Google Access Approval Organization Access Approval Settings

This page shows how to write Terraform for Access Approval Organization Access Approval Settings and write them securely.

google_organization_access_approval_settings (Terraform)

The Organization Access Approval Settings in Access Approval can be configured in Terraform with the resource name google_organization_access_approval_settings. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

An example could not be found in GitHub.

Review your Terraform file for Google best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).


This field will always be unset for the organization since organizations do not have ancestors.

  • id optional computed - string
  • name optional computed - string

The resource name of the settings. Format is "organizations/[organization_id]/accessApprovalSettings"

A list of email addresses to which notifications relating to approval requests should be sent. Notifications relating to a resource will be sent to all emails in the settings of ancestor resources of that resource. A maximum of 50 email addresses are allowed.

ID of the organization of the access approval settings.

  • enrolled_services set block

    The product for which Access Approval will be enrolled. Allowed values are listed (case-sensitive): all

    The enrollment level of the service. Default value: "BLOCK_ALL" Possible values: ["BLOCK_ALL"]

  • timeouts single block

Explanation in Terraform Registry

Access Approval enables you to require your explicit approval whenever Google support and engineering need to access your customer content. To get more information about OrganizationSettings, see:

Frequently asked questions

What is Google Access Approval Organization Access Approval Settings?

Google Access Approval Organization Access Approval Settings is a resource for Access Approval of Google Cloud Platform. Settings can be wrote in Terraform.


Automate config file reviews on your commits

Fix issues in your infrastructure as code with auto-generated patches.