Skip to content

Commit 0fc61bf

Browse files
committed
add groups workaround for byok gcp config
1 parent 08b7fc2 commit 0fc61bf

File tree

1 file changed

+13
-3
lines changed

1 file changed

+13
-3
lines changed

deploy-manage/security/encrypt-deployment-with-customer-managed-encryption-key.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -313,9 +313,19 @@ The deployment is now created and encrypted using the specified key. Future snap
313313
* `cloudkms.cryptoKeyVersions.useToEncrypt`
314314

315315

316-
::::{tip}
317-
The user performing this action needs to belong to the **Owner** or **Cloud KMS Admin** role.
318-
::::
316+
The user performing this action needs to belong to the **Owner** or **Cloud KMS Admin** role.
317+
318+
319+
::::{note}
320+
If [domain restricted sharing](https://cloud.google.com/resource-manager/docs/organization-policy/restricting-domains) is enabled, then you might not be able to grant the service principals access to the key resource directly. Alternatively, you can grant access to a Google group that contains the relevant service accounts.
321+
322+
1. Create a new Google group within the allowed domain.
323+
2. In the Google Workspace administrator panel, [turn off domain restriction for your newly created Google group](https://support.google.com/a/answer/167097).
324+
3. Add the service principals to the Google group.
325+
4. Grant the Google group the roles as listed.
326+
327+
If you can't use Google Groups for your org, then [contact Elastic Support](https://www.elastic.co/support) for alternatives.
328+
::::
319329

320330

321331
**Step 2: Create your deployment**

0 commit comments

Comments
 (0)