From 29e57ce303571991bee5ab86f23ab749d701ecc9 Mon Sep 17 00:00:00 2001 From: Bruce Momjian <bruce@momjian.us> Date: Thu, 13 Feb 2003 05:47:46 +0000 Subject: [PATCH] Add local ident OpenBSD mention that was missing in one place. --- doc/src/sgml/client-auth.sgml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml index 574fc506952..e7f61ef11d9 100644 --- a/doc/src/sgml/client-auth.sgml +++ b/doc/src/sgml/client-auth.sgml @@ -1,5 +1,5 @@ <!-- -$Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.44 2003/01/19 00:13:28 momjian Exp $ +$Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.45 2003/02/13 05:47:46 momjian Exp $ --> <chapter id="client-authentication"> @@ -719,9 +719,9 @@ local db1,db2,@demodbs all md5 On systems supporting <symbol>SO_PEERCRED</symbol> requests for Unix-domain sockets (currently <systemitem class="osname">Linux</>, <systemitem class="osname">FreeBSD</>, - <systemitem class="osname">NetBSD</>, and <systemitem - class="osname">BSD/OS</>), ident authentication can also be applied - to local connections. In this case, no security risk is added by + <systemitem class="osname">NetBSD</>, <systemitem class=osname>OpenBSD</>, + and <systemitem class="osname">BSD/OS</>), ident authentication can also + be applied to local connections. In this case, no security risk is added by using ident authentication; indeed it is a preferable choice for local connections on such systems. </para> -- GitLab