Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/freeipa/ipa-4-8/es/units/?format=api&page=91
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 4647,
    "next": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/units/?format=api&page=92",
    "previous": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/units/?format=api&page=90",
    "results": [
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "service delegation targets to remove"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2123361248130218089,
            "content_hash": -2123361248130218089,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4462,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 5,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732795/?format=api",
            "priority": 100,
            "id": 4706038,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=62884e31e35e4797",
            "url": "https://translate.fedoraproject.org/api/units/4706038/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.292363Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nStageusers\n\nManage stage user entries.\n\nStage user entries are directly under the container: \"cn=stage users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUser can not authenticate with those entries (even if the entries\ncontain credentials) and are candidate to become Active entries.\n\nActive user entries are Posix users directly under the container: \"cn=accounts, SUFFIX\".\nUser can authenticate with Active entries, at the condition they have\ncredentials\n\nDelete user entries are Posix users directly under the container: \"cn=deleted users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUser can not authenticate with those entries (even if the entries contain credentials)\n\nThe stage user container contains entries\n    - created by 'stageuser-add' commands that are Posix users\n    - created by external provisioning system\n\nA valid stage user entry MUST:\n    - entry RDN is 'uid'\n    - ipaUniqueID is 'autogenerate'\n\nIPA supports a wide range of username formats, but you need to be aware of any\nrestrictions that may apply to your particular environment. For example,\nusernames that start with a digit or usernames that exceed a certain length\nmay cause problems for some UNIX systems.\nUse 'ipa config-mod' to change the username format allowed by IPA tools.\n\n\nEXAMPLES:\n\n Add a new stageuser:\n   ipa stageuser-add --first=Tim --last=User --password tuser1\n\n Add a stageuser from the Delete container\n   ipa stageuser-add  --first=Tim --last=User --from-delete tuser1\n"
            ],
            "previous_source": "\nStageusers\n\nManage stage user entries.\n\nStage user entries are directly under the container: \"cn=stage users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUsers can not authenticate with those entries (even if the entries\ncontain credentials). Those entries are only candidate to become Active entries.\n\nActive user entries are Posix users directly under the container: \"cn=accounts, SUFFIX\".\nUsers can authenticate with Active entries, at the condition they have\ncredentials.\n\nDeleted user entries are Posix users directly under the container: \"cn=deleted users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUsers can not authenticate with those entries, even if the entries contain credentials.\n\nThe stage user container contains entries:\n    - created by 'stageuser-add' commands that are Posix users,\n    - created by external provisioning system.\n\nA valid stage user entry MUST have:\n    - entry RDN is 'uid',\n    - ipaUniqueID is 'autogenerate'.\n\nIPA supports a wide range of username formats, but you need to be aware of any\nrestrictions that may apply to your particular environment. For example,\nusernames that start with a digit or usernames that exceed a certain length\nmay cause problems for some UNIX systems.\nUse 'ipa config-mod' to change the username format allowed by IPA tools.\n\n\nEXAMPLES:\n\n Add a new stageuser:\n   ipa stageuser-add --first=Tim --last=User --password tuser1\n\n Add a stageuser from the deleted users container:\n   ipa stageuser-add  --first=Tim --last=User --from-delete tuser1\n\n",
            "target": [
                "\nEscenógrafos\n\nGestionar las entradas de escenario de usuario.\n\nLas entradas de escenario de usuario están directamente bajo el contenedor.\n \"cn=stage users, cn=accounts, cn=provisioning, SUFFIX\". Los usuarios no se\n pueden autenticar con estas entradas (aunque las entradas contengan\n credenciales). Estas entradas son solo candidatas a llegar a ser entradas Activas.\n\nLas entradas Activas de usuario son usuarios Posix directamente bajo el contenedor. \"cn=accounts, SUFFIX\".\nLos usuario se pueden autenticar con entradas Activas con la condición de que \ntengan credenciales.\n\nLas entradas borradas de usuario son usuaruios Posix directamente bajo el contenedor. \"cn=deleted users,\ncn=accounts, cn=provisioning, SUFFIX\".\nLos usuarios no se pueden autenticas con estas entradas, aunque estas entradas contengan credenciales.\n\nEl contenedor escenario de usuario contiene entradas:\n    - crreadas por comandos 'stageuser-add' que son usuarios Posix,\n    - creadas por un sistema externa de aprovisionamiento.\n\nUna entrada de escenario de usuario valida DEBE tener:\n    - entrada RDN es 'uid',\n    - ipaUniqueID es 'autogenerate'.\n\nIPA soporta un amplia rango de formatos de nombre de usuario, pero usted debe\nestar atento a algunas restricciones que pueden aplicarse a su entorno concreto.\nPor ejemplo, los nombres de usuario que empiezan con un dígito o los nombres de \nusuario que exceden cierta longitud pueden causar problemas en algunos sistemas  UNIX.\nUse 'ipa config-mod' para cambiar el formato de nombre de usuario permitido por las herramientas IPA.\n\n\nEJEMPLOS:\n\nAñadir un uevo escenógrafo:\n   ipa stageuser-add --first=Tim --last=User --password tuser1\n\n Añadir un escenografo desde un contenedor de usuarios borrados:\n   ipa stageuser-add  --first=Tim --last=User --from-delete tuser1\n\n"
            ],
            "id_hash": -6243864614975504312,
            "content_hash": -6243864614975504312,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4463,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 208,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727961/?format=api",
            "priority": 100,
            "id": 4706040,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=29595636cec10048",
            "url": "https://translate.fedoraproject.org/api/units/4706040/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.312997Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users with these member of groups."
            ],
            "previous_source": "Search for services with these managed by hosts.",
            "target": [
                "Búsqueda de servicios con aquellos gestionados por hosts."
            ],
            "id_hash": -3936704368680801451,
            "content_hash": -3936704368680801451,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4464,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731702/?format=api",
            "priority": 100,
            "id": 4706042,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=495e043bf70d6b55",
            "url": "https://translate.fedoraproject.org/api/units/4706042/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.357913Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users without these member of groups."
            ],
            "previous_source": "Search for services without these managed by hosts.",
            "target": [
                "Búsqueda de servicios sin aquellos gestionados por hosts."
            ],
            "id_hash": -951627341528695060,
            "content_hash": -951627341528695060,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4465,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731712/?format=api",
            "priority": 100,
            "id": 4706043,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=72cb23f98da1feec",
            "url": "https://translate.fedoraproject.org/api/units/4706043/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.386633Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users with these member of netgroups."
            ],
            "previous_source": "Search for services with these managed by hosts.",
            "target": [
                "Búsqueda de servicios con aquellos gestionados por hosts."
            ],
            "id_hash": -2496646751950542668,
            "content_hash": -2496646751950542668,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4466,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731704/?format=api",
            "priority": 100,
            "id": 4706045,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=5d5a2101c45ae8b4",
            "url": "https://translate.fedoraproject.org/api/units/4706045/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.421621Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users without these member of netgroups."
            ],
            "previous_source": "Search for services without these managed by hosts.",
            "target": [
                "Búsqueda de servicios sin aquellos gestionados por hosts."
            ],
            "id_hash": -6880347366244008828,
            "content_hash": -6880347366244008828,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4467,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731714/?format=api",
            "priority": 100,
            "id": 4706046,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=2084188627bb3c84",
            "url": "https://translate.fedoraproject.org/api/units/4706046/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.448309Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users with these member of roles."
            ],
            "previous_source": "Search for services with these managed by hosts.",
            "target": [
                "Búsqueda de servicios con aquellos gestionados por hosts."
            ],
            "id_hash": 6824821060073443001,
            "content_hash": 6824821060073443001,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4468,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731706/?format=api",
            "priority": 100,
            "id": 4706048,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=deb6a2983d484eb9",
            "url": "https://translate.fedoraproject.org/api/units/4706048/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.470719Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users without these member of roles."
            ],
            "previous_source": "Search for services without these managed by hosts.",
            "target": [
                "Búsqueda de servicios sin aquellos gestionados por hosts."
            ],
            "id_hash": 4526969471110313151,
            "content_hash": 4526969471110313151,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4469,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731716/?format=api",
            "priority": 100,
            "id": 4706049,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=bed306bfc29174bf",
            "url": "https://translate.fedoraproject.org/api/units/4706049/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.497455Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users with these member of HBAC rules."
            ],
            "previous_source": "Search for services with these managed by hosts.",
            "target": [
                "Búsqueda de servicios con aquellos gestionados por hosts."
            ],
            "id_hash": 9464019144775835,
            "content_hash": 9464019144775835,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4470,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 10,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731700/?format=api",
            "priority": 100,
            "id": 4706051,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=80219f79ab45989b",
            "url": "https://translate.fedoraproject.org/api/units/4706051/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.529311Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users without these member of HBAC rules."
            ],
            "previous_source": "Search for services without these managed by hosts.",
            "target": [
                "Búsqueda de servicios sin aquellos gestionados por hosts."
            ],
            "id_hash": -8984762163372848585,
            "content_hash": -8984762163372848585,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4471,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 10,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731710/?format=api",
            "priority": 100,
            "id": 4706053,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=034fb66a6cca8a37",
            "url": "https://translate.fedoraproject.org/api/units/4706053/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.553684Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users with these member of sudo rules."
            ],
            "previous_source": "Search for services with these managed by hosts.",
            "target": [
                "Búsqueda de servicios con aquellos gestionados por hosts."
            ],
            "id_hash": -5920098238618340576,
            "content_hash": -5920098238618340576,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4472,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 10,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731708/?format=api",
            "priority": 100,
            "id": 4706054,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=2dd796049bbcf320",
            "url": "https://translate.fedoraproject.org/api/units/4706054/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.579070Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for stage users without these member of sudo rules."
            ],
            "previous_source": "Search for services without these managed by hosts.",
            "target": [
                "Búsqueda de servicios sin aquellos gestionados por hosts."
            ],
            "id_hash": -3765974089838187057,
            "content_hash": -3765974089838187057,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4473,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 10,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731718/?format=api",
            "priority": 100,
            "id": 4706056,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=4bbc9284addeadcf",
            "url": "https://translate.fedoraproject.org/api/units/4706056/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.606556Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Rename the stage user object"
            ],
            "previous_source": "Rename the permission object",
            "target": [
                "Renombrar el permiso del objeto"
            ],
            "id_hash": 1100597096156588336,
            "content_hash": 1100597096156588336,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4474,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 5,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731314/?format=api",
            "priority": 100,
            "id": 4706058,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=8f461b3a4d3d6930",
            "url": "https://translate.fedoraproject.org/api/units/4706058/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.640561Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nTopology\n\nManagement of a replication topology.\n\nRequires minimum domain level 1.\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7605089279202908543,
            "content_hash": -7605089279202908543,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4475,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 11,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722442/?format=api",
            "priority": 100,
            "id": 4706060,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=16754b9813faa681",
            "url": "https://translate.fedoraproject.org/api/units/4706060/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.673392Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Attributes to replicate"
            ],
            "previous_source": "Attribute Key",
            "target": [
                "Atributo Clave"
            ],
            "id_hash": 2472536115401480269,
            "content_hash": 2472536115401480269,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4476,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 3,
            "source_unit": "https://translate.fedoraproject.org/api/units/2728822/?format=api",
            "priority": 100,
            "id": 4706061,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=a250367f34d4584d",
            "url": "https://translate.fedoraproject.org/api/units/4706061/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.702252Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "LDAP suffix to be managed"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -750257373732621288,
            "content_hash": -750257373732621288,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4477,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 5,
            "source_unit": "https://translate.fedoraproject.org/api/units/2724294/?format=api",
            "priority": 100,
            "id": 4706063,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=75968ce4c48cb418",
            "url": "https://translate.fedoraproject.org/api/units/4706063/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.734106Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for topology suffices."
            ],
            "previous_source": "Search for roles.",
            "target": [
                "Buscar roles."
            ],
            "id_hash": 7281011079600376873,
            "content_hash": 7281011079600376873,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4478,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 4,
            "source_unit": "https://translate.fedoraproject.org/api/units/2725482/?format=api",
            "priority": 100,
            "id": 4706064,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=e50b59001d438c29",
            "url": "https://translate.fedoraproject.org/api/units/4706064/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.759035Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nVerify replication topology for suffix.\n\nChecks done:\n  1. check if a topology is not disconnected. In other words if there are\n     replication paths between all servers.\n  2. check if servers don't have more than the recommended number of\n     replication agreements\n    "
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5842981302331114739,
            "content_hash": 5842981302331114739,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4479,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 40,
            "source_unit": "https://translate.fedoraproject.org/api/units/2728000/?format=api",
            "priority": 100,
            "id": 4706066,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=d11670897ab204f3",
            "url": "https://translate.fedoraproject.org/api/units/4706066/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.789216Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nVaults\n\nManage vaults.\n\nVault is a secure place to store a secret.\n\nBased on the ownership there are three vault categories:\n* user/private vault\n* service vault\n* shared vault\n\nUser vaults are vaults owned used by a particular user. Private\nvaults are vaults owned the current user. Service vaults are\nvaults owned by a service. Shared vaults are owned by the admin\nbut they can be used by other users or services.\n\nBased on the security mechanism there are three types of\nvaults:\n* standard vault\n* symmetric vault\n* asymmetric vault\n\nStandard vault uses a secure mechanism to transport and\nstore the secret. The secret can only be retrieved by users\nthat have access to the vault.\n\nSymmetric vault is similar to the standard vault, but it\npre-encrypts the secret using a password before transport.\nThe secret can only be retrieved using the same password.\n\nAsymmetric vault is similar to the standard vault, but it\npre-encrypts the secret using a public key before transport.\nThe secret can only be retrieved using the private key.\n\nEXAMPLES:\n\n List vaults:\n   ipa vault-find\n       [--user <user>|--service <service>|--shared]\n\n Add a standard vault:\n   ipa vault-add <name>\n       [--user <user>|--service <service>|--shared]\n       --type standard\n\n Add a symmetric vault:\n   ipa vault-add <name>\n       [--user <user>|--service <service>|--shared]\n       --type symmetric --password-file password.txt\n\n Add an asymmetric vault:\n   ipa vault-add <name>\n       [--user <user>|--service <service>|--shared]\n       --type asymmetric --public-key-file public.pem\n\n Show a vault:\n   ipa vault-show <name>\n       [--user <user>|--service <service>|--shared]\n\n Modify vault description:\n   ipa vault-mod <name>\n       [--user <user>|--service <service>|--shared]\n       --desc <description>\n\n Modify vault type:\n   ipa vault-mod <name>\n       [--user <user>|--service <service>|--shared]\n       --type <type>\n       [old password/private key]\n       [new password/public key]\n\n Modify symmetric vault password:\n   ipa vault-mod <name>\n       [--user <user>|--service <service>|--shared]\n       --change-password\n   ipa vault-mod <name>\n       [--user <user>|--service <service>|--shared]\n       --old-password <old password>\n       --new-password <new password>\n   ipa vault-mod <name>\n       [--user <user>|--service <service>|--shared]\n       --old-password-file <old password file>\n       --new-password-file <new password file>\n\n Modify asymmetric vault keys:\n   ipa vault-mod <name>\n       [--user <user>|--service <service>|--shared]\n       --private-key-file <old private key file>\n       --public-key-file <new public key file>\n\n Delete a vault:\n   ipa vault-del <name>\n       [--user <user>|--service <service>|--shared]\n\n Display vault configuration:\n   ipa vaultconfig-show\n\n Archive data into standard vault:\n   ipa vault-archive <name>\n       [--user <user>|--service <service>|--shared]\n       --in <input file>\n\n Archive data into symmetric vault:\n   ipa vault-archive <name>\n       [--user <user>|--service <service>|--shared]\n       --in <input file>\n       --password-file password.txt\n\n Archive data into asymmetric vault:\n   ipa vault-archive <name>\n       [--user <user>|--service <service>|--shared]\n       --in <input file>\n\n Retrieve data from standard vault:\n   ipa vault-retrieve <name>\n       [--user <user>|--service <service>|--shared]\n       --out <output file>\n\n Retrieve data from symmetric vault:\n   ipa vault-retrieve <name>\n       [--user <user>|--service <service>|--shared]\n       --out <output file>\n       --password-file password.txt\n\n Retrieve data from asymmetric vault:\n   ipa vault-retrieve <name>\n       [--user <user>|--service <service>|--shared]\n       --out <output file> --private-key-file private.pem\n\n Add vault owners:\n   ipa vault-add-owner <name>\n       [--user <user>|--service <service>|--shared]\n       [--users <users>]  [--groups <groups>] [--services <services>]\n\n Delete vault owners:\n   ipa vault-remove-owner <name>\n       [--user <user>|--service <service>|--shared]\n       [--users <users>] [--groups <groups>] [--services <services>]\n\n Add vault members:\n   ipa vault-add-member <name>\n       [--user <user>|--service <service>|--shared]\n       [--users <users>] [--groups <groups>] [--services <services>]\n\n Delete vault members:\n   ipa vault-remove-member <name>\n       [--user <user>|--service <service>|--shared]\n       [--users <users>] [--groups <groups>] [--services <services>]\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -794037724542937281,
            "content_hash": -794037724542937281,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4480,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 482,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727997/?format=api",
            "priority": 100,
            "id": 4706067,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=74fb02e5825bd73f",
            "url": "https://translate.fedoraproject.org/api/units/4706067/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.808922Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "owner user"
            ],
            "previous_source": "member user",
            "target": [
                "usuario miembro"
            ],
            "id_hash": -7004131910021713147,
            "content_hash": -7004131910021713147,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4481,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732707/?format=api",
            "priority": 100,
            "id": 4706069,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=1ecc5323272d7305",
            "url": "https://translate.fedoraproject.org/api/units/4706069/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.833846Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "owner group"
            ],
            "previous_source": "User group",
            "target": [
                "Grupo de usuarios"
            ],
            "id_hash": 1939044988643259528,
            "content_hash": 1939044988643259528,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4482,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732702/?format=api",
            "priority": 100,
            "id": 4706070,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=9ae8df24c7953488",
            "url": "https://translate.fedoraproject.org/api/units/4706070/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.855944Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "owner service"
            ],
            "previous_source": "Member services",
            "target": [
                "Servicios de miembros"
            ],
            "id_hash": -7821012079565708576,
            "content_hash": -7821012079565708576,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4483,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732705/?format=api",
            "priority": 100,
            "id": 4706072,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=13762ef37d7262e0",
            "url": "https://translate.fedoraproject.org/api/units/4706072/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.885103Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nID ranges\n\nManage ID ranges  used to map Posix IDs to SIDs and back.\n\nThere are two type of ID ranges which are both handled by this utility:\n\n - the ID ranges of the local domain\n - the ID ranges of trusted remote domains\n\nBoth types have the following attributes in common:\n\n - base-id: the first ID of the Posix ID range\n - range-size: the size of the range\n\nWith those two attributes a range object can reserve the Posix IDs starting\nwith base-id up to but not including base-id+range-size exclusively.\n\nAdditionally an ID range of the local domain may set\n - rid-base: the first RID(*) of the corresponding RID range\n - secondary-rid-base: first RID of the secondary RID range\n\nand an ID range of a trusted domain must set\n - rid-base: the first RID of the corresponding RID range\n - sid: domain SID of the trusted domain\n\n\n\nEXAMPLE: Add a new ID range for a trusted domain\n\nSince there might be more than one trusted domain the domain SID must be given\nwhile creating the ID range.\n\n  ipa idrange-add --base-id=1200000 --range-size=200000 --rid-base=0                   --dom-sid=S-1-5-21-123-456-789 trusted_dom_range\n\nThis ID range is then used by the IPA server and the SSSD IPA provider to\nassign Posix UIDs to users from the trusted domain.\n\nIf e.g. a range for a trusted domain is configured with the following values:\n base-id = 1200000\n range-size = 200000\n rid-base = 0\nthe RIDs 0 to 199999 are mapped to the Posix ID from 1200000 to 13999999. So\nRID 1000 <-> Posix ID 1201000\n\n\n\nEXAMPLE: Add a new ID range for the local domain\n\nTo create an ID range for the local domain it is not necessary to specify a\ndomain SID. But since it is possible that a user and a group can have the same\nvalue as Posix ID a second RID interval is needed to handle conflicts.\n\n  ipa idrange-add --base-id=1200000 --range-size=200000 --rid-base=1000                   --secondary-rid-base=1000000 local_range\n\nThe data from the ID ranges of the local domain are used by the IPA server\ninternally to assign SIDs to IPA users and groups. The SID will then be stored\nin the user or group objects.\n\nIf e.g. the ID range for the local domain is configured with the values from\nthe example above then a new user with the UID 1200007 will get the RID 1007.\nIf this RID is already used by a group the RID will be 1000007. This can only\nhappen if a user or a group object was created with a fixed ID because the\nautomatic assignment will not assign the same ID twice. Since there are only\nusers and groups sharing the same ID namespace it is sufficient to have only\none fallback range to handle conflicts.\n\nTo find the Posix ID for a given RID from the local domain it has to be\nchecked first if the RID falls in the primary or secondary RID range and\nthe rid-base or the secondary-rid-base has to be subtracted, respectively,\nand the base-id has to be added to get the Posix ID.\n\nTypically the creation of ID ranges happens behind the scenes and this CLI\nmust not be used at all. The ID range for the local domain will be created\nduring installation or upgrade from an older version. The ID range for a\ntrusted domain will be created together with the trust by 'ipa trust-add ...'.\n\nUSE CASES:\n\n  Add an ID range from a transitively trusted domain\n\n    If the trusted domain (A) trusts another domain (B) as well and this trust\n    is transitive 'ipa trust-add domain-A' will only create a range for\n    domain A.  The ID range for domain B must be added manually.\n\n  Add an additional ID range for the local domain\n\n    If the ID range of the local domain is exhausted, i.e. no new IDs can be\n    assigned to Posix users or groups by the DNA plugin, a new range has to be\n    created to allow new users and groups to be added. (Currently there is no\n    connection between this range CLI and the DNA plugin, but a future version\n    might be able to modify the configuration of the DNS plugin as well)\n\nIn general it is not necessary to modify or delete ID ranges. If there is no\nother way to achieve a certain configuration than to modify or delete an ID\nrange it should be done with great care. Because UIDs are stored in the file\nsystem and are used for access control it might be possible that users are\nallowed to access files of other users if an ID range got deleted and reused\nfor a different domain.\n\n(*) The RID is typically the last integer of a user or group SID which follows\nthe domain SID. E.g. if the domain SID is S-1-5-21-123-456-789 and a user from\nthis domain has the SID S-1-5-21-123-456-789-1010 then 1010 id the RID of the\nuser. RIDs are unique in a domain, 32bit values and are used for users and\ngroups.\n\n=======\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n=======\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 160957291323804816,
            "content_hash": 160957291323804816,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4484,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 900,
            "source_unit": "https://translate.fedoraproject.org/api/units/4672324/?format=api",
            "priority": 100,
            "id": 4706074,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=823bd5cdbd5d4c90",
            "url": "https://translate.fedoraproject.org/api/units/4706074/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.921375Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-base\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n=======\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n=======\n    "
            ],
            "previous_source": "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-bas\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n    WARNING:\n\n    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the\n    local domain. Currently the DNA plugin *cannot* be reconfigured itself based\n    on the local ranges set via this family of commands.\n\n    Manual configuration change has to be done in the DNA plugin configuration for\n    the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\n    modified to match the new range.\n    ",
            "target": [
                "\nAñadir un nuevo rango de ID.\n\n    Para añadir un nuevo rango de ID siempre debe especificar\n\n        --base-id\n        --range-size\n\n    Adicionalmente\n\n        --rid-base\n        --secondary-rid-base\n\n    puede ser dado para un nuevo rango de ID para el dominio local mientras\n\n        --rid-bas\n        --dom-sid\n\n   deben ser dados para añadir un nuevo rango para un AD de dominio de confianza.\n\n    PRECAUCIÓN:\n\n    El plugin DNA en 389-ds ubicará IDs en base a los rangos configurados para el dominio\n    local. Actualmente el plugin DNA \"no puede\" ser reconfigurado por si mismo en base a\n    los rangos locales ajustados por medio de esta familia de comandos.\n\n    El cambio manual de configuración ha sido hecho en la configuración del plugin DNA\n    para el nuevo rango local. Específicamente, el atributo dnaNextRange de 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' ha sido\n    modificado para coincidir con el nuevo rango.\n    "
            ],
            "id_hash": -7194871590498221111,
            "content_hash": -7194871590498221111,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4485,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 122,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727773/?format=api",
            "priority": 100,
            "id": 4706075,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=1c26ae6893cdc3c9",
            "url": "https://translate.fedoraproject.org/api/units/4706075/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:18.957563Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nModify ID range.\n\n=======\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n=======\n    "
            ],
            "previous_source": "=======\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n=======\n",
            "target": [
                "=======\nADVERTENCIA:\n\nEl plugin DNA en 389-ds asignará IDs basados en el rango configurado para el\ndominio local. Actualmente el plugin DNA *no puede* ser reconfigurado en base a\nlos rangos locales establecidos por medio de esta familia de comandos.\n\nEl cambio de configuración manual ha de ser hecho en la configuración del plugin\nDNA para e nuevo rango local. Especialmente, el atributo dnaNextRange de\n'cn=Posix IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' ha\nsido modificado para coincidir con el nuevo rango.\n=======\n"
            ],
            "id_hash": -6371281274070293621,
            "content_hash": -6371281274070293621,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4486,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 77,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727894/?format=api",
            "priority": 100,
            "id": 4706077,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=2794a9700ef1238b",
            "url": "https://translate.fedoraproject.org/api/units/4706077/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.007166Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nGroups of users\n\nManage groups of users. By default, new groups are POSIX groups. You\ncan add the --nonposix option to the group-add command to mark a new group\nas non-POSIX. You can use the --posix argument with the group-mod command\nto convert a non-POSIX group into a POSIX group. POSIX groups cannot be\nconverted to non-POSIX groups.\n\nEvery group must have a description.\n\nPOSIX groups must have a Group ID (GID) number. Changing a GID is\nsupported but can have an impact on your file permissions. It is not necessary\nto supply a GID when creating a group. IPA will generate one automatically\nif it is not provided.\n\nEXAMPLES:\n\n Add a new group:\n   ipa group-add --desc='local administrators' localadmins\n\n Add a new non-POSIX group:\n   ipa group-add --nonposix --desc='remote administrators' remoteadmins\n\n Convert a non-POSIX group to posix:\n   ipa group-mod --posix remoteadmins\n\n Add a new POSIX group with a specific Group ID number:\n   ipa group-add --gid=500 --desc='unix admins' unixadmins\n\n Add a new POSIX group and let IPA assign a Group ID number:\n   ipa group-add --desc='printer admins' printeradmins\n\n Remove a group:\n   ipa group-del unixadmins\n\n To add the \"remoteadmins\" group to the \"localadmins\" group:\n   ipa group-add-member --groups=remoteadmins localadmins\n\n Add multiple users to the \"localadmins\" group:\n   ipa group-add-member --users=test1 --users=test2 localadmins\n\n Remove a user from the \"localadmins\" group:\n   ipa group-remove-member --users=test2 localadmins\n\n Display information about a named group.\n   ipa group-show localadmins\n\nExternal group membership is designed to allow users from trusted domains\nto be mapped to local POSIX groups in order to actually use IPA resources.\nExternal members should be added to groups that specifically created as\nexternal and non-POSIX. Such group later should be included into one of POSIX\ngroups.\n\nAn external group member is currently a Security Identifier (SID) as defined by\nthe trusted domain. When adding external group members, it is possible to\nspecify them in either SID, or DOM\name, or name@domain format. IPA will attempt\nto resolve passed name to SID with the use of Global Catalog of the trusted domain.\n\nExample:\n\n1. Create group for the trusted domain admins' mapping and their local POSIX group:\n\n   ipa group-add --desc='<ad.domain> admins external map' ad_admins_external --external\n   ipa group-add --desc='<ad.domain> admins' ad_admins\n\n2. Add security identifier of Domain Admins of the <ad.domain> to the ad_admins_external\n   group:\n\n   ipa group-add-member ad_admins_external --external 'AD\\Domain Admins'\n\n3. Allow members of ad_admins_external group to be associated with ad_admins POSIX group:\n\n   ipa group-add-member ad_admins --groups ad_admins_external\n\n4. List members of external members of ad_admins_external group to see their SIDs:\n\n   ipa group-show ad_admins_external\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 6868521823390194853,
            "content_hash": 6868521823390194853,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4487,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 413,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722349/?format=api",
            "priority": 100,
            "id": 4706080,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=df51e4351730dca5",
            "url": "https://translate.fedoraproject.org/api/units/4706080/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.058615Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nSimulate use of Host-based access controls\n\nHBAC rules control who can access what services on what hosts.\nYou can use HBAC to control which users or groups can access a service,\nor group of services, on a target host.\n\nSince applying HBAC rules implies use of a production environment,\nthis plugin aims to provide simulation of HBAC rules evaluation without\nhaving access to the production environment.\n\n Test user coming to a service on a named host against\n existing enabled rules.\n\n ipa hbactest --user= --host= --service=\n              [--rules=rules-list] [--nodetail] [--enabled] [--disabled]\n              [--sizelimit= ]\n\n --user, --host, and --service are mandatory, others are optional.\n\n If --rules is specified simulate enabling of the specified rules and test\n the login of the user using only these rules.\n\n If --enabled is specified, all enabled HBAC rules will be added to simulation\n\n If --disabled is specified, all disabled HBAC rules will be added to simulation\n\n If --nodetail is specified, do not return information about rules matched/not matched.\n\n If both --rules and --enabled are specified, apply simulation to --rules _and_\n all IPA enabled rules.\n\n If no --rules specified, simulation is run against all IPA enabled rules.\n By default there is a IPA-wide limit to number of entries fetched, you can change it\n with --sizelimit option.\n\nEXAMPLES:\n\n    1. Use all enabled HBAC rules in IPA database to simulate:\n    $ ipa  hbactest --user=a1a --host=bar --service=sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    2. Disable detailed summary of how rules were applied:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --nodetail\n    --------------------\n    Access granted: True\n    --------------------\n\n    3. Test explicitly specified HBAC rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=myrule --rules=my-second-rule\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: myrule\n\n    4. Use all enabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=myrule --rules=my-second-rule --enabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    5. Test all disabled HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: new-rule\n\n    6. Test all disabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=myrule --rules=my-second-rule --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n\n    7. Test all (enabled and disabled) HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --enabled --disabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Not matched rules: new-rule\n      Matched rules: allow_all\n\n\nHBACTEST AND TRUSTED DOMAINS\n\nWhen an external trusted domain is configured in IPA, HBAC rules are also applied\non users accessing IPA resources from the trusted domain. Trusted domain users and\ngroups (and their SIDs) can be then assigned to external groups which can be\nmembers of POSIX groups in IPA which can be used in HBAC rules and thus allowing\naccess to resources protected by the HBAC system.\n\nhbactest plugin is capable of testing access for both local IPA users and users\nfrom the trusted domains, either by a fully qualified user name or by user SID.\nSuch user names need to have a trusted domain specified as a short name\n(DOMAIN\\Administrator) or with a user principal name (UPN), Administrator@ad.test.\n\nPlease note that hbactest executed with a trusted domain user as --user parameter\ncan be only run by members of \"trust admins\" group.\n\nEXAMPLES:\n\n    1. Test if a user from a trusted domain specified by its shortname matches any\n       rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Administrator' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    2. Test if a user from a trusted domain specified by its domain name matches\n       any rule:\n\n    $ ipa hbactest --user 'Administrator@domain.com' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    3. Test if a user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-500             --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    4. Test if other user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-1203             --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n\n   5. Test if other user from a trusted domain specified by its shortname matches\n       any rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Otheruser' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4990478087492997847,
            "content_hash": 4990478087492997847,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4488,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 769,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727956/?format=api",
            "priority": 100,
            "id": 4706081,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=c541bd61406412d7",
            "url": "https://translate.fedoraproject.org/api/units/4706081/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.085884Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for servers with these managed suffixes."
            ],
            "previous_source": "Search for services with these managed by hosts.",
            "target": [
                "Búsqueda de servicios con aquellos gestionados por hosts."
            ],
            "id_hash": 1063991174164605247,
            "content_hash": 1063991174164605247,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4489,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731692/?format=api",
            "priority": 100,
            "id": 4706083,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=8ec40e55ec3b693f",
            "url": "https://translate.fedoraproject.org/api/units/4706083/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.108122Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Search for servers without these managed suffixes."
            ],
            "previous_source": "Search for services without these managed by hosts.",
            "target": [
                "Búsqueda de servicios sin aquellos gestionados por hosts."
            ],
            "id_hash": -201358645996376654,
            "content_hash": -201358645996376654,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4490,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731694/?format=api",
            "priority": 100,
            "id": 4706084,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=7d34a160d8eeadb2",
            "url": "https://translate.fedoraproject.org/api/units/4706084/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.136756Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nTopology\n\nManagement of a replication topology at domain level 1.\n\nIPA server's data is stored in LDAP server in two suffixes:\n* domain suffix, e.g., 'dc=example,dc=com', contains all domain related data\n* ca suffix, 'o=ipaca', is present only on server with CA installed. It\n  contains data for Certificate Server component\n\nData stored on IPA servers is replicated to other IPA servers. The way it is\nreplicated is defined by replication agreements. Replication agreements needs\nto be set for both suffixes separately. On domain level 0 they are managed\nusing ipa-replica-manage and ipa-csreplica-manage tools. With domain level 1\nthey are managed centrally using `ipa topology*` commands.\n\nAgreements are represented by topology segments. By default topology segment\nrepresents 2 replication agreements - one for each direction, e.g., A to B and\nB to A. Creation of unidirectional segments is not allowed.\n\nTo verify that no server is disconnected in the topology of the given suffix,\nuse:\n  ipa topologysuffix-verify $suffix\n\n\nExamples:\n  Find all IPA servers:\n    ipa server-find\n\n  Find all suffixes:\n    ipa topologysuffix-find\n\n  Add topology segment to 'domain' suffix:\n    ipa topologysegment-add domain --left IPA_SERVER_A --right IPA_SERVER_B\n\n  Add topology segment to 'ca' suffix:\n    ipa topologysegment-add ca --left IPA_SERVER_A --right IPA_SERVER_B\n\n  List all topology segments in 'domain' suffix:\n    ipa topologysegment-find domain\n\n  List all topology segments in 'ca' suffix:\n    ipa topologysegment-find ca\n\n  Delete topology segment in 'domain' suffix:\n    ipa topologysegment-del domain segment_name\n\n  Delete topology segment in 'ca' suffix:\n    ipa topologysegment-del ca segment_name\n\n  Verify topology of 'domain' suffix:\n    ipa topologysuffix-verify domain\n\n  Verify topology of 'ca' suffix:\n    ipa topologysuffix-verify ca\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 1909699744103143581,
            "content_hash": 1909699744103143581,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4491,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 251,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727986/?format=api",
            "priority": 100,
            "id": 4706086,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=9a809dcc9aec189d",
            "url": "https://translate.fedoraproject.org/api/units/4706086/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.170181Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nDirectory Server Access Control Instructions (ACIs)\n\nACIs are used to allow or deny access to information. This module is\ncurrently designed to allow, not deny, access.\n\nThe aci commands are designed to grant permissions that allow updating\nexisting entries or adding or deleting new ones. The goal of the ACIs\nthat ship with IPA is to provide a set of low-level permissions that\ngrant access to special groups called taskgroups. These low-level\npermissions can be combined into roles that grant broader access. These\nroles are another type of group, roles.\n\nFor example, if you have taskgroups that allow adding and modifying users you\ncould create a role, useradmin. You would assign users to the useradmin\nrole to allow them to do the operations defined by the taskgroups.\n\nYou can create ACIs that delegate permission so users in group A can write\nattributes on group B.\n\nThe type option is a map that applies to all entries in the users, groups or\nhost location. It is primarily designed to be used when granting add\npermissions (to write new entries).\n\nAn ACI consists of three parts:\n1. target\n2. permissions\n3. bind rules\n\nThe target is a set of rules that define which LDAP objects are being\ntargeted. This can include a list of attributes, an area of that LDAP\ntree or an LDAP filter.\n\nThe targets include:\n- attrs: list of attributes affected\n- type: an object type (user, group, host, service, etc)\n- memberof: members of a group\n- targetgroup: grant access to modify a specific group. This is primarily\n  designed to enable users to add or remove members of a specific group.\n- filter: A legal LDAP filter used to narrow the scope of the target.\n- subtree: Used to apply a rule across an entire set of objects. For example,\n  to allow adding users you need to grant \"add\" permission to the subtree\n  ldap://uid=*,cn=users,cn=accounts,dc=example,dc=com. The subtree option\n  is a fail-safe for objects that may not be covered by the type option.\n\nThe permissions define what the ACI is allowed to do, and are one or\nmore of:\n1. write - write one or more attributes\n2. read - read one or more attributes\n3. add - add a new entry to the tree\n4. delete - delete an existing entry\n5. all - all permissions are granted\n\nNote the distinction between attributes and entries. The permissions are\nindependent, so being able to add a user does not mean that the user will\nbe editable.\n\nThe bind rule defines who this ACI grants permissions to. The LDAP server\nallows this to be any valid LDAP entry but we encourage the use of\ntaskgroups so that the rights can be easily shared through roles.\n\nFor a more thorough description of access controls see\nhttp://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_Access_Control.html\n\nEXAMPLES:\n\nNOTE: ACIs are now added via the permission plugin. These examples are to\ndemonstrate how the various options work but this is done via the permission\ncommand-line now (see last example).\n\n Add an ACI so that the group \"secretaries\" can update the address on any user:\n   ipa group-add --desc=\"Office secretaries\" secretaries\n   ipa aci-add --attrs=streetAddress --memberof=ipausers --group=secretaries --permissions=write --prefix=none \"Secretaries write addresses\"\n\n Show the new ACI:\n   ipa aci-show --prefix=none \"Secretaries write addresses\"\n\n Add an ACI that allows members of the \"addusers\" permission to add new users:\n   ipa aci-add --type=user --permission=addusers --permissions=add --prefix=none \"Add new users\"\n\n Add an ACI that allows members of the editors manage members of the admins group:\n   ipa aci-add --permissions=write --attrs=member --targetgroup=admins --group=editors --prefix=none \"Editors manage admins\"\n\n Add an ACI that allows members of the admins group to manage the street and zip code of those in the editors group:\n   ipa aci-add --permissions=write --memberof=editors --group=admins --attrs=street,postalcode --prefix=none \"admins edit the address of editors\"\n\n Add an ACI that allows the admins group manage the street and zipcode of those who work for the boss:\n   ipa aci-add --permissions=write --group=admins --attrs=street,postalcode --filter=\"(manager=uid=boss,cn=users,cn=accounts,dc=example,dc=com)\" --prefix=none \"Edit the address of those who work for the boss\"\n\n Add an entirely new kind of record to IPA that isn't covered by any of the --type options, creating a permission:\n   ipa permission-add  --permissions=add --subtree=\"cn=*,cn=orange,cn=accounts,dc=example,dc=com\" --desc=\"Add Orange Entries\" add_orange\n\n\nThe show command shows the raw 389-ds ACI.\n\nIMPORTANT: When modifying the target attributes of an existing ACI you\nmust include all existing attributes as well. When doing an aci-mod the\ntargetattr REPLACES the current attributes, it does not add to them.\n"
            ],
            "previous_source": "\nDirectory Server Access Control Instructions (ACIs)\n\nACIs are used to allow or deny access to information. This module is\ncurrently designed to allow, not deny, access.\n\nThe aci commands are designed to grant permissions that allow updating\nexisting entries or adding or deleting new ones. The goal of the ACIs\nthat ship with IPA is to provide a set of low-level permissions that\ngrant access to special groups called taskgroups. These low-level\npermissions can be combined into roles that grant broader access. These\nroles are another type of group, roles.\n\nFor example, if you have taskgroups that allow adding and modifying users you\ncould create a role, useradmin. You would assign users to the useradmin\nrole to allow them to do the operations defined by the taskgroups.\n\nYou can create ACIs that delegate permission so users in group A can write\nattributes on group B.\n\nThe type option is a map that applies to all entries in the users, groups or\nhost location. It is primarily designed to be used when granting add\npermissions (to write new entries).\n\nAn ACI consists of three parts:\n1. target\n2. permissions\n3. bind rules\n\nThe target is a set of rules that define which LDAP objects are being\ntargeted. This can include a list of attributes, an area of that LDAP\ntree or an LDAP filter.\n\nThe targets include:\n- attrs: list of attributes affected\n- type: an object type (user, group, host, service, etc)\n- memberof: members of a group\n- targetgroup: grant access to modify a specific group. This is primarily\n  designed to enable users to add or remove members of a specific group.\n- filter: A legal LDAP filter used to narrow the scope of the target.\n- subtree: Used to apply a rule across an entire set of objects. For example,\n  to allow adding users you need to grant \"add\" permission to the subtree\n  ldap://uid=*,cn=users,cn=accounts,dc=example,dc=com. The subtree option\n  is a fail-safe for objects that may not be covered by the type option.\n\nThe permissions define what the ACI is allowed to do, and are one or\nmore of:\n1. write - write one or more attributes\n2. read - read one or more attributes\n3. add - add a new entry to the tree\n4. delete - delete an existing entry\n5. all - all permissions are granted\n\nNote the distinction between attributes and entries. The permissions are\nindependent, so being able to add a user does not mean that the user will\nbe editable.\n\nThe bind rule defines who this ACI grants permissions to. The LDAP server\nallows this to be any valid LDAP entry but we encourage the use of\ntaskgroups so that the rights can be easily shared through roles.\n\nFor a more thorough description of access controls see\nhttp://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_Access_Control.html\n\nEXAMPLES:\n\nNOTE: ACIs are now added via the permission plugin. These examples are to\ndemonstrate how the various options work but this is done via the permission\ncommand-line now (see last example).\n\n Add an ACI so that the group \"secretaries\" can update the address on any user:\n   ipa group-add --desc=\"Office secretaries\" secretaries\n   ipa aci-add --attrs=streetAddress --memberof=ipausers --group=secretaries --permissions=write --prefix=none \"Secretaries write addresses\"\n\n Show the new ACI:\n   ipa aci-show --prefix=none \"Secretaries write addresses\"\n\n Add an ACI that allows members of the \"addusers\" permission to add new users:\n   ipa aci-add --type=user --permission=addusers --permissions=add --prefix=none \"Add new users\"\n\n Add an ACI that allows members of the editors manage members of the admins group:\n   ipa aci-add --permissions=write --attrs=member --targetgroup=admins --group=editors --prefix=none \"Editors manage admins\"\n\n Add an ACI that allows members of the admins group to manage the street and zip code of those in the editors group:\n   ipa aci-add --permissions=write --memberof=editors --group=admins --attrs=street --attrs=postalcode --prefix=none \"admins edit the address of editors\"\n\n Add an ACI that allows the admins group manage the street and zipcode of those who work for the boss:\n   ipa aci-add --permissions=write --group=admins --attrs=street --attrs=postalcode --filter=\"(manager=uid=boss,cn=users,cn=accounts,dc=example,dc=com)\" --prefix=none \"Edit the address of those who work for the boss\"\n\n Add an entirely new kind of record to IPA that isn't covered by any of the --type options, creating a permission:\n   ipa permission-add  --permissions=add --subtree=\"cn=*,cn=orange,cn=accounts,dc=example,dc=com\" --desc=\"Add Orange Entries\" add_orange\n\n\nThe show command shows the raw 389-ds ACI.\n\nIMPORTANT: When modifying the target attributes of an existing ACI you\nmust include all existing attributes as well. When doing an aci-mod the\ntargetattr REPLACES the current attributes, it does not add to them.\n",
            "target": [
                "\nInstrucciones de Control de Acceso al Servidor de Directorio (ACIs)\n\nACIs son usados para permitir o denegar acceso a la información. Este módulo está\n actualmente diseñado para permitir, no denegar, acceso.\n\nLos comandos aci están diseñados para conceder permisos que permitan la\nactualización de entradas existentes o el añadido o borrado de nuevas. El objetivo\nde los ACIs que van con IPA es suministrar un conjunto de permisos de bajo nivel\nque conceden acceso a grupos espaciales llamados grupos de tareas. Estos\npermisos de bajo nivel pueden ser combinados en roles que conceden un acceso\nmás amplio. Estos roles son otro tipo de grupo, roles.\n\nPor ejemplo, si usted tiene un grupo de tareas que le permiten añadir y modificar\nusuarios usted podría crear un role, useradmin. Debería asignar usuarios al role\nuseradmin que les permitirá hacer operaciones definidas en el grupo de tareas.\n\nUsted puede crear ACIs que deleguen permisos así usuarios del grupo A pueden\nescribir atributos en el grupo B.\n\nLa opción type es un mapa que aplica a todas las entradas en la localización de\nusuarios, grupos o host. Está diseñada principalmente para ser usada cuando se\notorgan permisos de añadir (para escribir nuevas entradas).\n\nUn ACI consta de tres partes:\n1. objetivo\n2. permisos\n3. reglas de enlace\n\nEl objetivo es un conjunto de reglas que definen que objetos LDAP son objetivos.\nEsto puede incluir una lista de atributos, un área del árbol LDAP o un filtro LDAP.\n\nLos objetivos incluyen:\n- attrs: lista de atributos afectados\n- type: un tipo de objeto (usuario, grupo, host, servicio, etc)\n- memberof: miembros de un grupo\n- targetgroup: concede acceso para modificar un grupo específico. Está diseñado\n  principalmente para habilitar a los usuarios para añadir o borrar miembros de un\n  grupo específico.\n- filter: Un filtro LDAP legal usado para reducir el alcance del objetivo.\n- subtree: Usado para aplicar una regla a lo largo de un conjunto de objetos. Por\n  ejemplo, para añadir usuarios usted necesita conceder permisos \"add\" al subtree\n  ldap://uid=*,cn=users,cn=accounts,dc=example,dc=com. La opción subtree es a\n  prueba de fallos para objetos que pueden no estar cubiertos por la opción type.\n\nLos permisos definidos que ACI tiene permitidos hacer son uno o más de:\n1. write - escribir uno o mas atributos\n2. read - leer uno o más atributos\n3. add - añadir una nueva entrada al árbol\n4. delete - borrar una entrada existente\n5. all - se conceden todos los permisos\n\nAdvierta la diferencia entre atributos y entradas. Los permisos son independientes,\nde esta manera ser capaz de añadir un usuario no significa que el usuario será\neditable.\n\nLa regla bind define a quien concede ACI estos permisos. El servidor LDAP permite\nesto para cualquier entrada LDAP válida pero recomendamos el uso de grupos de\ntareas de modo que los derechos puedan ser fácilmente compartidos entre los\nroles.\n\nPara una descripción más completa de los controles de acceso vea\nhttp://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_Access_Control.html\n\nEJEMPLOS:\n\nAVISO: Los ACIs se añaden ahora por medio del plugin permisos. Estos ejemplos\nson para demostrar como trabajan diversas opciones pero esto está hecho por\nmedio de los permisos de linea de comandos ahora (vea último ejemplo).\n\n Añadir un ACI de modo que el grupo \"secretaries\" pueda actualizar la dirección de cualquier usuario:\n   ipa group-add --desc=\"Office secretaries\" secretaries\n   ipa aci-add --attrs=streetAddress --memberof=ipausers --group=secretaries --permissions=write --prefix=none \"Secretaries write addresses\"\n\n Mostrar el nuevo ACI:\n   ipa aci-show --prefix=none \"Secretaries write addresses\"\n\n Añadir un ACI que permita a los  miembros del permiso \"addusers\" añadir nuevos usuarios:\n   ipa aci-add --type=user --permission=addusers --permissions=add --prefix=none \"Add new users\"\n\n Añadir un ACI que permita a los miembros de los editores manejar miembros del grupo admins:\n   ipa aci-add --permissions=write --attrs=member --targetgroup=admins --group=editors --prefix=none \"Editors manage admins\"\n\n Añadir un ACI que permita a los miembros del grupo admins manejar la calle y el código postal de los que estén en el grupo editors:\n   ipa aci-add --permissions=write --memberof=editors --group=admins --attrs=street --attrs=postalcode --prefix=none \"admins edit the address of editors\"\n\n Añadir un ACI que permita a los miembros del grupo admins manejar la calle y el código postal de aquellos que trabajan para el jefe:\n   ipa aci-add --permissions=write --group=admins --attrs=street --attrs=postalcode --filter=\"(manager=uid=boss,cn=users,cn=accounts,dc=example,dc=com)\" --prefix=none \"Edit the address of those who work for the boss\"\n\n Añadir un clase de registro totalmente nueva para IPA que no esté cubierta por ninguna de las opciones –type, creando un permiso:\n   ipa permission-add  --permissions=add --subtree=\"cn=*,cn=orange,cn=accounts,dc=example,dc=com\" --desc=\"Add Orange Entries\" add_orange\n\n\nEl comando show muestra el ACI 389-ds en bruto.\n\nIMPORTANTE: Cuando modifique los atributos target de un ACI existente debe\nincluir todos los atributos existentes también. Cuando haga un aci-mod targetattr\nREEMPLAZA los atributos actuales, no los añade.\n"
            ],
            "id_hash": -4448344688745965227,
            "content_hash": -4448344688745965227,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4492,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 728,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727807/?format=api",
            "priority": 100,
            "id": 4706088,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=42444e12eccd1955",
            "url": "https://translate.fedoraproject.org/api/units/4706088/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.195732Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "comma-separated list of permissions to grant(read, write, add, delete, all)"
            ],
            "previous_source": "Comma-separated list of permissions to grant (read, write, add, delete, all)",
            "target": [
                "Lista separada por comas de permisos a obtener (lectura, escritura, borrado, todos)"
            ],
            "id_hash": 7515347074530814609,
            "content_hash": 7515347074530814609,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4493,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 10,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732461/?format=api",
            "priority": 100,
            "id": 4706090,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=e84be058a52e2a91",
            "url": "https://translate.fedoraproject.org/api/units/4706090/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.232881Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nAuto Membership Rule.\n\nBring clarity to the membership of hosts and users by configuring inclusive\nor exclusive regex patterns, you can automatically assign a new entries into\na group or hostgroup based upon attribute information.\n\nA rule is directly associated with a group by name, so you cannot create\na rule without an accompanying group or hostgroup.\n\nA condition is a regular expression used by 389-ds to match a new incoming\nentry with an automember rule. If it matches an inclusive rule then the\nentry is added to the appropriate group or hostgroup.\n\nA default group or hostgroup could be specified for entries that do not\nmatch any rule. In case of user entries this group will be a fallback group\nbecause all users are by default members of group specified in IPA config.\n\n\nEXAMPLES:\n\n Add the initial group or hostgroup:\n   ipa hostgroup-add --desc=\"Web Servers\" webservers\n   ipa group-add --desc=\"Developers\" devel\n\n Add the initial rule:\n   ipa automember-add --type=hostgroup webservers\n   ipa automember-add --type=group devel\n\n Add a condition to the rule:\n   ipa automember-add-condition --key=fqdn --type=hostgroup --inclusive-regex=^web[1-9]+\\.example\\.com webservers\n   ipa automember-add-condition --key=manager --type=group --inclusive-regex=^uid=mscott devel\n\n Add an exclusive condition to the rule to prevent auto assignment:\n   ipa automember-add-condition --key=fqdn --type=hostgroup --exclusive-regex=^web5\\.example\\.com webservers\n\n Add a host:\n    ipa host-add web1.example.com\n\n Add a user:\n    ipa user-add --first=Tim --last=User --password tuser1 --manager=mscott\n\n Verify automembership:\n    ipa hostgroup-show webservers\n      Host-group: webservers\n      Description: Web Servers\n      Member hosts: web1.example.com\n\n    ipa group-show devel\n      Group name: devel\n      Description: Developers\n      GID: 1004200000\n      Member users: tuser\n\n Remove a condition from the rule:\n   ipa automember-remove-condition --key=fqdn --type=hostgroup --inclusive-regex=^web[1-9]+\\.example\\.com webservers\n\n Modify the automember rule:\n    ipa automember-mod\n\n Set the default (fallback) target group:\n    ipa automember-default-group-set --default-group=webservers --type=hostgroup\n    ipa automember-default-group-set --default-group=ipausers --type=group\n\n Remove the default (fallback) target group:\n    ipa automember-default-group-remove --type=hostgroup\n    ipa automember-default-group-remove --type=group\n\n Show the default (fallback) target group:\n    ipa automember-default-group-show --type=hostgroup\n    ipa automember-default-group-show --type=group\n\n Find all of the automember rules:\n    ipa automember-find\n\n Display a automember rule:\n    ipa automember-show --type=hostgroup webservers\n    ipa automember-show --type=group devel\n\n Delete an automember rule:\n    ipa automember-del --type=hostgroup webservers\n    ipa automember-del --type=group devel\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -3296921653643209388,
            "content_hash": -3296921653643209388,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4495,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 327,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727783/?format=api",
            "priority": 100,
            "id": 4706092,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=523efb394e4d9554",
            "url": "https://translate.fedoraproject.org/api/units/4706092/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.273098Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nIPA certificate operations\n\nImplements a set of commands for managing server SSL certificates.\n\nCertificate requests exist in the form of a Certificate Signing Request (CSR)\nin PEM format.\n\nIf using the selfsign back end then the subject in the CSR needs to match\nthe subject configured in the server. The dogtag CA uses just the CN\nvalue of the CSR and forces the rest of the subject.\n\nA certificate is stored with a service principal and a service principal\nneeds a host.\n\nIn order to request a certificate:\n\n* The host must exist\n* The service must exist (or you use the --add option to automatically add it)\n\nEXAMPLES:\n\n Request a new certificate and add the principal:\n   ipa cert-request --add --principal=HTTP/lion.example.com example.csr\n\n Retrieve an existing certificate:\n   ipa cert-show 1032\n\n Revoke a certificate (see RFC 5280 for reason details):\n   ipa cert-revoke --revocation-reason=6 1032\n\n Remove a certificate from revocation hold status:\n   ipa cert-remove-hold 1032\n\n Check the status of a signing request:\n   ipa cert-status 10\n\nIPA currently immediately issues (or declines) all certificate requests so\nthe status of a request is not normally useful. This is for future use\nor the case where a CA does not immediately issue a certificate.\n\nThe following revocation reasons are supported:\n\n    * 0 - unspecified\n    * 1 - keyCompromise\n    * 2 - cACompromise\n    * 3 - affiliationChanged\n    * 4 - superseded\n    * 5 - cessationOfOperation\n    * 6 - certificateHold\n    * 8 - removeFromCRL\n    * 9 - privilegeWithdrawn\n    * 10 - aACompromise\n\nNote that reason code 7 is not used.  See RFC 5280 for more details:\n\nhttp://www.ietf.org/rfc/rfc5280.txt\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7167776203398983793,
            "content_hash": 7167776203398983793,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4496,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 259,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727852/?format=api",
            "priority": 100,
            "id": 4706093,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=e3790e7b01183071",
            "url": "https://translate.fedoraproject.org/api/units/4706093/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.303305Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nGroup to Group Delegation\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nGroup to Group Delegations grants the members of one group to update a set\nof attributes of members of another group.\n\nEXAMPLES:\n\n Add a delegation rule to allow managers to edit employee's addresses:\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones. Add postalCode to the list:\n   ipa delegation-mod --attrs=street,postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Display our updated rule:\n   ipa delegation-show \"managers edit employees' street\"\n\n Delete a rule:\n   ipa delegation-del \"managers edit employees' street\"\n"
            ],
            "previous_source": "\nGroup to Group Delegation\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nGroup to Group Delegations grants the members of one group to update a set\nof attributes of members of another group.\n\nEXAMPLES:\n\n Add a delegation rule to allow managers to edit employee's addresses:\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones. Add postalCode to the list:\n   ipa delegation-mod --attrs=street --attrs=postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Display our updated rule:\n   ipa delegation-show \"managers edit employees' street\"\n\n Delete a rule:\n   ipa delegation-del \"managers edit employees' street\"\n",
            "target": [
                "\nGrupo a Delegación de Grupo\n\nUn permiso habilita una delegación de grano fino de permisos. Reglas de Control\nde Acceso o instrucciones (ACIs), otorgan permisos a los permisos para llevar a\ncabo tareas dadas como añadir un usuario, modificar un grupo, etc.\n\nGrupo a Delegaciones de Grupo concede a los miembros de un grupo para\nactualizar un conjunto de atributos de miembros de otro grupo.\n\nEJEMPLOS:\n\nAñadir una regla de delegación para permitir a los gestores editar las direcciones de los empleados:\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Cuando gestiona una lista de atributos usted necesita incluir todos los atributos en \n la lista, incluyendo los existentes. Añadir postalCode a la lista:\n   ipa delegation-mod --attrs=street --attrs=postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Mostrar nuestra regla actualizada:\n   ipa delegation-show \"managers edit employees' street\"\n\n Borrar una regla:\n   ipa delegation-del \"managers edit employees' street\"\n"
            ],
            "id_hash": 3718650907369577619,
            "content_hash": 3718650907369577619,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4497,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 127,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727822/?format=api",
            "priority": 100,
            "id": 4706095,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=b39b4d4c49729c93",
            "url": "https://translate.fedoraproject.org/api/units/4706095/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.331391Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of permissions to grant (read, write). Default is write."
            ],
            "previous_source": "Comma-separated list of permissions to grant (read, write, add, delete, all)",
            "target": [
                "Lista separada por comas de permisos a obtener (lectura, escritura, borrado, todos)"
            ],
            "id_hash": -3391317693462143744,
            "content_hash": -3391317693462143744,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4498,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 11,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729030/?format=api",
            "priority": 100,
            "id": 4706096,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=50ef9e8698b11d00",
            "url": "https://translate.fedoraproject.org/api/units/4706096/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.364561Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "\nDomain Name System (DNS)\n\nManage DNS zone and resource records.\n\n\nUSING STRUCTURED PER-TYPE OPTIONS\n\nThere are many structured DNS RR types where DNS data stored in LDAP server\nis not just a scalar value, for example an IP address or a domain name, but\na data structure which may be often complex. A good example is a LOC record\n[RFC1876] which consists of many mandatory and optional parts (degrees,\nminutes, seconds of latitude and longitude, altitude or precision).\n\nIt may be difficult to manipulate such DNS records without making a mistake\nand entering an invalid value. DNS module provides an abstraction over these\nraw records and allows to manipulate each RR type with specific options. For\neach supported RR type, DNS module provides a standard option to manipulate\na raw records with format --<rrtype>-rec, e.g. --mx-rec, and special options\nfor every part of the RR structure with format --<rrtype>-<partname>, e.g.\n--mx-preference and --mx-exchanger.\n\nWhen adding a record, either RR specific options or standard option for a raw\nvalue can be used, they just should not be combined in one add operation. When\nmodifying an existing entry, new RR specific options can be used to change\none part of a DNS record, where the standard option for raw value is used\nto specify the modified value. The following example demonstrates\na modification of MX record preference from 0 to 1 in a record without\nmodifying the exchanger:\nipa dnsrecord-mod --mx-rec=\"0 mx.example.com.\" --mx-preference=1\n\n\nEXAMPLES:\n\n Add new zone:\n   ipa dnszone-add example.com --name-server=ns                                --admin-email=admin@example.com                                --ip-address=10.0.0.1\n\n Add system permission that can be used for per-zone privilege delegation:\n   ipa dnszone-add-permission example.com\n\n Modify the zone to allow dynamic updates for hosts own records in realm EXAMPLE.COM:\n   ipa dnszone-mod example.com --dynamic-update=TRUE\n\n   This is the equivalent of:\n     ipa dnszone-mod example.com --dynamic-update=TRUE       --update-policy=\"grant EXAMPLE.COM krb5-self * A; grant EXAMPLE.COM krb5-self * AAAA; grant EXAMPLE.COM krb5-self * SSHFP;\"\n\n Modify the zone to allow zone transfers for local network only:\n   ipa dnszone-mod example.com --allow-transfer=10.0.0.0/8\n\n Add new reverse zone specified by network IP address:\n   ipa dnszone-add --name-from-ip=80.142.15.0/24                    --name-server=ns.example.com.\n\n Add second nameserver for example.com:\n   ipa dnsrecord-add example.com @ --ns-rec=nameserver2.example.com\n\n Add a mail server for example.com:\n   ipa dnsrecord-add example.com @ --mx-rec=\"10 mail1\"\n\n Add another record using MX record specific options:\n  ipa dnsrecord-add example.com @ --mx-preference=20 --mx-exchanger=mail2\n\n Add another record using interactive mode (started when dnsrecord-add, dnsrecord-mod,\n or dnsrecord-del are executed with no options):\n  ipa dnsrecord-add example.com @\n  Please choose a type of DNS resource record to be added\n  The most common types for this type of zone are: NS, MX, LOC\n\n  DNS resource record type: MX\n  MX Preference: 30\n  MX Exchanger: mail3\n    Record name: example.com\n    MX record: 10 mail1, 20 mail2, 30 mail3\n    NS record: nameserver.example.com., nameserver2.example.com.\n\n Delete previously added nameserver from example.com:\n   ipa dnsrecord-del example.com @ --ns-rec=nameserver2.example.com.\n\n Add LOC record for example.com:\n   ipa dnsrecord-add example.com @ --loc-rec=\"49 11 42.4 N 16 36 29.6 E 227.64m\"\n\n Add new A record for www.example.com. Create a reverse record in appropriate\n reverse zone as well. In this case a PTR record \"2\" pointing to www.example.com\n will be created in zone 15.142.80.in-addr.arpa.\n   ipa dnsrecord-add example.com www --a-rec=80.142.15.2 --a-create-reverse\n\n Add new PTR record for www.example.com\n   ipa dnsrecord-add 15.142.80.in-addr.arpa. 2 --ptr-rec=www.example.com.\n\n Add new SRV records for LDAP servers. Three quarters of the requests\n should go to fast.example.com, one quarter to slow.example.com. If neither\n is available, switch to backup.example.com.\n   ipa dnsrecord-add example.com _ldap._tcp --srv-rec=\"0 3 389 fast.example.com\"\n   ipa dnsrecord-add example.com _ldap._tcp --srv-rec=\"0 1 389 slow.example.com\"\n   ipa dnsrecord-add example.com _ldap._tcp --srv-rec=\"1 1 389 backup.example.com\"\n\n The interactive mode can be used for easy modification:\n  ipa dnsrecord-mod example.com _ldap._tcp\n  No option to modify specific record provided.\n  Current DNS record contents:\n\n  SRV record: 0 3 389 fast.example.com, 0 1 389 slow.example.com, 1 1 389 backup.example.com\n\n  Modify SRV record '0 3 389 fast.example.com'? Yes/No (default No):\n  Modify SRV record '0 1 389 slow.example.com'? Yes/No (default No): y\n  SRV Priority [0]:                     (keep the default value)\n  SRV Weight [1]: 2                     (modified value)\n  SRV Port [389]:                       (keep the default value)\n  SRV Target [slow.example.com]:        (keep the default value)\n  1 SRV record skipped. Only one value per DNS record type can be modified at one time.\n    Record name: _ldap._tcp\n    SRV record: 0 3 389 fast.example.com, 1 1 389 backup.example.com, 0 2 389 slow.example.com\n\n After this modification, three fifths of the requests should go to\n fast.example.com and two fifths to slow.example.com.\n\n An example of the interactive mode for dnsrecord-del command:\n   ipa dnsrecord-del example.com www\n   No option to delete specific record provided.\n   Delete all? Yes/No (default No):     (do not delete all records)\n   Current DNS record contents:\n\n   A record: 1.2.3.4, 11.22.33.44\n\n   Delete A record '1.2.3.4'? Yes/No (default No):\n   Delete A record '11.22.33.44'? Yes/No (default No): y\n     Record name: www\n     A record: 1.2.3.4                  (A record 11.22.33.44 has been deleted)\n\n Show zone example.com:\n   ipa dnszone-show example.com\n\n Find zone with \"example\" in its domain name:\n   ipa dnszone-find example\n\n Find records for resources with \"www\" in their name in zone example.com:\n   ipa dnsrecord-find example.com www\n\n Find A records with value 10.10.0.1 in zone example.com\n   ipa dnsrecord-find example.com --a-rec=10.10.0.1\n\n Show records for resource www in zone example.com\n   ipa dnsrecord-show example.com www\n\n Delegate zone sub.example to another nameserver:\n   ipa dnsrecord-add example.com ns.sub --a-rec=10.0.100.5\n   ipa dnsrecord-add example.com sub --ns-rec=ns.sub.example.com.\n\n If global forwarder is configured, all requests to sub.example.com will be\n routed through the global forwarder. To change the behavior for example.com\n zone only and forward the request directly to ns.sub.example.com., global\n forwarding may be disabled per-zone:\n   ipa dnszone-mod example.com --forward-policy=none\n\n Forward all requests for the zone external.com to another nameserver using\n a \"first\" policy (it will send the queries to the selected forwarder and if\n not answered it will use global resolvers):\n   ipa dnszone-add external.com\n   ipa dnszone-mod external.com --forwarder=10.20.0.1                                 --forward-policy=first\n\n Delete zone example.com with all resource records:\n   ipa dnszone-del example.com\n\n Resolve a host name to see if it exists (will add default IPA domain\n if one is not included):\n   ipa dns-resolve www.example.com\n   ipa dns-resolve www\n\n\nGLOBAL DNS CONFIGURATION\n\nDNS configuration passed to command line install script is stored in a local\nconfiguration file on each IPA server where DNS service is configured. These\nlocal settings can be overridden with a common configuration stored in LDAP\nserver:\n\n Show global DNS configuration:\n   ipa dnsconfig-show\n\n Modify global DNS configuration and set a list of global forwarders:\n   ipa dnsconfig-mod --forwarder=10.0.0.1\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4853321902092799017,
            "content_hash": -4853321902092799017,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4499,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 1024,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727810/?format=api",
            "priority": 100,
            "id": 4706098,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=3ca58971ad22b3d7",
            "url": "https://translate.fedoraproject.org/api/units/4706098/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.419854Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "A list of global forwarders. A custom port can be specified for each forwarder using a standard format \"IP_ADDRESS port PORT\""
            ],
            "previous_source": "Global forwarders. A custom port can be specified for each forwarder using a standard format \"IP_ADDRESS port PORT\"",
            "target": [
                "Promotores globales. Se puede especificar un pueeto personalizado por cada promotor usando el formato estándar \"IP_ADDRESS port PORT\""
            ],
            "id_hash": -5741858570212410585,
            "content_hash": -5741858570212410585,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4500,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 21,
            "source_unit": "https://translate.fedoraproject.org/api/units/2728227/?format=api",
            "priority": 100,
            "id": 4706099,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=3050d20d53f4fb27",
            "url": "https://translate.fedoraproject.org/api/units/4706099/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.447189Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw A records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -1968092244340825243,
            "content_hash": -1968092244340825243,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4502,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729033/?format=api",
            "priority": 100,
            "id": 4706101,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=64afee87fadd2365",
            "url": "https://translate.fedoraproject.org/api/units/4706101/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.501984Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw AAAA records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -4458644540041250274,
            "content_hash": -4458644540041250274,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4503,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729037/?format=api",
            "priority": 100,
            "id": 4706102,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=421fb669eb1b3a1e",
            "url": "https://translate.fedoraproject.org/api/units/4706102/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.533502Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw A6 records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -780166917978989282,
            "content_hash": -780166917978989282,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4504,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729035/?format=api",
            "priority": 100,
            "id": 4706104,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=752c4a525459dd1e",
            "url": "https://translate.fedoraproject.org/api/units/4706104/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.564772Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw AFSDB records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -1947450189618196140,
            "content_hash": -1947450189618196140,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4505,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729039/?format=api",
            "priority": 100,
            "id": 4706106,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=64f9445ede0a5154",
            "url": "https://translate.fedoraproject.org/api/units/4706106/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.593990Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw APL records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": 1039479468485877532,
            "content_hash": 1039479468485877532,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4506,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729041/?format=api",
            "priority": 100,
            "id": 4706107,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=8e6cf911b6699f1c",
            "url": "https://translate.fedoraproject.org/api/units/4706107/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.620026Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw CERT records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -1317744143053083989,
            "content_hash": -1317744143053083989,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4507,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729043/?format=api",
            "priority": 100,
            "id": 4706109,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=6db66eaf00782aab",
            "url": "https://translate.fedoraproject.org/api/units/4706109/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.646422Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw CNAME records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -6620469178553351599,
            "content_hash": -6620469178553351599,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4508,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729045/?format=api",
            "priority": 100,
            "id": 4706110,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=241f5e5bdde7c251",
            "url": "https://translate.fedoraproject.org/api/units/4706110/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.678336Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw DHCID records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -6469866065410344738,
            "content_hash": -6469866065410344738,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4509,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729047/?format=api",
            "priority": 100,
            "id": 4706112,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=26366b17a2dcb8de",
            "url": "https://translate.fedoraproject.org/api/units/4706112/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.711784Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw DLV records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": 1686987367399940469,
            "content_hash": 1686987367399940469,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4510,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729049/?format=api",
            "priority": 100,
            "id": 4706114,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=976962129671e175",
            "url": "https://translate.fedoraproject.org/api/units/4706114/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.740733Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw DNAME records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": 8091190427659465226,
            "content_hash": 8091190427659465226,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4511,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729051/?format=api",
            "priority": 100,
            "id": 4706115,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=f049aed332aef20a",
            "url": "https://translate.fedoraproject.org/api/units/4706115/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.764966Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw DNSKEY records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": 1790766854831143554,
            "content_hash": 1790766854831143554,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4512,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729053/?format=api",
            "priority": 100,
            "id": 4706117,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=98da14f771c0fa82",
            "url": "https://translate.fedoraproject.org/api/units/4706117/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.786171Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/es/?format=api",
            "source": [
                "Comma-separated list of raw DS records"
            ],
            "previous_source": "Comma-separated list of attributes",
            "target": [
                "Lista separada por comas de atributos"
            ],
            "id_hash": -2414758138654141148,
            "content_hash": -2414758138654141148,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 4513,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729055/?format=api",
            "priority": 100,
            "id": 4706118,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/es/?checksum=5e7d0e444f095524",
            "url": "https://translate.fedoraproject.org/api/units/4706118/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:18:19.807370Z"
        }
    ]
}