@@ -958,11 +958,11 @@ omicron bryanh guest1
958958 <productname>PostgreSQL</> also supports a parameter to strip the realm from
959959 the principal. This method is supported for backwards compatibility and is
960960 strongly discouraged as it is then impossible to distinguish different users
961- with the same username but coming from different realms. To enable this,
961+ with the same user name but coming from different realms. To enable this,
962962 set <literal>include_realm</> to 0. For simple single-realm
963963 installations, <literal>include_realm</> combined with the
964964 <literal>krb_realm</> parameter (which checks that the realm provided
965- matches exactly what is in the krb_realm parameter) would be a secure but
965+ matches exactly what is in the <literal> krb_realm</literal> parameter) would be a secure but
966966 less capable option compared to specifying an explicit mapping in
967967 <filename>pg_ident.conf</>.
968968 </para>
@@ -1009,8 +1009,8 @@ omicron bryanh guest1
10091009 If set to 0, the realm name from the authenticated user principal is
10101010 stripped off before being passed through the user name mapping
10111011 (<xref linkend="auth-username-maps">). This is discouraged and is
1012- primairly available for backwards compatibility as it is not secure
1013- in multi-realm environments unless krb_realm is also used. Users
1012+ primarily available for backwards compatibility as it is not secure
1013+ in multi-realm environments unless <literal> krb_realm</literal> is also used. Users
10141014 are recommended to leave include_realm set to the default (1) and to
10151015 provide an explicit mapping in <filename>pg_ident.conf</>.
10161016 </para>
@@ -1030,7 +1030,7 @@ omicron bryanh guest1
10301030 <literal>username/hostbased@EXAMPLE.COM</literal>, respectively),
10311031 unless <literal>include_realm</literal> has been set to 0, in which case
10321032 <literal>username</literal> (or <literal>username/hostbased</literal>)
1033- is what is seen as the system username when mapping.
1033+ is what is seen as the system user name when mapping.
10341034 </para>
10351035 </listitem>
10361036 </varlistentry>
@@ -1088,8 +1088,8 @@ omicron bryanh guest1
10881088 If set to 0, the realm name from the authenticated user principal is
10891089 stripped off before being passed through the user name mapping
10901090 (<xref linkend="auth-username-maps">). This is discouraged and is
1091- primairly available for backwards compatibility as it is not secure
1092- in multi-realm environments unless krb_realm is also used. Users
1091+ primarily available for backwards compatibility as it is not secure
1092+ in multi-realm environments unless <literal> krb_realm</literal> is also used. Users
10931093 are recommended to leave include_realm set to the default (1) and to
10941094 provide an explicit mapping in <filename>pg_ident.conf</>.
10951095 </para>
@@ -1109,7 +1109,7 @@ omicron bryanh guest1
11091109 <literal>username/hostbased@EXAMPLE.COM</literal>, respectively),
11101110 unless <literal>include_realm</literal> has been set to 0, in which case
11111111 <literal>username</literal> (or <literal>username/hostbased</literal>)
1112- is what is seen as the system username when mapping.
1112+ is what is seen as the system user name when mapping.
11131113 </para>
11141114 </listitem>
11151115 </varlistentry>
@@ -1292,7 +1292,7 @@ omicron bryanh guest1
12921292 this search, the server disconnects and re-binds to the directory as
12931293 this user, using the password specified by the client, to verify that the
12941294 login is correct. This mode is the same as that used by LDAP authentication
1295- schemes in other software, such as Apache mod_authnz_ldap and pam_ldap.
1295+ schemes in other software, such as Apache <literal> mod_authnz_ldap</literal> and <literal> pam_ldap</literal> .
12961296 This method allows for significantly more flexibility
12971297 in where the user objects are located in the directory, but will cause
12981298 two separate connections to the LDAP server to be made.
0 commit comments