You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
Question
How can I attach the "All IAM Account Management services" using the resource "ibm_iam_access_group_policy". I see an example in the docs here:
That gives me the error # Error: RoleDoesnotExist: Service ID creator was not found. Valid roles are Reader, Writer, Manager, Service Configuration Reader, Viewer, Administrator, Operator, Editor, Key Manager and upon editing the roles, Terraform proceeds to apply the All Identity and Access enabled services instead because I think service="IAM" corresponds to the All Identity and Access enabled services service instead..
Could someone please advise how I can use my config to apply the All IAM Account Management services; thank you.
Community Note
Question
How can I attach the "All IAM Account Management services" using the resource "ibm_iam_access_group_policy". I see an example in the docs here:
https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/iam_access_group_policy#access-group-policy-by-using-service_group_id-resource-attribute
but to avoid resource conflicts, I've chosen to use the resources {} argument like so:
That gives me the error
# Error: RoleDoesnotExist: Service ID creator was not found. Valid roles are Reader, Writer, Manager, Service Configuration Reader, Viewer, Administrator, Operator, Editor, Key Manager
and upon editing the roles, Terraform proceeds to apply the All Identity and Access enabled services instead because I think service="IAM" corresponds to the All Identity and Access enabled services service instead..Could someone please advise how I can use my config to apply the All IAM Account Management services; thank you.
New or Affected Resource(s) or Datasource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: