All Products
Search
Document Center

MaxCompute:MaxCompute service-linked role

Last Updated:Feb 27, 2026

MaxCompute requires cross-service access to other big data computing services such as Hologres. To authorize this access, MaxCompute uses the service-linked role AliyunServiceRoleForMaxComputeIdentityMgmt. This role is a Resource Access Management (RAM) role whose trusted entity is an Alibaba Cloud service. Unlike regular RAM roles, a service-linked role has a fixed permission policy that the service controls.

Role details

PropertyValue
Role nameAliyunServiceRoleForMaxComputeIdentityMgmt
Permission policyAliyunServiceRolePolicyForMaxComputeIdentityMgmt
Trusted serviceidentity.odps.aliyuncs.com

Permission policy document

The permission policy grants MaxCompute the following actions:

  • odps:ActOnBehalfOfAUser: Perform operations as a user when accessing integrated big data services such as Hologres.

  • odps:ActOnBehalfOfAnotherUser: Perform operations on behalf of another user when accessing integrated big data services.

  • ram:DeleteServiceLinkedRole: Delete this service-linked role when the identity.odps.aliyuncs.com service principal is specified.

{
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "odps:ActOnBehalfOfAUser",
        "odps:ActOnBehalfOfAnotherUser"
      ],
      "Resource": "acs:odps:*:*:users/*"
    },
    {
      "Action": "ram:DeleteServiceLinkedRole",
      "Resource": "*",
      "Effect": "Allow",
      "Condition": {
        "StringEquals": {
          "ram:ServiceName": "identity.odps.aliyuncs.com"
        }
      }
    }
  ],
  "Version": "1"
}

Required permissions for RAM users

To create or delete this service-linked role as a RAM user, attach the AliyunMaxComputeFullAccess policy, or add the following actions to a custom policy:

ActionPermission
Createram:CreateServiceLinkedRole
Deleteram:DeleteServiceLinkedRole

For more information, see Permissions required to create and delete a service-linked role.

Create the service-linked role

Create the service-linked role using one of the following methods.

During MaxCompute activation

Click Create Service-linked Role on the MaxCompute activation page.

Create the service-linked role during MaxCompute activation

After MaxCompute activation

Go to the RAM Quick Authorization page and assign the role to MaxCompute.

Create the service-linked role after MaxCompute activation

View the service-linked role

After you create the role, go to the Roles page in the RAM console and search for AliyunServiceRoleForMaxComputeIdentityMgmt. The role details page shows the following information:

  • Basic Information: Role name, creation time, Alibaba Cloud Resource Name (ARN), and description.

  • Permissions: Click the policy name to view the policy document and the cloud resources that the role can access.

  • Trust Policy: The trust policy document that specifies which service can assume this role. The Service field identifies the trusted entity (identity.odps.aliyuncs.com).

For more information, see View the information about a RAM role.

Delete the service-linked role

If you no longer use MaxCompute, delete the service-linked role in the RAM console. For more information, see Delete a RAM role.

Note

After you delete AliyunServiceRoleForMaxComputeIdentityMgmt, MaxCompute can no longer access other big data computing services such as Hologres. Verify that you no longer need cross-service access before deleting this role.