Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
  • Blog
  • Pricing
  • Documentation
Yandex project
© 2025 Yandex.Cloud LLC
Yandex Cloud Organization
  • Getting started
  • Access management
  • Pricing policy
  • Terraform reference
  • Audit Trails events
  • Release notes

In this article:

  • Which resources you can assign a role for
  • Which roles exist in the service
  • Service roles
  • Primitive roles
  • Appointing a user the organization administrator
  • Assigning a role to a user
  • Revoking a user's role
  • Assigning a role to a user group

Access management in Yandex Cloud Organization

Written by
Yandex Cloud
Updated at April 25, 2025
  • Which resources you can assign a role for
  • Which roles exist in the service
    • Service roles
    • Primitive roles
    • Appointing a user the organization administrator
    • Assigning a role to a user
    • Revoking a user's role
    • Assigning a role to a user group

Access management in Yandex Cloud leverages the Role Based Access Control (RBAC) policy. To grant a user certain privileges or access to a resource, you must assign the user the appropriate roles.

Each role consists of a set of permissions that describe operations that can be performed with the resource. A user can assign a role with only those permissions which are available to themselves. For example, only a user with the organization owner role can assign this role: the administrator role is not sufficient to do this.

If a resource has child resources, all permissions from the parent resource will be inherited by the child resources. For example, if you assign the administrator role for the organization hosting the cloud, all the role's permissions will apply to the cloud and all its nested resources.

For more information on access management in Yandex Cloud, see the Yandex Identity and Access Management documentation, How access management works in Yandex Cloud.

Which resources you can assign a role forWhich resources you can assign a role for

You can assign a role to an organization, cloud, or folder. The roles assigned to organizations, clouds, and folders also apply to their nested resources.

You can assign a role for individual resources within the service using the Cloud Center interface, Yandex Cloud CLI, API, or Terraform:

  • User group
  • Organization

Which roles exist in the serviceWhich roles exist in the service

Service rolesService roles

organization-manager.auditororganization-manager.auditor

The organization-manager.auditor role enables viewing info on the organization and its settings, as well as on the federations, users and user groups within the organization.

Users with this role can:
  • View info on the organization under Cloud Organization and its settings.
  • View info on the access permissions granted for the organization.
  • View info on the organization’s identity federations.
  • View the list of the organization users.
  • View the list of the organization users that are subscribed to technical notifications on organization events.
  • View info on certificates.
  • View the list of federated user group mappings and info on them.
  • View info on the attributes of the federated users.
  • View info on the organization's OS Login settings.
  • View the list of OS Login profiles for users and service accounts.
  • View the list of the organization users' SSH keys and the info on such keys.
  • View info on the user groups and access permissions granted for them.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View the info on the refresh tokens of the organization’s federated users and on the refresh token settings.
  • View info on Cloud Organization quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role also includes the iam.userAccounts.refreshTokenViewer and organization-manager.osLogins.viewer permissions.

organization-manager.viewerorganization-manager.viewer

The organization-manager.viewer role enables viewing info on the organization and its settings, as well as on the identity federations, users and user groups within the organization.

Users with this role can:
  • View info on the organization under Cloud Organization and its settings.
  • View info on the access permissions granted for the organization.
  • View info on the organization’s identity federations.
  • View the list of the organization users.
  • View the list of the organization users that are subscribed to technical notifications on organization events.
  • View info on certificates.
  • View the list of federated user group mappings and info on them.
  • View info on the attributes of the federated users.
  • View info on the organization's OS Login settings.
  • View the list of OS Login profiles for users and service accounts.
  • View the list of the organization users' SSH keys and the info on such keys.
  • View info on the user groups and access permissions granted for them.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View the info on the refresh tokens of the organization’s federated users and on the refresh token settings.
  • View info on Cloud Organization quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role also includes the organization-manager.auditor and organization-manager.users.viewer permissions.

organization-manager.editororganization-manager.editor

The organization-manager.editor role enables managing the organization settings, identity federations, users, and user groups.

Users with this role can:
  • View and edit info on the relevant organization under Cloud Organization.
  • View and edit organization settings.
  • View info on the access permissions granted for the organization.
  • View info on the identity federations in an organization and create, modify, and delete such federations.
  • View the list of the organization users.
  • Add and remove federated users.
  • View the list of the organization users that are subscribed to technical notifications on organization events, as well as edit this list.
  • View info on the certificates and add, modify, and delete them.
  • View the lists of federated user group mappings and info on them, as well as create, edit, and delete such lists.
  • View info on the federated user attributes, as well as create, modify, and delete them.
  • View info on the organization's OS Login settings.
  • View the list of OS Login profiles for users and service accounts.
  • View the list of the organization users' SSH keys and the info on such keys.
  • View info on user groups, as well as create, modify, and delete them.
  • View info on access permissions granted for user groups.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View and edit the refresh token settings in an organization.
  • View the info on the refresh tokens of the organization’s federated users.
  • View info on Cloud Organization quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role also includes the organization-manager.viewer permissions.

organization-manager.adminorganization-manager.admin

The organization-manager.admin role enables managing organization settings, identity federations, users and their groups, and the user access permissions to the organization and its resources.

Users with this role can:
  • Link a billing account to an organization under Cloud Organization.
  • View and edit info on the relevant organization under Cloud Organization.
  • View and edit organization settings.
  • View info on the access permissions granted for the relevant organization and modify such permissions.
  • View info on the identity federations in an organization and create, modify, and delete such federations.
  • View the list of the organization users and remove users from the organization.
  • View the info on the invites to the organization sent to the users, as well as send and delete such invites.
  • Add and remove federated users.
  • View the list of the organization users that are subscribed to technical notifications on organization events, as well as edit this list.
  • View info on the certificates and add, modify, and delete them.
  • Configure federated user group mapping.
  • View the lists of federated user group mappings and info on them, as well as create, edit, and delete such lists.
  • View info on the federated user attributes, as well as create, modify, and delete them.
  • View info on the organization's OS Login settings and modify them.
  • View the list of the users' and service accounts’ OS Login profiles, as well as create, modify, and delete such profiles.
  • View the list of the organization users' SSH keys and info on such keys, as well as create, modify, and delete them.
  • View info on user groups, as well as create, modify, and delete them.
  • Add users and service accounts to and remove them from groups.
  • View info on the access permissions granted for the relevant user groups and modify such permissions.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View and edit the refresh token settings in an organization.
  • View the info on the refresh tokens of the organization’s federated users.
  • View info on Cloud Organization quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role also includes the organization-manager.editor and organization-manager.osLogins.admin permissions.

organization-manager.organizations.ownerorganization-manager.organizations.owner

The organization-manager.organizations.owner role enables performing any actions with the organization resources and billing accounts, which includes creating billing accounts and linking them to clouds. This role also enables assigning additional organization owners.

Prior to assigning this role, make sure to check out the information on protecting privileged accounts.

organization-manager.federations.viewerorganization-manager.federations.viewer

The organization-manager.federations.viewer role enables viewing info on the organization and its settings and on the identity federations and certificates, as well as the lists of user group mappings and the info on them.

organization-manager.federations.userAdminorganization-manager.federations.userAdmin

The organization-manager.federations.userAdmin role enables adding and removing federated users to/from an organization, revoking federated users’ refresh tokens, viewing the list of the organization users, and viewing federated users' attributes.

This role also includes the iam.userAccounts.refreshTokenRevoker permissions.

organization-manager.federations.adminorganization-manager.federations.admin

The organization-manager.federations.admin role enables creating, modifying, and deleting identity federations, certificates, and federated users, as well as viewing the organization settings and the info on the user group mapping.

Users with this role can:

  • View info on the organization and its settings.
  • View info on the identity federations and create, modify, and delete them.
  • View info on the certificates and create, modify, and delete them.
  • View the list of user group mappings and info on them.
  • Create and delete federated users.

This role also includes the organization-manager.federations.viewer permissions.

organization-manager.osLogins.viewerorganization-manager.osLogins.viewer

The organization-manager.osLogins.viewer role enables viewing the organization's OS Login settings and the list of the users' and service accounts’ OS Login profiles, as well as viewing the list of the users' SSH keys and the info on them.

organization-manager.osLogins.adminorganization-manager.osLogins.admin

The organization-manager.osLogins.admin role enables managing the organization's OS Login settings, as well as the users' OS Login profiles and SSH keys.

Users with this role can:

  • View info on the organization's OS Login settings and modify them.
  • View the list of the organization users' and service accounts’ OS Login profiles, as well as create, modify, and delete such profiles.
  • View the list of the organization users' SSH keys and info on such keys, as well as create, modify, and delete them.

This role also includes the organization-manager.osLogins.viewer permissions.

organization-manager.groups.memberAdminorganization-manager.groups.memberAdmin

The organization-manager.groups.memberAdmin role enables viewing the info on user groups, configuring user group mapping, and viewing and modifying the lists of the users and service accounts that are members of groups.

organization-manager.users.viewerorganization-manager.users.viewer

The organization-manager.users.viewer role enables viewing the list of the organization users and the info on them, as well as the lists of groups the users are members of and the federated users’ attributes.

organization-manager.passportUserAdminorganization-manager.passportUserAdmin

The organization-manager.passportUserAdmin role enables viewing info on the organization users, as well as inviting the users with Yandex accounts to the organization and removing them from it.

Users with this role can:

  • Send and resend invites to the organization to new users with Yandex accounts, as well as view and delete such invites.
  • Remove users from the organization.
  • View the list of the organization users.
  • View the attributes of the organization federated users.

Primitive rolesPrimitive roles

Primitive roles allow users to perform actions in all Yandex Cloud services.

auditorauditor

The auditor role grants a permission to read configuration and metadata of any Yandex Cloud resources without any access to data.

For instance, users with this role can:

  • View info on a resource.
  • View the resource metadata.
  • View the list of operations with a resource.

auditor is the most secure role that does not grant any access to the service data. This role suits the users who need minimum access to the Yandex Cloud resources.

viewerviewer

The viewer role grants the permissions to read the info on any Yandex Cloud resources.

This role also includes the auditor permissions.

Unlike auditor, the viewer role provides access to service data in read mode.

editoreditor

The editor role provides permissions to manage any Yandex Cloud resources, except for assigning roles to other users, transferring organization ownership, removing an organization, and deleting Key Management Service encryption keys.

For instance, users with this role can create, modify, and delete resources.

This role also includes the viewer permissions.

adminadmin

The admin role enables assigning any roles, except for resource-manager.clouds.owner and organization-manager.organizations.owner, and provides permissions to manage any Yandex Cloud resources (except for transferring organization ownership and removing an organization).

Prior to assigning the admin role for an organization, cloud, or billing account, make sure to check out the information on protecting privileged accounts.

This role also includes the editor permissions.

Instead of primitive roles, we recommend using service roles with more granular access control, allowing you to implement the least privilege principle.

For more information about primitive roles, see the Yandex Cloud role reference.

Appointing a user the organization administratorAppointing a user the organization administrator

To grant a user organization management access, assign the user one of the following roles:

  • organization-manager.admin
  • organization-manager.organizations.owner

Assigning a role to a userAssigning a role to a user

Organization administrators and owners can assign roles in Yandex Cloud Organization. You can assign to users not just organization management roles but also roles for access to your organization's connected cloud resources.

For information about roles available in Yandex Cloud and their associated permissions, see the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

Cloud Center interface
CLI
Terraform
API
  1. Log in to Yandex Cloud Organization with an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. If the user already has at least one role, click and select Assign bindings in the row with this user.

    If the user is not on the list, click Assign bindings in the top-right corner. In the window that opens, select a user from the list or use the search bar.

  4. Click Add role and select the role you want to assign to the user. You can assign multiple roles.

    You can find the description of the available roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

  5. Click Save.

  1. Select the role you want to assign. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

  2. Get the user ID.

  3. Assign the role using this command:

    yc <service_name> <resource> add-access-binding <resource_name_or_ID> \
        --role <role_ID> \
        --subject <subject_type>:<subject_ID>
    
    • <service_name>: Name of the service for whose resource you are assigning the role, e.g., organization-manager.
    • <resource>: Resource category. For an organization, it is always organization.
    • <resource_name_or_ID>: Resource name or ID. For an organization, use its technical name.
    • --role: Role ID, e.g., organization-manager.admin.
    • --subject: Type and ID of the subject you are assigning the role to.

    For example, this command assigns the administrator role for the organization with the bpf3crucp1v2******** ID:

    yc organization-manager organization add-access-binding bpf3crucp1v2******** \
        --role organization-manager.admin \
        --subject userAccount:aje6o61dvog2********
    

If you do not have Terraform yet, install it and configure its Yandex Cloud provider.

  1. Describe the parameters of the roles you assign in the configuration file:

    • organization_id: Organization ID.
    • role: Role you want to assign. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference. For each role, you can only use one yandex_organization manager_organization_iam_binding resource.
    • members: Array of the IDs of users to assign the role to:
      • userAccount:{user_id}: User Yandex account ID.
      • serviceAccount:{service_account_id}: Service account ID.
      • federatedUser:{federated_user_id}: Federated user ID.

    Here is the configuration file example:

    resource "yandex_organizationmanager_organization_iam_binding" "editor" {
      organization_id = "<organization_ID>"
      role = "editor"
      members = [
       "federatedUser:<user_ID>",
      ]
    }
    

    For more information about the resources you can create with Terraform, see the relevant provider documentation.

  2. Make sure the configuration files are correct.

    1. In the command line, go to the directory where you created the configuration file.
    2. Run a check using this command:
    terraform plan
    

    If the configuration is described correctly, the terminal will display a list of the assigned roles. If the configuration contains any errors, Terraform will point them out.

  3. Assign roles.

    If the configuration does not contain any errors, run this command:

    terraform apply
    

    This assigns the roles in the specified organization.

Use the updateAccessBindings method for the appropriate resource.

  1. Select the role you want to assign. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

  2. Get the user ID.

  3. Create the request body, e.g., in the body.json file. In the action property, enter ADD and specify the userAccount type and user ID under subject.

    Example of the body.json file:

    {
      "accessBindingDeltas": [{
        "action": "ADD",
        "accessBinding": {
          "roleId": "organization-manager.admin",
          "subject": {
            "id": "gfei8n54hmfh********",
            "type": "userAccount"
          }
        }
      }]
    }
    
  4. Assign the role. For example, for an organization with the bpf3crucp1v2******** ID:

    export ORGANIZATION_ID=bpf3crucp1v2********
    export IAM_TOKEN=CggaAT********
    curl \
      --request POST \
      --header "Content-Type: application/json" \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      --data '@body.json' \
      "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/organizations/${ORGANIZATION_ID}:updateAccessBindings"
    

    For detailed instructions on assigning a role to a resource, please see the Yandex Identity and Access Management and Yandex Resource Manager documentation:

    • Setting up service account access permissions
    • Setting up cloud access permissions
    • Setting up folder access permissions

In a similar way, you can assign roles for an organization to a service account.

Revoking a user's roleRevoking a user's role

If you want to deny a user access to a resource, revoke the relevant roles for this resource and for resources that grant inherited access rights. For more information on access management in Yandex Cloud, see the Yandex Identity and Access Management documentation.

The role can be revoked by a user with the organization-manager.admin or organization-manager.organizations.owner role. To learn how to grant a role to a user, see the Roles section.

Cloud Center interface
CLI
API
  1. Log in to Yandex Cloud Organization with an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. Find the required user in the list. If required, use the search bar or filter.

  4. In the row with the user, click and select Assign bindings. In the window that opens:

    1. Click next to a role to delete it.

    2. Click Save.

To revoke a role from a subject, delete access permissions for the appropriate resource:

  1. View the roles and assignees for the resource:

    yc <service_name> <resource> list-access-bindings <resource_name_or_ID>
    
    • <service_name>: Name of the service the resource belongs to, e.g., organization-manager.
    • <resource>: Resource category. For an organization, it is always organization.
    • <resource_name_or_ID>: Resource name or ID. For an organization, use its technical name.

    For example, view the roles and assignees in an organization with the bpf3crucp1v2******** ID:

    yc organization-manager organization list-access-bindings bpf3crucp1v2********
    

    Result:

    +------------------------------------------+--------------+----------------------+
    |                 ROLE ID                  | SUBJECT TYPE |      SUBJECT ID      |
    +------------------------------------------+--------------+----------------------+
    | organization-manager.organizations.owner | userAccount  | aje3r40rsemj******** |
    | organization-manager.admin               | userAccount  | aje6o61dvog2******** |
    +------------------------------------------+--------------+----------------------+
    
  2. To delete access permissions, run this command:

    yc <service_name> <resource> remove-access-binding <resource_name_or_ID> \
        --role <role_ID> \
        --subject <subject_type>:<subject_ID>
    
    • --role: ID of the role to revoke, e.g., organization-manager.admin.
    • --subject: Type and ID of the subject to revoke the role from.

    For example, to revoke a role from a user with the aje6o61dvog2******** ID:

    yc organization-manager organization remove-access-binding bpf3crucp1v2******** \
        --role organization-manager.admin \
        --subject userAccount:aje6o61dvog2********
    

To revoke a role from a subject, delete access permissions for the appropriate resource:

  1. View the roles and assignees for the resource using the listAccessBindings method. For example, to view the roles in the organization with the bpf3crucp1v2******** ID:

    export ORGANIZATION_ID=bpf3crucp1v2********
    export IAM_TOKEN=CggaAT********
    curl \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/organizations/${ORGANIZATION_ID}:listAccessBindings"
    

    Result:

    {
    "accessBindings": [
    {
      "subject": {
      "id": "aje6o61dvog2********",
      "type": "userAccount"
      },
      "roleId": "organization-manager.admin"
    }
    ]
    }
    
  2. Create the request body, e.g., in the body.json file. In the request body, specify the access permissions to delete. For example, revoke the organization-manager.admin role from the aje6o61dvog2******** user:

    Example of the body.json file:

    {
      "accessBindingDeltas": [{
        "action": "REMOVE",
        "accessBinding": {
          "roleId": "organization-manager.admin",
          "subject": {
            "id": "aje6o61dvog2********",
            "type": "userAccount"
          }
        }
      }]
    }
    
  3. Revoke a role by deleting the specified permissions:

    export ORGANIZATION_ID=bpf3crucp1v2********
    export IAM_TOKEN=CggaAT********
    curl \
      --request POST \
      --header "Content-Type: application/json" \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      --data '@body.json' \
      "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/organizations/${ORGANIZATION_ID}:updateAccessBindings"
    

Assigning a role to a user groupAssigning a role to a user group

Assign a role to a user group to grant access to a resource. To grant group access permissions to a subject, see Setting up user group access permissions.

In Yandex Cloud Organization, you can assign a group a role for an organization, cloud, folder, another group, or service account.

Assigning a role for a cloud or folderAssigning a role for a cloud or folder

Management console
CLI
Terraform
API
  1. Log in to the management console with the cloud administrator or owner account.

  2. On the left side of the screen, click the line with the name of the cloud or folder for which you want to assign a role to a user group.

  3. At the top of the screen, go to the Access bindings tab and click Configure access. In the window that opens:

    1. Go to the Groups tab and select the group you need or search by group name.

      You can also assign a role to one of the system groups:

      • All users in organization X: The group includes all users in organization X.
      • All users in federation N: The group includes all users in federation N.
    2. Click Add role and select the role you want to assign to the group for the cloud or folder you selected earlier. You can assign multiple roles.

    3. Click Save.

If you do not have the Yandex Cloud CLI yet, install and initialize it.

  1. Select a role from the Yandex Cloud role reference.

  2. Assign the role using this command:

    yc <service_name> <resource> add-access-binding <resource_name_or_ID> \
      --role <role_ID> \
      --subject group:<group_ID>
    

    Where:

    • --role: Role ID, e.g., resource-manager.clouds.owner.

    • --subject group: ID of the group the role is assigned to.

      To assign a role to one of the system groups, instead of --subject, use the --organization-users <organization_ID> or --federation-users <federation_ID> parameter. In the parameter, provide the ID of the organization or identity federation, respectively, to all the users you want to assign the role to.

      You can also assign a role to a system group using the --subject parameter. To do this, provide in it the subject ID matching the selected system group.

    For example, assign the resource-manager.viewer role for the my-cloud cloud:

    yc resource-manager cloud add-access-binding mycloud \
      --role resource-manager.viewer \
      --subject group:aje6o61dvog2********
    

If you do not have Terraform yet, install it and configure its Yandex Cloud provider.

  1. Add the resource parameters to the configuration file and specify the required role and group:

    resource "yandex_resourcemanager_cloud_iam_member" "admin" {
      cloud_id    = "<cloud_ID>"
      role        = "<role_ID>"
      member      = "group:<group_ID>"
    }
    

    Where:

    • cloud_id: Cloud ID. You can also assign a role within an individual folder. To do this, specify folder_id instead of cloud_id and the required folder ID in the resource parameters.

    • role: Role to assign. This is a required parameter.

    • member: Group the role is assigned to. Use this format: group:<group_ID>. This is a required parameter.

      To assign a role to one of the system groups, specify the following in the member parameter:

      • system:group:organization:<organization_ID>:users: To assign a role to the All users in organization X system group.
      • system:group:federation:<federation_ID>:users: To assign a role to the All users in federation N system group.

    For more information about the yandex_resourcemanager_cloud_iam_member resource parameters, see this Terraform article.

  2. Create the resources:

    1. In the terminal, change to the folder where you edited the configuration file.

    2. Make sure the configuration file is correct using the command:

      terraform validate
      

      If the configuration is correct, the following message is returned:

      Success! The configuration is valid.
      
    3. Run the command:

      terraform plan
      

      The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.

    4. Apply the configuration changes:

      terraform apply
      
    5. Confirm the changes: type yes in the terminal and press Enter.

    This will create all the resources you need in the specified folder. You can check the new resource using the management console or this CLI command:

    terraform plan
    

    If the configuration is correct, the terminal will display a list of the resources being created and their parameters. If the configuration contains any errors, Terraform will point them out.

  3. Deploy the cloud resources.

    1. If the configuration does not contain any errors, run this command:

      terraform apply
      
    2. Confirm creating the resources: type yes in the terminal and press Enter.

    This will create all the resources you need in the specified folder. You can check the new resource using the management console or this CLI command:

    yc resource-manager folder list-access-bindings <folder_name_or_ID>
    

Use the updateAccessBindings REST API method for the appropriate resource.

  1. Select a role from the Yandex Cloud role reference.

  2. Create the request body, e.g., in the body.json file. In the action property, enter ADD, and specify the group type and group ID under subject:

    body.json:

    {
      "accessBindingDeltas": [{
        "action": "ADD",
        "accessBinding": {
          "roleId": "editor",
          "subject": {
            "id": "<group_ID>",
            "type": "group"
          }
        }
      }]
    }
    
  3. Assign a role to a service account. For example, for a folder with the b1gvmob95yys******** ID:

    export FOLDER_ID=b1gvmob95yys********
    export IAM_TOKEN=CggaAT********
    curl \
      --request POST \
      --header "Content-Type: application/json" \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      --data '@body.json' \
      "https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders/${FOLDER_ID}:updateAccessBindings"
    

To learn how to assign a role for the respective resource, see:

  • Setting up service account access permissions.
  • Setting up cloud access permissions.
  • Setting up folder access permissions.

Assigning a role for an organizationAssigning a role for an organization

Cloud Center interface
CLI
Terraform
  1. Log in to Yandex Cloud Organization using an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. At the top right, click Assign bindings.

  4. Go to the Groups tab and select the group you need or search by group name.

    You can also assign a role to one of the system groups:

    • All users in organization X: The group includes all users in organization X.
    • All users in federation N: The group includes all users in federation N.
  5. Click Add role and select the role for the organization you want to assign to the group. You can assign multiple roles.

  6. Click Save.

If you do not have the Yandex Cloud CLI yet, install and initialize it.

  1. Assign the role to the group:

    yc organization-manager organization add-access-binding \
      --subject group:<group_ID> \
      --role <role_ID> \
      --organization-users <organization_ID> \
      --federation-users <federation_ID>
    

    To assign a role to one of the system groups, instead of the --subject parameter, use --organization-users <organization_ID> or --federation-users <federation_ID>. In the parameter, provide the ID of the organization or identity federation, respectively, to all the users you want to assign the role to.

    You can also assign a role to a system group using the --subject parameter. To do this, provide in it the subject ID matching the selected system group.

  2. Make sure the requested permissions are granted:

    yc organization-manager organization list-access-bindings <organization_ID>
    

    A response contains a list of all roles assigned to users and groups in the organization:

    +------------------------------------------+--------------+----------------------+
    |                 ROLE ID                  | SUBJECT TYPE |      SUBJECT ID      |
    +------------------------------------------+--------------+----------------------+
    | organization-manager.admin               | userAccount  | ajev1p2345lj******** |
    | organization-manager.organizations.owner | userAccount  | ajev1p2345lj******** |
    | editor                                   | group        | ajev1p2345lj******** |
    | viewer                                   | group        | ajev1p2345lj******** |
    +------------------------------------------+--------------+----------------------+
    

If you do not have Terraform yet, install it and configure its Yandex Cloud provider.

  1. Add the resource parameters to the configuration file and specify the required role and group:

    resource "yandex_organizationmanager_organization_iam_member" "users-editors" {
      organization_id = "<organization_ID>"
      role            = "<role_ID>"
      member          = "group:<group_ID>"
    }
    

    Where:

    • organization_id: Organization ID. This is a required parameter.

    • role: Role to assign. This is a required parameter.

    • member: Group the role is assigned to. Use this format: group:<group_ID>. This is a required parameter.

      To assign a role to one of the system groups, specify the following in the member parameter:

      • system:group:organization:<organization_ID>:users: To assign a role to the All users in organization X system group.
      • system:group:federation:<federation_ID>:users: To assign a role to the All users in federation N system group.

    For more information about the yandex_organizationmanager_organization_iam_member resource parameters, see this Terraform article.

  2. Create the resources:

    1. In the terminal, change to the folder where you edited the configuration file.

    2. Make sure the configuration file is correct using the command:

      terraform validate
      

      If the configuration is correct, the following message is returned:

      Success! The configuration is valid.
      
    3. Run the command:

      terraform plan
      

      The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.

    4. Apply the configuration changes:

      terraform apply
      
    5. Confirm the changes: type yes in the terminal and press Enter.

    This will create all the resources you need in the specified folder. You can check the new resource using the management console or this CLI command:

    yc resource-manager folder list-access-bindings <folder_name_or_ID>
    

Was the article helpful?

Previous
Authentication errors when using a Yandex account
Next
Pricing policy
Yandex project
© 2025 Yandex.Cloud LLC