yandex_kms_asymmetric_signature_key_iam_binding (Resource)
Статья создана
Обновлена 12 февраля 2026 г.
Allows creation and management of a single binding within IAM policy for an existing asymmetric_signature_key.
Example usage
//
// Create a new KMS Assymetric Signature Key and new IAM Binding for it.
//
resource "yandex_kms_asymmetric_signature_key" "your-key" {
name = "asymmetric-signature-key-name"
}
resource "yandex_kms_asymmetric_signature_key_iam_binding" "viewer" {
asymmetric_signaturen_key_id = yandex_kms_asymmetric_signature_key.your-key.id
role = "viewer"
members = [
"userAccount:foo_user_id",
]
}
Arguments & Attributes Reference
asymmetric_signature_key_id(Required)(String). The ID of the computeasymmetric_signature_keyto attach the policy to.id(String). The ID of this resource.members(Required)(Set Of String). An array of identities that will be granted the privilege in therole. Each entry can have one of the following values:
- userAccount:{user_id}: A unique user ID that represents a specific Yandex account.
- serviceAccount:{service_account_id}: A unique service account ID.
- federatedUser:{federated_user_id}: A unique federated user ID.
- federatedUser:{federated_user_id}:: A unique SAML federation user account ID.
- group:{group_id}: A unique group ID.
- system:group:federation:{federation_id}:users: All users in federation.
- system:group:organization:{organization_id}:users: All users in organization.
- system:allAuthenticatedUsers: All authenticated users.
- system:allUsers: All users, including unauthenticated ones.
Важно
for more information about system groups, see Cloud Documentation.
role(Required)(String). The role that should be assigned. Only one yandex_kms_asymmetric_signature_key_iam_binding can be used per role.sleep_after(Number). For test purposes, to compensate IAM operations delay
Import
The resource can be imported by using their resource ID. For getting it you can use Yandex Cloud Web Console
# terraform import yandex_kms_asymmetric_signature_key_iam_binding.<resource Name> "<resource Id>,<resource Role>"
terraform import yandex_kms_asymmetric_signature_key_iam_binding.viewer "abjjf**********p3gp8,viewer"