File tree 4 files changed +4
-4
lines changed
4 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ If a User DN is given
16
16
uses the value of the
17
17
.B --proxycache
18
18
argument, the GRST_PROXY_PATH or the
19
- compile time default to detemine the location of the proxy cache directory.
19
+ compile time default to determine the location of the proxy cache directory.
20
20
The directory is searched for a proxy having the given User DN and
21
21
Delegation ID. (If no Delegation ID is specificed, then the default value is
22
22
used.)
Original file line number Diff line number Diff line change @@ -56,7 +56,7 @@ directive.
56
56
57
57
If
58
58
.BR " GridSiteExecMethod X509DN"
59
- is given, then the CGI program runs as a pool user, detemined using lock
59
+ is given, then the CGI program runs as a pool user, determined using lock
60
60
files in the exec mapping directory chosen as build time of gsexec.
61
61
The pool user is chosen according
62
62
to the client's full certificate X.509 DN (ie with any trailing GSI proxy
Original file line number Diff line number Diff line change @@ -101,7 +101,7 @@ identity may still be verified and the connection is still encrypted.
101
101
.IP " --cert <X.509 cert path> and --key <X.509 key path>"
102
102
Path to the PEM-encoded
103
103
X.509 or GSI Proxy user certificate and key to use for HTTPS
104
- connections, intead of "anonymous mode." If only one of --key or --cert
104
+ connections, instead of "anonymous mode." If only one of --key or --cert
105
105
is given, then that will be tried for both. If neither is given, then the
106
106
following order of precedence is used:
107
107
the file name held by the variable X509_USER_PROXY; the file
Original file line number Diff line number Diff line change @@ -54,7 +54,7 @@ same effect.
54
54
.IP " --cert <X.509 cert path> and --key <X.509 key path>"
55
55
Path to the PEM-encoded
56
56
X.509 or GSI Proxy user certificate and key to use for HTTPS
57
- connections, intead of "anonymous mode." If only one of --key or --cert
57
+ connections, instead of "anonymous mode." If only one of --key or --cert
58
58
is given, then that will be tried for both. If neither is given, then the
59
59
following order of precedence is used:
60
60
the file name held by the variable X509_USER_PROXY; the file
You can’t perform that action at this time.
0 commit comments