Overview
Menu

Account Authorization

Last updated: 2025-04-15 11:08:55Download PDF
If your account permissions are insufficient, you may not be able to use MPS normally, which is more likely to occur when sub-accounts are used. This document describes common scenarios of insufficient permissions and corresponding solutions.

Scenario 1 (Required): MPS Service Not Enabled for an Account

If the MPS service is not enabled for your account, you cannot use MPS normally. In this case, you need to enable the MPS service first before using the MPS console or calling APIs. This operation is required.

Solution

Contact the owner of the root account, log in to the root account, go to the MPS console, and click Activate For Free.
If a sub-account has full read/write permissions for MPS (see Scenario 2 to associate the QcloudMPSFullAccess preset policy), you can directly enable MPS under the sub-account.


Scenario 2 (Required): No MPS Operation Permissions for a Sub-account

If the root account does not grant read/write operation permissions for MPS to your sub-account, the sub-account cannot use MPS normally.
At this time, the error below will be reported when you use the sub-account to access the MPS console:
The message in the pop-up window indicates that the sub-account does not have permission for the "DescribeUserInfo" API of MPS.
The message in the pop-up window indicates that the sub-account does not have permission for the "DescribeUserInfo" API of MPS.

The error below will be reported if you use the sub-account to call the APIs of MPS:
The error message indicates that the sub-account has no operation permissions.
The error message indicates that the sub-account has no operation permissions.

To solve this issue, you can follow any of the solutions below to grant MPS operation permissions to your sub-account. This operation is required.

Solution

Solution 1: Associate the Sub-account with the QcloudMPSFullAccess Preset Policy (Recommended)

1. Contact the root account owner and log in to the root account.
2. Go to Cloud Access Management under the root account, find the sub-account that needs to use MPS in the User List, and click Authorize.

3. Search for "QcloudMPSFullAccess" and grant the permission of the QcloudMPSFullAccess preset policy to the sub-account.


Solution 2: Associate the Sub-account with a Custom Policy

Note:
Currently, only QcloudMPSFullAccess is the preset policy of MPS. This full read/write policy allows sub-accounts to access all APIs of MPS. If the root account hopes to limit the API access permissions of sub-accounts for security purposes, it can associate a custom policy with sub-accounts.
1. Go to Cloud Access Management under the root account and click Create Custom Policy on the Policies page.

2. Select Create by policy builder.

3. Under 'Service', select the Media Processing Service (mps). Then, under 'Action', select the MPS APIs permitted for sub-accounts. Multiple APIs can be selected at a time.
Note:
The RequestFromSdk API should be selected if you are using the SDK.

4. Under 'Resource', Select All resources and click Next.

5. Enter a policy name, associate the policy with your sub-account in the "Grant this permission to users" field, and click Done.

6. Return to the Policies page. You can view all custom policies on this page and click a policy name to modify the corresponding policy later.


Scenario 3 (Optional): MPS Not Authorized to Perform Necessary Read/Write Operations on Files in COS Buckets

Currently, MPS supports three file sources: Tencent Cloud COS, AWS S3, and URL.
If you want to use COS as the file source, you need to complete COS authorization. You can create an MPS_QcsRole service role and allow MPS to perform read/write operations on files in your COS buckets, such as download, transcoding, and upload.
If you want to use AWS S3 or URL as the file source, you can skip COS authorization.
If you directly call MPS APIs to process files in your COS buckets without completing COS authorization, the tasks will fail. The figure below is an example.
First, call the ProcessMedia API to process files in a COS bucket:

Then, use the 'TaskId' to check the task status, where you will encounter an error:


Solution

Log in to the root account, enter the overview page of the MPS console, click COS Authorization, and click Authorize in the pop-up window. After authorization is completed, the MPS_QcsRole service role will be automatically created in Cloud Access Management > Role.
If a sub-account has full read/write permissions for MPS (see Scenario 2 to associate the QcloudMPSFullAccess preset policy), you can complete COS authorization under the sub-account.
Note:
This authorization operation does not require enabling COS and will not incur COS fees. It just allows MPS to obtain the necessary API read/write permissions for COS buckets.



Scenario 4 (Optional): No cam:GetRole Permission for a Sub-account

After permission authorization in the above three scenarios is completed, the error message below may pop up when you use a sub-account to log in to the MPS console:
The message in the pop-up window indicates that the sub-account has no cam:GetRole permission.
The message in the pop-up window indicates that the sub-account has no cam:GetRole permission.

This is because the MPS console frontend will call the GetRole API of Tencent Cloud Access Management (CAM) to query whether the user has the MPS_QcsRole service role. The frontend assesses whether an authorization prompt is given according to the query result. If the sub-account has no cam:GetRole permission, the MPS console frontend cannot call the GetRole API to query the role. As a result, a window indicating such an error pops up.
Note:
GetRole involves a frontend operation of the MPS console. The sub-account cannot use the MPS console normally if it has no cam:GetRole permission. APIs can still be called. The console helps you complete MPS operations and view task results. Therefore, it is recommended that you follow the solution below to grant the cam:GetRole permission to the sub-account.

Solution

1. Contact the root account owner and log in to the root account.
2. Go to Cloud Access Management > Policy under the root account, click Create Custom Policy, and select Create by policy generator to create a custom policy.
Select Cloud Access Management (CAM) for Service, GetRole as the read operation, and All resources, as shown in the red box below. Then, click Next.

3. Enter a policy name, grant this permission to the sub-account that needs to use MPS, and click Complete.