Skip to content

Commit

Permalink
Add info about gcp service account key encoding (hashicorp#19496)
Browse files Browse the repository at this point in the history
  • Loading branch information
robmonte authored Mar 10, 2023
1 parent 115ed11 commit 7f14a9e
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions website/content/docs/secrets/gcp.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -294,8 +294,10 @@ $ curl -H "Authorization: Bearer ya29.c.ElodBmNPwHUNY5gcBpnXcE4ywG4w1k..."

### Service Account Keys

To generate service account keys, read from `gcp/.../key`. The roleset or static
account must have been created as type `service_account_key`:
To generate service account keys, read from `gcp/.../key`. Vault returns the service
account key data as a base64-encoded string in the `private_key_data` field. This can
be read by decoding it using `base64 --decode "ewogICJ0e..."` or another base64 tool of
your choice. The roleset or static account must have been created as type `service_account_key`:

```shell-session
$ vault read gcp/roleset/my-key-roleset/key
Expand Down

0 comments on commit 7f14a9e

Please sign in to comment.