Learn all about one of the world's biggest and most exciting cloud companies
Explore our global presence and deployment regions around the world
Learn what the top industry analyst firms are saying about Alibaba Cloud
Learn the basic knowledge about cloud computing
Get Free Hands-on Experience With over 40 Products
SSD Cloud server and data transfer for only $4.50 a month
19.6% IaaS Market Share in Asia Pacific - Gartner IT Service report, 2018
With Anti-DDoS Premium, DDoS Attacks are No Longer Your Worry
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
Deploy more on the cloud at a lower cost with Alibaba Cloud
Leverage the same tools powering the Alibaba Ecosystem
Get a head start on your career in the cloud. $0.99 cloud server and free training course for eligible students
Building successful businesses for small & medium sized Independent Software Vendors (ISVs) globally
Invite friends to join Alibaba Cloud and receive free coupons
Secure, scalable, and high-performing virtual servers
Simple Application Server
Powerful parallel computing capabilities
Adjust and automate computing resources
Distribute traffic across resources
Manage your Dockerized applications
A Certified Kubernetes platform
An agile and secure serverless container instance service
A secure image hosting platform
Simplify operations and management
High-performance public computing service
High-performance elastic bare metal computing service
Powerful parallel computing accelerated on RDMA network
Large-scale batch processing
Your Dedicated Host on the Cloud
Store, backup and archive your data
Table Storage
Speed up file distribution to end-users
File storage service for ECS, HPC, and Container Service
Hybrid Cloud Storage ArrayComing Soon
Manage your Dockerized applications
A BaaS solution that protects customer data on-premises and in the cloud
Cloud Storage Gateway provides both file and block storage services
An introduction to stable networking services
Launch a private cloud network
Physical leased line and VPC interconnection
Public Internet gateway
Distribute traffic across resources
An independent public IP resource
A BaaS solution that protects customer data on-premises and in the cloud
Easy-to-use and cost-effective data transfer plans
An introduction to fully managed database services
In-memory database caching
Based on AliSQL to provide excellent stability and performance
High performing and versatile managed database
Provides rich version control, flexible upgrades, and reduces business costs
Provides high concurrency to maintain low latency
An integrated data management solution
A premium, serverless, and interactive analytics service
Provides easy-to-use tools to reduce costs of migration and usage
ApsaraDB for MongoDB
Distributed memory database
Data migration and data synchronization
A reliable backup service to ensure data security
An online warehousing service
Mitigates single machine scalability problems for large-scale relational databases
Time Series DatabaseBeta
An introduction to intelligent security services
An introduction to intelligent security services
Protect against high volume DDoS attacks
Protect against global DDoS attacks
Secure your web applications
Provides high concurrency to maintain low latency
Comprehensive security detection, response and prevention for hosts
Apply, purchase and manage SSL certificates
Asset-Correlation-Based Vulnerability and Website Threat Detection Service
Managed security service for systems on the cloud
Image and video content moderation service
Comprehensive bot defense reduces automated attacks on your website
A reliable backup service to ensure data security
Security Center provides round the clock security and protection
A customizable network security solution
Real-time cloud monitoring service
Authorize users' and partners' resource access
Create and manage encryption keys
Implement security analytics, resource change tracking, and compliance audits
Do more with your API calls and requests
Use command-line to manage Cloud resources from browser
Big Data processing service
A fast and fully-hosted TB/PB-level data warehousing solution
A highly integrated platform for real-time data processing
A full data warehousing solution with only half the investment
Real-time and Offline Data Synchronization
Intelligent analytics & visualization suite for big data
Powerful and insightful big data visualization
High-precision visual search product solution
Chatbot platform for smart dialogue interactions
Full path intelligent data creation and management platform
An end-to-end platform to meet your machine learning and data mining needs
Elasticsearch-based engine for search and analytics
Customized and high-quality machine translation
A public cloud supported email that provides fast, secure, and stable services
Send messages between applications
Open your data and service to users
An all-in-one service for log-type data
A simple and efficient email service
Secure and stable blockchain platform service on cloud
Application deployment and microservices solutions
Supports reliable message-based asynchronous communication
Easily interact between the cloud and IoT mobile devices
Centralizes management of application configurations
Easily debug and analyze your applications
Build business monitoring capabilities throughout the product lifecycle
Guarantees application high availability
Alibaba Cloud's cloud-based solutions support the demands of your business, website, or application.
Explore helpful resources from the Alibaba Cloud community
Latest cloud insights and developer trends
Step-by-step tutorials and how-to videos
Find events near you
Share and read expert technical content
Build your first app with APIs, SDKs, and tutorials
Research that dives deep into the latest trends, technology and cloud insights.
Technical and business training programs
Gain recognition for community leadership
We help accelerate Internet companies' growth globally
Introduction to fundamental technologies in cloud computing
Join Create@Alibaba Cloud
Get Free Hands-on Experience With over 40 Products
SSD Cloud server and data transfer for only $4.50 a month
19.6% IaaS Market Share in Asia Pacific - Gartner IT Service report, 2018
With Anti-DDoS Premium, DDoS Attacks are No Longer Your Worry
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
Deploy more on the cloud at a lower cost with Alibaba Cloud
Leverage the same tools powering the Alibaba Ecosystem
Get a head start on your career in the cloud. $0.99 cloud server and free training course for eligible students
Building successful businesses for small & medium sized Independent Software Vendors (ISVs) globally
Invite friends to join Alibaba Cloud and receive free coupons
Join a global network of partners
Help to design and manage your system and applications
Join us to grow your business together with Alibaba Cloud
Join us to grow your business together with Alibaba Cloud
Secure your cloud resources with Resource Access Management to define fine-grained access permissions for users and groups
Alibaba Cloud Resource Access Management (RAM) is an identity and access control service which enables you to centrally manage your users (including employees, systems or applications) and securely control their access to your resources through permission levels. RAM thereby allows you to securely grant access permissions for Alibaba Cloud resources to only your selected high-privileged users, enterprise personnel and partners. This helps to ensure secure and appropriate usage of your cloud resources and protects from any unsolicited access to your account.
Tab #2 content goes here!
Donec pulvinar neque sed semper lacinia. Curabitur lacinia ullamcorper nibh; quis imperdiet velit eleifend ac. Donec blandit mauris eget aliquet lacinia! Donec pulvinar massa interdum risus ornare mollis. In hac habitasse platea dictumst. Ut euismod tempus hendrerit. Morbi ut adipiscing nisi. Etiam rutrum sodales gravida! Aliquam tellus orci, iaculis vel.
Tab #3 content goes here!
Donec pulvinar neque sed semper lacinia. Curabitur lacinia ullamcorper nibh; quis imperdiet velit eleifend ac. Donec blandit mauris eget aliquet lacinia! Donec pulvinar massa interdum ri.
Tab #4 content goes here!
Donec pulvinar neque sed semper lacinia. Curabitur lacinia ullamcorper nibh; quis imperdiet velit eleifend ac. Donec blandit mauris eget aliquet lacinia! Donec pulvinar massa interdum risus ornare mollis. In hac habitasse platea dictumst. Ut euismod tempus hendrerit. Morbi ut adipiscing nisi. Etiam rutrum sodales gravida! Aliquam tellus orci, iaculis vel.
User-based SSO
You can configure your IdP to specify a RAM user in the SAML assertion and use the RAM user to access Alibaba Cloud.
Role-based SSO
You can configure your IdP to specify a RAM role in the SAML assertion and use the RAM role to access Alibaba Cloud.
Fine-grained Authorization
Allows you to grant permission for one or multiple operations on a single resource. For example, a resource owner can grant permission to create, perform operations or delete resources
Multi-dimensional Authorization
Restricts access permissions by IP, time, and other factors
Version Management Mechanism
Retain multiple versions of each authorization policy to eliminate risk of unwanted policy deletion
Allows you to define and control various authorization policies for specific Alibaba Cloud resources meeting certain business conditions
Lets you grant read-only, full, or customized permissions to users, partners and enterprise employee accounts
Enables you to define user or service specific roles
User Identity Management
Create and manage user identities and grant permissions using the primary account
Multi-factor Authentication
Supports MFA devices that comply with TOTP protocol standard (RFC 6238) to keep user passwords secure and assign special permissions like shutting down virtual hosts
Independent Password Policy Management
Create custom password strength policies for users and set the number of allowed logon attempts, password validity periods, and other password policies
User Groups
Create and manage user groups for assigning the same set of permissions to multiple users
Access Keys
Set access keys for users wanting to perform operations using the console. You can also set up API access keys for users who require programmatic access
Execution Permission
Set permissions for allowing or denying execution of certain operations on specific resources under certain conditions
Custom Authorization
Use custom authorization policies to manage user permissions effectively
Group Permission
The group authorization mechanism allows for scenario-specific authorization to reduce the burdens associated with permission management
User Authorization
Grant user or user group authorization to users under your account, or even other Alibaba Cloud accounts
Custom Policy
Create, modify, and delete custom authorization policies to meet fine-grained access control requirements, such as only allowing operations on a specific ECS instance if the request comes from a particular IP address
Resource Access
Users can access resources and perform operations on them using the console, APIs, or client tools such as the Alibaba Cloud CLI (aliyun)
Access Permission
Security Token Service grants specific cloud resource access permissions to mobile clients, giving your mobile customers direct access to cloud resources
Custom Validity
Supports custom token validity periods for enhanced security
User Resource Access Methods
Provides users with security channels (such as SSL) to request access to specific cloud resources at the designated time and from the specified source IP
Role and External Account Identity Federation Management
Associate RAM roles with external identity systems (such as your local enterprise domain accounts or app accounts) and directly use an external identity to log on to a RAM role to access Alibaba Cloud console or API
Cloud Resources
Control instances created by RAM users in a centralized manner, so that you have full control over these instances and associated data after a user has left your organization
Free of Charge
RAM is offered at no additional cost. You are charged only for other Alibaba products/services used by RAM users
Consolidated Bill
Your account receives a consolidated bill for all expenses incurred from resource operations performed by all RAM users/accounts
Enterprise User Account Management and Permission Allocation
Temporary Authorization Management for Mobile Apps
Resource Operations and Authorization Management Between Enterprises
Enterprise User Account Management and Permission Allocation
An enterprise has a project for which it has purchased multiple cloud resources like ECS/RDS/SLB instances and OSS buckets. Employees with different responsibilities and permissions need to perform various operations. They can be allocated independent user or operator accounts to perform only those resource operations to which they have permissions. This way the enterprise does not compromise on security and can also grant/revoke permissions for any user account at any time. Also, charges for resource operations are billed collectively to the enterprise that is the primary account.
Recommended configuration for this scenario
RAM-user accounts and authorization management function
Advantages
- Bind the primary account to an MFA device and configure MFA for
the primary account to prevent risks caused by disclosure of primary account
password
- Activate RAM
- Create user accounts and RAM user accounts for different employees (or application
systems) and set logon passwords or create access keys as needed
- Create a group for multiple employees with same responsibilities and add users to
the group
- Create custom authorization policies and grant permissions by binding one or more
policies to groups/users
Temporary Authorization Management for Mobile Apps
An enterprise does not want to allow all apps to use the AppServer to transmit data. However, mobile apps run on mobile devices and controlling these devices is not possible. The enterprise also wants to minimize security risks by giving each app an access token with minimal permissions and reducing the access duration.
Recommended configuration for this scenario
RAM STS-tokens
Advantages
-To complete the authorization process, the enterprise creates a
role and grants permissions to the role by binding it with authorization
policy
-Enterprise creates a RAM-user for AppServer and authorizes this user to assume the
role it created
- AppServer issues STS-tokens for resource access
Resource Operations and Authorization Management Between Enterprises
Enterprise A has purchased multiple cloud resources and granted cloud resource O&M, monitoring management, and other tasks to Enterprise B. Enterprise B can allocate access permissions for A’s resources to one or more of its employees. B needs to precisely control the operations its employees can perform on A’s resources. A needs to revoke B’s permissions at will if the O&M entrustment contract is revoked.
Suggested configuration for this scenario
RAM roles for cross-account authorization
Advantages
-A role is created and permissions are granted for cross-account
authorization
-Cross-account resources can be accessed through the console by creating sub-users
and authorizing them to assume the role
1. How do I get started with Alibaba Cloud RAM?
Once you have signed up for Alibaba Cloud, you can either use web-based Alibaba Cloud Management Console or RAM APIs (for programmatic access) to create users and groups as well as assign them permissions to access different resources.
2. How does a sub-user sign into the Alibaba Cloud Management Console?
Visit the logon page or refer to the links on the Management Console dashboard.
3. Which Alibaba Cloud products and services support RAM integration?
| Service | Management Console | API | Reference |
| Elastic Compute Service | √ | √ | ECS Permission |
|---|---|---|---|
| ApsaraDB for RDS | √ | √ | RDS Permission |
| Server Load Balancer | √ | √ | SLB Permission |
| Virtual Private Cloud | √ | √ | VPC Permission |
| EIP | √ | √ | EIP Permission |
| Object Storage Service | √ | √ | OSS Permission |
| Table Store | √ | √ | TableStore Permission |
| Message Service | √ | √ | MessageService Permission |
| Alibaba Cloud CDN | √ | √ | CDN Permission |
| ApsaraDB for Redis | √ | √ | |
| ApsaraDB for Memcache | √ | √ | |
| CloudMonitor | √ | √ | |
| Server Guard | √ | 〇 | |
| Anti-DDoS | √ | 〇 | |
| Mobile Security | √ | 〇 | |
| Support Center | √ | 〇 |
4. What is a RAM-role?
A RAM-Role is a virtual user (shadow account) or a type of RAM user. This user has a fixed identity and can be granted policies. However, a RAM-Role must be assumed by an authorized real user.
5. Which operation permissions are granted to a new RAM-user?
By default, a new RAM user has no operation permissions. A RAM user represents an operator and must be explicitly authorized to perform any operation. The user can perform resource operations through the RAM console or APIs, only after being authorized.
6. What are authorization policies?
An authorization policy is a group of permissions described using Authorization Policy Language. It can precisely define the authorized resource set and operation set, as well as the authorization conditions.
7. How do I view all system authorization policies supported by Alibaba Cloud?
To view all the system authorization policies supported by Alibaba Cloud, log on to the RAM console and go to the Authorization Policy Management page to view a list of all system authorization policies.
8. What is a RoleARN?
A RoleARN is the global resource descriptor that specifies a role. RoleARNs follow
Alibaba Cloud’s ARN naming rules.
For example, the RoleARN for the “devops” role of an Alibaba Cloud account:
acs:ram::1234567890123456:role/devops.
9. How do I delete an authorization policy with multiple versions?
Authorization policies which have been edited and saved multiple times will have several attached "versions". Once these have been deleted from the RAM console, the remaining "default" authorization policy can be deleted, which will completely remove the policy from your Alibaba Cloud account.
10. How do I assign commonly used permissions?
Alibaba Cloud provides System Authorization Policies, a set of commonly used permissions that you can attach to RAM users, groups, and roles. These policies are a group of comprehensive permission sets created and managed by Alibaba Cloud, such as read-only permission for ECS or full permissions for ECS. You can use these policies but not modify them.
11. How do I create a custom authorization policy?
1. Access the RAM console, select Policy Management and then Custom Policies.
2. Click “New Authorization Policy.”
3. Select a template from the list (for example, AliyunOSSReadOnlyAccess).
4. Edit the name, remarks, and content of the authorization policy as needed.
5. After making necessary changes, click “Add Policy” to create the custom authorization policy.
12. How do I attach an authorization policy to a group?
1. Logon to the RAM console and go to Group Management.
2. Select a group, and click “Authorize” to go to the Edit Authorization Policy page.
3. Select the name of the relevant authorization policy to grant permissions to the group.
13. How do I assign the same set of permissions to multiple RAM users?
You can attach authorization policird to RAM groups. All users in the group will be granted the permissions associated with the group.
14. What kinds of security credentials can RAM users have?
RAM users can access cloud services through APIs or by logging into the Alibaba Cloud Management console with the help of access keys. You can also enable Multi-Factor Authentication (MFA) which requires another verification code (second security factor provided by the user’s MFA device) after entering username and password. This provides another layer of security for your account.
1 on 1 Presale Consultation, 24/7 Technical Support, Faster Response, and More Tickets.
Consulting by experienced cloud experts. Learn
More
Extended service time from 10 hours 5 days a week to 24/7. Learn More
The number of free tickets doubled from 3 to 6 per quarter. Learn More
Shorten after-sale response time from 36 hours to 18 hours. Learn More