text/microsoft-resx
2.0
System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
Home
Home page
Policies
Enabled
Two-step Login
Require users to set up two-step login on their personal accounts.
Master Password
Set minimum requirements for master password strength.
Password Generator
Set minimum requirements for password generator configuration.
Edit Policy - {0}
Organization members who do not have two-step login enabled for their personal account will be removed from the organization and will receive an email notifying them about the change.
Save
Cancel
Minimum Complexity Score
Minimum Length
Weak
Good
Strong
Default Type
User Preference
Password
Passphrase
Minimum Special
Minimum Numbers
Minimum Number of Words
Capitalize
Include Number
Warning
A-Z
a-z
0-9
!@#$%^&*
Select
The field {0} must be greater than or equal to {1}.
Single Sign-On
Edit SSO Configuration
Type
OpenID Connect
SAML 2.0
SSO Configuration
OpenID Connect Configuration
Authority
Client ID
Client Secret
Callback Path
Signed Out Callback Path
SAML Service Provider Configuration
Entity ID
SP Entity ID
Assertion Consumer Service (ACS) URL
Validate Certificates
Name ID Format
Not Configured
A SAML Name ID format
Unspecified
A SAML Name ID format
Email Address
A SAML Name ID format
X.509 Subject Name
A SAML Name ID format
Windows Domain Qualified Name
Kerberos Principal Name
Entity Identifier
Persistent
A SAML Name ID format
Transient
A SAML Name ID format
Private Key
SAML Identity Provider Configuration
Single Sign On Service URL
Single Log Out Service URL
Public Key
Want Assertions Signed
Signing Algorithm
Signing Behavior
Binding Type
Artifact Resolution Service URL
X509 Public Certificate
Outbound Signing Algorithm
Allow Unsolicited Authentication Response
Disable Outbound Logout Requests
Want Authentication Requests Signed
Metadata Address
Get Claims From User Info Endpoint
The Authority field is required on a Open ID Connect configuration.
The Client ID field is required on a Open ID Connect configuration.
The Client Secret field is required on a Open ID Connect configuration.
The Callback Path field is required on a Open ID Connect configuration.
The Service Provider Configuration Entity Id field is required on a SAML configuration.
The Identity Provider Configuration Entity Id field is required on a SAML configuration.
If SAML Signing Behavior is set to never, public and private service provider keys are required.
If SAML Binding Type is set to artifact, identity provider resolution service URL is required.
If Identity Provider Entity ID is not a URL, single sign on service URL is required.
The configured authentication scheme is not valid: "{0}"
No scheme or handler for this SSO configuration found.
SSO is not yet enabled for this organization.
No SSO configuration exists for this organization.
SSO is not allowed for this organization.
Organization not found from identifier.
No organization identifier provided.
Invalid authentication options provided to SAML2 scheme.
Invalid authentication options provided to OpenID Connect scheme.
Post configuration not executed against OpenID Connect scheme.
Reading OpenID Connect metadata failed.
No OpenID Connect metadata could be found or loaded.
Error performing pre validation.
Error
There was an unexpected error during single sign-on. Please close this page and try again.
There was an unexpected error during single sign-on. Please go back to <a href="{0}">{0}</a> or close this page and try again.
Request ID
Redirecting
You are now being returned to the application. Once complete, you may close this tab.
If IdP Wants Authn Requests Signed
Always
Never
Welcome to the Bitwarden Business Portal
The IdP public certificate provided is invalid: {0}
The IdP public certificate provided is not a valid Base64 encoded string, contains illegal characters or whitespace, or is incomplete.
The IdP public certificate provided does not appear to be a valid certificate, please ensure this is a valid, Base64 encoded PEM or CER format public certificate valid for signing: {0}
Copy the OIDC callback path to your clipboard
Copy the OIDC signed out callback path to your clipboard
Copy the SP Entity Id to your clipboard
Copy the Assertion Consumer Service (ACS) URL to your clipboard
Redirect
A SAML binding type, Redirect
HTTP POST
A SAML binding type, HTTP POST
Artifact
A SAML binding type, Artifact
No domain_hint provided.
invalid return URL
External authentication error
Unknown userid
Organization not found or SSO configuration not enabled
SSO provider, {0} is not an organization id
Cannot find email claim
Invalid user identifier.
Supplied userId and token did not match.
Could not find organization for '{0}'
No seats available for organization, '{0}'
User, '{0}', has already been invited to this organization, '{1}'
User already exists, please link account to SSO after logging in
Redirect GET
An OIDC Connect Redirect Behavior, Redirect; Emits a 302 response
to redirect the user agent to the OpenID Connect provider using a GET request.
Form POST
An OIDC Connect Redirect Behavior, Form POST; Emits an HTML form to
redirect the user agent to the OpenID Connect provider using a POST request.
OIDC Redirect Behavior
Only Organization
Restrict users from being able to join any other organizations.
Organization members who are already a part of another organization will be removed from this organization and will receive an email notifying them about the change.
Single Sign-On Authentication
Require users to log in with the Enterprise Single Sign-On method.
Prerequisite
The Single Organization enterprise policy must be enabled before activating this policy.
Single Organization policy not enabled.