@@ -40,31 +40,31 @@ Follow theese steps to configure Workload Identity Federation for PBM:
4040
41412. Configure a provider (OIDC Example):
4242
43- The following example uses an OIDC provider (e.g., Kubernetes, GitHub Actions). For AWS, replace `--oidc-issuer-uri` with `--aws`.
43+ The following example uses an OIDC provider (e.g., Kubernetes, GitHub Actions). For AWS, replace `--oidc-issuer-uri` with `--aws`.
4444
4545 ```
4646 gcloud iam workload-identity-pools providers create-oidc pbm-provider \
47- --workload-identity-pool="pbm-pool" \
48- --issuer-uri="https://YOUR-IDP.example.com" \
49- --location="global" \
50- --attribute-mapping="google.subject=assertion.sub"
47+ --workload-identity-pool="pbm-pool" \
48+ --issuer-uri="https://YOUR-IDP.example.com" \
49+ --location="global" \
50+ --attribute-mapping="google.subject=assertion.sub"
5151 ```
5252
53533. Grant service account impersonation:
5454
5555 ```sh
5656 gcloud iam service-accounts add-iam-policy-binding \
57- pbm-backup-sa@PROJECT_ID.iam.gserviceaccount.com \
58- --role="roles/iam.workloadIdentityUser" \
59- --member="principal://iam.googleapis.com/projects/PROJECT_NUMBER/locations/global/workloadIdentityPools/pbm-pool/subject/WORKLOAD_ID"
57+ pbm-backup-sa@PROJECT_ID.iam.gserviceaccount.com \
58+ --role="roles/iam.workloadIdentityUser" \
59+ --member="principal://iam.googleapis.com/projects/PROJECT_NUMBER/locations/global/workloadIdentityPools/pbm-pool/subject/WORKLOAD_ID"
6060 ```
6161
62624. Assign GCS permissions:
6363
6464 ```
6565 gcloud projects add-iam-policy-binding PROJECT_ID \
66- --member="serviceAccount:pbm-backup-sa@PROJECT_ID.iam.gserviceaccount.com" \
67- --role="roles/storage.objectAdmin"
66+ --member="serviceAccount:pbm-backup- sa@PROJECT_ID.iam.gserviceaccount.com" \
67+ --role="roles/storage.objectAdmin"
6868 ```
6969
70705. PBM configuration:
0 commit comments