@@ -690,9 +690,9 @@ local db1,db2,@demodbs all md5
690
690
</indexterm>
691
691
692
692
<para>
693
- When using an external authentication systemlike Ident or GSSAPI,
693
+ When using an external authentication systemsuch as Ident or GSSAPI,
694
694
the name of the operating system user that initiated the connection
695
- might not be the same as the database userhe needs to connect as.
695
+ might not be the same as the database userthat is to be connect as.
696
696
In this case, a user name map can be applied to map the operating system
697
697
user name to a database user. To use user name mapping, specify
698
698
<literal>map</literal>=<replaceable>map-name</replaceable>
@@ -1185,7 +1185,7 @@ omicron bryanh guest1
1185
1185
The drawback of this procedure is that it depends on the integrity
1186
1186
of the client: if the client machine is untrusted or compromised,
1187
1187
an attacker could run just about any program on port 113 and
1188
- return any user namehe chooses . This authentication method is
1188
+ return any user namethey choose . This authentication method is
1189
1189
therefore only appropriate for closed networks where each client
1190
1190
machine is under tight control and where the database and system
1191
1191
administrators operate in close contact. In other words, you must