全部产品
Search
文档中心

访问控制:授权信息

更新时间:Aug 14, 2024
访问控制(RAM)是阿里云提供的管理用户身份与资源访问权限的服务。使用RAM可以让您避免与其他用户共享阿里云账号密钥,并可按需为用户授予最小权限。RAM中使用权限策略描述授权的具体内容。
本文为您介绍访问控制(RAM)为RAM权限策略定义的操作(Action)、资源(Resource)和条件(Condition)。访问控制(RAM)的RAM代码(RamCode)为ram,sts,支持的授权粒度为RESOURCE

权限策略通用结构

权限策略支持JSON格式,其通用结构如下:
{
  "Version": "1",
  "Statement": [
    {
      "Effect": "<Effect>",
      "Action": "<Action>",
      "Resource": "<Resource>",
      "Condition": {
        "<Condition_operator>": {
          "<Condition_key>": [
            "<Condition_value>"
          ]
        }
      }
    }
  ]
}
各字段含义如下:
  • Effect:权限策略效果。取值:Allow(允许)、Deny(拒绝)。
  • Action:授予允许或拒绝权限的具体操作。具体信息,请参见操作(Action)
  • Resource:受操作影响的具体对象,您可以使用资源ARN来描述指定资源。具体信息,请参见资源(Resource)
  • Condition:指授权生效的条件。可选字段。具体信息,请参见条件(Condition)
    • Condition_operator:条件运算符,不同类型的条件对应不同的条件运算符。具体信息,请参见权限策略基本元素
    • Condition_key:条件关键字。
    • Condition_value:条件关键字对应的值。

操作(Action)

下表是访问控制(RAM)定义的操作,这些操作可以在RAM权限策略语句的Action元素中使用,用来授予执行该操作的权限。下面对表中的具体项提供说明:
  • 操作:是指具体的权限点。
  • API:是指操作对应的API接口。
  • 访问级别:是指每个操作的访问级别,取值为写入(Write)、读取(Read)或列出(List)。
  • 资源类型:是指操作中支持授权的资源类型。具体说明如下:
    • 对于必选的资源类型,用背景高亮的方式表示。
    • 对于不支持资源级授权的操作,用全部资源表示。
  • 条件关键字:是指云产品自身定义的条件关键字。该列不体现适用于任何操作的通用条件关键字
  • 关联操作:是指成功执行操作所需要的其他权限。操作者必须同时具备关联操作的权限,操作才能成功。
操作API访问级别资源类型条件关键字关联操作
ram:ChangePasswordChangePasswordupdate
全部资源
*
ram:ClearAccountAliasClearAccountAliasupdate
全部资源
*
ram:CreateUserCreateUsercreate
User
acs:ram:*:{#accountId}:user/*
ram:UpdateRoleUpdateRoleupdate
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:CreatePolicyCreatePolicycreate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:CreatePolicyVersionCreatePolicyVersioncreate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:CreateGroupCreateGroupcreate
Group
acs:ram:*:{#accountId}:group/*
ram:ListUsersListUsersget
User
acs:ram:*:{#accountId}:user/*
ram:GetPolicyVersionGetPolicyVersionget
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:GetLoginProfileGetLoginProfileget
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:GetGroupGetGroupget
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:DeleteLoginProfileDeleteLoginProfiledelete
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:UnbindMFADeviceUnbindMFADeviceupdate
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DeletePolicyDeletePolicydelete
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:ListPoliciesForGroupListPoliciesForGroupget
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:ListVirtualMFADevicesListVirtualMFADevicesget
MFADevice
acs:ram:*:{#accountId}:mfa/*
ram:ListPoliciesForUserListPoliciesForUserget
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:GetSecurityPreferenceGetSecurityPreferenceget
全部资源
*
ram:DeleteUserDeleteUserdelete
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:SetAccountAliasSetAccountAliasupdate
全部资源
*
ram:ListGroupsListGroupsget
Group
acs:ram:*:{#accountId}:group/*
ram:AttachPolicyToGroupAttachPolicyToGroupupdate
Group
acs:ram:*:{#accountId}:group/{#GroupName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:SetSecurityPreferenceSetSecurityPreferenceupdate
全部资源
*
ram:SetPasswordPolicySetPasswordPolicyupdate
全部资源
*
ram:ListPolicyVersionsListPolicyVersionsget
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:ListUsersForGroupListUsersForGroupget
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:GetPasswordPolicyGetPasswordPolicyget
全部资源
*
ram:GetRoleGetRoleget
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:ListEntitiesForPolicyListEntitiesForPolicyget
Policy
acs:ram:*:system:policy/{#PolicyName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:AttachPolicyToUserAttachPolicyToUserupdate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
User
acs:ram:*:{#accountId}:user/{#UserName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:UpdateAccessKeyUpdateAccessKeyupdate
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DetachPolicyFromRoleDetachPolicyFromRoleupdate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Role
acs:ram:*:{#accountId}:role/{#RoleName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:DeletePolicyVersionDeletePolicyVersiondelete
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:UpdateUserUpdateUserupdate
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListGroupsForUserListGroupsForUserget
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:AttachPolicyToRoleAttachPolicyToRoleupdate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
Role
acs:ram:*:{#accountId}:role/{#RoleName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:UpdatePolicyDescriptionUpdatePolicyDescriptionupdate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:ListPoliciesListPoliciesget
Policy
acs:ram:*:{#accountId}:policy/*
ram:BindMFADeviceBindMFADeviceWrite
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListRolesListRolesget
Role
acs:ram:*:{#accountId}:role/*
ram:DetachPolicyFromUserDetachPolicyFromUserupdate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
User
acs:ram:*:{#accountId}:user/{#UserName}
Policy
acs:ram:*:system:policy/{#PolicyName}
ram:UpdateGroupUpdateGroupupdate
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:DeleteRoleDeleteRoledelete
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:GetUserMFAInfoGetUserMFAInfoget
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DetachPolicyFromGroupDetachPolicyFromGroupupdate
Group
acs:ram:*:{#accountId}:group/{#GroupName}
Policy
acs:ram:*:system:policy/{#PolicyName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:DeleteGroupDeleteGroupdelete
Group
acs:ram:*:{#accountId}:group/{#GroupName}
ram:CreateVirtualMFADeviceCreateVirtualMFADevicecreate
MFADevice
acs:ram:*:{#accountId}:mfa/*
ram:CreateRoleCreateRolecreate
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:TrustedPrincipalTypes
ram:ServiceNames
ram:GetAccountAliasGetAccountAliasget
全部资源
*
ram:RemoveUserFromGroupRemoveUserFromGroupupdate
Group
acs:ram:*:{#accountId}:group/{#GroupName}
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DecodeDiagnosticMessageDecodeDiagnosticMessageget
全部资源
*
ram:AddUserToGroupAddUserToGroupcreate
Group
acs:ram:*:{#accountId}:group/{#GroupName}
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:CreateLoginProfileCreateLoginProfilecreate
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:ListAccessKeysListAccessKeysget
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DeleteAccessKeyDeleteAccessKeydelete
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:SetDefaultPolicyVersionSetDefaultPolicyVersionupdate
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:ListPoliciesForRoleListPoliciesForRoleget
Role
acs:ram:*:{#accountId}:role/{#RoleName}
ram:UpdateLoginProfileUpdateLoginProfileupdate
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:GetPolicyGetPolicyget
Policy
acs:ram:*:system:policy/{#PolicyName}
Policy
acs:ram:*:{#accountId}:policy/{#PolicyName}
ram:CreateAccessKeyCreateAccessKeycreate
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:GetUserGetUserget
User
acs:ram:*:{#accountId}:user/{#UserName}
ram:DeleteVirtualMFADeviceDeleteVirtualMFADevicedelete
MFADevice
acs:ram:*:{#accountId}:mfa/{#SerialNumber}

资源(Resource)

下表是访问控制(RAM)定义的资源,这些资源可以在RAM权限策略语句的Resource元素中使用,用来授予对该资源执行具体操作的权限。 其中,资源ARN是资源在阿里云上的唯一标识。具体说明如下:
  • {#}为变量标识,需要您替换为实际值。例如:{#ramcode}需要您替换为实际的云服务RAM代码。
  • *表示全部。例如:
    • {#resourceType}*时:表示全部资源。
    • {#regionId}*时:表示全部地域。
    • {#accountId}*时:表示全部阿里云账号。
资源类型资源ARN
Useracs:ram:*:{#accountId}:user/{#UserName}
Unrestrictedacs:ram:*:{#accountId}:*
Useracs:ram::{#accountId}:user/{#UserName}
Useracs:ram:*:{#accountId}:user/*
Roleacs:ram:*:{#accountId}:role/{#RoleName}
Policyacs:ram:*:{#accountId}:policy/{#PolicyName}
Groupacs:ram:*:{#accountId}:group/*
Policyacs:ram:*:system:policy/{#PolicyName}
Groupacs:ram:*:{#accountId}:group/{#GroupName}
MFADeviceacs:ram:*:{#accountId}:mfa/*
User{#Arn}
Policyacs:ram:*:{#accountId}:policy/*
Roleacs:ram:*:{#accountId}:role/*
MFADeviceacs:ram:*:{#accountId}:mfa/{#SerialNumber}

条件(Condition)

下表是访问控制(RAM)定义的产品级条件关键字,这些条件关键字可以在RAM权限策略语句的Condition元素中使用,用来描述授予权限的条件。以下仅列举产品级的条件关键字,阿里云定义的通用条件关键字也同样适用访问控制(RAM)
其中,数据类型决定了您可以使用哪些条件运算符将请求中的值与权限策略语句中的值进行比较。您必须使用与数据类型匹配的条件运算符,否则无法匹配策略语句,授权行为无效。数据类型与条件运算符的对应关系,请参见条件操作类型
条件关键字描述类型
acs:Service角色可以被传递给云服务的标识,此限制条件仅适用于 PassRole 操作。取值示例:actiontrail.aliyuncs.comString
ram:TrustedPrincipalTypes角色可信实体的类型,多值。String
ram:ServiceNames服务角色可信的云服务标识,多值,取值示例:[&quot;ecs.aliyun.com&quot;,&quot;rds.aliyuncs.com&quot;]String

相关操作

您可以创建自定义权限策略,并将权限策略授予RAM用户、RAM用户组或RAM角色。具体操作如下: