In general, the google-cloud-translate-v2 library uses Service
Account
credentials to connect to Google Cloud services. When running on Google Cloud
Platform (GCP), including Google Compute Engine (GCE), Google Kubernetes Engine
(GKE), Google App Engine (GAE), Google Cloud Functions (GCF) and Cloud Run,
the credentials will be discovered automatically. When running on other
environments, the Service Account credentials can be specified by providing the
path to the JSON
keyfile for
the account (or the JSON itself) in environment variables. Additionally, Cloud
SDK credentials can also be discovered automatically, but this is only
recommended during development.
Project and Credential Lookup
The google-cloud-translate-v2 library aims to make authentication as simple as
possible, and provides several mechanisms to configure your system without
providing Project ID and Service Account Credentials directly in code.
Project ID is discovered in the following order:
Specify project ID in method arguments
Specify project ID in configuration
Discover project ID in environment variables
Discover GCE project ID
Credentials are discovered in the following order:
Specify credentials in method arguments
Specify credentials in configuration
Discover credentials path in environment variables
Discover credentials JSON in environment variables
Discover credentials file in the Cloud SDK's path
Discover GCE credentials
Google Cloud Platform environments
While running on Google Cloud Platform environments such as Google Compute
Engine, Google App Engine and Google Kubernetes Engine, no extra work is needed.
The Project ID and Credentials and are discovered automatically. Code
should be written as if already authenticated. Just be sure when you [set up the
GCE instance][gce-how-to], you add the correct scopes for the APIs you want to
access. For example:
The Project ID and Credentials JSON can be placed in environment
variables instead of declaring them directly in code. Each service has its own
environment variable, allowing for different service accounts to be used for
different services. (See the READMEs for the individual service gems for
details.) The path to the Credentials JSON file can be stored in the
environment variable, or the Credentials JSON itself can be stored for
environments such as Docker containers where writing files is difficult or not
encouraged.
The environment variables that Translation checks for project ID are:
This option allows for an easy way to authenticate during development. If
credentials are not provided in code or in environment variables, then Cloud SDK
credentials are discovered.
NOTE: This is not recommended for running in production. The Cloud SDK
should only be used during development.
Creating a Service Account
Google Cloud requires a Project ID and Service Account Credentials to
connect to the APIs. You will use the Project ID and JSON key file to
connect to most services with google-cloud-translate.
If you are not running this client on Google Compute Engine, you need a Google
Developers service account.
Create a new project or click on an existing project.
Activate the menu in the upper left and select APIs & Services. From
here, you will enable the APIs that your application requires.
Note: You may need to enable billing in order to use these services.
Select Credentials from the side navigation.
Find the "Create credentials" drop down near the top of the page, and select
"Service account" to be guided through downloading a new JSON key file.
If you want to re-use an existing service account, you can easily generate
a new key file. Just select the account you wish to re-use click the pencil
tool on the right side to edit the service account, select the Keys tab,
and then select Add Key.
The key file you download will be used by this library to authenticate API
requests and should be stored in a secure location.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["Version latestkeyboard_arrow_down\n\n- [1.1.0 (latest)](/ruby/docs/reference/google-cloud-translate-v2/latest/AUTHENTICATION)\n- [1.0.1](/ruby/docs/reference/google-cloud-translate-v2/1.0.1/AUTHENTICATION)\n- [0.5.1](/ruby/docs/reference/google-cloud-translate-v2/0.5.1/AUTHENTICATION)\n- [0.4.1](/ruby/docs/reference/google-cloud-translate-v2/0.4.1/AUTHENTICATION)\n- [0.3.1](/ruby/docs/reference/google-cloud-translate-v2/0.3.1/AUTHENTICATION) \n\nAuthentication\n==============\n\nIn general, the google-cloud-translate-v2 library uses [Service\nAccount](https://cloud.google.com/iam/docs/creating-managing-service-accounts)\ncredentials to connect to Google Cloud services. When running on Google Cloud\nPlatform (GCP), including Google Compute Engine (GCE), Google Kubernetes Engine\n(GKE), Google App Engine (GAE), Google Cloud Functions (GCF) and Cloud Run,\nthe credentials will be discovered automatically. When running on other\nenvironments, the Service Account credentials can be specified by providing the\npath to the [JSON\nkeyfile](https://cloud.google.com/iam/docs/managing-service-account-keys) for\nthe account (or the JSON itself) in environment variables. Additionally, Cloud\nSDK credentials can also be discovered automatically, but this is only\nrecommended during development.\n\nProject and Credential Lookup\n-----------------------------\n\nThe google-cloud-translate-v2 library aims to make authentication as simple as\npossible, and provides several mechanisms to configure your system without\nproviding **Project ID** and **Service Account Credentials** directly in code.\n\n**Project ID** is discovered in the following order:\n\n1. Specify project ID in method arguments\n2. Specify project ID in configuration\n3. Discover project ID in environment variables\n4. Discover GCE project ID\n\n**Credentials** are discovered in the following order:\n\n1. Specify credentials in method arguments\n2. Specify credentials in configuration\n3. Discover credentials path in environment variables\n4. Discover credentials JSON in environment variables\n5. Discover credentials file in the Cloud SDK's path\n6. Discover GCE credentials\n\n### Google Cloud Platform environments\n\nWhile running on Google Cloud Platform environments such as Google Compute\nEngine, Google App Engine and Google Kubernetes Engine, no extra work is needed.\nThe **Project ID** and **Credentials** and are discovered automatically. Code\nshould be written as if already authenticated. Just be sure when you \\[set up the\nGCE instance\\]\\[gce-how-to\\], you add the correct scopes for the APIs you want to\naccess. For example:\n\n- **All APIs**\n - `https://www.googleapis.com/auth/cloud-platform`\n - `https://www.googleapis.com/auth/cloud-platform.read-only`\n- **BigQuery**\n - `https://www.googleapis.com/auth/bigquery`\n - `https://www.googleapis.com/auth/bigquery.insertdata`\n- **Compute Engine**\n - `https://www.googleapis.com/auth/compute`\n- **Datastore**\n - `https://www.googleapis.com/auth/datastore`\n - `https://www.googleapis.com/auth/userinfo.email`\n- **DNS**\n - `https://www.googleapis.com/auth/ndev.clouddns.readwrite`\n- **Pub/Sub**\n - `https://www.googleapis.com/auth/pubsub`\n- **Storage**\n - `https://www.googleapis.com/auth/devstorage.full_control`\n - `https://www.googleapis.com/auth/devstorage.read_only`\n - `https://www.googleapis.com/auth/devstorage.read_write`\n\n### Environment Variables\n\nThe **Project ID** and **Credentials JSON** can be placed in environment\nvariables instead of declaring them directly in code. Each service has its own\nenvironment variable, allowing for different service accounts to be used for\ndifferent services. (See the READMEs for the individual service gems for\ndetails.) The path to the **Credentials JSON** file can be stored in the\nenvironment variable, or the **Credentials JSON** itself can be stored for\nenvironments such as Docker containers where writing files is difficult or not\nencouraged.\n\nThe environment variables that Translation checks for project ID are:\n\n1. `TRANSLATE_PROJECT`\n2. `GOOGLE_CLOUD_PROJECT`\n\nThe environment variables that Translation checks for credentials are configured\non [Google::Cloud::Translate::V2::Credentials](/ruby/docs/reference/google-cloud-translate-v2/latest/Google-Cloud-Translate-V2-Credentials \"Google::Cloud::Translate::V2::Credentials (class)\"):\n\n1. `TRANSLATE_CREDENTIALS` - Path to JSON file, or JSON contents\n2. `TRANSLATE_KEYFILE` - Path to JSON file, or JSON contents\n3. `GOOGLE_CLOUD_CREDENTIALS` - Path to JSON file, or JSON contents\n4. `GOOGLE_CLOUD_KEYFILE` - Path to JSON file, or JSON contents\n5. `GOOGLE_APPLICATION_CREDENTIALS` - Path to JSON file\n\n```ruby\nrequire \"google/cloud/translate/v2\"\n\nENV[\"TRANSLATE_PROJECT\"] = \"my-project-id\"\nENV[\"TRANSLATE_CREDENTIALS\"] = \"path/to/keyfile.json\"\n\ntranslate = Google::Cloud::Translate::V2.new\n```\n\n### Cloud SDK\n\nThis option allows for an easy way to authenticate during development. If\ncredentials are not provided in code or in environment variables, then Cloud SDK\ncredentials are discovered.\n\nTo configure your system for this, simply:\n\n1. [Download and install the Cloud SDK](https://cloud.google.com/sdk)\n2. Authenticate using OAuth 2.0 `$ gcloud auth login`\n3. Write code as if already authenticated.\n\n**NOTE:** This is *not* recommended for running in production. The Cloud SDK\n*should* only be used during development.\n\nCreating a Service Account\n--------------------------\n\nGoogle Cloud requires a **Project ID** and **Service Account Credentials** to\nconnect to the APIs. You will use the **Project ID** and **JSON key file** to\nconnect to most services with google-cloud-translate.\n\nIf you are not running this client on Google Compute Engine, you need a Google\nDevelopers service account.\n\n1. Visit the [Google Cloud Console](https://console.cloud.google.com/project).\n2. Create a new project or click on an existing project.\n3. Activate the menu in the upper left and select **APIs \\& Services**. From\n here, you will enable the APIs that your application requires.\n\n *Note: You may need to enable billing in order to use these services.*\n4. Select **Credentials** from the side navigation.\n\n Find the \"Create credentials\" drop down near the top of the page, and select\n \"Service account\" to be guided through downloading a new JSON key file.\n\n If you want to re-use an existing service account, you can easily generate\n a new key file. Just select the account you wish to re-use click the pencil\n tool on the right side to edit the service account, select the **Keys** tab,\n and then select **Add Key**.\n\n The key file you download will be used by this library to authenticate API\n requests and should be stored in a secure location."]]