| | |
| | | user-friendly-name=Root |
| | | user-friendly-plural-name=Roots |
| | | synopsis=The root configuration provides an entry point to the rest of the OpenDS Directory Server configuration. |
| | | tag.core-server.synopsis=Core server |
| | | tag.database.synopsis=Caching and back-ends |
| | | tag.logging.synopsis=Logging |
| | | user-friendly-name=Ra\u00edz |
| | | user-friendly-plural-name=Ra\u00edces |
| | | synopsis=La configuraci\u00f3n ra\u00edz proporciona un punto de entrada al resto de la configuraci\u00f3n del servidor de directorios OpenDS. |
| | | tag.core-server.synopsis=Servidor principal |
| | | tag.database.synopsis=Almacenamiento en la memoria cach\u00e9 y en segundo plano |
| | | tag.logging.synopsis=Registro |
| | | tag.replication.synopsis=R\u00e9plica |
| | | tag.security.synopsis=Authentication and authorization |
| | | tag.user-management.synopsis=User management |
| | | relation.access-control-handler.user-friendly-name=Access Control Handler |
| | | relation.access-control-handler.synopsis=Access Control Handlers manage the application-wide access control. The OpenDS access control handler is defined through an extensible interface, so that alternate implementations can be created. Only one access control handler may be active in the server at any given time. |
| | | relation.access-control-handler.description=Note that OpenDS also has a privilege subsystem, which may have an impact on what clients may be allowed to do in the server. For example, any user with the bypass-acl privilege is not subject to access control checking regardless of whether the access control implementation is enabled. |
| | | relation.account-status-notification-handler.user-friendly-name=Account Status Notification Handler |
| | | relation.account-status-notification-handler.user-friendly-plural-name=Account Status Notification Handlers |
| | | relation.account-status-notification-handler.synopsis=Account Status Notification Handlers are invoked to provide notification to users in some form (for example, by an email message) when the status of a user's account has changed in some way. The Account Status Notification Handler can be used to notify the user and/or administrators of the change. |
| | | relation.administration-connector.user-friendly-name=Administration Connector |
| | | relation.administration-connector.synopsis=The Administration Connector is used to interact with administration tools using LDAP. |
| | | relation.administration-connector.description=It is a dedicated entry point for administration. |
| | | relation.alert-handler.user-friendly-name=Alert Handler |
| | | relation.alert-handler.user-friendly-plural-name=Alert Handlers |
| | | relation.alert-handler.synopsis=Alert Handlers are used to notify administrators of significant problems or notable events that occur in the Directory Server. |
| | | relation.attribute-syntax.user-friendly-name=Attribute Syntax |
| | | relation.attribute-syntax.user-friendly-plural-name=Attribute Syntaxes |
| | | relation.attribute-syntax.synopsis=Attribute Syntaxes define the type of data that may be stored in an attribute with that syntax. A syntax is generally associated with a set of matching rules that indicate how to perform matching operations against values of that syntax. |
| | | relation.backend.user-friendly-name=Backend |
| | | relation.backend.user-friendly-plural-name=Backends |
| | | relation.backend.synopsis=Backends are responsible for providing access to the underlying data presented by the server. |
| | | relation.backend.description=The data may be stored locally in an embedded database, remotely in an external system, or generated on the fly (for example, calculated from other information that is available). |
| | | relation.certificate-mapper.user-friendly-name=Certificate Mapper |
| | | relation.certificate-mapper.user-friendly-plural-name=Certificate Mappers |
| | | relation.certificate-mapper.synopsis=Certificate Mappers are responsible for establishing a mapping between a client certificate and the entry for the user that corresponds to that certificate. |
| | | relation.connection-handler.user-friendly-name=Connection Handler |
| | | tag.security.synopsis=Autenticaci\u00f3n y autorizaci\u00f3n |
| | | tag.user-management.synopsis=Administraci\u00f3n de usuario |
| | | relation.access-control-handler.user-friendly-name=Administrador de control de acceso |
| | | relation.access-control-handler.synopsis=El administrador de control de acceso administra el control de acceso de aplicaci\u00f3n amplia. El administrador de control de acceso OpenDS se define mediante una interfaz ampliable, para que se puedan crear implementaciones alternativas. S\u00f3lo puede estar activo un administrador de control de acceso en el servidor cada vez. |
| | | relation.access-control-handler.description=Tenga en cuenta que el OpenDS cuenta asimismo con un subsistema de privilegios, que influye en lo que los clientes est\u00e1n o no autorizados a hacer en el servidor. Por ejemplo, cualquier usuario con un privilegio de derivaci\u00f3n-acl no tendr\u00e1 que someterse a una comprobaci\u00f3n de control de acceso, aunque la implementaci\u00f3n de control de acceso est\u00e9 habilitada. |
| | | relation.account-status-notification-handler.user-friendly-name=Controlador de notificaciones del estado de la cuenta |
| | | relation.account-status-notification-handler.user-friendly-plural-name=Controladores de notificaciones del estado de la cuenta |
| | | relation.account-status-notification-handler.synopsis=Los controladores de notificaciones del estado de la cuenta se invocan para proporcionar informaci\u00f3n a los usuarios de alguna forma (por ejemplo, por correo electr\u00f3nico) cuando cambia el estado de una cuenta de usuario. El controlador de notificaciones del estado de la cuenta puede utilizarse para informar del cambio al usuario y/o a los administradores. |
| | | relation.administration-connector.user-friendly-name=Conector de administraci\u00f3n |
| | | relation.administration-connector.synopsis=El conector de administraci\u00f3n se emplea para interactuar con herramientas de administraci\u00f3n a trav\u00e9s de LDAP. |
| | | relation.administration-connector.description=Es un punto de entrada reservado a la administraci\u00f3n. |
| | | relation.alert-handler.user-friendly-name=Controlador de alertas |
| | | relation.alert-handler.user-friendly-plural-name=Controladores de alertas |
| | | relation.alert-handler.synopsis=Los controladores de alertas se utilizan para informar a los administradores de los problemas significativos o los eventos importantes que se produzcan en Directory Server. |
| | | relation.attribute-syntax.user-friendly-name=Sintaxis del atributo |
| | | relation.attribute-syntax.user-friendly-plural-name=Las sintaxis del atributo |
| | | relation.attribute-syntax.synopsis=Las sintaxis del atributo definen el tipo de datos que pueden almacenarse en un atributo con dicha sintaxis. Una sintaxis se asocia generalmente con un conjunto de reglas coincidentes que indican c\u00f3mo realizar operaciones coincidentes frente a valores de dicha sintaxis. |
| | | relation.backend.user-friendly-name=Servidor de fondo |
| | | relation.backend.user-friendly-plural-name=Servidores de fondo |
| | | relation.backend.synopsis=Los servidores de fondo se encargan de proporcionar acceso a los datos subyacentes presentados por el servidor. |
| | | relation.backend.description=Los datos pueden almacenarse de forma local en una base de datos incrustada o de forma remota en un sistema externo, o generarse sobre la marcha (por ejemplo, se pueden calcular a partir de otra informaci\u00f3n disponible). |
| | | relation.certificate-mapper.user-friendly-name=Asignador de certificados |
| | | relation.certificate-mapper.user-friendly-plural-name=Asignadores de certificados |
| | | relation.certificate-mapper.synopsis=Los asignadores de certificados establecen una asignaci\u00f3n entre un certificado de cliente y la entrada del usuario que corresponda a dicho certificado. |
| | | relation.connection-handler.user-friendly-name=Controlador de conexi\u00f3n |
| | | relation.connection-handler.user-friendly-plural-name=Controladores de conexi\u00f3n |
| | | relation.connection-handler.synopsis=Connection Handlers are responsible for handling all interaction with the clients, including accepting the connections, reading requests, and sending responses. |
| | | relation.crypto-manager.user-friendly-name=Crypto Manager |
| | | relation.crypto-manager.synopsis=The Crypto Manager provides a common interface for performing compression, decompression, hashing, encryption and other kinds of cryptographic operations. |
| | | relation.entry-cache.user-friendly-name=Entry Cache |
| | | relation.entry-cache.user-friendly-plural-name=Entry Caches |
| | | relation.entry-cache.synopsis=Entry Caches are responsible for caching entries which are likely to be accessed by client applications in order to improve Directory Server performance. |
| | | relation.extended-operation-handler.user-friendly-name=Extended Operation Handler |
| | | relation.extended-operation-handler.user-friendly-plural-name=Extended Operation Handlers |
| | | relation.extended-operation-handler.synopsis=Extended Operation Handlers processes the different types of extended operations in the server. |
| | | relation.extension.user-friendly-name=Extension |
| | | relation.extension.user-friendly-plural-name=Extensions |
| | | relation.extension.synopsis=The Extension allows to extend the configuration with new type of objects. |
| | | relation.extension.description=It is an entry point for extensions that requires configuration objects that does not inherit from an existing top-level object. |
| | | relation.global-configuration.user-friendly-name=Global Configuration |
| | | relation.global-configuration.synopsis=The Global contains properties that affect the overall operation of the OpenDS Directory Server . |
| | | relation.group-implementation.user-friendly-name=Group Implementation |
| | | relation.group-implementation.user-friendly-plural-name=Group Implementations |
| | | relation.group-implementation.synopsis=Group Implementations define named collections of users. |
| | | relation.group-implementation.description=Different group implementations may have different ways of determining membership. For example, some groups may explicitly list the members, and/or they may dynamically determine membership. |
| | | relation.identity-mapper.user-friendly-name=Identity Mapper |
| | | relation.identity-mapper.user-friendly-plural-name=Identity Mappers |
| | | relation.identity-mapper.synopsis=Identity Mappers are responsible for establishing a mapping between an identifier string provided by a client, and the entry for the user that corresponds to that identifier. Identity Mappers are used to process several SASL mechanisms to map an authorization ID (e.g., a Kerberos principal when using GSSAPI) to a directory user. They are also used when processing requests with the proxied authorization control. |
| | | relation.key-manager-provider.user-friendly-name=Key Manager Provider |
| | | relation.key-manager-provider.user-friendly-plural-name=Key Manager Providers |
| | | relation.key-manager-provider.synopsis=Key Manager Providers are responsible for managing the key material that is used to authenticate an SSL connection to its peer. |
| | | relation.key-manager-provider.description=Key Manager Providers essentially provide access to the certificate that is used by the server when performing SSL or StartTLS negotiation. |
| | | relation.log-publisher.user-friendly-name=Log Publisher |
| | | relation.log-publisher.user-friendly-plural-name=Log Publishers |
| | | relation.log-publisher.synopsis=Log Publishers are responsible for distributing log messages from different loggers to a destination. |
| | | relation.log-retention-policy.user-friendly-name=Log Retention Policy |
| | | relation.log-retention-policy.user-friendly-plural-name=Log Retention Policies |
| | | relation.log-retention-policy.synopsis=Log Retention Policies are used to specify when log files should be cleaned. |
| | | relation.log-rotation-policy.user-friendly-name=Log Rotation Policy |
| | | relation.log-rotation-policy.user-friendly-plural-name=Log Rotation Policies |
| | | relation.log-rotation-policy.synopsis=Log Rotation Policies are used to specify when log files should be rotated. |
| | | relation.matching-rule.user-friendly-name=Matching Rule |
| | | relation.matching-rule.user-friendly-plural-name=Matching Rules |
| | | relation.matching-rule.synopsis=Matching Rules define a set of rules for performing matching operations against assertion values. |
| | | relation.matching-rule.description=Matching rules are frequently associated with an attribute syntax and are used to compare values according to that syntax. For example, the distinguishedNameEqualityMatch matching rule can be used to determine whether two DNs are equal and can ignore unnecessary spaces around commas and equal signs, differences in capitalization in attribute names, an so on. |
| | | relation.monitor-provider.user-friendly-name=Monitor Provider |
| | | relation.monitor-provider.user-friendly-plural-name=Monitor Providers |
| | | relation.monitor-provider.synopsis=Monitor Providers can be used to provide information about the state of the server or one of its components. |
| | | relation.monitor-provider.description=This information is useful for monitoring or troubleshooting. |
| | | relation.network-group.user-friendly-name=Network Group |
| | | relation.network-group.user-friendly-plural-name=Network Groups |
| | | relation.network-group.synopsis=The Network Group is used to classify incoming connections and route requests to workflows. |
| | | relation.password-generator.user-friendly-name=Password Generator |
| | | relation.password-generator.user-friendly-plural-name=Password Generators |
| | | relation.password-generator.synopsis=Password Generators are used by the password modify extended operation to construct a new password for the user. |
| | | relation.password-generator.description=The server allows any number of password validators to be defined. This can impose any kinds of restrictions on the characteristics of valid passwords. Therefore, it is not feasible for the server to attempt to generate a password on its own that will meet all the requirements of all the validators. The password generator makes it possible to provide custom logic for creating a new password. |
| | | relation.password-policy.user-friendly-name=Password Policy |
| | | relation.password-policy.user-friendly-plural-name=Password Policies |
| | | relation.password-policy.synopsis=Password Policies define a number of password management rules, as well as requirements for authentication processing. |
| | | relation.password-storage-scheme.user-friendly-name=Password Storage Scheme |
| | | relation.password-storage-scheme.user-friendly-plural-name=Password Storage Schemes |
| | | relation.password-storage-scheme.synopsis=Password Storage Schemes encode new passwords provided by users so that they are stored in an encoded manner. This makes it difficult or impossible for someone to determine the clear-text passwords from the encoded values. |
| | | relation.password-storage-scheme.description=Password Storage Schemes also determine whether a clear-text password provided by a client matches the encoded value stored in the server. |
| | | relation.password-validator.user-friendly-name=Password Validator |
| | | relation.password-validator.user-friendly-plural-name=Password Validators |
| | | relation.password-validator.synopsis=Password Validators are responsible for determining whether a proposed password is acceptable for use and could include checks like ensuring it meets minimum length requirements, that it has an appropriate range of characters, or that it is not in the history. |
| | | relation.password-validator.description=The password policy for a user specifies the set of password validators that should be used whenever that user provides a new password. In order to activate a password validator, the corresponding configuration entry must be enabled, and the DN of that entry should be included in the password-validator attribute of the password policy in which you want that validator active. All password validator configuration entries must contain the password-validator structural objectclass. |
| | | relation.plugin-root.user-friendly-name=Plugin Root |
| | | relation.plugin-root.synopsis=The Plugin Root defines the parent entry for all plug-ins defined in the server. |
| | | relation.plugin-root.description=It can also include configuration attributes that define the order in which those plug-ins are to be loaded and invoked. |
| | | relation.root-dn.user-friendly-name=Root DN |
| | | relation.root-dn.synopsis=The Root DN configuration contains all the Root DN Users defined in the Directory Server. In addition, it also defines the default set of privileges that Root DN Users automatically inherit. |
| | | relation.root-dse-backend.user-friendly-name=Root DSE Backend |
| | | relation.root-dse-backend.synopsis=The Root DSE Backend contains the Directory Server root DSE. |
| | | relation.root-dse-backend.description=This is a special meta-backend that dynamically generates the root DSE entry for base-level searches and simply redirects to other backends for operations in other scopes. |
| | | relation.sasl-mechanism-handler.user-friendly-name=SASL Mechanism Handler |
| | | relation.sasl-mechanism-handler.user-friendly-plural-name=SASL Mechanism Handlers |
| | | relation.sasl-mechanism-handler.synopsis=The SASL mechanism handler configuration entry is the parent for all SASL mechanism handlers defined in the OpenDS Directory Server. |
| | | relation.sasl-mechanism-handler.description=SASL mechanism handlers are responsible for authenticating users during the course of processing a SASL (Simple Authentication and Security Layer, as defined in RFC 4422) bind. |
| | | relation.synchronization-provider.user-friendly-name=Synchronization Provider |
| | | relation.synchronization-provider.user-friendly-plural-name=Synchronization Providers |
| | | relation.synchronization-provider.synopsis=Synchronization Providers are responsible for handling synchronization of the Directory Server data with other OpenDS instances or other data repositories. |
| | | relation.synchronization-provider.description=The OpenDS Directory Server takes a centralized approach to replication, rather than the point-to-point approach taken by Sun Java System Directory Server. In OpenDS, one or more replication servers are created in the environment. The replication servers typically do not store user data but keep a log of all changes made within the topology. Each Directory Server instance in the topology is pointed at the replication servers. This plan simplifies the deployment and management of the environment. Although you can run the replication server on the same system (or even in the same instance) as the Directory Server, the two servers can be separated onto different systems. This approach can provide better performance or functionality in large environments. |
| | | relation.trust-manager-provider.user-friendly-name=Trust Manager Provider |
| | | relation.trust-manager-provider.user-friendly-plural-name=Trust Manager Providers |
| | | relation.trust-manager-provider.synopsis=Trust Manager Providers determine whether to trust presented certificates. |
| | | relation.virtual-attribute.user-friendly-name=Virtual Attribute |
| | | relation.virtual-attribute.user-friendly-plural-name=Virtual Attributes |
| | | relation.virtual-attribute.synopsis=Virtual Attributes are responsible for dynamically generating attribute values that appear in entries but are not persistently stored in the backend. |
| | | relation.virtual-attribute.description=Virtual attributes are associated with a virtual attribute provider, which contains the logic for generating the value. |
| | | relation.workflow.user-friendly-name=Workflow |
| | | relation.workflow.user-friendly-plural-name=Workflows |
| | | relation.workflow.synopsis=The Workflow is a list of processing steps (Work Flow Elements) that are applied to data as it is retrieved from the Directory Server. |
| | | relation.workflow-element.user-friendly-name=Workflow Element |
| | | relation.workflow-element.user-friendly-plural-name=Workflow Elements |
| | | relation.workflow-element.synopsis=Workflow Elements implement a single processing step in a Work Flow. |
| | | relation.workflow-element.description=A Workflow Element can perform a task such as mapping DNs, renaming attributes, filtering attributes, joining data sources, proxying, or load-balancing. The simplest Workflow Element is the Local Backend Work Flow Element, which routes data to a Backend. |
| | | relation.work-queue.user-friendly-name=Work Queue |
| | | relation.work-queue.synopsis=The Work Queue provides the configuration for the server work queue and is responsible for ensuring that requests received from clients are processed in a timely manner. |
| | | relation.work-queue.description=Only a single work queue can be defined in the server. Whenever a connection handler receives a client request, it should place the request in the work queue to be processed appropriately. |
| | | relation.connection-handler.synopsis=Los controladores de conexi\u00f3n se encargan de administrar todas las interacciones con los clientes, incluida la aceptaci\u00f3n de las conexiones, la lectura de solicitudes y el env\u00edo de respuestas. |
| | | relation.crypto-manager.user-friendly-name=Administrador de criptograf\u00eda |
| | | relation.crypto-manager.synopsis=El administrador de criptograf\u00eda proporciona una interfaz com\u00fan para realizar tareas de compresi\u00f3n, descompresi\u00f3n, hashing, cifrado y otros tipos de operaciones criptogr\u00e1ficas. |
| | | relation.entry-cache.user-friendly-name=Memoria cach\u00e9 de entrada |
| | | relation.entry-cache.user-friendly-plural-name=Memorias cach\u00e9 de entrada |
| | | relation.entry-cache.synopsis=Cada memoria cach\u00e9 captura entradas a las que las aplicaciones de cliente pueden acceder para mejorar el rendimiento del servidor de directorios. |
| | | relation.extended-operation-handler.user-friendly-name=Controlador de funcionamiento ampliado |
| | | relation.extended-operation-handler.user-friendly-plural-name=Controladores de funcionamiento ampliado |
| | | relation.extended-operation-handler.synopsis=Los controladores de funcionamiento ampliado procesan los diversos tipos de operaciones ampliadas del servidor. |
| | | relation.extension.user-friendly-name=Extensi\u00f3n |
| | | relation.extension.user-friendly-plural-name=Extensiones |
| | | relation.extension.synopsis=La extensi\u00f3n permite ampliar la configuraci\u00f3n con nuevos tipos de objetos. |
| | | relation.extension.description=Se trata de un punto de entrada para extensiones que requiere objetos de configuraci\u00f3n que no se hereden de un objeto de nivel superior existente. |
| | | relation.global-configuration.user-friendly-name=Configuraci\u00f3n global |
| | | relation.global-configuration.synopsis=La configuraci\u00f3n global contiene propiedades que afectan al funcionamiento general del servidor de directorios OpenDS. |
| | | relation.group-implementation.user-friendly-name=Implementaci\u00f3n de grupo |
| | | relation.group-implementation.user-friendly-plural-name=Implementaciones de grupo |
| | | relation.group-implementation.synopsis=Las implementaciones de grupo definen las recolecciones de usuarios nombradas. |
| | | relation.group-implementation.description=Las implementaciones de los diferentes grupos poseen formas distintas de determinar sus miembros. Por ejemplo, puede que algunos grupos enumeren a sus miembros expresamente y/o determinen la pertenencia de un miembro de forma din\u00e1mica. |
| | | relation.identity-mapper.user-friendly-name=Asignador de identidad |
| | | relation.identity-mapper.user-friendly-plural-name=Asignadores de identidad |
| | | relation.identity-mapper.synopsis=Los asignadores de identidad se encargan de establecer una asignaci\u00f3n entre una cadena identificadora facilitada por un cliente y la entrada del usuario que corresponda a dicho identificador. Los asignadores de identidad se utilizan para procesar varios mecanismos SASL a fin de asignar un Id. de autorizaci\u00f3n (por ejemplo, un servicio principal Kerberos al utilizar GSSAPI) a un usuario de un directorio. Se utilizan tambi\u00e9n para procesar solicitudes con el control de autorizaci\u00f3n mediante el uso de servidores proxy. |
| | | relation.key-manager-provider.user-friendly-name=Proveedor del administrador de claves |
| | | relation.key-manager-provider.user-friendly-plural-name=Proveedores del administrador de claves |
| | | relation.key-manager-provider.synopsis=Los proveedores del administrador de claves se ocupan de administrar el material clave que se utiliza para autenticar una conexi\u00f3n SSL a su interlocutor. |
| | | relation.key-manager-provider.description=Los proveedores del administrador de claves se ocupan b\u00e1sicamente de facilitar el acceso al certificado que utiliza el servidor al llevar a cabo la negociaci\u00f3n SSL o StartTLS. |
| | | relation.log-publisher.user-friendly-name=Editor de registro |
| | | relation.log-publisher.user-friendly-plural-name=Editores de registro |
| | | relation.log-publisher.synopsis=Los editores de registro se encargan de distribuir mensajes de registro desde diferentes dispositivos de registro a un destino. |
| | | relation.log-retention-policy.user-friendly-name=Pol\u00edtica de retenci\u00f3n de registros |
| | | relation.log-retention-policy.user-friendly-plural-name=Pol\u00edticas de retenci\u00f3n de registros |
| | | relation.log-retention-policy.synopsis=Las pol\u00edticas de retenci\u00f3n de registros se utilizan para especificar cu\u00e1ndo deben limpiarse los archivos de registro. |
| | | relation.log-rotation-policy.user-friendly-name=Pol\u00edtica de rotaci\u00f3n de registros |
| | | relation.log-rotation-policy.user-friendly-plural-name=Pol\u00edticas de rotaci\u00f3n de registros |
| | | relation.log-rotation-policy.synopsis=Las pol\u00edticas de rotaci\u00f3n de registros se utilizan para especificar cu\u00e1ndo deben rotarse los archivos de registro. |
| | | relation.matching-rule.user-friendly-name=Regla de coincidencia |
| | | relation.matching-rule.user-friendly-plural-name=Reglas de coincidencia |
| | | relation.matching-rule.synopsis=Las reglas de coincidencia definen un conjunto de reglas para desarrollar operaciones de coincidencia frente a valores de confirmaci\u00f3n. |
| | | relation.matching-rule.description=Las reglas de coincidencia se asocian frecuentemente con una sintaxis de atributo y se emplean para comparar valores seg\u00fan dicha sintaxis. Por ejemplo, la regla de coincidencia distinguishedNameEqualityMatch (coincidencia de igualdad de nombre distinguido) puede utilizarse para determinar si dos DN son iguales y puede ignorar los espacios innecesarios en torno a las comas y signos de igual, diferencias en cuanto a may\u00fasculas y min\u00fasculas en nombres de atributos, etc\u00e9tera. |
| | | relation.monitor-provider.user-friendly-name=Proveedor de supervisi\u00f3n |
| | | relation.monitor-provider.user-friendly-plural-name=Proveedores de supervisi\u00f3n |
| | | relation.monitor-provider.synopsis=Los proveedores de supervisi\u00f3n pueden utilizarse para facilitar informaci\u00f3n sobre el estado del servidor o uno de sus componentes. |
| | | relation.monitor-provider.description=Esta informaci\u00f3n resulta \u00fatil para supervisi\u00f3n o resoluci\u00f3n de problemas. |
| | | relation.network-group.user-friendly-name=Grupo de red |
| | | relation.network-group.user-friendly-plural-name=Grupos de red |
| | | relation.network-group.synopsis=El grupo de red se emplea para clasificar las conexiones entrantes y enrutar solicitudes a flujos de trabajo. |
| | | relation.password-generator.user-friendly-name=Generador de contrase\u00f1as |
| | | relation.password-generator.user-friendly-plural-name=Generadores de contrase\u00f1as |
| | | relation.password-generator.synopsis=La operaciones ampliadas de modificaci\u00f3n de contrase\u00f1as utilizan los generadores de contrase\u00f1as para crear una nueva contrase\u00f1a para el usuario. |
| | | relation.password-generator.description=El servidor permite definir cualquier n\u00famero de validadores de contrase\u00f1a. Esto puede imponer cualquier tipo de restricci\u00f3n en las caracter\u00edsticas de las contrase\u00f1as v\u00e1lidas. Por lo tanto, el servidor no puede intentar generar por s\u00ed mismo una contrase\u00f1a que cumpla todos los requisitos de todos los validadores. El generador de contrase\u00f1as permite proporcionar la l\u00f3gica personalizada para la creaci\u00f3n de una nueva contrase\u00f1a. |
| | | relation.password-policy.user-friendly-name=Pol\u00edtica de contrase\u00f1as |
| | | relation.password-policy.user-friendly-plural-name=Pol\u00edticas de contrase\u00f1as |
| | | relation.password-policy.synopsis=Las pol\u00edticas de contrase\u00f1as definen un n\u00famero de reglas de administraci\u00f3n de contrase\u00f1as, adem\u00e1s de los requisitos para el proceso de autenticaci\u00f3n. |
| | | relation.password-storage-scheme.user-friendly-name=Esquema de almacenamiento de contrase\u00f1as |
| | | relation.password-storage-scheme.user-friendly-plural-name=Esquemas de almacenamiento de contrase\u00f1as |
| | | relation.password-storage-scheme.synopsis=Los esquemas de almacenamiento de contrase\u00f1as codifican nuevas contrase\u00f1as proporcionadas por los usuarios con el fin de almacenarlas de forma codificada. De ese modo, resulta dif\u00edcil o imposible que alguien pueda determinar las contrase\u00f1as no cifradas a partir de los valores codificados. |
| | | relation.password-storage-scheme.description=Los esquemas de almacenamiento de contrase\u00f1as determinan asimismo si una contrase\u00f1a no cifrada proporcionada por un cliente coincide con el valor almacenado codificado en el servidor. |
| | | relation.password-validator.user-friendly-name=Validaci\u00f3n de contrase\u00f1as |
| | | relation.password-validator.user-friendly-plural-name=Validaciones de contrase\u00f1as |
| | | relation.password-validator.synopsis=Las validaciones de contrase\u00f1as se ocupan de determinar si una contrase\u00f1a propuesta es aceptable para su uso, y esto puede incluir comprobaciones como asegurarse de que cumple con los requisitos de longitud m\u00ednimos, de que se trata de un intervalo de caracteres adecuado o de que no se encuentra en el historial. |
| | | relation.password-validator.description=La pol\u00edtica de contrase\u00f1as de un usuario especifica el conjunto de validaciones de contrase\u00f1a que debe utilizarse cada vez que un usuario proporcione una nueva contrase\u00f1a. Para activar un mecanismo de validaci\u00f3n de contrase\u00f1a, debe habilitarse la entrada de configuraci\u00f3n correspondiente y el DN de dicha entrada debe incluirse en el atributo de validaci\u00f3n de contrase\u00f1as de la pol\u00edtica de contrase\u00f1as en la que desee activar la validaci\u00f3n. Todas las entradas de configuraci\u00f3n de validaci\u00f3n de contrase\u00f1as deben contener el objeto de clase estructural del mecanismo de validaci\u00f3n de contrase\u00f1as. |
| | | relation.plugin-root.user-friendly-name=Ra\u00edz del complemento |
| | | relation.plugin-root.synopsis=La ra\u00edz del complemento define la entrada principal para todos los complementos definidos en el servidor. |
| | | relation.plugin-root.description=Tambi\u00e9n puede incluir atributos de configuraci\u00f3n que definen el orden en el que deben cargarse e invocarse estos complementos. |
| | | relation.root-dn.user-friendly-name=ND ra\u00edz |
| | | relation.root-dn.synopsis=La configuraci\u00f3n de ND root contiene todos los usuarios de DN root definidos en el servidor de directorios. Adem\u00e1s, tambi\u00e9n define el conjunto predeterminado de privilegios que los usuarios de ND root heredan autom\u00e1ticamente. |
| | | relation.root-dse-backend.user-friendly-name=Servidor en segundo plano DSE ra\u00edz |
| | | relation.root-dse-backend.synopsis=El servidor en segundo plano con DSE ra\u00edz contiene el servidor de directorios con DSE ra\u00edz. |
| | | relation.root-dse-backend.description=Se trata de un servidor en segundo plano meta especial que genera din\u00e1micamente la entrada con DSE ra\u00edz para las b\u00fasquedas de nivel de base y simplemente se redirige a otros segundos planos para operaciones de otros \u00e1mbitos. |
| | | relation.sasl-mechanism-handler.user-friendly-name=Controlador del mecanismo SASL |
| | | relation.sasl-mechanism-handler.user-friendly-plural-name=Controladores del mecanismo SASL |
| | | relation.sasl-mechanism-handler.synopsis=La entrada de la configuraci\u00f3n del controlador del mecanismo SASL es la principal para todos los controladores del mecanismo SASL del servidor de directorios OpenDS. |
| | | relation.sasl-mechanism-handler.description=Los controladores del mecanismo SASL se ocupan de autenticar a los usuarios durante el curso del procesamiento de un enlace SASL (capa de seguridad y autenticaci\u00f3n simple, como se define en RFC 4422). |
| | | relation.synchronization-provider.user-friendly-name=Proveedor de sincronizaci\u00f3n |
| | | relation.synchronization-provider.user-friendly-plural-name=Proveedores de sincronizaci\u00f3n |
| | | relation.synchronization-provider.synopsis=Los proveedores de sincronizaci\u00f3n controlan la sincronizaci\u00f3n de los datos del servidor de directorios con otras instancias de OpenDS u otros dep\u00f3sitos de datos. |
| | | relation.synchronization-provider.description=El servidor de directorios OpenDS adopta un enfoque de repetici\u00f3n centralizado, en vez del enfoque de punto a punto del servidor de directorios de Sun Java System. En OpenDS se crea uno o m\u00e1s servidores de repetici\u00f3n en el entorno. Los servidores de repetici\u00f3n normalmente no almacenan datos de usuario, pero mantienen un registro de todos los cambios realizados dentro de la tipolog\u00eda. Cada instancia del servidor de directorios de la tipolog\u00eda se se\u00f1ala en los servidores de repetici\u00f3n. Este plan simplifica el desarrollo y la administraci\u00f3n del entorno. Aunque puede ejecutar el servidor de repetici\u00f3n en el mismo sistema (o incluso en la misma instancia) que el servidor de directorios, los dos servidores pueden estar separados en sistemas diferentes. Este enfoque puede proporcionar un mejor rendimiento o funcionamiento en entornos de gran tama\u00f1o. |
| | | relation.trust-manager-provider.user-friendly-name=Proveedor de administradores de confianza |
| | | relation.trust-manager-provider.user-friendly-plural-name=Proveedores de administradores de confianza |
| | | relation.trust-manager-provider.synopsis=Los proveedores de administradores de confianza determinan si los certificados presentados son fiables. |
| | | relation.virtual-attribute.user-friendly-name=Atributo virtual |
| | | relation.virtual-attribute.user-friendly-plural-name=Atributos virtuales |
| | | relation.virtual-attribute.synopsis=Los atributos virtuales generan de forma din\u00e1mica los valores del atributo que aparecen en las entradas, pero no se almacenan de forma permanente en el servidor en segundo plano. |
| | | relation.virtual-attribute.description=Los atributos virtuales se asocian a un proveedor de atributos virtuales, que contiene la l\u00f3gica para generar el valor. |
| | | relation.workflow.user-friendly-name=Flujo de trabajo |
| | | relation.workflow.user-friendly-plural-name=Flujos de trabajo |
| | | relation.workflow.synopsis=El flujo de trabajo consiste en una serie de pasos de procesamiento (elementos del flujo de trabajo) que se aplican a los datos que se recuperan del servidor de directorios. |
| | | relation.workflow-element.user-friendly-name=Elemento del flujo de trabajo |
| | | relation.workflow-element.user-friendly-plural-name=Elementos del flujo de trabajo |
| | | relation.workflow-element.synopsis=Los elementos del flujo de trabajo implementan un solo paso de procesamiento en un flujo de trabajo determinado. |
| | | relation.workflow-element.description=Un elemento de flujo de trabajo puede realizar una tarea como asignar ND, cambiar el nombre de los atributos, filtrar atributos, enlazar fuentes de datos, personificaciones o equilibrados de carga. El elemento de flujo de trabajo m\u00e1s sencillo es el elemento de flujo de trabajo en segundo plano local, que enruta los datos al segundo plano. |
| | | relation.work-queue.user-friendly-name=Cola de trabajo |
| | | relation.work-queue.synopsis=La cola de trabajo proporciona la configuraci\u00f3n de la cola de trabajo del servidor y garantiza que las solicitudes recibidas por parte de los clientes se procesen puntualmente. |
| | | relation.work-queue.description=S\u00f3lo puede definirse una cola de trabajo en el servidor. Cuando un controlador de conexi\u00f3n recibe una solicitud de un cliente, debe colocarla en la cola de trabajo para que se procese como corresponda. |