Configuring disk access permissions
To grant a user, group, or service account access to a disk, assign a role for it.
Assigning a role
- In the management console
, select the folder the disk belongs to. - Select Compute Cloud.
- In the left-hand panel, select
Disks. - Select the disk from the list.
- Go to the
Access bindings tab. - Click Assign roles.
- In the window that opens, select the group, user, or service account you want to grant access to the disk.
- Click
Add role and select the required roles. - Click Save.
If you do not have the Yandex Cloud CLI yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameters.
-
See the description of the CLI command for assigning a role for a disk:
yc compute disk add-access-binding --help
-
Get a list of disks in the default folder:
yc compute disk list
Result:
+----------------------+-------------+-------------+-------------------+--------+----------------------+-----------------+-------------+ | ID | NAME | SIZE | ZONE | STATUS | INSTANCE IDS | PLACEMENT GROUP | DESCRIPTION | +----------------------+-------------+-------------+-------------------+--------+----------------------+-----------------+-------------+ | epd557pch3uk******** | first-disk | 68719476736 | ru-central1-a | READY | epd5ieqbii7l******** | | | | epdusilqgq3m******** | second-disk | 68719476736 | ru-central1-a | READY | epd37ebcdf36******** | | | +----------------------+-------------+-------------+-------------------+--------+----------------------+-----------------+-------------+
-
View a list of roles already assigned for the resource in question:
yc compute disk list-access-bindings <disk_ID>
-
Assign the role using this command:
-
To a user:
yc compute disk add-access-binding <disk_ID> \ --user-account-id <user_ID> \ --role <role>
Where:
-
To a service account:
yc compute disk add-access-binding <disk_ID> \ --service-account-id <service_account_ID> \ --role <role>
Where:
--service-account-id
: Service account ID.--role
: Role to assign.
-
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the documentation on the Terraform
If you don't have Terraform, install it and configure the Yandex Cloud provider.
To assign a role for a disk using Terraform:
-
In the Terraform configuration file, define the parameters of the resources you want to create:
resource "yandex_compute_disk_iam_binding" "sa-access" { disk_id = "<disk_ID>" role = "<role>" members = ["<subject_type>:<subject_ID>","<subject_type>:<subject_ID>"] }
Where:
disk_id
: Disk ID.role
: Role to assign.members
: List of types and IDs of subjects getting the role. Specify it asuserAccount:<user_ID>
orserviceAccount:<service_account_ID>
.
For more information about the
yandex_compute_disk_iam_binding
resource parameters, see the relevant provider documentation . -
Create the resources:
-
In the terminal, change to the folder where you edited the configuration file.
-
Make sure the configuration file is correct using the command:
terraform validate
If the configuration is correct, the following message is returned:
Success! The configuration is valid.
-
Run the command:
terraform plan
The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
in the terminal and press Enter.
Terraform will create all the required resources. You can check the updates using the management console
or this CLI command:yc compute disk list-access-bindings <disk_ID>
-
Use the updateAccessBindings REST API method for the Disk resource or the DiskService/UpdateAccessBindings gRPC API call. In the request body, set the action
property to ADD
and specify the user type and ID under subject
.
Assigning multiple roles
- In the management console
, select the folder the disk belongs to. - Select Compute Cloud.
- In the left-hand panel, select
Disks. - Select the disk from the list.
- Go to the
Access bindings tab. - Click Assign roles.
- In the window that opens, select the group, user, or service account you want to grant access to the disk.
- Click
Add role and select the required roles. - To add another role, click Add role.
- Click Save.
If you do not have the Yandex Cloud CLI yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameters.
You can assign multiple roles using the set-access-bindings
command.
Alert
The set-access-bindings
command completely rewrites access permissions for the resource. All current roles for the resource will be deleted.
-
Make sure the resource has no roles assigned that you would not want to lose:
yc compute disk list-access-bindings <disk_ID>
-
See the description of the CLI command for assigning roles for a disk:
yc compute disk set-access-bindings --help
-
Assign roles:
yc compute disk set-access-bindings <disk_ID> \ --access-binding role=<role>,subject=<subject_type>:<subject_ID>
Where:
-
--access-binding
: Role to assign:role
: ID of the role to assign.subject
: Type and ID of the subject getting the role.
For example, this command will assign roles to multiple users and a single service account:
yc compute disk set-access-bindings my-disk \ --access-binding role=editor,subject=userAccount:gfei8n54hmfh******** --access-binding role=viewer,subject=userAccount:helj89sfj80a******** --access-binding role=editor,subject=serviceAccount:ajel6l0jcb9s********
-
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the documentation on the Terraform
If you don't have Terraform, install it and configure the Yandex Cloud provider.
To assign multiple roles for a disk using Terraform:
-
In the Terraform configuration file, define the parameters of the resources you want to create:
resource "yandex_compute_disk_iam_binding" "role1" { disk_id = "<disk_ID>" role = "<role_1>" members = ["<subject_type>:<subject_ID>"] } resource "yandex_compute_disk_iam_binding" "role2" { disk_id = "<disk_ID>" role = "<role_2>" members = ["<subject_type>:<subject_ID>"] }
Where:
disk_id
: Disk ID.role
: Role to assign.members
: List of types and IDs of subjects getting the role. Specify it asuserAccount:<user_ID>
orserviceAccount:<service_account_ID>
.
For more information about the
yandex_compute_disk_iam_binding
resource parameters, see the relevant provider documentation . -
Create the resources:
-
In the terminal, change to the folder where you edited the configuration file.
-
Make sure the configuration file is correct using the command:
terraform validate
If the configuration is correct, the following message is returned:
Success! The configuration is valid.
-
Run the command:
terraform plan
The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
in the terminal and press Enter.
Terraform will create all the required resources. You can check the updates using the management console
or this CLI command:yc compute disk list-access-bindings <disk_ID>
-
Use the setAccessBindings REST API method for the Disk resource or the DiskService/SetAccessBindings gRPC API call.
Revoking a role
- In the management console
, select the folder the disk belongs to. - Select Compute Cloud.
- In the left-hand panel, select
Disks. - Select the disk from the list.
- Go to the
Access bindings tab. - Click Assign roles.
- In the line with the user in question, click
and select Edit roles. - Click
next to a role to delete it. - Click Save.
If you do not have the Yandex Cloud CLI yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameters.
-
See the description of the CLI command for revoking a role for a disk:
yc compute disk remove-access-binding --help
-
View the roles and assignees for the resource:
yc compute disk list-access-bindings <disk_ID>
-
To revoke access permissions, run this command:
yc compute disk remove-access-binding <disk_ID> \ --role <role_ID> \ --subject <subject_type>:<subject_ID>
Where:
--role
: ID of the role to revoke.--subject
: Subject to revoke the role from.
For example, this command revokes the
viewer
role for the disk from a user with theajel6l0jcb9s********
ID:yc compute disk remove-access-binding my-disk \ --role viewer \ --subject userAccount:ajel6l0jcb9s********
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the documentation on the Terraform
If you don't have Terraform, install it and configure the Yandex Cloud provider.
To revoke a role assigned for a disk using Terraform:
-
Open the Terraform configuration file and delete the section specifying the role:
resource "yandex_compute_disk_iam_binding" "sa-access" { disk_id = "<disk_ID>" role = "<role>" members = ["<subject_type>:<subject_ID>"] }
-
Apply the changes:
-
In the terminal, change to the folder where you edited the configuration file.
-
Make sure the configuration file is correct using the command:
terraform validate
If the configuration is correct, the following message is returned:
Success! The configuration is valid.
-
Run the command:
terraform plan
The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
in the terminal and press Enter.
You can check the updates using the management console
or this CLI command:yc compute disk list-access-bindings <disk_ID>
-
To revoke roles for a disk, use the updateAccessBindings REST API method for the Disk resource or the DiskService/UpdateAccessBindings gRPC API call. In the request body, set the action
property to REMOVE
and specify the user type and ID under subject
.