Configuring disk snapshot access permissions
To grant a user, group, or service account access to a disk snapshot, assign a role for it.
Assigning a role
- In the management console
, select the folder the disk snapshot belongs to. - Go to Compute Cloud.
- In the left-hand panel, select
Snapshots. - Select the disk snapshot from the list.
- Navigate to the
Access bindings tab. - Click Assign roles.
- In the window that opens, select the group, user, or service account you want to grant access to the disk snapshot.
- Click
Add role and select the required roles. - Click Save.
If you do not have the Yandex Cloud CLI installed yet, install and initialize it.
By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.
-
See the description of the CLI command for assigning a role for a disk snapshot:
yc compute snapshot add-access-binding --help -
Get a list of snapshots in the default folder:
yc compute snapshot listResult:
+----------------------+-----------------+----------------------+--------+----------------------------+ | ID | NAME | PRODUCT IDS | STATUS | DESCRIPTION | +----------------------+-----------------+----------------------+--------+----------------------------+ | fd8rlt1u2rf0l******* | first-snapshot | f2ecl5vhsftd******** | READY | my first snapshot via CLI | | fhmolt1u2rf0******** | second-snapshot | f2eclmol5lps******** | READY | my second snapshot via CLI | +----------------------+-----------------+----------------------+--------+----------------------------+ -
View a list of roles already assigned for the resource in question:
yc compute snapshot list-access-bindings <snapshot_ID> -
Assign the role using this command:
-
To a user:
yc compute snapshot add-access-binding <snapshot_ID> \ --user-account-id <user_ID> \ --role <role>Where:
-
To a service account:
yc compute snapshot add-access-binding <snapshot_ID> \ --service-account-id <service_account_ID> \ --role <role>Where:
--service-account-id: Service account ID.--role: Role to assign.
-
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the relevant documentation on the Terraform
If you do not have Terraform yet, install it and configure the Yandex Cloud provider.
To assign a role for a snapshot using Terraform:
-
In the Terraform configuration file, define the parameters of the resources you want to create:
resource "yandex_compute_snapshot_iam_binding" "sa-access" { snapshot_id = "<snapshot_ID>" role = "<role>" members = ["<subject_type>:<subject_ID>","<subject_type>:<subject_ID>"] }Where:
snapshot_id: Snapshot ID.role: Role.members: List of types and IDs of subjects getting the role. Specify it asuserAccount:<user_ID>orserviceAccount:<service_account_ID>.
For more information about the
yandex_compute_snapshot_iam_bindingresource parameters, see the relevant provider documentation. -
Create the resources:
-
In the terminal, go to the directory where you edited the configuration file.
-
Make sure the configuration file is correct using this command:
terraform validateIf the configuration is correct, you will get this message:
Success! The configuration is valid. -
Run this command:
terraform planYou will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.
-
Apply the changes:
terraform apply -
Type
yesand press Enter to confirm the changes.
Terraform will create all the required resources. You can check the new resources using the management console
or this CLI command:yc compute snapshot list-access-bindings <snapshot_ID> -
Use the updateAccessBindings REST API method for the Snapshot resource or the SnapshotService/UpdateAccessBindings gRPC API call. In the request body, set the action property to ADD and specify the user type and ID under subject.
Assigning multiple roles
- In the management console
, select the folder the disk snapshot belongs to. - Go to Compute Cloud.
- In the left-hand panel, select
Snapshots. - Select the disk snapshot from the list.
- Navigate to the
Access bindings tab. - Click Assign roles.
- In the window that opens, select the group, user, or service account you want to grant access to the disk snapshot.
- Click
Add role and select the required roles. - To add another role, click Add role.
- Click Save.
If you do not have the Yandex Cloud CLI installed yet, install and initialize it.
By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.
You can assign multiple roles using the set-access-bindings command.
Alert
The set-access-bindings command completely rewrites access permissions for the resource. All current roles for the resource will be deleted.
-
Make sure the resource has no roles assigned that you would not want to lose:
yc compute snapshot list-access-bindings <snapshot_ID> -
See the description of the CLI command for assigning roles for a disk snapshot:
yc compute snapshot set-access-bindings --help -
Assign roles:
yc compute snapshot set-access-bindings <snapshot_ID> \ --access-binding role=<role>,subject=<subject_type>:<subject_ID>Where:
-
--access-binding: Role to assign:role: ID of the role to assign.subject: Type and ID of the subject the role is assigned to.
For example, this command will assign roles to multiple users and a single service account:
yc compute snapshot set-access-bindings my-snapshot \ --access-binding role=editor,subject=userAccount:gfei8n54hmfh******** --access-binding role=viewer,subject=userAccount:helj89sfj80a******** --access-binding role=editor,subject=serviceAccount:ajel6l0jcb9s******** -
If you do not have Terraform yet, install it and configure the Yandex Cloud provider.
To assign multiple roles for a snapshot using Terraform:
-
In the Terraform configuration file, describe the resources you want to create:
resource "yandex_compute_snapshot_iam_binding" "role-1" { snapshot_id = "<snapshot_ID>" role = "<role_1>" members = ["<subject_type>:<subject_ID>"] } resource "yandex_compute_snapshot_iam_binding" "role-2" { snapshot_id = "<snapshot_ID>" role = "<role_2>" members = ["<subject_type>:<subject_ID>"] }Where:
snapshot_id: Snapshot ID.role: Role.members: List of types and IDs of subjects getting the role. Specify it asuserAccount:<user_ID>orserviceAccount:<service_account_ID>.
For more information about the
yandex_compute_snapshot_iam_bindingresource parameters, see the relevant provider documentation. -
Create the resources:
-
In the terminal, go to the directory where you edited the configuration file.
-
Make sure the configuration file is correct using this command:
terraform validateIf the configuration is correct, you will get this message:
Success! The configuration is valid. -
Run this command:
terraform planYou will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.
-
Apply the changes:
terraform apply -
Type
yesand press Enter to confirm the changes.
You can check the updates using the management console
or this CLI command:yc compute snapshot list-access-bindings <snapshot_ID> -
Use the setAccessBindings REST API method for the Snapshot resource or the SnapshotService/SetAccessBindings gRPC API call.
Revoking a role
- In the management console
, select the folder the disk snapshot belongs to. - Go to Compute Cloud.
- In the left-hand panel, select
Snapshots. - Select the disk snapshot from the list.
- Navigate to the
Access bindings tab. - In the line with the user in question, click
and select Edit roles. - Click
next to a role to delete it. - Click Save.
If you do not have the Yandex Cloud CLI installed yet, install and initialize it.
By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.
-
See the description of the CLI command for revoking a role for a disk snapshot:
yc compute snapshot remove-access-binding --help -
View the roles and assignees for the resource:
yc compute snapshot list-access-bindings <snapshot_ID> -
To revoke access permissions, run this command:
yc compute snapshot remove-access-binding <snapshot_ID> \ --role <role_ID> \ --subject <subject_type>:<subject_ID>Where:
--role: ID of the role you want to revoke.--subject: Subject to revoke the role from.
For example, this command revokes the
viewerrole for the disk snapshot from a user with theajel6l0jcb9s********ID:yc compute snapshot remove-access-binding my-snapshot \ --role viewer \ --subject userAccount:ajel6l0jcb9s********
If you do not have Terraform yet, install it and configure the Yandex Cloud provider.
To revoke a role assigned for a disk snapshot using Terraform:
-
Open the Terraform configuration file and delete the section specifying the role:
resource "yandex_compute_snapshot_iam_binding" "sa-access" { snapshot_id = "<snapshot_ID>" role = "<role>" members = ["<subject_type>:<subject_ID>"] } -
Apply the changes:
-
In the terminal, go to the directory where you edited the configuration file.
-
Make sure the configuration file is correct using this command:
terraform validateIf the configuration is correct, you will get this message:
Success! The configuration is valid. -
Run this command:
terraform planYou will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.
-
Apply the changes:
terraform apply -
Type
yesand press Enter to confirm the changes.
You can check the updates using the management console
or this CLI command:yc compute snapshot list-access-bindings <snapshot_ID> -
To revoke roles for a disk snapshot, use the updateAccessBindings REST API method for the Snapshot resource or the SnapshotService/UpdateAccessBindings gRPC API call. In the request body, set the action property to REMOVE and specify the user type and ID under subject.