Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Lockbox
  • Getting started
    • All guides
    • Creating secrets
    • Updating a secret
    • Configuring access to a secret
    • Getting information about a secret
    • Deleting a secret
    • Deactivating and activating a secret
    • Secret version management
    • Viewing operations with a secret
  • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes
  • FAQ
  1. Step-by-step guides
  2. Configuring access to a secret

Configuring access to a secret

Written by
Yandex Cloud
Updated at May 5, 2026
Management console
CLI
Terraform
API
  1. In the management console, select the folder the secret belongs to.
  2. Go to Lockbox.
  3. Click the name of the secret you need.
  4. On the left-hand panel, select Access bindings and click Assign roles.
  5. In the window that opens, click Select subject.
  6. Select the group, user, or service account to grant access to the secret.
  7. Click Add role and select the required roles.
  8. Click Save.

If you do not have the Yandex Cloud CLI yet, install and initialize it.

The folder used by default is the one specified when creating the CLI profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also specify a different folder for any command using --folder-name or --folder-id. If you access a resource by its name, the search will be limited to the default folder. If you access a resource by its ID, the search will be global, i.e., through all folders based on access permissions.

  1. Get the secret ID (the ID column in the command output):

    yc lockbox secret list
    

    Result:

    +----------------------+-------------+------------+---------------------+----------------------+--------+
    |          ID          |    NAME     | KMS KEY ID |     CREATED AT      |  CURRENT VERSION ID  | STATUS |
    +----------------------+-------------+------------+---------------------+----------------------+--------+
    | e6qetpqfe8vvag9h7jkr | test-secret |            | 2023-12-06 15:12:13 | e6qdnt9t2qsdggusve4g | ACTIVE |
    +----------------------+-------------+------------+---------------------+----------------------+--------+
    
  2. To assign a role for a secret:

    • To a user:

      yc lockbox secret add-access-binding \
        --id <secret_ID> \
        --user-account-id <user_ID> \
        --role <role>
      

      Where:

      • --id: Secret ID.
      • --user-account-id: User ID.
      • --role: Role to assign.
    • To a service account:

      yc lockbox secret add-access-binding \
        --id <secret_ID> \
        --service-account-id <service_account_ID> \
        --role <role>
      

      Where:

      • --id: Secret ID.
      • --service-account-id: Service account ID.
      • --role: Role to assign.

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

  1. Describe access permissions for the secret in the Terraform configuration file:

    resource "yandex_lockbox_secret_iam_member" "secret-viewer" {
      secret_id = "<secret_ID>"
      role      = "<role>"
      member    = "<subject_type>:<subject_ID>"
    }
    

    Where:

    • secret_id: Secret ID.
    • role: Role to assign.
    • member: Type and ID of the subject the role is assigned to. Specify it as userAccount:<user_ID> or serviceAccount:<service_account_ID>.

    For more information about yandex_lockbox_secret_iam_member properties in Terraform, see this provider guide.

  2. Create the resources

    1. In the terminal, navigate to the configuration file directory.

    2. Make sure the configuration is correct using this command:

      terraform validate
      

      If the configuration is valid, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a list of resources and their properties. No changes will be made at this step. Terraform will show any errors in the configuration.

    4. Apply the configuration changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    Terraform will create all the required resources. You can check the new resources and their settings either in the management console or using this CLI command:

    yc lockbox secret list-access-binding <secret_ID>
    

To configure access to a secret, use the setAccessBindings REST API method for the Secret resource or the SecretService/SetAccessBindings gRPC API call.

Warning

If you assign a group, user, or service account a role for a folder or cloud where the secret is stored, all permissions of this role will also apply to the secret.

For more information, see How access management works.

See alsoSee also

  • Secrets in Yandex Lockbox
  • How access management works in Yandex Cloud
  • Access management in Yandex Lockbox

Was the article helpful?

Previous
Updating a secret
Next
Getting information about a secret
© 2026 Direct Cursus Technology L.L.C.