文档

授权信息

更新时间:
访问控制(RAM)是阿里云提供的管理用户身份与资源访问权限的服务。使用RAM可以让您避免与其他用户共享阿里云账号密钥,并可按需为用户授予最小权限。RAM中使用权限策略描述授权的具体内容。
本文为您介绍访问控制(RAM)为RAM权限策略定义的操作(Action)、资源(Resource)和条件(Condition)。访问控制(RAM)的RAM代码(RamCode)为ram,sts,支持的授权粒度为RESOURCE

权限策略通用结构

权限策略支持JSON格式,其通用结构如下:
{
  "Version": "1",
  "Statement": [
    {
      "Effect": "<Effect>",
      "Action": "<Action>",
      "Resource": "<Resource>",
      "Condition": {
        "<Condition_operator>": {
          "<Condition_key>": [
            "<Condition_value>"
          ]
        }
      }
    }
  ]
}
各字段含义如下:
  • Effect:权限策略效果。取值:Allow(允许)、Deny(拒绝)。
  • Action:授予允许或拒绝权限的具体操作。具体信息,请参见操作(Action)
  • Resource:受操作影响的具体对象,您可以使用资源ARN来描述指定资源。具体信息,请参见资源(Resource)
  • Condition:指授权生效的条件。可选字段。具体信息,请参见条件(Condition)
    • Condition_operator:条件运算符,不同类型的条件对应不同的条件运算符。具体信息,请参见权限策略基本元素
    • Condition_key:条件关键字。
    • Condition_value:条件关键字对应的值。

操作(Action)

下表是访问控制(RAM)定义的操作,这些操作可以在RAM权限策略语句的Action元素中使用,用来授予执行该操作的权限。下面对表中的具体项提供说明:
  • 操作:是指具体的权限点。
  • API:是指操作对应的API接口。
  • 访问级别:是指每个操作的访问级别,取值为写入(Write)、读取(Read)或列出(List)。
  • 资源类型:是指操作中支持授权的资源类型。具体说明如下:
    • 对于必选的资源类型,用背景高亮的方式表示。
    • 对于不支持资源级授权的操作,用全部资源表示。
  • 条件关键字:是指云产品自身定义的条件关键字。该列不体现适用于任何操作的通用条件关键字
  • 关联操作:是指成功执行操作所需要的其他权限。操作者必须同时具备关联操作的权限,操作才能成功。
操作API访问级别资源类型条件关键字关联操作
ram:AddUserToGroupAddUserToGroupWrite
Group
acs:ram:*:{#accountId}:group/{#GroupName}
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:AttachPolicyToGroupAttachPolicyToGroupWrite
Group
acs:ram:*:{#accountId}:group/{#GroupName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:AttachPolicyToRoleAttachPolicyToRoleWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Role
acs:ram:*:{#accountId}:role/{#RoleName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:AttachPolicyToUserAttachPolicyToUserWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
User
acs:ram:*:{#accountId}:user/{#UserName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:BindMFADeviceBindMFADeviceWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ChangePasswordChangePasswordWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ClearAccountAliasClearAccountAliasWrite
全部资源
*
ram:CreateAccessKeyCreateAccessKeyWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:CreateGroupCreateGroupWrite
Group
acs:ram:*:{#accountId}:group/*
ram:CreateLoginProfileCreateLoginProfileWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:CreatePolicyCreatePolicyWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:CreatePolicyVersionCreatePolicyVersionWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:CreateRoleCreateRoleWrite
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:CreateUserCreateUserWrite
User
acs:ram:*:{#accountId}:user/*
ram:CreateVirtualMFADeviceCreateVirtualMFADeviceWrite
MFADevice
acs:ram:*:{#accountId}:mfa/*
ram:DecodeDiagnosticMessageDecodeDiagnosticMessageRead
全部资源
*
ram:DeleteAccessKeyDeleteAccessKeyWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DeleteGroupDeleteGroupWrite
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:DeleteLoginProfileDeleteLoginProfileWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DeletePolicyDeletePolicyWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:DeletePolicyVersionDeletePolicyVersionWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:DeleteRoleDeleteRoleWrite
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:DeleteUserDeleteUserWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DeleteVirtualMFADeviceDeleteVirtualMFADeviceWrite
全部资源
*
ram:DetachPolicyFromGroupDetachPolicyFromGroupWrite
Group
acs:ram:*:{#accountId}:group/{#GroupName}
Policy
acs:ram:*:system:policy/{#PolicyName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:DetachPolicyFromRoleDetachPolicyFromRoleWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Role
acs:ram:*:{#accountId}:role/{#RoleName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:DetachPolicyFromUserDetachPolicyFromUserWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
User
acs:ram:*:{#accountId}:user/{#UserName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:GetAccountAliasGetAccountAliasRead
全部资源
*
ram:GetGroupGetGroupRead
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:GetLoginProfileGetLoginProfileRead
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:GetPasswordPolicyGetPasswordPolicyRead
全部资源
*
ram:GetPolicyGetPolicyRead
Policy
acs:ram:*:system:policy/{#PolicyName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:GetPolicyVersionGetPolicyVersionRead
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:GetRoleGetRoleRead
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:GetSecurityPreferenceGetSecurityPreferenceRead
全部资源
*
ram:GetUserGetUserRead
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:GetUserMFAInfoGetUserMFAInfoRead
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListAccessKeysListAccessKeysRead
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListEntitiesForPolicyListEntitiesForPolicyRead
Policy
acs:ram:*:system:policy/{#PolicyName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:ListGroupsListGroupsRead
Group
acs:ram:*:{#accountId}:group/*
ram:ListGroupsForUserListGroupsForUserRead
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListPoliciesListPoliciesRead
Policy
acs:ram:*:{#accountId}:policy/*
ram:ListPoliciesForGroupListPoliciesForGroupRead
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:ListPoliciesForRoleListPoliciesForRoleRead
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:ListPoliciesForUserListPoliciesForUserRead
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListPolicyVersionsListPolicyVersionsRead
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:ListRolesListRolesRead
Role
acs:ram:*:{#accountId}:role/*
ram:ListUsersListUsersRead
User
acs:ram:*:{#accountId}:user/*
ram:ListUsersForGroupListUsersForGroupRead
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:ListVirtualMFADevicesListVirtualMFADevicesRead
MFADevice
acs:ram:*:{#accountId}:mfa/*
ram:RemoveUserFromGroupRemoveUserFromGroupWrite
Group
acs:ram:*:{#accountId}:group/{#GroupName}
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:SetAccountAliasSetAccountAliasWrite
全部资源
*
ram:SetDefaultPolicyVersionSetDefaultPolicyVersionWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:SetPasswordPolicySetPasswordPolicyWrite
全部资源
*
ram:SetSecurityPreferenceSetSecurityPreferenceWrite
全部资源
*
ram:UnbindMFADeviceUnbindMFADeviceWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:UpdateAccessKeyUpdateAccessKeyWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:UpdateGroupUpdateGroupWrite
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:UpdateLoginProfileUpdateLoginProfileWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:UpdatePolicyDescriptionUpdatePolicyDescriptionWrite
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:UpdateRoleUpdateRoleWrite
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:UpdateUserUpdateUserWrite
User
acs:ram:*:{#accountId}:user/{#UserName}

资源(Resource)

下表是访问控制(RAM)定义的资源,这些资源可以在RAM权限策略语句的Resource元素中使用,用来授予对该资源执行具体操作的权限。 其中,资源ARN是资源在阿里云上的唯一标识。具体说明如下:
  • {#}为变量标识,需要您替换为实际值。例如:{#ramcode}需要您替换为实际的云服务RAM代码。
  • *表示全部。例如:
    • {#resourceType}*时:表示全部资源。
    • {#regionId}*时:表示全部地域。
    • {#accountId}*时:表示全部阿里云账号。
资源类型资源ARN
Groupacs:ram::{#accountId}:group/{#GroupName}
Useracs:ram::{#accountId}:user/{#UserName}
Policyacs:ram::{#accountId}:policy/{#PolicyName}
Roleacs:ram::{#accountId}:role/{#RoleName}
MFADeviceacs:{#ramcode}:*:{#accountId}:mfadevice/{#SerialNumber}

条件(Condition)

下表是访问控制(RAM)定义的产品级条件关键字,这些条件关键字可以在RAM权限策略语句的Condition元素中使用,用来描述授予权限的条件。以下仅列举产品级的条件关键字,阿里云定义的通用条件关键字也同样适用访问控制(RAM)
其中,数据类型决定了您可以使用哪些条件运算符将请求中的值与权限策略语句中的值进行比较。您必须使用与数据类型匹配的条件运算符,否则无法匹配策略语句,授权行为无效。数据类型与条件运算符的对应关系,请参见条件操作类型
条件关键字描述类型
acs:Service角色可以被传递给云服务的标识,此限制条件仅适用于 PassRole 操作。取值示例:actiontrail.aliyuncs.comString
ram:TrustedPrincipalTypes角色可信实体的类型,多值。String
ram:ServiceNames服务角色可信的云服务标识,多值,取值示例:["ecs.aliyun.com","rds.aliyuncs.com"]String

相关操作

您可以创建自定义权限策略,并将权限策略授予RAM用户、RAM用户组或RAM角色。具体操作如下:
  • 本页导读 (1)
文档反馈