Updated on 2026-01-12 GMT+08:00

CodeArts Console Permission Description

If you need to assign different permissions to employees in your enterprise to access your purchased CodeArts resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your resources.

With IAM, you can use your account to create IAM users, and assign permissions to the users to control their access to specific resources. For example, some software developers in your enterprise need to use CodeArts resources but should not be allowed to perform any other high-risk operations, such as buying CodeArts resources. In this scenario, you can create IAM users for the software developers and grant them only the permissions required for viewing CodeArts resources.

If you do not require individual IAM users, skip this chapter.

CodeArts Console Permissions

By default, new IAM users do not have any permissions. You need to add them to one or more groups, and then add permissions policies or roles to these groups. The users inherit permissions from their groups and can then perform specified operations on cloud services.

CodeArts is a project-level service deployed and accessed in specific physical regions. To assign permissions to a user group, specify the scope as region-specific projects and select projects for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing CodeArts, the users need to switch to a region where they have been authorized.

CodeArts uses policies for fine-grained authorization.

  • Policies: a type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This mechanism allows for more flexible authorization. Policies allow you to meet requirements for more secure access control. For example, you can grant CodeArts users only the permissions for performing specific operations on the CodeArts console.

Table 1 lists all system permissions of CodeArts.

Table 1 System permissions of CodeArts

Policy

Description

Type

DevCloud Console FullAccess

Full permissions for the CodeArts console. Users with these permissions can buy CodeArts resources.

System-defined policy

DevCloud Console ReadOnlyAccess

Full permissions for the CodeArts console. Users with these permissions can only view the usage of CodeArts resources.

System-defined policy

Table 2 lists the common operations supported by each system-defined policy of CodeArts. Select a proper policy as required.

Table 2 Common operations and system permissions

Console Operation

DevCloud Console FullAccess

DevCloud Console ReadOnlyAccess

Check CodeArts Req resource usage

View CodeArts Req subscription records

View CodeArts Req resources

Check CodeArts Repo resource usage

View CodeArts Repo subscription records

View CodeArts Repo resources

Check CodeArts Check resource usage

View CodeArts Check subscription records

View CodeArts Check resources

Check CodeArts Build resource usage

View CodeArts Build subscription records

View CodeArts Build resources

Check CodeArts TestPlan – Test Management resource usage

View CodeArts TestPlan – Test Management subscription records

View CodeArts TestPlan – Test Management resources

Subscribe to CodeArts TestPlan – APITest with pay-per-use billing

×

Unsubscribe from CodeArts TestPlan – APITest with pay-per-use billing

×

View CodeArts TestPlan – APITest subscription records

View CodeArts TestPlan – APITest resources

Check CodeArts TestPlan – APITest resource usage

Check CodeArts Artifact resource usage

View CodeArts Artifact subscription records

View CodeArts Artifact resources

Authorize an enterprise account

×

Cancel the authorization granted to an enterprise account

×

Accept or reject authorization to an enterprise account

×

View the authorization list

Subscribe to a pay-per-use package

×

Unsubscribe from a pay-per-use package

×

View pay-per-use package subscription records

The service names in permission policies may differ from those on the console. The mapping relationship between these names is shown in Table 3.

Table 3 Service name mapping

Service Name in Permission Policies

Service Name on the Console

DevCloud

CodeArts

ProjectMan

CodeArts Req

CodeHub

CodeArts Repo

CodeCheck

CodeArts Check

CloudBuild

CodeArts Build

CloudDeploy

CodeArts Deploy

CloudArtifact

CodeArts Artifact

CloudTest

CodeArts TestPlan

CloudPipeline

CodeArts Pipeline