Setting Up Authentication and Authorization
Learn how to configure user authentication and authorization.
The user authentication and authorization process ensure that you establish a secure network connectivity to access your external key management platform's resources. As an EKMS administrator, you control user access (sign in) and authorizations (user permissions). External KMS feature uses the OAuth 2 protocol for authorization, and for the protocol to work, you must complete the following tasks:
If you haven't created an OCI domain, see Managing Identity Domains for information on how identity domains work and how to create one. OCI's "Free" identity domain type can be used to configure External Key Management.