Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Compute Cloud
    • All guides
      • Stopping and starting a VM
      • Resetting a Windows Server VM user password
      • Attaching a disk to a VM
      • Detaching a disk from a VM
      • Moving a VM to a different availability zone
      • Moving a VM to a different folder
      • Moving a VM to a different cloud
      • Adding another network interface to a VM
      • Deleting a network interface from a VM
      • Assigning a public IP address to a VM
      • Unassigning a public IP address from a VM
      • Making a VM public IP address static
      • Reassigning a public IP address from one VM to another
      • Updating the VM internal IP address
      • Updating a VM
      • Changing VM computing resources
      • Changing VM security groups
      • VM maintenance policy management
      • Configuring VM access permissions
      • Linking a service account to a VM
      • Deleting a VM
    • Viewing service resource operations
    • Viewing metrics in Monitoring
    • NVIDIA driver update guide
  • Yandex Container Solution
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • Assigning a role
  • Assigning multiple roles
  • Revoking a role
  1. Step-by-step guides
  2. Managing a VM
  3. Configuring VM access permissions

Configuring VM access permissions

Written by
Yandex Cloud
Updated at November 11, 2025
  • Assigning a role
  • Assigning multiple roles
  • Revoking a role

To grant a user, group, or service account access to a VM, assign a role for it.

Assigning a roleAssigning a role

Management console
CLI
Terraform
API
  1. In the management console, select the folder this VM belongs to.
  2. Select Compute Cloud.
  3. Select the VM.
  4. Navigate to the Access bindings tab.
  5. Click Assign roles.
  6. In the window that opens, select the group, user, or service account you want to grant access to the VM.
  7. Click Add role and select the required roles.
  8. Click Save.

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.

  1. See the description of the CLI command for assigning a role for a VM:

    yc compute instance add-access-binding --help
    
  2. Get a list of VMs in the default folder:

    yc compute instance list
    

    Result:

    +----------------------+-----------------+---------------+---------+----------------------+
    |          ID          |       NAME      |    ZONE ID    | STATUS  |     DESCRIPTION      |
    +----------------------+-----------------+---------------+---------+----------------------+
    | fhm0b28lgfp4******** | first-instance  | ru-central1-a | RUNNING | my first vm via CLI  |
    | fhm9gk85nj7g******** | second-instance | ru-central1-a | RUNNING | my second vm via CLI |
    +----------------------+-----------------+---------------+---------+----------------------+
    
  3. View a list of roles already assigned for the resource in question:

    yc compute instance list-access-bindings <VM_ID>
    
  4. Assign the role using this command:

    • To a user:

      yc compute instance add-access-binding <VM_ID> \
        --user-account-id <user_ID> \
        --role <role>
      

      Where:

      • --user-account-id: User ID.
      • --role: Role to assign.
    • To a service account:

      yc compute instance add-access-binding <VM_ID> \
        --service-account-id <service_account_ID> \
        --role <role>
      

      Where:

      • --service-account-id: Service account ID.
      • --role: Role to assign.

With Terraform, you can quickly create a cloud infrastructure in Yandex Cloud and manage it using configuration files. These files store the infrastructure description written in HashiCorp Configuration Language (HCL). If you change the configuration files, Terraform automatically detects which part of your configuration is already deployed, and what should be added or removed.

Terraform is distributed under the Business Source License. The Yandex Cloud provider for Terraform is distributed under the MPL-2.0 license.

For more information about the provider resources, see the relevant documentation on the Terraform website or its mirror.

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

To assign a role for a VM using Terraform:

  1. In the Terraform configuration file, define the parameters of the resources you want to create:

    resource "yandex_compute_instance_iam_binding" "sa-access" {
      instance_id = "<VM_ID>"
      role        = "<role>"
      members     = ["<subject_type>:<subject_ID>","<subject_type>:<subject_ID>"]
    }
    

    Where:

    • instance_id: VM ID.
    • role: Role to assign.
    • members: List of types and IDs of subjects getting the role. Specify it as userAccount:<user_ID> or serviceAccount:<service_account_ID>.

    For more information about the yandex_compute_instance_iam_binding resource parameters, see the relevant provider documentation.

  2. Create the resources:

    1. In the terminal, go to the directory where you edited the configuration file.

    2. Make sure the configuration file is correct using this command:

      terraform validate
      

      If the configuration is correct, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.

    4. Apply the changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    Terraform will create all the required resources. You can check the new resources using the management console or this CLI command:

    yc compute instance list-access-bindings <VM_ID>
    

Use the updateAccessBindings REST API method for the Instance resource or the InstanceService/UpdateAccessBindings gRPC API call. In the request body, set the action property to ADD and specify the user type and ID under subject.

Assigning multiple rolesAssigning multiple roles

Management console
CLI
Terraform
API
  1. In the management console, select the folder this VM belongs to.
  2. Select Compute Cloud.
  3. Select the VM.
  4. Navigate to the Access bindings tab.
  5. Click Assign roles.
  6. In the window that opens, select the group, user, or service account you want to grant access to the VM.
  7. Click Add role and select the required roles.
  8. To add another role, click Add role.
  9. Click Save.

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.

You can assign multiple roles using the set-access-bindings command.

Alert

The set-access-bindings command completely rewrites access permissions for the resource. All current roles for the resource will be deleted.

  1. Make sure the resource has no roles assigned that you would not want to lose:

    yc compute instance list-access-bindings <VM_ID>
    
  2. See the CLI command description for assigning roles for a VM:

    yc compute instance set-access-bindings --help
    
  3. Assign roles:

    yc compute instance set-access-bindings <VM_ID> \
      --access-binding role=<role>,subject=<subject_type>:<subject_ID>
    

    Where:

    • --access-binding: Role to assign:

      • role: ID of the role to assign.
      • subject: Type and ID of the subject the role is assigned to.

    For example, this command will assign roles to multiple users and a single service account:

    yc compute instance set-access-bindings test-vm \
      --access-binding role=editor,subject=userAccount:gfei8n54hmfh********
      --access-binding role=viewer,subject=userAccount:helj89sfj80a********
      --access-binding role=editor,subject=serviceAccount:ajel6l0jcb9s********
    

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

To assign multiple roles for a VM using Terraform:

  1. In the Terraform configuration file, describe the resources you want to create:

    resource "yandex_compute_instance_iam_binding" "role-1" {
      instance_id = "<VM_ID>"
      role        = "<role_1>"
      members     = ["<subject_type>:<subject_ID>"]
    }
    
    resource "yandex_compute_instance_iam_binding" "role-2" {
      instance_id = "<VM_ID>"
      role        = "<role_2>"
      members     = ["<subject_type>:<subject_ID>"]
    }
    

    Where:

    • instance_id: VM ID.
    • role: Role to assign.
    • members: List of types and IDs of subjects getting the role. Specify it as userAccount:<user_ID> or serviceAccount:<service_account_ID>.

    For more information about the yandex_compute_instance_iam_binding resource parameters, see the relevant provider documentation.

  2. Create the resources:

    1. In the terminal, go to the directory where you edited the configuration file.

    2. Make sure the configuration file is correct using this command:

      terraform validate
      

      If the configuration is correct, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.

    4. Apply the changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    You can check the updates using the management console or this CLI command:

    yc compute instance list-access-bindings <VM_ID>
    

Use the setAccessBindings REST API method for the Instance resource or the InstanceService/SetAccessBindings gRPC API call.

Revoking a roleRevoking a role

Management console
CLI
Terraform
API
  1. In the management console, select the folder this VM belongs to.
  2. Select Compute Cloud.
  3. Select the VM.
  4. Navigate to the Access bindings tab.
  5. In the line with the user in question, click and select Edit roles.
  6. Click next to a role to delete it.
  7. Click Save.

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.

  1. See the description of the CLI command for revoking a role for a VM:

    yc compute instance remove-access-binding --help
    
  2. View the roles and assignees for the resource:

    yc compute instance list-access-bindings <VM_ID>
    
  3. To revoke access permissions, run this command:

    yc compute instance remove-access-binding <VM_ID> \
      --role <role_ID> \
      --subject <subject_type>:<subject_ID>
    

    Where:

    • --role: ID of the role you want to revoke.
    • --subject: Subject to revoke the role from.

    For example, this command revokes the viewer role for the VM from a user with the ajel6l0jcb9s******** ID:

    yc compute instance remove-access-binding test-vm \
      --role viewer \
      --subject userAccount:ajel6l0jcb9s********
    

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

To revoke a role assigned for a VM using Terraform:

  1. Open the Terraform configuration file and delete the section specifying the role:

    resource "yandex_compute_instance_iam_binding" "sa-access" {
      instance_id = "<VM_ID>"
      role        = "<role>"
      members     = ["<subject_type>:<subject_ID>"]
    }
    
  2. Apply the changes:

    1. In the terminal, go to the directory where you edited the configuration file.

    2. Make sure the configuration file is correct using this command:

      terraform validate
      

      If the configuration is correct, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.

    4. Apply the changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    You can check the updates using the management console or this CLI command:

    yc compute instance list-access-bindings <VM_ID>
    

To revoke roles for a VM, use the updateAccessBindings REST API method for the Instance resource or the InstanceService/UpdateAccessBindings gRPC API call. In the request body, set the action property to REMOVE and specify the user type and ID under subject.

Was the article helpful?

Previous
VM maintenance policy management
Next
Linking a service account to a VM
© 2025 Direct Cursus Technology L.L.C.