[30585] in CVS-changelog-for-Kerberos-V5
krb5 commit: Correct a typo in database documentation
daemon@ATHENA.MIT.EDU (Greg Hudson)
Mon Sep 23 15:49:48 2019
Date: Mon, 23 Sep 2019 15:49:14 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-ID: <201909231949.x8NJnEJb027778@drugstore.mit.edu>
To: <cvs-krb5@mit.edu>
MIME-Version: 1.0
Reply-To: krbdev@mit.edu
Content-Type: multipart/mixed; boundary="===============8656062327910328829=="
Errors-To: cvs-krb5-bounces@mit.edu
--===============8656062327910328829==
Content-Type: text/plain
https://github.com/krb5/krb5/commit/30b67722091306088f540c4697d6d63e0ac50ef3
commit 30b67722091306088f540c4697d6d63e0ac50ef3
Author: Дилян Палаузов <git-dpa@aegee.org>
Date: Sun Sep 22 11:58:44 2019 +0000
Correct a typo in database documentation
doc/admin/database.rst | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/doc/admin/database.rst b/doc/admin/database.rst
index 0eb5ccd..4b39b4d 100644
--- a/doc/admin/database.rst
+++ b/doc/admin/database.rst
@@ -761,7 +761,7 @@ in the krbtgt keys is used by default to determine the session key
types supported by the krbtgt service (see
:ref:`session_key_selection`). Because non-MIT Kerberos clients
sometimes send a limited set of encryption types when making AS
-requests, it can be important to for the krbtgt service to support
+requests, it can be important for the krbtgt service to support
multiple encryption types. This can be accomplished by giving the
krbtgt principal multiple keys, which is usually as simple as not
specifying any **-e** option when changing the krbtgt key, or by
--===============8656062327910328829==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5
--===============8656062327910328829==--