Access Approval enables you to require your explicit approval whenever Google support and engineering need to access your customer content.
To get more information about OrganizationSettings, see:
resource "google_organization_access_approval_settings" "organization_access_approval" {
organization_id = "123456789"
notification_emails = ["testuser@example.com", "example.user@example.com"]
enrolled_services {
cloud_product = "appengine.googleapis.com"
}
enrolled_services {
cloud_product = "dataflow.googleapis.com"
enrollment_level = "BLOCK_ALL"
}
}
resource "google_project" "my_project" {
name = "My Project"
project_id = "your-project-id"
org_id = "123456789"
}
resource "google_kms_key_ring" "key_ring" {
name = "key-ring"
location = "global"
project = google_project.my_project.project_id
}
resource "google_kms_crypto_key" "crypto_key" {
name = "crypto-key"
key_ring = google_kms_key_ring.key_ring.id
purpose = "ASYMMETRIC_SIGN"
version_template {
algorithm = "EC_SIGN_P384_SHA384"
}
}
data "google_access_approval_organization_service_account" "service_account" {
organization_id = "123456789"
}
resource "google_kms_crypto_key_iam_member" "iam" {
crypto_key_id = google_kms_crypto_key.crypto_key.id
role = "roles/cloudkms.signerVerifier"
member = "serviceAccount:${data.google_access_approval_organization_service_account.service_account.account_email}"
}
data "google_kms_crypto_key_version" "crypto_key_version" {
crypto_key = google_kms_crypto_key.crypto_key.id
}
resource "google_organization_access_approval_settings" "organization_access_approval" {
organization_id = "123456789"
active_key_version = data.google_kms_crypto_key_version.crypto_key_version.name
enrolled_services {
cloud_product = "all"
}
depends_on = [google_kms_crypto_key_iam_member.iam]
}
The following arguments are supported:
enrolled_services
-
(Required)
A list of Google Cloud Services for which the given resource has Access Approval enrolled.
Access requests for the resource given by name against any of these services contained here will be required
to have explicit approval. Enrollment can be done for individual services.
A maximum of 10 enrolled services will be enforced, to be expanded as the set of supported services is expanded.
Structure is documented below.
organization_id
-
(Required)
ID of the organization of the access approval settings.
The enrolled_services
block supports:
cloud_product
-
(Required)
The product for which Access Approval will be enrolled. Allowed values are listed (case-sensitive):
all
appengine.googleapis.com
bigquery.googleapis.com
bigtable.googleapis.com
cloudkms.googleapis.com
compute.googleapis.com
dataflow.googleapis.com
iam.googleapis.com
pubsub.googleapis.com
storage.googleapis.com
enrollment_level
-
(Optional)
The enrollment level of the service.
Default value is BLOCK_ALL
.
Possible values are: BLOCK_ALL
.
notification_emails
-
(Optional)
A list of email addresses to which notifications relating to approval requests should be sent.
Notifications relating to a resource will be sent to all emails in the settings of ancestor
resources of that resource. A maximum of 50 email addresses are allowed.
active_key_version
-
(Optional)
The asymmetric crypto key version to use for signing approval requests.
Empty active_key_version indicates that a Google-managed key should be used for signing.
In addition to the arguments listed above, the following computed attributes are exported:
id
- an identifier for the resource with format organizations/{{organization_id}}/accessApprovalSettings
name
-
The resource name of the settings. Format is "organizations/{organization_id}/accessApprovalSettings"
enrolled_ancestor
-
This field will always be unset for the organization since organizations do not have ancestors.
ancestor_has_active_key_version
-
This field will always be unset for the organization since organizations do not have ancestors.
invalid_key_version
-
If the field is true, that indicates that there is some configuration issue with the active_key_version
configured on this Organization (e.g. it doesn't exist or the Access Approval service account doesn't have the
correct permissions on it, etc.).
This resource provides the following Timeouts configuration options:
create
- Default is 20 minutes.update
- Default is 20 minutes.delete
- Default is 20 minutes.OrganizationSettings can be imported using any of these accepted formats:
organizations/{{organization_id}}/accessApprovalSettings
{{organization_id}}
In Terraform v1.5.0 and later, use an import
block to import OrganizationSettings using one of the formats above. For example:
import {
id = "organizations/{{organization_id}}/accessApprovalSettings"
to = google_organization_access_approval_settings.default
}
When using the terraform import
command, OrganizationSettings can be imported using one of the formats above. For example:
$ terraform import google_organization_access_approval_settings.default organizations/{{organization_id}}/accessApprovalSettings
$ terraform import google_organization_access_approval_settings.default {{organization_id}}