@@ -146,7 +146,7 @@ following credentials from the project:
146
146
2 . * Web API key* : This is displayed in the "Settings > General" tab of the
147
147
console. Copy it and save to a new text file at ` test/resources/apikey.txt ` .
148
148
149
- Then set up your Firebase/GCP project as follows:
149
+ Then set up your Firebase/Google Cloud project as follows:
150
150
151
151
1 . Enable Firestore: Go to the Firebase Console, and select "Database" from
152
152
the "Develop" menu. Click on the "Create database" button. You may choose
@@ -160,15 +160,15 @@ Then set up your Firebase/GCP project as follows:
160
160
https://console.developers.google.com/apis/api/firebaseml.googleapis.com/overview )
161
161
and make sure your project is selected. If the API is not already enabled, click Enable.
162
162
4 . Enable the IAM API: Go to the
163
- [ Google Cloud Platform Console] ( https://console.cloud.google.com ) and make
164
- sure your Firebase/GCP project is selected. Select "APIs & Services >
163
+ [ Google Cloud Console] ( https://console.cloud.google.com ) and make
164
+ sure your Firebase/Google Cloud project is selected. Select "APIs & Services >
165
165
Dashboard" from the main menu, and click the "ENABLE APIS AND SERVICES"
166
166
button. Search for and enable the "Identity and Access Management (IAM)
167
167
API".
168
168
5 . Grant your service account the 'Firebase Authentication Admin' role. This is
169
169
required to ensure that exported user records contain the password hashes of
170
170
the user accounts:
171
- 1 . Go to [ Google Cloud Platform Console / IAM & admin] ( https://console.cloud.google.com/iam-admin ) .
171
+ 1 . Go to [ Google Cloud Console / IAM & admin] ( https://console.cloud.google.com/iam-admin ) .
172
172
2 . Find your service account in the list, and click the 'pencil' icon to edit it's permissions.
173
173
3 . Click 'ADD ANOTHER ROLE' and choose 'Firebase Authentication Admin'.
174
174
4 . Click 'SAVE'.
0 commit comments