@@ -690,9 +690,9 @@ local db1,db2,@demodbs all md5
690690 </indexterm>
691691
692692 <para>
693- When using an external authentication systemlike Ident or GSSAPI,
693+ When using an external authentication systemsuch as Ident or GSSAPI,
694694 the name of the operating system user that initiated the connection
695- might not be the same as the database userhe needs to connect as.
695+ might not be the same as the database userthat is to be connect as.
696696 In this case, a user name map can be applied to map the operating system
697697 user name to a database user. To use user name mapping, specify
698698 <literal>map</literal>=<replaceable>map-name</replaceable>
@@ -1185,7 +1185,7 @@ omicron bryanh guest1
11851185 The drawback of this procedure is that it depends on the integrity
11861186 of the client: if the client machine is untrusted or compromised,
11871187 an attacker could run just about any program on port 113 and
1188- return any user namehe chooses . This authentication method is
1188+ return any user namethey choose . This authentication method is
11891189 therefore only appropriate for closed networks where each client
11901190 machine is under tight control and where the database and system
11911191 administrators operate in close contact. In other words, you must