The translation is temporarily closed for contributions due to maintenance, please come back later.
The translation was automatically locked due to following alerts: Could not merge the repository.

Translation status

70 Strings 100% Translate
1,138 Words 100%

Other components

Component Translated Untranslated Untranslated words Checks Suggestions Comments
master-authselect.8.adoc This component is linked to the authselect/master-application repository. Fix this component to clear its alerts. This translation is locked. GPL-3.0
master-authselect-migration.7.adoc This component is linked to the authselect/master-application repository. Fix this component to clear its alerts. This translation is locked. GPL-3.0
master-application Fix this component to clear its alerts. This translation is locked. GPL-3.0

Translation Information

Project website github.com/authselect/authselect
Mailing list for translators trans@lists.fedoraproject.org
Translation process
  • Translations can be made directly.
  • Translation suggestions can be made.
  • Any authenticated user can contribute.
  • The translation uses bilingual files.
Translation license GNU General Public License v3.0 or later
Source code repository https://github.com/authselect/authselect
Repository branch master
Last remote commit Release authselect-1.2.2 a4c67e5
User avatar pbrezina authored 3 days ago
Weblate repository https://translate.fedoraproject.org/git/authselect/master-application/
Filemask src/man/po/authselect-profiles.5.adoc.*.po
Translation file src/man/po/authselect-profiles.5.adoc.tr.po
Resource update 3 days ago
Committed changes 6 months ago
Committed changes 6 months ago
authselect(8), nsswitch.conf(5), PAM(8)
authselect(8), nsswitch.conf(5), PAM(8)
6 months ago
You may find *authselect create-profile* command helpful when creating new profile. See *authselect(8)* manual page or *authselect create-profile --help* for more information.
Yeni bir profil oluştururken *authselect create-profile* komutu faydalı olabilir. Daha fazla bilgi için *authselect(8)* kılavuz sayfasına bakın veya *authselect create-profile --help* komutunu kullanın.
6 months ago
To register a new profile within authselect, create a directory in one of the authselect profile locations with the files listed above. Not all of the files must be present, only *README* is mandatory. Other files can be created on per-need basis.
Authselect içinde yeni bir profil kaydetmek için, authselect profil konumlarından birinde yukarıda listelenen dosyaları içeren bir dizin oluşturun. Dosyaların hepsinin bulunması zorunlu değildir, sadece *README* dosyası zorunludur. Diğer dosyalar ihtiyaca göre oluşturulabilir.
6 months ago
CREATING A NEW PROFILE
YENİ BİR PROFİL OLUŞTURMA
6 months ago
{imply "with-smartcard" if "with-smartcard-required"}
auth required pam_env.so
auth required pam_faildelay.so delay=2000000
auth [success=1 default=ignore] pam_succeed_if.so service notin login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver quiet use_uid {include if "with-smartcard-required"}
auth [success=done ignore=ignore default=die] pam_sss.so require_cert_auth ignore_authinfo_unavail {include if "with-smartcard-required"}
auth [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000 quiet
auth [default=1 ignore=ignore success=ok] pam_localuser.so {exclude if "with-smartcard"}
auth [default=2 ignore=ignore success=ok] pam_localuser.so {include if "with-smartcard"}
auth [success=done authinfo_unavail=ignore ignore=ignore default=die] pam_sss.so try_cert_auth {include if "with-smartcard"}
auth sufficient pam_unix.so {if not "without-nullok":nullok} try_first_pass
auth requisite pam_succeed_if.so uid >= 1000 quiet_success
auth sufficient pam_sss.so forward_pass
auth required pam_deny.so
...
{imply "with-smartcard" if "with-smartcard-required"}
auth required pam_env.so
auth required pam_faildelay.so delay=2000000
auth [success=1 default=ignore] pam_succeed_if.so service notin login:gdm:xdm:kdm:xscreensaver:gnome-screensaver:kscreensaver quiet use_uid {include if "with-smartcard-required"}
auth [success=done ignore=ignore default=die] pam_sss.so require_cert_auth ignore_authinfo_unavail {include if "with-smartcard-required"}
auth [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000 quiet
auth [default=1 ignore=ignore success=ok] pam_localuser.so {exclude if "with-smartcard"}
auth [default=2 ignore=ignore success=ok] pam_localuser.so {include if "with-smartcard"}
auth [success=done authinfo_unavail=ignore ignore=ignore default=die] pam_sss.so try_cert_auth {include if "with-smartcard"}
auth sufficient pam_unix.so {if not "without-nullok":nullok} try_first_pass
auth requisite pam_succeed_if.so uid >= 1000 quiet_success
auth sufficient pam_sss.so forward_pass
auth required pam_deny.so
...
6 months ago
Here is an example of "imply-if" operator. Enabling feature "with-smartcard-required" will also enable "with-smartcard" to make sure that all relevant PAM modules are used. This will achieve the same behavior as the previous example.
Aşağıda "imply-if" işlemine bir örnek verilmiştir. "with-smartcard-required" özelliğini etkinleştirmek, ilgili tüm PAM modüllerinin kullanıldığından emin olmak için "with-smartcard" özelliğini de etkinleştirecektir. Bu, önceki örnekle aynı davranışı sağlayacaktır.
6 months ago
{continue if "with-smartcard" or "with-smartcard-required"}
auth required pam_env.so
auth required pam_faildelay.so delay=2000000
auth required pam_faillock.so preauth silent deny=4 unlock_time=1200 {include if "with-faillock"}
auth [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000 quiet
auth [default=1 ignore=ignore success=ok] pam_localuser.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 1000 quiet_success
auth sufficient pam_sss.so forward_pass
auth required pam_faillock.so authfail deny=4 unlock_time=1200 {include if "with-faillock"}
auth required pam_deny.so
...
{continue if "with-smartcard" or "with-smartcard-required"}
auth required pam_env.so
auth required pam_faildelay.so delay=2000000
auth required pam_faillock.so preauth silent deny=4 unlock_time=1200 {include if "with-faillock"}
auth [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000 quiet
auth [default=1 ignore=ignore success=ok] pam_localuser.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 1000 quiet_success
auth sufficient pam_sss.so forward_pass
auth required pam_faillock.so authfail deny=4 unlock_time=1200 {include if "with-faillock"}
auth required pam_deny.so
...
6 months ago
Browse all translation changes

Statistics

Percent Strings Words Chars
Total 70 1,138 9,722
Translated 100% 70 1,138 9,722
Needs editing 0% 0 0 0
Failing checks 0% 0 0 0

Last activity

Last change May 20, 2020, 9:39 a.m.
Last author Oğuz Ersen

Daily activity

Daily activity

Weekly activity

Weekly activity