All Products
Search
Document Center

MaxCompute:RAM authorization

Last Updated:Jan 30, 2026

Resource Access Management (RAM) is a service provided by Alibaba Cloud to manage user identities and resource access permissions. Using RAM helps you avoid sharing your Alibaba Cloud account keys with other users and allows you to grant users the least privilege access. RAM uses permission policies to define authorizations. This topic describes the general structure of a RAM policy, and the policy statement elements (Action, Resource, and Condition) defined by MaxCompute for RAM permission policies. The RAM code (RamCode) for MaxCompute is odps,maxcompute , and the supported authorization granularity is RESOURCE .

General structure of a policy

Permission policies support JSON format with the following general structure:

{
  "Version": "1",
  "Statement": [
    {
      "Effect": "<Effect>",
      "Action": "<Action>",
      "Resource": "<Resource>",
      "Condition": {
        "<Condition_operator>": {
          "<Condition_key>": [
            "<Condition_value>"
          ]
        }
      }
    }
  ]
}        

The following list describes the fields in the policy:

  • Version: Specifies the policy version number. It is fixed at 1.

  • Statement:

    • Effect: Specifies the authorization result. Valid values: Allow and Deny.

    • Action: Specifies one or more operations that are allowed or denied.

    • Resource: Specifies the specific objects affected by the operations. You can use Alibaba Cloud Resource Names (ARNs) to describe specific resources.

    • Condition: Specifies the conditions for the authorization to take effect. This field is optional.

      • Condition operator: Specifies the conditional operators. Different types of conditions support different conditional operators.

      • Condition_key: Specifies the condition keys.

      • Condition_value: Specifies the condition values.

Action

The following table lists the actions defined by MaxCompute. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that support authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding ARN in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys that are applicable across all RAM-integrated services. For more information, see Common condition keys.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

API

Access level

Resource type

Condition key

Dependent action

odps:GetMmsDb GetMmsDb get

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:GetTrustedProjects GetTrustedProjects get

Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListMmsTables ListMmsTables list

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:GetStorageSummaryCompared GetStorageSummaryCompared get

*All Resource

*

None None
odps:ListUsersByRole ListUsersByRole list

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:StartMmsJob StartMmsJob update

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:ListStorageProjectsInfo ListStorageProjectsInfo list

*All Resource

*

None None
odps:GetProject GetProject get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListJobSnapshotInfos ListJobSnapshotInfos list

*All Resource

*

None None
odps:GetStorageAmountSummary GetStorageAmountSummary get

*All Resource

*

None None
odps:GetJobInfo GetJobInfo get

*Job

acs:odps:{#regionId}:{#accountId}:job/{#instanceId}

None None
odps:UpdateProjectDefaultQuota UpdateProjectDefaultQuota update

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:GetRolePolicy GetRolePolicy get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListMmsDataSources ListMmsDataSources list

*All Resource

*

None None
odps:ListQuotaTimers ListTunnelQuotaTimer list

*All Resource

*

None None
odps:GetMmsTable GetMmsTable get

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:ListUsers ListUsers list

*All Resource

*

None None
odps:GetMmsAsyncTask GetMmsAsyncTask get

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:GetQuotaSchedule GetQuotaSchedule get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetMmsJob GetMmsJob get

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:ListMmsTasks ListMmsTasks list

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:GetQuotaSchedule GetComputeQuotaSchedule get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:QueryTunnelMetric QueryTunnelMetric list

*Tunnel

acs:odps:{#regionId}:{#accountId}:tunnel/{#metric}

None None
odps:UpdateProjectIpWhiteList UpdateProjectIpWhiteList update

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListPackages ListPackages list

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:UpdateMmsDataSource UpdateMmsDataSource update

*Project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:UpdateQuotaSchedule UpdateQuotaSchedule update

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:ListMmsJobs ListMmsJobs list

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:UpdatePackage UpdatePackage update

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListResources ListResources list

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:GetJobResourceUsage GetJobResourceUsage list

*All Resource

*

None None
odps:ListQuotasPlans ListComputeQuotaPlan list

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetQuotaUsage GetQuotaUsage get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#nickName}

None None
odps:CreateMmsFetchMetadataJob CreateMmsFetchMetadataJob create

*Project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:CreateQuotaPlan CreateQuotaPlan create

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:QueryQuotaMetric QueryQuotaMetric list

*Quota

acs:odps:{#regionId}:{#accountId}:quota/{#metric}

None None
odps:GetQuotaPlan GetComputeQuotaPlan get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetQuota GetQuota get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:UpdateUsersToRole UpdateUsersToRole update

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListComputeMetricsByInstance ListComputeMetricsByInstance list

*All Resource

*

None None
odps:QueryStorageMetric QueryStorageMetric list

*Storage

acs:odps:{#regionId}:{#accountId}:storage/{#metric}

None None
odps:UpdateProjectModelTier UpdateProjectModelTier update

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:UpdateQuotaPlan UpdateQuotaPlan update

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:ListJobMetric ListJobMetric list

*All Resource

*

None None
odps:DeleteQuotaPlan DeleteQuotaPlan delete

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:UpdateQuotaSchedule UpdateComputeQuotaSchedule update

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetMmsTask GetMmsTask get

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:ListRoles ListRoles list

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:DeleteMmsDataSource DeleteMmsDataSource delete

*Project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:DeleteQuotaPlan DeleteComputeQuotaPlan delete

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:ListQuotasPlans ListQuotasPlans get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:ListProjects ListProjects list

Project

acs:odps:{#regionId}:{#accountId}:projects/*

None None
odps:ListStorageTablesInfo ListStorageTablesInfo get

*Storage

acs:odps:{#regionId}:{#accountId}:storage/{#project}

None None
odps:ListJobInfos ListJobInfos list

*All Resource

*

None None
odps:RetryMmsJob RetryMmsJob update

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:StopMmsJob StopMmsJob update

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:ListProjectUsers ListProjectUsers get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:CreateMmsJob CreateMmsJob create

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:GetEffectivePlan GetComputeEffectivePlan get

*QuotaPlan

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetRoleAcl GetRoleAcl get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListTables ListTables list

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:CreateProject CreateProject create

*Project

acs:odps:{#regionId}:{#accountId}:project/*

odps:Encryption

None
odps:GetStorageSizeSummary GetStorageSizeSummary get

*All Resource

*

None None
odps:QueryQuota QueryQuota get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:CreateRole CreateRole create

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#projectName}

None None
odps:ListStoragePartitionsInfo ListStoragePartitionsInfo get

*Storage

acs:odps:{#regionId}:{#accountId}:storage/{#project}

None None
odps:GetRoleAclOnObject GetRoleAclOnObject get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:GetRunningJobs GetRunningJobs list

*All Resource

*

None None
odps:ListQuotas ListQuotas get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/*

None None
odps:DeleteMmsJob DeleteMmsJob delete

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:DeleteProject DeleteProject delete

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:ListMmsPartitions ListMmsPartitions list

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:UpdateQuotaPlan UpdateComputeQuotaPlan update

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetPackage GetPackage get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:GetMmsDataSource GetMmsDataSource get

*Project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:SumStorageMetricsByDate SumStorageMetricsByDate

*All Resource

*

None None
odps:UpdateProjectBasicMeta UpdateProjectBasicMeta update

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:UpdateSubQuotas UpdateComputeSubQuota update

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:ListMmsDbs ListMmsDbs list

*Project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:QueryTunnelMetricDetail QueryTunnelMetricDetail list

*Tunnel

acs:odps:{#regionId}:{#accountId}:tunnel/{#metric}

None None
odps:GetQuotaPlan GetQuotaPlan get

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:ListFunctions ListFunctions list

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:CreateMmsDataSource CreateMmsDataSource create

*All Resource

*

None None
odps:ListMmsTaskLogs ListMmsTaskLogs list

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:CreatePackage CreatePackage create

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:CreateQuotaPlan CreateComputeQuotaPlan create

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:KillJobs KillJobs update

*All Resource

*

None None
odps:ApplyComputeQuotaPlan ApplyComputeQuotaPlan update

*Quota

acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

None None
odps:GetTableInfo GetTableInfo get

*Project

acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}

None None
odps:UpdateQuotaTimers UpdateTunnelQuotaTimer update

*All Resource

*

None None
odps:GetMmsFetchMetadataJob GetMmsFetchMetadataJob get

*Project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None
odps:GetMmsPartition GetMmsPartition get

*project

acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}

None None

Resource

The following table lists the resources defined by MaxCompute. Specify them in the Resource element of RAM policy statements to grant permissions for specific operations. They are uniquely identified by ARNs. Format: acs:{#ramcode}:{#regionId}:{#accountId}:{#resourceType}:

  • acs: The initialism of Alibaba Cloud service, which indicates the public cloud of Alibaba Cloud.

  • {#ramcode}: The code used in RAM to indicate an Alibaba Cloud service.

  • {#regionId}: The region ID. If the resource covers all regions, set it to an asterisk (*).

  • {#accountId}: The ID of the Alibaba Cloud account. If the resource covers all Alibaba Cloud accounts, set it to an asterisk (*).

  • {#resourceType}: The service-defined resource identifier. It supports a hierarchical structure, which is similar to a file path. If the statement covers global resources, set it to an asterisk (*).

Resource type

ARN

project
  • acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}
Project
  • acs:odps:{#regionId}:{#accountId}:projects/{#ProjectName}
  • acs:odps:{#regionId}:{#accountId}:mmsdatasource/*
  • acs:odps:{#regionId}:{#accountId}:mmsdatasource/{#sourceId}
  • acs:odps:{#regionId}:{#accountId}:projects/*
  • acs:odps:{#regionId}:{#accountId}:project/*
Storage
  • acs:odps:{#regionId}:{#accountId}:storage/*
  • acs:odps:{#regionId}:{#accountId}:storage/{#metric}
  • acs:odps:{#regionId}:{#accountId}:storage/{#project}
Job
  • acs:odps:{#regionId}:{#accountId}:job/*
  • acs:odps:{#regionId}:{#accountId}:job/{#instanceId}
Quota
  • acs:odps:{#regionId}:{#accountId}:quota/{#NickName}
  • acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}
  • acs:odps:{#regionId}:{#accountId}:quota/{#metric}
  • acs:odps:{#regionId}:{#accountId}:quotas/*
User
  • acs:odps:*:{#accountId}:user/*
Tunnel
  • acs:odps:{#regionId}:{#accountId}:tunnel/{#metric}
QuotaPlan
  • acs:odps:{#regionId}:{#accountId}:quotas/{#NickName}

Condition

The following table lists the product-level condition keys defined by MaxCompute. You can also use Alibaba Cloud's Common condition keys. Specify these keys in the Condition element of RAM policy statements to define granular authorization rules. In the condition key, specify the condition values in the Condition_value element of the policy.

Each condition key has a specific data type, such as string, number, Boolean, or IP address. The data type determines which conditional operators can be used to compare the request values against policy values. You must specify the conditional operators compatible with the data type of the condition key. Mismatched operators will invalidate the policy. See Condition operator for valid combinations.

Condition key

Description

Data type

odps:Encryption Whether encryption is enabled for the project Boolean

How to create custom RAM policies?

You can create custom policies and grant them to RAM users, RAM user groups, or RAM roles. For instructions, see: