Permission type | Permission | Action | Resource |
Security configuration permissions on a project | Allows you to set security configurations for a project. |
|
projects/<project_name>/authorization/configurations/security_configuration
|
Allows you to view security configurations of a project. |
|
Allows you to set a policy. |
|
projects/<project_name>/authorization/configurations/policy
|
Allows you to view policy information. |
|
Allows you to set protected_exception. |
|
projects/<project_name>/authorization/configurations/protected_exception
|
Allows you to view protected_exception. |
|
Allows you to set security_policy. |
|
projects/<project_name>/authorization/configurations/security_policy
|
Allows you to view security_policy. |
|
Management of project account providers | Allows you to add an account provider. |
|
projects/<project_name>/authorization
|
Allows you to remove an account provider. |
|
Allows you to view all account providers. |
|
Management of trusted projects | Allows you to add trusted projects. |
|
projects/<project_name>/authorization
|
Allows you to remove trusted projects. |
|
Allows you to view all trusted projects. |
|
Management of project principals | Allows you to add a user. |
|
projects/<project_name>/authorization/users
|
Allows you to remove a user. |
|
Allows you to view all users. |
|
Allows you to view all roles that are assigned to a user. |
|
Management of project roles | Allows you to create a resource role. |
|
projects/<project_name>/authorization/roles/resource
|
Allows you to query information about a resource role. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
Allows you to drop a resource role. |
|
Allows you to create an administrator role. | N/A | Note Only project owners or users with the Super_Administrator role can create administrator roles and grant permissions to the administrator roles. |
Allows you to drop an administrator role. |
Allows you to query information about an administrator role. |
|
projects/<project_name>/authorization/roles/administrator/<role_name>
|
Allows you to view all roles. |
|
projects/<project_name>/authorization/roles
|
Policy management of roles in a project | Allows you to set policies about resource roles in a project. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
Allows you to view policies about resource roles in a project. |
|
Allows you to add statements that are used to set resource role policies. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
Allows you to remove statements that are used to set resource role policies. |
|
Allows you to set policies about administrator roles. | N/A | Note Only project owners or users assigned with the Super_Administrator role can create administrator roles and grant permissions to the administrator roles. |
Allows you to view policies about administrator roles. |
|
projects/<project_name>/authorization/roles/administrator/<role_name>
|
Allows you to add statements that are used to set administrator role policies. | N/A | Note Only project owners or users assigned with the Super_Administrator role can create administrator roles and grant permissions to the administrator roles. |
Allows you to remove statements that are used to set administrator role policies. |
Role assignment and view | Allows you to assign a resource role to a user. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
Allows you to revoke a resource role from a user. |
|
Allows you to assign an administrator role to a user. |
|
projects/<project_name>/authorization/roles/administrator/<role_name>
|
Allows you to revoke an administrator role from a user. |
|
Allows you to assign the Super_Administrator role to a user. | N/A | Note Only project owners or users assigned with the Super_Administrator role can assign or revoke the Super_Administrator role to or from a user. |
Allows you to revoke the Super_Administrator role from a user. |
Allows you to view the users to which a resource role is assigned. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
Allows you to view the users to which an administrator role is assigned. |
|
projects/<project_name>/authorization/roles/administrator/<role_name>
|
Allows you to view the users to which the Super_Administrator role is assigned. |
|
projects/<project_name>/authorization/roles/super_administrator/super_administrator
|
Allows you to view the roles assigned to a user. |
|
projects/<project_name>/authorization/principals/users
|
Package management | Allows you to create a package. |
|
projects/<project_name>/authorization/packages
|
Allows you to view packages. |
|
Allows you to query information about a package. |
|
projects/<project_name>/authorization/packages/<package_creater_project_name>.<package_name>
|
Allows you to delete a package. |
|
Allows you to install a package. |
|
projects/<project_name>/authorization/packages/<package_creater_project_name>.<package_name>
|
Allows you to uninstall a package. |
|
Allows you to grant the permissions on a package to other projects. |
|
projects/<project_name>/authorization/packages/<package_creater_project_name>.<package_name>
|
Allows you to revoke the permissions on a package from other projects. |
|
Allows you to add a resource to a package. |
|
projects/<project_name>/authorization/packages/<package_creater_project_name>.<package_name>
|
Allows you to remove resources from a package. |
|
Label-based access control | Allows you to enable label-based access control on resources in a project. |
|
projects/<project_name>/authorization/label/<resource_relative_id>
Note In the resource URI, resource_relative_id specifies the resource path in a project. For example, resource_relative_id of table_1 is tables/table_1 . You can use an asterisk (*) to specify all resources. For example, you can use tables/* to specify all tables in a project.
|
Allows you to disable label-based access control on resources in a project. |
|
Allows you to view label-based access control on resources in a project. |
|
Allows you to enable label-based access control on packages. |
|
projects/<project_name>/authorization/packageresources/<package_creater_project_name>.<package_name>/<resource_relative_id>
|
Allows you to disable label-based access control on packages. |
|
Allows you to view label-based access control on resources in a package. |
|
Allows you to view label-based access control for a user. |
|
projects/<project_name>/authorization/users
|
Allows you to view label-based access control for a role. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
Note You cannot enable, set, or view label-based access control for an administrator role. |
Access-level label configuration for users and roles | Allows you to set an access-level label for a user. |
|
projects/<project_name>/authorization/users
|
Allows you to set an access-level label for a role. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
ACL-based access control | Allows you to grant permissions on resources in a project based on the ACL. |
|
projects/<project_name>/authorization/<resource_relative_id>
Note You can use the following string set operators in a policy to manage actions that can be granted or revoked: StringIntersectSetEmpty(IgnoreCase), StringIntersectSetNotEmpty(IgnoreCase), StringSubSet(IgnoreCase), and StringNotSubSet(IgnoreCase) . You can use acs:Privileges as keywords in the condition.
For example, you can use the following policy to deny the user odpsxxxx@aliyun.com from granting the Download or Select permission on all tables in the prj1 project:
{
"Action":[
"odps:GrantPrivs"],
"Effect":"Deny",
"Principal":"aliyun$odpsxxxx@aliyun.com",
"Resource":"acs:odps::projects/prj1/authorization/acl/tables/*",
"Condition":{
"IntersectionSetNotNull":{
"acs:Privileges":["Download","Select"]
}
}
}
The resource_relative_id of the project is in the projects/<project_name> format.
|
Allows you to revoke permissions on resources in a project that are granted based on the ACL. |
|
Allows you to view permissions on resources in a project that are granted based on the ACL. |
|
Allows you to grant permissions on packages based on the ACL. |
|
projects/<project_name>/authorization/packageresources/<package_creater_project_name>.<package_name>/<resource_relative_id>
|
Allows you to revoke permissions on packages that are granted based on the ACL. |
|
Allows you to view permissions on packages that are granted based on the ACL. |
|
Allows you to view permissions that are granted to users based on the ACL. |
|
projects/<project_name>/authorization/users
|
Allows you to view permissions that are granted to resource roles based on the ACL. |
|
projects/<project_name>/authorization/roles/resource/<role_name>
|
Clearance of expired permissions | Allows you to clear configurations of expired permissions. |
|
projects/<project_name>/authorization
|