瀏覽代碼

Update PwmSetting.properties

Added edits through line 556.
Juliet Jensen 8 年之前
父節點
當前提交
31f0055864
共有 1 個文件被更改,包括 56 次插入56 次删除
  1. 56 56
      src/main/resources/password/pwm/i18n/PwmSetting.properties

+ 56 - 56
src/main/resources/password/pwm/i18n/PwmSetting.properties

@@ -498,62 +498,62 @@ Setting_Description_passwordLastUpdateAttribute=Specify the attribute that @PwmA
 Setting_Description_password.policy.ADComplexity=Enforce Microsoft Active Directory 2003 style password complexity rules\:<ul><li>Not contain the user's account name or parts of the user's full name that exceed two consecutive characters</li><li>Be at least six characters in length</li><li>Contain characters from three of the following four categories\:<ul><li>English uppercase characters (A through Z)</li><li>English lowercase characters (a through z)</li><li>Base 10 digits (0 through 9)</li><li>Non-alphabetic characters (for example, \!, $, \#, %)</li></ul></ul>
 Setting_Description_password.policy.ADComplexityLevel=Select the Microsoft Active Directory style password complexity rules. <p><code>AD 2003 Level Complexity\:</code></p> <ul> <li>Cannot contain the user's account name or parts of the user's full name that exceed two consecutive characters</li> <li>Minimum 6 characters</li> <li>Maximum 128 characters</li> <li> Must contain characters from three of the following four categories\: <ul> <li>English uppercase characters (A through Z)</li> <li>English lowercase characters (a through z)</li> <li>Base 10 digits (0 through 9)</li> <li>Non-alphabetic characters (For example, \!, $, \#, %)</li> </ul> </li> </ul> <p><code>AD 2008 Level Complexity\:</code></p> <ul> <li>Cannot contain the user's account name or parts of the user's full name that exceed two consecutive characters</li> <li>Minimum 6 characters</li> <li>Maximum 512 characters</li> <li> Must contain characters from several of the following categories. The setting <a data-gotoSettingLink\="password.policy.ADComplexityMaxViolations">@PwmSettingReference\:password.policy.ADComplexityMaxViolations@</a> specifies the exact number of catagories.<ul> <li>European language uppercase alphabetic characters</li> <li>European language lowercase alphabetic characters</li> <li>Base 10 digits (0 through 9)</li> <li>Non-alphabetic characters (for example, \!, $, \#, %)</li> <li>Other alphabetic characters not included in the other categories</li> </ul> </li> </ul>
 Setting_Description_password.policy.ADComplexityMaxViolations=Specify the maximum number of Active Directory 2008 Level Complexity category violations.  This setting has no effect unless the setting <a data-gotoSettingLink\="password.policy.ADComplexityLevel">@PwmSettingReference\:password.policy.ADComplexityLevel@</a> is set to <code>AD 2008 Level Complexity</code>.
-Setting_Description_password.policy.allowFirstCharNumeric=Enable this option to allow the first character of the password to be numeric.  Applies only if you allow numeric characters.
-Setting_Description_password.policy.allowFirstCharSpecial=Allow the first character of the password to be special.  Applies only if special characters are allowed.
-Setting_Description_password.policy.allowLastCharNumeric=Allow the last character of the password to be numeric.  Applies only if numeric characters are allowed.
-Setting_Description_password.policy.allowLastCharSpecial=Allow the last character of the password to be special.  Applies only if special characters are allowed.
-Setting_Description_password.policy.allowNumeric=Allow numeric characters in password.
-Setting_Description_password.policy.allowSpecial=Allow special (non alpha-numeric) characters in password.
-Setting_Description_password.policy.caseSensitivity=Controls if the password is case sensitive.  In most cases, this can be read from the directory, but in some cases this value is not able to correctly read, so you may override it here.
-Setting_Description_password.policy.changeMessage=Message to be displayed to user during password changes.  May include HTML markup.  This setting may be overwritten by a change password message read as part of an ldap password policy.
-Setting_Description_password.policy.charGroup.minimumMatch=The number of regular expression matches defined in the setting <code>@PwmSettingReference\:password.policy.charGroup.regExValues@</code>.
-Setting_Description_password.policy.charGroup.regExValues=A list of regular expression character matches.  Along with the setting <code>@PwmSettingReference\:password.policy.charGroup.minimumMatch@</code>, this setting allows creating a complex list of requirements that the user will only need to partially match.  For example, this type of policy could be used to replicate Active Directory's "3 out of 5" rules, but with more flexibility and customization.
-Setting_Description_password.policy.checkWordlist=Check the password against the configured Word List.
-Setting_Description_password.policy.disallowCurrent=Prohibit current password from being used as new password.  Note that this can only be enforced if the login method permits the user's password to be known.
-Setting_Description_password.policy.disallowedAttributes=A list of attributes not allowed to be used as passwords.  For a given user, the values will be read and will not be permitted to be used as part of the password value.  This check is case insensitive.  Note: specifying a number after the attribute name will restrict how many consecutive characters in the value are disallowed (i.e. "Language:4" means the password can't contain: "Engl", "ngli", "glis", or "lish", for English speaking users).
-Setting_Description_password.policy.disallowedValues=A case insensitive list of values not allowed to be used as passwords.
-Setting_Description_password.policy.maximumAlpha=Maximum amount of alphabetic characters required.  A value of zero disables this check.
-Setting_Description_password.policy.maximumConsecutive=Maximum amount of characters in a sequence such as <i>0123456789</i> or <i>abcdefghijk</i>.  More specifically character sequence is defined by unicode character order of each character after the entire value is converted to lowercase.   A value of 0 disables this check.
-Setting_Description_password.policy.maximumLength=Maximum length of password.  A value of zero disables this check.
-Setting_Description_password.policy.maximumLowerCase=Maximum amount of lowercase characters required.  A value of zero disables this check.
-Setting_Description_password.policy.maximumNonAlpha=Maximum amount of non-alphabetic characters required.  A value of zero disables this check.
-Setting_Description_password.policy.maximumNumeric=Maximum amount of numeric characters required (if numeric allowed).  A value of zero disables this check.
-Setting_Description_password.policy.maximumOldPasswordChars=Maximum amount of characters from the previous password allowed in the new password.  A value of zero disables this check.
-Setting_Description_password.policy.maximumRepeat=Maximum times any character may be repeated throughout the password.  Case is ignored for this check. A value of zero disables this check.
-Setting_Description_password.policy.maximumSequentialRepeat=Maximum times any character may be sequentially repeated throughout the password.Case is ignored for this check.  A value of zero disables this check.
-Setting_Description_password.policy.maximumSpecial=Maximum amount of special characters required (if special allowed).  A value of zero disables this check.
-Setting_Description_password.policy.maximumUpperCase=Maximum amount of uppercase characters required.  A value of zero disables this check.
-Setting_Description_password.policy.minimumAlpha=Minimum amount of alphabetic characters required.  A value of zero disables this check.
-Setting_Description_password.policy.minimumLength=Minimum length of password.   A value of zero disables this check.
-Setting_Description_password.policy.minimumLifetime=Minimum amount of time that must pass between password changes.  Value is in seconds.  A value of zero disables this check.
-Setting_Description_password.policy.minimumLowerCase=Minimum amount of lowercase characters required.  A value of zero disables this check.
-Setting_Description_password.policy.minimumNonAlpha=Minimum amount of non-alphabetic characters required.  A value of zero disables this check.
-Setting_Description_password.policy.minimumNumeric=Minimum amount of numeric characters required (if numeric allowed).  A value of zero disables this check.
-Setting_Description_password.policy.minimumSpecial=Minimum amount of special characters required (if special allowed).  A value of zero disables this check.
-Setting_Description_password.policy.minimumStrength=Password strengths are judged on a strength on a scale of 0 to 100 irrespective of other password policy settings.  This setting requires that the user have a password that meets the minimum strength level specified here, regardless of other password policy rules.   45 or better is considered "good" while 70 or better is considered "strong".  A value of 0 disables this check.
-Setting_Description_password.policy.minimumUnique=Minimum amount of unique characters allowed.  A value of zero disables this check.
-Setting_Description_password.policy.minimumUpperCase=Minimum amount of uppercase characters required.  A value of zero disables this check.
-Setting_Description_password.policy.queryMatch=Settings here are used to determine if this password policy applies to a given user.  During login, if a previous policy has not yet been assigned to the user, the matches here are considered and if positive, the user will then be assigned this policy.
-Setting_Description_password.policy.regExMatch=A Regular Expression pattern the password must match in order to be allowed.  Multiple patterns can be listed.  A pattern must match the <i>entire</i> password to be applied.  A partial match is ignored.  You can use macros.
-Setting_Description_password.policy.regExNoMatch=A Regular Expression pattern the password must <b>not</b> match in order to be allowed.  Multiple patterns can be listed.  A pattern must match the <i>entire</i> password to be applied.  A partial match is ignored.  You can use macros.
-Setting_Description_password.policy.ruleText=When blank, an automatically generated rule list will be displayed to the user. The automated rule list may not be inclusive of all settings in the password policy. Some of the more esoteric or difficult to communicate rules will not appear in the automatically generated list.  This is done in an attempt to not overwhelm the user with having to read and parse the rules before attempting to change the password.  Should the user type a password that conflicts with such a rule - the per-keystroke rule checker will provide direct feedback to the user on how to correct the problem.<br/><br/>If the automatically generated rule list is not desired, it can be overridden by setting a value here.  HTML tags are permitted.
-Setting_Description_password.policy.source=This setting determines where password policy settings should be read from.  If <code>LDAP</code> is selected, an attempt to read the policy out of the ldap directory will be made, and many of the following settings could be ignored.  If <code>Local Config</code> is selected, the policy settings on this page are used, and any policy settings in the LDAP directory are ignored.  If <code>Merge</code> is selected, both policies are read, and where there is any conflict, The application will chose the most restrictive value of the policy.<br/><br/>The capability to read policy from LDAP is only available with some LDAP directory types.  <p>Additionally, the password policy used is only the "local" policy used by this application.  Upon a password set operation, the LDAP directory will typically enforce whatever policies are configured in the directory itself.
-Setting_Description_password.profile.list=List of Password Policy Profiles.  When multiple password policy profiles are configured, all profiles are evaluated in order to check if the setting <code>@PwmSettingReference\:password.policy.queryMatch@</code> matches the user.
-Setting_Description_password.require.form=Values required to be entered prior to password change.
-Setting_Description_password.sharedHistory.age=The maximum age of the shared history storage.  Value is specified in seconds.  Default is 28 days.
-Setting_Description_password.sharedHistory.enable=Enable a global shared password history for all users.  If enabled, all users will share a common password history.  This helps prevent common organizational words from being used as passwords by users.  Passwords are stored as a salted and encrypted hash in the LocalDB.
-Setting_Description_password.showAutoGen=If set to true, a link will be displayed to users during the change password process to display a list of auto-generated sample passwords that are allowed by the configured password policies.  The user will have the option to select and use one of the values in the list.  If this option feature is enabled the user is not forced to choose a password from the list.
-Setting_Description_password.showStrengthMeter=If true, the user will see the password strength meter on the change password screen.
-Setting_Description_passwordSync.enableReplicaCheck=Check for the password to be updated on all configured replicas (for a user's LDAP Profile).  When enabled, replica sync checking will poll all of the configured replicas on the user's LDAP Profile to determine if the password change time has been updated.  The particular method to determine the last password change time varies per LDAP vendor type.
-Setting_Description_passwordSyncMaxWaitTime=During a password change, the system will wait for the password to be synchronized to all configured LDAP servers.  In cases where the synchronization may take an extraordinary amount of time, this setting will prevent the page from timing out.<br/><br/>Value is specified in seconds.
-Setting_Description_passwordSyncMinWaitTime=During a password change, a delay of this amount will be waited for before forwarding the user.  This gives any background synchronization processes time to execute before the user executes the next operation.<br/><br/>Value is specified in seconds.
-Setting_Description_password.wordlist.wordSize=Minimum number of characters in the password that are checked against the wordlist dictionary. For example, if the password to be checked is "wordlist" and this setting is set to 6, then the combinations "wordli", "wordlis", "wordlist", "ordlis", "ordlist" and "rdlist" would all be checked against the configured dictionary. If any of these values are equal to any word in the wordlist dictionary, then the password is considered to match the wordlist and will be rejected. If this value is set to zero or the password to check is smaller then the value specified here, then the entire password is checked against the wordlist but not any smaller parts of it.
-Setting_Description_peopleSearch.detail.form=Attributes to be shown during the detail view of of an individual person record.
-Setting_Description_peopleSearch.displayName.cardLabels=Display labels for user panel in PeopleSearch detail and on org chart views.  LDAP Attribute value such as <code>@LDAP\:givenName@</code> macros can be used.  A maximum of four values can be set.
-Setting_Description_peopleSearch.displayName.user=Display name for userDN type records.  Use macros to control the presentation such as the LDAP attribute macro <code>@LDAP\:givenName@</code>.
-Setting_Description_peopleSearch.enable=Enable the PeopleSearch module.
-Setting_Description_peopleSearch.enablePublic=
-Setting_Description_peopleSearch.idleTimeout=Number of seconds after which an authenticated session becomes unauthenticated.   If the value is set to 0, then the application wide idle timeout value will be used.  If a user is using the PeopleSearch module without authenticating, then no timeout is applied.
+Setting_Description_password.policy.allowFirstCharNumeric=Enable this option to allow the first character of the password to be numeric.  Applies only if the password policy allows numeric characters.
+Setting_Description_password.policy.allowFirstCharSpecial=Enable this option to allow the first character of the password to be a special character.  Applies only if the password policy allows special characters.
+Setting_Description_password.policy.allowLastCharNumeric=Enable this option to allow the last character of the password to be numeric.  Applies only if the password policy allows numeric characters.
+Setting_Description_password.policy.allowLastCharSpecial=Enalbe this option to allow the last character of the password to be a special character.  Applies only if the password policy allows special characters.
+Setting_Description_password.policy.allowNumeric=Enable this option to allow numeric characters in the password.
+Setting_Description_password.policy.allowSpecial=Enable this option to allow special (non alpha-numeric) characters in the password.
+Setting_Description_password.policy.caseSensitivity=Enable this option to control if the password is case sensitive.  In most cases, @PwmAppName@ can read this from the directory, but in some cases the system cannot correctly read this value, so you can override it here.
+Setting_Description_password.policy.changeMessage=Specify a message @PwmAppName@ displays to the users during password changes.  Might include HTML markup.  You can override this setting by adding a change password message read as part of an LDAP password policy.
+Setting_Description_password.policy.charGroup.minimumMatch=Specify tthe number of regular expression matches defined in the setting <code>@PwmSettingReference\:password.policy.charGroup.regExValues@</code>.
+Setting_Description_password.policy.charGroup.regExValues=Add an LDPA filter that contains a list of regular expression character matches.  Along with the setting <code>@PwmSettingReference\:password.policy.charGroup.minimumMatch@</code>, this setting allows creating a complex list of requirements that the user only needs to partially match.  For example, you can use this type of policy to replicate the Active Directory "3 out of 5" rules, but with more flexibility and customization.
+Setting_Description_password.policy.checkWordlist=Enable this option ot check the password against the configured Word List.
+Setting_Description_password.policy.disallowCurrent=Enable this option to prohibit the current password from being used as new password.  Note: @PwmAppName@ can only enforce this if the login method permits the user's password to be known.
+Setting_Description_password.policy.disallowedAttributes=Specify a list of attributes not allowed to be used as passwords.  For a given user, @PwmAppName@ reads the values and does not permit the users to use it as part of the password value.  This check is case insensitive.  Note: Specifying a number after the attribute name restricts how many consecutive characters @PwmAppName@ disallows in the value (For exmaple: "Language:4" means the password cannot contain: "Engl", "ngli", "glis", or "lish", for English speaking users).
+Setting_Description_password.policy.disallowedValues=Speciy a case insensitive list of values @PwmAppName@ does not allow the users to use as passwords.
+Setting_Description_password.policy.maximumAlpha=Specify the maximum amount of alphabetic characters required.  A value of zero disables this check.
+Setting_Description_password.policy.maximumConsecutive=Speicfy the maximum amount of characters in a sequence such as <b>0123456789</b> or <b>abcdefghijk</b>.  @PwmAppName@ defines a more specific character sequence by the unicode character order of each character after it converts the entire value to lowercase.   A value of 0 disables this check.
+Setting_Description_password.policy.maximumLength=Specify the maximum length of password.  A value of zero disables this check.
+Setting_Description_password.policy.maximumLowerCase=Specify the maximum amount of lowercase characters required.  A value of zero disables this check.
+Setting_Description_password.policy.maximumNonAlpha=Specify the maximum amount of non-alphabetic characters required.  A value of zero disables this check.
+Setting_Description_password.policy.maximumNumeric=Specify the maximum amount of numeric characters required (if the password policy allows numeric).  A value of zero disables this check.
+Setting_Description_password.policy.maximumOldPasswordChars=Specify the maximum amount of characters from the previous password allowed in the new password.  A value of zero disables this check.
+Setting_Description_password.policy.maximumRepeat=Specify the maximum amount of times the users might repeat any character throughout the password.  @PwmAppName@ ignores case for this check. A value of zero disables this check.
+Setting_Description_password.policy.maximumSequentialRepeat=Specify the maximum times the users might sequentially repeat any character throughout the password. @PwmAppName@ ignores case for this check.  A value of zero disables this check.
+Setting_Description_password.policy.maximumSpecial=Specify the maximum amount of special characters required (if the password policy allows special characters).  A value of zero disables this check.
+Setting_Description_password.policy.maximumUpperCase=Specify the maximum amount of uppercase characters required.  A value of zero disables this check.
+Setting_Description_password.policy.minimumAlpha=Specify the minimum amount of alphabetic characters required.  A value of zero disables this check.
+Setting_Description_password.policy.minimumLength=Specify the minimum length of the password.   A value of zero disables this check.
+Setting_Description_password.policy.minimumLifetime=Specify the minimum amount of time that must pass between password changes.  Value is in seconds.  A value of zero disables this check.
+Setting_Description_password.policy.minimumLowerCase=Specify the minimum amount of lowercase characters required.  A value of zero disables this check.
+Setting_Description_password.policy.minimumNonAlpha=Specify the minimum amount of non-alphabetic characters required.  A value of zero disables this check.
+Setting_Description_password.policy.minimumNumeric=Specify the minimum amount of numeric characters required (if numeric allowed).  A value of zero disables this check.
+Setting_Description_password.policy.minimumSpecial=Specify the minimum amount of special characters required (if special allowed).  A value of zero disables this check.
+Setting_Description_password.policy.minimumStrength=Specify the strength of the passwords. @PwmAppName@ judges the password strengths on a strength on a scale of 0 to 100 irrespective of other password policy settings.  This setting requires that the user have a password that meets the minimum strength level specified here, regardless of other password policy rules.   "Good" is 45 or better while 70 or better is considered "strong".  A value of 0 disables this check.
+Setting_Description_password.policy.minimumUnique=Specify the minimum amount of unique characters allowed.  A value of zero disables this check.
+Setting_Description_password.policy.minimumUpperCase=Specify the minimum amount of uppercase characters required.  A value of zero disables this check.
+Setting_Description_password.policy.queryMatch=Specify a query to determine if this password policy applies to a given user.  During login, if the system has not assigned a previous policy to the user, it considers the matches here and if positive, it assigns the user to this policy.
+Setting_Description_password.policy.regExMatch=Specify a Regular Expression pattern the password must match for the system to allow it.  You can list multiple patterns.  A pattern must match the <b>entire</b> password for the system to apply it.  @PwmAppName@ ignores A partial match.  You can use macros.
+Setting_Description_password.policy.regExNoMatch=Specify a Regular Expression pattern the password must <b>not</b> match for the system to allow it.  You can list multiple patterns.  A pattern must match the <b>entire</b> password for the system to apply it.  @PwmAppName@ ignores a partial match.  You can use macros.
+Setting_Description_password.policy.ruleText=When blank, @PwmAppName@ displays an automatically generated rule list to the user. The automated rule list may not be inclusive of all settings in the password policy. Some of the more esoteric or difficult to communicate rules do not appear in the automatically generated list.  This is done in an attempt to not overwhelm the users with having to read and parse the rules before attempting to change their passwords.  Should the user type a password that conflicts with such a rule - the per-keystroke rule checker provides direct feedback to the user on how to correct the problem.<br/><br/>If you do not want the automatically generated rule list, you can override it by setting a value here.  The field permits HTML tags.
+Setting_Description_password.policy.source=Selct where @PwmAppName@ reads the password policy settings.  If you select <code>LDAP</code>, @PwmAppName@ attempts to read the policy out of the LDAP directory, and it could ignore many of the following settings.  If you select <code>Local Config</code>, then @PwmAppName@ uses the policy settings on this page, and it ignores any policy settings in the LDAP directory.  If you select <code>Merge</code>, @PwmAppName@ reads both policies, and where there is any conflict, @PwmAppName@ chooses the most restrictive value of the policy.<br/><br/>The capability to read policy from LDAP is only available with some LDAP directory types.  <p>Additionally, @PwmAppName@ uses the password policy as the only "local" policy.  Upon a password set operation, the LDAP directory typically enforces whatever policies are configured in the directory itself.
+Setting_Description_password.profile.list=Add a list of Password Policy Profiles.  When you configure multiple password policy profiles, @PwmAppName@ evalutes all profiles in order to check if the setting <code>@PwmSettingReference\:password.policy.queryMatch@</code> matches the user.
+Setting_Description_password.require.form=Specify the values the users are required to enter prior to a password change.
+Setting_Description_password.sharedHistory.age=Specify the maximum age of the shared history storage.  Specify the value in seconds.  Default is 28 days.
+Setting_Description_password.sharedHistory.enable=Enable this option to use a global shared password history for all users.  If enabled, all users share a common password history.  This helps prevent users from using common organizational words as passwords.  @PwmAppName@ stores the passwords as a salted and encrypted hash in the LocalDB.
+Setting_Description_password.showAutoGen=Enable this option to display a link to users during the change password process that displays a list of auto-generated sample passwords that the system allows through the configured password policies.  The users have the option to select and use one of the values in the list.  If this option does not force the user to choose a password from the list.
+Setting_Description_password.showStrengthMeter=Enable this option to allow the users to see the password strength meter on the change password screen.
+Setting_Description_passwordSync.enableReplicaCheck=Enable this option to check for the password to be updated on all configured replicas (for a user's LDAP Profile).  When enabled, replica sync checking polls all of the configured replicas on the user's LDAP Profile to determine if the password change time has been updated.  The particular method to determine the last password change time varies per LDAP vendor type.
+Setting_Description_passwordSyncMaxWaitTime=Specify how long, during a password change, the system waits for the password to be synchronized to all configured LDAP servers.  In cases where the synchronization might take an extraordinary amount of time, this setting prevents the page from timing out.<br/><br/>Specify the value in seconds.
+Setting_Description_passwordSyncMinWaitTime=Specify how long, during a password change, the system waits before forwarding the user.  This gives any background synchronization processes time to execute before the user executes the next operation.<br/><br/>Specify the value in seconds.
+Setting_Description_password.wordlist.wordSize=Specify the minimum number of characters in the password that @PwmAppName@ checks against the Word List dictionary. For example, if the password the system checks is "wordlist" and this setting is set to 6, then the combinations "wordli", "wordlis", "wordlist", "ordlis", "ordlist", and "rdlist" are all checked against the configured dictionary. If any of these values are equal to any word in the Word List dictionary, then the sytem considers the password to match the Word List and rejects it. If this value is set to zero or the password to check is smaller then the value specified here, then the sytem checks the entire password against the Word List but not any smaller parts of it.
+Setting_Description_peopleSearch.detail.form=Specify attributes to show during the detail view of of an individual person's record.
+Setting_Description_peopleSearch.displayName.cardLabels=Specify the display labels for the user panel in the People Search detail and on the orgizational chart views.  You can use LDAP attribute value such as <code>@LDAP\:givenName@</code> macros.  You can set a maximum of four values.
+Setting_Description_peopleSearch.displayName.user=Specify the display name for userDN type records.  Use macros to control the presentation such as the LDAP attribute macro <code>@LDAP\:givenName@</code>.
+Setting_Description_peopleSearch.enable=Enable this option to enable the People Search module.
+Setting_Description_peopleSearch.enablePublic=Enable this option to allow access to the People Search module for unauthenticated users.
+Setting_Description_peopleSearch.idleTimeout=Specify the number of seconds after which an authenticated session becomes unauthenticated.   If the value is set to 0, then @PwmAppName@ uses then the system wide idle timeout value.  If a user is using the PeopleSearch module without authenticating, then the system does not apply a timeout.
 Setting_Description_peopleSearch.maxCacheSeconds=When searches and record details are read from eDirectory, the results are cached within the application for a period of time.  Use this setting to control the maximum amount of time cached data can be used.  Setting to zero will disable the cache entirely, but may negatively impact the scability of the application and/or the LDAP directory.
 Setting_Description_peopleSearch.orgChart.childAttribute=Attribute that contains the LDAP DN of the direct reports for a user.  If this setting is blank, the org chart view will not be shown.
 Setting_Description_peopleSearch.orgChart.parentAttribute=Attribute that contains the LDAP DN of the manager.  If this setting is blank, the org chart view will not be shown.