#
#	This file contains a list of clients which are allowed to
#	make authentication requests and their encryption key.
#	The first field is a valid hostname for the client.
#	The second field (seperated by blanks or tabs) is the 
#	encryption key.
#	The third field is a short name that is used in the logfiles.
#	One can speed up the lookup by using an IP number in the first
#	field.
#

# Client Name		Key		Short Name
#----------------	----------	------------------
#portmaster1		testing123	pm1.NY
#portmaster2		testing123	pm1.LA
