Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI Studio
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Identity Hub
  • Getting started
  • Access management
  • Pricing policy
  • Terraform reference
  • Audit Trails events
  • Release notes

In this article:

  • Resources supporting role assignment
  • Roles this service has
  • Service roles
  • Primitive roles
  • Appointing a user the organization administrator
  • Assigning a role to a user
  • Revoking a user's role
  • Assigning a role to a user group
  • What roles are assigned in an organization

Access management in Yandex Identity Hub

Written by
Yandex Cloud
Updated at June 18, 2025
  • Resources supporting role assignment
  • Roles this service has
    • Service roles
    • Primitive roles
    • Appointing a user the organization administrator
    • Assigning a role to a user
    • Revoking a user's role
    • Assigning a role to a user group
  • What roles are assigned in an organization

Access management in Yandex Cloud leverages the Role Based Access Control (RBAC) policy. To grant a user certain privileges or access to a resource, you must assign the user the appropriate roles.

Each role consists of a set of permissions that describe operations that can be performed with the resource. A user can assign a role with only those permissions which are available to themselves. For example, only a user with the organization owner role can assign this role: the administrator role is not sufficient to do this.

If a resource has child resources, all permissions from the parent resource will be inherited by the child resources. For example, if you assign the administrator role for the organization hosting the cloud, all the role's permissions will apply to the cloud and all its nested resources.

For more information on access management in Yandex Cloud, see the Yandex Identity and Access Management documentation, How access management works in Yandex Cloud.

Resources supporting role assignmentResources supporting role assignment

You can assign a role to an organization, cloud, or folder. The roles assigned to organizations, clouds, and folders also apply to their nested resources.

You can assign a role for individual resources within the service using the Cloud Center interface, Yandex Cloud CLI, API, or Terraform:

  • User group
  • Organization

Roles this service hasRoles this service has

Service rolesService roles

organization-manager.auditororganization-manager.auditor

The organization-manager.auditor role enables viewing info on the organization and its settings, as well as on the federations, users and user groups within the organization.

Users with this role can:
  • View info on the organization under Identity Hub and its settings.
  • View info on the access permissions granted for the organization.
  • View info on the organization’s identity federations.
  • View the list of the organization users.
  • View the list of the organization users that are subscribed to technical notifications on organization events.
  • View info on certificates.
  • View the list of federated user group mappings and info on them.
  • View info on the attributes of the federated users.
  • View info on the organization's OS Login settings.
  • View the list of OS Login profiles for users and service accounts.
  • View the list of the organization users' SSH keys and the info on such keys.
  • View info on the user groups and access permissions granted for them.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View the info on the refresh tokens of the organization’s federated users and on the refresh token settings.
  • View info on Identity Hub quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role includes the iam.userAccounts.refreshTokenViewer, organization-manager.federations.auditor, and organization-manager.osLogins.viewer permissions.

organization-manager.viewerorganization-manager.viewer

The organization-manager.viewer role enables viewing info on the organization and its settings, as well as on the identity federations, users and user groups within the organization.

Users with this role can:
  • View info on the organization under Identity Hub and its settings.
  • View info on the access permissions granted for the organization.
  • View info on the organization’s identity federations.
  • View the list of the organization users and info on them.
  • View the list of the organization users that are subscribed to technical notifications on organization events.
  • View info on certificates.
  • View the list of federated user group mappings and info on them.
  • View info on the attributes of the federated users.
  • View info on the organization's OS Login settings.
  • View the list of OS Login profiles for users and service accounts.
  • View the list of the organization users' SSH keys and the info on such keys.
  • View info on the user groups and access permissions granted for them.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View the info on the refresh tokens of the organization’s federated users and on the refresh token settings.
  • View info on Identity Hub quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role includes the organization-manager.auditor, organization-manager.federations.viewer, and organization-manager.users.viewer permissions.

organization-manager.editororganization-manager.editor

The organization-manager.editor role enables managing the organization settings, identity federations, users, and user groups.

Users with this role can:
  • View and edit info on the relevant organization under Identity Hub.
  • View and edit organization settings.
  • View info on the access permissions granted for the organization.
  • View info on the identity federations in an organization and create, modify, and delete such federations.
  • View the list of the organization users and info on them.
  • Add and remove federated users.
  • View the list of the organization users that are subscribed to technical notifications on organization events, as well as edit this list.
  • View info on the certificates and add, modify, and delete them.
  • View the lists of federated user group mappings and info on them, as well as create, edit, and delete such lists.
  • View info on the federated user attributes, as well as create, modify, and delete them.
  • View info on the organization's OS Login settings.
  • View the list of OS Login profiles for users and service accounts.
  • View the list of the organization users' SSH keys and the info on such keys.
  • View info on user groups, as well as create, modify, and delete them.
  • View info on access permissions granted for user groups.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View and edit the refresh token settings in an organization.
  • View the info on the refresh tokens of the organization’s federated users, as well as revoke such tokens.
  • View info on Identity Hub quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role includes the organization-manager.viewer and organization-manager.federations.editor permissions.

organization-manager.adminorganization-manager.admin

The organization-manager.admin role enables managing organization settings, identity federations, users and their groups, and the user access permissions to the organization and its resources.

Users with this role can:
  • Link a billing account to an organization under Identity Hub.
  • View and edit info on the relevant organization under Identity Hub.
  • View and edit organization settings.
  • View info on the access permissions granted for the relevant organization and modify such permissions.
  • View info on the identity federations in an organization and create, modify, and delete such federations.
  • View the list of the organization users and info on them, as well as remove such users from the organization.
  • View the info on the invites to the organization sent to the users, as well as send and delete such invites.
  • Add and remove federated users.
  • View the list of the organization users that are subscribed to technical notifications on organization events, as well as edit this list.
  • View info on the certificates and add, modify, and delete them.
  • Configure federated user group mapping.
  • View the lists of federated user group mappings and info on them, as well as create, edit, and delete such lists.
  • View info on the federated user attributes, as well as create, modify, and delete them.
  • View info on the organization's OS Login settings and modify them.
  • View the list of the users' and service accounts’ OS Login profiles, as well as create, modify, and delete such profiles.
  • View the list of the organization users' SSH keys and info on such keys, as well as create, modify, and delete them.
  • View info on user groups, as well as create, modify, and delete them.
  • Add users and service accounts to and remove them from groups.
  • View info on the access permissions granted for the relevant user groups and modify such permissions.
  • View the list of groups a certain user is a member of, as well as the list of users that are members of a certain group.
  • View and edit the refresh token settings in an organization.
  • View the info on the refresh tokens of the organization’s federated users, as well as revoke such tokens.
  • View info on Identity Hub quotas.
  • View the info on the effective tech support service plan.
  • View the list of technical support requests and the info on them, as well as create and close such requests, leave comments, and attach files to them.

This role includes the organization-manager.editor, organization-manager.federations.admin, and organization-manager.osLogins.admin permissions.

organization-manager.organizations.ownerorganization-manager.organizations.owner

The organization-manager.organizations.owner role enables performing any actions with the organization resources and billing accounts, which includes creating billing accounts and linking them to clouds. This role also enables assigning additional organization owners.

Prior to assigning this role, make sure to check out the information on protecting privileged accounts.

organization-manager.federations.auditororganization-manager.federations.auditor

The organization-manager.federations.auditor role enables viewing info on the organization and its settings, the identity federations, and user group mappings.

Users with this role can:

  • View info on the organization and its settings.
  • View info on identity federations.
  • View info on certificates.
  • View the list of user group mappings and info on them.
  • View the list of the organization users and the groups they are members of.
  • View the attributes of the federated users.

organization-manager.federations.viewerorganization-manager.federations.viewer

The organization-manager.federations.viewer role enables viewing info on the organization and its settings, the identity federations, organization users, and user group mappings.

Users with this role can:

  • View info on the organization and its settings.
  • View info on identity federations.
  • View info on certificates.
  • View the list of user group mappings and info on them.
  • View the list of the organization users and info on them.
  • View the list of the groups the organization users are members of.
  • View the attributes of the federated users.

This role includes the organization-manager.federations.auditor permissions.

organization-manager.federations.editororganization-manager.federations.editor

The organization-manager.federations.editor role enables managing identity federations, federated users, and certificates, as well as viewing info on the organization, its settings, and users.

Users with this role can:

  • View info on the organization and its settings.
  • View info on the identity federations and create, modify, and delete such federations.
  • View info on the certificates and create, modify, and delete them.
  • View the list of user group mappings and info on them.
  • Add and remove federated users.
  • Revoke federated users’ refresh tokens.
  • View the list of the organization users and info on them.
  • View the list of the groups the organization users are members of.
  • View the attributes of the federated users.

This role includes the organization-manager.federations.viewer and organization-manager.federations.userAdmin permissions.

organization-manager.federations.userAdminorganization-manager.federations.userAdmin

The organization-manager.federations.userAdmin role enables adding and removing federated users to/from an organization, revoking federated users’ refresh tokens, viewing the list of the organization users and the user groups they are members of, and viewing federated users' attributes.

This role includes the iam.userAccounts.refreshTokenRevoker permissions.

organization-manager.federations.adminorganization-manager.federations.admin

The organization-manager.federations.admin role enables managing identity federations, federated users, and certificates, as well as viewing info on the organization, its settings, and users.

Users with this role can:

  • View info on the organization and its settings.
  • View info on the identity federations and create, modify, and delete such federations.
  • View info on the certificates and create, modify, and delete them.
  • View the list of user group mappings and info on them.
  • Add and remove federated users.
  • Revoke federated users’ refresh tokens.
  • View the list of the organization users and info on them.
  • View the list of the groups the organization users are members of.
  • View the attributes of the federated users.

This role includes the organization-manager.federations.editor permissions.

organization-manager.osLogins.viewerorganization-manager.osLogins.viewer

The organization-manager.osLogins.viewer role enables viewing the organization's OS Login settings and the list of the users' and service accounts’ OS Login profiles, as well as viewing the list of the users' SSH keys and the info on them.

organization-manager.osLogins.adminorganization-manager.osLogins.admin

The organization-manager.osLogins.admin role enables managing the organization's OS Login settings, as well as the users' OS Login profiles and SSH keys.

Users with this role can:

  • View info on the organization's OS Login settings and modify them.
  • View the list of the organization users' and service accounts’ OS Login profiles, as well as create, modify, and delete such profiles.
  • View the list of the organization users' SSH keys and info on such keys, as well as create, modify, and delete them.

This role includes the organization-manager.osLogins.viewer permissions.

organization-manager.groups.memberAdminorganization-manager.groups.memberAdmin

The organization-manager.groups.memberAdmin role enables viewing the info on user groups, configuring user group mapping, and viewing and modifying the lists of the users and service accounts that are members of groups.

organization-manager.users.viewerorganization-manager.users.viewer

The organization-manager.users.viewer role enables viewing the list of the organization users and the info on them, as well as the lists of groups the users are members of and the federated users’ attributes.

organization-manager.passportUserAdminorganization-manager.passportUserAdmin

The organization-manager.passportUserAdmin role enables viewing info on the organization users, as well as inviting the users with Yandex accounts to the organization and removing them from it.

Users with this role can:

  • Send and resend invites to the organization to new users with Yandex accounts, as well as view and delete such invites.
  • Remove users from the organization.
  • View the list of the organization users.
  • View the attributes of the organization federated users.

Primitive rolesPrimitive roles

Primitive roles allow users to perform actions in all Yandex Cloud services.

auditorauditor

The auditor role grants a permission to read configuration and metadata of any Yandex Cloud resources without any access to data.

For instance, users with this role can:

  • View info on a resource.
  • View the resource metadata.
  • View the list of operations with a resource.

auditor is the most secure role that does not grant any access to the service data. This role suits the users who need minimum access to the Yandex Cloud resources.

viewerviewer

The viewer role grants the permissions to read the info on any Yandex Cloud resources.

This role includes the auditor permissions.

Unlike auditor, the viewer role provides access to service data in read mode.

editoreditor

The editor role provides permissions to manage any Yandex Cloud resources, except for assigning roles to other users, transferring organization ownership, removing an organization, and deleting Key Management Service encryption keys.

For instance, users with this role can create, modify, and delete resources.

This role includes the viewer permissions.

adminadmin

The admin role enables assigning any roles, except for resource-manager.clouds.owner and organization-manager.organizations.owner, and provides permissions to manage any Yandex Cloud resources (except for transferring organization ownership and removing an organization).

Prior to assigning the admin role for an organization, cloud, or billing account, make sure to check out the information on protecting privileged accounts.

This role includes the editor permissions.

Instead of primitive roles, we recommend using service roles with more granular access control, allowing you to implement the least privilege principle.

For more information about primitive roles, see the Yandex Cloud role reference.

Appointing a user the organization administratorAppointing a user the organization administrator

To grant a user organization management access, assign the user one of the following roles:

  • organization-manager.admin
  • organization-manager.organizations.owner

Assigning a role to a userAssigning a role to a user

Organization administrators and owners can assign roles in Yandex Identity Hub. You can assign to users not just organization management roles but also roles for access to your organization's connected cloud resources.

For information about roles available in Yandex Cloud and their associated permissions, see the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

Cloud Center UI
CLI
Terraform
API
  1. Log in to Yandex Identity Hub with an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. If the user already has at least one role, click and select Assign bindings in the row with this user.

    If the user is not on the list, click Assign bindings in the top-right corner. In the window that opens, select a user from the list or use the search bar.

  4. Click Add role and select the role you want to assign to the user. You can assign multiple roles.

    You can find the description of the available roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

  5. Click Save.

  1. Select the role you want to assign. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

  2. Get the user ID.

  3. To assign the role, run the following command:

    yc <service_name> <resource> add-access-binding <resource_name_or_ID> \
        --role <role_ID> \
        --subject <subject_type>:<subject_ID>
    
    • <service_name>: Name of the service for whose resource you are assigning the role, e.g., organization-manager.
    • <resource>: Resource category. For an organization, it is always organization.
    • <resource_name_or_ID>: Resource name or ID. For an organization, use its technical name.
    • --role: Role ID, e.g., organization-manager.admin.
    • --subject: Type and ID of the subject you are assigning the role to.

    For example, this command assigns the administrator role for the organization with the bpf3crucp1v2******** ID:

    yc organization-manager organization add-access-binding bpf3crucp1v2******** \
        --role organization-manager.admin \
        --subject userAccount:aje6o61dvog2********
    

If you do not have Terraform yet, install it and configure its Yandex Cloud provider.

  1. Describe the parameters of the roles you assign in the configuration file:

    • organization_id: Organization ID.
    • role: Role you want to assign. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference. For each role, you can only use one yandex_organization manager_organization_iam_binding resource.
    • members: Array of the IDs of users to assign the role to:
      • userAccount:{user_id}: User Yandex account ID.
      • serviceAccount:{service_account_id}: Service account ID.
      • federatedUser:{federated_user_id}: Federated user ID.

    Here is an example of the configuration file structure:

    resource "yandex_organizationmanager_organization_iam_binding" "editor" {
      organization_id = "<organization_ID>"
      role = "editor"
      members = [
       "federatedUser:<user_ID>",
      ]
    }
    

    For more information about the resources you can create with Terraform, see the relevant provider documentation.

  2. Make sure the configuration files are correct.

    1. In the command line, navigate to the directory where you created the configuration file.
    2. Run a check using this command:
    terraform plan
    

    If the configuration is described correctly, the terminal will display a list of the assigned roles. If the configuration contains errors, Terraform will show them.

  3. Assign roles.

    If the configuration does not contain any errors, run this command:

    terraform apply
    

    This assigns the roles in the specified organization.

Use the updateAccessBindings method for the appropriate resource.

  1. Select the role you want to assign. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.

  2. Get the user ID.

  3. Create the request body, e.g., in the body.json file. In the action property, enter ADD and specify the userAccount type and user ID under subject.

    Example of the body.json file:

    {
      "accessBindingDeltas": [{
        "action": "ADD",
        "accessBinding": {
          "roleId": "organization-manager.admin",
          "subject": {
            "id": "gfei8n54hmfh********",
            "type": "userAccount"
          }
        }
      }]
    }
    
  4. Assign the role. For example, for an organization with the bpf3crucp1v2******** ID:

    export ORGANIZATION_ID=bpf3crucp1v2********
    export IAM_TOKEN=CggaAT********
    curl \
      --request POST \
      --header "Content-Type: application/json" \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      --data '@body.json' \
      "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/organizations/${ORGANIZATION_ID}:updateAccessBindings"
    

    For detailed instructions on assigning a role to a resource, please see the Yandex Identity and Access Management and Yandex Resource Manager documentation:

    • Setting up service account access permissions
    • Setting up cloud access permissions
    • Setting up folder access permissions

In a similar way, you can assign roles for an organization to a service account.

Revoking a user's roleRevoking a user's role

If you want to deny a user access to a resource, revoke the relevant roles for this resource as well as for other resources access permissions can be inherited from. For more information on access management in Yandex Cloud, see the Yandex Identity and Access Management documentation.

The role can be revoked by a user with the organization-manager.admin or organization-manager.organizations.owner role. To learn how to grant a role to a user, see the Roles section.

Cloud Center UI
CLI
API
  1. Log in to Yandex Identity Hub with an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. Find the required user in the list. If required, use the search bar or filter.

  4. In the row with the user, click and select Assign bindings. In the window that opens:

    1. Click next to a role to delete it.

    2. Click Save.

To revoke a role from a subject, delete access permissions for the appropriate resource:

  1. View the roles and assignees for the resource:

    yc <service_name> <resource> list-access-bindings <resource_name_or_ID>
    
    • <service_name>: Name of the service the resource belongs to, e.g., organization-manager.
    • <resource>: Resource category. For an organization, it is always organization.
    • <resource_name_or_ID>: Resource name or ID. For an organization, use its technical name.

    For example, view the roles and assignees in an organization with the bpf3crucp1v2******** ID:

    yc organization-manager organization list-access-bindings bpf3crucp1v2********
    

    Result:

    +------------------------------------------+--------------+----------------------+
    |                 ROLE ID                  | SUBJECT TYPE |      SUBJECT ID      |
    +------------------------------------------+--------------+----------------------+
    | organization-manager.organizations.owner | userAccount  | aje3r40rsemj******** |
    | organization-manager.admin               | userAccount  | aje6o61dvog2******** |
    +------------------------------------------+--------------+----------------------+
    
  2. To delete access permissions, run this command:

    yc <service_name> <resource> remove-access-binding <resource_name_or_ID> \
        --role <role_ID> \
        --subject <subject_type>:<subject_ID>
    
    • --role: ID of the role to revoke, e.g., organization-manager.admin.
    • --subject: Type and ID of the subject to revoke the role from.

    For example, to revoke a role from a user with the aje6o61dvog2******** ID:

    yc organization-manager organization remove-access-binding bpf3crucp1v2******** \
        --role organization-manager.admin \
        --subject userAccount:aje6o61dvog2********
    

To revoke a role from a subject, delete access permissions for the appropriate resource:

  1. View the roles and assignees for the resource using the listAccessBindings method. For example, to view the roles in the organization with the bpf3crucp1v2******** ID:

    export ORGANIZATION_ID=bpf3crucp1v2********
    export IAM_TOKEN=CggaAT********
    curl \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/organizations/${ORGANIZATION_ID}:listAccessBindings"
    

    Result:

    {
    "accessBindings": [
    {
      "subject": {
      "id": "aje6o61dvog2********",
      "type": "userAccount"
      },
      "roleId": "organization-manager.admin"
    }
    ]
    }
    
  2. Create the request body, e.g., in the body.json file. In the request body, specify the access permissions to delete. For example, revoke the organization-manager.admin role from the aje6o61dvog2******** user:

    Example of the body.json file:

    {
      "accessBindingDeltas": [{
        "action": "REMOVE",
        "accessBinding": {
          "roleId": "organization-manager.admin",
          "subject": {
            "id": "aje6o61dvog2********",
            "type": "userAccount"
          }
        }
      }]
    }
    
  3. Revoke a role by deleting the specified permissions:

    export ORGANIZATION_ID=bpf3crucp1v2********
    export IAM_TOKEN=CggaAT********
    curl \
      --request POST \
      --header "Content-Type: application/json" \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      --data '@body.json' \
      "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/organizations/${ORGANIZATION_ID}:updateAccessBindings"
    

Assigning a role to a user groupAssigning a role to a user group

Assign a role to a user group to grant access to a resource. To grant group access permissions to a subject, see Setting up user group access permissions.

In Yandex Identity Hub, you can assign a group a role for an organization, cloud, folder, another group, or service account.

Assigning a role for a cloud or folderAssigning a role for a cloud or folder

Management console
CLI
Terraform
API
  1. Log in to the management console with the cloud administrator or owner account.

  2. On the left side of the screen, click the line with the name of the cloud or folder for which you want to assign a role to a user group.

  3. At the top of the screen, go to the Access bindings tab and click Configure access. In the window that opens:

    1. Go to the Groups tab and select the group you need or search by group name.

      You can also assign a role to one of the system groups:

      • All users in organization X: The group includes all users in organization X.
      • All users in federation N: The group includes all users in federation N.
    2. Click Add role and select the role you want to assign to the group for the cloud or folder you selected earlier. You can assign multiple roles.

    3. Click Save.

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

  1. Select a role from the Yandex Cloud role reference.

  2. Assign the role using this command:

    yc <service_name> <resource> add-access-binding <resource_name_or_ID> \
      --role <role_ID> \
      --subject group:<group_ID>
    

    Where:

    • --role: Role ID, e.g., resource-manager.clouds.owner.

    • --subject group: ID of the group the role is assigned to.

      To assign a role to one of the system groups, instead of --subject, use the --organization-users <organization_ID> or --federation-users <federation_ID> parameter. In the parameter, provide the ID of the organization or identity federation, respectively, to all the users you want to assign the role to.

      You can also assign a role to a system group using the --subject parameter. To do this, provide in it the subject ID matching the selected system group.

    For example, assign the resource-manager.viewer role for the my-cloud cloud:

    yc resource-manager cloud add-access-binding mycloud \
      --role resource-manager.viewer \
      --subject group:aje6o61dvog2********
    

If you do not have Terraform yet, install it and configure its Yandex Cloud provider.

  1. Add the resource parameters to the configuration file and specify the required role and group:

    resource "yandex_resourcemanager_cloud_iam_member" "admin" {
      cloud_id    = "<cloud_ID>"
      role        = "<role_ID>"
      member      = "group:<group_ID>"
    }
    

    Where:

    • cloud_id: Cloud ID. You can also assign a role within an individual folder. To do this, specify folder_id instead of cloud_id and the required folder ID in the resource parameters.

    • role: Role to assign. This is a required parameter.

    • member: Group the role is assigned to. Use this format: group:<group_ID>. This is a required parameter.

      To assign a role to one of the system groups, specify the following in the member parameter:

      • system:group:organization:<organization_ID>:users: To assign a role to the All users in organization X system group.
      • system:group:federation:<federation_ID>:users: To assign a role to the All users in federation N system group.

    For more information about the yandex_resourcemanager_cloud_iam_member resource parameters, see this Terraform article.

  2. Create the resources:

    1. In the terminal, go to the directory where you edited the configuration file.

    2. Make sure the configuration file is correct using this command:

      terraform validate
      

      If the configuration is correct, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a detailed list of resources. No changes will be made at this step. Terraform will show any errors found in your configuration.

    4. Apply the changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    This will create all the resources you need in the specified folder. You can check the new resource using the management console or this CLI command:

    terraform plan
    

    If the configuration is correct, the terminal will display a list of the resources being created and their parameters. If the configuration contains any errors, Terraform will point them out.

  3. Deploy the cloud resources.

    1. If the configuration does not contain any errors, run this command:

      terraform apply
      
    2. Confirm creating the resources: type yes in the terminal and press Enter.

    This will create all the resources you need in the specified folder. You can check the new resource using the management console or this CLI command:

    yc resource-manager folder list-access-bindings <folder_name_or_ID>
    

Use the updateAccessBindings REST API method for the appropriate resource.

  1. Select a role from the Yandex Cloud role reference.

  2. Create the request body, e.g., in the body.json file. In the action property, enter ADD, and specify the group type and group ID under subject:

    body.json:

    {
      "accessBindingDeltas": [{
        "action": "ADD",
        "accessBinding": {
          "roleId": "editor",
          "subject": {
            "id": "<group_ID>",
            "type": "group"
          }
        }
      }]
    }
    
  3. Assign a role to a service account. For example, for a folder with the b1gvmob95yys******** ID:

    export FOLDER_ID=b1gvmob95yys********
    export IAM_TOKEN=CggaAT********
    curl \
      --request POST \
      --header "Content-Type: application/json" \
      --header "Authorization: Bearer ${IAM_TOKEN}" \
      --data '@body.json' \
      "https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders/${FOLDER_ID}:updateAccessBindings"
    

To learn how to assign a role for the respective resource, see:

  • Setting up service account access permissions.
  • Setting up cloud access permissions.
  • Setting up folder access permissions.

Assigning a role for an organizationAssigning a role for an organization

Cloud Center interface
CLI
Terraform
  1. Log in to Yandex Identity Hub using an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. At the top right, click Assign bindings.

  4. Go to the Groups tab and select the group you need or search by group name.

    You can also assign a role to one of the system groups:

    • All users in organization X: The group includes all users in organization X.
    • All users in federation N: The group includes all users in federation N.
  5. Click Add role and select the role for the organization you want to assign to the group. You can assign multiple roles.

  6. Click Save.

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

  1. Assign the role to the group:

    yc organization-manager organization add-access-binding \
      --subject group:<group_ID> \
      --role <role_ID> \
      --organization-users <organization_ID> \
      --federation-users <federation_ID>
    

    To assign a role to one of the system groups, instead of the --subject parameter, use --organization-users <organization_ID> or --federation-users <federation_ID>. In the parameter, provide the ID of the organization or identity federation, respectively, to all the users you want to assign the role to.

    You can also assign a role to a system group using the --subject parameter. To do this, provide in it the subject ID matching the selected system group.

  2. Make sure the requested permissions are granted:

    yc organization-manager organization list-access-bindings <organization_ID>
    

    A response contains a list of all roles assigned to users and groups in the organization:

    +------------------------------------------+--------------+----------------------+
    |                 ROLE ID                  | SUBJECT TYPE |      SUBJECT ID      |
    +------------------------------------------+--------------+----------------------+
    | organization-manager.admin               | userAccount  | ajev1p2345lj******** |
    | organization-manager.organizations.owner | userAccount  | ajev1p2345lj******** |
    | editor                                   | group        | ajev1p2345lj******** |
    | viewer                                   | group        | ajev1p2345lj******** |
    +------------------------------------------+--------------+----------------------+
    

If you do not have Terraform yet, install it and configure its Yandex Cloud provider.

  1. Add the resource parameters to the configuration file and specify the required role and group:

    resource "yandex_organizationmanager_organization_iam_member" "users-editors" {
      organization_id = "<organization_ID>"
      role            = "<role_ID>"
      member          = "group:<group_ID>"
    }
    

    Where:

    • organization_id: Organization ID. This is a required parameter.

    • role: Role to assign. This is a required parameter.

    • member: Group the role is assigned to. Use this format: group:<group_ID>. This is a required parameter.

      To assign a role to one of the system groups, specify the following in the member parameter:

      • system:group:organization:<organization_ID>:users: To assign a role to the All users in organization X system group.
      • system:group:federation:<federation_ID>:users: To assign a role to the All users in federation N system group.

    For more information about the yandex_organizationmanager_organization_iam_member resource parameters, see this Terraform article.

  2. Create the resources:

    1. In the terminal, go to the directory where you edited the configuration file.

    2. Make sure the configuration file is correct using this command:

      terraform validate
      

      If the configuration is correct, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a detailed list of resources. No changes will be made at this step. Terraform will show any errors found in your configuration.

    4. Apply the changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    This will create all the resources you need in the specified folder. You can check the new resource using the management console or this CLI command:

    yc resource-manager folder list-access-bindings <folder_name_or_ID>
    

What roles are assigned in an organizationWhat roles are assigned in an organization

You can view all roles assigned to subjects in an organization:

Cloud Center UI
CLI
API
  1. Log in to Yandex Identity Hub using an administrator or organization owner account.

  2. In the left-hand panel, select Access bindings.

  3. The Access bindings page will display information about users and roles assigned to them.

    If you have more than one organization, you can switch to the one you need. To do this, click next to the name of the current organization in the top-left corner of the screen and select another one.

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.

  1. To view a list of organizations available to you, run this command:

    yc organization-manager organization list
    

    Result:

    +----------------------+-----------------------------+-------------------------+--------+
    |          ID          |            NAME             |          TITLE          | LABELS |
    +----------------------+-----------------------------+-------------------------+--------+
    | bpf1smsil5q0******** | org1-technical-name         | Organization One        |        |
    | bpf2c65rqcl8******** | org2-technical-name         | Organization Two        |        |
    | bpfaidqca8vd******** | org3-technical-name         | Organization Three      |        |
    +----------------------+-----------------------------+-------------------------+--------+
    

    Copy the ID of the organization you need from the ID column.

  2. See the description of the CLI command to get a list of roles assigned in an organization:

    yc organization-manager organization list-access-bindings --help
    
  3. Get a list of roles assigned in an organization by specifying its name or ID:

    yc organization-manager organization list-access-bindings <organization_ID>
    

    Result:

    +------------------------------------------+----------------+----------------------+
    |                 ROLE ID                  |  SUBJECT TYPE  |      SUBJECT ID      |
    +------------------------------------------+----------------+----------------------+
    | auditor                                  | serviceAccount | ajefbjkmgjt1******** |
    | admin                                    | userAccount    | asefbskmgjt1******** |
    | organization-manager.organizations.owner | userAccount    | ajcfabjkmgjt******** |
    +------------------------------------------+----------------+----------------------+
    

Use the ListAccessBindings REST API method for the Organization resource or the OrganizationService/ListAccessBindings gRPC API call.

Was the article helpful?

Previous
Authentication errors when using a Yandex account
Next
Pricing policy
© 2025 Direct Cursus Technology L.L.C.