View | Details | Raw Unified | Return to bug 37690
Collapse All | Expand All

(-)print-services-en.xml (-1 / +1 lines)
594
594
595
  <caution>
595
  <caution>
596
	<para>
596
	<para>
597
	  The printer can only be accessed by a regular user when he has local
597
	  The printer can only be accessed by a regular user when they have local
598
	  permissions for driver installation or the respective printer drivers
598
	  permissions for driver installation or the respective printer drivers
599
	  were stored on the printer server. If this is not the case, Windows
599
	  were stored on the printer server. If this is not the case, Windows
600
	  may issue an error warning that the permissions are insufficient to
600
	  may issue an error warning that the permissions are insufficient to
(-)mail-en.xml (-2 / +2 lines)
 Lines 536-542    Link Here 
536
	  classifier. This compares an incoming e-mail with statistical data
536
	  classifier. This compares an incoming e-mail with statistical data
537
	  already gathered from processed e-mails and uses this to adapt it's
537
	  already gathered from processed e-mails and uses this to adapt it's
538
	  evaluation to the user's e-mail.
538
	  evaluation to the user's e-mail.
539
	  The Bayes classification is controlled by the user himself, whereby
539
	  The Bayes classification is controlled by the user themself, whereby
540
	  e-mails not identified as spam can be placed in the <emphasis>Spam</emphasis>
540
	  e-mails not identified as spam can be placed in the <emphasis>Spam</emphasis>
541
	  subfolder and a selection of legitimate e-mails copied into
541
	  subfolder and a selection of legitimate e-mails copied into
542
	  the <emphasis>Ham</emphasis> subfolder. This folder is evaluated daily and data
542
	  the <emphasis>Ham</emphasis> subfolder. This folder is evaluated daily and data
 Lines 770-776    Link Here 
770
			  If the setting is <emphasis>no</emphasis>, it will not be
770
			  If the setting is <emphasis>no</emphasis>, it will not be
771
			  possible to read previous e-mails any more once the user's primary e-mail
771
			  possible to read previous e-mails any more once the user's primary e-mail
772
			  address is changed! If another user is assigned a previously used primary
772
			  address is changed! If another user is assigned a previously used primary
773
			  e-mail address, she receives access to the old IMAP structure of this mailbox.
773
			  e-mail address, they receive access to the old IMAP structure of this mailbox.
774
			</para>
774
			</para>
775
		  </listitem>
775
		  </listitem>
776
		</itemizedlist>
776
		</itemizedlist>
(-)domain-ldap-en.xml (-4 / +4 lines)
 Lines 5-12    Link Here 
5
	<para>
5
	<para>
6
		Univention Corporate Server offers a cross platform domain concept with a
6
		Univention Corporate Server offers a cross platform domain concept with a
7
		common trust context between Linux and/or Windows systems. Within this domain
7
		common trust context between Linux and/or Windows systems. Within this domain
8
		a user is known to all systems via his username and password stored in the
8
		users are known to all systems via their username and password stored in the
9
		&ucsUMS; and can use all services which are authorised for him. The management
9
		&ucsUMS; and can use all services which are authorised for them. The management
10
		system keeps the account synchronised for the windows log-in, Linux/POSIX
10
		system keeps the account synchronised for the windows log-in, Linux/POSIX
11
		systems and Kerberos. The management of user accounts is described in
11
		systems and Kerberos. The management of user accounts is described in
12
		<xref linkend="users:general"/>.
12
		<xref linkend="users:general"/>.
 Lines 827-833    Link Here 
827
				The policy makes it possible to search for users and create an overview of all
827
				The policy makes it possible to search for users and create an overview of all
828
				the attributes of a user object. If an attempt is made to modify further
828
				the attributes of a user object. If an attempt is made to modify further
829
				attributes in addition to the password when the user does not have sufficient
829
				attributes in addition to the password when the user does not have sufficient
830
				access rights to the LDAP directory, &ucsUDM; denies him write access with the
830
				access rights to the LDAP directory, &ucsUDM; denies them write access with the
831
				message <emphasis>Permission denied</emphasis>.
831
				message <emphasis>Permission denied</emphasis>.
832
			</para>
832
			</para>
833
			<caution>
833
			<caution>
 Lines 1243-1249    Link Here 
1243
	  authentication information, which allows single sign-on across domain boundaries among other
1243
	  authentication information, which allows single sign-on across domain boundaries among other
1244
	  things. UCS provides a SAML identity provider: The external service (e.g., Salesforce) is then
1244
	  things. UCS provides a SAML identity provider: The external service (e.g., Salesforce) is then
1245
	  securely registered via a cryptographic certificate and trusts the identity provider. The
1245
	  securely registered via a cryptographic certificate and trusts the identity provider. The
1246
	  user then only needs to authenticate himself in UCS and can use the mounted service without
1246
	  user then only needs to authenticate themself in UCS and can use the mounted service without
1247
	  renewed authentication.
1247
	  renewed authentication.
1248
	</para>
1248
	</para>
1249
1249
(-)user-management-en.xml (-7 / +7 lines)
 Lines 313-319    Link Here 
313
                            <para>
313
                            <para>
314
                                This selection field can be used to block individual login methods. This
314
                                This selection field can be used to block individual login methods. This
315
                                can happen automatically for security reasons, for example, if a user has
315
                                can happen automatically for security reasons, for example, if a user has
316
                                entered his password incorrectly too often, see <xref linkend="users:faillog"/>.
316
                                entered their password incorrectly too often, see <xref linkend="users:faillog"/>.
317
                            </para>
317
                            </para>
318
                            <para>
318
                            <para>
319
                                Normally users should always be blocked for all login methods.
319
                                Normally users should always be blocked for all login methods.
 Lines 382-388    Link Here 
382
                    <row>
382
                    <row>
383
                        <entry>Change password on next login</entry>
383
                        <entry>Change password on next login</entry>
384
                        <entry>
384
                        <entry>
385
                            If this checkbox is ticked, then the user has to change his password during
385
                            If this checkbox is ticked, then the user has to change their password during
386
                            the next login procedure.
386
                            the next login procedure.
387
                        </entry>
387
                        </entry>
388
                    </row>
388
                    </row>
 Lines 1008-1014    Link Here 
1008
				<entry>
1008
				<entry>
1009
				  The period of time set for this must have at least
1009
				  The period of time set for this must have at least
1010
				  expired since the last password change before a user
1010
				  expired since the last password change before a user
1011
				  can reset his password again.
1011
				  can reset their password again.
1012
				</entry>
1012
				</entry>
1013
			  </row>
1013
			  </row>
1014
1014
 Lines 1017-1023    Link Here 
1017
				<entry>
1017
				<entry>
1018
				  Once the saved period of time has elapsed, the
1018
				  Once the saved period of time has elapsed, the
1019
				  password must be changed again by the user the next
1019
				  password must be changed again by the user the next
1020
				  time he logs in. If the value is left blank, the
1020
				  time they log in. If the value is left blank, the
1021
				  password is infinitely valid.
1021
				  password is infinitely valid.
1022
				</entry>
1022
				</entry>
1023
			  </row>
1023
			  </row>
 Lines 1032-1038    Link Here 
1032
    <section id="user-management:Password_changes_by_users_via_UMC">
1032
    <section id="user-management:Password_changes_by_users_via_UMC">
1033
		<title>Password change by user via &ucsUMC;</title>
1033
		<title>Password change by user via &ucsUMC;</title>
1034
		<para>
1034
		<para>
1035
			In &ucsUMC;, every user can reset his password via the
1035
			In &ucsUMC;, every user can reset their password via the
1036
			<guimenu>Change password</guimenu> module. The module can also be opened
1036
			<guimenu>Change password</guimenu> module. The module can also be opened
1037
			by selecting the <guimenu>Settings &ar; Change password</guimenu>
1037
			by selecting the <guimenu>Settings &ar; Change password</guimenu>
1038
			entry in the top right user menu.
1038
			entry in the top right user menu.
 Lines 1046-1056    Link Here 
1046
    <section id="users:faillog">
1046
    <section id="users:faillog">
1047
        <title>Automatic lockout of users after failed login attempts</title>
1047
        <title>Automatic lockout of users after failed login attempts</title>
1048
        <para>
1048
        <para>
1049
            As standard, a user can enter his password incorrectly any number of times. To
1049
            As standard, a user can enter their password incorrectly any number of times. To
1050
            hinder brute force attacks on passwords, an automatic lockout for user accounts
1050
            hinder brute force attacks on passwords, an automatic lockout for user accounts
1051
            can be activated after a configured number of failed log-in attempts. The lockout
1051
            can be activated after a configured number of failed log-in attempts. The lockout
1052
            is activated locally per computer system as standard. In other words, if a
1052
            is activated locally per computer system as standard. In other words, if a
1053
            user enters his password incorrectly too many times on one system, he can
1053
            user enters their password incorrectly too many times on one system, they can
1054
            still login on another system. Setting the &ucsUCRV; <envar>auth/faillog/lock_global</envar>
1054
            still login on another system. Setting the &ucsUCRV; <envar>auth/faillog/lock_global</envar>
1055
            will make the lock effective globally and register it in the LDAP. The global
1055
            will make the lock effective globally and register it in the LDAP. The global
1056
            lock can only be set on domain controller master/backup systems as other
1056
            lock can only be set on domain controller master/backup systems as other
(-)windows-en.xml (-2 / +2 lines)
 Lines 1509-1516    Link Here 
1509
  UCS side on the Samba level alone. If a password change is initiated
1509
  UCS side on the Samba level alone. If a password change is initiated
1510
  by &ucsUDM;, but the password changed in Active Directory, the
1510
  by &ucsUDM;, but the password changed in Active Directory, the
1511
  expiration details for the Kerberos and POSIX passwords are not
1511
  expiration details for the Kerberos and POSIX passwords are not
1512
  changed, so that the user must change his password again if he, for
1512
  changed, so that the user must change their password again if they, for
1513
  example, logs on to a thin client.
1513
  example, log on to a thin client.
1514
</para>
1514
</para>
1515
</listitem>
1515
</listitem>
1516
<listitem>
1516
<listitem>
(-)shares-en.xml (-1 / +1 lines)
 Lines 374-380    Link Here 
374
		<entry>
374
		<entry>
375
		  This username and its permissions and primary group is used for performing all the
375
		  This username and its permissions and primary group is used for performing all the
376
		  file operations of accessing users. The username is only used once the user has
376
		  file operations of accessing users. The username is only used once the user has
377
		  established a connection to the Samba share by using his real username and
377
		  established a connection to the Samba share by using their real username and
378
		  password. A common username is useful for using data in a shared way, yet
378
		  password. A common username is useful for using data in a shared way, yet
379
		  improper application might cause security problems.
379
		  improper application might cause security problems.
380
		</entry>
380
		</entry>

Return to bug 37690