Alibaba Cloud 2-factor authentication setup Alibaba Cloud Sub Account Service
Alibaba Cloud Sub Account Service: The “Multi-Worker” Setup Your Cloud Team Deserves
If your company has more than one team touching cloud resources, congratulations: you’re normal. If you’ve ever watched billing mysteriously appear “somewhere,” only to discover three teams were happily spinning up servers under one big account, then also congratulations—because you’re about to fix it.
Alibaba Cloud’s Sub Account Service is essentially the grown-up way to manage that chaos. Think of it as turning your single cloud account into a small city: one “main city” (the master account) and multiple “districts” (sub accounts), each with its own users, permissions, and spending visibility. The goal isn’t just neat organization; it’s control, security, auditing, and accountability—without making your developers feel like they’re working in a paperwork factory.
In this guide, we’ll explore what Sub Accounts are, how they work, how permissions and billing behave, and how to design a structure that doesn’t collapse the first time you have to onboard a new team. We’ll also cover common pitfalls and practical best practices you can adopt right away.
1. What Is an Alibaba Cloud Sub Account?
An Alibaba Cloud sub account is a separate account under your main (master) Alibaba Cloud account. While the master account controls overall management capabilities, sub accounts can be used to isolate access, allocate responsibility, and segment resources. Users can be assigned to sub accounts, and permissions can be tailored so that teams only see and manage what they’re supposed to.
In plain language: instead of everyone using one account like it’s a shared bicycle lock (and everybody has the key), you set up individual “locks” with rules.
Why “sub” matters
Sub accounts help you separate concerns:
- Responsibility: DevOps, QA, data teams, and client-specific projects can be separated so troubleshooting and audits are sane.
- Security: Limit access scope so one compromised user doesn’t become a company-wide fireworks show.
- Cost visibility: Billing and usage reports can be segmented by sub account, making it easier to attribute spend.
- Governance: You can enforce quotas, approvals, and permission boundaries.
2. The Master Account vs Sub Accounts: A Mental Model
Before clicking any buttons, it helps to understand the roles.
- Master account: The top-level account that typically owns the billing relationship and controls overall organization management.
- Sub account: An account dedicated to a team, project, environment, or department, with its own permission set and user management.
Some teams prefer structuring by department (e.g., Marketing, Finance, Engineering). Others structure by environment (e.g., dev/stage/prod). The best approach depends on your organization’s risk tolerance, team boundaries, and billing/chargeback needs.
3. Typical Use Cases (Because Your Cloud Is Not a One-Size-Fits-All Shoe)
Use Case A: Separate dev and production without suffering
Imagine your company has one team that manages both dev and prod. If both environments live under the same permissions and the same group of users, you’ll eventually run into a “oops, production got the experimental configuration” moment.
Using sub accounts, you can set stronger restrictions on production-related resources. Developers might have broad permissions in the dev sub account, while production sub account permissions are restricted to a smaller group (or require additional approvals).
Use Case B: Chargeback for client projects
Consultancies and managed service providers often need to split costs by client. Sub accounts can map one client project to one sub account. That way, usage reporting and billing allocation become easier—and you’ll avoid the awkward spreadsheet negotiation at the end of the month.
Use Case C: Multi-team cloud governance
When multiple teams share the same master account, governance becomes a game of “who touched what.” Sub accounts allow you to create boundaries and track activity more cleanly. It’s not magic, but it turns a detective novel into a well-labeled filing cabinet.
4. Core Capabilities You’ll Care About
Alibaba Cloud 2-factor authentication setup Sub Account Service isn’t just “extra accounts.” It typically includes several important features: user isolation, permission management, and management/auditing workflows.
4.1 Access management with permission control
The key value of sub accounts is that you can control who can do what. Instead of one permission scheme for everyone, you can tailor policies per sub account (and often per role/user).
Practical effect: a junior developer in the dev sub account might have permission to create resources, but they shouldn’t be able to touch production. Meanwhile, an SRE might have permission to manage production operations, but not necessarily billing settings.
4.2 Auditing and visibility
Even if your team is small, audits happen. Compliance happens. Security reviews happen. Logging and account-level separation help you answer questions such as:
- Which team created this resource?
- Who accessed this service?
- When did the change occur?
- Why did the cost increase?
Sub accounts make those answers less like hunting for a needle in a haystack that’s on fire.
Alibaba Cloud 2-factor authentication setup 4.3 Billing segmentation
One of the biggest pain points in shared cloud usage is cost attribution. Sub accounts allow you to segment usage by account, making internal chargeback or showback more manageable.
Important note: exact billing workflows may vary based on your setup and Alibaba Cloud configuration. Always verify in your console and billing settings so you understand how charges roll up from sub accounts to master account reports.
5. Designing Your Sub Account Structure (The “Don’t Regret It Later” Section)
Let’s talk about the structure before you create a dozen sub accounts and then regret every naming decision from last Tuesday.
Pick a dimension: teams, projects, or environments
Here are common strategies:
- By environment: dev, stage, prod sub accounts. Best when a single team manages multiple environments.
- By department: data-team, app-team, qa-team, etc. Best when teams are distinct and have different responsibilities.
- By project/client: clientA, clientB, projectX, etc. Best when chargeback is crucial.
Some organizations choose a hybrid like “department-environment” (e.g., app-prod, app-dev). This can work, but too many layers can become messy if you don’t have clear governance.
Naming conventions: yes, it matters
When you later open a dashboard at 2 a.m. to answer “why did prod spend spike,” you want predictable names. Consider a format like:
- dept_env: engineering_prod, marketing_dev
- client_env: acme_prod, acme_dev
- project_env: payment_service_stage
Avoid ambiguous names like “Project2FinalFinal” unless you enjoy future archaeology.
6. Step-by-Step: Setting Up Sub Accounts (Conceptual Workflow)
Because console UIs can evolve, I’ll describe the workflow conceptually. You can map the steps to the current Alibaba Cloud console menu items you see.
Step 1: Confirm your master account readiness
- Ensure your master account has required permissions to manage sub accounts.
- Set up secure access for master account users (use strong authentication and limit who can perform high-risk operations).
Step 2: Create sub accounts
- Alibaba Cloud 2-factor authentication setup Create one sub account per team/project/environment boundary you’ve decided on.
- Use consistent naming conventions.
Step 3: Create and manage users under each sub account
- Add users to the relevant sub accounts.
- Assign them roles or access policies appropriate for their tasks.
Step 4: Configure permissions (least privilege, not “just in case” access)
Permission configuration is where the real value appears. A typical pattern is:
- Grant broad permissions only where needed (often dev environments).
- Restrict production permissions to smaller trusted roles.
- Apply additional restrictions for billing or account-level settings.
Least privilege is boring in theory and heroic in practice.
Step 5: Validate by testing access
Don’t wait for production to misbehave. Validate that:
- Users in sub account A can’t see resources in sub account B.
- They can perform their expected tasks.
- They can’t perform high-risk actions they shouldn’t.
Think of this like a seatbelt test: you hope you never need it, but you’ll be grateful when you do.
7. Daily Operations: How Sub Accounts Change Your Life
Sub accounts aren’t only setup—they’re also about how your team operates day-to-day. Here’s what changes when sub accounts are used well.
7.1 Clear ownership and faster troubleshooting
When an issue happens, you can quickly determine which sub account owns the impacted resources. That means fewer “was it dev or prod?” meetings and more “here’s the incident timeline” action.
7.2 Cleaner cost review meetings
Instead of arguing about “why the bill increased” with vague guesses, you can review usage per sub account. That’s incredibly helpful for:
- Identifying runaway workloads
- Spotting unexpected growth
- Allocating budgets per team/client
7.3 Onboarding becomes repeatable
New team member join? You add them to the correct sub account and assign the correct role. New project starts? Create a new sub account, set policies, and you’re off.
Repeatability reduces human error. Humans are creative; governance should not rely on creativity.
8. Security Best Practices (Because “Separate Accounts” Still Needs Smart Rules)
Sub accounts improve security, but they don’t automatically guarantee it. Here are practical tips to strengthen your setup.
8.1 Use least privilege and role-based access
Instead of handing out broad permissions, create roles aligned to job functions. Example roles:
- ReadOnlyOps
- DeveloperDevAccess
- ProdSREAdmin
- BillingReviewer (no editing permissions)
This makes permissions auditable and easier to maintain.
8.2 Protect the master account like it’s the vault
The master account is powerful. Limit who can manage sub accounts and critical settings. If possible, enforce stronger authentication and reduce direct usage of master credentials by everyday teams.
8.3 Review permissions periodically
Teams change. Projects end. People move. A permission that was reasonable six months ago may now be excessive. Schedule periodic access reviews.
8.4 Monitor and audit
Sub accounts produce clearer audit trails. Still, you should monitor for unusual activity. Alerts can help catch problems early—like unexpected privilege changes or unexpected resource creation.
9. Common Mistakes (And How to Avoid Them)
Let’s save you from the classic traps. You know, the ones that appear right after you pat yourself on the back.
9.1 Creating too many sub accounts too early
If you create sub accounts for every tiny project, you may end up with a “cloud sprawl” situation. Management overhead increases: policies, user assignments, reporting, and audits become harder.
Better approach: start with a structure that matches team boundaries or environment boundaries, then evolve.
9.2 Treating sub accounts as a cost-solving spell
Sub accounts help with billing visibility, but cost control also depends on quotas, budgets, and operational discipline. Sub accounts show you who spent what; they don’t automatically stop spending.
Use budget thresholds, alerts, and policy-based constraints alongside sub accounts.
9.3 “Everyone admin” permissions
This one defeats the purpose. Granting admin-like access everywhere turns separation into decoration.
Use least privilege and restrict account-level operations.
9.4 Forgetting to document the model
Your future self (and your future teammate) will ask: “Why does sub account X exist, and who manages it?” If there’s no documentation, you’ll recreate tribal knowledge from scratch.
Maintain a simple mapping document: sub account name, purpose, owner team, and permission/risk level.
10. Scenario Walkthroughs: Seeing Sub Accounts in Action
Scenario 1: Startup with a small team, big ambitions
A startup might think it doesn’t need sub accounts because “we’re only three people.” But consider this: those three people might include a founder, a developer, and an operations-minded friend who also volunteers as CFO when needed.
By using two sub accounts—dev and prod—you can:
- Allow the developer to experiment in dev without fear
- Limit production access to the founder/SRE role
- Review spend separately for dev experiments vs prod stability
You gain control without requiring a massive process overhaul.
Scenario 2: Enterprise with multiple departments
In an enterprise, sub accounts are the difference between “cloud is everybody’s job” and “cloud is managed with responsibility.” Each department gets a sub account and only the required permissions. Central governance can enforce patterns and limits.
When leadership asks for accountability, you can show usage by department rather than producing a vague narrative supported by hope.
Alibaba Cloud 2-factor authentication setup Scenario 3: SaaS platform with partner tenants
Alibaba Cloud 2-factor authentication setup For SaaS platforms that host customer environments, sub accounts can represent tenant groups, staging environments, or partner-specific resources. Permission boundaries help prevent cross-tenant visibility and provide cleaner operational ownership.
You still need application-level tenant isolation, of course—sub accounts are not a substitute for secure application design. But they help with infrastructure governance.
11. Governance Tips: Make It Sustainable, Not Just Functional
Sub accounts are a tool. Governance is what keeps the tool from becoming a mess.
11.1 Assign an owner to every sub account
Every sub account should have a clear owner team. That owner team handles:
- User lifecycle (onboarding/offboarding)
- Permission review
- Resource hygiene (shutdown what’s not needed)
11.2 Use environment tiers consistently
If you create multiple environments, make sure your naming and policy approach is consistent across them. Otherwise, you’ll accidentally treat staging like production at some point—and the cloud will eagerly let you.
11.3 Establish a “new sub account checklist”
Example checklist:
- Purpose and owner assigned
- Permissions defined (least privilege)
- Billing visibility confirmed
- Quota/budget settings established
- Testing of access performed
Checklists reduce mistakes more effectively than you’d think—because humans love skipping the boring parts.
12. Frequently Asked Questions (Without the Cringe)
Do sub accounts replace IAM?
No. Sub accounts provide account-level isolation. Identity and Access Management (IAM) style controls (roles, policies, users) still define what actions are allowed. Sub accounts are the container; IAM is the rulebook.
Can I move resources between sub accounts?
Resource movement depends on service type and Alibaba Cloud capabilities. Some resources might be deployable in different accounts by recreating them; others may support specific migration paths. If migration is a requirement, plan your structure early and check service-specific documentation.
Will sub accounts automatically stop overspending?
Not automatically. Sub accounts help with visibility and accountability. To control spending, you typically need budgets, quotas, alerts, and responsible operational practices.
Is it worth using sub accounts for a very small team?
Often, yes—especially to separate production from development or to separate client/project work. Even a small structure can prevent costly mistakes and simplify reporting.
13. Conclusion: Sub Accounts Are the “Clarity Layer” Your Cloud Needs
Alibaba Cloud Sub Account Service is one of those features that feels optional until you experience the pain it solves. Once you separate access, isolate responsibilities, and improve billing visibility, cloud operations become less chaotic and more accountable.
The best part is that sub accounts don’t force a single “right” structure. You can start simple—by environment or by department—and evolve as your organization grows. The only real advice is: be intentional. Decide what each sub account represents, use least privilege, validate your permissions, and keep governance lightweight but consistent.
In other words: treat your cloud not like a shared playground, but like a managed workplace. People will still build fast—but they’ll do it with fewer surprises, fewer midnight mysteries, and fewer moments where billing looks like it’s written in invisible ink.

