All Products
Search
Document Center

Container Service for Kubernetes:Attach system permission policies to RAM users or RAM roles

Last Updated:Mar 26, 2026

By default, Resource Access Management (RAM) users have no access to cloud service APIs. To operate ACK One resources—such as Fleet instances, registered clusters, and workflow clusters—RAM users or RAM roles must be granted the appropriate permissions. ACK One provides built-in system policies that cover read and write access at different levels.

This topic describes how to attach system permission policies to RAM users or RAM roles using the RAM console.

Prerequisites

Before you begin, ensure that you have:

Important

Only an Alibaba Cloud account or a RAM administrator account can grant permissions to RAM users or RAM roles. A RAM user cannot grant permissions.

System permission policies for ACK One

The following table lists the built-in system policies supported by ACK One and the cluster types each policy applies to.

Policy name Description Registered clusters Fleet instances Workflow clusters
AliyunAdcpFullAccess Full read and write access to all ACK One resources Yes Yes Yes
AliyunAdcpReadOnlyAccess Read-only access to all ACK One resources Yes Yes Yes
AliyunCSFullAccess Full read and write access to all Container Service for Kubernetes (ACK) resources. Does not apply to workflow clusters. Yes Yes No
AliyunCSReadOnlyAccess Read-only access to all ACK resources. Does not apply to workflow clusters. Yes Yes No
AliyunVPCReadOnlyAccess Allows specifying a virtual private cloud (VPC) when creating an ACK cluster Yes Yes Yes
AliyunECIReadOnlyAccess Allows scheduling pods to elastic container instances (ECI) Yes Yes Yes
AliyunLogReadOnlyAccess Allows selecting an existing log project for cluster logs or viewing configuration inspection results Yes Yes Yes
AliyunARMSReadOnlyAccess Allows viewing monitoring data from the Managed Service for Prometheus plug-in Yes Yes Yes
AliyunRAMReadOnlyAccess Allows viewing existing RAM policies Yes Yes Yes
AliyunECSReadOnlyAccess Allows adding existing nodes in the cloud to a cluster or viewing node details. Does not apply to Fleet instances or workflow clusters. Yes No No
AliyunContainerRegistryReadOnlyAccess Allows viewing application images in the Alibaba Cloud account. Does not apply to Fleet instances or workflow clusters. Yes No No
AliyunAHASReadOnlyAccess Allows using the cluster topology feature. Does not apply to Fleet instances or workflow clusters. Yes No No
AliyunYundunSASReadOnlyAccess Allows viewing runtime monitoring data for a cluster. Does not apply to Fleet instances or workflow clusters. Yes No No
AliyunKMSReadOnlyAccess Allows enabling Secret encryption when creating a cluster. Does not apply to Fleet instances or workflow clusters. Yes No No
AliyunESSReadOnlyAccess Allows node pool operations, including viewing, modifying, and scaling node pools. Does not apply to Fleet instances or workflow clusters. Yes No No
To grant full read and write access across all ACK One resource types, attach AliyunAdcpFullAccess. For read-only access across all resource types, use AliyunAdcpReadOnlyAccess. The AliyunCSFullAccess and AliyunCSReadOnlyAccess policies cover registered clusters and Fleet instances but do not grant access to workflow clusters.

Grant permissions to a RAM user or RAM role

  1. Log on to the RAM console as a RAM administrator.

  2. In the left-side navigation pane, choose Identities > Users.

  3. On the Users page, find the target RAM user and click Add Permissions in the Actions column. To grant permissions to multiple RAM users at once, select the users and click Add Permissions at the bottom of the page.

    image

  4. In the Grant Permission panel, configure the following parameters:

    1. Resource Scope: Choose where the policy takes effect.

    2. Principal: The RAM user to grant permissions to. The current RAM user is selected by default.

    3. Policy: Select one or more policies to attach. Policies fall into two types:

      • System policies: Predefined by Alibaba Cloud. These policies cannot be modified, and Alibaba Cloud manages version updates. For a full list, see Services that work with RAM.

        Note

        The RAM console automatically flags high-risk system policies such as AdministratorAccess and AliyunRAMFullAccess. Avoid attaching these policies unless explicitly required.

      • Custom policies: Policies that you create and manage. For instructions, see Create a custom policy.

    4. Click Grant permissions.

What's next

System permission policies control access to ACK One resources. To manage Kubernetes resources within a specific cluster—such as creating GitOps applications or workflows—grant the RAM user or RAM role Role-Based Access Control (RBAC) permissions on the Fleet instance, workflow cluster, and their namespaces. For instructions, see Grant RBAC permissions to a RAM user or RAM role.