Skip to content

Commit e2dcae2

Browse files
Update provider_reference.html.markdown (#13276) (#21734)
[upstream:18cde0ba77e624bba3cc0fc94b931e7365ed281f] Signed-off-by: Modular Magician <[email protected]>
1 parent 3536acb commit e2dcae2

File tree

2 files changed

+10
-7
lines changed

2 files changed

+10
-7
lines changed

.changelog/13276.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:none
2+
3+
```

website/docs/guides/provider_reference.html.markdown

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,9 @@ provider "google-beta" {}
6363
### Running Terraform on your workstation.
6464

6565
If you are using Terraform on your workstation we recommend that you install
66-
`gcloud` and authenticate using [User Application Default Credentials ("ADCs")](https://cloud.google.com/sdk/gcloud/reference/auth/application-default)
67-
as a primary authentication method. You can enable ADCs by running the command
68-
`gcloud auth application-default login`.
66+
the `gcloud` CLI and authenticate using [Application Default Credentials (ADC)][adc]
67+
as a primary authentication method. You can set up ADC with your user credentials by running the command
68+
[`gcloud auth application-default login`](https://cloud.google.com/sdk/gcloud/reference/auth/application-default).
6969

7070
<!--
7171
TODO: quota project is not currently read from ADC file b/360405077#comment8
@@ -80,7 +80,7 @@ should return this message if you have set the correct billing project:
8080
### Running Terraform on Google Cloud
8181

8282
If you are running Terraform in a machine on Google Cloud, you can configure
83-
that instance or cluster to use a [Google Service Account](https://cloud.google.com/compute/docs/authentication).
83+
that instance or cluster to use a [Google Service Account](https://cloud.google.com/compute/docs/access/authenticate-workloads).
8484
This allows Terraform to authenticate to Google Cloud without a separate
8585
credential/authentication file. Ensure that the scope of the VM/Cluster is set
8686
to or includes `https://www.googleapis.com/auth/cloud-platform`.
@@ -105,7 +105,7 @@ All runs within the workspace will use the `GOOGLE_CREDENTIALS` variable to auth
105105

106106
### Impersonating Service Accounts
107107

108-
Terraform can [impersonate a Google service account](https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials),
108+
Terraform can [impersonate a Google service account](https://cloud.google.com/docs/authentication/use-service-account-impersonation),
109109
acting as a service account without managing its key locally.
110110

111111
To impersonate a service account, you must use another authentication method
@@ -409,8 +409,8 @@ See [RFC 9110](https://www.rfc-editor.org/rfc/rfc9110#field.user-agent) for form
409409
[OAuth 2.0 access token]: https://developers.google.com/identity/protocols/OAuth2
410410
[service account key file]: https://cloud.google.com/iam/docs/creating-managing-service-account-keys
411411
[manage key files using the Cloud Console]: https://console.cloud.google.com/apis/credentials/serviceaccountkey
412-
[adc]: https://cloud.google.com/docs/authentication/production
412+
[adc]: https://cloud.google.com/docs/authentication/application-default-credentials
413413
[gce-service-account]: https://cloud.google.com/compute/docs/authentication
414414
[gcloud adc]: https://cloud.google.com/sdk/gcloud/reference/auth/application-default/login
415-
[service accounts]: https://cloud.google.com/docs/authentication/getting-started
415+
[service accounts]: https://cloud.google.com/docs/authentication/set-up-adc-attached-service-account
416416
[scopes]: https://developers.google.com/identity/protocols/googlescopes

0 commit comments

Comments
 (0)