Setting Up Authentication and Authorization

Learn how to configure user authentication and authorization.

The user authentication and authorization process ensure that you establish a secure network connectivity to access your external key management platform's resources. As an EKMS administrator, you control user access (sign in) and authorizations (user permissions). External KMS feature uses the OAuth 2 protocol for authorization, and for the protocol to work, you must complete the following tasks:
  1. Creating Confidential Resource App
  2. Registering Identity Provider
  3. Associating Confidential Client Application
  4. Configuring IAM Policies

If you haven't created an OCI domain, see Managing Identity Domains for information on how identity domains work and how to create one. OCI's "Free" identity domain type can be used to configure External Key Management.