All Products
Search
Document Center

Quick BI:AddUserToWorkspace

Last Updated:Jan 14, 2026

Add a member to the specified workspace.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

quickbi-public:AddUserToWorkspace

create

*All Resource

*

None None

Request parameters

Parameter

Type

Required

Description

Example

WorkspaceId

string

Yes

The ID of the workspace.

95296e95-ca89-4c7d-8af9-dedf0ad0****

UserId

string

Yes

The ID of the Quick BI user to be added.

de4bc5f9429141cc8091cdd1c15b****

RoleId

integer

Yes

The preset space role ID. Value range:

  • 25: Space Administrator

  • 26: Space Developer

  • 27: Space Analyst

  • 30: Space Viewer

25

Response elements

Element

Type

Description

Example

object

RequestId

string

The request ID.

D787E1A3-A93C-424A-B626-C2B05DF8D885

Result

boolean

Returns the result of the interface execution. Value range:

  • true: Execution successful

  • false: Execution failed

true

Success

boolean

Indicates whether the request was successful. Value range:

  • true: Request successful

  • false: Request failed

true

Examples

Success response

JSON format

{
  "RequestId": "D787E1A3-A93C-424A-B626-C2B05DF8D885",
  "Result": true,
  "Success": true
}

Error codes

HTTP status code

Error code

Error message

Description

400 Workspace.NotIn.Organization The workspace is not owned by the organization. The workspace is not owned by the organization.
400 User.RoleType.Valid The role ID is invalid. The role ID is invalid.
400 Workspace.Not.Exist The group workspace does not exist. The group workspace does not exist.
400 Workspace.Type.Error The type of group workspace is invalid. The type of group workspace is invalid.
400 Viewer.AddInTo.Workspace Organization members with viewer type are not allowed to add to workspace: %s. Organization members with viewer type are not allowed to add to workspace: %s.
400 User.AlreadyIn.Workspace This user already exists. This user already exists.
400 User.AlreadyIn.Role The user is already assigned this role. The user is already assigned this role.
400 AnalystUser.NotSupport.AdminOrDevRole Analyst users do not support granting workspace administrator or developer roles.
400 UserAnalyst.NotSupport.ThisRole This role has permissions that analysts cannot grant. This role has permissions that analysts cannot grant.
400 Viewer.CannotHave.CustomRole Organization viewer cannot have custom roles. Organization viewer cannot have custom roles.
400 BindRole.NotExist.Error Bind role not exist, %s. Bind role not exist, %s.

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.