IAM Policies for Autonomous AI Database on Dedicated Exadata Infrastructure
This article lists the IAM policies required for managing the infrastructure resources of Autonomous AI Database on dedicated Exadata infrastructure.
Oracle Autonomous AI Database on Dedicated Exadata Infrastructure relies on the IAM (Identity and Access Management) service to authenticate and authorize cloud users to perform operations that use any of the Oracle Cloud Infrastructure interfaces (the console, REST API, CLI, or SDK). The IAM service uses groups, compartments, and policies to control which cloud users can access which resources.
Policy Details for Autonomous AI Database
This topic covers details for writing policies to control access to Autonomous AI Database resources.
Tip:
For a sample policy, see Let database and fleet admins manage Autonomous AI Databases.Resource-Types
An aggregate resource-type covers the list of individual resource-types that directly follow. For example, writing one policy to allow a group to have access to the autonomous-database-family is equivalent to writing four separate policies for the group that would grant access to the autonomous-databases, autonomous-backups, autonomous-container-databases, and cloud-autonomous-vmclusters resource-types. For more information, see Resource-Types.
Aggregate Resource-Type:
autonomous-database-family
Individual Resource-Types:
autonomous-databases
autonomous-backups
autonomous-container-databases
cloud-autonomous-vmclusters (Oracle Public Cloud deployments only)
autonomous-vmclusters (Oracle Exadata Cloud@Customer deployments only)
autonomous-virtual-machine
Tip:
Thecloud-exadata-infrastructures and exadata-infrastructures resource-types needed to provision Autonomous AI Database on Oracle Public Cloud and Exadata Cloud@Customer respectively is covered by the aggregate resource-type database-family. For more information about the resources covered by database-family, see Policy Details for Exadata Cloud Service Instances and Policy Details for Base Database Service.
Supported Variables
General variables are supported. See General Variables for All Requests for more information.
Additionally, you can use the target.workloadType variable, as shown in the following table:
| target.workloadType value | Description |
|---|---|
OLTP |
Online Transaction Processing, used for Autonomous AI Databases with Autonomous Transaction Processing workload. |
DW |
Data Warehouse, used for Autonomous AI Databases with Autonomous Data Warehouse workload. |
Allow group ADB-Admins
to manage autonomous-database
in tenancy where target.workloadType = 'workload_type'Details for Verb + Resource-Type Combinations
The level of access is cumulative as you go from inspect > read > use > manage. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access.
For example, the read verb for the autonomous-databases resource-type covers the same permissions and API operations as the inspect verb, plus the AUTONOMOUS_DATABASE_CONTENT_READ permission. The read verb partially covers the CreateAutonomousDatabaseBackup operation, which also needs manage permissions for autonomous-backups.
The following tables show the Permissions and API operations covered by each verb. For information about permissions, see Permissions.
Note:
The resource family covered by autonomous-database-family can be used to grant access to database resources associated with all the Autonomous AI Database workload types.| Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
|---|---|---|---|
|
inspect |
|
|
none |
|
read |
|
no extra |
|
|
use |
|
|
|
|
manage |
|
|
none |
| Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
|---|---|---|---|
|
inspect |
|
|
none |
|
read |
|
no extra |
|
|
use |
READ + no extra |
no extra |
none |
|
manage |
|
|
|
| Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
|---|---|---|---|
|
inspect |
|
|
none |
|
read |
INSPECT + no extra |
no extra |
none |
|
use |
READ +
|
|
|
|
manage |
|
no extra |
|
| Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
|---|---|---|---|
|
inspect |
|
|
none |
|
read |
no extra |
no extra |
none |
|
use |
READ +
|
|
|
|
manage |
|
no extra |
(both also need |
autonomous-vmclusters
| Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
|---|---|---|---|
| inspect |
|
|
|
| read |
INSPECT + no extra |
no extra |
none |
| use |
|
|
|
| manage |
|
|
|
| Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
|---|---|---|---|
| inspect | AUTONOMOUS_VIRTUAL_MACHINE_INSPECT |
|
none |
Permissions Required for Each API Operation
Autonomous Container Database (ACD) and Autonomous AI Database (ADB) are common resources between Oracle Public Cloud, Multicloud, and Exadata Cloud@Customer deployments. Hence, their permissions are the same for both deployments in the following table.
-
AUTONOMOUS_VM_CLUSTER_UPDATE and AUTONOMOUS_CONTAINER_DATABASE_CREATE permissions on Exadata Cloud@Customer.
-
CLOUD_AUTONOMOUS_VM_CLUSTER_UPDATE and AUTONOMOUS_CONTAINER_DATABASE_CREATE permissions on Oracle Public Cloud and Multicloud.
For information about permissions, see Permissions.
The following table lists the API operations for Autonomous AI Database resources in a logical order, grouped by resource type.
You can use API to view and manage the different infrastructure resources of an Autonomous AI Database. See API Reference for Autonomous AI Database on Dedicated Exadata Infrastructure for a list of REST API endpoints to manage different Autonomous AI Database resources.
User access is defined in IAM policy statements. When you create a policy statement giving a group access to a particular verb and resource-type, you're actually giving that group access to one or more predefined IAM permissions. The purposes of verbs is to simplify the process of granting multiple related permissions.
If you want to permit or deny specific IAM permissions, you add a where condition to the policy statement. For example, to allow a group of Fleet Administrators to perform any operation on Exadata Infrastructure resources except to delete them, you would create this policy statement:
Allow group FleetAdmins to manage cloud-exadata-infrastructures in tenancy where request.permission != 'CLOUD_EXADATA_INFRASTRUCTURE_DELETE'
Then, you could allow a smaller group of Fleet Administrators to perform any operation (including deletion) on Exadata Infrastructure resources by omitting the where condition:
Allow group FleetSuperAdmins to manage cloud-exadata-infrastructures in tenancy
For more information about using the where condition in this way, see the "Scoping Access with Permissions or API Operations" section of Permissions.
Policies to Manage Exadata Infrastructure Resources
The following table lists the IAM policies required for a cloud user to perform management operations on Exadata Infrastructure resources.
| Operation | Required IAM Policies on Oracle Public Cloud and Multicloud | Required IAM Policies on Exadata Cloud@Customer |
|---|---|---|
|
Create an Exadata Infrastructure resource |
|
|
|
View a list of Exadata Infrastructure resources |
|
|
|
View details of an Exadata Infrastructure resource |
|
|
|
Change the maintenance schedule of an Exadata Infrastructure resource |
|
|
|
Move an Exadata Infrastructure resource to another compartment |
|
|
|
Manage the security certificates for an Exadata Infrastructure resource |
|
|
|
Terminate an Exadata Infrastructure resource |
|
|
Policies to Manage Autonomous Exadata VM Clusters
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Exadata VM Clusters.
| Operation | Required IAM Policies on Oracle Public Cloud and Multicloud | Required IAM Policies on Exadata Cloud@Customer |
|---|---|---|
|
Create an Autonomous Exadata VM Cluster |
|
|
|
View a list of Autonomous Exadata VM Clusters |
|
|
|
View details of an Autonomous Exadata VM Cluster |
|
|
|
Change the license type of an Autonomous VM Cluster |
Not Applicable |
|
|
Move an Autonomous Exadata VM Cluster to another compartment |
|
|
|
Terminate an Autonomous Exadata VM Cluster |
|
|
Policies to Manage Autonomous Container Databases
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Container Databases (ACD).
| Operation | Required IAM Policies |
|---|---|
|
Create an Autonomous Container Database |
|
|
View a list of Autonomous Container Databases |
|
|
View details of an Autonomous Container Database |
|
|
Change the backup retention policy of an Autonomous Container Database |
|
|
Edit the maintenance preferences of an Autonomous Container Database |
|
|
Restart an Autonomous Container Database |
|
|
Move an Autonomous Container Database to another compartment |
|
|
Rotate an Autonomous Container Database encryption key |
|
|
Terminate an Autonomous Container Database |
|
Policies to Manage Autonomous Data Guard Configuration
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Data Guard configurations.
| Operation | Required IAM Policies |
|---|---|
|
View the Autonomous Data Guard Association with an ACD. |
|
|
List the ACDs enabled with Autonomous Data Guard associated with the specified ACD or Autonomous AI Database. |
|
|
Reinstate the Disabled Standby to an active standby ACD. |
|
|
Switch Roles of the primary and standby ACDs. |
|
|
Fail Over to the Standby ACD. This standby ACD will become the new primary ACD when the failover completes successfully. |
|
|
Modify Autonomous Data Guard settings such as protection mode, automatic failover, and fast start failover lag limit. |
|
|
Get an Autonomous Data Guard-enabled database associated with the specified Autonomous AI Database. |
|
|
List Autonomous AI Database data guard associations. |
|
|
Enable Autonomous Data Guard on an ACD. |
|
|
Convert the standby ACD between physical standby and snapshot standby ACD. |
|
Policies to Manage Autonomous AI Databases
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous AI Databases.
| Operation | Required IAM Policies |
|---|---|
|
Create an Autonomous AI Database |
|
|
View a list of Autonomous AI Databases |
|
|
View details of an Autonomous AI Database |
|
|
Set the password of an Autonomous AI Database's ADMIN user |
|
|
Scale the CPU core count or storage of an Autonomous AI Database |
|
|
Enable or disable auto scaling for an Autonomous AI Database |
|
|
Move an Autonomous AI Database to another compartment |
|
|
Stop or start an Autonomous AI Database |
|
|
Restart an Autonomous AI Database |
|
|
Back up an Autonomous AI Database manually |
|
|
Restore an Autonomous AI Database |
|
|
Clone an Autonomous AI Database |
|
|
Terminate an Autonomous AI Database |
|