@@ -52,6 +52,10 @@ export let I18nAdminEn: I18nAdmin = {
5252 confidential : "Confidential" ,
5353 confidentialNoSecret : "This is a non-confidential client and therefore has not secret." ,
5454 config : "Client Configuration" ,
55+ custEmailMapping : "Custom E-Mail Mapping" ,
56+ custEmailMappingExplanation : "Use a custom attribute for the E-Mail that will be provided to the client." ,
57+ custEmailMappingNoAttrs : `No custom attributes are available for custom E-Mail mapping.
58+ The attribute must be of type \`email\` and must not be user editable.` ,
5559 delete1 : "Are you sure you want to delete this client?" ,
5660 descAuthCode : `The validity for auth codes can be adjusted for increased security. Auth codes
5761 can be used only once and are valid for 60 seconds by default. The shorter the validity, the
@@ -64,20 +68,20 @@ export let I18nAdminEn: I18nAdmin = {
6468 Only users, that are assigned to a matching group, will be allowed to log in.` ,
6569 descOrigin : `External, additionally allowed origins - usually only necessary, if this client
6670 needs to make requests to Rauthy directly from the browser, typically SPAs.` ,
67- descPKCE : `If the client supports it, you should always activate S256 PKCE for additional
68- security. If a non-confidential client (e.g. a SPA) is being used, you must at least
71+ descPKCE : `If the client supports it, you should always activate S256 PKCE for additional
72+ security. If a non-confidential client (e.g. a SPA) is being used, you must at least
6973 activate one of the PKCE challenges to have enough security.` ,
7074 descPKCEEnforce : `If any PKCE is activated, Rauthy will enforce the usage during Logins, and
7175 rejects login request that do not contain a valida challenge.` ,
72- descUri : `You can provide as many redirect URIs as you like. At the end of each, you can use
76+ descUri : `You can provide as many redirect URIs as you like. At the end of each, you can use
7377 <code>*</code> as a Wildcard.` ,
7478 errConfidentialPKCE : `The client must either be confidential or have at least one PKCE
7579 challenge activated.` ,
7680 forceMfa : "Force MFA" ,
7781 groupLoginPrefix : "Login Group Prefix" ,
7882 name : "Client Name" ,
7983 scim : {
80- baseUri : `The SCIM base URI is the one from which the sub routes like
84+ baseUri : `The SCIM base URI is the one from which the sub routes like
8185 <code>{base_uri}/Users/{id}</base_uri></code> can be derived correctly.` ,
8286 desc : "If this client supports {{ SCIM_LINK }}, you can activate it here." ,
8387 enable : "Enable SCIMv2" ,
@@ -91,15 +95,15 @@ export let I18nAdminEn: I18nAdmin = {
9195 reqLi1 : "The client must handle <code>externalId</code> correctly." ,
9296 reqLi2 : `At least <code>/Users</code> endpoints with <code>filter=externalId eq "*"</code> and
9397 <code>filter=userName eq "*"</code> must be supported.` ,
94- reqLi3 : `If groups should be synchronized, <code>/Groups</code> must also support
98+ reqLi3 : `If groups should be synchronized, <code>/Groups</code> must also support
9599 <code>filter=displayName eq "*"</code>.` ,
96100 } ,
97101 scopes : {
98102 allowed : "Allowed Scopes" ,
99103 default : "Default Scopes" ,
100104 desc : `Allowed Scopes are the ones the client is allowed to request dynamically during
101105 a redirect to the login when using the <code>authorization_code</code> flow. The default
102- scopes will always be added to the tokens to solve some issues when using the
106+ scopes will always be added to the tokens to solve some issues when using the
103107 <code>password</code> for instance.` ,
104108 } ,
105109 secret : {
@@ -149,11 +153,11 @@ export let I18nAdminEn: I18nAdmin = {
149153 keysAvailable : "Available Keys" ,
150154 migrate : "Migrate" ,
151155 migrateToKey : 'Migrate all existing encrypted values to the following key' ,
152- p1 : `These Keys are used for an additional encryption at rest, independently from any data store technology
156+ p1 : `These Keys are used for an additional encryption at rest, independently from any data store technology
153157 used under the hood. They are configured statically, but can be rotated and migrated on this page manually.` ,
154158 p2 : `The active key is statically set in the Rauthy config file / environment variables. It cannot be changed
155159 here dynamically. All new JWK encryption's will always use the currently active key.` ,
156- p3 : `If you migrate all existing secrets, it might take a few seconds to finish, if you have a big
160+ p3 : `If you migrate all existing secrets, it might take a few seconds to finish, if you have a big
157161 dataset.` ,
158162 pNotPossible : 'To be able to migrate, at least 2 encryption keys need to be available.' ,
159163 } ,
@@ -162,63 +166,63 @@ export let I18nAdminEn: I18nAdmin = {
162166
163167 currValuesHead : 'Current values' ,
164168 currValues1 : 'The current values from the backend are the following:' ,
165- currValuesNote : `Note: The Login Time from the backend does only provide a good guideline after at least 5
166- successful logins, after Rauthy has been started. The base value is always 2000 ms after a fresh restart
169+ currValuesNote : `Note: The Login Time from the backend does only provide a good guideline after at least 5
170+ successful logins, after Rauthy has been started. The base value is always 2000 ms after a fresh restart
167171 and will adjust over time with each successful login.` ,
168172 currValuesThreadsAccess : 'Threads (p_cost) Rauthy has access to' ,
169173
170174 loginTimeHead : 'A word about Login Time' ,
171- loginTime1 : `Generally, users want everything as fast as possible. When doing a safe login though, a time
172- between 500 - 1000 ms should not be a problem. The login time must not be too short, since it would lower
175+ loginTime1 : `Generally, users want everything as fast as possible. When doing a safe login though, a time
176+ between 500 - 1000 ms should not be a problem. The login time must not be too short, since it would lower
173177 the strength of the hash, of course.` ,
174- loginTime2 : `To provide as much safety by default as possible, this utility does not allow you to go below
178+ loginTime2 : `To provide as much safety by default as possible, this utility does not allow you to go below
175179 500 ms for the login time.` ,
176180
177181 mCost1 : `The <code>m_cost</code> defines the amount of <b>memory (in kB)</b>, which is used for the hashing.
178182 The higher the value, the better, of course. But you need to keep in mind the servers resources.<br>
179183 When you hash 4 passwords at the same time, for instance, the backend needs <code>4 x m_cost</code>
180184 during the hashing. These resources must be available.` ,
181185 mCost2 : `Tuning <code>m_cost</code> is pretty easy. Define the max amount of memory that Rauthy should use,
182- divide it by the number of max allowed parallel logins (<code>MAX_HASH_THREADS</code>) and subtract a small
186+ divide it by the number of max allowed parallel logins (<code>MAX_HASH_THREADS</code>) and subtract a small
183187 static amount of memory. How much static memory should be taken into account depends on the used database
184188 and the total amount of users, but will typically be in the range of 32 - 96 MB.` ,
185189 mCost3 : 'The minimal allowed <code>m_cost</code> is <code>32768</code>.' ,
186190
187- pCost1 : `The <code>p_cost</code> defines the amount of <b>parallelism</b> for hashing. This value most often
191+ pCost1 : `The <code>p_cost</code> defines the amount of <b>parallelism</b> for hashing. This value most often
188192 tops out at ~8, which is the default for Rauthy.` ,
189193 pCost2 : `The general rule is:<br>
190194 Set the <code>p_cost</code> to twice the size of cores your have available.<br>
191195 For instance, if you have 4 cores available, set the <code>p_cost</code> to <code>8</code>.<br>
192196 However, this value must take the configured allowed parallel logins (<code>MAX_HASH_THREADS</code>) into
193197 account and be reduced accordingly.` ,
194198
195- tCost1 : `The <code>t_cost</code> defines the amount of <b>time</b> for hashing. This value is actually the
196- only value, that needs tuning, since <code>m_cost</code> and <code>p_cost</code> are basically given by the
199+ tCost1 : `The <code>t_cost</code> defines the amount of <b>time</b> for hashing. This value is actually the
200+ only value, that needs tuning, since <code>m_cost</code> and <code>p_cost</code> are basically given by the
197201 environment.` ,
198202 tCost2 : `Tuning is easy: Set <code>m_cost</code> and <code>p_cost</code> accordingly and then increase
199203 <code>t_cost</code> as long as you have not reached your hashing-time-goal.` ,
200204
201205 utilityHead : 'Parameter Calculation Utility' ,
202- utility1 : `You can use this tool to approximate good values for your deployment. Keep in mind, that this
203- should be executed with Rauthy in its final place with all final resources available. You should execute
206+ utility1 : `You can use this tool to approximate good values for your deployment. Keep in mind, that this
207+ should be executed with Rauthy in its final place with all final resources available. You should execute
204208 this utility during load to not over tune.` ,
205- utility2 : `<code>m_cost</code> is optional and the safe minimal value of <code>32768</code> would be chosen,
209+ utility2 : `<code>m_cost</code> is optional and the safe minimal value of <code>32768</code> would be chosen,
206210 if empty. <code>p_cost</code> is optional too and Rauthy will utilize all threads it can see, if empty.` ,
207211
208212 time : "Time" ,
209213 targetTime : "Target Time" ,
210214 tune : 'Important: These values need to be tuned on the final architecture!' ,
211- pDetials : `If you want a detailed introduction to Argon2ID, many sources exist online. This guide just
215+ pDetials : `If you want a detailed introduction to Argon2ID, many sources exist online. This guide just
212216 gives very short overview about the values. Three of them need to be configured:` ,
213- pTune : `They change depending on the capabilities of the system. The more powerful the system, the more safe
217+ pTune : `They change depending on the capabilities of the system. The more powerful the system, the more safe
214218 these values can be.` ,
215219 pUtility : `This utility helps you find the best Argon2ID settings for your platform.
216- Argon2ID is currently the safest available password hashing algorithm. To use it to its fullest potential,
220+ Argon2ID is currently the safest available password hashing algorithm. To use it to its fullest potential,
217221 it has to be tuned for each deployment.` ,
218222 } ,
219223 openapi : "If you want to integrate an external application and use Rauthy's API, take a look at the" ,
220224 openapiNote : `Depending on the backend configuration, the Swagger UI may not be exposed publicly at this point.
221- It is however by default available via the internal metrics HTTP server to not expose any
225+ It is however by default available via the internal metrics HTTP server to not expose any
222226 information.` ,
223227 source : "The source code can be found here" ,
224228 } ,
@@ -242,7 +246,7 @@ export let I18nAdminEn: I18nAdmin = {
242246 p1 : "These are the Json Web Keys (JWKs) used for token singing." ,
243247 p2 : `The JWKs will be rotated by default every 1st of a month. For all newly created tokens, only the latest
244248 available key for the given algorithm will be used for signing. Old keys will be kept for a while to make sure
245- that currently valid tokens can still be validated properly. After a while, they will be cleaned up
249+ that currently valid tokens can still be validated properly. After a while, they will be cleaned up
246250 automatically.` ,
247251 p3 : `Keys can also be rotated manually. Depending on the hardware this Rauthy instance is running on, it might
248252 take a few seconds.` ,
@@ -359,7 +363,7 @@ export let I18nAdminEn: I18nAdmin = {
359363 forceLogout : `Are you sure you want to invalidate all existing sessions and delete all refresh tokens
360364 for this user?` ,
361365 lastLogin : "Last Login" ,
362- manualInitDesc : `The user can also be initialized here, In this case though, you need to communicate the
366+ manualInitDesc : `The user can also be initialized here, In this case though, you need to communicate the
363367 password directly.` ,
364368 manualInit : "Manual Initialization" ,
365369 mfaDelete1 : "You can delete Passkeys for this users." ,
0 commit comments