Setting up folder access permissions
To grant a user access to folder resources, assign the user a role for the folder.
Assigning a role for a folder
- In the management console
, go to the relevant folder. - Go to the Access bindings tab.
- Click Configure access.
- In the window that opens, select User accounts.
- Select a user from the list or search by user.
- Click
Add role and select the role from the list or use the search bar. - Click Save.
If you do not have the Yandex Cloud command line interface yet, install and initialize it.
-
View the description of the command to assign a role for a folder:
yc resource-manager folder add-access-binding --help
-
Select a folder, e.g.,
my-folder
:yc resource-manager folder list
Result:
+----------------------+-----------+--------+--------+ | ID | NAME | LABELS | STATUS | +----------------------+-----------+--------+--------+ | b1gd129pp9ha******** | my-folder | | ACTIVE | +----------------------+-----------+--------+--------+
-
Choose the role.
yc iam role list
Result:
+--------------------------------+-------------+ | ID | DESCRIPTION | +--------------------------------+-------------+ | admin | | | compute.images.user | | | editor | | | ... | | +--------------------------------+-------------+
-
Find out the user ID from the login or email address.
yc iam user-account get test-user
Result:
id: gfei8n54hmfh******** yandex_passport_user_account: login: test-user default_email: test-user@yandex.ru
-
Assign the
editor
role totest-user
formy-folder
. In the subject, specify theuserAccount
type and user ID:yc resource-manager folder add-access-binding my-folder \ --role editor \ --subject userAccount:gfei8n54hmfh********
To assign a role to a service account, user group, or system group instead of a user, see these examples.
If you don't have Terraform, install it and configure the Yandex Cloud provider.
Alert
Do not create the resource along with yandex_resourcemanager_folder_iam_policy
, since this may cause conflicts.
To assign a role to a folder created using Terraform:
-
Describe the parameters of the folder role in a configuration file:
-
folder_id
: ID of the folder to grant permissions for. This is a required parameter. -
role
: Role you want to assign. This is a required parameter.Note
For each role, you can only use one
yandex_resourcemanager_folder_iam_member
resource. -
member
: User to assign the role to. This is a required parameter. It may have one of the following values:userAccount:<user_ID>
: User ID.serviceAccount:<service_account_ID>
: Service account ID.federatedUser:<user_account_ID>
: User account ID.system:group:organization:<organization_ID>:users
: ID of the organization to assign a role to theAll users in organization X
system group.system:group:federation:<federation_ID>:users
: ID of the identity federation to assign a role to theAll users in federation N
system group.
Example of assigning roles to a folder using Terraform
... data "yandex_resourcemanager_folder" "project1" { folder_id = "<folder_ID>" } resource "yandex_resourcemanager_folder_iam_member" "editor" { folder_id = "${data.yandex_resourcemanager_folder_iam_member.project1.id}" role = "editor" member = "userAccount:<login@yandex.ru>" } ...
For more information about the
yandex_resourcemanager_folder_iam_member
resource parameters in Terraform, see the relevant provider documentation . -
-
Check the configuration using this command:
terraform validate
If the configuration is correct, you will get this message:
Success! The configuration is valid.
-
Run this command:
terraform plan
The terminal will display a list of resources with parameters. No changes will be made at this step. If the configuration contains any errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
into the terminal and press Enter.You can check the folder update using the management console
or this CLI command:yc resource-manager folder list-access-bindings <folder_name_or_ID>
Use the updateAccessBindings REST API method for the Folder resource or the FolderService/UpdateAccessBindings gRPC API call. You will need the folder ID and the ID of the user to whom you want to assign the role for the folder.
-
Find out the folder ID using the list REST API method:
curl \ --header "Authorization: Bearer <IAM_token>" \ https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders?cloudId=b1gg8sgd16g7********
Result:
{ "folders": [ { "id": "b1g66mft1vop********", "cloudId": "b1gd129pp9ha********", "createdAt": "2018-10-17T12:44:31Z", "name": "my-folder", "status": "ACTIVE" } ] }
-
Find out the user ID from the login using the getByLogin REST API method:
curl \ --header "Authorization: Bearer <IAM_token>" \ https://iam.api.cloud.yandex.net/iam/v1/yandexPassportUserAccounts:byLogin?login=test-user
Result:
{ "id": "gfei8n54hmfh********", "yandexPassportUserAccount": { "login": "test-user", "defaultEmail": "test-user@yandex.ru" } }
-
Assign the
editor
role to the user formy-folder
. Set theaction
property toADD
and specify theuserAccount
type and user ID in thesubject
property:curl \ --request POST \ --header 'Content-Type: application/json' \ --header "Authorization: Bearer <IAM_token>" \ --data '{ "accessBindingDeltas": [{ "action": "ADD", "accessBinding": { "roleId": "editor", "subject": { "id": "gfei8n54hmfh********", "type": "userAccount" }}}]}' \ https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders/b1gd129pp9ha********:updateAccessBindings
Assigning multiple roles
- In the management console
, go to the relevant folder. - Go to the Access bindings tab.
- Click Configure access.
- In the window that opens, select User accounts.
- Select a user from the list or search by user.
- Click
Add role and select the role from the list or use the search bar. - Repeat this step as many times as you need to add all the required roles.
- Click Save.
If you do not have the Yandex Cloud command line interface yet, install and initialize it.
The add-access-binding
command allows you to add only one role. You can assign multiple roles using the set-access-binding
command.
Alert
The set-access-binding
method completely rewrites access permissions for the resource. All current resource roles will be deleted.
-
Make sure the resource has no roles assigned that you would not want to lose:
yc resource-manager folder list-access-bindings my-folder
-
For example, assign a role to multiple users:
yc resource-manager folder set-access-bindings my-folder \ --access-binding role=editor,subject=userAccount:gfei8n54hmfh******** --access-binding role=viewer,subject=userAccount:helj89sfj80a********
To assign a role to a service account, user group, or system group instead of a user, see these examples.
If you don't have Terraform, install it and configure the Yandex Cloud provider.
Alert
Do not create the resource along with yandex_resourcemanager_folder_iam_policy
, since this may cause conflicts.
To assign several roles to a folder created with Terraform:
-
Describe the parameters of the folder role in a configuration file:
-
folder_id
: ID of the folder to grant permissions for. This is a required parameter. -
role
: Role you want to assign. This is a required parameter.Note
For each role, you can only use one
yandex_resourcemanager_folder_iam_member
resource. -
member
: User to assign the role to. To add a user to the list, create an entry in this format:userAccount:<user_ID>
, where<user_ID>
is the email address of a Yandex account, e.g.,ivan@yandex.ru
. This is a required parameter.
Example of assigning roles to a folder using Terraform
... data "yandex_resourcemanager_folder" "project1" { folder_id = "<folder_ID>" } resource "yandex_resourcemanager_folder_iam_member" "editor" { folder_id = "${data.yandex_resourcemanager_folder.project1.id}" role = "editor" member = "userAccount:<login1@yandex.ru>" } resource "yandex_resourcemanager_folder_iam_member" "operator" { folder_id = "${data.yandex_resourcemanager_folder.project1.id}" role = "operator" member = "userAccount:<login1@yandex.ru>" } ...
For more information about the
yandex_resourcemanager_folder_iam_member
resource parameters in Terraform, see the relevant provider documentation . -
-
Check the configuration using this command:
terraform validate
If the configuration is correct, you will get this message:
Success! The configuration is valid.
-
Run this command:
terraform plan
The terminal will display a list of resources with parameters. No changes will be made at this step. If the configuration contains any errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
into the terminal and press Enter.You can check the folder update using the management console
or this CLI command:yc resource-manager folder list-access-bindings <folder_name_or_ID>
Assign the editor
role to one user and the viewer
role to another:
curl \
--request POST \
--header 'Content-Type: application/json' \
--header "Authorization: Bearer <IAM_token>" \
--data '{
"accessBindingDeltas": [{
"action": "ADD",
"accessBinding": {
"roleId": "editor",
"subject": {
"id": "gfei8n54hmfh********",
"type": "userAccount"
}
}
},{
"action": "ADD",
"accessBinding": {
"roleId": "viewer",
"subject": {
"id": "helj89sfj80a********",
"type": "userAccount"
}}}]}' \
https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders/b1gd129pp9ha********:updateAccessBindings
You can also assign roles using the setAccessBindings REST API method for the Folder resource or the FolderService/SetAccessBindings gRPC API call.
Alert
The setAccessBindings
method completely rewrites access permissions for the resource. All current resource roles will be deleted.
curl \
--request POST \
--header 'Content-Type: application/json' \
--header "Authorization: Bearer <IAM_token>" \
--data '{
"accessBindings": [{
"roleId": "editor",
"subject": { "id": "ajei8n54hmfh********", "type": "userAccount" }
},{
"roleId": "viewer",
"subject": { "id": "helj89sfj80a********", "type": "userAccount" }
}]}' \
https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders/b1gd129pp9ha********:setAccessBindings
Folder access for a service account
- In the management console
, select the appropriate folder. - Go to the Access bindings tab.
- Click Configure access.
- In the window that opens, select Service accounts.
- Select a service account from the list or use the search.
- Click
Add role and select the role in the folder. - Click Save.
If you do not have the Yandex Cloud command line interface yet, install and initialize it.
-
Select the role to assign to the service account. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.
-
Find out the service account ID by its name:
yc iam service-account get my-robot
Result:
id: aje6o61dvog2******** folder_id: b1gvmob95yys******** created_at: "2018-10-15T18:01:25Z" name: my-robot
If you don't know the name of the service account, get a list of service accounts with their IDs:
yc iam service-account list
Result:
+----------------------+------------------+-----------------+ | ID | NAME | DESCRIPTION | +----------------------+------------------+-----------------+ | aje6o61dvog2******** | my-robot | my description | +----------------------+------------------+-----------------+
-
Assign the
viewer
role to themy-robot
service account using its ID:yc resource-manager folder add-access-binding my-folder \ --role viewer \ --subject serviceAccount:aje6o61dvog2********
If you don't have Terraform, install it and configure the Yandex Cloud provider.
Alert
Do not create the resource along with yandex_resourcemanager_folder_iam_policy
, since this may cause conflicts.
To assign a service account a role to a folder created with Terraform:
-
Describe the parameters of the folder role in a configuration file:
-
folder_id
: ID of the folder to grant permissions for. This is a required parameter. -
role
: Role you want to assign. This is a required parameter.Note
For each role, you can only use one
yandex_resourcemanager_folder_iam_member
resource. -
member
: User to assign the role to. To add a user to the list, create a record in this format:serviceAccount:<service_account_ID>
, where<service_account_ID>
is the service account ID. You can list several service accounts. This is a required parameter.
Example of assigning roles to a folder using Terraform
... data "yandex_resourcemanager_folder" "project1" { folder_id = "<folder_ID>" } resource "yandex_resourcemanager_folder_iam_member" "editor" { folder_id = "${data.yandex_resourcemanager_folder.project1.id}" role = "editor" member = "serviceAccount:<service_account_ID>" } ...
For more information about the
yandex_resourcemanager_folder_iam_member
resource parameters in Terraform, see the relevant provider documentation . -
-
Check the configuration using this command:
terraform validate
If the configuration is correct, you will get this message:
Success! The configuration is valid.
-
Run this command:
terraform plan
The terminal will display a list of resources with parameters. No changes will be made at this step. If the configuration contains any errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
into the terminal and press Enter.You can check the folder update using the management console
or this CLI command:yc resource-manager folder list-access-bindings <folder_name_or_ID>
To assign the service account a role for a cloud or folder, use the updateAccessBindings
REST API method for the Cloud or Folder resource:
-
Select the role to assign to the service account. You can find the description of the roles in the Yandex Identity and Access Management documentation in the Yandex Cloud role reference.
-
Get the ID of the service accounts folder.
-
Get an IAM token required for authorization in the Yandex Cloud API.
-
Get a list of folder service accounts to find out their IDs:
export FOLDER_ID=b1gvmob95yys******** export IAM_TOKEN=CggaATEVAgA... curl \ --header "Authorization: Bearer ${IAM_TOKEN}" \ "https://iam.api.cloud.yandex.net/iam/v1/serviceAccounts?folderId=${FOLDER_ID}"
Result:
{ "serviceAccounts": [ { "id": "ajebqtreob2d********", "folderId": "b1gvmob95yys********", "createdAt": "2018-10-18T13:42:40Z", "name": "my-robot", "description": "my description" } ] }
-
Create the request body, e.g., in the
body.json
file. Set theaction
property toADD
androleId
to the appropriate role, such aseditor
, and specify theserviceAccount
type and service account ID in thesubject
property:body.json:
{ "accessBindingDeltas": [{ "action": "ADD", "accessBinding": { "roleId": "editor", "subject": { "id": "ajebqtreob2d********", "type": "serviceAccount" } } }] }
-
Assign a role to a service account. For example, for a folder with the
b1gvmob95yys********
ID:export FOLDER_ID=b1gvmob95yys******** export IAM_TOKEN=CggaAT******** curl \ --request POST \ --header "Content-Type: application/json" \ --header "Authorization: Bearer ${IAM_TOKEN}" \ --data '@body.json' \ "https://resource-manager.api.cloud.yandex.net/resource-manager/v1/folders/${FOLDER_ID}:updateAccessBindings"
Folder access for a federated user
The role assignment procedure is the same as for a user with a Yandex account. The user's federation name is shown next to the username.
- In the management console
, go to the relevant folder. - Go to the Access bindings tab.
- Click Configure access.
- In the window that opens, select User accounts.
- Select a user from the list or search by user.
- Click
Add role and select the role from the list or use the search bar. - Click Save.
-
Select a role from the Yandex Cloud role reference.
-
Assign the role using the command:
yc resource-manager folder add-access-binding <folder_name_or_ID> \ --role <role_ID> \ --subject federatedUser:<user_ID>
Where:
<folder_name_or_ID>
: Folder name or ID.--role
: Role ID, e.g.,editor
.--subject
: ID of the user account that gets the role.
For example, assign the
editor
role to theaje6o61dvog2********
federated user formy-folder
:yc resource-manager folder add-access-binding my-folder \ --role editor \ --subject federatedUser:aje6o61dvog2********