"X.509 certificate of the Service Provider":"X.509 certificate of the Service Provider",
"Private key of the Service Provider":"Private key of the Service Provider",
"Indicates that the nameID of the <samlp:logoutRequest> sent by this SP will be encrypted.":"Indicates that the nameID of the <samlp:logoutRequest> sent by this SP will be encrypted.",
"Indicates whether the <samlp:AuthnRequest> messages sent by this SP will be signed. [Metadata of the SP will offer this info]":"Indicates whether the <samlp:AuthnRequest> messages sent by this SP will be signed. [Metadata of the SP will offer this info]",
"Indicates whether the <samlp:logoutRequest> messages sent by this SP will be signed.":"Indicates whether the <samlp:logoutRequest> messages sent by this SP will be signed.",
"Indicates whether the <samlp:logoutResponse> messages sent by this SP will be signed.":"Indicates whether the <samlp:logoutResponse> messages sent by this SP will be signed.",
"Whether the metadata should be signed.":"Whether the metadata should be signed.",
"Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest> and <samlp:LogoutResponse> elements received by this SP to be signed.":"Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest> and <samlp:LogoutResponse> elements received by this SP to be signed.",
"Indicates a requirement for the <saml:Assertion> elements received by this SP to be signed. [Metadata of the SP will offer this info]":"Indicates a requirement for the <saml:Assertion> elements received by this SP to be signed. [Metadata of the SP will offer this info]",
"Indicates a requirement for the <saml:Assertion> elements received by this SP to be encrypted.":"Indicates a requirement for the <saml:Assertion> elements received by this SP to be encrypted.",
" Indicates a requirement for the NameID element on the SAMLResponse received by this SP to be present.":" Indicates a requirement for the NameID element on the SAMLResponse received by this SP to be present.",
"Indicates a requirement for the NameID received by this SP to be encrypted.":"Indicates a requirement for the NameID received by this SP to be encrypted.",
"ADFS URL-Encodes SAML data as lowercase, and the toolkit by default uses uppercase. Enable for ADFS compatibility on signature verification.":"ADFS URL-Encodes SAML data as lowercase, and the toolkit by default uses uppercase. Enable for ADFS compatibility on signature verification.",
"Attribute to map the UID to.":"Attribute to map the UID to.",
"Attribute to map the displayname to.":"Attribute to map the displayname to.",
"Attribute to map the email address to.":"Attribute to map the email address to.",
"Use SAML auth for the %s desktop clients (requires user re-authentication)":"Use SAML auth for the %s desktop clients (requires user re-authentication)",
"Optional display name of the identity provider (default: \"SSO & SAML log in\")":"Optional display name of the identity provider (default: \"SSO & SAML log in\")",
"Allow the use of multiple user back-ends (e.g. LDAP)":"Allow the use of multiple user back-ends (e.g. LDAP)",
"Authenticate using single sign-on":"Authenticate using single sign-on",
"Using the SSO & SAML app of your Nextcloud you can make it easily possible to integrate your existing Single-Sign-On solution with Nextcloud. In addition, you can use the Nextcloud LDAP user provider to keep the convenience for users. (e.g. when sharing)\nThe following providers are supported and tested at the moment:\n\n* **SAML 2.0**\n\t* OneLogin\n\t* Shibboleth\n\t* Active Directory Federation Services (ADFS)\n\n* **Authentication via Environment Variable**\n\t* Kerberos (mod_auth_kerb)\n\t* Any other provider that authenticates using the environment variable\n\nWhile theoretically any other authentication provider implementing either one of those standards is compatible, we like to note that they are not part of any internal test matrix.":"Using the SSO & SAML app of your Nextcloud you can make it easily possible to integrate your existing Single-Sign-On solution with Nextcloud. In addition, you can use the Nextcloud LDAP user provider to keep the convenience for users. (e.g. when sharing)\nThe following providers are supported and tested at the moment:\n\n* **SAML 2.0**\n\t* OneLogin\n\t* Shibboleth\n\t* Active Directory Federation Services (ADFS)\n\n* **Authentication via Environment Variable**\n\t* Kerberos (mod_auth_kerb)\n\t* Any other provider that authenticates using the environment variable\n\nWhile theoretically any other authentication provider implementing either one of those standards is compatible, we like to note that they are not part of any internal test matrix.",
"Please choose whether you want to authenticate using the SAML provider built-in in Nextcloud or whether you want to authenticate against an environment variable.":"Please choose whether you want to authenticate using the SAML provider built-in in Nextcloud or whether you want to authenticate against an environment variable.",
"If your Service Provider should use certificates you can optionally specify them here.":"If your Service Provider should use certificates you can optionally specify them here.",
"Configure your IdP settings here.":"Configure your IdP settings here.",
"Identifier of the IdP entity (must be a URI)":"Identifier of the IdP entity (must be a URI)",
"URL Target of the IdP where the SP will send the Authentication Request Message":"URL Target of the IdP where the SP will send the Authentication Request Message",
"If you want to optionally map attributes to the user you can configure these here.":"If you want to optionally map attributes to the user you can configure these here.",
"For increased security we recommend enabling the following settings if supported by your environment.":"For increased security we recommend enabling the following settings if supported by your environment.",
"Your account is not provisioned, access to this service is thus not possible.":"Your account is not provisioned, access to this service is thus not possible."