@@ -561,8 +561,8 @@ ERROR: SELinux: security policy violation
561561 </para>
562562 <para>
563563 A combination of dynamic domain transition and trusted procedure
564- enables an interesting use case that fits the typical process life-
565- cycle of connection pooling software.
564+ enables an interesting use case that fits the typical process life-cycle
565+ of connection pooling software.
566566 Even if your connection pooling software is not allowed to run most
567567 of SQL commands, you can allow it to switch the security label
568568 of the client using the <literal>sepgsql_setcon()</literal> function
@@ -576,7 +576,7 @@ ERROR: SELinux: security policy violation
576576 procedure with appropriate permissions checks.
577577 The point here is that only the trusted procedure actually has permission
578578 to change the effective security label, and only does so when given proper
579- credentials. Of course, for secure operation, the credential store must
579+ credentials. Of course, for secure operation, the credential store
580580 (table, procedure definition, or whatever) must be protected from
581581 unauthorized access.
582582 </para>