docs: update generated docs (#981)

diff --git a/docs/dyn/iamcredentials_v1.projects.serviceAccounts.html b/docs/dyn/iamcredentials_v1.projects.serviceAccounts.html
index 9198489..c192221 100644
--- a/docs/dyn/iamcredentials_v1.projects.serviceAccounts.html
+++ b/docs/dyn/iamcredentials_v1.projects.serviceAccounts.html
@@ -100,12 +100,6 @@
     The object takes the form of:
 
 {
-    "scope": [ # Required. Code to identify the scopes to be included in the OAuth 2.0 access token.
-        # See https://developers.google.com/identity/protocols/googlescopes for more
-        # information.
-        # At least one value required.
-      "A String",
-    ],
     "delegates": [ # The sequence of service accounts in a delegation chain. Each service
         # account must be granted the `roles/iam.serviceAccountTokenCreator` role
         # on its next service account in the chain. The last service account in the
@@ -118,6 +112,12 @@
         # character is required; replacing it with a project ID is invalid.
       "A String",
     ],
+    "scope": [ # Required. Code to identify the scopes to be included in the OAuth 2.0 access token.
+        # See https://developers.google.com/identity/protocols/googlescopes for more
+        # information.
+        # At least one value required.
+      "A String",
+    ],
     "lifetime": "A String", # The desired lifetime duration of the access token in seconds.
         # Must be set to a value less than or equal to 3600 (1 hour). If a value is
         # not specified, the token's lifetime will be set to a default value of one
@@ -253,10 +253,11 @@
 
 {
     "payload": "A String", # Required. The JWT payload to sign. Must be a serialized JSON object that contains a
-        # JWT Claim Set. For example: `{"sub": "user@example.com", "iat": 313435}`
+        # JWT Claims Set. For example: `{"sub": "user@example.com", "iat": 313435}`
         # 
-        # If the claim set contains an `exp` claim, it must be an integer timestamp
-        # that is not in the past and at most 12 hours in the future.
+        # If the JWT Claims Set contains an expiration time (`exp`) claim, it must be
+        # an integer timestamp that is not in the past and no more than 12 hours in
+        # the future.
     "delegates": [ # The sequence of service accounts in a delegation chain. Each service
         # account must be granted the `roles/iam.serviceAccountTokenCreator` role
         # on its next service account in the chain. The last service account in the