All Products
Search
Document Center

Realtime Compute for Apache Flink:Development console permissions

Last Updated:Mar 26, 2026

To let team members collaborate on a Flink project — developing jobs, running Operations and Maintenance (O&M), or viewing results — add them as members and assign a role. This topic explains the role types, common permission issues, and the authorization procedure.

How to use this topic

You are... Go to...
A project owner or admin who needs to add team members Authorization procedure
A member who cannot access a project Authorization scenarios
Someone deciding which role to assign Role types
Looking up what a role can do Fine-grained permission list

Authorization scenarios

If you encounter a permission error in the development console, identify which scenario applies:

Scenario Interface What it means and what to do
Cannot access the current project image.png Your account has no access to this project. Ask a member with the owner role or a user with member management permissions to assign you the viewer role or higher. After the permission is granted, refresh the page or access it again.
Cannot use a specific feature or operation Your role lacks the permission for this action. Ask a member with the owner role or a user with role management permissions to update your custom role's permissions.

Role types

A role is a collection of permissions. The development console provides two types: system roles and custom roles.

Role type Description Constraints
System role Three built-in roles: owner, editor, and viewer. For a full comparison, see Fine-grained permission list. Cannot be modified or deleted. For permissions outside the fine-grained list — such as metadata management or UDF management in SQL development — assign the editor or owner role.
Custom role Create when system roles do not meet your fine-grained authorization needs. Extend permissions from the viewer or editor baseline. Must include all viewer permissions. Only owner-role members or users with role management permissions can create, edit, or delete custom roles. Maximum 10 custom roles per project. Some permissions have dependencies — the system selects these automatically.

Prerequisites

Before you begin, ensure that you have read the Authorization instructions.

Authorization procedure

Step 1 (optional): Create a custom role

Skip this step if a system role (owner, editor, or viewer) meets your needs.

  1. Log in to the development console as a member with the owner role or role management permissions.

  2. At the top of the page, select the target project.

    image.png

  3. In the left navigation pane, go to Security > Permission Management, then click the Role Management tab.

  4. Click Add Role and fill in the fields.

    Parameter Description
    Role Name Must start with a letter. Can contain letters, digits, and hyphens (-). Maximum 64 characters.
    Role Description Describes the role's purpose and permission scope. Maximum 256 characters.
    Role Permissions Select the permissions for this role. Some permissions have dependencies — the system automatically selects required dependencies. For details, see Fine-grained permission list.
  5. Click OK. The new role appears in the list. From the Actions column, you can:

    • View Permissions — see all permissions assigned to the role.

    • View Members — see which members have this role.

    • Edit Permissions — add or remove permissions (requires role editing permissions).

    • Delete Custom Role — remove all members from the role or reassign them first, then delete it (requires role deletion permissions).

    image

Step 2: Attach a role to a member

  1. Log in to the development console as a member with the owner role or member creation permissions.

  2. At the top of the page, select the target project.

    image.png

  3. In the left navigation pane, go to Security > Permission Management, then click the Member Management tab.

  4. Click Add Member, select an account, and assign a Role.

    Field Details
    Select RAM account Lists the Resource Access Management (RAM) users and RAM roles under the Alibaba Cloud account for this project. Select one or more.
    Add account manually Enter an Alibaba Cloud account ID, RAM user ID (UID), or RAM role ID directly. To find these IDs: Account ID — click your profile picture in the upper-right corner, then go to Account Center > Security Settings > Account ID. RAM user UID — see View the information about a RAM user. RAM role ID — see View the information about a RAM role.
    Role Select a system role or a custom role. To preview a role's permissions, go to Role Management and click View Permissions in the Actions column.

    项目空间授权.png

  5. Click OK.

Step 3: Access the console after authorization

After authorization is complete, the new member can use the development console.

  • Already logged in: Refresh the page to access the project.

  • Not yet logged in: Access the project directly using the project URL.

Fine-grained permission list

The table below shows what each system role can do. Use this as a reference when choosing between system roles or designing custom roles.

Category Permission owner editor viewer
ETL/Data ingestion View list of SQL/YAML job drafts
Develop SQL/YAML job drafts (create, edit)
Debug SQL job drafts
Deep check SQL/YAML job drafts
Delete SQL/YAML job drafts
Deploy SQL/YAML job drafts
Data query View data query scripts
Edit data query scripts (create, edit, delete)
Execute data query scripts
Job O&M View list of O&M deployments
Deploy JAR and Python jobs
Update O&M deployment configuration
Delete O&M deployments
Start/Stop job instances
Data management View materialized tables
View metadata
View tables
Create materialized tables
Create catalogs
Create tables
Delete materialized tables
Delete catalogs
Delete tables
Edit materialized tables
File management View resources
Upload resources
Delete resources
Download resources
Session management View session clusters
Create session clusters
Update session cluster configuration
Start/Stop session clusters
Delete session clusters
Security Center View member list
View role list
View variable list
Create members
Create variables
Delete variables
Edit members
Delete members
Create roles
Edit roles
Delete roles
Configuration management View job templates
Edit job templates
Git configuration Pull code changes
Push code changes
Attach Git repository
Detach Git repository

What's next

If you use a RAM user or RAM role to access the Realtime Compute for Apache Flink management console for operations such as purchasing, viewing, or deleting workspaces, grant the required management console permissions. For details, see Management Console Authorization.

References