yandex_kms_asymmetric_encryption_key_iam_member (Resource)
Статья создана
Обновлена 18 сентября 2025 г.
Allows creation and management of a single binding within IAM policy for an existing asymmetric_encryption_key.
Example usage
//
// Create a new KMS Assymetric Encryption Key and new IAM Member for it.
//
resource "yandex_kms_asymmetric_encryption_key" "your-key" {
name = "asymmetric-encryption-key-name"
}
resource "yandex_kms_asymmetric_encryption_key_iam_member" "viewer" {
asymmetric_encryption_key_id = yandex_kms_asymmetric_encryption_key.your-key.id
role = "viewer"
member = "userAccount:foo_user_id"
}
Schema
Required
asymmetric_encryption_key_id(String) The ID of the computeasymmetric_encryption_keyto attach the policy to.member(String) An array of identities that will be granted the privilege in therole. Each entry can have one of the following values:
- userAccount:{user_id}: A unique user ID that represents a specific Yandex account.
- serviceAccount:{service_account_id}: A unique service account ID.
- federatedUser:{federated_user_id}: A unique federated user ID.
- federatedUser:{federated_user_id}:: A unique SAML federation user account ID.
- group:{group_id}: A unique group ID.
- system:group:federation:{federation_id}:users: All users in federation.
- system:group:organization:{organization_id}:users: All users in organization.
- system:allAuthenticatedUsers: All authenticated users.
- system:allUsers: All users, including unauthenticated ones.
Важно
for more information about system groups, see Cloud Documentation.
role(String) The role that should be assigned. Only one yandex_kms_asymmetric_encryption_key_iam_member can be used per role.
Optional
sleep_after(Number) For test purposes, to compensate IAM operations delay
Import
The resource can be imported by using their resource ID. For getting the resource ID you can use Yandex Cloud Web Console
KMS Asymmetric Encryption Key IAM member resource can be imported using the asymmetric_encryption_key_id resource role and member ID (account).
# terraform import yandex_kms_asymmetric_encryption_key_iam_member.<resource Name> "<asymmetric_encryption_key_id>,<resource Role>,<Member Id>"
terraform import yandex_kms_asymmetric_encryption_key_iam_member.viewer "abj7u**********j38cd,viewer,foo@example.com"