Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/freeipa/ipa-4-8/fr/units/?format=api&page=4
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 4657,
    "next": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/units/?format=api&page=5",
    "previous": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/units/?format=api&page=3",
    "results": [
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nA permission enables fine-grained delegation of rights. A permission is\na human-readable wrapper around a 389-ds Access Control Rule,\nor instruction (ACI).\nA permission grants the right to perform a specific task such as adding a\nuser, modifying a group, etc.\n"
            ],
            "previous_source": "",
            "target": [
                "\nUne permission permet une délégation de droits finement nuancée. Elle est\nune enveloppe lisible par le commun de Règles de contrôle d'accès 389-ds,\nou d'instruction (ACI).\nUne permission donne le droit d'effectuer des tâches données comme ajouter\nun utilisateur, modifier un groupe, etc.\n"
            ],
            "id_hash": -4428626923576023456,
            "content_hash": -4428626923576023456,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3887,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717660/?format=api",
            "priority": 100,
            "id": 2722301,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=428a5b46e1852660",
            "url": "https://translate.fedoraproject.org/api/units/2722301/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.120440Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nA permission is made up of a number of different parts:\n\n1. The name of the permission.\n2. The target of the permission.\n3. The rights granted by the permission.\n"
            ],
            "previous_source": "",
            "target": [
                "\nUne permission se compose de plusieurs parties :\n\n1. le nom de la permission.\n2. la cible de la permission.\n3. les droits garantis par la permission.\n"
            ],
            "id_hash": -626440204067552131,
            "content_hash": -626440204067552131,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3890,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717662/?format=api",
            "priority": 100,
            "id": 2722302,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=774e6ff41387c47d",
            "url": "https://translate.fedoraproject.org/api/units/2722302/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.133125Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nA permission may not contain other permissions.\n"
            ],
            "previous_source": "",
            "target": [
                "\nUne permission ne peut pas contenir d'autres permissions.\n"
            ],
            "id_hash": 2384079287654965299,
            "content_hash": 2384079287654965299,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3888,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717664/?format=api",
            "priority": 100,
            "id": 2722303,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=a115f37b110a6033",
            "url": "https://translate.fedoraproject.org/api/units/2722303/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.147271Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nA rule is directly associated with a group by name, so you cannot create\na rule without an accompanying group or hostgroup.\n"
            ],
            "previous_source": "",
            "target": [
                "\nUne règle est directement associée à un groupe par le nom, donc il n'est pas\npossible de créer une règle sans groupe ou groupe d'hôtes d'accompagnement.\n"
            ],
            "id_hash": -3892671858520933846,
            "content_hash": -3892671858520933846,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4442,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717666/?format=api",
            "priority": 100,
            "id": 2722304,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=49fa7391a5b33a2a",
            "url": "https://translate.fedoraproject.org/api/units/2722304/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.161913Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAPI Schema\n"
            ],
            "previous_source": "",
            "target": [
                "\nSchéma de l'API\n"
            ],
            "id_hash": -5376094878729963664,
            "content_hash": -5376094878729963664,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2653,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722305/?format=api",
            "priority": 100,
            "id": 2722306,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=356446310a80f770",
            "url": "https://translate.fedoraproject.org/api/units/2722306/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.197154Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-base\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n    WARNING:\n\n    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the\n    local domain. Currently the DNA plugin *cannot* be reconfigured itself based\n    on the local ranges set via this family of commands.\n\n    Manual configuration change has to be done in the DNA plugin configuration for\n    the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\n    modified to match the new range.\n    "
            ],
            "previous_source": "",
            "target": [
                "\nAjouter une nouvelle plage d'identifiants.\n\n  Pour ajouter une nouvelle plage d'identifiants vous devez toujours préciser\n\n    --base-id\n    --range-size\n\n  En outre,\n\n    --rid-base\n    --secondary-rid-base\n\n  seront indiqués pour une nouvelle plage d'ID dans le domaine local alors que\n\n    --rid-base\n    --dom-sid\n\n  doivent l'être pour ajouter une nouvelle plage pour un domaine AD de confiance.\n\n  AVERTISSEMENT :\n\n  Le greffon DNA dans 389-ds alloue des ID selon les plages configurées au\n  titre du domaine local. Actuellement le greffon DNA *ne peut pas* être\n  lui-même reconfiguré selon les plages locales définies par l'intermédiaire\n  de cette famille de commandes.\n\n  Un changement manuel de configuration doit être opéré dans la configuration\n  du greffon DNA pour cadrer avec la nouvelle plage locale. En particulier,\n  l'attribut « dnaNextRange » de « cn=Posix IDs »,^n« cn=Distributed Numeric Assignment Plugin », « cn=plugins », « cn=config »\n  doivent être modifiés pour correspondre à cette nouvelle plage.\n    "
            ],
            "id_hash": -7673449281923951434,
            "content_hash": -7673449281923951434,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1589,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 120,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722307/?format=api",
            "priority": 100,
            "id": 2722308,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=15826e88a4f254b6",
            "url": "https://translate.fedoraproject.org/api/units/2722308/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.226437Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAdd new trust to use.\n\nThis command establishes trust relationship to another domain\nwhich becomes 'trusted'. As result, users of the trusted domain\nmay access resources of this domain.\n\nOnly trusts to Active Directory domains are supported right now.\n\nThe command can be safely run multiple times against the same domain,\nthis will cause change to trust relationship credentials on both\nsides.\n    "
            ],
            "previous_source": "",
            "target": [
                "\nAjout d'une nouvelle relation de confiance.\n\nCette commande établit une relation de confiance avec un autre domaine\nqui ainsi devient « de confiance ». En conséquence, des utilisateurs du\ndomaine approuvé peuvent avoir accès aux ressources de ce domaine.\n\nActuellement, seules les relations d'approbation avec les domaines\nActive Directory sont prises en charge.\n\nCette commande peut être lancée plusieurs fois en toute sécurité à\nl'encontre du même domaine, elle modifiera les références de la relation de\nconfiance des deux côtés.\n    "
            ],
            "id_hash": -2424005769728544750,
            "content_hash": -2424005769728544750,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1553,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 62,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722309/?format=api",
            "priority": 100,
            "id": 2722310,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=5e5c339869d53012",
            "url": "https://translate.fedoraproject.org/api/units/2722310/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.260836Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAdditionally, there are the following convenience options.\nSetting one of these options will set the corresponding attribute(s).\n1. type: a type of object (user, group, etc); sets subtree and target filter.\n2. memberof: apply to members of a group; sets target filter\n3. targetgroup: grant access to modify a specific group (such as granting\n   the rights to manage group membership); sets target.\n"
            ],
            "previous_source": "",
            "target": [
                "\nEn plus, il y a les options de commodité suivantes.\nActiver une de ces options définit l'attribut correspondant.\n1. type: un type d'objet (utilisateur, groupe, etc) ; définit le filtre du\nsous-arbre et de la cible.\n2. memberof : s'applique aux membres d'un groupe ; définit le filtre de la\ncible.\n3. targetgroup : permet la modification d'un groupe donné (comme ceux\n   de gestion de l'appartenance à un groupe); définit la cible.\n"
            ],
            "id_hash": -5877139988910846963,
            "content_hash": -5877139988910846963,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3894,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 62,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717672/?format=api",
            "priority": 100,
            "id": 2722311,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=2e70345189b9cc0d",
            "url": "https://translate.fedoraproject.org/api/units/2722311/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.278599Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAgreements are represented by topology segments. By default topology segment\nrepresents 2 replication agreements - one for each direction, e.g., A to B and\nB to A. Creation of unidirectional segments is not allowed.\n"
            ],
            "previous_source": "",
            "target": [
                "\nLes agréments sont représentés par des segments de topologie. Un segment de topologie\nreprésente par défaut deux agréments de réplication, un pour chaque direction, par exemple\nde A vers B et de B vers A. La création de segments unidirectionnels n'est pas permise.\n"
            ],
            "id_hash": -173091649317867527,
            "content_hash": -173091649317867527,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4317,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 34,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722312/?format=api",
            "priority": 100,
            "id": 2722313,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=7d990e0fe0d26ff9",
            "url": "https://translate.fedoraproject.org/api/units/2722313/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.315778Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAn order can be added to a sudorule to control the order in which they\nare evaluated (if the client supports it). This order is an integer and\nmust be unique.\n"
            ],
            "previous_source": "",
            "target": [
                "\nIl est possible d'ajouter aux règles sudo l'indication de l'ordre dans\nlequel elles doivent être examinées (si le client le prend en charge).\nCet ordre est défini par un entier, qui doit être unique.\n"
            ],
            "id_hash": 6309916067900875672,
            "content_hash": 6309916067900875672,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2230,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 31,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722314/?format=api",
            "priority": 100,
            "id": 2722315,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=d791533b7dc2e398",
            "url": "https://translate.fedoraproject.org/api/units/2722315/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.349536Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAsymmetric vault is similar to the standard vault, but it\npre-encrypts the secret using a public key before transport.\nThe secret can only be retrieved using the private key.\n"
            ],
            "previous_source": "",
            "target": [
                "\nLe coffre-fort asymétrique  est similaire au coffre standard, mais il \npré-chiffre le secret à l'aide d'une clé publique avant son transport.\nLe secret ne peut être récupéré qu'avec la clé privée correspondante.\n"
            ],
            "id_hash": -7507100583963917882,
            "content_hash": -7507100583963917882,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2912,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 29,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717676/?format=api",
            "priority": 100,
            "id": 2722316,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=17d16bcb0fb401c6",
            "url": "https://translate.fedoraproject.org/api/units/2722316/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.360017Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAuto Membership Rule.\n"
            ],
            "previous_source": "",
            "target": [
                "\nRègle d'adhésion automatique.\n"
            ],
            "id_hash": -6153828739229626482,
            "content_hash": -6153828739229626482,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4440,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 3,
            "source_unit": "https://translate.fedoraproject.org/api/units/2714973/?format=api",
            "priority": 100,
            "id": 2722317,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=2a99355db5a0cf8e",
            "url": "https://translate.fedoraproject.org/api/units/2722317/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.371953Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAutomount\n\nStores automount(8) configuration for autofs(8) in IPA.\n\nThe base of an automount configuration is the configuration file auto.master.\nThis is also the base location in IPA. Multiple auto.master configurations\ncan be stored in separate locations. A location is implementation-specific\nwith the default being a location named 'default'. For example, you can have\nlocations by geographic region, by floor, by type, etc.\n\nAutomount has three basic object types: locations, maps and keys.\n\nA location defines a set of maps anchored in auto.master. This allows you\nto store multiple automount configurations. A location in itself isn't\nvery interesting, it is just a point to start a new automount map.\n\nA map is roughly equivalent to a discrete automount file and provides\nstorage for keys.\n\nA key is a mount point associated with a map.\n\nWhen a new location is created, two maps are automatically created for\nit: auto.master and auto.direct. auto.master is the root map for all\nautomount maps for the location. auto.direct is the default map for\ndirect mounts and is mounted on /-.\n\nAn automount map may contain a submount key. This key defines a mount\nlocation within the map that references another map. This can be done\neither using automountmap-add-indirect --parentmap or manually\nwith automountkey-add and setting info to \"-type=autofs :<mapname>\".\n\nEXAMPLES:\n\nLocations:\n\n  Create a named location, \"Baltimore\":\n    ipa automountlocation-add baltimore\n\n  Display the new location:\n    ipa automountlocation-show baltimore\n\n  Find available locations:\n    ipa automountlocation-find\n\n  Remove a named automount location:\n    ipa automountlocation-del baltimore\n\n  Show what the automount maps would look like if they were in the filesystem:\n    ipa automountlocation-tofiles baltimore\n\n  Import an existing configuration into a location:\n    ipa automountlocation-import baltimore /etc/auto.master\n\n    The import will fail if any duplicate entries are found. For\n    continuous operation where errors are ignored, use the --continue\n    option.\n\nMaps:\n\n  Create a new map, \"auto.share\":\n    ipa automountmap-add baltimore auto.share\n\n  Display the new map:\n    ipa automountmap-show baltimore auto.share\n\n  Find maps in the location baltimore:\n    ipa automountmap-find baltimore\n\n  Create an indirect map with auto.share as a submount:\n    ipa automountmap-add-indirect baltimore --parentmap=auto.share --mount=sub auto.man\n\n    This is equivalent to:\n\n    ipa automountmap-add-indirect baltimore --mount=/man auto.man\n    ipa automountkey-add baltimore auto.man --key=sub --info=\"-fstype=autofs ldap:auto.share\"\n\n  Remove the auto.share map:\n    ipa automountmap-del baltimore auto.share\n\nKeys:\n\n  Create a new key for the auto.share map in location baltimore. This ties\n  the map we previously created to auto.master:\n    ipa automountkey-add baltimore auto.master --key=/share --info=auto.share\n\n  Create a new key for our auto.share map, an NFS mount for man pages:\n    ipa automountkey-add baltimore auto.share --key=man --info=\"-ro,soft,rsize=8192,wsize=8192 ipa.example.com:/shared/man\"\n\n  Find all keys for the auto.share map:\n    ipa automountkey-find baltimore auto.share\n\n  Find all direct automount keys:\n    ipa automountkey-find baltimore --key=/-\n\n  Remove the man key from the auto.share map:\n    ipa automountkey-del baltimore auto.share --key=man\n"
            ],
            "previous_source": "",
            "target": [
                "\n« Automount »\n\nEnregistre la configuration de « automount(8) » pour « autofs(8) » dans IPA.\n\nLa base de configuration de « automount » est le fichier « auto.master ».\nC'est aussi la base dans IPA. On peut enregistrer plusieurs configurations\n« auto.master » à plusieurs endroits différents. Le lieu est propre à\nl'implémentation, par défaut il est nommé « default ». Par ex., vous pouvez\navoir des lieux par région géographique, par étage, par type, etc.\n\n« Automount » a 3 types d'objets de base : emplacements, cartes et clés.\n\nL'emplacement définit un jeu de cartes fixées dans « auto.master » et permet\nde stocker plusieurs configurations « automount ». Il n'a pas d'intérêt en\nsoi, il est juste le point de départ d'une autre carte « automount ».\n\nUne carte est, en gros, équivalente à un fichier séparé « automount » ;\nelle fournit un stockage pour les clés.\n\nUne clé est un point de montage associé à une carte.\n\nQuand un nouvel emplacement est créé, 2 cartes sont automatiquement créées\npour lui: « auto.master » et « auto.direct ». « auto.master » est la carte\nracine de toutes les cartes « automount » dudit lieu. « auto.direct » est\nla carte par défaut pour les montages directs et est monté sur /-.\n\nUne carte « automout » peut contenir une clé de sous-montage. Cette clé\ndéfinit un emplacement de montage dans la carte référençant une autre carte.\nCela peut se réaliser avec « automountmap-add-indirect --parentmap » ou à la\nmain avec « automountkey-add » en définissant « -type=autofs :<mapname> ».\n\nEXEMPLES:\n\nEmplacements :\n\n  Créer un nouvel emplacement nommé « Baltimore » :\n    ipa automountlocation-add baltimore\n\n  Afficher le nouvel emplacement :\n    ipa automountlocation-show baltimore\n\n  Trouver des emplacements disponibles :\n    ipa automountlocation-find\n\n  Supprimer un emplacement « automount » nommé :\n    ipa automountlocation-del baltimore\n\n  Afficher ce à quoi les cartes « automount » ressembleraient si elles/n  étaient dans le système de fichiers :\n    ipa automountlocation-tofiles baltimore\n\n  Importer une configuration existante à un emplacement :\n    ipa automountlocation-import baltimore /etc/auto.master\n\n    L'importation échoue s'il y a une entrée dupliquée. Pour une opération\n    en continu en ignorant les erreurs, utiliser l'option --continue.\n\nCartes :\n\n  Créer une nouvelle carte, « auto.share » :\n    ipa automountmap-add baltimore auto.share\n\n  Afficher la nouvelle carte :\n    ipa automountmap-show baltimore auto.share\n\n  Trouver les cartes de l'emplacement « baltimore » :\n    ipa automountmap-find baltimore\n\n  Créer une carte indirecte avec « auto.share » comme sous-montage :\n    ipa automountmap-add-indirect baltimore --parentmap=auto.share --mount=sub auto.man\n\n    Ce qui équivaut à :\n\n    ipa automountmap-add-indirect baltimore --mount=/man auto.man\n    ipa automountkey-add baltimore auto.man --key=sub --info=\"-fstype=autofs ldap:auto.share\"\n\n  Supprimer la carte « auto.share » :\n    ipa automountmap-del baltimore auto.share\n\nClés :\n\n  Créer une nouvelle clé pour la carte « auto.share » de l'emplacement\n  « baltimore ». Cela associe la carte précédemment créée à auto.master :\n    ipa automountkey-add baltimore auto.master --key=/share --info=auto.share\n\n  Créer une clé pour la carte « auto.share », monte NFS pour pages « man » :\n    ipa automountkey-add baltimore auto.share --key=man --info=\"-ro,soft,rsize=8192,wsize=8192 ipa.example.com:/shared/man\"\n\n  Trouver toutes les clés de la carte « auto.share » :\n    ipa automountkey-find baltimore auto.share\n\n  Trouver toutes les clés « automount » directes :\n    ipa automountkey-find baltimore --key=/-\n\n  Supprimer la clé « man » de la carte « auto.share » :\n    ipa automountkey-del baltimore auto.share --key=man\n"
            ],
            "id_hash": 7575832084243662958,
            "content_hash": 7575832084243662958,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 334,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 439,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717679/?format=api",
            "priority": 100,
            "id": 2722318,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=e922c3246359c86e",
            "url": "https://translate.fedoraproject.org/api/units/2722318/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.384973Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nBased on the ownership there are three vault categories:\n* user/private vault\n* service vault\n* shared vault\n"
            ],
            "previous_source": "",
            "target": [
                "\nIl existe trois types de coffres-forts en fonction de leur propriété :\n* coffre utilisateur/privé\n* coffre de service\n* coffre-fort partagé (shared)\n"
            ],
            "id_hash": 8791009145508946976,
            "content_hash": 8791009145508946976,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2907,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717681/?format=api",
            "priority": 100,
            "id": 2722319,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=f9fff03db7456420",
            "url": "https://translate.fedoraproject.org/api/units/2722319/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.406372Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nBased on the security mechanism there are three types of\nvaults:\n* standard vault\n* symmetric vault\n* asymmetric vault\n"
            ],
            "previous_source": "",
            "target": [
                "\nIl existe trois types de coffres-forts en fonction de leur mécanisme\nde sécurité :\n* coffre-fort standard\n* coffre-fort symétrique\n* coffre-fort asymétrique\n"
            ],
            "id_hash": -1608535265908523174,
            "content_hash": -1608535265908523174,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2909,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 20,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717683/?format=api",
            "priority": 100,
            "id": 2722320,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=69ad55b2b2d57f5a",
            "url": "https://translate.fedoraproject.org/api/units/2722320/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.420767Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nBaseuser\n\nThis contains common definitions for user/stageuser\n"
            ],
            "previous_source": "",
            "target": [
                "\nUtilisateur de base\n\nCeci contient les définitions communes pour les utilisateurs et utilisateurs en attente\n"
            ],
            "id_hash": 525089802879720764,
            "content_hash": 525089802879720764,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4531,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722321/?format=api",
            "priority": 100,
            "id": 2722322,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=87497e64c7d35d3c",
            "url": "https://translate.fedoraproject.org/api/units/2722322/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.451553Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nBring clarity to the membership of hosts and users by configuring inclusive\nor exclusive regex patterns, you can automatically assign a new entries into\na group or hostgroup based upon attribute information.\n"
            ],
            "previous_source": "",
            "target": [
                "\nClarifie l'adhésion d'hôtes et d'utilisateurs en configurant des motifs\n« regex » d'inclusion ou exclusion à assigner automatiquement aux nouvelles\nentrées dans un groupe ou un groupe d'hôtes selon l'information d'attribut.\n"
            ],
            "id_hash": 371146335088270964,
            "content_hash": 371146335088270964,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4441,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 32,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717685/?format=api",
            "priority": 100,
            "id": 2722323,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=852693a0169fde74",
            "url": "https://translate.fedoraproject.org/api/units/2722323/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.462630Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nClasses to manage trust joins using DCE-RPC calls\n\nThe code in this module relies heavily on samba4-python package\nand Samba4 python bindings.\n"
            ],
            "previous_source": "",
            "target": [
                "\nClasses pour gérer des jonctions de confiance avec des appels DCE-RPC\n\nLe code de ce module s'appuie pour l'essentiel sur le paquet\n« samba4-python » et les liaisons python de Samba4.\n"
            ],
            "id_hash": 3463651418101450208,
            "content_hash": 3463651418101450208,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4577,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722324/?format=api",
            "priority": 100,
            "id": 2722325,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=b0115c9d11b705e0",
            "url": "https://translate.fedoraproject.org/api/units/2722325/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.511504Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nCross-realm trusts\n\nManage trust relationship between IPA and Active Directory domains.\n\nIn order to allow users from a remote domain to access resources in IPA\ndomain, trust relationship needs to be established. Currently IPA supports\nonly trusts between IPA and Active Directory domains under control of Windows\nServer 2008 or later, with functional level 2008 or later.\n\nPlease note that DNS on both IPA and Active Directory domain sides should be\nconfigured properly to discover each other. Trust relationship relies on\nability to discover special resources in the other domain via DNS records.\n\nExamples:\n\n1. Establish cross-realm trust with Active Directory using AD administrator\n   credentials:\n\n   ipa trust-add --type=ad <ad.domain> --admin <AD domain administrator> --password\n\n2. List all existing trust relationships:\n\n   ipa trust-find\n\n3. Show details of the specific trust relationship:\n\n   ipa trust-show <ad.domain>\n\n4. Delete existing trust relationship:\n\n   ipa trust-del <ad.domain>\n\nOnce trust relationship is established, remote users will need to be mapped\nto local POSIX groups in order to actually use IPA resources. The mapping should\nbe done via use of external membership of non-POSIX group and then this group\nshould be included into one of local POSIX groups.\n\nExample:\n\n1. Create group for the trusted domain admins' mapping and their local POSIX group:\n\n   ipa group-add --desc='<ad.domain> admins external map' ad_admins_external --external\n   ipa group-add --desc='<ad.domain> admins' ad_admins\n\n2. Add security identifier of Domain Admins of the <ad.domain> to the ad_admins_external\n   group:\n\n   ipa group-add-member ad_admins_external --external 'AD\\Domain Admins'\n\n3. Allow members of ad_admins_external group to be associated with ad_admins POSIX group:\n\n   ipa group-add-member ad_admins --groups ad_admins_external\n\n4. List members of external members of ad_admins_external group to see their SIDs:\n\n   ipa group-show ad_admins_external\n\n\nGLOBAL TRUST CONFIGURATION\n\nWhen IPA AD trust subpackage is installed and ipa-adtrust-install is run,\na local domain configuration (SID, GUID, NetBIOS name) is generated. These\nidentifiers are then used when communicating with a trusted domain of the\nparticular type.\n\n1. Show global trust configuration for Active Directory type of trusts:\n\n   ipa trustconfig-show --type ad\n\n2. Modify global configuration for all trusts of Active Directory type and set\n   a different fallback primary group (fallback primary group GID is used as\n   a primary user GID if user authenticating to IPA domain does not have any other\n   primary GID already set):\n\n   ipa trustconfig-mod --type ad --fallback-primary-group \"alternative AD group\"\n\n3. Change primary fallback group back to default hidden group (any group with\n   posixGroup object class is allowed):\n\n   ipa trustconfig-mod --type ad --fallback-primary-group \"Default SMB Group\"\n"
            ],
            "previous_source": "",
            "target": [
                "\nRelations d'approbation entre domaines\n\nGestion des relations d'approbation entre les domaines IPA et Active Directory.\n\nPour permettre aux utilisateurs d'un domaine distant l'accès aux ressources\nd'un domaine IPA, des relations d'approbation doivent être établies.\nActuellement IPA ne prend en charge que les relations d'approbation entre des\ndomaines IPA et Active Directory sous le contrôle de Windows Server 2008 ou\nultérieur, avec le niveau fonctionnel 2008 ou ultérieur.\n\nVeuillez noter que DNS doit être correctement configuré à la fois côté\ndomaine IPA et côté Active Directory pour une découverte mutuelle. La\nrelation de confiance repose sur la capacité à repérer des ressources\nspéciales dans l'autre domaine via des enregistrements DNS.\n\nExemples :\n\n1. Établir des relations d'approbation croisées entre royaumes avec Active\nDirectory avec les autorisations d'accès d'un administrateur AD :\n\n   ipa trust-add --type=ad <ad.domain> --admin <AD domain administrator> --password\n\n2. Lister toutes les relations d'approbation existantes :\n\n   ipa trust-find\n\n3. Voir les détails d'une relation de confiance donnée :\n\n   ipa trust-show <ad.domain>\n\n4. Supprimer une relation de confiance existante :\n\n   ipa trust-del <ad.domain>\n\nUne fois la relation de confiance établie, les utilisateurs distants doivent\nêtre mis en relation avec des groupes POSIX locaux pour utiliser réellement\ndes ressources IPA. La relation doit se faire via l'appartenance à un groupe\nnon-POSIX externe, puis ce groupe doit être intégré dans l'un des groupes\nPOSIX locaux.\n\nExemples :\n\n1. Créer un groupe pour la mise en relation avec le domaine approuvé\n   « admins » et leur groupe POSIX local :\n\n   ipa group-add --desc='<ad.domain> admins external map' ad_admins_external --external\n   ipa group-add --desc='<ad.domain> admins' ad_admins\n\n2. Ajouter un identifiant de sécurité de <ad.domain> de Domain Admins au\n   groupe « ad_admins_external » :\n\n   ipa group-add-member ad_admins_external --external 'AD\\Domain Admins'\n\n3. Autoriser des membres du groupe « ad_admins_external » à s'associer\n   avec le groupe POSIX ad_admins :\n\n   ipa group-add-member ad_admins --groups ad_admins_external\n\n4. Lister les membres externes du groupe externe « ad_admins_external »\n   pour voir leur SID :\n\n   ipa group-show ad_admins_external\n\n\nCONFIGURATION D'UNE CONFIANCE GLOBALE\n\nUne fois le sous-paquet « IPA AD trust » installé et « ipa-adtrust-install »\nexécuté, une configuration de domaine local (SID, GUID, nom NetBIOS) est\ncréée. Ces identifiants sont alors utilisés lors de communications avec un\ndomaine approuvé de type particulier.\n\n1. Afficher la configuration de confiance globale pour les types de\n   confiance Active Directory :\n\n   ipa trustconfig-show --type ad\n\n2. Modifier la configuration globale de toutes les confiances de type\n   Active Directory et définir un groupe principal de recours (le GID du\n   groupe principal de recours est utilisé comme GID d'utilisateur principal\n   si l'utilisateur s'authentifiant auprès du domaine IPA n'a pas d'autre\n   GID principal déjà défini) :\n\n   ipa trustconfig-mod --type ad --fallback-primary-group \"alternative AD group\"\n\n3. Revenir au groupe caché par défaut comme groupe de recours principal\n   (tout groupe de la classe objet « posixGroup » est autorisé) :\n\n   ipa trustconfig-mod --type ad --fallback-primary-group \"Default SMB Group\"\n"
            ],
            "id_hash": 162152408473313216,
            "content_hash": 162152408473313216,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1539,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 404,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722326/?format=api",
            "priority": 100,
            "id": 2722327,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=824014c1a2869fc0",
            "url": "https://translate.fedoraproject.org/api/units/2722327/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.548753Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nDNS configuration passed to command line install script is stored in a local\nconfiguration file on each IPA server where DNS service is configured. These\nlocal settings can be overridden with a common configuration stored in LDAP\nserver:\n"
            ],
            "previous_source": "",
            "target": [
                "\nLa configuration DNS, passée en ligne de commande du script d'installation,\nest stockée dans un ficher de configuration local sur chaque serveur IPA \ndans lequel le service DNS est configuré. Ces réglages locaux peuvent être\nsurchargés par une configuration commune stockée dans le serveur LDAP :\n"
            ],
            "id_hash": 3313626065834016101,
            "content_hash": 3313626065834016101,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4210,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717701/?format=api",
            "priority": 100,
            "id": 2722328,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=adfc5d59bc82fd65",
            "url": "https://translate.fedoraproject.org/api/units/2722328/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.573272Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nDNS server configuration\n"
            ],
            "previous_source": "",
            "target": [
                "\nConfiguration du serveur DNS\n"
            ],
            "id_hash": -3027767240360860411,
            "content_hash": -3027767240360860411,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2396,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 3,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717703/?format=api",
            "priority": 100,
            "id": 2722329,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=55fb35bc97b9e505",
            "url": "https://translate.fedoraproject.org/api/units/2722329/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.586255Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nData stored on IPA servers is replicated to other IPA servers. The way it is\nreplicated is defined by replication agreements. Replication agreements needs\nto be set for both suffixes separately. On domain level 0 they are managed\nusing ipa-replica-manage and ipa-csreplica-manage tools. With domain level 1\nthey are managed centrally using `ipa topology*` commands.\n"
            ],
            "previous_source": "",
            "target": [
                "\nLes données enregistrées dans les serveurs IPA sont répliquées vers les autres\nserveurs IPA. Les agréments de réplication définissent la manière dont la \nréplication s'opère. Les agréments de réplication doivent être définis pour \nles deux suffixes de manière séparée. Sur les domaines de niveau 0, ils sont\ngérés par les outils ipa-replica-manage et ipa-csreplica-manage tools. Sur \nles domaines de niveau 1, ils sont gérés de manière centralisée par les commandes\n« ipa topology* ».\n"
            ],
            "id_hash": -8810199313172741681,
            "content_hash": -8810199313172741681,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4316,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 55,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722330/?format=api",
            "priority": 100,
            "id": 2722331,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=05bbe26731f2c1cf",
            "url": "https://translate.fedoraproject.org/api/units/2722331/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.610585Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nDeleting or renaming a managed permission, as well as changing its target,\nis not allowed.\n"
            ],
            "previous_source": "",
            "target": [
                "\nSupprimer ou renommer une permission administrée, ou changer sa cible,\nn'est pas autorisé.\n"
            ],
            "id_hash": 6865777583176194721,
            "content_hash": 6865777583176194721,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3897,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 15,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717707/?format=api",
            "priority": 100,
            "id": 2722332,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=df482455e00e9aa1",
            "url": "https://translate.fedoraproject.org/api/units/2722332/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.625408Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nDomain Name System (DNS)\n"
            ],
            "previous_source": "",
            "target": [
                "\nDomain Name System (DNS)\n"
            ],
            "id_hash": -2811666771616450775,
            "content_hash": -2811666771616450775,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4165,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 4,
            "source_unit": "https://translate.fedoraproject.org/api/units/2714975/?format=api",
            "priority": 100,
            "id": 2722333,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=58faf3f7d3083729",
            "url": "https://translate.fedoraproject.org/api/units/2722333/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.639234Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nENROLLMENT:\n\nThere are three enrollment scenarios when enrolling a new client:\n\n1. You are enrolling as a full administrator. The host entry may exist\n   or not. A full administrator is a member of the hostadmin role\n   or the admins group.\n2. You are enrolling as a limited administrator. The host must already\n   exist. A limited administrator is a member a role with the\n   Host Enrollment privilege.\n3. The host has been created with a one-time password.\n"
            ],
            "previous_source": "",
            "target": [
                "\nINSCRIPTION :\n\nTrois scenarii d'inscriptions d'un nouveau client sont possibles :\n\n1. La machine est enregistrée par un administrateur de plein droit.\n   L'entrée système peut pré-exister ou non. Un administrateur de\n   plein droit est membre du rôle hostadmin ou du groupe admins\n2. L'inscription est faite par un administrateur limité. L'hôte\n   doit avoir été préalablement créé. Un administrateur limité\n   possède le privilège Host Enrollment.\n3. Le système a été créé avec un mot de passe à usage unique.\n"
            ],
            "id_hash": 6099951273320043475,
            "content_hash": 6099951273320043475,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2295,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 76,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717712/?format=api",
            "priority": 100,
            "id": 2722334,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=d4a7615d396ed3d3",
            "url": "https://translate.fedoraproject.org/api/units/2722334/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.654456Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nEXAMPLES:\n"
            ],
            "previous_source": "",
            "target": [
                "\nEXEMPLES :\n"
            ],
            "id_hash": 7331774845707240866,
            "content_hash": 7331774845707240866,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 208,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 1,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717714/?format=api",
            "priority": 100,
            "id": 2722335,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=e5bfb260738645a2",
            "url": "https://translate.fedoraproject.org/api/units/2722335/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.667519Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nFreeIPA provides a designated binddn to use with Sudo located at:\nuid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com\n"
            ],
            "previous_source": "",
            "target": [
                "\nFreeIPA permet la désignation d'un « binddn » à utiliser avec sudo situé à :\nuid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com\n"
            ],
            "id_hash": -3713635539063446002,
            "content_hash": -3713635539063446002,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2231,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722336/?format=api",
            "priority": 100,
            "id": 2722337,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=4c76842724db660e",
            "url": "https://translate.fedoraproject.org/api/units/2722337/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.697478Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nFreeIPA provides a means to configure the various aspects of Sudo:\n   Users: The user(s)/group(s) allowed to invoke Sudo.\n   Hosts: The host(s)/hostgroup(s) which the user is allowed to to invoke Sudo.\n   Allow Command: The specific command(s) permitted to be run via Sudo.\n   Deny Command: The specific command(s) prohibited to be run via Sudo.\n   RunAsUser: The user(s) or group(s) of users whose rights Sudo will be invoked with.\n   RunAsGroup: The group(s) whose gid rights Sudo will be invoked with.\n   Options: The various Sudoers Options that can modify Sudo's behavior.\n"
            ],
            "previous_source": "",
            "target": [
                "\nFreeIPA offre les moyens de configurer les divers aspects de sudo :\n   Users : utilisateur/groupe autorisés à invoquer sudo.\n   Hosts : hôte/groupe d'hôte dont l'utilisateur peut invoquer sudo.\n   Allow Command : commande donnée pouvant être exécutée via sudo.\n   Deny Command : commande donnée interdite d'exécution avec sudo.\n   RunAsUser : utilisateur ou groupe dont les droits sudo pourront être invoqués.\n   RunAsGroup : groupe dont les droits sudo associés au GID pourront être invoqués.\n   Options : les diverses options de sudoers pouvant modifier le comportement de sudo.\n"
            ],
            "id_hash": -4264788943582056064,
            "content_hash": -4264788943582056064,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2229,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 87,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722338/?format=api",
            "priority": 100,
            "id": 2722339,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=44d06d0d37c73180",
            "url": "https://translate.fedoraproject.org/api/units/2722339/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.756278Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGet information about installed IPA servers.\n"
            ],
            "previous_source": "",
            "target": [
                "\nAfficher les informations au sujet des serveurs IPA installés.\n"
            ],
            "id_hash": 7571443703399765817,
            "content_hash": 7571443703399765817,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3931,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717718/?format=api",
            "priority": 100,
            "id": 2722340,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=e9132beeda02d739",
            "url": "https://translate.fedoraproject.org/api/units/2722340/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.773435Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGet status of roles (DNS server, CA, etc.) provided by IPA masters.\n"
            ],
            "previous_source": "",
            "target": [
                "\nObtenir l'état des rôles (serveur DNS, AC, etc. )fournis par les maîtres IPA.\n"
            ],
            "id_hash": -839679647498471035,
            "content_hash": -839679647498471035,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3989,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717720/?format=api",
            "priority": 100,
            "id": 2722341,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=7458dbcf35ba7985",
            "url": "https://translate.fedoraproject.org/api/units/2722341/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.786846Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroup to Group Delegation\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nGroup to Group Delegations grants the members of one group to update a set\nof attributes of members of another group.\n\nEXAMPLES:\n\n Add a delegation rule to allow managers to edit employee's addresses:\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones. Add postalCode to the list:\n   ipa delegation-mod --attrs=street --attrs=postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Display our updated rule:\n   ipa delegation-show \"managers edit employees' street\"\n\n Delete a rule:\n   ipa delegation-del \"managers edit employees' street\"\n"
            ],
            "previous_source": "",
            "target": [
                "\nDélégation de groupe à groupe\n\nUne permission permet une délégation fine des autorisations. Les règles de\ncontrôle d'accès, ou les instructions (ACI), accordent la possibilité aux\npermissions de réaliser certaines tâches comme l'ajout d'utilisateur, la\nmodification d'un groupe, etc.\n\nLa délégation de groupe à groupe permet aux membres d'un groupe de modifier\nun jeu d'attributs de membres d'un autre groupe.\n\nEXEMPLES:\n\n Ajouter une règle de délégation permettant aux gestionnaires de modifier\n les adresses des employés :\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n En gérant une liste d'attributs, vous devez inclure tous les attributs,\n y compris les existants. Ajouter « postalCode » à la liste :\n   ipa delegation-mod --attrs=street --attrs=postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Afficher la règle modifiée :\n   ipa delegation-show \"managers edit employees' street\"\n\n Supprimer une règle :\n   ipa delegation-del \"managers edit employees' street\"\n"
            ],
            "id_hash": -3119159521089505940,
            "content_hash": -3119159521089505940,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 419,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 128,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717722/?format=api",
            "priority": 100,
            "id": 2722342,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=54b684f10baeb56c",
            "url": "https://translate.fedoraproject.org/api/units/2722342/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.803835Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroups of Sudo Commands\n\nManage groups of Sudo Commands.\n\nEXAMPLES:\n\n Add a new Sudo Command Group:\n   ipa sudocmdgroup-add --desc='administrators commands' admincmds\n\n Remove a Sudo Command Group:\n   ipa sudocmdgroup-del admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less --sudocmds=/usr/bin/vim admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa group-remove-member --sudocmds=/usr/bin/less admincmds\n\n Show a Sudo Command Group:\n   ipa group-show localadmins\n"
            ],
            "previous_source": "",
            "target": [
                "\nGroupes de commandes sudo\n\nAdministre les groupes de commandes sudo.\n\nEXEMPLES :\n\n Ajouter un nouveau groupe de commandes sudo :\n   ipa sudocmdgroup-add --desc='commandes administrateurs' admincmds\n\n Supprimer un groupe de commandes sudo :\n   ipa sudocmdgroup-del admincmds\n\n Gérer  les commandes, l'appartenance d'un groupe de commandes sudo :\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less --sudocmds=/usr/bin/vim admincmds\n\n Administrer  les commandes, l'appartenance d'un groupe de commandes sudo :\n   ipa group-remove-member --sudocmds=/usr/bin/less admincmds\n\n Afficher un groupe de commandes sudo :\n   ipa group-show localadmins\n"
            ],
            "id_hash": 2306682720644878361,
            "content_hash": 2306682720644878361,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1296,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 58,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722343/?format=api",
            "priority": 100,
            "id": 2722344,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=a002fbb68d91d019",
            "url": "https://translate.fedoraproject.org/api/units/2722344/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.842104Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroups of Sudo Commands\n\nManage groups of Sudo Commands.\n\nEXAMPLES:\n\n Add a new Sudo Command Group:\n   ipa sudocmdgroup-add --desc='administrators commands' admincmds\n\n Remove a Sudo Command Group:\n   ipa sudocmdgroup-del admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less --sudocmds=/usr/bin/vim admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa sudocmdgroup-remove-member --sudocmds=/usr/bin/less admincmds\n\n Show a Sudo Command Group:\n   ipa sudocmdgroup-show admincmds\n"
            ],
            "previous_source": "",
            "target": [
                "\nGroupes de commandes sudo\n\nAdministre les groupes de commandes sudo.\n\nEXEMPLES :\n\n Ajouter un nouveau groupe de commandes sudo :\n   ipa sudocmdgroup-add --desc='commandes administrateurs' admincmds\n\n Supprimer un groupe de commandes sudo :\n   ipa sudocmdgroup-del admincmds\n\n Gérer  les commandes, l'appartenance d'un groupe de commandes sudo :\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less --sudocmds=/usr/bin/vim admincmds\n\n Administrer  les commandes, l'appartenance d'un groupe de commandes sudo :\n   ipa sudocmdgroup-remove-member --sudocmds=/usr/bin/less admincmds\n\n Afficher un groupe de commandes sudo :\n   ipa sudocmdgroup-show admincmds\n"
            ],
            "id_hash": -7605247690643532077,
            "content_hash": -7605247690643532077,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2772,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 58,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722345/?format=api",
            "priority": 100,
            "id": 2722346,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=1674bb850a5516d3",
            "url": "https://translate.fedoraproject.org/api/units/2722346/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.884325Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroups of hosts.\n\nManage groups of hosts. This is useful for applying access control to a\nnumber of hosts by using Host-based Access Control.\n\nEXAMPLES:\n\n Add a new host group:\n   ipa hostgroup-add --desc=\"Baltimore hosts\" baltimore\n\n Add another new host group:\n   ipa hostgroup-add --desc=\"Maryland hosts\" maryland\n\n Add members to the hostgroup (using Bash brace expansion):\n   ipa hostgroup-add-member --hosts={box1,box2,box3} baltimore\n\n Add a hostgroup as a member of another hostgroup:\n   ipa hostgroup-add-member --hostgroups=baltimore maryland\n\n Remove a host from the hostgroup:\n   ipa hostgroup-remove-member --hosts=box2 baltimore\n\n Display a host group:\n   ipa hostgroup-show baltimore\n\n Delete a hostgroup:\n   ipa hostgroup-del baltimore\n"
            ],
            "previous_source": "",
            "target": [
                "\nGroupes d'hôtes.\n\nGestion des groupes d'hôtes. Permet d'appliquer des contrôles d'accès\nà plusieurs hôtes en utilisant HBAC (Host-based Access Control).\n\nEXEMPLES :\n\n Ajouter un nouveau groupe d'hôtes :\n   ipa hostgroup-add --desc=\"Systèmes de Baltimore\" baltimore\n\n Ajouter un nouveau groupe d'hôtes :\n   ipa hostgroup-add --desc=\"Systèmes du Maryland\" maryland\n\n Ajouter des membres à un groupe d'hôtes :\n   ipa hostgroup-add-member --hosts={box1,box2,box3} baltimore\n\n Ajouter un groupe d'hôtes en tant que membre d'un autre groupe d'hôtes :\n   ipa hostgroup-add-member --hostgroups=baltimore maryland\n\n Supprimer un hôte d'un groupe :\n   ipa hostgroup-remove-member --hosts=box2 baltimore\n\n Afficher un groupe d'hôtes :\n   ipa hostgroup-show baltimore\n\n Supprimer un groupe d'hôtes :\n   ipa hostgroup-del baltimore\n"
            ],
            "id_hash": 2875035360512469728,
            "content_hash": 2875035360512469728,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 854,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 94,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722347/?format=api",
            "priority": 100,
            "id": 2722348,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=a7e62d6d84086ae0",
            "url": "https://translate.fedoraproject.org/api/units/2722348/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.917192Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroups of users\n\nManage groups of users. By default, new groups are POSIX groups. You\ncan add the --nonposix option to the group-add command to mark a new group\nas non-POSIX. You can use the --posix argument with the group-mod command\nto convert a non-POSIX group into a POSIX group. POSIX groups cannot be\nconverted to non-POSIX groups.\n\nEvery group must have a description.\n\nPOSIX groups must have a Group ID (GID) number. Changing a GID is\nsupported but can have an impact on your file permissions. It is not necessary\nto supply a GID when creating a group. IPA will generate one automatically\nif it is not provided.\n\nEXAMPLES:\n\n Add a new group:\n   ipa group-add --desc='local administrators' localadmins\n\n Add a new non-POSIX group:\n   ipa group-add --nonposix --desc='remote administrators' remoteadmins\n\n Convert a non-POSIX group to posix:\n   ipa group-mod --posix remoteadmins\n\n Add a new POSIX group with a specific Group ID number:\n   ipa group-add --gid=500 --desc='unix admins' unixadmins\n\n Add a new POSIX group and let IPA assign a Group ID number:\n   ipa group-add --desc='printer admins' printeradmins\n\n Remove a group:\n   ipa group-del unixadmins\n\n To add the \"remoteadmins\" group to the \"localadmins\" group:\n   ipa group-add-member --groups=remoteadmins localadmins\n\n Add multiple users to the \"localadmins\" group:\n   ipa group-add-member --users=test1 --users=test2 localadmins\n\n Remove a user from the \"localadmins\" group:\n   ipa group-remove-member --users=test2 localadmins\n\n Display information about a named group.\n   ipa group-show localadmins\n\nExternal group membership is designed to allow users from trusted domains\nto be mapped to local POSIX groups in order to actually use IPA resources.\nExternal members should be added to groups that specifically created as\nexternal and non-POSIX. Such group later should be included into one of POSIX\ngroups.\n\nAn external group member is currently a Security Identifier (SID) as defined by\nthe trusted domain. When adding external group members, it is possible to\nspecify them in either SID, or DOM\name, or name@domain format. IPA will attempt\nto resolve passed name to SID with the use of Global Catalog of the trusted domain.\n\nExample:\n\n1. Create group for the trusted domain admins' mapping and their local POSIX group:\n\n   ipa group-add --desc='<ad.domain> admins external map' ad_admins_external --external\n   ipa group-add --desc='<ad.domain> admins' ad_admins\n\n2. Add security identifier of Domain Admins of the <ad.domain> to the ad_admins_external\n   group:\n\n   ipa group-add-member ad_admins_external --external 'AD\\Domain Admins'\n\n3. Allow members of ad_admins_external group to be associated with ad_admins POSIX group:\n\n   ipa group-add-member ad_admins --groups ad_admins_external\n\n4. List members of external members of ad_admins_external group to see their SIDs:\n\n   ipa group-show ad_admins_external\n"
            ],
            "previous_source": "",
            "target": [
                "\nGroupes d'utilisateurs\n\nGérer des groupes d'utilisateurs. Par défaut, tout nouveau groupe est POSIX.\nOn peut ajouter l'option « --nonposix » à la commande « group-add » pour\nmarquer un nouveau groupe comme non-POSIX et utiliser l'option « --posix »\nde la commande « group-mod » pour convertir un groupe non-POSIX en groupe\nPOSIX. Les groupes POSIX ne peuvent pas être convertis en groupes non-POSIX.\n\nChaque groupe doit avoir une description.\n\nLes groupes POSIX doivent avoir un numéro d'ID de groupe (GID). Modifier un\nGID est faisable, mais cela peut avoir un impact sur vos droits d'accès aux\nfichiers. Il n'est pas nécessaire d'indiquer un GID à la création du groupe.\nIPA en générera un automatiquement s'il n'est pas fourni.\n\nEXEMPLES :\n\n Ajouter un nouveau groupe :\n   ipa group-add --desc='local administrators' localadmins\n\n Ajouter un nouveau groupe non-POSIX :\n   ipa group-add --nonposix --desc='remote administrators' remoteadmins\n\n Convertir un groupe non-POSIX en groupe POSIX :\n   ipa group-mod --posix remoteadmins\n\n Ajouter un nouveau groupe POSIX avec un numéro d'ID de groupe donné :\n   ipa group-add --gid=500 --desc='unix admins' unixadmins\n\n Ajouter un nouveau groupe POSIX et laisser IPA assigner un numéro d'ID de groupe :\n   ipa group-add --desc='printer admins' printeradmins\n\n Supprimer un groupe :\n   ipa group-del unixadmins\n\n Ajouter le groupe « remoteadmins » au groupe « localadmins » :\n   ipa group-add-member --groups=remoteadmins localadmins\n\n Ajouter plusieurs utilisateurs au groupe « localadmins » :\n   ipa group-add-member --users=test1 --users=test2 localadmins\n\n Supprimer un utilisateur du groupe « localadmins » :\n   ipa group-remove-member --users=test2 localadmins\n\n Afficher des informations à propos d'un groupe donné :\n   ipa group-show localadmins\n\nL'adhésion à un groupe externe est conçue pour permettre aux utilisateurs de\ndomaines approuvés d'être assimilés aux groupes POSIX locaux pour pouvoir\nutiliser réellement les ressources IPA. Des membres externes peuvent être\najoutés aux groupes spécifiquement crées comme externes et non-POSIX. Un tel\ngroupe peut plus tard être incorporé dans un des groupes POSIX\n\nUn membre de groupe externe est actuellement identifié par un « Security\nIdentifier (SID) » tel que défini pour le domaine approuvé. Pour ajouter\nun membre de groupe externe, il est possible de le définir, soit au format\nSID, soit DOM\\name, soit name@domain. IPA essayera de résoudre le nom passé\nen SID en se servant du « Global Catalog » des domaines approuvés.\n\nExemple:\n\n1. Créer un groupe par assimilation au domaine approuvé « admins »\n   et à leur groupe POSIX local :\n\n   ipa group-add --desc='<ad.domain> admins external map' ad_admins_external --external\n   ipa group-add --desc='<ad.domain> admins' ad_admins\n\n2. Ajouter l'identifiant de sécurité <ad.domain> de « Domain Admins » au\n   groupe externe « ad_admins_external » :\n\n   ipa group-add-member ad_admins_external --external 'AD\\Domain Admins'\n\n3. Autoriser des membres du groupe « ad_admins_external » à être associés au\n   groupe POSIX « ad_admins » :\n\n   ipa group-add-member ad_admins --groups ad_admins_external\n\n4. Lister les membres externes du groupe « ad_admins_external » pour voir\n   leur SID :\n\n   ipa group-show ad_admins_external\n"
            ],
            "id_hash": 6868521823390194853,
            "content_hash": 6868521823390194853,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1806,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 413,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722349/?format=api",
            "priority": 100,
            "id": 2722350,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=df51e4351730dca5",
            "url": "https://translate.fedoraproject.org/api/units/2722350/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:39.957039Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nHBAC Service Groups\n\nHBAC service groups can contain any number of individual services,\nor \"members\". Every group must have a description.\n\nEXAMPLES:\n\n Add a new HBAC service group:\n   ipa hbacsvcgroup-add --desc=\"login services\" login\n\n Add members to an HBAC service group:\n   ipa hbacsvcgroup-add-member --hbacsvcs=sshd --hbacsvcs=login login\n\n Display information about a named group:\n   ipa hbacsvcgroup-show login\n\n Delete an HBAC service group:\n   ipa hbacsvcgroup-del login\n"
            ],
            "previous_source": "",
            "target": [
                "\nGroupes de services HBAC\n\nLes groupes de services HBAC peuvent contenir n'importe quel nombre de\nservices « membres » individuels. Chaque groupe doit avoir une description.\n\nEXEMPLES:\n\n Ajouter un nouveau groupe de services HBAC :\n   ipa hbacsvcgroup-add --desc=\"login services\" login\n\n Ajouter des membres à un groupe de services HBAC :\n   ipa hbacsvcgroup-add-member --hbacsvcs=sshd --hbacsvcs=login login\n\n Afficher les informations d'un groupe nommé :\n   ipa hbacsvcgroup-show login\n\n Supprimer un groupe de services HBAC :\n   ipa hbacsvcgroup-del login\n"
            ],
            "id_hash": 2700510747182648045,
            "content_hash": 2700510747182648045,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 752,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 62,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722351/?format=api",
            "priority": 100,
            "id": 2722352,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=a57a243775f24aed",
            "url": "https://translate.fedoraproject.org/api/units/2722352/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.001268Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nHBAC Services\n\nThe PAM services that HBAC can control access to. The name used here\nmust match the service name that PAM is evaluating.\n\nEXAMPLES:\n\n Add a new HBAC service:\n   ipa hbacsvc-add tftp\n\n Modify an existing HBAC service:\n   ipa hbacsvc-mod --desc=\"TFTP service\" tftp\n\n Search for HBAC services. This example will return two results, the FTP\n service and the newly-added tftp service:\n   ipa hbacsvc-find ftp\n\n Delete an HBAC service:\n   ipa hbacsvc-del tftp\n\n"
            ],
            "previous_source": "",
            "target": [
                "\nServices HBAC\n\nLes services PAM dont le système HBAC peut contrôler l'accès. Le nom utilisé\nici doit correspondre au nom du service analysé par PAM.\nEXEMPLES:\n\n Ajouter un nouveau service HBAC :\n   ipa hbacsvc-add tftp\n\n Modifier un service HBAC existant :\n   ipa hbacsvc-mod --desc=\"TFTP service\" tftp\n\n Chercher des services HBAC. Cet exemple renvoie deux résultats, le service\n FTP et le service tftp nouvellement ajouté :\n   ipa hbacsvc-find ftp\n\n Supprimer un service HBAC :\n   ipa hbacsvc-del tftp\n\n"
            ],
            "id_hash": 2346402538182285673,
            "content_hash": 2346402538182285673,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2422,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 71,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717726/?format=api",
            "priority": 100,
            "id": 2722353,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=a09018ad3c6e1969",
            "url": "https://translate.fedoraproject.org/api/units/2722353/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.017070Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nHost-based access control\n\nControl who can access what services on what hosts. You\ncan use HBAC to control which users or groups can\naccess a service, or group of services, on a target host.\n\nYou can also specify a category of users and target hosts.\nThis is currently limited to \"all\", but might be expanded in the\nfuture.\n\nTarget hosts in HBAC rules must be hosts managed by IPA.\n\nThe available services and groups of services are controlled by the\nhbacsvc and hbacsvcgroup plug-ins respectively.\n\nEXAMPLES:\n\n Create a rule, \"test1\", that grants all users access to the host \"server\" from\n anywhere:\n   ipa hbacrule-add --usercat=all test1\n   ipa hbacrule-add-host --hosts=server.example.com test1\n\n Display the properties of a named HBAC rule:\n   ipa hbacrule-show test1\n\n Create a rule for a specific service. This lets the user john access\n the sshd service on any machine from any machine:\n   ipa hbacrule-add --hostcat=all john_sshd\n   ipa hbacrule-add-user --users=john john_sshd\n   ipa hbacrule-add-service --hbacsvcs=sshd john_sshd\n\n Create a rule for a new service group. This lets the user john access\n the FTP service on any machine from any machine:\n   ipa hbacsvcgroup-add ftpers\n   ipa hbacsvc-add sftp\n   ipa hbacsvcgroup-add-member --hbacsvcs=ftp --hbacsvcs=sftp ftpers\n   ipa hbacrule-add --hostcat=all john_ftp\n   ipa hbacrule-add-user --users=john john_ftp\n   ipa hbacrule-add-service --hbacsvcgroups=ftpers john_ftp\n\n Disable a named HBAC rule:\n   ipa hbacrule-disable test1\n\n Remove a named HBAC rule:\n   ipa hbacrule-del allow_server\n"
            ],
            "previous_source": "",
            "target": [
                "\nContrôle d'accès des systèmes (HBAC)\n\nHBAC (Host-based acces control) permet de contrôler qui peut accéder\nà quels services sur quels systèmes, et d'où. Il est possible\nd'utiliser le système HBAC afin de contrôler quels utilisateurs ou quels\ngroupes d'un système source peuvent accéder à quels services, ou groupes\nde services, sur un hôte cible.\n\nVous pouvez aussi indiquer une catégorie d'utilisateur, d'hôtes cibles.\nLa seule catégorie existante pour le moment est \"all\", mais elles\npourront être étendues dans le futur.\n\nLes hôtes cible des règles HBAC doivent être des hôtes administrés par IPA.\n\nLes services et groupes de services disponibles sont gérés respectivement\npar les greffons « hbacsvc » et « hbacsvcgroup ».\n\nEXEMPLES:\n\n Créer une règle \"test1\" autorisant tous les utilisateurs à accéder\n le serveur « server » depuis n'importe où :\n   ipa hbacrule-add --usercat=all test1\n   ipa hbacrule-add-host --hosts=server.example.com test1\n\n Afficher les propriétés d'une règle HBAC nommée :\n   ipa hbacrule-show test1\n\n Créer une règle pour un service donné. Elle permet d'avoir accés au\n service sshd sur toute machine depuis n'importe quelle autre machine :\n   ipa hbacrule-add --hostcat=all john_sshd\n   ipa hbacrule-add-user --users=john john_sshd\n   ipa hbacrule-add-service --hbacsvcs=sshd john_sshd\n\n Créer une règle pour un nouveau groupe de services. Elle permet d'avoir\n accès au service FTP de toute machine depuis n'importe quelle machine.\n   ipa hbacsvcgroup-add ftpers\n   ipa hbacsvc-add sftp\n   ipa hbacsvcgroup-add-member --hbacsvcs=ftp --hbacsvcs=sftp ftpers\n   ipa hbacrule-add --hostcat=all john_ftp\n   ipa hbacrule-add-user --users=john john_ftp\n   ipa hbacrule-add-service --hbacsvcgroups=ftpers john_ftp\n\n Désactiver une règle HBAC nommée :\n   ipa hbacrule-disable test1\n\n Supprimer une règle HBAC nommée :\n   ipa hbacrule-del allow_server\n\n"
            ],
            "id_hash": -1467404680321395607,
            "content_hash": -1467404680321395607,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 687,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 216,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722354/?format=api",
            "priority": 100,
            "id": 2722355,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=6ba2bb37c7b29469",
            "url": "https://translate.fedoraproject.org/api/units/2722355/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.055171Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nHosts/Machines\n\nA host represents a machine. It can be used in a number of contexts:\n- service entries are associated with a host\n- a host stores the host/ service principal\n- a host can be used in Host-based Access Control (HBAC) rules\n- every enrolled client generates a host entry\n"
            ],
            "previous_source": "",
            "target": [
                "\nHôtes/Machines\n\nUn hôte représente une machine. Il peut être utilisé dans de nombreux contextes :\n- les entrées de services sont associées à un hôte,\n- un hôte stocke le principal des hôtes/des services,\n- un hôte est utilisable dans les règles HBAC (Host-based Access Control),\n- chaque client enregistré génère une entrée d'hôte.\n"
            ],
            "id_hash": -4217162556708416370,
            "content_hash": -4217162556708416370,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2294,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 51,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717728/?format=api",
            "priority": 100,
            "id": 2722356,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=4579a0ff8751148e",
            "url": "https://translate.fedoraproject.org/api/units/2722356/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.074532Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA certificate operations\n\nImplements a set of commands for managing server SSL certificates.\n\nCertificate requests exist in the form of a Certificate Signing Request (CSR)\nin PEM format.\n\nThe dogtag CA uses just the CN value of the CSR and forces the rest of the\nsubject to values configured in the server.\n\nA certificate is stored with a service principal and a service principal\nneeds a host.\n\nIn order to request a certificate:\n\n* The host must exist\n* The service must exist (or you use the --add option to automatically add it)\n\nSEARCHING:\n\nCertificates may be searched on by certificate subject, serial number,\nrevocation reason, validity dates and the issued date.\n\nWhen searching on dates the _from date does a >= search and the _to date\ndoes a <= search. When combined these are done as an AND.\n\nDates are treated as GMT to match the dates in the certificates.\n\nThe date format is YYYY-mm-dd.\n\nEXAMPLES:\n\n Request a new certificate and add the principal:\n   ipa cert-request --add --principal=HTTP/lion.example.com example.csr\n\n Retrieve an existing certificate:\n   ipa cert-show 1032\n\n Revoke a certificate (see RFC 5280 for reason details):\n   ipa cert-revoke --revocation-reason=6 1032\n\n Remove a certificate from revocation hold status:\n   ipa cert-remove-hold 1032\n\n Check the status of a signing request:\n   ipa cert-status 10\n\n Search for certificates by hostname:\n   ipa cert-find --subject=ipaserver.example.com\n\n Search for revoked certificates by reason:\n   ipa cert-find --revocation-reason=5\n\n Search for certificates based on issuance date\n   ipa cert-find --issuedon-from=2013-02-01 --issuedon-to=2013-02-07\n\nIPA currently immediately issues (or declines) all certificate requests so\nthe status of a request is not normally useful. This is for future use\nor the case where a CA does not immediately issue a certificate.\n\nThe following revocation reasons are supported:\n\n    * 0 - unspecified\n    * 1 - keyCompromise\n    * 2 - cACompromise\n    * 3 - affiliationChanged\n    * 4 - superseded\n    * 5 - cessationOfOperation\n    * 6 - certificateHold\n    * 8 - removeFromCRL\n    * 9 - privilegeWithdrawn\n    * 10 - aACompromise\n\nNote that reason code 7 is not used.  See RFC 5280 for more details:\n\nhttp://www.ietf.org/rfc/rfc5280.txt\n"
            ],
            "previous_source": "",
            "target": [
                "\nGestion de certficats IPA\n\nImplémente un jeu de commandes pour gérer les certificats SSL du serveur.\n\nLes demandes de certificats existent sous la forme de\n« Certificate Signing Request (CSR) » au format PEM.\n\nLa plaque d'identité CA n'utilise que la valeur CN du CSR et force le reste\ndu sujet aux valeurs configurées dans le serveur.\n\nUn certificat est enregistré avec un principal de service et un principal\n de service a besoin d'un hôte.\n\nDonc, pour demander un certificat :\n\n* l'hôte doit exister\n* le service doit exister (utiliser --add pour l'ajouter automatiquement)\n\nRECHERCHE :\n\nLes certificats peuvent être recherchés par sujet, numéro de série,\nmotif de révocation, dates de validité et date d'émission.\n\nEn recherchant par dates, _from effectue une recherche >= à la date et _to\nune recherche <= à la date. Combinées, elles sont équivalentes à un AND.\n\nLa date est traitée comme GMT pour correspondre aux dates de certificats.\n\nLa date est au format YYYY-mm-dd.\n\nEXEMPLES :\n\n Demander un nouveau certificat et ajouter le principal :\n   ipa cert-request --add --principal=HTTP/lion.example.com example.csr\n\n Retrouver un certificat existant :\n   ipa cert-show 1032\n\n Révoquer un certificat (voir RFC 5280 pour le détail des raisons) :\n   ipa cert-revoke --revocation-reason=6 1032\n\n Lever l'état de maintien de révocation d'un certificat :\n   ipa cert-remove-hold 1032\n\n Vérifier l'état d'une demande de signature :\n   ipa cert-status 10\n\n Rechercher des certificats par nom d'hôte :\n   ipa cert-find --subject=ipaserver.example.com\n\n Rechercher les certificats révoqués par motif :\n   ipa cert-find --revocation-reason=5\n\n Rechercher les certificats selon la date d'émission :\n   ipa cert-find --issuedon-from=2013-02-01 --issuedon-to=2013-02-07\n\nActuellement IPA émet (ou refuse) aussitôt toute demande de certificat, donc\nl'état d'une requête ne sert normalement pas. C'est en vue d'une utilisation\nfuture ou au cas où un CA n'émettrait pas immédiatement un certificat.\n\nLes motifs de révocation suivants sont pris en charge :\n\n    * 0 - « unspecified » (non précisé)\n    * 1 - « keyCompromise » (clé compromise)\n    * 2 - « cACompromise » (CA compromis)\n    * 3 - « affiliationChanged » (affiliation modifiée)\n    * 4 - « superseded » (remplacé)\n    * 5 - « cessationOfOperation » (arrêt d'opération)\n    * 6 - « certificateHold » (certificat retenu)\n    * 8 - « removeFromCRL » (sorti du CRL)\n    * 9 - « privilegeWithdrawn » (retrait de privilège)\n    * 10 - « aACompromise » (compromission)\n\nNotez que le motif code 7 ne sert pas. Voir RFC 5280 pour plus de détails :\n\nhttp://www.ietf.org/rfc/rfc5280.txt\n\n"
            ],
            "id_hash": 7370572838123338567,
            "content_hash": 7370572838123338567,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1457,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 335,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722357/?format=api",
            "priority": 100,
            "id": 2722358,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=e64988f1ff7bfb47",
            "url": "https://translate.fedoraproject.org/api/units/2722358/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.109667Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA locations\n"
            ],
            "previous_source": "",
            "target": [
                "\nEmplacements IPA\n"
            ],
            "id_hash": -1469542652252565629,
            "content_hash": -1469542652252565629,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2619,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717732/?format=api",
            "priority": 100,
            "id": 2722359,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=6b9b22be66334f83",
            "url": "https://translate.fedoraproject.org/api/units/2722359/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.128667Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA server roles\n"
            ],
            "previous_source": "",
            "target": [
                "\nRôles serveurs IPA\n"
            ],
            "id_hash": 2085492884609323806,
            "content_hash": 2085492884609323806,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3988,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 3,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717734/?format=api",
            "priority": 100,
            "id": 2722360,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=9cf128baa8be531e",
            "url": "https://translate.fedoraproject.org/api/units/2722360/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.139280Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA server's data is stored in LDAP server in two suffixes:\n* domain suffix, e.g., 'dc=example,dc=com', contains all domain related data\n* ca suffix, 'o=ipaca', is present only on server with CA installed. It\n  contains data for Certificate Server component\n"
            ],
            "previous_source": "",
            "target": [
                "\nLes données des serveurs IPA sont enregistrées dans le serveur LDAP\nsous deux suffixes :\n* le suffixe de domain, par exemple « dc=example,dc=com », qui contient toutes\n   les informations relatives au domaine ;\n* le suffixe ca, « o=ipaca », qui n'est présent que sur les serveurs où l'autorité de certification\n   est installée. Il contient les données nécessaire au composant Certificate Server\n"
            ],
            "id_hash": 7697637059860530699,
            "content_hash": 7697637059860530699,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4315,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 40,
            "source_unit": "https://translate.fedoraproject.org/api/units/2722361/?format=api",
            "priority": 100,
            "id": 2722362,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=ead3801f42de860b",
            "url": "https://translate.fedoraproject.org/api/units/2722362/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.174158Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA servers\n"
            ],
            "previous_source": "",
            "target": [
                "\nServeurs IPA\n"
            ],
            "id_hash": -9050709037148076610,
            "content_hash": -9050709037148076610,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3930,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2714977/?format=api",
            "priority": 100,
            "id": 2722363,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=02656c155b5f05be",
            "url": "https://translate.fedoraproject.org/api/units/2722363/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.189542Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA supports the use of OTP tokens for multi-factor authentication. This\ncode enables the management of OTP tokens.\n"
            ],
            "previous_source": "",
            "target": [
                "\nIPA prend en charge l'utilisation de jetons OTP pour une authentification\nà facteurs multiples. Ce code active la gestion des jetons OTP.\n"
            ],
            "id_hash": 8851803854630852111,
            "content_hash": 8851803854630852111,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 3871,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717737/?format=api",
            "priority": 100,
            "id": 2722364,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=fad7ecb4f8b4960f",
            "url": "https://translate.fedoraproject.org/api/units/2722364/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.202540Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIPA supports the use of an external RADIUS proxy server for krb5 OTP\nauthentications. This permits a great deal of flexibility when\nintegrating with third-party authentication services.\n"
            ],
            "previous_source": "",
            "target": [
                "\nIPA prend en charge l'utilisation d'un serveur mandataire externe RADIUS\npour des authentifications OTP « krb5 ». Cela procure une grande souplesse\npour l'intégration des services d'authentification tierce partie.\n"
            ],
            "id_hash": -4386825095960310480,
            "content_hash": -4386825095960310480,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 2549,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 27,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717739/?format=api",
            "priority": 100,
            "id": 2722365,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=431eddd14f844d30",
            "url": "https://translate.fedoraproject.org/api/units/2722365/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.213515Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nIt may be difficult to manipulate such DNS records without making a mistake\nand entering an invalid value. DNS module provides an abstraction over these\nraw records and allows to manipulate each RR type with specific options. For\neach supported RR type, DNS module provides a standard option to manipulate\na raw records with format --<rrtype>-rec, e.g. --mx-rec, and special options\nfor every part of the RR structure with format --<rrtype>-<partname>, e.g.\n--mx-preference and --mx-exchanger.\n"
            ],
            "previous_source": "",
            "target": [
                "\nIl peut être difficile de manier de tels enregistrements DNS sans erreurs et\nsans entrer de valeur invalide. Le module DNS fournit une abstraction pour\nces enregistrements bruts afin de manier chaque type RR avec des options\ndonnées. Pour tout type RR pris en charge, le module DNS fournit une option\nstandard pour manier l'enregistrement brut avec le format --<rrtype>-rec,\nex. --mx-rec, et des options spéciales pour chaque élément de structure RR\navec le format --<rrtype>-<partname>, ex. --mx-preference ou --mx-exchanger.\n"
            ],
            "id_hash": -6250658751267078636,
            "content_hash": -6250658751267078636,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 4170,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 75,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717747/?format=api",
            "priority": 100,
            "id": 2722366,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=294132fbae89fe14",
            "url": "https://translate.fedoraproject.org/api/units/2722366/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.224176Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nJoining an IPA domain\n"
            ],
            "previous_source": "",
            "target": [
                "\nRejoindre un domaine IPA\n"
            ],
            "id_hash": 7756148544718265669,
            "content_hash": 7756148544718265669,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 937,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 4,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717749/?format=api",
            "priority": 100,
            "id": 2722367,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=eba36001f1185d45",
            "url": "https://translate.fedoraproject.org/api/units/2722367/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.237651Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nKerberos pkinit options\n\nEnable or disable anonymous pkinit using the principal\nWELLKNOWN/ANONYMOUS@REALM. The server must have been installed with\npkinit support.\n\nEXAMPLES:\n\n Enable anonymous pkinit:\n  ipa pkinit-anonymous enable\n\n Disable anonymous pkinit:\n  ipa pkinit-anonymous disable\n\nFor more information on anonymous pkinit see:\n\nhttp://k5wiki.kerberos.org/wiki/Projects/Anonymous_pkinit\n"
            ],
            "previous_source": "",
            "target": [
                "\nOptions de « pkinit » de Kerberos\n\nActiver ou désactiver l'opération « pkinit » anonyme en utilisant le\nprincipal WELLKNOWN/ANONYMOUS@REALM. Le serveur doit avoir\nété installé avec la prise en charge de « pkinit ».\n\nEXEMPLES :\n\n Activer le « pkinit » anonyme :\n  ipa pkinit-anonymous enable\n\n Désactiver le « pkinit » anonyme :\n  ipa pkinit-anonymous disable\n\nPour plus d'informations sur « pkinit » anonyme, cf. :\n\nhttp://k5wiki.kerberos.org/wiki/Projects/Anonymous_pkinit\n"
            ],
            "id_hash": -4050608456129728643,
            "content_hash": -4050608456129728643,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 1139,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 42,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717753/?format=api",
            "priority": 100,
            "id": 2722368,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=47c95911f831af7d",
            "url": "https://translate.fedoraproject.org/api/units/2722368/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.249931Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nKerberos ticket policy\n\nThere is a single Kerberos ticket policy. This policy defines the\nmaximum ticket lifetime and the maximum renewal age, the period during\nwhich the ticket is renewable.\n\nYou can also create a per-user ticket policy by specifying the user login.\n\nFor changes to the global policy to take effect, restarting the KDC service\nis required, which can be achieved using:\n\nservice krb5kdc restart\n\nChanges to per-user policies take effect immediately for newly requested\ntickets (e.g. when the user next runs kinit).\n\nEXAMPLES:\n\n Display the current Kerberos ticket policy:\n  ipa krbtpolicy-show\n\n Reset the policy to the default:\n  ipa krbtpolicy-reset\n\n Modify the policy to 8 hours max life, 1-day max renewal:\n  ipa krbtpolicy-mod --maxlife=28800 --maxrenew=86400\n\n Display effective Kerberos ticket policy for user 'admin':\n  ipa krbtpolicy-show admin\n\n Reset per-user policy for user 'admin':\n  ipa krbtpolicy-reset admin\n\n Modify per-user policy for user 'admin':\n  ipa krbtpolicy-mod admin --maxlife=3600\n"
            ],
            "previous_source": "",
            "target": [
                "\nPolitique de tickets Kerberos\n\nIl n'existe qu'une seule politique de ticket Kerberos. Cette politique\ndéfinit la durée de vie maximale des tickets, ainsi que la durée maximale de\nla période de renouvellement, temps pendant lequel le ticket est renouvelable.\n\nVous pouvez aussi créer une politique de ticket par utilisateur en indiquant\nl'identifiant de l'utilisateur.\n\nPour que les changements à la politique globale s'appliquent, il est \nnécessaire de redémarrer le service KDC, par exemple :\n\nservice krb5kdc restart\n\nLes changements d'une politique propre à un utilisateur prennent effet\nimmédiatement pour les tickets nouvellement demandés (i.e. au lancement\nsuivant de « kinit » par l'utilsateur).\n\nEXEMPLES :\n\n Affiche la politique de ticket Kerberos en cours :\n  ipa krbtpolicy-show\n\n Réinitialise la politique aux valeurs par défaut :\n  ipa krbtpolicy-reset\n\n Modifie la politique à 8 heures de durée de vie, 1 journée de durée\n maximale de renouvellement :\n  ipa krbtpolicy-mod --maxlife=28800 --maxrenew=86400\n\n Affiche la politique de ticket Kerberos effective pour l'utilisateur\n « admin » :\n  ipa krbtpolicy-show admin\n\n Réinitialise la politique de ticket Kerberos de l'utilisateur « admin » :\n  ipa krbtpolicy-reset admin\n\n Modifie la politique de ticket Kerberos de l'utilisateur 'admin' :\n  ipa krbtpolicy-mod admin --maxlife=3600\n"
            ],
            "id_hash": 6615733854207734066,
            "content_hash": 6615733854207734066,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 20,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 943,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 146,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717755/?format=api",
            "priority": 100,
            "id": 2722369,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=dbcfcee38493f132",
            "url": "https://translate.fedoraproject.org/api/units/2722369/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-03-25T09:49:40.265781Z"
        }
    ]
}