@@ -20,7 +20,7 @@ respectively.
20
20
21
21
This is opposite to default pandas behaviour which will promote integer
22
22
type to float in order to store NAs.
23
- `See here for how this works in pandas <http ://pandas.pydata.org/pandas-docs/stable/gotchas.html#nan-integer-na-values-and-na-type-promotions >`__
23
+ `See here for how this works in pandas <https ://pandas.pydata.org/pandas-docs/stable/gotchas.html#nan-integer-na-values-and-na-type-promotions >`__
24
24
25
25
While this trade-off works well for most cases, it breaks down for storing
26
26
values greater than 2**53. Such values in BigQuery can represent identifiers
@@ -31,26 +31,25 @@ and unnoticed precision lost for identifier is what we want to avoid.
31
31
Authentication
32
32
''''''''''''''
33
33
34
- Authentication to the Google ``BigQuery `` service is via ``OAuth 2.0 ``.
35
- Is possible to authenticate with either user account credentials or service account credentials.
34
+ Authentication to the Google ``BigQuery `` service via ``OAuth 2.0 ``
35
+ is possible with either user or service account credentials.
36
36
37
- Authenticating with user account credentials is as simple as following the prompts in a browser window
38
- which will be automatically opened for you. You will be authenticated to the specified
39
- ``BigQuery `` account using the product name ``pandas GBQ ``. It is only possible on local host.
40
- The remote authentication using user account credentials is not currently supported in pandas .
37
+ Authentication via user account credentials is as simple as following the prompts in a browser window
38
+ which will automatically open for you. You authenticate to the specified
39
+ ``BigQuery `` account using the product name ``pandas GBQ ``.
40
+ The remote authentication is supported via specifying `` auth_local_webserver `` in `` read_gbq `` .
41
41
Additional information on the authentication mechanism can be found
42
42
`here <https://developers.google.com/identity/protocols/OAuth2#clientside/ >`__.
43
43
44
- Authentication with service account credentials is possible via the `'private_key' ` parameter. This method
45
- is particularly useful when working on remote servers (eg. jupyter iPython notebook on remote host).
44
+ Authentication via service account credentials is possible through the `'private_key' ` parameter. This method
45
+ is particularly useful when working on remote servers (eg. Jupyter Notebooks on remote host).
46
46
Additional information on service accounts can be found
47
47
`here <https://developers.google.com/identity/protocols/OAuth2#serviceaccount >`__.
48
48
49
- Authentication via ``application default credentials `` is also possible. This is only valid
50
- if the parameter ``private_key `` is not provided. This method also requires that
51
- the credentials can be fetched from the environment the code is running in.
52
- Otherwise, the OAuth2 client-side authentication is used.
53
- Additional information on
49
+ Authentication via ``application default credentials `` is also possible, but only valid
50
+ if the parameter ``private_key `` is not provided. This method requires that the
51
+ credentials can be fetched from the development environment. Otherwise, the OAuth2
52
+ client-side authentication is used. Additional information can be found on
54
53
`application default credentials <https://developers.google.com/identity/protocols/application-default-credentials >`__.
55
54
56
55
.. note ::
0 commit comments