You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
'<p class="description">'.__('Enable/disable Single Log Out. SLO is a complex functionality, the most common SLO implementation is based on front-channel (redirections), sometimes if the SLO workflow fails a user can be blocked in an unhandled view. If the admin does not controls the set of apps involved in the SLO process maybe is better to disable this functionality due could carry more problems than benefits.', 'onelogin-saml-sso').'</p>';
236
+
'<p class="description">'.__('Enable/disable Single Log Out. SLO is a complex functionality, the most common SLO implementation is based on front-channel (redirections), sometimes if the SLO workflow fails a user can be blocked in an unhandled view. If the admin does not control the set of apps involved in the SLO process, you may want to disable this functionality to avoid more problems than benefits.', 'onelogin-saml-sso').'</p>';
'<p class="description">'.__('Enable/disable the normal login form. If disabled, instead of prompt the login form, WP will excecute directly the SP-initiated SSO flow. If enabled the normal login form is showed and a link to initiate that flow is prompted.', 'onelogin-saml-sso').'</p>';
243
+
'<p class="description">'.__('Enable/disable the normal login form. If disabled, instead of the WordPress login form, WordPress will excecute the SP-initiated SSO flow. If enabled the normal login form is displayed and a link to initiate that flow is displayed.', 'onelogin-saml-sso').'</p>';
'<p class="description">'.__("Select what field will be used in order to find the user account. If you select the 'email' fieldname the plugin will prevent that the user can change his mail in his profile.", 'onelogin-saml-sso').'</p>';
253
+
'<p class="description">'.__('Select what field will be used in order to find the user account. If "email", the plugin will prevent the user from changing their email address in their user profile.', 'onelogin-saml-sso').'</p>';
'<p class="description">'.__('Enable it if you want to use a different Assertion Consumer endpoint than the /wp-login.php?saml_acs (Required if using WPEngine or any similar hosting service that prevent POST on wp-login.php). If you enable/disable it, after saving the metadata of the SP changes so update the IdP with the new value', 'onelogin-saml-sso').'</p>';
260
+
'<p class="description">'.__('Enable if you want to use a different Assertion Consumer Endpoint than <code>/wp-login.php?saml_acs</code> (Required if using WPEngine or any similar hosting service that prevents POST on <code>wp-login.php</code>). You must update the IdP with the new value after enabling/disabling this setting.', 'onelogin-saml-sso').'</p>';
<p class="description">'.__("Sometimes role values are provided in an unique attribute statement (instead multiple attribute statements). Active it and the plugin will try to split those values by ;<br>Use the regular pattern in order to extract complex data", 'onelogin-saml-sso').'</p>';
303
+
<p class="description">'.__("Sometimes role values are provided in an unique attribute statement (instead multiple attribute statements). If that is the case, activate this and the plugin will try to split those values by ;<br>Use a regular expression pattern in order to extract complex data.", 'onelogin-saml-sso').'</p>';
<p class="description">'.__("Regular expression that extract roles from complex multivalued data (require to active the previous boolean).<br> Ex. If the SAMLResponse has a role attribute like: CN=admin;CN=superuser;CN=europe-admin; , use the regular expression /CN=([A-Z0-9\s _-]*);/i to retrieve the values. Or use /CN=([^,;]*)/", 'onelogin-saml-sso').'</p>';
309
+
<p class="description">'.__("Regular expression that extract roles from complex multivalued data (required to active the previous option).<br> E.g. If the SAMLResponse has a role attribute like: CN=admin;CN=superuser;CN=europe-admin; , use the regular expression <code>/CN=([A-Z0-9\s _-]*);/i</code> to retrieve the values. Or use <code>/CN=([^,;]*)/</code>", 'onelogin-saml-sso').'</p>';
<p class="description">'.__("Check it in order to disable the ?normal option in order to offer the local login when it is not enabled.", 'onelogin-saml-sso').'</p>';
316
+
<p class="description">'.__("Check to disable the <code>?normal</code> option and offer the local login when it is not enabled.", 'onelogin-saml-sso').'</p>';
<p class="description">'.__("Check it in order to disable the ability of change the mail on WordPress (we recommend that if you are using mail as the account matcher field.", 'onelogin-saml-sso').'</p>';
337
+
<p class="description">'.__("Check to disable changing the email addresses in WordPress (recommended if you are using email to match accounts).", 'onelogin-saml-sso').'</p>';
<p class="description">'.__("If SLO and Force SAML login are enabled, after the SLO process you will be redirected to the WP main page and a SAML SSO process will start, to prevent that check this and you will stay at the WordPress Login Form. ", 'onelogin-saml-sso').'</p>';
344
+
<p class="description">'.__("If SLO and Force SAML login are enabled, after the SLO process you will be redirected to the WordPress main page and a SAML SSO process will start. Check this to prevent that and stay at the WordPress login form. ", 'onelogin-saml-sso').'</p>';
<p class="description">'.__("Override the lost password link. (prevent reset password must be deactivated or always the SAMl SSO will be forced)", 'onelogin-saml-sso').'</p>';
356
+
<p class="description">'.__("Override the lost password link. (Prevent reset password must be deactivated or the SAML SSO will be used.)", 'onelogin-saml-sso').'</p>';
'<p class="description">'.__("If Strict mode is Enabled, then WordPress will reject unsigned or unencrypted messages if it expects them signed or encrypted.
377
-
Also will reject the messages if not strictly follow the SAML standard: Destination, NameId, Conditions ... are validated too.", 'onelogin-saml-sso').'</p>';
376
+
'<p class="description">'.__("If Strict Mode is enabled, WordPress will reject unsigned or unencrypted messages if it expects them signed or encrypted.
377
+
It will also reject messages if not strictly following the SAML standard: Destination, NameId, Conditions ... are also validated.", 'onelogin-saml-sso').'</p>';
echo'<p class="description">'.__('Public x509 certificate of the SP. Leave this field empty if you gonna provide the cert by the sp.crt', 'onelogin-saml-sso');
440
+
echo'<p class="description">'.__('Public x509 certificate of the SP. Leave this field empty if you are providing the cert by the sp.crt.', 'onelogin-saml-sso');
echo'<p class="description">'.__('Private Key of the SP. Leave this field empty if you gonna provide the private key by the sp.key', 'onelogin-saml-sso');
447
+
echo'<p class="description">'.__('Private Key of the SP. Leave this field empty if you are providing the private key by the sp.key.', 'onelogin-saml-sso');
'<p class="description">'.__('Sometimes when the app is behind a firewall or proxy, the query parameters can be modified an this affects the signature validation process on HTTP-Redirectbinding. Active this when you noticed signature validation failures, the plugin will try to extract the original query parameters.', 'onelogin-saml-sso').'</p>';
454
+
'<p class="description">'.__('Sometimes when the app is behind a firewall or proxy, the query parameters can be modified an this affects the signature validation process on HTTP-Redirectbinding. Active this if you are seeing signature validation failures. The plugin will try to extract the original query parameters.', 'onelogin-saml-sso').'</p>';
@@ -506,33 +506,33 @@ function plugin_setting_select_onelogin_saml_advanced_requestedauthncontext() {
506
506
}
507
507
508
508
functionplugin_section_idp_text() {
509
-
echo"<p>".__("Set here some info related to the IdP that will be connected with our WordPress. You can find this values at the Onelogin's platform in the WordPress App at the Single Sign-On tab", 'onelogin-saml-sso')."</p>";
509
+
echo"<p>".__("Set information relating to the IdP that will be connected with our WordPress. You can find these values at the Onelogin's platform inside WordPress on the Single Sign-On tab.", 'onelogin-saml-sso')."</p>";
510
510
}
511
511
512
512
functionplugin_section_options_text() {
513
-
echo"<p>".__("In this section the behavior of the plugin is set.", 'onelogin-saml-sso')."</p>";
513
+
echo"<p>".__("This section customizes the behavior of the plugin.", 'onelogin-saml-sso')."</p>";
514
514
}
515
515
516
516
functionplugin_section_attr_mapping_text() {
517
-
echo"<p>".__("Sometimes the names of the attributes sent by the IdP not match the names used by WordPress for the user accounts. In this section we can set the mapping between IdP fields and WordPress fields. Notice that this mapping could be also set at Onelogin's IdP", 'onelogin-saml-sso')."</p>";
517
+
echo"<p>".__("Sometimes the names of the attributes sent by the IdP do not match the names used by WordPress for the user accounts. In this section you can set the mapping between IdP fields and WordPress fields. Note: This mapping could be also set at Onelogin's IdP.", 'onelogin-saml-sso')."</p>";
518
518
}
519
519
520
520
functionplugin_section_role_mapping_text() {
521
-
echo"<p>".__("The IdP can use it's own roles. Set in this sectionthe mapping between IdP and WordPress roles. Accepts multiple valued comma separated. Example: admin,owner,superuser", 'onelogin-saml-sso')."</p>";
521
+
echo"<p>".__("The IdP can use its own roles. In this section, you can set the mapping between IdP and WordPress roles. Accepts comma separated values. Example: <code>admin,owner,superuser</code>", 'onelogin-saml-sso')."</p>";
522
522
}
523
523
524
524
functionplugin_section_role_order_text() {
525
-
echo"<p>".__("In some cases, the IdP returns more than one role. Set in this secionthe precedence of the different roles, the smallest integer will be the role chosen.", 'onelogin-saml-sso')."</p>";
525
+
echo"<p>".__("In some cases, the IdP returns more than one role. In this secion, you can set the precedence of the different roles. The smallest integer will be the role chosen.", 'onelogin-saml-sso')."</p>";
526
526
}
527
527
528
528
functionplugin_section_customize_links_text() {
529
-
echo"<p>".__("When we enable the SAML SSO to be integrated with a IdP some WordPress actions and links could be changed. In this section you will be able to enable or disable the ability of change the mail, change the password and reset the password. Also can override the user registration and the lost password links", 'onelogin-saml-sso')."</p>";
529
+
echo"<p>".__("When SAML SSO is enabled to be integrated with an IdP, some WordPress actions and links could be changed. In this section, you will be able to enable or disable the ability for users to change their email address, password and reset their password. You can also override the user registration and the lost password links.", 'onelogin-saml-sso')."</p>";
530
530
}
531
531
532
532
functionplugin_section_advanced_settings_text() {
533
-
echo"<p>".__("Handle some other parameters related to customizations and security issues.<br>If sign/encryption is enabled, then x509 cert and private key for the SP must be provided. There are 2 ways:<br>
534
-
1. Store them as files named sp.key and sp.crt on the 'certs' folder of the plugin. (be sure that the folder is protected and not exposed to internet)<br>
535
-
2. Store them at the database, filling the corresponding textareas. (take care of security issues)", 'onelogin-saml-sso')."</p>";
533
+
echo"<p>".__("Handle some other parameters related to customizations and security issues.<br>If signing/encryption is enabled, then x509 cert and private key for the SP must be provided. There are 2 ways:<br>
534
+
1. Store them as files named sp.key and sp.crt on the 'certs' folder of the plugin. (Make sure that the <code>/cert</code> folder is read-protected and not exposed to internet.)<br>
535
+
2. Store them at the database, filling the corresponding textareas.", 'onelogin-saml-sso')."</p>";
0 commit comments