Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Terraform in Yandex Cloud
  • Getting started
  • Solution library
    • Overview
    • Release notes
          • iam_oauth_client
          • iam_service_account
          • iam_service_account_api_key
          • iam_service_account_iam_binding
          • iam_service_account_iam_member
          • iam_service_account_iam_policy
          • iam_service_account_key
          • iam_service_account_static_access_key
          • iam_workload_identity_federated_credential
          • iam_workload_identity_oidc_federation
          • iam_workload_identity_oidc_federation_iam_binding

In this article:

  • Example usage
  • Schema
  • Required
  • Optional
  • Import
  1. Terraform reference
  2. Resources
  3. Identity and Access Management (IAM)
  4. Resources
  5. iam_service_account_iam_binding

yandex_iam_service_account_iam_binding (Resource)

Written by
Yandex Cloud
Updated at September 18, 2025
  • Example usage
  • Schema
    • Required
    • Optional
  • Import

Allows creation and management of a single binding within IAM policy for an existing service_account.

Example usageExample usage

//
// Create a new IAM Service Account IAM Binding.
//
resource "yandex_iam_service_account_iam_binding" "admin-account-iam" {
  service_account_id = "aje5a**********qspd3"
  role               = "admin"

  members = [
    "userAccount:foo_user_id",
  ]
}

SchemaSchema

RequiredRequired

  • members (Set of String) An array of identities that will be granted the privilege in the role. Each entry can have one of the following values:
  • userAccount:{user_id}: A unique user ID that represents a specific Yandex account.
  • serviceAccount:{service_account_id}: A unique service account ID.
  • federatedUser:{federated_user_id}: A unique federated user ID.
  • federatedUser:{federated_user_id}:: A unique SAML federation user account ID.
  • group:{group_id}: A unique group ID.
  • system:group:federation:{federation_id}:users: All users in federation.
  • system:group:organization:{organization_id}:users: All users in organization.
  • system:allAuthenticatedUsers: All authenticated users.
  • system:allUsers: All users, including unauthenticated ones.

Warning

for more information about system groups, see Cloud Documentation.

  • role (String) The role that should be assigned. Only one yandex_iam_service_account_iam_binding can be used per role.
  • service_account_id (String) The ID of the compute service_account to attach the policy to.

OptionalOptional

  • sleep_after (Number) For test purposes, to compensate IAM operations delay

ImportImport

The resource can be imported by using their resource ID. For getting the resource ID you can use Yandex Cloud Web Console or YC CLI.

Service Account IAM binding resource can be imported using the service account ID and resource role.

# terraform import yandex_iam_service_account_iam_binding.<resource Name> "service_account_id,roles/<resource Role>"
terraform import yandex_iam_service_account_iam_binding.admin-account-iam "aje5a**********qspd3,roles/admin"

Was the article helpful?

Previous
iam_service_account_api_key
Next
iam_service_account_iam_member
© 2025 Direct Cursus Technology L.L.C.