Commit 4b36e1e7 authored by Marcin Siodelski's avatar Marcin Siodelski
Browse files

[4489] Minor edits in the User Guide.

parent bfb36f3d
...@@ -548,12 +548,12 @@ configuration, may not have write privileges to the database. This is often ...@@ -548,12 +548,12 @@ configuration, may not have write privileges to the database. This is often
required by the policy within a given network to secure the data from being required by the policy within a given network to secure the data from being
unintentionally modified. In many cases administrators have inventory databases unintentionally modified. In many cases administrators have inventory databases
deployed, which contain substantially more information about the hosts than deployed, which contain substantially more information about the hosts than
static reservations assigned to them. Such database can be used to create static reservations assigned to them. The inventory database can be used to create
a view of a Kea hosts database and such view is often read only. a view of a Kea hosts database and such view is often read only.
</para> </para>
<para> <para>
Kea host database backends operate with implicit configuration to both read Kea host database backends operate with implicit configuration to both read
and write from the database. If the host database is read only for the from and write to the database. If the host database is read only for the
particular user, the backend will fail to start and consequently the server particular user, the backend will fail to start and consequently the server
will refuse to start/reconfigure. If the administrator intends to use the will refuse to start/reconfigure. If the administrator intends to use the
read only host database for retrieving reservations for clients, to assign read only host database for retrieving reservations for clients, to assign
......
...@@ -549,12 +549,12 @@ configuration, may not have write privileges to the database. This is often ...@@ -549,12 +549,12 @@ configuration, may not have write privileges to the database. This is often
required by the policy within a given network to secure the data from being required by the policy within a given network to secure the data from being
unintentionally modified. In many cases administrators have inventory databases unintentionally modified. In many cases administrators have inventory databases
deployed, which contain substantially more information about the hosts than deployed, which contain substantially more information about the hosts than
static reservations assigned to them. Such database can be used to create static reservations assigned to them. The inventory database can be used to create
a view of a Kea hosts database and such view is often read only. a view of a Kea hosts database and such view is often read only.
</para> </para>
<para> <para>
Kea host database backends operate with implicit configuration to both read Kea host database backends operate with implicit configuration to both read from
and write from the database. If the host database is read only for the and write to the database. If the host database is read only for the
particular user, the backend will fail to start and consequently the server particular user, the backend will fail to start and consequently the server
will refuse to start/reconfigure. If the administrator intends to use the will refuse to start/reconfigure. If the administrator intends to use the
read only host database for retrieving reservations for clients, to assign read only host database for retrieving reservations for clients, to assign
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment