Skip to content

Commit c7987c7

Browse files
author
Ed Berezitsky
committed
add awsAddDefaultProviders flag
1 parent 835509a commit c7987c7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,8 +163,8 @@ For example, if the client is an EC2 instance, its instance profile should have
163163

164164
When you want the MSK client to connect to MSK using credentials not found in the [AWS Default Credentials Provider Chain][DefaultCreds], you can specify an `awsProfileName` containing the credential profile to use, or an `awsRoleArn` to indicate an IAM Role’s ARN to assume using credentials in the Default Credential Provider Chain. These parameters are optional, and if they are not set the MSK client will use credentials from the Default Credential Provider Chain. There is no need to specify them if you intend to use an IAM role associated with an AWS compute service, such as EC2 or ECS to authenticate to MSK.
165165

166-
If Assume Role or Profile Name params are set, but a providers fails to obtain credentials, the fallback mechanism will use default credential chain.
167-
To avoid this, set `awsAddDefaultProviders` parameter to `false` (if not set, the default value is `true`):
166+
If Assume Role or Profile Name params are set, but a provider fails to obtain credentials, the fallback mechanism will use the default credential chain.
167+
To avoid this, set the `awsAddDefaultProviders` parameter to `false` (if not set, the default value is `true`):
168168

169169
```properties
170170
sasl.jaas.config=software.amazon.msk.auth.iam.IAMLoginModule required \

0 commit comments

Comments
 (0)