yandex_kms_symmetric_key_iam_binding

Allows creation and management of a single binding within IAM policy for
an existing Yandex KMS Symmetric Key.

Example Usage

resource "yandex_kms_symmetric_key" "your-key" {
  folder_id = "your-folder-id"
  name      = "symmetric-key-name"
}

resource "yandex_kms_symmetric_key_iam_binding" "viewer" {
  symmetric_key_id = yandex_kms_symmetric_key.your-key.id
  role             = "viewer"

  members = [
    "userAccount:foo_user_id",
  ]
}

Argument Reference

The following arguments are supported:

  • symmetric_key_id - (Required) The Yandex Key Management Service Symmetric Key ID to apply a binding to.

  • role - (Required) The role that should be applied. See roles.

  • members - (Required) Identities that will be granted the privilege in role.
    Each entry can have one of the following values:

    • userAccount:{user_id}: A unique user ID that represents a specific Yandex account.
    • federatedUser:{user_id}: A unique user ID that represents a specific user account from an identity federation, like Active Directory.
    • serviceAccount:{service_account_id}: A unique service account ID.
    • system:group:federation:{federation_id}:users: All users in federation.
    • system:group:organization:{organization_id}:users: All users in organization.
    • system:allAuthenticatedUsers: All authenticated users.
    • system:allUsers: All users, including unauthenticated ones.

    Note: for more information about system groups, see the documentation.

Import

IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
These bindings can be imported using the symmetric_key_id and role, e.g.

$ terraform import yandex_kms_symmetric_key_iam_binding.viewer "symmetric_key_id viewer"
Предыдущая
Следующая