yandex_kms_asymmetric_encryption_key_iam_binding (Resource)
Written by
Updated at September 18, 2025
Allows creation and management of a single binding within IAM policy for an existing asymmetric_encryption_key.
Example usage
//
// Create a new KMS Assymetric Encryption Key and new IAM Binding for it.
//
resource "yandex_kms_asymmetric_encryption_key" "your-key" {
name = "asymmetric-encryption-key-name"
}
resource "yandex_kms_asymmetric_encryption_key_iam_binding" "viewer" {
asymmetric_encryption_key_id = yandex_kms_asymmetric_encryption_key.your-key.id
role = "viewer"
members = [
"userAccount:foo_user_id",
]
}
Schema
Required
asymmetric_encryption_key_id(String) The ID of the computeasymmetric_encryption_keyto attach the policy to.members(Set of String) An array of identities that will be granted the privilege in therole. Each entry can have one of the following values:
- userAccount:{user_id}: A unique user ID that represents a specific Yandex account.
- serviceAccount:{service_account_id}: A unique service account ID.
- federatedUser:{federated_user_id}: A unique federated user ID.
- federatedUser:{federated_user_id}:: A unique SAML federation user account ID.
- group:{group_id}: A unique group ID.
- system:group:federation:{federation_id}:users: All users in federation.
- system:group:organization:{organization_id}:users: All users in organization.
- system:allAuthenticatedUsers: All authenticated users.
- system:allUsers: All users, including unauthenticated ones.
Warning
for more information about system groups, see Cloud Documentation.
role(String) The role that should be assigned. Only one yandex_kms_asymmetric_encryption_key_iam_binding can be used per role.
Optional
sleep_after(Number) For test purposes, to compensate IAM operations delay
Import
The resource can be imported by using their resource ID. For getting the resource ID you can use Yandex Cloud Web Console
KMS Asymmetric Encryption Key IAM binding resource can be imported using the asymmetric_encryption_key_id and resource role.
# terraform import yandex_kms_asymmetric_encryption_key_iam_binding.<resource Name> "<resource Id>,<resource Role>"
terraform import yandex_kms_asymmetric_encryption_key_iam_binding.viewer "abj7u**********j38cd,viewer"