[jboss-cvs] JBossAS SVN: r88774 - projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR.

jboss-cvs-commits at lists.jboss.org jboss-cvs-commits at lists.jboss.org
Tue May 12 23:44:13 EDT 2009


Author: ldelima at redhat.com
Date: 2009-05-12 23:44:13 -0400 (Tue, 12 May 2009)
New Revision: 88774

Modified:
   projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po
Log:
translation ongoing

Modified: projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po
===================================================================
--- projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po	2009-05-13 03:33:22 UTC (rev 88773)
+++ projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po	2009-05-13 03:44:13 UTC (rev 88774)
@@ -9,7 +9,7 @@
 "Project-Id-Version: J2EE_Security_On_JBOSS\n"
 "Report-Msgid-Bugs-To: http://bugs.kde.org\n"
 "POT-Creation-Date: 2009-01-20 02:37+0000\n"
-"PO-Revision-Date: 2009-05-12 16:12+1000\n"
+"PO-Revision-Date: 2009-05-13 13:38+1000\n"
 "Last-Translator: Leticia de Lima <ldelima at redhat.com>\n"
 "Language-Team: Brazilian Portuguese <en at li.org>\n"
 "MIME-Version: 1.0\n"
@@ -5120,7 +5120,7 @@
 msgid ""
 "<emphasis role=\"bold\">roles</emphasis>: This is a comma-delimited list of "
 "roles that will be assigned to the user."
-msgstr ""
+msgstr "<emphasis role=\"bold\">roles</emphasis>: Isto é uma lista de vírgula delimitada das funções que serão determinadas ao usuário."
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1304
@@ -5129,7 +5129,7 @@
 "A sample XMLLoginConfig configuration entry that would authenticate all "
 "users as the principal named <literal>jduke</literal> and assign role names "
 "of <literal>TheDuke</literal>, and <literal>AnimatedCharacter</literal> is:"
-msgstr ""
+msgstr "Uma amostra da entrada da configuração que autenticaria todos os usuários como o principal nomeado <literal>jduke</literal> e determina os nomes da função do <literal>TheDuke</literal>, sendo que o <literal>AnimatedCharacter</literal> é:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1307
@@ -5169,7 +5169,7 @@
 #: J2EE_Security_On_JBOSS.xml:1308
 #, no-c-format
 msgid "This module supports password stacking."
-msgstr ""
+msgstr "Este módulo suporta o empilhamento da senha."
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1314
@@ -5189,30 +5189,28 @@
 "authentication. An example would be a login module that accesses an secured "
 "EJB. This login module must be configured ahead of the login module(s) that "
 "need a run as role established."
-msgstr ""
+msgstr "O JBoss um auxiliar no módulo de log-in chamado <literal>RunAsLoginModule</literal> que inicializa a rodagem como função para a duração da fase de log-in de autenticação e coloca a rodagem como função tanto na fase de confirmação e encerramento. O propósito deste módulo de log-in é fornecer uma função para tanto os módulos de log-in que precisam acessar os recursos com segurança com o objetivo de executar as próprias autenticações. Um exemplo pode ser o módulo de log-in que acessa um EJB assegurado. Este módulo de log-in deve ser configurado antes do(s) módulo(s) de log-in que precisam de uma rodagem como uma função estabelecida."
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1318
-#, fuzzy, no-c-format
+#, no-c-format
 msgid "The only login module configuration option is:"
-msgstr "Os grupos de configuração do instalador JBoss AS"
+msgstr "A única opção de configuração do módulo de log-in é:"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1323
-#, fuzzy, no-c-format
+#, no-c-format
 msgid ""
 "<emphasis role=\"bold\">roleName</emphasis>: the name of the role to use as "
 "the run as role during login phase. If not specified a default of "
 "<literal>nobody</literal> is used."
-msgstr ""
-"<emphasis role=\"bold\">protocol</emphasis>: A versão do protocolo SSL a ser "
-"utilizada. Caso não seja especificado, o padrão será <literal>LS</literal>."
+msgstr "<emphasis role=\"bold\">roleName</emphasis>: O nome da função para uso como rodagem conforme a função durante a fase de log-in. Caso não seja especificada um padrão <literal>nobody</literal> será usado."
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1331
 #, no-c-format
 msgid "ClientLoginModule"
-msgstr ""
+msgstr "ClientLoginModule"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1332
@@ -5235,6 +5233,9 @@
 "SecurityAssociation</literal> information directly, but this is considered "
 "an internal API that is subject to change without notice."
 msgstr ""
+"O <literal>ClientLoginModule</literal> é uma implementação do <literal>LoginModule</literal> para o uso dos clientes JBoss para o estabelecimento da identidade do chamador e credenciais. Isto simples configura o <literal>org.jboss.security.SecurityAssociation.principal</literal> para o valor do <literal>NameCallback</literal> preenchido pelo <literal>callbackhandler</literal> e <literal>org.jboss.security."
+"SecurityAssociation.credential</literal> para o valor do <literal>PasswordCallback</literal> preenchido pelo <literal>callbackhandler</literal>. Este é apenas o único mecanismo suportado por um cliente para estabelecer o chamador da segmentação atual. Ambos aplicativos do cliente único e ambientes do servidor não foram configurados para usar o JBossSX transparente, necessário para uso do <literal>ClientLoginModule</literal>. Você poderá sempre configurar a informação <literal>org.jboss.security."
+"SecurityAssociation</literal> diretamente, mas isto é considerado um API interno que está sujeito a alteração sem um aviso prévio."
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1335
@@ -5245,7 +5246,7 @@
 "invocation layer for subsequent authentication on the server. If you need to "
 "perform client-side authentication of users you would need to configure "
 "another login module in addition to the <literal>ClientLoginModule</literal>."
-msgstr ""
+msgstr "Perceba que este módulo de log-in não executa qualquer autenticação. Isto simplesmente copia a informação de log-in fornecida para isto na camada de invocação EJB do servidor JBoss para autenticação subseqüente no servidor. Caso você precise executar a autenticação ao lado do cliente dos usuário, você precisará configurar outro módulo de log-in adicionado ao <literal>ClientLoginModule</literal>."
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1343
@@ -5311,6 +5312,14 @@
 "    // Put your login modules that need jBoss here\n"
 "};"
 msgstr ""
+"other {\n"
+"    // Put your login modules that work without jBoss here\n"
+"                \n"
+"    // jBoss LoginModule\n"
+"    org.jboss.security.ClientLoginModule required;\n"
+"               \n"
+"    // Put your login modules that need jBoss here\n"
+"};"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1367
@@ -5354,6 +5363,12 @@
 "java.util.Set getPublicCredentials()\n"
 "java.util.Set getPublicCredentials(java.lang.Class c)"
 msgstr ""
+"java.util.Set getPrincipals()\n"
+"java.util.Set getPrincipals(java.lang.Class c)\n"
+"java.util.Set getPrivateCredentials()\n"
+"java.util.Set getPrivateCredentials(java.lang.Class c)\n"
+"java.util.Set getPublicCredentials()\n"
+"java.util.Set getPublicCredentials(java.lang.Class c)"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1375
@@ -5535,6 +5550,104 @@
 "    abstract protected Group[] getRoleSets() throws LoginException;\n"
 "}"
 msgstr ""
+"package org.jboss.security.auth.spi;\n"
+"/**\n"
+" *  This class implements the common functionality required for a JAAS\n"
+" *  server-side LoginModule and implements the JBossSX standard\n"
+" *  Subject usage pattern of storing identities and roles. Subclass\n"
+" *  this module to create your own custom LoginModule and override the\n"
+" *  login(), getRoleSets(), and getIdentity() methods.\n"
+" */\n"
+"public abstract class AbstractServerLoginModule\n"
+"    implements javax.security.auth.spi.LoginModule\n"
+"{\n"
+"    protected Subject subject;\n"
+"    protected CallbackHandler callbackHandler;\n"
+"    protected Map sharedState;\n"
+"    protected Map options;\n"
+"    protected Logger log;\n"
+"\n"
+"    /** Flag indicating if the shared credential should be used */\n"
+"    protected boolean useFirstPass;\n"
+"    /** \n"
+"     * Flag indicating if the login phase succeeded. Subclasses that\n"
+"     * override the login method must set this to true on successful\n"
+"     * completion of login\n"
+"     */\n"
+"    protected boolean loginOk;\n"
+"                \n"
+"    // ...\n"
+"    /**\n"
+"     * Initialize the login module. This stores the subject,\n"
+"     * callbackHandler and sharedState and options for the login\n"
+"     * session. Subclasses should override if they need to process\n"
+"     * their own options. A call to super.initialize(...)  must be\n"
+"     * made in the case of an override.\n"
+"     *\n"
+"     * &lt;p&gt;\n"
+"     * The options are checked for the  &lt;em&gt;password-stacking&lt;/"
+"em&gt; parameter.\n"
+"     * If this is set to \"useFirstPass\", the login identity will be taken "
+"from the\n"
+"     * &lt;code&gt;javax.security.auth.login.name&lt;/code&gt; value of the "
+"sharedState map,\n"
+"     * and the proof of identity from the\n"
+"     * &lt;code&gt;javax.security.auth.login.password&lt;/code&gt; value of "
+"the sharedState map.\n"
+"     *\n"
+"     * @param subject the Subject to update after a successful login.\n"
+"     * @param callbackHandler the CallbackHandler that will be used to "
+"obtain the\n"
+"     * the user identity and credentials.\n"
+"     * @param sharedState a Map shared between all configured login module "
+"instances\n"
+"     * @param options the parameters passed to the login module.\n"
+"     */\n"
+"    public void initialize(Subject subject,\n"
+"                           CallbackHandler callbackHandler,\n"
+"                           Map sharedState,\n"
+"                           Map options)\n"
+"    {\n"
+"        // ...\n"
+"    }\n"
+"    \n"
+"\n"
+"    /**\n"
+"     *  Looks for javax.security.auth.login.name and\n"
+"     *  javax.security.auth.login.password values in the sharedState\n"
+"     *  map if the useFirstPass option was true and returns true if\n"
+"     *  they exist. If they do not or are null this method returns\n"
+"     *  false.  \n"
+"     *  Note that subclasses that override the login method\n"
+"     *  must set the loginOk var to true if the login succeeds in\n"
+"     *  order for the commit phase to populate the Subject. This\n"
+"     *  implementation sets loginOk to true if the login() method\n"
+"     *  returns true, otherwise, it sets loginOk to false.\n"
+"     */\n"
+"    public boolean login() \n"
+"        throws LoginException\n"
+"    {\n"
+"        // ...\n"
+"    }\n"
+"    \n"
+"    /**\n"
+"     *  Overridden by subclasses to return the Principal that\n"
+"     *  corresponds to the user primary identity.\n"
+"     */\n"
+"    abstract protected Principal getIdentity();\n"
+"                \n"
+"    /**\n"
+"     *  Overridden by subclasses to return the Groups that correspond\n"
+"     *  to the role sets assigned to the user. Subclasses should\n"
+"     *  create at least a Group named \"Roles\" that contains the roles\n"
+"     *  assigned to the user.  A second common group is\n"
+"     *  \"CallerPrincipal,\" which provides the application identity of\n"
+"     *  the user rather than the security domain identity.\n"
+"     * \n"
+"     *  @return Group[] containing the sets of roles\n"
+"     */\n"
+"    abstract protected Group[] getRoleSets() throws LoginException;\n"
+"}"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1396




More information about the jboss-cvs-commits mailing list