Home>
When json of environment variable authentication is stored in the source as follows
I am worried about security because I will write the location of json directly.
I am worried about security because I will write the location of json directly.
import os
from google.cloud import storage
os.environ ["GOOGLE_APPLICATION_CREDENTIALS"] = r'C: \ hoge \ hoge.json
How will security improve if json is changed?
os.environ ["GOOGLE_APPLICATION_CREDENTIALS"] = r'C: \ hoge \ hoge.json
Json describes it like this
It is described as it is in the source code
I would like to hear your opinions.
-
Answer # 1
Related articles
- java - spring security authentication settings are not reflected
- How to configure Linux to use LDAP user authentication
- Linux web server security configuration hardening protection method [recommended]
- Detailed methods to enhance the security of Linux and Unix servers
- Detailed Spring Security authentication provider example
- SpringBoot security authentication Security implementation method
- Detailed Spring Security OAuth2 authentication and authorization examples
- Detailed user authentication process in Spring Security
- Detailed Spring Security custom user authentication process
- linux - about postfix smtp authentication
- How Spring Security gets user information based on Authentication
- linux - teraterm ssh authentication username password unknown
- Python uses kerberos security authentication to operate kafka
- linux - i want to stop key authentication connection (i want to return to password authentication)
- relationship between linux permissions, security, and ssh
- spring security authentication does not pass
- Linux NFS service security hardening method
How do you say it is safe for writing?