projects_role.role=Role Membership For New
projects_role.groups=Groups
projects_role.admin=Administer
-projects_role.admin.desc=Access project settings and perform administration tasks. (Users will also need "Browse" permission)
+projects_role.admin.desc=Access project settings and perform administration tasks (for private projects, users also need the "Browse" permission)
projects_role.issueadmin=Administer Issues
-projects_role.issueadmin.desc=Change the type and severity of issues, resolve issues as being "fixed", "won't fix" or "false-positive" (users also need "Browse" permission).
+projects_role.issueadmin.desc=Change the type and severity of issues, resolve issues as being "fixed", "won't fix" or "false-positive" (for private projects, users also need the "Browse" permission).
projects_role.securityhotspotadmin=Administer Security Hotspots
-projects_role.securityhotspotadmin.desc=Resolve a Security Hotspot as reviewed (fixed or safe), reset it as to review (users also need Browse permission).
+projects_role.securityhotspotadmin.desc=Resolve a Security Hotspot as reviewed (fixed or safe), reset it as to review (for private projects, users also need the "Browse" permission).
projects_role.user=Browse
projects_role.user.desc=Access a project, browse its measures and issues, confirm issues, change the assignee, comment on issues and change tags.
projects_role.codeviewer=See Source Code
-projects_role.codeviewer.desc=View the project's source code. (Users will also need "Browse" permission)
+projects_role.codeviewer.desc=View the project's source code (for private projects, users also need the "Browse" permission)
projects_role.scan=Execute Analysis
projects_role.scan.desc=Ability to get all settings required to perform an analysis (including the secured settings like passwords) and to push analysis results to the {instance} server.
projects_role.bulk_change=Bulk Change