summaryrefslogtreecommitdiff
path: root/doc/src/sgml/user-manag.sgml
diff options
context:
space:
mode:
authorPeter Eisentraut2018-06-29 19:26:41 +0000
committerPeter Eisentraut2018-06-29 19:26:41 +0000
commitf7481d2c3c52042030269b91bfeb00f120adb618 (patch)
tree47e713d1d4cc567d0aa2acc58a967e1639a23b71 /doc/src/sgml/user-manag.sgml
parent539f32bdd6915e950d225e732959a1b068598993 (diff)
Documentation spell checking and markup improvements
Diffstat (limited to 'doc/src/sgml/user-manag.sgml')
-rw-r--r--doc/src/sgml/user-manag.sgml2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/src/sgml/user-manag.sgml b/doc/src/sgml/user-manag.sgml
index 81b44a8c417..6106244d324 100644
--- a/doc/src/sgml/user-manag.sgml
+++ b/doc/src/sgml/user-manag.sgml
@@ -565,7 +565,7 @@ DROP ROLE doomed_role;
<literal>pg_execute_server_program</literal> roles are intended to allow administrators to have
trusted, but non-superuser, roles which are able to access files and run programs on the
database server as the user the database runs as. As these roles are able to access any file on
- the server filesystem, they bypass all database-level permission checks when accessing files
+ the server file system, they bypass all database-level permission checks when accessing files
directly and they could be used to gain superuser-level access, therefore care should be taken
when granting these roles to users.
</para>