t('Configuration Active'));?>
t('Backup (Replica) Host'));?>
t('Backup (Replica) Port'));?>
t('Disable Main Server'));?>
t('Turn off SSL certificate validation.'));?>
t('Cache Time-To-Live'));?>
t('User Display Name Field'));?>
t('2nd User Display Name Field'));?>
t('Base User Tree'));?>
t('User Search Attributes'));?>
t('Group Display Name Field'));?>
t('Base Group Tree'));?>
t('Group Search Attributes'));?>
t('Group-Member association'));?>>uniqueMember>memberUid>member (AD)>gidNumber>zimbraMailForwardingAddress
t('Dynamic Group Member URL'));?>
t('Nested Groups'));?>
t('Paging chunksize'));?>
t('Enable LDAP password changes per user'));?>t('(New password is sent as plain text to LDAP)'));?>
t('Default password policy DN'));?>
t('Quota Field'));?>
t('Quota Default'));?>
t('Email Field'));?>
t('User Home Folder Naming Rule'));?>
t('"$home" Placeholder Field')); ?>
t('Internal Username'));?>
t('By default the internal username will be created from the UUID attribute. It makes sure that the username is unique and characters do not need to be converted. The internal username has the restriction that only these characters are allowed: [ a-zA-Z0-9_.@- ]. Other characters are replaced with their ASCII correspondence or simply omitted. On collisions a number will be added/increased. The internal username is used to identify a user internally. It is also the default name for the user home folder. It is also a part of remote URLs, for instance for all *DAV services. With this setting, the default behavior can be overridden. Leave it empty for default behavior. Changes will have effect only on newly mapped (added) LDAP users.'));?>
t('Internal Username Attribute:'));?>
t('Override UUID detection'));?>
t('By default, the UUID attribute is automatically detected. The UUID attribute is used to doubtlessly identify LDAP users and groups. Also, the internal username will be created based on the UUID, if not specified otherwise above. You can override the setting and pass an attribute of your choice. You must make sure that the attribute of your choice can be fetched for both users and groups and it is unique. Leave it empty for default behavior. Changes will have effect only on newly mapped (added) LDAP users and groups.'));?>
t('UUID Attribute for Users:'));?>
t('UUID Attribute for Groups:'));?>
t('Username-LDAP User Mapping'));?>
t('Usernames are used to store and assign metadata. In order to precisely identify and recognize users, each LDAP user will have an internal username. This requires a mapping from username to LDAP user. The created username is mapped to the UUID of the LDAP user. Additionally the DN is cached as well to reduce LDAP interaction, but it is not used for identification. If the DN changes, the changes will be found. The internal username is used all over. Clearing the mappings will have leftovers everywhere. Clearing the mappings is not configuration sensitive, it affects all LDAP configurations! Never clear the mappings in a production environment, only in a testing or experimental stage.'));?>
t('Clear Username-LDAP User Mapping'));?>t('Clear Groupname-LDAP Group Mapping'));?>