Skip to content

Commit e9c1227

Browse files
committed
lint fix
1 parent 6ebd44f commit e9c1227

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

docs/guides/modules/permissions-authentication/pages/openid-connect-tokens.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ You can take advantage of the format of the claims in CircleCI's <<format-of-the
174174
[#limit-role-access-based-on-project]
175175
==== Limit role access based on project
176176

177-
If certain projects should only be able to access certain AWS resources, you can restrict your IAM role so that only CircleCI jobs in a specific project can assume that role.
177+
If a projects should only be able to access certain AWS resources, you can restrict your IAM role so that only CircleCI jobs in that project can assume that role.
178178

179179
To do this, edit your IAM role's trust policy so that only an OIDC token from your chosen project can assume that role. The trust policy determines under what conditions the role can be assumed.
180180

@@ -220,10 +220,10 @@ You can also restrict access to specific branches. The following is an example o
220220
[#google-cloud-platform]
221221
== Google Cloud Platform
222222

223-
The following instructions cover the following:
223+
The following instructions cover:
224224

225-
* A one-time configuration of your GCP settings to trust CircleCI's OIDC tokens
226-
* Running a job that uses the OIDC token to interact with GCP
225+
* A one-time configuration of your GCP settings to trust CircleCI's OIDC tokens.
226+
* Running a job that uses the OIDC token to interact with GCP.
227227

228228
TIP: The Google Cloud CLI reads your configuration file, which contains necessary information instructing Google Cloud to authenticate. You can read about external identity providers on https://cloud.google.com/iam/docs/configuring-workload-identity-federation#oidc[Google Cloud's docs].
229229

@@ -250,7 +250,7 @@ The default OpenID Connect ID tokens issued by CircleCI have a fixed audience (s
250250

251251
GCP Workload Identity Federation is a feature that allows you to use CircleCI's OIDC tokens to authenticate with GCP. Using Workload Identity Federation allows applications outside Google Cloud to access Google Cloud resources without the need for storing service account credentials. Instead, you can use Identity and Access Management (IAM) to grant access to specific Google Cloud resources.
252252

253-
In the GCP web UI, follow these steps to add CircleCI as an external identity provider:
253+
In the GCP web UI, follow the steps to add CircleCI as an external identity provider:
254254

255255
. Navigate to the **IAM & Admin panel**.
256256
. On the side panel, navigate to **Workload Identity Federation**.

0 commit comments

Comments
 (0)