Skip to content

Commit 646502c

Browse files
piaxcJaylonmcShan03
authored andcommitted
Update provider_reference.html.markdown (GoogleCloudPlatform#13276)
1 parent ba4c30e commit 646502c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

mmv1/third_party/terraform/website/docs/guides/provider_reference.html.markdown

+7-7
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,9 @@ provider "google-beta" {}
6363
### Running Terraform on your workstation.
6464

6565
If you are using Terraform on your workstation we recommend that you install
66-
`gcloud` and authenticate using [User Application Default Credentials ("ADCs")](https://cloud.google.com/sdk/gcloud/reference/auth/application-default)
67-
as a primary authentication method. You can enable ADCs by running the command
68-
`gcloud auth application-default login`.
66+
the `gcloud` CLI and authenticate using [Application Default Credentials (ADC)][adc]
67+
as a primary authentication method. You can set up ADC with your user credentials by running the command
68+
[`gcloud auth application-default login`](https://cloud.google.com/sdk/gcloud/reference/auth/application-default).
6969

7070
<!--
7171
TODO: quota project is not currently read from ADC file b/360405077#comment8
@@ -80,7 +80,7 @@ should return this message if you have set the correct billing project:
8080
### Running Terraform on Google Cloud
8181

8282
If you are running Terraform in a machine on Google Cloud, you can configure
83-
that instance or cluster to use a [Google Service Account](https://cloud.google.com/compute/docs/authentication).
83+
that instance or cluster to use a [Google Service Account](https://cloud.google.com/compute/docs/access/authenticate-workloads).
8484
This allows Terraform to authenticate to Google Cloud without a separate
8585
credential/authentication file. Ensure that the scope of the VM/Cluster is set
8686
to or includes `https://www.googleapis.com/auth/cloud-platform`.
@@ -105,7 +105,7 @@ All runs within the workspace will use the `GOOGLE_CREDENTIALS` variable to auth
105105

106106
### Impersonating Service Accounts
107107

108-
Terraform can [impersonate a Google service account](https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials),
108+
Terraform can [impersonate a Google service account](https://cloud.google.com/docs/authentication/use-service-account-impersonation),
109109
acting as a service account without managing its key locally.
110110

111111
To impersonate a service account, you must use another authentication method
@@ -409,8 +409,8 @@ See [RFC 9110](https://www.rfc-editor.org/rfc/rfc9110#field.user-agent) for form
409409
[OAuth 2.0 access token]: https://developers.google.com/identity/protocols/OAuth2
410410
[service account key file]: https://cloud.google.com/iam/docs/creating-managing-service-account-keys
411411
[manage key files using the Cloud Console]: https://console.cloud.google.com/apis/credentials/serviceaccountkey
412-
[adc]: https://cloud.google.com/docs/authentication/production
412+
[adc]: https://cloud.google.com/docs/authentication/application-default-credentials
413413
[gce-service-account]: https://cloud.google.com/compute/docs/authentication
414414
[gcloud adc]: https://cloud.google.com/sdk/gcloud/reference/auth/application-default/login
415-
[service accounts]: https://cloud.google.com/docs/authentication/getting-started
415+
[service accounts]: https://cloud.google.com/docs/authentication/set-up-adc-attached-service-account
416416
[scopes]: https://developers.google.com/identity/protocols/googlescopes

0 commit comments

Comments
 (0)