From ea63bf6ac83af97f36e5653fa7d3269958bd067a Mon Sep 17 00:00:00 2001
From: Bruce Momjian <bruce@momjian.us>
Date: Sat, 29 Dec 2007 04:15:38 +0000
Subject: [PATCH] Update docs mentioning PAM doesn't work reading /etc/passwd
 because of non-root.

Dhanaraj M
---
 doc/src/sgml/client-auth.sgml | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)

diff --git a/doc/src/sgml/client-auth.sgml b/doc/src/sgml/client-auth.sgml
index 4e874b72720..20eb31fbfc3 100644
--- a/doc/src/sgml/client-auth.sgml
+++ b/doc/src/sgml/client-auth.sgml
@@ -1,4 +1,4 @@
-<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.104 2007/11/14 14:25:55 mha Exp $ -->
+<!-- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.105 2007/12/29 04:15:38 momjian Exp $ -->
 
 <chapter id="client-authentication">
  <title>Client Authentication</title>
@@ -1079,11 +1079,10 @@ ldap[<replaceable>s</>]://<replaceable>servername</>[:<replaceable>port</>]/<rep
 
    <note>
     <para>
-     PAM does work authenticating against Unix system authentication
-     because the postgres server is started by a non-root user.  In order
-     to enable this functionality, the root user must provide additional
-     permissions to the postgres user (for reading
-     <filename>/etc/shadow</>).
+     If PAM is set up to read <filename>/etc/shadow</>, authentication
+     will fail because the PostgreSQL server is started by a non-root
+     user.  However, this is not an issue with LDAP or other authentication
+     methods.
     </para>
    </note>
   </sect2>
-- 
GitLab