Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/freeipa/ipa-4-8/fr/units/?format=api&page=93
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 4657,
    "next": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/units/?format=api&page=94",
    "previous": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/units/?format=api&page=92",
    "results": [
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nHBAC Service Groups\n\nHBAC service groups can contain any number of individual services,\nor \"members\". Every group must have a description.\n\nEXAMPLES:\n\n Add a new HBAC service group:\n   ipa hbacsvcgroup-add --desc=\"login services\" login\n\n Add members to an HBAC service group:\n   ipa hbacsvcgroup-add-member --hbacsvcs=sshd,login login\n\n Display information about a named group:\n   ipa hbacsvcgroup-show login\n\n Add a new group to the \"login\" group:\n   ipa hbacsvcgroup-add --desc=\"switch users\" login\n   ipa hbacsvcgroup-add-member --hbacsvcs=su,su-l login\n\n Delete an HBAC service group:\n   ipa hbacsvcgroup-del login\n"
            ],
            "previous_source": "\nHBAC Service Groups\n\nHBAC service groups can contain any number of individual services,\nor \"members\". Every group must have a description.\n\nEXAMPLES:\n\n Add a new HBAC service group:\n   ipa hbacsvcgroup-add --desc=\"login services\" login\n\n Add members to an HBAC service group:\n   ipa hbacsvcgroup-add-member --hbacsvcs=sshd --hbacsvcs=login login\n\n Display information about a named group:\n   ipa hbacsvcgroup-show login\n\n Delete an HBAC service group:\n   ipa hbacsvcgroup-del login\n",
            "target": [
                "\nGroupes de services HBAC\n\nLes groupes de services HBAC peuvent contenir n'importe quel nombre de\nservices « membres » individuels. Chaque groupe doit avoir une description.\n\nEXEMPLES:\n\n Ajouter un nouveau groupe de services HBAC :\n   ipa hbacsvcgroup-add --desc=\"login services\" login\n\n Ajouter des membres à un groupe de services HBAC :\n   ipa hbacsvcgroup-add-member --hbacsvcs=sshd --hbacsvcs=login login\n\n Afficher les informations d'un groupe nommé :\n   ipa hbacsvcgroup-show login\n\n Supprimer un groupe de services HBAC :\n   ipa hbacsvcgroup-del login\n"
            ],
            "id_hash": 3482303508967530208,
            "content_hash": 3482303508967530208,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1943,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 78,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727836/?format=api",
            "priority": 100,
            "id": 4709936,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=b053a097641b1ee0",
            "url": "https://translate.fedoraproject.org/api/units/4709936/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.309971Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nSimulate use of Host-based access controls\n\nHBAC rules control who can access what services on what hosts and from where.\nYou can use HBAC to control which users or groups can access a service,\nor group of services, on a target host.\n\nSince applying HBAC rules implies use of a production environment,\nthis plugin aims to provide simulation of HBAC rules evaluation without\nhaving access to the production environment.\n\n Test user coming to a service on a named host against\n existing enabled rules.\n\n ipa hbactest --user= --host= --service=\n              [--rules=rules-list] [--nodetail] [--enabled] [--disabled]\n              [--srchost= ] [--sizelimit= ]\n\n --user, --host, and --service are mandatory, others are optional.\n\n If --rules is specified simulate enabling of the specified rules and test\n the login of the user using only these rules.\n\n If --enabled is specified, all enabled HBAC rules will be added to simulation\n\n If --disabled is specified, all disabled HBAC rules will be added to simulation\n\n If --nodetail is specified, do not return information about rules matched/not matched.\n\n If both --rules and --enabled are specified, apply simulation to --rules _and_\n all IPA enabled rules.\n\n If no --rules specified, simulation is run against all IPA enabled rules.\n By default there is a IPA-wide limit to number of entries fetched, you can change it\n with --sizelimit option.\n\n If --srchost is specified, it will be ignored. It is left because of compatibility reasons only.\n\nEXAMPLES:\n\n    1. Use all enabled HBAC rules in IPA database to simulate:\n    $ ipa  hbactest --user=a1a --host=bar --service=sshd\n    --------------------\n    Access granted: True\n    --------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n      matched: allow_all\n\n    2. Disable detailed summary of how rules were applied:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --nodetail\n    --------------------\n    Access granted: True\n    --------------------\n\n    3. Test explicitly specified HBAC rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=my-second-rule,myrule\n    ---------------------\n    Access granted: False\n    ---------------------\n      notmatched: my-second-rule\n      notmatched: myrule\n\n    4. Use all enabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=my-second-rule,myrule --enabled\n    --------------------\n    Access granted: True\n    --------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n      matched: allow_all\n\n    5. Test all disabled HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      notmatched: new-rule\n\n    6. Test all disabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=my-second-rule,myrule --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n\n    7. Test all (enabled and disabled) HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --enabled --disabled\n    --------------------\n    Access granted: True\n    --------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n      notmatched: new-rule\n      matched: allow_all\n"
            ],
            "previous_source": "\nSimulate use of Host-based access controls\n\nHBAC rules control who can access what services on what hosts.\nYou can use HBAC to control which users or groups can access a service,\nor group of services, on a target host.\n\nSince applying HBAC rules implies use of a production environment,\nthis plugin aims to provide simulation of HBAC rules evaluation without\nhaving access to the production environment.\n\n Test user coming to a service on a named host against\n existing enabled rules.\n\n ipa hbactest --user= --host= --service=\n              [--rules=rules-list] [--nodetail] [--enabled] [--disabled]\n              [--sizelimit= ]\n\n --user, --host, and --service are mandatory, others are optional.\n\n If --rules is specified simulate enabling of the specified rules and test\n the login of the user using only these rules.\n\n If --enabled is specified, all enabled HBAC rules will be added to simulation\n\n If --disabled is specified, all disabled HBAC rules will be added to simulation\n\n If --nodetail is specified, do not return information about rules matched/not matched.\n\n If both --rules and --enabled are specified, apply simulation to --rules _and_\n all IPA enabled rules.\n\n If no --rules specified, simulation is run against all IPA enabled rules.\n By default there is a IPA-wide limit to number of entries fetched, you can change it\n with --sizelimit option.\n\nEXAMPLES:\n\n    1. Use all enabled HBAC rules in IPA database to simulate:\n    $ ipa  hbactest --user=a1a --host=bar --service=sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    2. Disable detailed summary of how rules were applied:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --nodetail\n    --------------------\n    Access granted: True\n    --------------------\n\n    3. Test explicitly specified HBAC rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --rules=myrule --rules=my-second-rule\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: myrule\n\n    4. Use all enabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --rules=myrule --rules=my-second-rule --enabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    5. Test all disabled HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: new-rule\n\n    6. Test all disabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --rules=myrule --rules=my-second-rule --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n\n    7. Test all (enabled and disabled) HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --enabled --disabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Not matched rules: new-rule\n      Matched rules: allow_all\n\n\nHBACTEST AND TRUSTED DOMAINS\n\nWhen an external trusted domain is configured in IPA, HBAC rules are also applied\non users accessing IPA resources from the trusted domain. Trusted domain users and\ngroups (and their SIDs) can be then assigned to external groups which can be\nmembers of POSIX groups in IPA which can be used in HBAC rules and thus allowing\naccess to resources protected by the HBAC system.\n\nhbactest plugin is capable of testing access for both local IPA users and users\nfrom the trusted domains, either by a fully qualified user name or by user SID.\nSuch user names need to have a trusted domain specified as a short name\n(DOMAIN\\Administrator) or with a user principal name (UPN), Administrator@ad.test.\n\nPlease note that hbactest executed with a trusted domain user as --user parameter\ncan be only run by members of \"trust admins\" group.\n\nEXAMPLES:\n\n    1. Test if a user from a trusted domain specified by its shortname matches any\n       rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Administrator' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    2. Test if a user from a trusted domain specified by its domain name matches\n       any rule:\n\n    $ ipa hbactest --user 'Administrator@domain.com' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    3. Test if a user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-500 \\\n            --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    4. Test if other user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-1203 \\\n            --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n\n   5. Test if other user from a trusted domain specified by its shortname matches\n       any rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Otheruser' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n",
            "target": [
                "\nSimuler l'utilisation des contrôles d'accès fondés sur l'hôte\n\nLes règles HBAC contrôlent qui peut accéder à quel service sur quels hôtes.\nVous pouvez utiliser HBAC pour contrôler quels utilisateurs ou quels groupes\nont accés à un service ou à un groupe de services, sur un hôte cible.\n\nL'application de règles HBAC présuppose un environnement de production ;\nce greffon a pour objet de fournir une simulation de l'évaluation des règles\nHBAC sans nécessiter d'accès à cet environnement.\n\n Tester  l'arrivée d'un utilisateur dans un service sur un hôte donné\n vis à vis des règles actives existantes.\n\nipa hbactest --user= --host= --service=\\\n              [--rules=rules-list] [--nodetail] [--enabled] [--disabled]\\\n              [--sizelimit= ]\n\n--user, --host et --service sont obligatoires, les autres sont optionnelles.\n\n Si --rules est défini, simule l'activation des règles « rules-list » et\n teste la connexion de l'utilisateur uniquement sur ces règles.\n\n Si --enabled est défini, toutes les règles HBAC activées sont ajoutées à\n la simulation\n\n Si --disabled est défini, toutes les règles HBAC désactivées sont ajoutées\n à la simulation\n\n Si --nodetail est défini, il n'est pas renvoyé d'information sur les règles  satisfaites ou non satisfaites.\n\n Si --rules et --enabled sont définis tous deux, la simulation est appliquée\n à --rules _et_ à tous les règles IPA activées.\n\n Si --rules n'est pas défini, la simulation est lancée vis à sis de toutes\n les règles IPA activées.\n Par défaut, il y a une limite globale IPA pour le nombre d'entrées\n renvoyées, vous pouvez la modifier avec l'option « --sizelimit ».\n\nEXEMPLES :\n\n    1. Utiliser toutes les règles HBAC activées dans la base de données IPA\n    pour la simulation :\n    $ ipa  hbactest --user=a1a --host=bar --service=sshd\n    --------------------\n    Access granted: True\n    --------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n      matched: allow_all\n\n    2. Désactiver le résumé détaillé sur l'application des règles :\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --nodetail\n    --------------------\n    Access granted: True\n    --------------------\n\n    3. Tester explicitement les règles HBAC indiquées :\n    $ ipa hbactest --user=a1a --host=bar --service=sshd          \n--rules=my-second-rule,myrule\n    ---------------------\n    Access granted: False\n    ---------------------\n      notmatched: my-second-rule\n      notmatched: myrule\n\n    4. Utiliser toutes les règles HBAC activées de la base de données IPA\n       plus les règles explicitement définies :\n    $ ipa hbactest --user=a1a --host=bar --service=sshd          \n--rules=my-second-rule,myrule --enabled\n    --------------------\n    Access granted: True\n    --------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n      matched: allow_all\n\n    5. Tester toutes les règles HBAC désactivées de la base de données IPA :\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      notmatched: new-rule\n\n    6. Tester toutes les règles HBAC désactivées de la base de données IPA\n       plus les règles explicitement définies :\n    $ ipa hbactest --user=a1a --host=bar --service=sshd          \n--rules=my-second-rule,myrule --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n\n    7. Tester toutes les règles HBAC (activées et désactivées) de la base\n       de données IPA :\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --enabled --disabled\n    --------------------\n    Access granted: True\n    --------------------\n      notmatched: my-second-rule\n      notmatched: my-third-rule\n      notmatched: myrule\n      notmatched: new-rule\n      matched: allow_all\n\n\nTEST HBAC ET domaines approuvés\n\nSi un domaine approuvé externe est configuré dans IPA, les règles HBAC\nsont aussi appliquées aux utilisateurs accédant aux ressources IPA à partir\ndu domaine approuvé. Les utilisateurs des domaines approuvés et les\ngroupes (et leur SID) peuvent être assignés à des groupes externes pouvant\nêtre membres de groupes POSIX d'IPA éligibles aux règles HBAC, ce qui\nautorise un accès aux ressources protégées par le système HBAC.\n\nLe greffon « hbactest » peut tester des accès, à la fois d'utilisateurs\nIPA locaux et d'utilisateurs de domaines approuvés à partir, soit du\nnom d'utilisateur pleinement qualifié, soit du SID utilisateur. De tels noms\nd'utilisateur doivent avoir un domaine approuvé précisé comme nom court\n(DOMAINE\\Administrateur) ou avec un nom de principal d'utilisateur (UPN),\nAdministrator@ad.test.\n\nVeuillez noter que « hbactest » exécuté avec un utilisateur de domaine de\nconfiance en tant que paramètre --user ne peut être lancé que par des\nmembres du groupe des « administrateurs de confiance ».\n\nEXEMPLES :\n\n    1. Tester si un utilisateur d'un domaine approuvé défini par son\n       nom court satisfait à toute règle :\n\n    $ ipa hbactest --user 'DOMAIN\\Administrator' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    2. Tester si un utilisateur d'un domaine approuvé défini par son\n       nom de domaine satisfait à toute règle :\n\n    $ ipa hbactest --user 'Administrator@domain.com' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    3. Tester si un utilisateur d'un domaine approuvé défini par son\n       SID satisfait à toute règle :\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-500 \\\n            --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    4. Tester si un autre utilisateur d'un domaine approuvé défini\n       par son SID satisfait à toute règle :\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-1203 \\\n            --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n\n    5. Tester si un autre utilisateur d'un domaine approuvé défini par\n       son nom court satisfait à toute règle :\n\n    $ ipa hbactest --user 'DOMAIN\\Otheruser' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n"
            ],
            "id_hash": 7008914484134093664,
            "content_hash": 7008914484134093664,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1944,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 424,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727954/?format=api",
            "priority": 100,
            "id": 4709938,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=e144aa96a7e72360",
            "url": "https://translate.fedoraproject.org/api/units/4709938/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.353638Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nHosts/Machines\n\nA host represents a machine. It can be used in a number of contexts:\n- service entries are associated with a host\n- a host stores the host/ service principal\n- a host can be used in Host-based Access Control (HBAC) rules\n- every enrolled client generates a host entry\n\nENROLLMENT:\n\nThere are three enrollment scenarios when enrolling a new client:\n\n1. You are enrolling as a full administrator. The host entry may exist\n   or not. A full administrator is a member of the hostadmin role\n   or the admins group.\n2. You are enrolling as a limited administrator. The host must already\n   exist. A limited administrator is a member a role with the\n   Host Enrollment privilege.\n3. The host has been created with a one-time password.\n\nA host can only be enrolled once. If a client has enrolled and needs to\nbe re-enrolled, the host entry must be removed and re-created. Note that\nre-creating the host entry will result in all services for the host being\nremoved, and all SSL certificates associated with those services being\nrevoked.\n\nA host can optionally store information such as where it is located,\nthe OS that it runs, etc.\n\nEXAMPLES:\n\n Add a new host:\n   ipa host-add --location=\"3rd floor lab\" --locality=Dallas test.example.com\n\n Delete a host:\n   ipa host-del test.example.com\n\n Add a new host with a one-time password:\n   ipa host-add --os='Fedora 12' --password=Secret123 test.example.com\n\n Add a new host with a random one-time password:\n   ipa host-add --os='Fedora 12' --random test.example.com\n\n Modify information about a host:\n   ipa host-mod --os='Fedora 12' test.example.com\n\n Remove SSH public keys of a host and update DNS to reflect this change:\n   ipa host-mod --sshpubkey= --updatedns test.example.com\n\n Disable the host Kerberos key, SSL certificate and all of its services:\n   ipa host-disable test.example.com\n\n Add a host that can manage this host's keytab and certificate:\n   ipa host-add-managedby --hosts=test2 test\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5530307027032549686,
            "content_hash": 5530307027032549686,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1946,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 302,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727845/?format=api",
            "priority": 100,
            "id": 4709940,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=ccbf98f0b51f2936",
            "url": "https://translate.fedoraproject.org/api/units/4709940/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.415098Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroups of hosts.\n\nManage groups of hosts. This is useful for applying access control to a\nnumber of hosts by using Host-based Access Control.\n\nEXAMPLES:\n\n Add a new host group:\n   ipa hostgroup-add --desc=\"Baltimore hosts\" baltimore\n\n Add another new host group:\n   ipa hostgroup-add --desc=\"Maryland hosts\" maryland\n\n Add members to the hostgroup:\n   ipa hostgroup-add-member --hosts=box1,box2,box3 baltimore\n\n Add a hostgroup as a member of another hostgroup:\n   ipa hostgroup-add-member --hostgroups=baltimore maryland\n\n Remove a host from the hostgroup:\n   ipa hostgroup-remove-member --hosts=box2 baltimore\n\n Display a host group:\n   ipa hostgroup-show baltimore\n\n Delete a hostgroup:\n   ipa hostgroup-del baltimore\n"
            ],
            "previous_source": "\nGroups of hosts.\n\nManage groups of hosts. This is useful for applying access control to a\nnumber of hosts by using Host-based Access Control.\n\nEXAMPLES:\n\n Add a new host group:\n   ipa hostgroup-add --desc=\"Baltimore hosts\" baltimore\n\n Add another new host group:\n   ipa hostgroup-add --desc=\"Maryland hosts\" maryland\n\n Add members to the hostgroup (using Bash brace expansion):\n   ipa hostgroup-add-member --hosts={box1,box2,box3} baltimore\n\n Add a hostgroup as a member of another hostgroup:\n   ipa hostgroup-add-member --hostgroups=baltimore maryland\n\n Remove a host from the hostgroup:\n   ipa hostgroup-remove-member --hosts=box2 baltimore\n\n Display a host group:\n   ipa hostgroup-show baltimore\n\n Delete a hostgroup:\n   ipa hostgroup-del baltimore\n",
            "target": [
                "\nGroupes d'hôtes.\n\nGestion des groupes d'hôtes. Permet d'appliquer des contrôles d'accès\nà plusieurs hôtes en utilisant HBAC (Host-based Access Control).\n\nEXEMPLES :\n\n Ajouter un nouveau groupe d'hôtes :\n   ipa hostgroup-add --desc=\"Systèmes de Baltimore\" baltimore\n\n Ajouter un nouveau groupe d'hôtes :\n   ipa hostgroup-add --desc=\"Systèmes du Maryland\" maryland\n\n Ajouter des membres à un groupe d'hôtes :\n   ipa hostgroup-add-member --hosts={box1,box2,box3} baltimore\n\n Ajouter un groupe d'hôtes en tant que membre d'un autre groupe d'hôtes :\n   ipa hostgroup-add-member --hostgroups=baltimore maryland\n\n Supprimer un hôte d'un groupe :\n   ipa hostgroup-remove-member --hosts=box2 baltimore\n\n Afficher un groupe d'hôtes :\n   ipa hostgroup-show baltimore\n\n Supprimer un groupe d'hôtes :\n   ipa hostgroup-del baltimore\n"
            ],
            "id_hash": 2740767332150940521,
            "content_hash": 2740767332150940521,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1947,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 90,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727828/?format=api",
            "priority": 100,
            "id": 4709942,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=a609295e0cda1369",
            "url": "https://translate.fedoraproject.org/api/units/4709942/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.439293Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of objectclasses used to search for user entries in DS"
            ],
            "previous_source": "Objectclasses used to search for user entries in DS",
            "target": [
                "Classes d'objets à utiliser pour la recherche d'entrées utilisateurs dans DS"
            ],
            "id_hash": -6942514064740448019,
            "content_hash": -6942514064740448019,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1948,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729028/?format=api",
            "priority": 100,
            "id": 4709944,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=1fa73c3dbafe08ed",
            "url": "https://translate.fedoraproject.org/api/units/4709944/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.466061Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of objectclasses used to search for group entries in DS"
            ],
            "previous_source": "Objectclasses used to search for group entries in DS",
            "target": [
                "Classes d'objets à utiliser pour la recherche d'entrées groupe dans DS"
            ],
            "id_hash": 4651452904136525186,
            "content_hash": 4651452904136525186,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1949,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729026/?format=api",
            "priority": 100,
            "id": 4709945,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=c08d47c598844582",
            "url": "https://translate.fedoraproject.org/api/units/4709945/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.493442Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of objectclasses to be ignored for user entries in DS"
            ],
            "previous_source": "Objectclasses to be ignored for user entries in DS",
            "target": [
                "Classes d'objets à ignorer pour des entrées utilisateur dans DS"
            ],
            "id_hash": 3267624144173777404,
            "content_hash": 3267624144173777404,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1950,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729024/?format=api",
            "priority": 100,
            "id": 4709947,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=ad58eed8b4f7c1fc",
            "url": "https://translate.fedoraproject.org/api/units/4709947/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.514090Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of attributes to be ignored for user entries in DS"
            ],
            "previous_source": "Attributes to be ignored for user entries in DS",
            "target": [
                "Attributs à ignorer dans des entrées utilisateur dans DS"
            ],
            "id_hash": 6664805115903626438,
            "content_hash": 6664805115903626438,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1951,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729020/?format=api",
            "priority": 100,
            "id": 4709948,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=dc7e24f0f6a44cc6",
            "url": "https://translate.fedoraproject.org/api/units/4709948/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.556919Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of objectclasses to be ignored for group entries in DS"
            ],
            "previous_source": "Objectclasses to be ignored for group entries in DS",
            "target": [
                "Classes d'objets à ignorer pour les entrées groupe dans DS"
            ],
            "id_hash": -7675309053729116390,
            "content_hash": -7675309053729116390,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1952,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729022/?format=api",
            "priority": 100,
            "id": 4709950,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=157bd314c722ef1a",
            "url": "https://translate.fedoraproject.org/api/units/4709950/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.588897Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of attributes to be ignored for group entries in DS"
            ],
            "previous_source": "Attributes to be ignored for group entries in DS",
            "target": [
                "Attributs à ignorer dans les entrées groupe dans DS"
            ],
            "id_hash": -9129472374463256215,
            "content_hash": -9129472374463256215,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1953,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729018/?format=api",
            "priority": 100,
            "id": 4709951,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=014d993ed5602969",
            "url": "https://translate.fedoraproject.org/api/units/4709951/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.618192Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of groups to exclude from migration"
            ],
            "previous_source": "groups to exclude from migration",
            "target": [
                "groupes à exclure de la migration"
            ],
            "id_hash": 541182831593099078,
            "content_hash": 541182831593099078,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1954,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732446/?format=api",
            "priority": 100,
            "id": 4709953,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=8782aaeb03a58f46",
            "url": "https://translate.fedoraproject.org/api/units/4709953/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.652291Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of users to exclude from migration"
            ],
            "previous_source": "users to exclude from migration",
            "target": [
                "utilisateurs à exclure de la migration"
            ],
            "id_hash": -1179945810460935014,
            "content_hash": -1179945810460935014,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1955,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732476/?format=api",
            "priority": 100,
            "id": 4709955,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=6f9ffd897943fc9a",
            "url": "https://translate.fedoraproject.org/api/units/4709955/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.671252Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nNetgroups\n\nA netgroup is a group used for permission checking. It can contain both\nuser and host values.\n\nEXAMPLES:\n\n Add a new netgroup:\n   ipa netgroup-add --desc=\"NFS admins\" admins\n\n Add members to the netgroup:\n   ipa netgroup-add-member --users=tuser1,tuser2 admins\n\n Remove a member from the netgroup:\n   ipa netgroup-remove-member --users=tuser2 admins\n\n Display information about a netgroup:\n   ipa netgroup-show admins\n\n Delete a netgroup:\n   ipa netgroup-del admins\n"
            ],
            "previous_source": "\nNetgroups\n\nA netgroup is a group used for permission checking. It can contain both\nuser and host values.\n\nEXAMPLES:\n\n Add a new netgroup:\n   ipa netgroup-add --desc=\"NFS admins\" admins\n\n Add members to the netgroup:\n   ipa netgroup-add-member --users=tuser1 --users=tuser2 admins\n\n Remove a member from the netgroup:\n   ipa netgroup-remove-member --users=tuser2 admins\n\n Display information about a netgroup:\n   ipa netgroup-show admins\n\n Delete a netgroup:\n   ipa netgroup-del admins\n",
            "target": [
                "\nGroupes réseau\n\nUn groupe réseau est un groupe utilisé pour la vérification des droits.\nIl peut contenir à la fois des valeurs utilisateur et hôte.\n\nEXEMPLES :\n\n Ajouter un nouveau groupe réseau :\n   ipa netgroup-add --desc=\"NFS admins\" admins\n\n Ajouter des membres au groupe réseau :\n   ipa netgroup-add-member --users=tuser1 --users=tuser2 admins\n\n Retirer un membre du groupe réseau :\n   ipa netgroup-remove-member --users=tuser2 admins\n\n Afficher les informations sur un groupe réseau :\n   ipa netgroup-show admins\n\n Supprimer un groupe réseau :\n   ipa netgroup-del admins\n"
            ],
            "id_hash": -1194418822336998589,
            "content_hash": -1194418822336998589,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1956,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 61,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727899/?format=api",
            "priority": 100,
            "id": 4709956,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=6f6c9268cd901343",
            "url": "https://translate.fedoraproject.org/api/units/4709956/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.693018Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of netgroups to add"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5397818873251763164,
            "content_hash": 5397818873251763164,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1957,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732455/?format=api",
            "priority": 100,
            "id": 4709958,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=cae8e7aa961213dc",
            "url": "https://translate.fedoraproject.org/api/units/4709958/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.730144Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of netgroups to remove"
            ],
            "previous_source": "host groups to remove",
            "target": [
                "groupes d'hôtes à supprimer"
            ],
            "id_hash": -5588354407567252265,
            "content_hash": -5588354407567252265,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1958,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732457/?format=api",
            "priority": 100,
            "id": 4709959,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=32722d4651f724d7",
            "url": "https://translate.fedoraproject.org/api/units/4709959/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.756181Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nPermissions\n\nA permission enables fine-grained delegation of rights. A permission is\na human-readable form of a 389-ds Access Control Rule, or instruction (ACI).\nA permission grants the right to perform a specific task such as adding a\nuser, modifying a group, etc.\n\nA permission may not contain other permissions.\n\n* A permission grants access to read, write, add or delete.\n* A privilege combines similar permissions (for example all the permissions\n  needed to add a user).\n* A role grants a set of privileges to users, groups, hosts or hostgroups.\n\nA permission is made up of a number of different parts:\n\n1. The name of the permission.\n2. The target of the permission.\n3. The rights granted by the permission.\n\nRights define what operations are allowed, and may be one or more\nof the following:\n1. write - write one or more attributes\n2. read - read one or more attributes\n3. add - add a new entry to the tree\n4. delete - delete an existing entry\n5. all - all permissions are granted\n\nRead permission is granted for most attributes by default so the read\npermission is not expected to be used very often.\n\nNote the distinction between attributes and entries. The permissions are\nindependent, so being able to add a user does not mean that the user will\nbe editable.\n\nThere are a number of allowed targets:\n1. type: a type of object (user, group, etc).\n2. memberof: a member of a group or hostgroup\n3. filter: an LDAP filter\n4. subtree: an LDAP filter specifying part of the LDAP DIT. This is a\n   super-set of the \"type\" target.\n5. targetgroup: grant access to modify a specific group (such as granting\n   the rights to manage group membership)\n\nEXAMPLES:\n\n Add a permission that grants the creation of users:\n   ipa permission-add --type=user --permissions=add \"Add Users\"\n\n Add a permission that grants the ability to manage group membership:\n   ipa permission-add --attrs=member --permissions=write --type=group \"Manage Group Members\"\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4788718596259920140,
            "content_hash": -4788718596259920140,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1959,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 325,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717792/?format=api",
            "priority": 100,
            "id": 4709961,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=3d8b0dcef49ec6f4",
            "url": "https://translate.fedoraproject.org/api/units/4709961/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.794193Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Comma-separated list of permissions to grant (read, write, add, delete, all)"
            ],
            "previous_source": "Permissions to grant(read, write, add, delete, all)",
            "target": [
                "Permissions à accorder (« read », « write », « add », « delete », « all »)"
            ],
            "id_hash": -6070325495570885523,
            "content_hash": -6070325495570885523,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1960,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 11,
            "source_unit": "https://translate.fedoraproject.org/api/units/2718590/?format=api",
            "priority": 100,
            "id": 4709963,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=2bc1df1fad80146d",
            "url": "https://translate.fedoraproject.org/api/units/4709963/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.823773Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Type of IPA object (user, group, host, hostgroup, service, netgroup, dns)"
            ],
            "previous_source": "type of IPA object (user, group, host, hostgroup, service, netgroup)",
            "target": [
                "type d'objet IPA (« user », « group », « host », « hostgroup », « service », « netgroup »)"
            ],
            "id_hash": 4985457121026345492,
            "content_hash": 4985457121026345492,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1961,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 11,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721257/?format=api",
            "priority": 100,
            "id": 4709964,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=c52fe6d665b78a14",
            "url": "https://translate.fedoraproject.org/api/units/4709964/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.853318Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Target members of a group"
            ],
            "previous_source": "Member of a group",
            "target": [
                "Membre d'un groupe"
            ],
            "id_hash": 1768950092142997585,
            "content_hash": 1768950092142997585,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1962,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 5,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721090/?format=api",
            "priority": 100,
            "id": 4709966,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=988c92bc8b93f051",
            "url": "https://translate.fedoraproject.org/api/units/4709966/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.880660Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "User group to apply permissions to"
            ],
            "previous_source": "User group to apply permissions to (sets target)",
            "target": [
                "Groupe d'utilisateurs auquel appliquer les permissions (définit « target »)"
            ],
            "id_hash": -5121355664473201707,
            "content_hash": -5121355664473201707,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1963,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721358/?format=api",
            "priority": 100,
            "id": 4709967,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=38ed4a2842a3e3d5",
            "url": "https://translate.fedoraproject.org/api/units/4709967/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.914815Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of privileges to add"
            ],
            "previous_source": "Number of privileges added",
            "target": [
                "Nombre de privilèges ajoutés"
            ],
            "id_hash": 6477086793157997988,
            "content_hash": 6477086793157997988,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1964,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721522/?format=api",
            "priority": 100,
            "id": 4709969,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=d9e33c1f0d8e75a4",
            "url": "https://translate.fedoraproject.org/api/units/4709969/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.944483Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Add a system permission without an ACI"
            ],
            "previous_source": "Add a system permission without an ACI (internal command)",
            "target": [
                "Ajout d'une permission système sans ACI (commande interne)"
            ],
            "id_hash": 2224391651819202407,
            "content_hash": 2224391651819202407,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1965,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2718129/?format=api",
            "priority": 100,
            "id": 4709970,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=9edea06c08072767",
            "url": "https://translate.fedoraproject.org/api/units/4709970/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:21.977904Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Permission type"
            ],
            "previous_source": "Permission name",
            "target": [
                "Nom de permission"
            ],
            "id_hash": -162933721340839954,
            "content_hash": -162933721340839954,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1966,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2720331/?format=api",
            "priority": 100,
            "id": 4709972,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=7dbd24a4c98bf7ee",
            "url": "https://translate.fedoraproject.org/api/units/4709972/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.009092Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of privileges to remove"
            ],
            "previous_source": "Number of privileges removed",
            "target": [
                "Nombre de privilèges retirés"
            ],
            "id_hash": -6837044944487646294,
            "content_hash": -6837044944487646294,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1967,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721524/?format=api",
            "priority": 100,
            "id": 4709973,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=211defd8e26efbaa",
            "url": "https://translate.fedoraproject.org/api/units/4709973/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.034738Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nPing the remote IPA server to ensure it is running.\n\nThe ping command sends an echo request to an IPA server. The server\nreturns its version information. This is used by an IPA client\nto confirm that the server is available and accepting requests.\n\nThe server from xmlrpc_uri in /etc/ipa/default.conf is contacted first.\nIf it does not respond then the client will contact any servers defined\nby ldap SRV records in DNS.\n\nEXAMPLES:\n\n Ping an IPA server:\n   ipa ping\n   ------------------------------------------\n   IPA server version 2.1.9. API version 2.20\n   ------------------------------------------\n\n Ping an IPA server verbosely:\n   ipa -v ping\n   ipa: INFO: trying https://ipa.example.com/ipa/xml\n   ipa: INFO: Forwarding 'ping' to server u'https://ipa.example.com/ipa/xml'\n   -----------------------------------------------------\n   IPA server version 2.1.9. API version 2.20\n   -----------------------------------------------------\n"
            ],
            "previous_source": "\nPing the remote IPA server to ensure it is running.\n\nThe ping command sends an echo request to an IPA server. The server\nreturns its version information. This is used by an IPA client\nto confirm that the server is available and accepting requests.\n\nThe server from xmlrpc_uri in /etc/ipa/default.conf is contacted first.\nIf it does not respond then the client will contact any servers defined\nby ldap SRV records in DNS.\n\nEXAMPLES:\n\n Ping an IPA server:\n   ipa ping\n   ------------------------------------------\n   IPA server version 2.1.9. API version 2.20\n   ------------------------------------------\n\n Ping an IPA server verbosely:\n   ipa -v ping\n   ipa: INFO: trying https://ipa.example.com/ipa/xml\n   ipa: INFO: Forwarding 'ping' to server 'https://ipa.example.com/ipa/xml'\n   -----------------------------------------------------\n   IPA server version 2.1.9. API version 2.20\n   -----------------------------------------------------\n",
            "target": [
                "\n« Ping » sur un serveur IPA distant pour s'assurer de son fonctionnement.\n\nLa commande « ping » envoie une requête « echo « au serveur IPA. Le serveur\nrenvoie ses informations de version. Ce mécanisme est utilisé par le client\nIPA pour confirmer que le serveur est disponible et est en mesure d'accepter\nles requêtes.\n\nLe serveur indiqué par « xmlrpc_uri » dans « /etc/ipa/default.conf » est\ncontacté en premier. S'il ne répond pas alors le client contactera n'importe\nquel autre serveur défini dans les enregistrements SRV du DNS.\n\nEXEMPLES :\n\n « Ping » d'un serveur IPA :\n   ipa ping\n   ------------------------------------------\n   IPA server version 2.1.9. API version 2.20\n   ------------------------------------------\n\n « Ping » verbeux d'un serveur IPA :\n   ipa -v ping\n   ipa: INFO: trying https://ipa.example.com/ipa/xml\n   ipa: INFO: Forwarding 'ping' to server 'https://ipa.example.com/ipa/xml'\n   -----------------------------------------------------\n   IPA server version 2.1.9. API version 2.20\n   -----------------------------------------------------\n"
            ],
            "id_hash": 5087946789067984707,
            "content_hash": 5087946789067984707,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1968,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 116,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717798/?format=api",
            "priority": 100,
            "id": 4709975,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=c69c04a5c67c8f43",
            "url": "https://translate.fedoraproject.org/api/units/4709975/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.067207Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of roles to add"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3470603874415658186,
            "content_hash": 3470603874415658186,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1969,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732467/?format=api",
            "priority": 100,
            "id": 4709978,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=b02a0fd5f2a3c4ca",
            "url": "https://translate.fedoraproject.org/api/units/4709978/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.124858Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of permissions"
            ],
            "previous_source": "Comma separated encryption types list",
            "target": [
                "Liste, séparée par des virgules, des types de chiffrement"
            ],
            "id_hash": -4879062548754521631,
            "content_hash": -4879062548754521631,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1970,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 4,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732459/?format=api",
            "priority": 100,
            "id": 4709979,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=3c4a1676589321e1",
            "url": "https://translate.fedoraproject.org/api/units/4709979/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.152984Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of roles to remove"
            ],
            "previous_source": "A comma-separated list of fields to search in when searching for users",
            "target": [
                "Une liste, séparée avec des virgules, des champs à explorer pour une recherche d'utilisateurs"
            ],
            "id_hash": -1914323507628706451,
            "content_hash": -1914323507628706451,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1971,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732469/?format=api",
            "priority": 100,
            "id": 4709981,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=656ef4e98e9c756d",
            "url": "https://translate.fedoraproject.org/api/units/4709981/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.189663Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of privileges"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2955758138618788505,
            "content_hash": -2955758138618788505,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1972,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 4,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732463/?format=api",
            "priority": 100,
            "id": 4709983,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=56fb09a219a84567",
            "url": "https://translate.fedoraproject.org/api/units/4709983/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.221207Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nSelf-service Permissions\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nA Self-service permission defines what an object can change in its own entry.\n\n\nEXAMPLES:\n\n Add a self-service rule to allow users to manage their address:\n   ipa selfservice-add --permissions=write --attrs=street,postalCode,l,c,st \"Users manage their own address\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones. Add telephoneNumber to the list:\n   ipa selfservice-mod --attrs=street,postalCode,l,c,st,telephoneNumber \"Users manage their own address\"\n\n Display our updated rule:\n   ipa selfservice-show \"Users manage their own address\"\n\n Delete a rule:\n   ipa selfservice-del \"Users manage their own address\"\n"
            ],
            "previous_source": "\nSelf-service Permissions\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nA Self-service permission defines what an object can change in its own entry.\n\n\nEXAMPLES:\n\n Add a self-service rule to allow users to manage their address (using Bash\n brace expansion):\n   ipa selfservice-add --permissions=write --attrs={street,postalCode,l,c,st} \"Users manage their own address\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones.\n Add telephoneNumber to the list (using Bash brace expansion):\n   ipa selfservice-mod --attrs={street,postalCode,l,c,st,telephoneNumber} \"Users manage their own address\"\n\n Display our updated rule:\n   ipa selfservice-show \"Users manage their own address\"\n\n Delete a rule:\n   ipa selfservice-del \"Users manage their own address\"\n",
            "target": [
                "\nPermissions de libre service\n\nUne permission permet d'affiner une délégation de permissions. Les règles ou\ninstructions de contrôle d'accès (ACI) accordent la permission de donner les\npermissions d'effectuer des tâches données comme ajouter un utilisateur,\nmodifier un groupe, etc.\n\nUne permission de libre service définit ce qu'un objet peut modifier dans sa\npropre entrée.\n\n\nEXEMPLES :\n\n Ajouter une règle de libre service permettant aux utilisateurs de gérer\nleurs adresses (avec les extensions entre accolades de Bash) :\n   ipa selfservice-add --permissions=write --attrs={street,postalCode,l,c,st} \"Users manage their own address\"\n\n En gérant les listes d'attributs, vous devez incorporer tous les attributs\ndans la liste, y compris les existants.\n Ajouter « telephoneNumber » à la liste (avec extension entre accolades Bash) :\n   ipa selfservice-mod --attrs={street,postalCode,l,c,st,telephoneNumber} \"Users manage their own address\"\n\n Afficher la règle modifiée :\n   ipa selfservice-show \"Users manage their own address\"\n\n Supprimer une règle :\n   ipa selfservice-del \"Users manage their own address\"\n"
            ],
            "id_hash": -130140641994351122,
            "content_hash": -130140641994351122,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1973,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 118,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717828/?format=api",
            "priority": 100,
            "id": 4709984,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=7e31a5c68f15ddee",
            "url": "https://translate.fedoraproject.org/api/units/4709984/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.252379Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nServices\n\nA IPA service represents a service that runs on a host. The IPA service\nrecord can store a Kerberos principal, an SSL certificate, or both.\n\nAn IPA service can be managed directly from a machine, provided that\nmachine has been given the correct permission. This is true even for\nmachines other than the one the service is associated with. For example,\nrequesting an SSL certificate using the host service principal credentials\nof the host. To manage a service using host credentials you need to\nkinit as the host:\n\n # kinit -kt /etc/krb5.keytab host/ipa.example.com@EXAMPLE.COM\n\nAdding an IPA service allows the associated service to request an SSL\ncertificate or keytab, but this is performed as a separate step; they\nare not produced as a result of adding the service.\n\nOnly the public aspect of a certificate is stored in a service record;\nthe private key is not stored.\n\nEXAMPLES:\n\n Add a new IPA service:\n   ipa service-add HTTP/web.example.com\n\n Allow a host to manage an IPA service certificate:\n   ipa service-add-host --hosts=web.example.com HTTP/web.example.com\n   ipa role-add-member --hosts=web.example.com certadmin\n\n Override a default list of supported PAC types for the service:\n   ipa service-mod HTTP/web.example.com --pac-type=MS-PAC\n\n Delete an IPA service:\n   ipa service-del HTTP/web.example.com\n\n Find all IPA services associated with a host:\n   ipa service-find web.example.com\n\n Find all HTTP services:\n   ipa service-find HTTP\n\n Disable the service Kerberos key and SSL certificate:\n   ipa service-disable HTTP/web.example.com\n\n Request a certificate for an IPA service:\n   ipa cert-request --principal=HTTP/web.example.com example.csr\n\n Generate and retrieve a keytab for an IPA service:\n   ipa-getkeytab -s ipa.example.com -p HTTP/web.example.com -k /etc/httpd/httpd.keytab\n"
            ],
            "previous_source": "\nServices\n\nA IPA service represents a service that runs on a host. The IPA service\nrecord can store a Kerberos principal, an SSL certificate, or both.\n\nAn IPA service can be managed directly from a machine, provided that\nmachine has been given the correct permission. This is true even for\nmachines other than the one the service is associated with. For example,\nrequesting an SSL certificate using the host service principal credentials\nof the host. To manage a service using host credentials you need to\nkinit as the host:\n\n # kinit -kt /etc/krb5.keytab host/ipa.example.com@EXAMPLE.COM\n\nAdding an IPA service allows the associated service to request an SSL\ncertificate or keytab, but this is performed as a separate step; they\nare not produced as a result of adding the service.\n\nOnly the public aspect of a certificate is stored in a service record;\nthe private key is not stored.\n\nEXAMPLES:\n\n Add a new IPA service:\n   ipa service-add HTTP/web.example.com\n\n Allow a host to manage an IPA service certificate:\n   ipa service-add-host --hosts=web.example.com HTTP/web.example.com\n   ipa role-add-member --hosts=web.example.com certadmin\n\n Override a default list of supported PAC types for the service:\n   ipa service-mod HTTP/web.example.com --pac-type=MS-PAC\n\n   A typical use case where overriding the PAC type is needed is NFS.\n   Currently the related code in the Linux kernel can only handle Kerberos\n   tickets up to a maximal size. Since the PAC data can become quite large it\n   is recommended to set --pac-type=NONE for NFS services.\n\n Delete an IPA service:\n   ipa service-del HTTP/web.example.com\n\n Find all IPA services associated with a host:\n   ipa service-find web.example.com\n\n Find all HTTP services:\n   ipa service-find HTTP\n\n Disable the service Kerberos key and SSL certificate:\n   ipa service-disable HTTP/web.example.com\n\n Request a certificate for an IPA service:\n   ipa cert-request --principal=HTTP/web.example.com example.csr\n",
            "target": [
                "\nServices\n\nUn service IPA représente un service qui s'exécute sur un hôte. L'enregistrement du\nservice IPA peut contenir un principal Kerberos, un certificat SSL ou les deux.\n\nUn service IPA peut être directement géré à partir d'une machine, pour\nautant que des permissions adéquates aient été données à la machine. Ceci\nest vrai même pour les machines autres que celle à laquelle le service est\nassocié. Par exemple, demander un certificat SSL en utilisant les\njustificatifs d'identité du principal du service de l'hôte. Pour gérer un\nservice en utilisant les références de l'hôte, vous devrez exécuter\n« kinit » en tant qu'hôte :\n\n # kinit -kt /etc/krb5.keytab host/ipa.example.com@EXAMPLE.COM\n\nAjouter un service IPA permet au service associé de demander un certificat\nSSL ou un tableau de clés, mais cela est réalisé dans une étape distincte ;\ncela n'est pas le résultat de l'ajout du service.\n\nSeule la composante publique du certificat est stockée dans un\nenregistrement de service ; la clé privée n'y est pas enregistrée.\n\nEXEMPLES :\n\n Ajouter un nouveau service IPA :\n   ipa service-add HTTP/web.example.com\n\n Autoriser un hôte à gérer un certificat de service IPA :\n   ipa service-add-host --hosts=web.example.com HTTP/web.example.com\n   ipa role-add-member --hosts=web.example.com certadmin\n\n Écraser la liste par défaut des types PAC pris en charge pour le service :\n   ipa service-mod HTTP/web.example.com --pac-type=MS-PAC\n\n   NFS est un cas classique où la surcharge du type PAC est nécessaire.\n   Actuellement, le code relatif à cette fonction dans le noyau Linux ne gère\n   les tickets Kerberos que jusqu'à une taille maximale donnée. Comme les\n   données PAC peuvent devenir bien plus grandes, il est recommandé de fixer\n   « --pac-type=NONE » pour les services NFS.\n\n Supprimer un service IPA :\n   ipa service-del HTTP/web.example.com\n\n Trouver tous les services IPA associés à un hôte :\n   ipa service-find web.example.com\n\n Trouver tous les service HTTP :\n   ipa service-find HTTP\n\n Désactiver la clé Kerberos et le certificat SSL d'un service :\n   ipa service-disable HTTP/web.example.com\n\n Demander un certificat pour un service IPA :\n   ipa cert-request --principal=HTTP/web.example.com example.csr\n"
            ],
            "id_hash": -8249761538065651413,
            "content_hash": -8249761538065651413,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1974,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 251,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717832/?format=api",
            "priority": 100,
            "id": 4709986,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=0d82f59719eaa92b",
            "url": "https://translate.fedoraproject.org/api/units/4709986/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.308195Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Override default list of supported PAC types. Use 'NONE' to disable PAC support for this service"
            ],
            "previous_source": "Override default list of supported PAC types. Use 'NONE' to disable PAC support for this service, e.g. this might be necessary for NFS services.",
            "target": [
                "Surcharger la liste par défaut des types PAC pris en charge. Utiliser « NONE » pour désactiver la prise en charge PAC pour ce service, ce qui peut être nécessaire pour les services NFS par exemple."
            ],
            "id_hash": -7292362268417784166,
            "content_hash": -7292362268417784166,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1975,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 16,
            "source_unit": "https://translate.fedoraproject.org/api/units/2720263/?format=api",
            "priority": 100,
            "id": 4709988,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=1acc5327497f069a",
            "url": "https://translate.fedoraproject.org/api/units/4709988/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.369901Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nGroups of Sudo Commands\n\nManage groups of Sudo Commands.\n\nEXAMPLES:\n\n Add a new Sudo Command Group:\n   ipa sudocmdgroup-add --desc='administrators commands' admincmds\n\n Remove a Sudo Command Group:\n   ipa sudocmdgroup-del admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less,/usr/bin/vim admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa group-remove-member --sudocmds=/usr/bin/less admincmds\n\n Show a Sudo Command Group:\n   ipa group-show localadmins\n"
            ],
            "previous_source": "\nGroups of Sudo Commands\n\nManage groups of Sudo Commands.\n\nEXAMPLES:\n\n Add a new Sudo Command Group:\n   ipa sudocmdgroup-add --desc='administrators commands' admincmds\n\n Remove a Sudo Command Group:\n   ipa sudocmdgroup-del admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less --sudocmds=/usr/bin/vim admincmds\n\n Manage Sudo Command Group membership, commands:\n   ipa group-remove-member --sudocmds=/usr/bin/less admincmds\n\n Show a Sudo Command Group:\n   ipa group-show localadmins\n",
            "target": [
                "\nGroupes de commandes sudo\n\nAdministre les groupes de commandes sudo.\n\nEXEMPLES :\n\n Ajouter un nouveau groupe de commandes sudo :\n   ipa sudocmdgroup-add --desc='commandes administrateurs' admincmds\n\n Supprimer un groupe de commandes sudo :\n   ipa sudocmdgroup-del admincmds\n\n Gérer  les commandes, l'appartenance d'un groupe de commandes sudo :\n   ipa sudocmdgroup-add-member --sudocmds=/usr/bin/less --sudocmds=/usr/bin/vim admincmds\n\n Administrer  les commandes, l'appartenance d'un groupe de commandes sudo :\n   ipa group-remove-member --sudocmds=/usr/bin/less admincmds\n\n Afficher un groupe de commandes sudo :\n   ipa group-show localadmins\n"
            ],
            "id_hash": 383893297885557528,
            "content_hash": 383893297885557528,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1976,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 57,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717724/?format=api",
            "priority": 100,
            "id": 4709991,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=8553dceba41f3318",
            "url": "https://translate.fedoraproject.org/api/units/4709991/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.409322Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of sudo commands to add"
            ],
            "previous_source": "sudo commands to add",
            "target": [
                "commandes sudo à ajouter"
            ],
            "id_hash": -3884508513524747018,
            "content_hash": -3884508513524747018,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1977,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721530/?format=api",
            "priority": 100,
            "id": 4709992,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=4a177416846074f6",
            "url": "https://translate.fedoraproject.org/api/units/4709992/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.436620Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of sudo commands to remove"
            ],
            "previous_source": "sudo commands to remove",
            "target": [
                "commandes sudo à supprimer"
            ],
            "id_hash": -1997292512804198041,
            "content_hash": -1997292512804198041,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1978,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 7,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721532/?format=api",
            "priority": 100,
            "id": 4709994,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=6448310aadc22967",
            "url": "https://translate.fedoraproject.org/api/units/4709994/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.462153Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nSudo Rules\n\nSudo (su \"do\") allows a system administrator to delegate authority to\ngive certain users (or groups of users) the ability to run some (or all)\ncommands as root or another user while providing an audit trail of the\ncommands and their arguments.\n\nFreeIPA provides a means to configure the various aspects of Sudo:\n   Users: The user(s)/group(s) allowed to invoke Sudo.\n   Hosts: The host(s)/hostgroup(s) which the user is allowed to to invoke Sudo.\n   Allow Command: The specific command(s) permitted to be run via Sudo.\n   Deny Command: The specific command(s) prohibited to be run via Sudo.\n   RunAsUser: The user(s) or group(s) of users whose rights Sudo will be invoked with.\n   RunAsGroup: The group(s) whose gid rights Sudo will be invoked with.\n   Options: The various Sudoers Options that can modify Sudo's behavior.\n\nAn order can be added to a sudorule to control the order in which they\nare evaluated (if the client supports it). This order is an integer and\nmust be unique.\n\nFreeIPA provides a designated binddn to use with Sudo located at:\nuid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com\n\nTo enable the binddn run the following command to set the password:\nLDAPTLS_CACERT=/etc/ipa/ca.crt /usr/bin/ldappasswd -S -W -h ipa.example.com -ZZ -D \"cn=Directory Manager\" uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com\n\nFor more information, see the FreeIPA Documentation to Sudo.\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5286877255075372738,
            "content_hash": 5286877255075372738,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1979,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 206,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717844/?format=api",
            "priority": 100,
            "id": 4709995,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=c95ec2da37dc1ec2",
            "url": "https://translate.fedoraproject.org/api/units/4709995/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.489413Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of sudo command groups to add"
            ],
            "previous_source": "A comma-separated list of fields to search in when searching for groups",
            "target": [
                "Une liste séparée par des virgules des champs à explorer pour une recherche de groupes"
            ],
            "id_hash": -5243445014343922224,
            "content_hash": -5243445014343922224,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1980,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721526/?format=api",
            "priority": 100,
            "id": 4709997,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=373b8a8a58bccdd0",
            "url": "https://translate.fedoraproject.org/api/units/4709997/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.517782Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "comma-separated list of sudo command groups to remove"
            ],
            "previous_source": "sudo commands to remove",
            "target": [
                "commandes sudo à supprimer"
            ],
            "id_hash": 5951195946405717240,
            "content_hash": 5951195946405717240,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1981,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/2721528/?format=api",
            "priority": 100,
            "id": 4709999,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=d296e52eb641e4f8",
            "url": "https://translate.fedoraproject.org/api/units/4709999/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.557829Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "GECOS field"
            ],
            "previous_source": "GECOS",
            "target": [
                "GECOS"
            ],
            "id_hash": -2752455338479611172,
            "content_hash": -2752455338479611172,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1983,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 2,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727517/?format=api",
            "priority": 100,
            "id": 4710000,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=59cd5073e9cb92dc",
            "url": "https://translate.fedoraproject.org/api/units/4710000/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.599261Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nID ranges\n\nManage ID ranges  used to map Posix IDs to SIDs and back.\n\nThere are two type of ID ranges which are both handled by this utility:\n\n - the ID ranges of the local domain\n - the ID ranges of trusted remote domains\n\nBoth types have the following attributes in common:\n\n - base-id: the first ID of the Posix ID range\n - range-size: the size of the range\n\nWith those two attributes a range object can reserve the Posix IDs starting\nwith base-id up to but not including base-id+range-size exclusively.\n\nAdditionally an ID range of the local domain may set\n - rid-base: the first RID(*) of the corresponding RID range\n - secondary-rid-base: first RID of the secondary RID range\n\nand an ID range of a trusted domain must set\n - rid-base: the first RID of the corresponding RID range\n - dom_sid: domain SID of the trusted domain\n\n\n\nEXAMPLE: Add a new ID range for a trusted domain\n\nSince there might be more than one trusted domain the domain SID must be given\nwhile creating the ID range.\n\n  ipa idrange-add --base-id=1200000 --range-size=200000 --rid-base=0                   --dom-sid=S-1-5-21-123-456-789 trusted_dom_range\n\nThis ID range is then used by the IPA server and the SSSD IPA provider to\nassign Posix UIDs to users from the trusted domain.\n\nIf e.g. a range for a trusted domain is configured with the following values:\n base-id = 1200000\n range-size = 200000\n rid-base = 0\nthe RIDs 0 to 199999 are mapped to the Posix ID from 1200000 to 13999999. So\nRID 1000 <-> Posix ID 1201000\n\n\n\nEXAMPLE: Add a new ID range for the local domain\n\nTo create an ID range for the local domain it is not necessary to specify a\ndomain SID. But since it is possible that a user and a group can have the same\nvalue as Posix ID a second RID interval is needed to handle conflicts.\n\n  ipa idrange-add --base-id=1200000 --range-size=200000 --rid-base=1000                   --secondary-rid-base=1000000 local_range\n\nThe data from the ID ranges of the local domain are used by the IPA server\ninternally to assign SIDs to IPA users and groups. The SID will then be stored\nin the user or group objects.\n\nIf e.g. the ID range for the local domain is configured with the values from\nthe example above then a new user with the UID 1200007 will get the RID 1007.\nIf this RID is already used by a group the RID will be 1000007. This can only\nhappen if a user or a group object was created with a fixed ID because the\nautomatic assignment will not assign the same ID twice. Since there are only\nusers and groups sharing the same ID namespace it is sufficient to have only\none fallback range to handle conflicts.\n\nTo find the Posix ID for a given RID from the local domain it has to be\nchecked first if the RID falls in the primary or secondary RID range and\nthe rid-base or the secondary-rid-base has to be subtracted, respectively,\nand the base-id has to be added to get the Posix ID.\n\nTypically the creation of ID ranges happens behind the scenes and this CLI\nmust not be used at all. The ID range for the local domain will be created\nduring installation or upgrade from an older version. The ID range for a\ntrusted domain will be created together with the trust by 'ipa trust-add ...'.\n\nUSE CASES:\n\n  Add an ID range from a transitively trusted domain\n\n    If the trusted domain (A) trusts another domain (B) as well and this trust\n    is transitive 'ipa trust-add domain-A' will only create a range for\n    domain A.  The ID range for domain B must be added manually.\n\n  Add an additional ID range for the local domain\n\n    If the ID range of the local domain is exhausted, i.e. no new IDs can be\n    assigned to Posix users or groups by the DNA plugin, a new range has to be\n    created to allow new users and groups to be added. (Currently there is no\n    connection between this range CLI and the DNA plugin, but a future version\n    might be able to modify the configuration of the DNS plugin as well)\n\nIn general it is not necessary to modify or delete ID ranges. If there is no\nother way to achieve a certain configuration than to modify or delete an ID\nrange it should be done with great care. Because UIDs are stored in the file\nsystem and are used for access control it might be possible that users are\nallowed to access files of other users if an ID range got deleted and reused\nfor a different domain.\n\n(*) The RID is typically the last integer of a user or group SID which follows\nthe domain SID. E.g. if the domain SID is S-1-5-21-123-456-789 and a user from\nthis domain has the SID S-1-5-21-123-456-789-1010 then 1010 id the RID of the\nuser. RIDs are unique in a domain, 32bit values and are used for users and\ngroups.\n\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7353764572084977758,
            "content_hash": -7353764572084977758,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1984,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 898,
            "source_unit": "https://translate.fedoraproject.org/api/units/4672487/?format=api",
            "priority": 100,
            "id": 4710002,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=19f22e156705bfa2",
            "url": "https://translate.fedoraproject.org/api/units/4710002/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.636372Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-bas\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n    WARNING:\n\n    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the\n    local domain. Currently the DNA plugin *cannot* be reconfigured itself based\n    on the local ranges set via this family of commands.\n\n    Manual configuration change has to be done in the DNA plugin configuration for\n    the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\n    modified to match the new range.\n    "
            ],
            "previous_source": "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-base\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n    WARNING:\n\n    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the\n    local domain. Currently the DNA plugin *cannot* be reconfigured itself based\n    on the local ranges set via this family of commands.\n\n    Manual configuration change has to be done in the DNA plugin configuration for\n    the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\n    modified to match the new range.\n    ",
            "target": [
                "\nAjouter une nouvelle plage d'identifiants.\n\n  Pour ajouter une nouvelle plage d'identifiants vous devez toujours préciser\n\n    --base-id\n    --range-size\n\n  En outre,\n\n    --rid-base\n    --secondary-rid-base\n\n  seront indiqués pour une nouvelle plage d'ID dans le domaine local alors que\n\n    --rid-base\n    --dom-sid\n\n  doivent l'être pour ajouter une nouvelle plage pour un domaine AD de confiance.\n\n  AVERTISSEMENT :\n\n  Le greffon DNA dans 389-ds alloue des ID selon les plages configurées au\n  titre du domaine local. Actuellement le greffon DNA *ne peut pas* être\n  lui-même reconfiguré selon les plages locales définies par l'intermédiaire\n  de cette famille de commandes.\n\n  Un changement manuel de configuration doit être opéré dans la configuration\n  du greffon DNA pour cadrer avec la nouvelle plage locale. En particulier,\n  l'attribut « dnaNextRange » de « cn=Posix IDs »,^n« cn=Distributed Numeric Assignment Plugin », « cn=plugins », « cn=config »\n  doivent être modifiés pour correspondre à cette nouvelle plage.\n    "
            ],
            "id_hash": -556278919148005451,
            "content_hash": -556278919148005451,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 1985,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 120,
            "source_unit": "https://translate.fedoraproject.org/api/units/2717668/?format=api",
            "priority": 100,
            "id": 4710004,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=7847b345342517b5",
            "url": "https://translate.fedoraproject.org/api/units/4710004/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.659286Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "\nRoutines for constructing certificate signing requests using IPA data and\nstored templates.\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8371975924546677059,
            "content_hash": 8371975924546677059,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 2001,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 12,
            "source_unit": "https://translate.fedoraproject.org/api/units/2727933/?format=api",
            "priority": 100,
            "id": 4710006,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=f42f3bbf2aba2943",
            "url": "https://translate.fedoraproject.org/api/units/4710006/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.691290Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Required CSR generation rule %(name)s is missing data"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -3211416550007234244,
            "content_hash": -3211416550007234244,
            "location": "",
            "context": "",
            "note": "",
            "flags": "python-format",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 2002,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/2731337/?format=api",
            "priority": 100,
            "id": 4710007,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=536ec1a99f02213c",
            "url": "https://translate.fedoraproject.org/api/units/4710007/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.710139Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Template error when formatting certificate data"
            ],
            "previous_source": "Search for existing certificates.",
            "target": [
                "Recherche de certificats existants."
            ],
            "id_hash": 7252972111617105969,
            "content_hash": 7252972111617105969,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 2003,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 6,
            "source_unit": "https://translate.fedoraproject.org/api/units/2732025/?format=api",
            "priority": 100,
            "id": 4710009,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=e4a7bbb526c0a031",
            "url": "https://translate.fedoraproject.org/api/units/4710009/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.734044Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "No generation rule %(rulename)s found."
            ],
            "previous_source": "HBAC rule %(rule)s not found",
            "target": [
                "Règle HBAC %(rule)s introuvable"
            ],
            "id_hash": -32418648676780664,
            "content_hash": -32418648676780664,
            "location": "",
            "context": "",
            "note": "",
            "flags": "python-format",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 2004,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 5,
            "source_unit": "https://translate.fedoraproject.org/api/units/2730545/?format=api",
            "priority": 100,
            "id": 4710011,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=7f8cd3692985b588",
            "url": "https://translate.fedoraproject.org/api/units/4710011/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.785572Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Generation rule \"%(rulename)s\" is missing the \"rule\" key"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8375471337446413279,
            "content_hash": -8375471337446413279,
            "location": "",
            "context": "",
            "note": "",
            "flags": "python-format",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 2005,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/2729797/?format=api",
            "priority": 100,
            "id": 4710013,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=0bc45931990a6c21",
            "url": "https://translate.fedoraproject.org/api/units/4710013/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.834461Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "No CSR generation rules are defined for profile %(profile_id)s"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 6376652705047576493,
            "content_hash": 6376652705047576493,
            "location": "",
            "context": "",
            "note": "",
            "flags": "python-format",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 2006,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 9,
            "source_unit": "https://translate.fedoraproject.org/api/units/2730533/?format=api",
            "priority": 100,
            "id": 4710015,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=d87e6bd9ac64ffad",
            "url": "https://translate.fedoraproject.org/api/units/4710015/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-08-04T08:20:22.861245Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Password or Password+One-Time Password"
            ],
            "previous_source": "Password or Password+One-Time-Password",
            "target": [
                "Mot de passe ou Mot de passe + OTP"
            ],
            "id_hash": -4247357508098309899,
            "content_hash": -4247357508098309899,
            "location": "",
            "context": "",
            "note": "",
            "flags": "",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 3170,
            "has_suggestion": true,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 4,
            "source_unit": "https://translate.fedoraproject.org/api/units/5861829/?format=api",
            "priority": 100,
            "id": 5863334,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=450e5ad98fb640f5",
            "url": "https://translate.fedoraproject.org/api/units/5863334/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-09-04T16:36:36.210277Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Add user ID override into user group '${primary_key}'"
            ],
            "previous_source": "Certificate for ${entity} ${primary_key}",
            "target": [
                "Certificat pour ${primary_key} de ${entity}"
            ],
            "id_hash": -3843552410020246933,
            "content_hash": -3843552410020246933,
            "location": "",
            "context": "",
            "note": "",
            "flags": "python-brace-format",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 3405,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/5861860/?format=api",
            "priority": 100,
            "id": 5863338,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=4aa8f57275258a6b",
            "url": "https://translate.fedoraproject.org/api/units/5863338/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-09-04T16:36:38.654687Z"
        },
        {
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "source": [
                "Remove user ID overrides from user group '${primary_key}'"
            ],
            "previous_source": "Remove service and service groups from an HBAC rule.",
            "target": [
                "Ajouter des services et des groupes de services d'une règle HBAC."
            ],
            "id_hash": 8787234189241139571,
            "content_hash": 8787234189241139571,
            "location": "",
            "context": "",
            "note": "",
            "flags": "python-brace-format",
            "labels": [],
            "state": 10,
            "fuzzy": true,
            "translated": false,
            "approved": false,
            "position": 3423,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": true,
            "num_words": 8,
            "source_unit": "https://translate.fedoraproject.org/api/units/5861874/?format=api",
            "priority": 100,
            "id": 5863340,
            "web_url": "https://translate.fedoraproject.org/translate/freeipa/ipa-4-8/fr/?checksum=f9f286f037e2c173",
            "url": "https://translate.fedoraproject.org/api/units/5863340/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2020-09-04T16:36:38.914029Z"
        }
    ]
}