Control User, Client System, and Connection Access

You control the people, client systems, and connections that can access various resources by authenticating their access. You control the activities that they can perform after they have access by authorizing this access.

Some resources support multiple authentication methods. In such cases, the authentication methods restrict access in identical ways. For instance, you have the same access in the Oracle Cloud Infrastructure Console whether you access it using the API, CLI, or user interface.

An API, rather than the client that accesses it, is the sole determiner of its authentication methods.