Open kevin-greenan-tempus opened 1 year ago
Note: This warning comes from the API docs
@kevin-greenan-tempus This is not a terraform provider limitation. According to API docs it is not supported.
The request must be made by one of the provided user or service accounts. Groups are not supported
Thank you for requesting this feature, as stated here, it is a limitation of the service itself and not the Terraform provider. It is on our radar. I can not give any indication as to timeline but it will be supported.
This comes up in all of our SOC2, HITRUST, and GCP audits when granting permissions to individual users.
Hi @jeremiahbowen, are you using access levels as part of VPC-SC or another security feature? VPC-SC Service perimeters now support groups in ingress / egress rules which are intended to replace the use of access levels. Here is some documentation regarding the new feature: https://cloud.google.com/vpc-service-controls/docs/configure-identity-groups
Community Note
Description
From the docs:
Access Levels should allow the use of group membership conditions. Listing each user or service account identity exhaustively is not scalable. On the surface, this seems to be expected - access to a resource is handled by IAM bindings. When using VPC Service Controls, however, we want to allow access to a resource to be controlled through a condition within an access-level.
New or Affected Resource(s)
Potential Terraform Configuration
References
0000
b/308569238