All Products
Search
Document Center

Server Load Balancer:RAM authorization

最終更新日:Dec 12, 2025

Resource Access Management (RAM) is a service provided by Alibaba Cloud to manage user identities and resource access permissions. Using RAM helps you avoid sharing your Alibaba Cloud account keys with other users and allows you to grant users the least privilege access. RAM uses permission policies to define authorizations. This topic describes the general structure of a RAM policy, and the policy statement elements (Action, Resource, and Condition) defined by Server Load Balancer for RAM permission policies. The RAM code (RamCode) for Server Load Balancer is nlb , and the supported authorization granularity is RESOURCE .

General structure of a policy

Permission policies support JSON format with the following general structure:

{
  "Version": "1",
  "Statement": [
    {
      "Effect": "<Effect>",
      "Action": "<Action>",
      "Resource": "<Resource>",
      "Condition": {
        "<Condition_operator>": {
          "<Condition_key>": [
            "<Condition_value>"
          ]
        }
      }
    }
  ]
}        

The following list describes the fields in the policy:

  • Version: Specifies the policy version number. It is fixed at 1.

  • Statement:

    • Effect: Specifies the authorization result. Valid values: Allow and Deny.

    • Action: Specifies one or more operations that are allowed or denied.

    • Resource: Specifies the specific objects affected by the operations. You can use Alibaba Cloud Resource Names (ARNs) to describe specific resources.

    • Condition: Specifies the conditions for the authorization to take effect. This field is optional.

      • Condition operator: Specifies the conditional operators. Different types of conditions support different conditional operators.

      • Condition_key: Specifies the condition keys.

      • Condition_value: Specifies the condition values.

Action

The following table lists the actions defined by Server Load Balancer. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that support authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding ARN in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys that are applicable across all RAM-integrated services. For more information, see Common condition keys.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

API

Access level

Resource type

Condition key

Dependent action

nlb:CreateListener CreateListener create

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadbalancerId}

nlb:ListenerProtocol

nlb:SecurityPolicyId

None
nlb:ListSecurityPolicy ListSecurityPolicy get

*SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/*

None None
nlb:DescribeHdMonitorRegionConfig DescribeHdMonitorRegionConfig get

*All Resource

*

None None
nlb:TagResources TagResources create

ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}

LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:UpdateListenerAttribute UpdateListenerAttribute update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

nlb:SecurityPolicyId

None
nlb:UpdateLoadBalancerAddressTypeConfig UpdateLoadBalancerAddressTypeConfig update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

nlb:AddressType

None
nlb:DisableLoadBalancerIpv6Internet DisableLoadBalancerIpv6Internet update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:DeleteLoadBalancer DeleteLoadBalancer delete

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:GetLoadBalancerAttribute GetLoadBalancerAttribute get

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:DeleteListener DeleteListener delete

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:ListServerGroupServers ListServerGroupServers get

*ServerGroup

acs:nlb:{#regionId}:{#AccountId}:serverGroup/{#ServerGroupId}

None None
nlb:StartListener StartListener update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:UpdateServerGroupServersAttribute UpdateServerGroupServersAttribute update

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

None None
nlb:EnableLoadBalancerIpv6Internet EnableLoadBalancerIpv6Internet update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:CancelShiftLoadBalancerZones CancelShiftLoadBalancerZones update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#loadbalancerId}

None None
nlb:CreateSecurityPolicy CreateSecurityPolicy create

*SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/*

None None
nlb:CreateServerGroup CreateServerGroup create

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/*

*VPC

acs:vpc:{#regionId}:{#accountId}:vpc/{#VpcId}

None None
nlb:UpdateServerGroupAttribute UpdateServerGroupAttribute update

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

None None
nlb:ListLoadBalancers ListLoadBalancers get

LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/*

None None
nlb:UntagResources UntagResources delete

ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}

LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:DetachCommonBandwidthPackageFromLoadBalancer DetachCommonBandwidthPackageFromLoadBalancer update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:DeleteSecurityPolicy DeleteSecurityPolicy delete

*SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}

None None
nlb:DisassociateAdditionalCertificatesWithListener DisassociateAdditionalCertificatesWithListener update

*LoadBalancer

acs:nlb:{#regionId}:{#AccountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:UpdateLoadBalancerProtection UpdateLoadBalancerProtection update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#loadbalancerId}

None None
nlb:LoadBalancerLeaveSecurityGroup LoadBalancerLeaveSecurityGroup update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#loadbalancerId}

*SecurityGroup

acs:ecs:{#regionId}:{#accountId}:securitygroup/{#SecurityGroupId}

None None
nlb:ListAsynJobs ListAsynJobs get

*All Resource

*

None None
nlb:SetHdMonitorRegionConfig SetHdMonitorRegionConfig get

*All Resource

*

None None
nlb:StartShiftLoadBalancerZones StartShiftLoadBalancerZones update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#loadbalancerId}

None None
nlb:ListServerGroups ListServerGroups get

ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/*

ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

None None
nlb:ListListenerCertificates ListListenerCertificates get

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:ListListeners ListListeners get

*Listener

acs:nlb:{#regionId}:{#accountId}:listener/*

None None
nlb:StopListener StopListener update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:GetListenerHealthStatus GetListenerHealthStatus get

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:ListTagResources ListTagResources get

ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServergroupId}

LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadbalancerId}

SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}

None None
nlb:AssociateAdditionalCertificatesWithListener AssociateAdditionalCertificatesWithListener update

*LoadBalancer

acs:nlb:{#regionId}:{#AccountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:LoadBalancerJoinSecurityGroup LoadBalancerJoinSecurityGroup update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

*SecurityGroup

acs:ecs:{#regionId}:{#accountId}:securitygroup/{#SecurityGroupId}

None None
nlb:GetListenerAttribute GetListenerAttribute get

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:DeleteServerGroup DeleteServerGroup delete

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

None None
nlb:CreateLoadBalancer CreateLoadBalancer create

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/*

*VSwitch

acs:vpc:{#regionId}:{#accountId}:vswitch/{#VSwitchId}

EipAddress

acs:vpc:{#regionId}:{#accountId}:eip/{#AllocationId}

*VPC

acs:vpc:{#regionId}:{#accountId}:vpc/{#VpcId}

nlb:AddressType

None
nlb:AddServersToServerGroup AddServersToServerGroup create

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

Instance

acs:ecs:{#regionId}:{#accountId}:instance/{#InstanceId}

NetworkInterface

acs:ecs:{#regionId}:{#accountId}:eni/{#ServerId}

ContainerGroup

acs:eci:{#regionId}:{#accountId}:containergroup/{#ServerId}

None None
nlb:UpdateSecurityPolicyAttribute UpdateSecurityPolicyAttribute update

*SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}

None None
nlb:UpdateLoadBalancerZones UpdateLoadBalancerZones update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:UpdateLoadBalancerAttribute UpdateLoadBalancerAttribute update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

None None
nlb:MoveResourceGroup MoveResourceGroup update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#loadbalancerId}

*SecurityPolicy

acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#securitypolicyId}

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:serverGroup/{#serverGroupId}

None None
nlb:GetJobStatus GetJobStatus get

*All Resource

*

None None
nlb:AttachCommonBandwidthPackageToLoadBalancer AttachCommonBandwidthPackageToLoadBalancer update

*LoadBalancer

acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadBalancerId}

*CommonBandwidthPackage

acs:vpc:{#regionId}:{#accountId}:CommonBandwidthPackage/{#CommonBandwidthPackageId}

None None
nlb:RemoveServersFromServerGroup RemoveServersFromServerGroup delete

*ServerGroup

acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}

None None

Resource

The following table lists the resources defined by Server Load Balancer. Specify them in the Resource element of RAM policy statements to grant permissions for specific operations. They are uniquely identified by ARNs. Format: acs:{#ramcode}:{#regionId}:{#accountId}:{#resourceType}:

  • acs: The initialism of Alibaba Cloud service, which indicates the public cloud of Alibaba Cloud.

  • {#ramcode}: The code used in RAM to indicate an Alibaba Cloud service.

  • {#regionId}: The region ID. If the resource covers all regions, set it to an asterisk (*).

  • {#accountId}: The ID of the Alibaba Cloud account. If the resource covers all Alibaba Cloud accounts, set it to an asterisk (*).

  • {#resourceType}: The service-defined resource identifier. It supports a hierarchical structure, which is similar to a file path. If the statement covers global resources, set it to an asterisk (*).

Resource type

ARN

ServerGroup
  • acs:nlb:{#regionId}:{#accountId}:servergroup/{#ServerGroupId}
  • acs:nlb:{#regionId}:{#AccountId}:serverGroup/{#ServerGroupId}
  • acs:nlb:{#regionId}:{#accountId}:servergroup/*
SecurityPolicy
  • acs:nlb:{#regionId}:{#accountId}:securitypolicy/{#SecurityPolicyId}
  • acs:nlb:{#regionId}:{#accountId}:securitypolicy/*
LoadBalancer
  • acs:nlb:{#regionId}:{#accountId}:loadbalancer/{#LoadbalancerId}
  • acs:nlb:{#regionId}:{#accountId}:loadbalancer/*
VPC
  • acs:vpc:{#regionId}:{#accountId}:vpc/{#VpcId}
SecurityGroup
  • acs:ecs:{#regionId}:{#accountId}:securitygroup/{#SecurityGroupId}
Listener
  • acs:nlb:{#regionId}:{#accountId}:listener/*
VSwitch
  • acs:vpc:{#regionId}:{#accountId}:vswitch/{#VSwitchId}
EipAddress
  • acs:vpc:{#regionId}:{#accountId}:eip/{#AllocationId}
Instance
  • acs:ecs:{#regionId}:{#accountId}:instance/{#InstanceId}
NetworkInterface
  • acs:ecs:{#regionId}:{#accountId}:eni/{#ServerId}
ContainerGroup
  • acs:eci:{#regionId}:{#accountId}:containergroup/{#ServerId}
CommonBandwidthPackage
  • acs:vpc:{#regionId}:{#accountId}:CommonBandwidthPackage/{#CommonBandwidthPackageId}

Condition

The following table lists the product-level condition keys defined by Server Load Balancer. You can also use Alibaba Cloud's Common condition keys. Specify these keys in the Condition element of RAM policy statements to define granular authorization rules. In the condition key, specify the condition values in the Condition_value element of the policy.

Each condition key has a specific data type, such as string, number, Boolean, or IP address. The data type determines which conditional operators can be used to compare the request values against policy values. You must specify the conditional operators compatible with the data type of the condition key. Mismatched operators will invalidate the policy. See Condition operator for valid combinations.

Condition key

Description

Data type

nlb:ListenerProtocol Network Load Balancer Listener Protocol String
nlb:AddressType Network Load Balancer Address Type String
nlb:SecurityPolicyId Network Load Balancer Security Policy String

How to create custom RAM policies?

You can create custom policies and grant them to RAM users, RAM user groups, or RAM roles. For instructions, see: