text/microsoft-resx 2.0 System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 Home Home page Policies Enabled Two-step Login Require users to set up two-step login on their personal accounts. Master Password Set minimum requirements for master password strength. Password Generator Set minimum requirements for password generator configuration. Edit Policy - {0} Organization members who do not have two-step login enabled for their personal account will be removed from the organization and will receive an email notifying them about the change. Save Cancel Minimum Complexity Score Minimum Length Weak Good Strong Default Type User Preference Password Passphrase Minimum Special Minimum Numbers Minimum Number of Words Capitalize Include Number Warning A-Z a-z 0-9 !@#$%^&* Select The field {0} must be greater than or equal to {1}. Single Sign-On Edit SSO Configuration Type OpenID Connect SAML 2.0 SSO Configuration OpenID Connect Configuration Authority Client ID Client Secret Callback Path Signed Out Callback Path SAML Service Provider Configuration Entity ID SP Entity ID Assertion Consumer Service (ACS) URL Validate Certificates Name ID Format Not Configured A SAML Name ID format Unspecified A SAML Name ID format Email Address A SAML Name ID format X.509 Subject Name A SAML Name ID format Windows Domain Qualified Name Kerberos Principal Name Entity Identifier Persistent A SAML Name ID format Transient A SAML Name ID format Private Key SAML Identity Provider Configuration Single Sign On Service URL Single Log Out Service URL Public Key Want Assertions Signed Signing Algorithm Signing Behavior Binding Type Artifact Resolution Service URL X509 Public Certificate Outbound Signing Algorithm Allow Unsolicited Authentication Response Disable Outbound Logout Requests Want Authentication Requests Signed Metadata Address Get Claims From User Info Endpoint The Authority field is required on a Open ID Connect configuration. The Client ID field is required on a Open ID Connect configuration. The Client Secret field is required on a Open ID Connect configuration. The Callback Path field is required on a Open ID Connect configuration. The Service Provider Configuration Entity Id field is required on a SAML configuration. The Identity Provider Configuration Entity Id field is required on a SAML configuration. If SAML Signing Behavior is set to never, public and private service provider keys are required. If SAML Binding Type is set to artifact, identity provider resolution service URL is required. If Identity Provider Entity ID is not a URL, single sign on service URL is required. The configured authentication scheme is not valid: "{0}" No scheme or handler for this SSO configuration found. SSO is not yet enabled for this organization. No SSO configuration exists for this organization. SSO is not allowed for this organization. Organization not found from identifier. No organization identifier provided. Invalid authentication options provided to SAML2 scheme. Invalid authentication options provided to OpenID Connect scheme. Post configuration not executed against OpenID Connect scheme. Reading OpenID Connect metadata failed. No OpenID Connect metadata could be found or loaded. Error performing pre validation. Error There was an unexpected error during single sign-on. Please close this page and try again. There was an unexpected error during single sign-on. Please go back to <a href="{0}">{0}</a> or close this page and try again. Request ID Redirecting You are now being returned to the application. Once complete, you may close this tab. If IdP Wants Authn Requests Signed Always Never Welcome to the Bitwarden Business Portal The IdP public certificate provided is invalid: {0} The IdP public certificate provided is not a valid Base64 encoded string, contains illegal characters or whitespace, or is incomplete. The IdP public certificate provided does not appear to be a valid certificate, please ensure this is a valid, Base64 encoded PEM or CER format public certificate valid for signing: {0} Copy the OIDC callback path to your clipboard Copy the OIDC signed out callback path to your clipboard Copy the SP Entity Id to your clipboard Copy the Assertion Consumer Service (ACS) URL to your clipboard Redirect A SAML binding type, Redirect HTTP POST A SAML binding type, HTTP POST Artifact A SAML binding type, Artifact No domain_hint provided. invalid return URL External authentication error Unknown userid Organization not found or SSO configuration not enabled SSO provider, {0} is not an organization id Cannot find email claim Invalid user identifier. Supplied userId and token did not match. Could not find organization for '{0}' No seats available for organization, '{0}' User, '{0}', has already been invited to this organization, '{1}' User already exists, please link account to SSO after logging in Redirect GET An OIDC Connect Redirect Behavior, Redirect; Emits a 302 response to redirect the user agent to the OpenID Connect provider using a GET request. Form POST An OIDC Connect Redirect Behavior, Form POST; Emits an HTML form to redirect the user agent to the OpenID Connect provider using a POST request. OIDC Redirect Behavior Only Organization Restrict users from being able to join any other organizations. Organization members who are already a part of another organization will be removed from this organization and will receive an email notifying them about the change. Single Sign-On Authentication Require users to log in with the Enterprise Single Sign-On method. Prerequisite The Single Organization enterprise policy must be enabled before activating this policy. Single Organization policy not enabled.