ACC SHELL

Path : /usr/share/YaST2/modules/
File Upload :
Current File : //usr/share/YaST2/modules/LdapPopup.ybc

YaST bytecode 1.4.0	LdapPopup
LdapPopup.ycpLdapLabelPopupWizard
BrowseTree		InitAndBrowseTree		
EditAttribute		NewModule	AddDefaultValue
PasswordPolicyDialogroot_dn	root_dn	
connectionsettings	available	conflicts			available	conflicts

%ppolicy
3UI		UserInput
OpenDialogCloseDialogChangeWidget

QueryWidget


ReplaceWidget
SetFocus
GetDisplayInfo	HasSpecialWidget
3SCRRead0ldap-client3Ldap
server	ldap_v2ldap_tlsLDAPErrorMessage		GetFirstServer		GetFirstPort	LDAPInitWithTLSCheck	SingleValued	AttributeDescription		GetRequiredAttributes		3LabelCancelButton	OKButton	
HelpButton	3PopupError	3WizardCloseDialogShowHelp	OpenNextBackDialogSetHelpText	HideAbortButtonSetContentsButtons				%display_infotextmodedns	
current_dn	contentsitemsout	subdns	
open_items	update_items
retval	$ $!TextMode$$
$&$(HBoxVSpacingVBoxHSpacingFVSpacing0.2HBoxHSpacingReplacePointidreptreeTreeidtree	HSpacingHBoxHSpacing1.5
PushButtonidokoptkey_F10
PushButtonidcanceloptkey_F9Right
PushButtonidopenoptkey_F6&Openldap-clientEmptyHSpacing1.5VSpacing0.2,=
opt	decorated$?	$@		SCR::Read.ldap.searchbase_dnscopedn_onlynot_found_ok(Fsize4G&H		maplistdn	
'I
-Jitem
	(Nsize4O,PidreptreeTreeidtreeTreeidtreeoptnotify,TtreeCurrentItem(V4Wbases$X		SCR::Read.ldap.search
attrsnamingContextsbase_dnscope(]size	&^		maplistdn	
	namingContexts	item
	(`size4a,bidreptreeTreeidtreeTreeidtreeoptnotify,etreeCurrentItem(i,jidtree$l	$m
%o	its-qmaplistit	dn	lastopen$r	(s4t-uitem		maplistk	item	$x-size(ysize	-z$|&&haskey!-}item		$
)4ret$	(||	tree	open4&	idtreeCurrentItem(!4&		SCR::Read.ldap.searchbase_dnscopedn_onlynot_found_ok'(size4&tree	OpenItems&	,idreptreeTreeidtreeTreeidtreeoptnotify,idtreeCurrentItem&
(,idtree(	cancel4&
.(	ok4dn	$
	idtreeCurrentItem(
&

&
.,-
%argserror	$sizehostnameportversionuse_tlsyesno$(4,init--%attr	value		conflictsoffersinglebrowse	help_text	desc		org_value		
value_size
hsizegenerate_value_listvalues

add_buttonresult	new_value	$	attr$value	$	conflicts	$offer	$single$browse$+			3<p>Set the new value for the current attribute.</p>ldap-client@<p>If the attribute can have more values, add new entries
with <b>Add Value</b>. Sometimes the button contains the list of
possible values to use for the current attribute.
If the value of the edited attribute should be a distinguished name (DN),
it is possible to choose it from the LDAP tree using <b>Browse</b>.
</p>
ldap-client$(&+			+					
sformat		
-<p>The description of attribute "%1":<br></p>ldap-client		
sformat		
<p><i>%1</i></p>$$	size$
+	size		
%ret$	VBox(4&		add	
InputFieldidopthstretch		
sformat		
&Value of "%1" Attributeldap-client	4i&	add	
InputFieldidopthstretch		
sformat		
&Values of "%1" Attributeldap-client	$
)
	4&	add	
InputFieldid
opthstretch
	(	size	+		
	

&
+	size	
	
&
+
-	$$!

PushButtonidnewoptkey_F3
&Add Valueldap-client(#||size4$mb$&	itemidnew&Empty Entryldap-client('&(	add	itemidbrowseBro&wseldap-client,)		foreachit	
	&*	add	itemid

&-

MenuButtonidmboptkey_F3
&Add Valueldap-client	,0
opt	decoratedHBoxHSpacingVBoxHSpacing
2
2ReplacePointidrpHBox
PushButtonidokoptdefaultkey_F10
PushButtonidcanceloptkey_F9
PushButtonidhelpoptkey_F2Empty
HSpacing$?$@	(B	&C	,Did-	)E4F&G(Hcancel4I&J.K(Mhelp4N,O(Q||||newcontainsbrowse4Rj$S
&T	)U
	4V&W			add	id
Value&X
+
(Z&&contains-		4[']-		(_browse4`'a-	4d&f			addnew	&g	+	,iidrp,jid-	(lok4mj	duplicate$n
$o
&p	)q&&
	!
4rv	$s	id
Value(t&&!		containscontains4u,w		
sformat		
9The value '%1' already exists.
Please select another one.ldap-client&y
({&{			add&|
+
(~
/~.,-%descriptions	r_buttonsresult	new_value	class	$suseuserconfiguration&Configuration of user management toolsldap-clientsusegroupconfiguration'Configuration of group management toolsldap-client$VBoxLeftLabelObject Class of New Moduleldap-client,		foreachclass			desc	$
	(		&
		
sformat		
%1 (%2)			&addLeftRadioButtonid	
,
opt	decoratedHBoxHSpacingVBoxHSpacing2RadioButtonGroupidrb
InputFieldidcnopthstretch &Name of New Module ("cn" Value)ldap-clientHBox
PushButtonidokoptdefaultkey_F10
PushButtonidcanceloptkey_F9HSpacing$$$,idcn)4&(cancel4&.(ok4&	idcnValue(contains4,6The entered value already exists.
Select another one.
ldap-client/(4,Enter the module name.ldap-client/&	idrb
CurrentButton.,-classcn%		help_text	result	new_value	attr	
$+			<p>Here, set the values of attributes belonging
to an object using the current template. Such values are used as defaults when
the new object is created.</p>
ldap-client<p>You can use special syntax to create attribute
values from existing ones. The expression <i>%attr_name</i> will be replaced
with the value of attribute "attr_name" (for example, use "/home/%uid"
as a value of "homeDirectory").</p>
ldap-client&			filterattr			!contains	,
opt	decoratedHBoxHSpacingVBoxHSpacing2VSpacing0.5LeftComboBoxidattropteditableAttribute &Nameldap-clientVSpacing0.5
InputFieldidvalopthstretchAttribute &Valueldap-clientVSpacing0.5HBox
PushButtonidokoptdefaultkey_F10
PushButtonidcanceloptkey_F9
PushButtonidhelpoptkey_F2VSpacing0.5HSpacing$$$,idattr)	4
&(cancel4
&.(help4,(ok4&	idattrValue&	idvalValue.,-attrvalue%%
ppolicy_orig	help_text	tabs_help_text
attributestime_attributesdefault_valuesmaxtabs	tabs_term	has_tabs
contentsset_password_policies_termtime_dialog		
get_seconds_value	set_aging_policies_termset_lockout_policies_termcurrent_tab
resultret	&(				mapmapa	val			()&&	||	size	&*		(+||	TRUE	FALSE&,		TRUE--		$/$2<p>Select the <b>Password Change Policies</b>, <b>Password Aging Policies</b>, and <b>Lockout Policies</b> tabs to choose LDAP password policy groups of attributes to configure.</p>ldap-client$6pwchange+			+			+			+			+			<p>Specify the <b>Maximum Number of Passwords Stored in History</b> to set how many previously used passwords should be saved. Saved passwords may not be used.</p>ldap-client<p>Check <b>User Must Change Password after Reset</b> to force users to change their passwords after the the password is reset or changed by an administrator.</p>ldap-clientV<p>Check <b>User Can Change Password</b> to allow users to change their passwords.</p>ldap-client<p>If the existing password must be provided along with the new password, check <b>Old Password Required for Password Change</b>.</p>ldap-client<p>Select whether the password quality should be verified while passwords are modified or added. Select <b>No Checking</b> if passwords should not be checked at all. With <b>Accept Uncheckable Passwords</b>, passwords are accepted even if the check cannot be performed, for example, if the user has provided an encrypted password. With <b>Only Accept Checked Passwords</b> passwords are refused if the quality test fails or the password cannot be checked.</p>ldap-clientkSet the minimum number of characters that must be used in a password in <b>Minimum Password Length</b>.</p>ldap-clientaging+			+			+			f<p><b>Minimum Password Age</b> sets how much time must pass between modifications to the password.</p>ldap-clientW<p><b>Maximum Password Age</b> sets how long after modification a password expires.</p>ldap-client<p>In <b>Time before Password Expiration to Issue Warning</b> set how long before a password is due to expire that an expiration warning messages should be given to an authenticating user.</p>ldap-client}<p>Set the number of times an expired password can be used to authenticate in <b>Allowed Uses of an Expired Password</b>.</p>ldap-clientlockout+			+			+			<p>Check <b>Enable Password Locking</b> to forbid use of a password after a specified number of consecutive failed bind attempts.</p>ldap-client<p>Set the number of consecutive failed bind  attempts after which the password may not be used to authenticate in <b>Bind Failures to Lock the Password</b>.</p>ldap-clientQ<p>Set how long the password cannot be used in <b>Password Lock Duration</b>.</p>ldap-client<p><b>Bind Failures Cache Duration</b> sets how long before password failures are purged from the failure counter even though no successful authentication has occurred.</p>ldap-client$c
aging	pwdMinAge	pwdMaxAgepwdExpireWarningpwdGraceAuthNLimitlockout
pwdLockoutpwdLockoutDuration
pwdMaxFailurepwdFailureCountIntervalpwchangepwdInHistory
pwdMustChangepwdAllowUserChange
pwdSafeModifypwdCheckQualitypwdMinLength$q		pwdMinAge	pwdMaxAgepwdExpireWarningpwdLockoutDurationpwdFailureCountInterval$v
pwdAllowUserChange
pwdLockout
pwdMustChange
pwdSafeModify$~$itemidpwchange&Password Change Policiesldap-clientitemidagingPa&ssword Aging Policiesldap-clientitemidlockout&Lockout Policiesldap-client$VBoxDumbTabidtabsReplacePointidtabContentsVBoxEmpty$	(!DumbTab4tabbar&	$	HBox,foreachit
label	$	
&	add	
PushButton
id&VBoxLeft	FrameReplacePointidtabContentsEmpty$
%pwdcheckqualitytab_cont$		tointeger	pwdCheckQuality0$	TopHBoxHSpacing0.5VBox
VSpacing0.8IntFieldidpwdInHistory.Ma&ximum Number of Passwords Stored in Historyldap-client	tointeger	pwdInHistory0VSpacing0.4LeftCheckBoxid
pwdMustChange&U&ser Must Change Password after Resetldap-client
pwdMustChangeVSpacing0.2LeftCheckBoxidpwdAllowUserChange&User Can Change Passwordldap-clientpwdAllowUserChangeVSpacing0.2LeftCheckBoxid
pwdSafeModify*&Old Password Required for Password Changeldap-client
pwdSafeModifyVSpacing0.4HBoxHSpacingFramePassword Quality Checkingldap-clientVBoxVSpacing0.5RadioButtonGroupidpwdCheckQualityVBoxLeftRadioButtonidoptnotify&No Checkingldap-client	LeftRadioButtonidoptnotifyAcc&ept Uncheckable Passwordsldap-client	LeftRadioButtonidoptnotify&Only Accept Checked Passwordsldap-client	VSpacing0.4IntFieldidpwdMinLength&Minimum Password Lengthldap-client	tointeger	pwdMinLength0HSpacing0.5,tabContents	,idpwdMinLengthEnabled	-%id	label	valuedayshoursminutes$
	tointeger		0$
/
**<<(
&
-
***
<<$
/
*<<(
&
-
**
<<$
/
<(
&
-
*
<-HBoxHSpacing0.3Frame	HBoxIntFieldid+				dDaysldap-client
IntFieldid+				hHoursldap-client
IntFieldid+				mMinutesldap-client;
IntFieldid+				sSecondsldap-client;
HSpacing0.3%
attr	dayshoursminutesseconds$
id+				dValue$
id+				hValue$
id+				mValue$
id+				sValue-+++***
<<**
<<*
<
%tab_cont$	TopHBoxHSpacing0.5VBoxVSpacing0.7	pwdMinAgeMinimum Password Ageldap-clientVSpacing0.4	pwdMaxAgeMaximum Password Ageldap-clientVSpacing0.4pwdExpireWarning0Time before Password Expiration to Issue Warningldap-clientVSpacing0.2IntFieldidpwdGraceAuthNLimit#Allowed Uses of an Expired Passwordldap-client	tointeger	pwdGraceAuthNLimit0HSpacing0.5,tabContents	-%
pwdlockouttab_cont$	
pwdLockout$	TopHBoxHSpacing0.5VBoxVSpacing0.8LeftCheckBoxid
pwdLockoutoptnotifyEnable Password Lockingldap-client	VSpacing0.4IntFieldid
pwdMaxFailure"Bind Failures to Lock the Passwordldap-client	tointeger	
pwdMaxFailure0pwdLockoutDurationPassword Lock Durationldap-clientVSpacing0.4pwdFailureCountIntervalBind Failures Cache Durationldap-clientHSpacing0.5,tabContents	,id
pwdMaxFailureEnabled	,		foreachsuffix	
	dhms,id+			pwdLockoutDuration
Enabled	,id+			pwdFailureCountInterval
Enabled	-!$$pwchange$%,',*Password Policy Configurationldap-client
+				,-,/)142&3(5&&


contains	backcancelabort
.7,:		foreachattr	
	val(;contains
4<'=
		
sformat		
%1

->$@id
Value(A&B		
sformat		
%1'C
(F&&||||pwchangeaginglockout4H(Ipwchange,J(Kaging,L(Mlockout,N&O
(P	,QidtabsCurrentItem,R+				/S(Unext4Vcont$W
,Z		foreachoc	objectClass	([
-[,\		foreachattr	
val$]
(^||||&&!
	4^,`		
sformat		
/The "%1" attribute is mandatory.
Enter a value.ldap-client
,bidtable&c
(g
/g.h(k&&pwchange4l,midpwdMinLengthEnabled(o&&lockout
pwdLockout4p
pwdlockout$q
id
pwdLockoutValue,rid
pwdMaxFailureEnabled
,s		foreachsuffix		dhms,tid+			pwdFailureCountIntervalEnabled
,vid+			pwdLockoutDurationEnabled
,{$}
(~next4,		foreachkey	val

	(&&!haskey
||


0-(

4(
&

TRUEFALSE'

-next

ACC SHELL 2018