Skip to content

Commit 0e848ef

Browse files
author
Lee Fine
committed
ab#67740
1 parent d5415d4 commit 0e848ef

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

docsource/content.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,11 @@ The Google Cloud Platform (GCP) Load Balancer Orchestrator allows for the manage
55

66
## Requirements
77

8-
A service account is necessary for authentication to GCP. The following are the required permissions:
8+
The orchestrator extension supports having credentials provided by the environment, environment variable, or passed manually from Keyfactor Command. You can read more about the first two options [here](https://cloud.google.com/docs/authentication/production#automatically).
9+
10+
To pass credentials from Keyfactor Command you need to first create a service account within GCP and then download a [service account key](https://cloud.google.com/docs/authentication/set-up-adc-local-dev-environment#local-key) Remember to assign the appropriate role/permissions for the service account (see below). Afterwards inside Keyfactor Command copy and paste the contents of the service account key in the password field for the GCP Certificate Store you create.
11+
12+
The following are the required permissions for the GCP service account:
913
- compute.sslCertificates.create
1014
- compute.sslCertificates.delete
1115
- compute.sslCertificates.list
@@ -14,6 +18,3 @@ A service account is necessary for authentication to GCP. The following are the
1418
- compute.targetHttpsProxies.setSslCertificates
1519
- compute.regionSslCertificates.list
1620

17-
The orchestrator extension supports having credentials provided by the environment, environment variable, or passed manually from Keyfactor Command. You can read more about the first two options [here](https://cloud.google.com/docs/authentication/production#automatically).
18-
19-
To pass credentials from Keyfactor Command you need to first create a service account and then download a service account key. Instructions are [here](https://cloud.google.com/docs/authentication/set-up-adc-local-dev-environment#local-key). Remember to assign the appropriate role/permissions for the service account. Afterwards inside Keyfactor Command copy and paste the contents of the service account key in the password field for the GCP Certificate Store Type.

0 commit comments

Comments
 (0)