diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml index 9e3ab2440d9897efa8429d6af3d9f59daff4857c..fd1b25ac7875ee5c66d5e28eb9591776675e5ebc 100644 --- a/doc/src/sgml/client-auth.sgml +++ b/doc/src/sgml/client-auth.sgml @@ -1,4 +1,4 @@ -<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.102 2007/11/09 17:31:07 mha Exp $ --> +<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.103 2007/11/09 23:52:08 momjian Exp $ --> <chapter id="client-authentication"> <title>Client Authentication</title> @@ -774,9 +774,9 @@ local db1,db2,@demodbs all md5 Client principals must have their <productname>PostgreSQL</> database user name as their first component, for example <literal>pgusername@realm</>. By default, the realm of the client is - not checked by <productname>PostgreSQL</>. If you have cross-realm - authentication enabled and need to verify the realm, use the - <xref linkend="guc-krb-realm"> parameter. + not checked by <productname>PostgreSQL</>. If you have cross-realm + authentication enabled and need to verify the realm, use the + <xref linkend="guc-krb-realm"> parameter. </para> <para> diff --git a/doc/src/sgml/config.sgml b/doc/src/sgml/config.sgml index d8d8c4deb140aebe001e3e853be454489a2802de..73608a55f29a33d9df1636df0d3f8506663e7eb0 100644 --- a/doc/src/sgml/config.sgml +++ b/doc/src/sgml/config.sgml @@ -1,4 +1,4 @@ -<!-- $PostgreSQL: pgsql/doc/src/sgml/config.sgml,v 1.154 2007/11/09 17:31:07 mha Exp $ --> +<!-- $PostgreSQL: pgsql/doc/src/sgml/config.sgml,v 1.155 2007/11/09 23:52:08 momjian Exp $ --> <chapter Id="runtime-config"> <title>Server Configuration</title> @@ -601,20 +601,20 @@ SET ENABLE_SEQSCAN TO OFF; </listitem> </varlistentry> - <varlistentry id="guc-krb-realm" xreflabel="krb_realm"> - <term><varname>krb_realm</varname> (<type>string</type>)</term> - <indexterm> - <primary><varname>krb_realm</> configuration parameter</primary> - </indexterm> - <listitem> - <para> - Sets the realm to match Kerberos, GSSAPI and SSPI usernames against. - See <xref linkend="kerberos-auth">, <xref linkend="gssapi-auth"> or - <xref linkend="sspi-auth"> for details. This parameter can only be - set at server start. + <varlistentry id="guc-krb-realm" xreflabel="krb_realm"> + <term><varname>krb_realm</varname> (<type>string</type>)</term> + <indexterm> + <primary><varname>krb_realm</> configuration parameter</primary> + </indexterm> + <listitem> + <para> + Sets the realm to match Kerberos, GSSAPI and SSPI usernames against. + See <xref linkend="kerberos-auth">, <xref linkend="gssapi-auth"> or + <xref linkend="sspi-auth"> for details. This parameter can only be + set at server start. </para> - </listitem> - </varlistentry> + </listitem> + </varlistentry> <varlistentry id="guc-krb-server-keyfile" xreflabel="krb_server_keyfile"> <term><varname>krb_server_keyfile</varname> (<type>string</type>)</term>