All Products
Search
Document Center

Managed Service for Prometheus:Grant ARMS permissions to RAM users

Last Updated:Mar 11, 2026

Managed Service for Prometheus is part of Application Real-Time Monitoring Service (ARMS). To let team members access Prometheus monitoring data without exposing your Alibaba Cloud account credentials, create Resource Access Management (RAM) users and assign them ARMS permission policies.

ARMS permission policies

ARMS provides two system policies for Managed Service for Prometheus:

PolicyPermissionsUse case
AliyunARMSFullAccessView, edit, and delete instances across all ARMS sub-servicesAdministrators and operators who manage Prometheus instances
AliyunARMSReadOnlyAccessView instance information across all ARMS sub-services (no edit or delete)Team members who only need to view dashboards and metrics
Note

AliyunARMSFullAccess already includes all read permissions. Do not attach both policies to the same RAM user.

Important

To grant read-only access scoped to a specific resource group, attach both the AliyunARMSReadOnlyAccess policy and the ReadTraceApp permission to the resource group. Without ReadTraceApp, ARMS cannot display the application list for that resource group.

Prerequisites

Before you begin, make sure that you have:

Step 1: Create a RAM user

  1. Log on to the RAM console with an Alibaba Cloud account or a RAM user that has administrative privileges.

  2. In the left-side navigation pane, choose Identities > Users.

  3. On the Users page, click Create User.

    Create User button

  4. In the User Account Information section, configure the following parameters:

    ParameterDescription
    Logon NameUp to 64 characters. Supports letters, digits, periods (.), hyphens (-), and underscores (_).
    Display NameUp to 128 characters.
    TagClick the edit icon to add tag key-value pairs for managing RAM users by tags.
    Note

    Click Add User to create multiple RAM users at once.

  5. In the Access Mode section, select an access mode.

    Select only one access mode per RAM user to separate human access from programmatic access.

    • Console Access: For team members who access Alibaba Cloud through a browser.

      SettingDescription
      Set Console PasswordSelect Automatically Regenerate Default Password or Reset Custom Password. Custom passwords must meet complexity requirements. For more information, see Configure a password policy for RAM users.
      Password ResetSpecify whether the RAM user must reset the password on the next logon.
      Enable MFATurn on multi-factor authentication (MFA) for the RAM user. After MFA is enabled, bind an MFA device to the RAM user. For more information, see Bind an MFA device to a RAM user.
    • Using permanent AccessKey to access: For applications that call API operations programmatically. This option is also referred to as OpenAPI Access in the console.

      The system automatically generates an AccessKey ID and AccessKey secret. For more information, see Obtain an AccessKey pair.

      Important

      The AccessKey secret is displayed only at creation time and cannot be retrieved later. Save it immediately.

      If an AccessKey pair is compromised, all resources under the account are at risk. For temporary access, use Security Token Service (STS) tokens instead. For more information, see Best practices for using access credentials to call API operations.

  6. Click OK.

  7. Complete security verification as prompted.

Step 2: Grant permissions to the RAM user

  1. Log on to the RAM console as a RAM administrator.

  2. In the left-side navigation pane, choose Identities > Users.

  3. Find the RAM user and click Add Permissions in the Actions column.

    Add Permissions button

    To grant permissions to multiple RAM users at once, select the RAM users and click Add Permissions at the bottom of the page.

  4. In the Grant Permission panel, configure the following parameters:

    1. Resource Scope: Select the scope for the authorization.

      ScopeDescription
      AccountPermissions apply to the entire Alibaba Cloud account.
      ResourceGroupPermissions apply to a specific resource group.
      Important

      If you select ResourceGroup, verify that ARMS supports resource groups. For more information, see Services that work with Resource Group. For an example of resource-group-scoped authorization, see Use a resource group to grant a RAM user the permissions to manage a specific ECS instance.

    2. Principal: The RAM user to authorize. The current RAM user is automatically selected.

    3. Policy: Select one or more policies to attach.

      Policy typeDescription
      System policiesPredefined by Alibaba Cloud and maintained automatically. Select AliyunARMSFullAccess or AliyunARMSReadOnlyAccess based on the access level required. For a full list of supported services, see Services that work with RAM.
      Custom policiesDefine your own policies for fine-grained access control. You can create, update, and delete custom policies. For more information, see Create a custom policy.
      Note

      The system flags high-risk policies such as AdministratorAccess and AliyunRAMFullAccess. Avoid attaching these policies unless necessary.

    4. Click Grant permissions.

  5. Click Close.

Share credentials and verify access

After the RAM user is created and authorized, share the logon credentials with the intended team member.

Log on to the Alibaba Cloud console

  1. Go to the RAM user logon page.

  2. Enter the RAM user logon name and click Next.

    RAM User Logon page

    Use one of the following logon name formats:

    FormatExampleWhen to use
    <UserName>@<AccountAlias>.onaliyun.comusername@company-alias.onaliyun.comDefault domain name. For more information, see Terms and View and modify the default domain name.
    <UserName>@<AccountAlias>username@company-aliasAccount alias. For more information, see Terms and View and modify the default domain name.
    <UserName>@<DomainAlias>username@example.comDomain alias (requires prior configuration). For more information, see Terms and Create and verify a domain alias.
  3. Enter the logon password and click Log On.

  4. (Optional) Complete MFA verification if MFA is enabled. For more information, see MFA overview and Bind an MFA device to a RAM user.

Call API operations with an AccessKey pair

Specify the AccessKey ID and AccessKey secret of the RAM user in your code to authenticate API requests.