This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git

commit 6aaf76d16872050fff6bc7bfd03a26942e892d82
Author: Andrea Cosentino <[email protected]>
AuthorDate: Fri Apr 15 14:22:54 2022 +0200

    Google Secret Manager: added notes about permissions needed to use the 
feature at service account level
---
 .../src/main/docs/google-secret-manager-component.adoc                | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git 
a/components/camel-google/camel-google-secret-manager/src/main/docs/google-secret-manager-component.adoc
 
b/components/camel-google/camel-google-secret-manager/src/main/docs/google-secret-manager-component.adoc
index f8b10a34591..9dac97bcaa9 100644
--- 
a/components/camel-google/camel-google-secret-manager/src/main/docs/google-secret-manager-component.adoc
+++ 
b/components/camel-google/camel-google-secret-manager/src/main/docs/google-secret-manager-component.adoc
@@ -194,7 +194,9 @@ In this case if the secret doesn't exist or the secret 
exists, but the username
 
 NOTE: For the moment we are not considering the rotation function, if any will 
be applied, but it is in the work to be done.
 
-The only requirement is adding `camel-google-secret-manager` JAR to your Camel 
application.
+There are only two requirements: 
+- Adding `camel-google-secret-manager` JAR to your Camel application.
+- Give the service account used permissions to do operation at secret 
management level (for example accessing the secret payload, or being admin of 
secret manager service)
 
 === Google Secret Manager Producer operations
 

Reply via email to