diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml index feb9511c5e6c79398bb5187a64a485fa654e1706..26a7de6d0a8a063246457440b0b09f106b4eddc8 100644 --- a/doc/src/sgml/client-auth.sgml +++ b/doc/src/sgml/client-auth.sgml @@ -1,4 +1,4 @@ -<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.131 2010/02/03 17:25:05 momjian Exp $ --> +<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.132 2010/02/20 19:21:14 momjian Exp $ --> <chapter id="client-authentication"> <title>Client Authentication</title> @@ -824,23 +824,28 @@ omicron bryanh guest1 The following configuration options are supported for <productname>GSSAPI</productname>: <variablelist> <varlistentry> - <term><literal>map</literal></term> + <term><literal>include_realm</literal></term> <listitem> <para> - Allows for mapping between system and database usernames. See - <xref linkend="auth-username-maps"> for details. + If set to <literal>1</>, the realm name from the authenticated user + principal is included in the system user name that's passed through + username mapping (<xref linkend="auth-username-maps">). This is + useful for handling users from multiple realms. </para> </listitem> </varlistentry> <varlistentry> - <term><literal>include_realm</literal></term> + <term><literal>map</literal></term> <listitem> <para> - If set to <literal>1</>, the realm name from the authenticated user - principal is included in the system user name that's passed through - username mapping (<xref linkend="auth-username-maps">). This is - useful for handling users from multiple realms. + Allows for mapping between system and database usernames. See + <xref linkend="auth-username-maps"> for details. For a Kerboros + principal <literal>username/hostbased@EXAMPLE.COM</literal>, the + username used for mapping is <literal>username/hostbased</literal> + if <literal>include_realm</literal> is disabled, and + <literal>username/hostbased@EXAMPLE.COM</literal> if + <literal>include_realm</literal> is enabled. </para> </listitem> </varlistentry> @@ -1027,10 +1032,10 @@ omicron bryanh guest1 <para> When connecting to the database make sure you have a ticket for a principal matching the requested database user name. For example, for - database user name <literal>fred</>, both principal - <literal>fred@EXAMPLE.COM</> and - <literal>fred/users.example.com@EXAMPLE.COM</> could be used to - authenticate to the database server. + database user name <literal>fred</>, principal + <literal>fred@EXAMPLE.COM</> would be able to connect. To also allow + principle <literal>fred/users.example.com@EXAMPLE.COM</>, use a username + map, as described in <xref linkend="auth-username-maps">. </para> <para>