Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request.
Please do not leave +1 or me too comments, they generate extra noise for issue followers and do not help prioritize the request.
If you are interested in working on this issue or have submitted a pull request, please leave a comment.
If an issue is assigned to a user, that user is claiming responsibility for the issue.
Customers working with a Google Technical Account Manager or Customer Engineer can ask them to reach out internally to expedite investigation and resolution of this issue.
Community Note
Description
When working with multiple tenants, it is not a secure setup to give service accounts access to all tenants. According to the docs, it is possible to manage access control per tenant via the console: https://cloud.google.com/identity-platform/docs/multi-tenancy-access-control
However, so far there is no resource
google_identity_platform_tenant_iam_member
to manage access on a resource level.New or Affected Resource(s)
Potential Terraform Configuration
References
https://cloud.google.com/identity-platform/docs/multi-tenancy-access-control
b/356160000