Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for scoped access settings in access context manager gcp user access binding #22243

Open
wdarling-g opened this issue Apr 4, 2025 · 0 comments · May be fixed by GoogleCloudPlatform/magic-modules#13557
Labels

Comments

@wdarling-g
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request.
  • Please do not leave +1 or me too comments, they generate extra noise for issue followers and do not help prioritize the request.
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment.
  • If an issue is assigned to a user, that user is claiming responsibility for the issue.
  • Customers working with a Google Technical Account Manager or Customer Engineer can ask them to reach out internally to expedite investigation and resolution of this issue.

Description

Adding support for specifying new scoped access settings on gcp user access binding resources in access context manager API.

New or Affected Resource(s)

  • google_access_context_manager_gcp_user_access_binding

Potential Terraform Configuration

resource "google_access_context_manager_gcp_user_access_binding" "gcp_user_access_binding" {
  organization_id = "%{org_id}"
  group_key       = "03fwokq00k8zswz"
  access_levels   = [
    "accessPolicies/303892289876/accessLevels/basic",
  ]
  session_settings {
	max_inactivity = "300s"
	session_length = "1800s"
	session_length_enabled = true
	session_reauth_method = "LOGIN"
	use_oidc_max_age = false
  }
  scoped_access_settings {
	scope {
	  client_scope {
		restricted_client_application {
		  client_id = "TEST_APPLICATION"
		}
	  }
	}
	active_settings {
	  access_levels = [
		"accessPolicies/303892289876/accessLevels/basic",
	  ]
	  session_settings {
		max_inactivity = "300s"
		session_length = "1800s"
		session_length_enabled = true
		session_reauth_method = "LOGIN"
		use_oidc_max_age = false
	  }
	}
	dry_run_settings {
	  access_levels = [
		"accessPolicies/303892289876/accessLevels/basic",
	  ]
	}
  }
}

References

b/402122138

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment