Permissions

Permission Description

By default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users inherit permissions from the groups to which they are added and can perform specified operations on cloud services based on the permissions.

Scope: The projects for which permissions granted to a user group will be applied.

  • Global services: Services deployed without specifying physical regions, such as Object Storage Service (OBS) , are called global services. Permissions for these services must be assigned globally.

  • Region-specific projects: Services deployed in specific regions, such as Elastic Cloud Server (ECS) and Bare Metal Server (BMS), are called project-level services. Permissions for these services must be assigned in region-specific projects and will be applied only for specific regions.

    • All resources: Permissions will be applied for both global services and region-specific projects, including projects created later.

    • Region-specific projects: Permissions will be applied for the region-specific projects you select.

Type: You can grant users permissions by using roles and policies. Policies are a type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. For details, see Permission.

  • For services that provide both policies and roles, preferentially use policies to assign permissions.

  • For services that support policy-based access control, you can create custom policies to supplement system-defined policies to allow or deny access to specific types of resources under certain conditions.

Permission Relationship

image1

BASE

Service

Scope

Policy/Role Name

Type

Description

BASE

Global services

FullAccess

Policy

Full permissions for all services that support policy-based authorization.

All resources

Tenant Guest

Role

Read-only permissions for all services except IAM.

Note

  • If the permission scope is Global services, they will be applied for global services.

  • If the permission scope is All resources, they will be applied for both global services and all region-specific projects, including projects created later.

  • If the permission scope is Region-specific projects, they will be applied only for specific projects.

All resources

Tenant Administrator

Full permissions for all services except IAM.

Note

  • If the permission scope is Global services, they will be applied for global services.

  • If the permission scope is All resources, they will be applied for both global services and all region-specific projects, including projects created later.

  • If the permission scope is Region-specific projects, they will be applied only for specific projects.

Global services

Agent Operator

Permissions for switching roles to access resources of delegating accounts.

Compute

Service

Scope

Policy/Role Name

Type

Description

Elastic Cloud Server (ECS)

(Project-level service)

Region-specific projects

ECS FullAccess

Policy

Full permissions for ECS.

ECS ReadOnlyAccess

Read-only permissions for ECS.

ECS CommonOperations

Permissions for starting, stopping, restarting, and querying ECSs.

Server Administrator

Role

Full permissions for ECS. This role must be used together with the Tenant Guest role in the same project.

If a user needs to create, delete, or change resources of other services, the user must also be granted administrator permissions of the corresponding services in the same project.

For example, if a user needs to create a new VPC when creating an ECS, the user must also be granted permissions with the VPC Administrator role.

Bare Metal Server (BMS)

(Project-level service)

Region-specific projects

BMS FullAccess

Policy

Full permissions for BMS.

Auto Scaling (AS)

(Project-level service)

Region-specific projects

AutoScaling FullAccess

Policy

Full permissions for the Auto Scaling service.

AutoScaling ReadOnlyAccess

Read-only permissions for AS.

AutoScaling Administrator

Role

Full permissions for all AS resources.

This role must be used together with the ELB Administrator, CES Administrator, Server Administrator, and Tenant Administrator roles in the same project.

Image Management Service (IMS)

(Project-level service)

Region-specific projects

IMS FullAccess

Policy

Full permissions for IMS.

FunctionGraph

(Project-level service)

Region-specific projects

FunctionGraph FullAccess

Policy

Full permissions for FunctionGraph.

FunctionGraph ReadOnlyAccess

Read-only permissions for FunctionGraph.

FunctionGraph CommonOperations

Common operation permissions for FunctionGraph, including permissions for querying functions and triggers and invoking functions.

FunctionGraph Administrator

Role

Permissions for managing FunctionGraph functions and triggers.

This role must be used together with the Tenant Guest role in the same project.

FunctionGraph Invoker

Permissions for querying FunctionGraph functions and triggers.

Dedicated Host (DeH)

(Project-level service)

Region-specific projects

DeH FullAccess

Policy

Full permissions for DeH.

DeH CommonOperations

Basic operation permissions for DeH.

DeH ReadOnlyAccess

Read-only permissions for DeH. Users with these permissions can only query DeHs.

Storage

Service

Scope

Policy/Role Name

Type

Description

Object Storage Service (OBS)

(Global service)

Global services

OBS OperateAccess

Policy

Users with this permission can perform all operations specified by OBS ReadOnlyAccess and perform basic object operations, such as uploading objects, downloading objects, deleting objects, and obtaining object ACLs.

OBS Administrator

Allows you to perform any operation on all OBS resources under the account.

OBS ReadOnlyAccess

Users with this permission can list buckets, obtain basic bucket information, obtain bucket metadata, and list objects.

OBS Buckets Viewer

Role

Users with this permission can list buckets, obtain basic bucket information, and obtain bucket metadata.

Elastic Volume Service (EVS)

(Project-level service)

Region-specific projects

EVS Admin

Role

All EVS operation permissions, including creating, deleting, and viewing EVS disks and modifying EVS disk specifications.

EVS Viewer

EVS read-only permission, such as viewing EVS disks and EVS disk details.

Cloud Backup and Recovery (CBR)

(Project-level service)

Region-specific projects

CBR FullAccess

Policy

Administrator permissions for using all vaults and policies on CBR.

CBR BackupsAndVaultsFullAccess

Common user permissions for creating, viewing, and deleting vaults on CBR.

CBR ReadOnlyAccess

Read-only permissions for viewing data on CBR.

Storage Disaster Recovery Service (SDRS)

(Project-level service)

Region-specific projects

SDRS Administrator

Role

Full permissions for SDRS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.

Scalable File Service (SFS)

(Project-level service)

Region-specific projects

SFS Turbo FullAccess

Policy

All permissions of Scalable File Service (SFS Turbo).

SFS Turbo ReadOnlyAccess

The read-only permissions to all Scalable File Service (SFS Turbo) resources.

SFS Administrator

Role

Scalable File Service Administrator.

Cloud Server Backup Service (CSBS)

(Project-level service)

Region-specific projects

CSBS Administrator

Role

Full permissions for CSBS.

This role must be used together with the Server Administrator role in the same project.

Volume Backup Service (VBS)

(Project-level service)

Region-specific projects

VBS Administrator

Role

Full permissions for VBS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.

Network

Service

Scope

Policy/Role Name

Type

Description

Virtual Private Cloud (VPC)

(Project-level service)

Region-specific projects

VPC FullAccess

Policy

Full permissions for VPC.

VPC ReadOnlyAccess

Read-only permissions for VPC.

VPC Administrator

Role

Permissions for VPC, excluding permissions for creating, modifying, deleting, and viewing security groups and security group rules.

This role must be used together with the Tenant Guest role in the same project.

Server Administrator

Permissions for performing operations on EIPs, security groups, and ports.

This role must be used together with the Tenant Guest role in the same project.

Elastic Load Balance (ELB)

(Project-level service)

Region-specific projects

ELB FullAccess

Policy

Full permissions for ELB.

ELB ReadOnlyAccess

Read-only permissions for ELB.

ELB Administrator

Role

Full permissions for ELB.

This role must be used together with the Tenant Guest role in the same project.

NAT Gateway

(Project-level service)

Region-specific projects

NAT FullAccess

Policy

Full permissions for NAT Gateway.

NAT ReadOnlyAccess

Read-only permissions for NAT Gateway.

NAT GatewayAdministrator

Role

Full permissions for NAT Gateway.

This role must be used together with the Tenant Guest role in the same project.

Direct Connect

(Project-level service)

Region-specific projects

Direct Connect Administrator

Role

Has all permissions for Direct Connect resources.

For permissions of this role to take effect, users must also have the Tenant Guest and VPC Administrator permissions.

DCAAS FullAccess

Policy

Full permissions for Direct Connect.

DCAAS ReadOnlyAccess

Read-only permissions for Direct Connect.

Virtual Private Network (VPN)

(Project-level service)

Region-specific projects

VPN Administrator

Role

Administrator permissions for VPN.

This role must be used together with the Tenant Guest and VPC Administrator roles in the same project.

VPN FullAccess

Policy

Full permissions for VPN.

VPN ReadOnlyAccess

Read-only permissions for VPN.

Domain Name Service (DNS)

(Project-level service)

Region-specific projects

DNS Administrator

Role

Full permissions for DNS.

This role must be used together with the Tenant Guest and VPC Administrator roles in the same project.

DNS FullAccess

Policy

Full permissions for DNS.

DNS ReadOnlyAccess

Read-only permissions for DNS. Users granted these permissions can only view DNS resources.

VPC Endpoint (VPCEP)

(Project-level service)

Region-specific projects

VPCEndpoint Administrator

Role

Full permissions for VPCEP.

This role must be used together with the Server Administrator, VPC Administrator, and DNS Administrator roles in the same project.

Enterprise Router

(Project-level service)

Region-specific projects

ER FullAccess

Policy

Full permissions for ER.

ER ReadOnlyAccess

Read-only permissions for ER.

Containers

Table 1 User management permissions

Service

Scope

Policy/Role Name

Type

Description

Cloud Container Engine (CCE)

(Project-level service)

Region-specific projects

CCE FullAccess

Policy

Full permissions for CCE.

CCE ReadOnlyAccess

Permissions to view CCE cluster resources, excluding namespace-level permissions for clusters that have Kubernetes RBAC enabled.

CCE Administrator

Role

Read and write permissions for CCE clusters and all resources (including workloads and services) in the clusters.

This role depends on the following permissions:

Global services: OBS Buckets Viewer.

Region-specific projects (same projects): Tenant Guest, Server Administrator, ELB Administrator, SFS Administrator, SWR Admin, and APM FullAccess.

Note

Users also granted permissions with the NAT Gateway Administrator role can use NAT Gateway functions for clusters.

Cloud Container Instance (CCI)

(Project-level service)

Region-specific projects

CCI FullAccess

Policy

Full permissions for CCI. Users granted these permissions can create, delete, query, and update all CCI resources.

CCI ReadOnlyAccess

Read-only permissions for CCI. Users granted these permissions can only view CCI resources.

CCI CommonOperations

Common user permissions for CCI. Users granted these permissions can perform all operations except creating, deleting, and modifying role-based access control (RBAC) policies, networks, and namespaced resources.

CCI Administrator

Role

Administrator permissions for CCI. Users granted these permissions can create, delete, query, and update all CCI resources.

Software Repository for Container (SWR)

(Project-level service)

Region-specific projects

SWR Administrator

Role

All SWR operation permissions, including pushing and pulling images, and granting permissions.

Security & Compliance

Service

Scope

Policy/Role Name

Type

Description

Anti-DDoS

(Project-level service)

Region-specific projects

Anti-DDoS Administrator

Role

Full permissions for Anti-DDoS.

This role must be used together with the Tenant Guest role in the same project.

Anti-DDoS FullAccess

Policy

All permissions for Anti-DDoS.

Anti-DDoS ReadOnlyAccess

Read-only permissions for Anti-DDoS.

Host Security Service (HSS)

(Project-level service)

Region-specific projects

HSS Administrator

Role

Full permissions for HSS.

HSS FullAccess

Policy

Full permissions for HSS.

HSS ReadOnlyAccess

Read-only permissions for HSS.

Database Security Service (DBSS)

(Project-level service)

Region-specific projects

DBSS System Administrator

Role

Full permissions for DBSS.

DBSS Audit Administrator

Security auditing permissions for DBSS.

DBSS Security Administrator

Security protection permissions for DBSS.

DBSS FullAccess

Policy

Full permissions for DBSS.

DBSS ReadOnlyAccess

Read-only permissions for DBSS. Users granted these permissions can only view this service and cannot configure resources in it.

Web Application Firewall (WAF)

(Project-level service)

Region-specific projects

WAF Administrator

Role

Permissions to: Create and delete WAF instances. Configure, enable, disable WAF instances. Modify the protection policies of WAF instances. Configure alarm notification for WAF instances. Query the WAF instance list and details. Authenticate the domain name of a WAF instance.

Cloud Firewall (CFW)

(Project-level service)

Region-specific projects

CFW FullAccess

Policy

Full permissions for CFW.

Management & Governance

Service

Scope

Policy/Role Name

Type

Description

Identity and Access Management (IAM)

(Global service)

Global service

IAM ReadOnlyAccess

Policy

Read-only permissions for IAM.

Agent Operator

Role

Permissions for switching roles to access services of a delegating account.

Cloud Eye

(Project-level service)

Region-specific projects

CES Administrator

Role

Administrator permissions for Cloud Eye

CES FullAccess

Policy

Administrator permissions for Cloud Eye. Users granted these permissions can perform all operations on Cloud Eye.

CES ReadOnlyAccess

Read-only permissions for Cloud Eye. Users granted these permissions can only view Cloud Eye data.

Application Operations Management (AOM)

(Project-level service)

Region-specific projects

AOM Admin

Policy

Administrator permissions for AOM. Users granted these permissions can operate and use AOM.

AOM Viewer

Read-only permissions for AOM. Users granted these permissions can only view AOM data.

Application Performance Management (APM)

(Project-level service)

Region-specific projects

APM FullAccess

Policy

All permissions for APM.

APM ReadOnlyAccess

Read-only permissions for APM.

APM Administrator

Role

Administrator for APM.All permissions of APM.

Cloud Trace Service (CTS)

(Project-level service)

Region-specific projects

CTS FullAccess

Policy

Full permissions for CTS.

CTS ReadOnlyAccess

Read-only permissions for CTS.

Log Tank Service (LTS)

(Project-level service)

Region-specific projects

LTS Administrator

Role

Permissions to create log groups, query log groups, delete log groups, create log topics, query log topics, and delete log topics.

Tag Management Service (TMS)

(Global service)

Global services

TMS Administrator

Role

Users with this permission can create, modify, and delete predefined tags.

Resource Template Service (RTS)

(Project-level service)

Region-specific projects

RTS Administrator

Role

Operation permissions: All operations on RTS. To orchestrate a resource, users with this permission must also have the Administrator permission. For example: Users with this permission and the Server Administrator permission can create stacks for ECS, VPC, EVS, and IMS resources. Users with this permission and the ELB Administrator permission can create an ELB resource stack.

Config

(Global service)

Global services

Config FullAccess

Policy

Full permissions for Config

Config ReadOnlyAccess

Read-only permissions for Config.

Application

Service

Scope

Policy/Role Name

Type

Description

Cloud Service Engine (CSE)

Region-specific projects

CES Administrator

Role

Permissions to view monitoring metrics as well as add, modify, and delete alarm rules. Users granted permissions of this policy must also be granted permissions of the Tenant Guest policy.

Distributed Cache Service (DCS)

(Project-level service)

Region-specific projects

DCS FullAccess

Policy

Full permissions for DCS.

DCS UserAccess

Common user permissions for DCS operations except creating, modifying, deleting, and scaling instances.

DCS ReadOnlyAccess

Read-only permissions for DCS.

DCS Administrator

Role

Full permissions for DCS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.

Distributed Message Service (DMS)

(Project-level service)

Region-specific projects

DMS UserAccess

Policy

Common user permissions for DMS (DMS for Kafka and DMS for RabbitMQ), excluding permissions for creating, modifying, deleting, scaling up instances and dumping.

DMS ReadOnlyAccess

Read-only permissions for DMS (DMS for Kafka and DMS for RabbitMQ). Users granted these permissions can only view DMS data.

DMS FullAccess

Administrator permissions for DMS (DMS for Kafka and DMS for RabbitMQ). Users granted these permissions can perform all operations on DMS.

DMS VPCAccess

VPC operation permissions to assign to DMS agencies.

DMS KMSAccess

KMS operation permissions to assign to DMS agencies.

DMS ELBAccess

ELB operation permissions to assign to DMS agencies.

DMSAgencyCheckAccessPolicy

IAM operation permissions to assign to DMS agencies.

Simple Message Notification (SMN)

(Project-level service)

Region-specific projects

SMN Administrator

Role

Full permissions for SMN.

This role must be used together with the Tenant Guest role in the same project.

SMN FullAccess

Policy

Full permissions for SMN.

SMN ReadOnlyAccess

Read-only permissions for SMN.

API Gateway (APIG)

(Project-level service)

Region-specific projects

APIG Administrator

Role

Administrator permissions for API Gateway. Users granted these permissions can use all functions of the shared and dedicated gateways.

To use VPC channels, the user must also be assigned the VPC Administrator role.

To use custom authentication, the user must also be assigned the FunctionGraph Administrator role.

APIG FullAccess

Policy

Full permissions for API Gateway. Users granted these permissions can use all functions of dedicated API gateways.

APIG ReadOnlyAccess

Read-only permissions for API Gateway. Users granted these permissions can only view dedicated API gateways.

Database

Service

Scope

Policy/Role Name

Type

Description

Relational Database Service (RDS)

(Project-level service)

Region-specific projects

RDS FullAccess

Policy

Full permissions for RDS.

RDS ReadOnlyAccess

Read-only permissions for RDS.

RDS ManageAccess

Database administrator permissions for all operations except deleting RDS resources.

RDS Administrator

Role

Full permissions for RDS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.

Document Database Service (DDS)

(Project-level service)

Region-specific projects

DDS Administrator

Role

Users who have this right, plus Tenant Guest and Server Administrator rights, can perform any operations on DDS, including creating, deleting, rebooting, or scaling up DB instances, configuring database parameters, and restoring DB instances. Users who have this right but not the Tenant Guest or Server Administrator right cannot use DDS. Users who have the VPC Administrator right can create VPCs or subnets. Users who have the CES Administrator right can add or modify alarm rules for DB instances.

Data Replication Service (DRS)

(Project-level service)

Region-specific projects

DRS FullAccess

Policy

Full permissions for DRS.

DRS ReadOnlyAccess

Read-only permissions for DRS.

DRS Administrator

Role

Full permissions for DRS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.

Data Admin Service (DAS)

(Project-level service)

Region-specific projects

DAS Administrator

Role

DAS administrator with full permissions.

This role must be used together with the Tenant Guest role in the same project.

DAS FullAccess

Policy

Full permissions for DAS.

Distributed Database Middleware (DDM)

(Project-level service)

Region-specific projects

DDM FullAccess

Policy

Full permissions for DDM.

DDM CommonOperations

Common permissions for DDM.

Users with common permissions cannot perform the following operations:

  • Buying DDM instances

  • Deleting DDM instances

  • Scaling up instances

  • Rolling back instances or clearing data when scale-up fails

DDM ReadOnlyAccess

Read-only permissions for DDM.

GeminiDB

(Project-level service)

Region-specific projects

GeminiDB FullAccess

Policy

Full permissions for multi-model NoSQL databases.

GeminiDB ReadOnlyAccess

Read-only permissions for multi-model NoSQL databases.

GaussDB

(Project-level service)

Region-specific projects

GaussDB FullAccess

Policy

Full permissions for GaussDB.

GaussDB ReadOnlyAccess

Read-only permissions for GaussDB.

Enterprise Intelligence

Service

Scope

Policy/Role Name

Type

Description

ModelArts

(Project-level service)

Region-specific projects

ModelArts FullAccess

Policy

Administrator permissions for performing all operations on ModelArts.

ModelArts CommonOperations

Permissions for performing all operations except managing dedicated resource pools on ModelArts.

DataArts Studio

(Project-level service)

Region-specific projects

DARTS Administrator

Role

Instance administrator who has all management permissions on a DataArts Studio instance and its workspaces, permissions of dependent services, and service operation permissions in all workspaces.

DARTS User

Common user who has permissions to view a DataArts Studio instance and its workspaces, and the permissions of dependent services. After assigned a role, a common user has permissions of the role to perform service operations.

MapReduce Service (MRS)

(Project-level service)

Region-specific projects

MRS FullAccess

Policy

Full permissions for MRS.

MRS CommonOperations

Common user permissions for MRS operations except creating and deleting resources.

MRS ReadOnlyAccess

Read-only permissions for MRS.

MRS Administrator

Role

Full permissions for MRS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.

GaussDB(DWS)

(Project-level service)

Region-specific projects

DWS FullAccess

Policy

Database administrator permissions for GaussDB(DWS). Users granted these permissions can perform all operations on GaussDB(DWS).

DWS ReadOnlyAccess

Read-only permissions for GaussDB(DWS). Users granted these permissions can only view GaussDB(DWS) data.

DWS Administrator

Role

Database administrator permissions for GaussDB(DWS). Users granted these permissions can perform operations on all GaussDB(DWS) resources.

Users granted permissions of the VPC Administrator policy can create VPCs and subnets.

Users granted permissions of the Cloud Eye Administrator policy can view monitoring information of data warehouse clusters.

If you need to create an agency, you also need to configure the Security Administrator permission.

DWS Database Access

GaussDB(DWS) database access permission. Users with this permission can generate the temporary database user credentials based on IAM users to connect to the database in the GaussDB(DWS) cluster.

Data Lake Insight (DLI)

(Project-level service)

Region-specific projects

DLI Service Admin

Role

Full permissions for DLI.

DLI FullAccess

Policy

Full permissions for DLI. Users granted these permissions can perform all operations on DLI.

DLI ReadOnlyAccess

Users granted these permissions can only view the queue list, job list, job details, database list, table list, table creation statements, table fields, and job metadata such as job creation, update, and deletion.

Cloud Search Service (CSS)

(Project-level service)

Region-specific projects

CSS Administrator

Role

Full permissions for CSS.

This role must be used together with the Tenant Guest and Server Administrator roles in the same project.