All Products
Search
Document Center

Identity as a Service:ListApplicationsForUser

Last Updated:Jan 06, 2026

Queries the applications that an EIAM account can access and returns a paginated list of application IDs. To retrieve detailed information about a specific application, call the GetApplication operation.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

eiam:ListApplicationsForUser

list

*User

acs:eiam:{#regionId}:{#accountId}:instance/{#InstanceId}/user/{#UserId}

None None

Request parameters

Parameter

Type

Required

Description

Example

InstanceId

string

Yes

The instance ID.

idaas_ue2jvisn35ea5lmthk267xxxxx

PageNumber

integer

No

The page number.

1

PageSize

integer

No

The number of entries to return on each page.

20

ApplicationIds

array

No

The list of application IDs. You can specify up to 100 application IDs in a single request.

app_mkv7rgt4d7i4u7zqtzev2mxxxx

string

No

The application ID.

app_mkv7rgt4d7i4u7zqtzev2mxxxx

UserId

string

Yes

The account ID.

user_d6sbsuumeta4h66ec3il7yxxxx

QueryMode

string

No

The query mode. Default value: OnlyDirect. Valid values:

  • OnlyDirect: Queries only the direct permissions of the account. Direct permissions are granted for applications that are directly assigned to the account.

  • IncludeInherit: Queries both the direct and inherited permissions of the account. Inherited permissions are granted from the parent organizations or groups to which the account belongs.

OnlyDirect

Response elements

Element

Type

Description

Example

object

The response.

RequestId

string

The request ID.

0441BD79-92F3-53AA-8657-F8CE4A2B912A

TotalCount

integer

The total number of entries.

100

Applications

array<object>

The list of applications that the account is authorized to access.

array<object>

The application that the account is authorized to access.

ApplicationId

string

The application ID.

app_mkv7rgt4d7i4u7zqtzev2mxxxx

HasDirectAuthorization

boolean

Indicates whether a direct authorization exists. Valid values:

  • true: A direct authorization record exists between the application and the account.

  • false: No direct authorization record exists between the application and the account.

true

HasInheritAuthorization

boolean

Indicates whether an inherited authorization exists. Valid values:

  • true: A direct authorization record exists between the application and a parent organization or a group to which the account belongs.

  • false: No direct authorization record exists between the application and any of the parent organizations or groups to which the account belongs.

false

ApplicationRoles

array<object>

The list of application roles.

object

ApplicationRoleId

string

The ID of the application role.

app_role_mkv7rgt4ds8d8v0qtzev2mxxxx

HasDirectAuthorization

boolean

Indicates whether the role is directly assigned to the user.

true

HasInheritAuthorization

boolean

Indicates whether the role is inherited from an organization or a group to which the user belongs.

false

Examples

Success response

JSON format

{
  "RequestId": "0441BD79-92F3-53AA-8657-F8CE4A2B912A",
  "TotalCount": 100,
  "Applications": [
    {
      "ApplicationId": "app_mkv7rgt4d7i4u7zqtzev2mxxxx",
      "HasDirectAuthorization": true,
      "HasInheritAuthorization": false,
      "ApplicationRoles": [
        {
          "ApplicationRoleId": "app_role_mkv7rgt4ds8d8v0qtzev2mxxxx",
          "HasDirectAuthorization": true,
          "HasInheritAuthorization": false
        }
      ]
    }
  ]
}

Error codes

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.