Domains to start'),
+ 're_expression': _('Regex to parse username and domain'),
+ 'full_name_format': _('Printf-compatible format for displaying fully-qualified names'),
+ 'krb5_rcache_dir': _('Directory on the filesystem where SSSD should store Kerberos replay cache files.'),
+ 'default_domain_suffix': _('Domain to add to names without a domain component.'),
+ 'user': _('The user to drop privileges to'),
+ 'certificate_verification': _('Tune certificate verification'),
+ 'override_space': _('All spaces in group or user names will be replaced with this character'),
+ 'disable_netlink': _('Tune sssd to honor or ignore netlink state changes'),
+ 'enable_files_domain': _('Enable or disable the implicit files domain'),
+ 'domain_resolution_order': _('A specific order of the domains to be looked up'),
+ 'monitor_resolv_conf': _('Controls if SSSD should monitor the state of resolv.conf to identify when it needs '
+ 'to update its internal DNS resolver.'),
+ 'try_inotify': _('SSSD monitors the state of resolv.conf to identify when it needs to update its internal DNS '
+ 'resolver. By default, we will attempt to use inotify for this, and will fall back to '
+ 'polling resolv.conf every five seconds if inotify cannot be used.'),
+ 'implicit_pac_responder': _('Run PAC responder automatically for AD and IPA provider'),
+ 'core_dumpable': _('Enable or disable core dumps for all SSSD processes.'),
+ 'passkey_verification': _('Tune passkey verification behavior'),
+
+ # [nss]
+ 'enum_cache_timeout': _('Enumeration cache timeout length (seconds)'),
+ 'entry_cache_no_wait_timeout': _('Entry cache background update timeout length (seconds)'),
+ 'entry_negative_timeout': _('Negative cache timeout length (seconds)'),
+ 'local_negative_timeout': _('Files negative cache timeout length (seconds)'),
+ 'filter_users': _('Users that SSSD should explicitly ignore'),
+ 'filter_groups': _('Groups that SSSD should explicitly ignore'),
+ 'filter_users_in_groups': _('Should filtered users appear in groups'),
+ 'pwfield': _('The value of the password field the NSS provider should return'),
+ 'override_homedir': _('Override homedir value from the identity provider with this value'),
+ 'fallback_homedir': _('Substitute empty homedir value from the identity provider with this value'),
+ 'override_shell': _('Override shell value from the identity provider with this value'),
+ 'allowed_shells': _('The list of shells users are allowed to log in with'),
+ 'vetoed_shells': _('The list of shells that will be vetoed, and replaced with the fallback shell'),
+ 'shell_fallback': _('If a shell stored in central directory is allowed but not available, use this fallback'),
+ 'default_shell': _('Shell to use if the provider does not list one'),
+ 'memcache_timeout': _('How long will be in-memory cache records valid'),
+ 'memcache_size_passwd': _(
+ 'Size (in megabytes) of the data table allocated inside fast in-memory cache for passwd requests'),
+ 'memcache_size_group': _(
+ 'Size (in megabytes) of the data table allocated inside fast in-memory cache for group requests'),
+ 'memcache_size_initgroups': _(
+ 'Size (in megabytes) of the data table allocated inside fast in-memory cache for initgroups requests'),
+ 'homedir_substring': _('The value of this option will be used in the expansion of the override_homedir option '
+ 'if the template contains the format string %H.'),
+ 'get_domains_timeout': _('Specifies time in seconds for which the list of subdomains will be considered '
+ 'valid.'),
+ 'entry_cache_nowait_percentage': _('The entry cache can be set to automatically update entries in the '
+ 'background if they are requested beyond a percentage of the '
+ 'entry_cache_timeout value for the domain.'),
+
+ # [pam]
+ 'offline_credentials_expiration': _('How long to allow cached logins between online logins (days)'),
+ 'offline_failed_login_attempts': _('How many failed logins attempts are allowed when offline'),
+ 'offline_failed_login_delay': _(
+ 'How long (minutes) to deny login after offline_failed_login_attempts has been reached'),
+ 'pam_verbosity': _('What kind of messages are displayed to the user during authentication'),
+ 'pam_response_filter': _('Filter PAM responses sent to the pam_sss'),
+ 'pam_id_timeout': _('How many seconds to keep identity information cached for PAM requests'),
+ 'pam_pwd_expiration_warning': _('How many days before password expiration a warning should be displayed'),
+ 'pam_trusted_users': _('List of trusted uids or user\'s name'),
+ 'pam_public_domains': _('List of domains accessible even for untrusted users.'),
+ 'pam_account_expired_message': _('Message printed when user account is expired.'),
+ 'pam_account_locked_message': _('Message printed when user account is locked.'),
+ 'pam_cert_auth': _('Allow certificate based/Smartcard authentication.'),
+ 'pam_cert_db_path': _('Path to certificate database with PKCS#11 modules.'),
+ 'pam_cert_verification': _('Tune certificate verification for PAM authentication.'),
+ 'p11_child_timeout': _('How many seconds will pam_sss wait for p11_child to finish'),
+ 'pam_app_services': _('Which PAM services are permitted to contact application domains'),
+ 'pam_p11_allowed_services': _('Allowed services for using smartcards'),
+ 'p11_wait_for_card_timeout': _('Additional timeout to wait for a card if requested'),
+ 'p11_uri': _('PKCS#11 URI to restrict the selection of devices for Smartcard authentication'),
+ 'pam_initgroups_scheme': _('When shall the PAM responder force an initgroups request'),
+ 'pam_gssapi_services': _('List of PAM services that are allowed to authenticate with GSSAPI.'),
+ 'pam_gssapi_check_upn': _('Whether to match authenticated UPN with target user'),
+ 'pam_gssapi_indicators_map': _('List of pairs <PAM service>:<authentication indicator> that '
+ 'must be enforced for PAM access with GSSAPI authentication'),
+ 'pam_passkey_auth': _('Allow passkey device authentication.'),
+ 'passkey_child_timeout': _('How many seconds will pam_sss wait for passkey_child to finish'),
+ 'passkey_debug_libfido2': _('Enable debugging in the libfido2 library'),
+
+ # [sudo]
+ 'sudo_timed': _('Whether to evaluate the time-based attributes in sudo rules'),
+ 'sudo_inverse_order': _('If true, SSSD will switch back to lower-wins ordering logic'),
+ 'sudo_threshold': _('Maximum number of rules that can be refreshed at once. If this is exceeded, full refresh '
+ 'is performed.'),
+
+ # [autofs]
+ 'autofs_negative_timeout': _('Negative cache timeout length (seconds)'),
+
+ # [ssh]
+ 'ssh_hash_known_hosts': _('Whether to hash host names and addresses in the known_hosts file'),
+ 'ssh_known_hosts_timeout': _('How many seconds to keep a host in the known_hosts file after its host keys '
+ 'were requested'),
+ 'ca_db': _('Path to storage of trusted CA certificates'),
+ 'ssh_use_certificate_keys': _('Allow to generate ssh-keys from certificates'),
+ 'ssh_use_certificate_matching_rules': _('Use the following matching rules to filter the certificates for '
+ 'ssh-key generation'),
+
+ # [pac]
+ 'allowed_uids': _('List of UIDs or user names allowed to access the PAC responder'),
+ 'pac_lifetime': _('How long the PAC data is considered valid'),
+ 'pac_check': _('Validate the PAC'),
+
+ # [ifp]
+ 'user_attributes': _('List of user attributes the InfoPipe is allowed to publish'),
+
+ # [session_recording]
+ 'scope': _('One of the following strings specifying the scope of session recording: none - No users are '
+ 'recorded. some - Users/groups specified by users and groups options are recorded. all - All users '
+ 'are recorded.'),
+ 'users': _('A comma-separated list of users which should have session recording enabled. Matches user names '
+ 'as returned by NSS. I.e. after the possible space replacement, case changes, etc.'),
+ 'groups': _('A comma-separated list of groups, members of which should have session recording enabled. '
+ 'Matches group names as returned by NSS. I.e. after the possible space replacement, case changes, '
+ 'etc.'),
+ 'exclude_users': _('A comma-separated list of users to be excluded from recording, only when scope=all'),
+ 'exclude_groups': _('A comma-separated list of groups, members of which should be excluded from recording, '
+ ' only when scope=all. '),
+
+ # [provider]
+ 'id_provider': _('Identity provider'),
+ 'auth_provider': _('Authentication provider'),
+ 'access_provider': _('Access control provider'),
+ 'chpass_provider': _('Password change provider'),
+ 'sudo_provider': _('SUDO provider'),
+ 'autofs_provider': _('Autofs provider'),
+ 'hostid_provider': _('Host identity provider'),
+ 'selinux_provider': _('SELinux provider'),
+ 'session_provider': _('Session management provider'),
+ 'resolver_provider': _('Resolver provider'),
+
+ # [domain]
+ 'domain_type': _('Whether the domain is usable by the OS or by applications'),
+ 'enabled': _('Enable or disable the domain'),
+ 'min_id': _('Minimum user ID'),
+ 'max_id': _('Maximum user ID'),
+ 'enumerate': _('Enable enumerating all users/groups'),
+ 'cache_credentials': _('Cache credentials for offline login'),
+ 'use_fully_qualified_names': _('Display users/groups in fully-qualified form'),
+ 'ignore_group_members': _('Don\'t include group members in group lookups'),
+ 'entry_cache_timeout': _('Entry cache timeout length (seconds)'),
+ 'lookup_family_order': _('Restrict or prefer a specific address family when performing DNS lookups'),
+ 'account_cache_expiration': _('How long to keep cached entries after last successful login (days)'),
+ 'dns_resolver_server_timeout': _('How long should SSSD talk to single DNS server before trying next server ('
+ 'miliseconds)'),
+ 'dns_resolver_op_timeout': _('How long should keep trying to resolve single DNS query (seconds)'),
+ 'dns_resolver_timeout': _('How long to wait for replies from DNS when resolving servers (seconds)'),
+ 'dns_discovery_domain': _('The domain part of service discovery DNS query'),
+ 'override_gid': _('Override GID value from the identity provider with this value'),
+ 'case_sensitive': _('Treat usernames as case sensitive'),
+ 'entry_cache_user_timeout': _('Entry cache timeout length (seconds)'),
+ 'entry_cache_group_timeout': _('Entry cache timeout length (seconds)'),
+ 'entry_cache_netgroup_timeout': _('Entry cache timeout length (seconds)'),
+ 'entry_cache_service_timeout': _('Entry cache timeout length (seconds)'),
+ 'entry_cache_autofs_timeout': _('Entry cache timeout length (seconds)'),
+ 'entry_cache_sudo_timeout': _('Entry cache timeout length (seconds)'),
+ 'entry_cache_resolver_timeout': _('Entry cache timeout length (seconds)'),
+ 'refresh_expired_interval': _('How often should expired entries be refreshed in background'),
+ 'refresh_expired_interval_offset': _("Maximum period deviation when refreshing expired entries in background"),
+ 'dyndns_update': _("Whether to automatically update the client's DNS entry"),
+ 'dyndns_ttl': _("The TTL to apply to the client's DNS entry after updating it"),
+ 'dyndns_iface': _("The interface whose IP should be used for dynamic DNS updates"),
+ 'dyndns_refresh_interval': _("How often to periodically update the client's DNS entry"),
+ 'dyndns_refresh_interval_offset': _("Maximum period deviation when updating the client's DNS entry"),
+ 'dyndns_update_ptr': _("Whether the provider should explicitly update the PTR record as well"),
+ 'dyndns_force_tcp': _("Whether the nsupdate utility should default to using TCP"),
+ 'dyndns_auth': _("What kind of authentication should be used to perform the DNS update"),
+ 'dyndns_server': _("Override the DNS server used to perform the DNS update"),
+ 'subdomain_enumerate': _('Control enumeration of trusted domains'),
+ 'subdomain_refresh_interval': _('How often should subdomains list be refreshed'),
+ 'subdomain_refresh_interval_offset': _('Maximum period deviation when refreshing the subdomain list'),
+ 'subdomain_inherit': _('List of options that should be inherited into a subdomain'),
+ 'subdomain_homedir': _('Default subdomain homedir value'),
+ 'cached_auth_timeout': _('How long can cached credentials be used for cached authentication'),
+ 'auto_private_groups': _('Whether to automatically create private groups for users'),
+ 'pwd_expiration_warning': _('Display a warning N days before the password expires.'),
+ 'realmd_tags': _('Various tags stored by the realmd configuration service for this domain.'),
+ 'subdomains_provider': _('The provider which should handle fetching of subdomains. This value should be '
+ 'always the same as id_provider.'),
+ 'entry_cache_ssh_host_timeout': _('How many seconds to keep a host ssh key after refresh. IE how long to '
+ 'cache the host key for.'),
+ 'cache_credentials_minimal_first_factor_length': _('If 2-Factor-Authentication (2FA) is used and credentials '
+ 'should be saved this value determines the minimal length '
+ 'the first authentication factor (long term password) must '
+ 'have to be saved as SHA512 hash into the cache.'),
+ 'local_auth_policy': _('Local authentication methods policy '),
+
+ # [provider/ipa]
+ 'ipa_domain': _('IPA domain'),
+ 'ipa_server': _('IPA server address'),
+ 'ipa_backup_server': _('Address of backup IPA server'),
+ 'ipa_hostname': _('IPA client hostname'),
+ 'ipa_dyndns_update': _("Whether to automatically update the client's DNS entry in FreeIPA"),
+ 'ipa_dyndns_ttl': _("The TTL to apply to the client's DNS entry after updating it"),
+ 'ipa_dyndns_iface': _("The interface whose IP should be used for dynamic DNS updates"),
+ 'ipa_hbac_search_base': _("Search base for HBAC related objects"),
+ 'ipa_hbac_refresh': _("The amount of time between lookups of the HBAC rules against the IPA server"),
+ 'ipa_selinux_refresh': _("The amount of time in seconds between lookups of the SELinux maps against the IPA "
+ "server"),
+ 'ipa_hbac_support_srchost': _("If set to false, host argument given by PAM will be ignored"),
+ 'ipa_automount_location': _("The automounter location this IPA client is using"),
+ 'ipa_master_domain_search_base': _("Search base for object containing info about IPA domain"),
+ 'ipa_ranges_search_base': _("Search base for objects containing info about ID ranges"),
+ 'ipa_enable_dns_sites': _("Enable DNS sites - location based service discovery"),
+ 'ipa_views_search_base': _("Search base for view containers"),
+ 'ipa_view_class': _("Objectclass for view containers"),
+ 'ipa_view_name': _("Attribute with the name of the view"),
+ 'ipa_override_object_class': _("Objectclass for override objects"),
+ 'ipa_anchor_uuid': _("Attribute with the reference to the original object"),
+ 'ipa_user_override_object_class': _("Objectclass for user override objects"),
+ 'ipa_group_override_object_class': _("Objectclass for group override objects"),
+ 'ipa_deskprofile_search_base': _("Search base for Desktop Profile related objects"),
+ 'ipa_deskprofile_refresh': _("The amount of time in seconds between lookups of the Desktop Profile rules "
+ "against the IPA server"),
+ 'ipa_deskprofile_request_interval': _("The amount of time in minutes between lookups of Desktop Profiles "
+ "rules against the IPA server when the last request did not find any "
+ "rule"),
+ 'ipa_subid_ranges_search_base': _("Search base for SUBID ranges"),
+ 'ipa_access_order': _("Which rules should be used to evaluate access control"),
+ 'ipa_host_fqdn': _('The LDAP attribute that contains FQDN of the host.'),
+ 'ipa_host_object_class': _('The object class of a host entry in LDAP.'),
+ 'ipa_host_search_base': _('Use the given string as search base for host objects.'),
+ 'ipa_host_ssh_public_key': _('The LDAP attribute that contains the host\'s SSH public keys.'),
+ 'ipa_netgroup_domain': _('The LDAP attribute that contains NIS domain name of the netgroup.'),
+ 'ipa_netgroup_member': _('The LDAP attribute that contains the names of the netgroup\'s members.'),
+ 'ipa_netgroup_member_ext_host': _('The LDAP attribute that lists FQDNs of hosts and host groups that are '
+ 'members of the netgroup.'),
+ 'ipa_netgroup_member_host': _('The LDAP attribute that lists hosts and host groups that are direct members of '
+ 'the netgroup.'),
+ 'ipa_netgroup_member_of': _('The LDAP attribute that lists netgroup\'s memberships.'),
+ 'ipa_netgroup_member_user': _('The LDAP attribute that lists system users and groups that are direct members '
+ 'of the netgroup.'),
+ 'ipa_netgroup_name': _('The LDAP attribute that corresponds to the netgroup name.'),
+ 'ipa_netgroup_object_class': _('The object class of a netgroup entry in LDAP.'),
+ 'ipa_netgroup_uuid': _('The LDAP attribute that contains the UUID/GUID of an LDAP netgroup object.'),
+ 'ipa_selinux_usermap_enabled': _('The LDAP attribute that contains whether or not is user map enabled for '
+ 'usage.'),
+ 'ipa_selinux_usermap_host_category': _('The LDAP attribute that contains host category such as \'all\'.'),
+ 'ipa_selinux_usermap_member_host': _('The LDAP attribute that contains all hosts / hostgroups this rule match '
+ 'against.'),
+ 'ipa_selinux_usermap_member_user': _('The LDAP attribute that contains all users / groups this rule match '
+ 'against.'),
+ 'ipa_selinux_usermap_name': _('The LDAP attribute that contains the name of SELinux usermap.'),
+ 'ipa_selinux_usermap_object_class': _('The object class of a host entry in LDAP.'),
+ 'ipa_selinux_usermap_see_also': _('The LDAP attribute that contains DN of HBAC rule which can be used for '
+ 'matching instead of memberUser and memberHost.'),
+ 'ipa_selinux_usermap_selinux_user': _('The LDAP attribute that contains SELinux user string itself.'),
+ 'ipa_selinux_usermap_user_category': _('The LDAP attribute that contains user category such as \'all\'.'),
+ 'ipa_selinux_usermap_uuid': _('The LDAP attribute that contains unique ID of the user map.'),
+ 'ipa_server_mode': _('The option denotes that the SSSD is running on IPA server and should perform lookups of '
+ 'users and groups from trusted domains differently.'),
+ 'ipa_subdomains_search_base': _('Use the given string as search base for trusted domains.'),
+
+ # [provider/ad]
+ 'ad_domain': _('Active Directory domain'),
+ 'ad_enabled_domains': _('Enabled Active Directory domains'),
+ 'ad_server': _('Active Directory server address'),
+ 'ad_backup_server': _('Active Directory backup server address'),
+ 'ad_hostname': _('Active Directory client hostname'),
+ 'ad_enable_dns_sites': _('Enable DNS sites - location based service discovery'),
+ 'ad_access_filter': _('LDAP filter to determine access privileges'),
+ 'ad_enable_gc': _('Whether to use the Global Catalog for lookups'),
+ 'ad_gpo_access_control': _('Operation mode for GPO-based access control'),
+ 'ad_gpo_cache_timeout': _("The amount of time between lookups of the GPO policy files against the AD server"),
+ 'ad_gpo_map_interactive': _('PAM service names that map to the GPO (Deny)InteractiveLogonRight '
+ 'policy settings'),
+ 'ad_gpo_map_remote_interactive': _('PAM service names that map to the GPO (Deny)RemoteInteractiveLogonRight '
+ 'policy settings'),
+ 'ad_gpo_map_network': _('PAM service names that map to the GPO (Deny)NetworkLogonRight policy settings'),
+ 'ad_gpo_map_batch': _('PAM service names that map to the GPO (Deny)BatchLogonRight policy settings'),
+ 'ad_gpo_map_service': _('PAM service names that map to the GPO (Deny)ServiceLogonRight policy settings'),
+ 'ad_gpo_map_permit': _('PAM service names for which GPO-based access is always granted'),
+ 'ad_gpo_map_deny': _('PAM service names for which GPO-based access is always denied'),
+ 'ad_gpo_default_right': _('Default logon right (or permit/deny) to use for unmapped PAM service names'),
+ 'ad_site': _('a particular site to be used by the client'),
+ 'ad_maximum_machine_account_password_age': _('Maximum age in days before the machine account password should '
+ 'be renewed'),
+ 'ad_machine_account_password_renewal_opts': _('Option for tuning the machine account renewal task'),
+ 'ad_update_samba_machine_account_password': _('Whether to update the machine account password in the Samba '
+ 'database'),
+ 'ad_use_ldaps': _('Use LDAPS port for LDAP and Global Catalog requests'),
+ 'ad_allow_remote_domain_local_groups': _('Do not filter domain local groups from other domains'),
+
+ # [provider/krb5]
+ 'krb5_kdcip': _('Kerberos server address'),
+ 'krb5_server': _('Kerberos server address'),
+ 'krb5_backup_server': _('Kerberos backup server address'),
+ 'krb5_realm': _('Kerberos realm'),
+ 'krb5_auth_timeout': _('Authentication timeout'),
+ 'krb5_use_kdcinfo': _('Whether to create kdcinfo files'),
+ 'krb5_confd_path': _('Where to drop krb5 config snippets'),
+
+ # [provider/krb5/auth]
+ 'krb5_ccachedir': _('Directory to store credential caches'),
+ 'krb5_ccname_template': _("Location of the user's credential cache"),
+ 'krb5_keytab': _("Location of the keytab to validate credentials"),
+ 'krb5_validate': _("Enable credential validation"),
+ 'krb5_store_password_if_offline': _("Store password if offline for later online authentication"),
+ 'krb5_renewable_lifetime': _("Renewable lifetime of the TGT"),
+ 'krb5_lifetime': _("Lifetime of the TGT"),
+ 'krb5_renew_interval': _("Time between two checks for renewal"),
+ 'krb5_use_fast': _("Enables FAST"),
+ 'krb5_fast_principal': _("Selects the principal to use for FAST"),
+ 'krb5_fast_use_anonymous_pkinit': _("Use anonymous PKINIT to request FAST credentials"),
+ 'krb5_canonicalize': _("Enables principal canonicalization"),
+ 'krb5_use_enterprise_principal': _("Enables enterprise principals"),
+ 'krb5_use_subdomain_realm': _("Enables using of subdomains realms for authentication"),
+ 'krb5_map_user': _('A mapping from user names to Kerberos principal names'),
+
+ # [provider/krb5/chpass]
+ 'krb5_kpasswd': _('Server where the change password service is running if not on the KDC'),
+ 'krb5_backup_kpasswd': _('Server where the change password service is running if not on the KDC'),
+
+ # [provider/ldap]
+ 'ldap_uri': _('ldap_uri, The URI of the LDAP server'),
+ 'ldap_backup_uri': _('ldap_backup_uri, The URI of the LDAP server'),
+ 'ldap_search_base': _('The default base DN'),
+ 'ldap_schema': _('The Schema Type in use on the LDAP server, rfc2307'),
+ 'ldap_pwmodify_mode': _('Mode used to change user password'),
+ 'ldap_default_bind_dn': _('The default bind DN'),
+ 'ldap_default_authtok_type': _('The type of the authentication token of the default bind DN'),
+ 'ldap_default_authtok': _('The authentication token of the default bind DN'),
+ 'ldap_network_timeout': _('Length of time to attempt connection'),
+ 'ldap_opt_timeout': _('Length of time to attempt synchronous LDAP operations'),
+ 'ldap_offline_timeout': _('Length of time between attempts to reconnect while offline'),
+ 'ldap_force_upper_case_realm': _('Use only the upper case for realm names'),
+ 'ldap_tls_cacert': _('File that contains CA certificates'),
+ 'ldap_tls_cacertdir': _('Path to CA certificate directory'),
+ 'ldap_tls_cert': _('File that contains the client certificate'),
+ 'ldap_tls_key': _('File that contains the client key'),
+ 'ldap_tls_cipher_suite': _('List of possible ciphers suites'),
+ 'ldap_tls_reqcert': _('Require TLS certificate verification'),
+ 'ldap_sasl_mech': _('Specify the sasl mechanism to use'),
+ 'ldap_sasl_authid': _('Specify the sasl authorization id to use'),
+ 'ldap_sasl_realm': _('Specify the sasl authorization realm to use'),
+ 'ldap_sasl_minssf': _('Specify the minimal SSF for LDAP sasl authorization'),
+ 'ldap_sasl_maxssf': _('Specify the maximal SSF for LDAP sasl authorization'),
+ 'ldap_krb5_keytab': _('Kerberos service keytab'),
+ 'ldap_krb5_init_creds': _('Use Kerberos auth for LDAP connection'),
+ 'ldap_referrals': _('Follow LDAP referrals'),
+ 'ldap_krb5_ticket_lifetime': _('Lifetime of TGT for LDAP connection'),
+ 'ldap_deref': _('How to dereference aliases'),
+ 'ldap_dns_service_name': _('Service name for DNS service lookups'),
+ 'ldap_page_size': _('The number of records to retrieve in a single LDAP query'),
+ 'ldap_deref_threshold': _('The number of members that must be missing to trigger a full deref'),
+ 'ldap_ignore_unreadable_references': _('Ignore unreadable LDAP references'),
+ 'ldap_sasl_canonicalize': _('Whether the LDAP library should perform a reverse lookup to canonicalize the '
+ 'host name during a SASL bind'),
+ 'ldap_rfc2307_fallback_to_local_users': _('Allows to retain local users as members of an LDAP group for '
+ 'servers that use the RFC2307 schema.'),
+
+ 'ldap_entry_usn': _('entryUSN attribute'),
+ 'ldap_rootdse_last_usn': _('lastUSN attribute'),
+
+ 'ldap_connection_expiration_timeout': _('How long to retain a connection to the LDAP server before '
+ 'disconnecting'),
+
+ 'ldap_disable_paging': _('Disable the LDAP paging control'),
+ 'ldap_disable_range_retrieval': _('Disable Active Directory range retrieval'),
+
+ # [provider/ldap/id]
+ 'ldap_search_timeout': _('Length of time to wait for a search request'),
+ 'ldap_enumeration_search_timeout': _('Length of time to wait for a enumeration request'),
+ 'ldap_enumeration_refresh_timeout': _('Length of time between enumeration updates'),
+ 'ldap_enumeration_refresh_offset': _('Maximum period deviation between enumeration updates'),
+ 'ldap_purge_cache_timeout': _('Length of time between cache cleanups'),
+ 'ldap_purge_cache_offset': _('Maximum time deviation between cache cleanups'),
+ 'ldap_id_use_start_tls': _('Require TLS for ID lookups'),
+ 'ldap_id_mapping': _('Use ID-mapping of objectSID instead of pre-set IDs'),
+ 'ldap_user_search_base': _('Base DN for user lookups'),
+ 'ldap_user_search_scope': _('Scope of user lookups'),
+ 'ldap_user_search_filter': _('Filter for user lookups'),
+ 'ldap_user_object_class': _('Objectclass for users'),
+ 'ldap_user_name': _('Username attribute'),
+ 'ldap_user_uid_number': _('UID attribute'),
+ 'ldap_user_gid_number': _('Primary GID attribute'),
+ 'ldap_user_gecos': _('GECOS attribute'),
+ 'ldap_user_home_directory': _('Home directory attribute'),
+ 'ldap_user_shell': _('Shell attribute'),
+ 'ldap_user_uuid': _('UUID attribute'),
+ 'ldap_user_objectsid': _("objectSID attribute"),
+ 'ldap_user_primary_group': _('Active Directory primary group attribute for ID-mapping'),
+ 'ldap_user_principal': _('User principal attribute (for Kerberos)'),
+ 'ldap_user_fullname': _('Full Name'),
+ 'ldap_user_member_of': _('memberOf attribute'),
+ 'ldap_user_modify_timestamp': _('Modification time attribute'),
+ 'ldap_user_shadow_last_change': _('shadowLastChange attribute'),
+ 'ldap_user_shadow_min': _('shadowMin attribute'),
+ 'ldap_user_shadow_max': _('shadowMax attribute'),
+ 'ldap_user_shadow_warning': _('shadowWarning attribute'),
+ 'ldap_user_shadow_inactive': _('shadowInactive attribute'),
+ 'ldap_user_shadow_expire': _('shadowExpire attribute'),
+ 'ldap_user_shadow_flag': _('shadowFlag attribute'),
+ 'ldap_user_authorized_service': _('Attribute listing authorized PAM services'),
+ 'ldap_user_authorized_host': _('Attribute listing authorized server hosts'),
+ 'ldap_user_authorized_rhost': _('Attribute listing authorized server rhosts'),
+ 'ldap_user_krb_last_pwd_change': _('krbLastPwdChange attribute'),
+ 'ldap_user_krb_password_expiration': _('krbPasswordExpiration attribute'),
+ 'ldap_pwd_attribute': _('Attribute indicating that server side password policies are active'),
+ 'ldap_user_ad_account_expires': _('accountExpires attribute of AD'),
+ 'ldap_user_ad_user_account_control': _('userAccountControl attribute of AD'),
+ 'ldap_ns_account_lock': _('nsAccountLock attribute'),
+ 'ldap_user_nds_login_disabled': _('loginDisabled attribute of NDS'),
+ 'ldap_user_nds_login_expiration_time': _('loginExpirationTime attribute of NDS'),
+ 'ldap_user_nds_login_allowed_time_map': _('loginAllowedTimeMap attribute of NDS'),
+ 'ldap_user_ssh_public_key': _('SSH public key attribute'),
+ 'ldap_user_auth_type': _('attribute listing allowed authentication types for a user'),
+ 'ldap_user_certificate': _('attribute containing the X509 certificate of the user'),
+ 'ldap_user_email': _('attribute containing the email address of the user'),
+ 'ldap_user_passkey': _('attribute containing the passkey mapping data of the user'),
+ 'ldap_user_extra_attrs': _('A list of extra attributes to download along with the user entry'),
+
+ 'ldap_group_search_base': _('Base DN for group lookups'),
+ 'ldap_group_object_class': _('Objectclass for groups'),
+ 'ldap_group_name': _('Group name'),
+ 'ldap_group_pwd': _('Group password'),
+ 'ldap_group_gid_number': _('GID attribute'),
+ 'ldap_group_member': _('Group member attribute'),
+ 'ldap_group_uuid': _('Group UUID attribute'),
+ 'ldap_group_objectsid': _("objectSID attribute"),
+ 'ldap_group_modify_timestamp': _('Modification time attribute for groups'),
+ 'ldap_group_type': _('Type of the group and other flags'),
+ 'ldap_group_external_member': _('The LDAP group external member attribute'),
+ 'ldap_group_nesting_level': _('Maximum nesting level SSSD will follow'),
+ 'ldap_group_search_filter': _('Filter for group lookups'),
+ 'ldap_group_search_scope': _('Scope of group lookups'),
+
+ 'ldap_netgroup_search_base': _('Base DN for netgroup lookups'),
+ 'ldap_netgroup_object_class': _('Objectclass for netgroups'),
+ 'ldap_netgroup_name': _('Netgroup name'),
+ 'ldap_netgroup_member': _('Netgroups members attribute'),
+ 'ldap_netgroup_triple': _('Netgroup triple attribute'),
+ 'ldap_netgroup_modify_timestamp': _('Modification time attribute for netgroups'),
+
+ 'ldap_service_search_base': _('Base DN for service lookups'),
+ 'ldap_service_object_class': _('Objectclass for services'),
+ 'ldap_service_name': _('Service name attribute'),
+ 'ldap_service_port': _('Service port attribute'),
+ 'ldap_service_proto': _('Service protocol attribute'),
+
+ 'ldap_idmap_range_min': _('Lower bound for ID-mapping'),
+ 'ldap_idmap_range_max': _('Upper bound for ID-mapping'),
+ 'ldap_idmap_range_size': _('Number of IDs for each slice when ID-mapping'),
+ 'ldap_idmap_autorid_compat': _('Use autorid-compatible algorithm for ID-mapping'),
+ 'ldap_idmap_default_domain': _('Name of the default domain for ID-mapping'),
+ 'ldap_idmap_default_domain_sid': _('SID of the default domain for ID-mapping'),
+ 'ldap_idmap_helper_table_size': _('Number of secondary slices'),
+
+ 'ldap_use_tokengroups': _('Whether to use Token-Groups'),
+ 'ldap_min_id': _('Set lower boundary for allowed IDs from the LDAP server'),
+ 'ldap_max_id': _('Set upper boundary for allowed IDs from the LDAP server'),
+ 'ldap_pwdlockout_dn': _('DN for ppolicy queries'),
+ 'wildcard_limit': _('How many maximum entries to fetch during a wildcard request'),
+ 'ldap_library_debug_level': _('Set libldap debug level'),
+
+ # [provider/ldap/auth]
+ 'ldap_pwd_policy': _('Policy to evaluate the password expiration'),
+
+ # [provider/ldap/access]
+ 'ldap_access_filter': _('LDAP filter to determine access privileges'),
+ 'ldap_account_expire_policy': _('Which attributes shall be used to evaluate if an account is expired'),
+ 'ldap_access_order': _('Which rules should be used to evaluate access control'),
+
+ # [provider/ldap/chpass]
+ 'ldap_chpass_uri': _('URI of an LDAP server where password changes are allowed'),
+ 'ldap_chpass_backup_uri': _('URI of a backup LDAP server where password changes are allowed'),
+ 'ldap_chpass_dns_service_name': _('DNS service name for LDAP password change server'),
+ 'ldap_chpass_update_last_change': _('Whether to update the ldap_user_shadow_last_change attribute after a '
+ 'password change'),
+
+ # [provider/ldap/sudo]
+ 'ldap_sudo_search_base': _('Base DN for sudo rules lookups'),
+ 'ldap_sudo_full_refresh_interval': _('Automatic full refresh period'),
+ 'ldap_sudo_smart_refresh_interval': _('Automatic smart refresh period'),
+ 'ldap_sudo_random_offset': _('Smart and full refresh random offset'),
+ 'ldap_sudo_use_host_filter': _('Whether to filter rules by hostname, IP addresses and network'),
+ 'ldap_sudo_hostnames': _('Hostnames and/or fully qualified domain names of this machine to filter sudo rules'),
+ 'ldap_sudo_ip': _('IPv4 or IPv6 addresses or network of this machine to filter sudo rules'),
+ 'ldap_sudo_include_netgroups': _('Whether to include rules that contains netgroup in host attribute'),
+ 'ldap_sudo_include_regexp': _('Whether to include rules that contains regular expression in host attribute'),
+ 'ldap_sudorule_object_class': _('Object class for sudo rules'),
+ 'ldap_sudorule_object_class_attr': _('Name of attribute that is used as object class for sudo rules'),
+ 'ldap_sudorule_name': _('Sudo rule name'),
+ 'ldap_sudorule_command': _('Sudo rule command attribute'),
+ 'ldap_sudorule_host': _('Sudo rule host attribute'),
+ 'ldap_sudorule_user': _('Sudo rule user attribute'),
+ 'ldap_sudorule_option': _('Sudo rule option attribute'),
+ 'ldap_sudorule_runas': _('Sudo rule runas attribute'),
+ 'ldap_sudorule_runasuser': _('Sudo rule runasuser attribute'),
+ 'ldap_sudorule_runasgroup': _('Sudo rule runasgroup attribute'),
+ 'ldap_sudorule_notbefore': _('Sudo rule notbefore attribute'),
+ 'ldap_sudorule_notafter': _('Sudo rule notafter attribute'),
+ 'ldap_sudorule_order': _('Sudo rule order attribute'),
+
+ # [provider/ldap/autofs]
+ 'ldap_autofs_map_object_class': _('Object class for automounter maps'),
+ 'ldap_autofs_map_name': _('Automounter map name attribute'),
+ 'ldap_autofs_entry_object_class': _('Object class for automounter map entries'),
+ 'ldap_autofs_entry_key': _('Automounter map entry key attribute'),
+ 'ldap_autofs_entry_value': _('Automounter map entry value attribute'),
+ 'ldap_autofs_search_base': _('Base DN for automounter map lookups'),
+ 'ldap_autofs_map_master_name': _('The name of the automount master map in LDAP.'),
+
+ # [provider/ldap/resolver]
+ 'ldap_iphost_search_base': _('Base DN for IP hosts lookups'),
+ 'ldap_iphost_object_class': _('Object class for IP hosts'),
+ 'ldap_iphost_name': _('IP host name attribute'),
+ 'ldap_iphost_number': _('IP host number (address) attribute'),
+ 'ldap_iphost_entry_usn': _('IP host entryUSN attribute'),
+ 'ldap_ipnetwork_search_base': _('Base DN for IP networks lookups'),
+ 'ldap_ipnetwork_object_class': _('Object class for IP networks'),
+ 'ldap_ipnetwork_name': _('IP network name attribute'),
+ 'ldap_ipnetwork_number': _('IP network number (address) attribute'),
+ 'ldap_ipnetwork_entry_usn': _('IP network entryUSN attribute'),
+
+ # [provider/simple/access]
+ 'simple_allow_users': _('Comma separated list of allowed users'),
+ 'simple_deny_users': _('Comma separated list of prohibited users'),
+ 'simple_allow_groups': _('Comma separated list of groups that are allowed to log in. This applies only to '
+ 'groups within this SSSD domain. Local groups are not evaluated.'),
+ 'simple_deny_groups': _('Comma separated list of groups that are explicitly denied access. This applies only '
+ 'to groups within this SSSD domain. Local groups are not evaluated.'),
+
+ # [provider/proxy]
+ 'proxy_max_children': _('The number of preforked proxy children.'),
+
+ # [provider/proxy/id]
+ 'proxy_lib_name': _('The name of the NSS library to use'),
+ 'proxy_resolver_lib_name': _('The name of the NSS library to use for hosts and networks lookups'),
+ 'proxy_fast_alias': _('Whether to look up canonical group name from cache if possible'),
+
+ # [provider/proxy/auth]
+ 'proxy_pam_target': _('PAM stack to use'),
+
+ # [provider/files]
+ 'passwd_files': _('Path of passwd file sources.'),
+ 'group_files': _('Path of group file sources.')
+ }