Skip to content

Commit ae7764d

Browse files
authored
Refactor list formatting in GCP onboarding section
Updated the formatting of the list items for clarity.
1 parent 25e41e9 commit ae7764d

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/2-explore-multicloud-connectivity-model.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ For GCP, Defender for Cloud uses **workload identity federation and service acco
5050

5151
During GCP onboarding, the GCloud script you run in your GCP project creates the following resources:
5252

53-
1. A **workload identity pool**: the container for external identity providers
54-
2. **Workload identity providers** (one per enabled Defender plan): each configured to trust tokens from Microsoft Entra ID
55-
3. **Service accounts** with scoped project-level policy bindings: the GCP identities that Defender for Cloud impersonates
53+
- A **workload identity pool**: the container for external identity providers
54+
- **Workload identity providers** (one per enabled Defender plan): each configured to trust tokens from Microsoft Entra ID
55+
- **Service accounts** with scoped project-level policy bindings: the GCP identities that Defender for Cloud impersonates
5656

5757
When Defender for Cloud scans a GCP project, it exchanges a Microsoft Entra token with Google Cloud Security Token Service (STS). Then STS validates it against the workload identity provider configuration and returns a short-lived Google STS token. Defender for Cloud uses that token to impersonate the service account and read GCP resource configuration—no private keys stored in Azure.
5858

0 commit comments

Comments
 (0)