yandex_lockbox_secret_iam_binding (Resource)
Статья создана
Обновлена 18 сентября 2025 г.
Allows creation and management of a single binding within IAM policy for an existing secret.
Example usage
//
// Create a new Lockbox Secret and new IAM Binding for it.
//
resource "yandex_lockbox_secret" "your-secret" {
name = "secret-name"
}
resource "yandex_lockbox_secret_iam_binding" "viewer" {
secret_id = yandex_lockbox_secret.your-secret.id
role = "viewer"
members = [
"userAccount:foo_user_id",
]
}
Schema
Required
members(Set of String) An array of identities that will be granted the privilege in therole. Each entry can have one of the following values:
- userAccount:{user_id}: A unique user ID that represents a specific Yandex account.
- serviceAccount:{service_account_id}: A unique service account ID.
- federatedUser:{federated_user_id}: A unique federated user ID.
- federatedUser:{federated_user_id}:: A unique SAML federation user account ID.
- group:{group_id}: A unique group ID.
- system:group:federation:{federation_id}:users: All users in federation.
- system:group:organization:{organization_id}:users: All users in organization.
- system:allAuthenticatedUsers: All authenticated users.
- system:allUsers: All users, including unauthenticated ones.
Важно
for more information about system groups, see Cloud Documentation.
role(String) The role that should be assigned. Only one yandex_lockbox_secret_iam_binding can be used per role.secret_id(String) The ID of the computesecretto attach the policy to.
Optional
sleep_after(Number) For test purposes, to compensate IAM operations delay
Import
The resource can be imported by using their resource ID. For getting the resource ID you can use Yandex Cloud Web Console
# terraform import yandex_lockbox_secret_iam_binding.<resource Name> "<resource Id>,<resource Role>"
terraform import yandex_lockbox_secret_iam_binding.viewer "abjjf**********p3gp8,viewer"