diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml
index 574fc50695209a8b0d04d9b79b84b7d5002a2ce4..e7f61ef11d9c08cec54c0ffddcdb7335519715ab 100644
--- a/doc/src/sgml/client-auth.sgml
+++ b/doc/src/sgml/client-auth.sgml
@@ -1,5 +1,5 @@
 <!--
-$Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.44 2003/01/19 00:13:28 momjian Exp $
+$Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.45 2003/02/13 05:47:46 momjian Exp $
 -->
 
 <chapter id="client-authentication">
@@ -719,9 +719,9 @@ local   db1,db2,@demodbs  all                                       md5
     On systems supporting <symbol>SO_PEERCRED</symbol> requests for
     Unix-domain sockets (currently <systemitem
     class="osname">Linux</>, <systemitem class="osname">FreeBSD</>,
-    <systemitem class="osname">NetBSD</>, and <systemitem
-    class="osname">BSD/OS</>), ident authentication can also be applied
-    to local connections. In this case, no security risk is added by
+    <systemitem class="osname">NetBSD</>, <systemitem class=osname>OpenBSD</>, 
+    and <systemitem class="osname">BSD/OS</>), ident authentication can also 
+    be applied to local connections. In this case, no security risk is added by
     using ident authentication; indeed it is a preferable choice for
     local connections on such systems.
    </para>