
If the environment variable isn't set, ADC uses the default service account If the variable is set,ĪDC uses the service account file that the variable points to. Google Application Default Credentials (ADC) checks for your credentialsĪDC checks whether the environment variable Which should be done with extreme care due to the risk of exposing your credentials. Such file access, you must reference the service account file in your code. With these manually obtained credentials. GOOGLE_APPLICATION_CREDENTIALS to authorize requests Private key file, you can use the environment variable You'll need to download a service account JSON file from your Firebase project.Īs long as you have access to a file system containing the If your application is running on a non-Google server environment, For the fullest automation of theĪuthorization flow, use ADC together with Admin SDK server libraries. ADC uses your existing default serviceĪccount to obtain credentials to authorize requests, and ADC enablesįlexible local testing via the environment variable (including Cloud Functions for Firebase), use Application Default Credentials (ADC). Google Kubernetes Engine, App Engine, or Cloud Functions If your application is running on Compute Engine, A short-lived OAuth 2.0 access token derived from a service account.Google Application Default Credentials (ADC).Server environment, use a combination of these strategies to authorize server The legacy protocols can use only long-lived API keys obtained from theĬaution: Always make sure to use the right kind of credential.Īn API key will only work to authorize requests to the legacy API.To send messages, the library handles the token for you. To mint this token, you can use Google Applicationĭefault Credentials (in Google server environments) and/or manually obtainįrom a JSON private key file generated for a service account. The FCM HTTP v1 API authorizes requests with.Note these important differences between legacy HTTP and Requests sent to FCM from your app server or trusted environment
