IAM Policies for Autonomous Database on Dedicated Exadata Infrastructure
This article lists the IAM policies required for managing the infrastructure resources of Autonomous Database on dedicated Exadata infrastructure.
Oracle Autonomous Database on Dedicated Exadata Infrastructure relies on the IAM (Identity and Access Management) service to authenticate and authorize cloud users to perform operations that use any of the Oracle Cloud Infrastructure interfaces (the console, REST API, CLI, or SDK). The IAM service uses groups, compartments, and policies to control which cloud users can access which resources.
Policy Details for Autonomous Database
This topic covers details for writing policies to control access to Autonomous Database resources.
Tip:
For a sample policy, see Let database and fleet admins manage Autonomous Databases.Resource-Types
An aggregate resource-type covers the list of individual resource-types that directly follow. For example, writing one policy to allow a group to have access to the autonomous-database-family
is equivalent to writing four separate policies for the group that would grant access to the autonomous-databases
, autonomous-backups
, autonomous-container-databases
, and cloud-autonomous-vmclusters
resource-types. For more information, see Resource-Types.
Aggregate Resource-Type:
autonomous-database-family
Individual Resource-Types:
autonomous-databases
autonomous-backups
autonomous-container-databases
cloud-autonomous-vmclusters
(Oracle Public Cloud deployments only)
autonomous-vmclusters
(Oracle Exadata Cloud@Customer deployments only)
autonomous-virtual-machine
Tip:
Thecloud-exadata-infrastructures
and exadata-infrastructures
resource-types needed to provision Autonomous Database on Oracle Public Cloud and Exadata Cloud@Customer respectively is covered by the aggregate resource-type database-family
. For more information about the resources covered by database-family
, see Policy Details for Exadata Cloud Service Instances and Policy Details for Base Database Service.
Supported Variables
General variables are supported. See General Variables for All Requests for more information.
Additionally, you can use the target.workloadType
variable, as shown in the following table:
target.workloadType value | Description |
---|---|
OLTP |
Online Transaction Processing, used for Autonomous Databases with Autonomous Transaction Processing workload. |
DW |
Data Warehouse, used for Autonomous Databases with Autonomous Data Warehouse workload. |
Allow group ADB-Admins
to manage autonomous-database
in tenancy where target.workloadType = 'workload_type'
Details for Verb + Resource-Type Combinations
The level of access is cumulative as you go from inspect > read > use > manage
. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access.
For example, the read
verb for the autonomous-databases
resource-type covers the same permissions and API operations as the inspect
verb, plus the AUTONOMOUS_DATABASE_CONTENT_READ permission. The read
verb partially covers the CreateAutonomousDatabaseBackup
operation, which also needs manage permissions for autonomous-backups
.
The following tables show the Permissions and API operations covered by each verb. For information about permissions, see Permissions.
Note:
The resource family covered by autonomous-database-family can be used to grant access to database resources associated with all the Autonomous Database workload types.Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
|
none |
read |
|
no extra |
|
use |
|
|
|
manage |
|
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
|
none |
read |
|
no extra |
|
use |
READ + no extra |
no extra |
none |
manage |
|
|
|
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
|
none |
read |
INSPECT + no extra |
no extra |
none |
use |
READ +
|
|
|
manage |
|
no extra |
|
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
|
none |
read |
no extra |
no extra |
none |
use |
READ +
|
|
|
manage |
|
no extra |
(both also need |
autonomous-vmclusters
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
|
|
read |
INSPECT + no extra |
no extra |
none |
use |
|
|
|
manage |
|
|
|
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | AUTONOMOUS_VIRTUAL_MACHINE_INSPECT |
|
none |
Permissions Required for Each API Operation
Autonomous Container Database (ACD) and Autonomous Database (ADB) are common resources between Oracle Public Cloud and Exadata Cloud@Customer deployments. Hence, their permissions are the same for both deployments in the following table.
-
AUTONOMOUS_VM_CLUSTER_UPDATE and AUTONOMOUS_CONTAINER_DATABASE_CREATE permissions on Exadata Cloud@Customer.
-
CLOUD_AUTONOMOUS_VM_CLUSTER_UPDATE and AUTONOMOUS_CONTAINER_DATABASE_CREATE permissions on Oracle Public Cloud.
For information about permissions, see Permissions.
The following table lists the API operations for Autonomous Database resources in a logical order, grouped by resource type.
You can use API to view and manage the different infrastructure resources of an Autonomous Database. See API Reference for Autonomous Database on Dedicated Exadata Infrastructure for a list of REST API endpoints to manage different Autonomous Database resources.
User access is defined in IAM policy statements. When you create a policy statement giving a group access to a particular verb and resource-type, you're actually giving that group access to one or more predefined IAM permissions. The purposes of verbs is to simplify the process of granting multiple related permissions.
If you want to permit or deny specific IAM permissions, you add a where
condition to the policy statement. For example, to allow a group of Fleet Administrators to perform any operation on Exadata Infrastructure resources except to delete them, you would create this policy statement:
Allow group FleetAdmins to manage cloud-exadata-infrastructures in tenancy where request.permission != 'CLOUD_EXADATA_INFRASTRUCTURE_DELETE'
Then, you could allow a smaller group of Fleet Administrators to perform any operation (including deletion) on Exadata Infrastructure resources by omitting the where
condition:
Allow group FleetSuperAdmins to manage cloud-exadata-infrastructures in tenancy
For more information about using the where
condition in this way, see the "Scoping Access with Permissions or API Operations" section of Permissions.
Policies to Manage Exadata Infrastructure Resources
The following table lists the IAM policies required for a cloud user to perform management operations on Exadata Infrastructure resources.
Operation | Required IAM Policies on Oracle Public Cloud | Required IAM Policies on Exadata Cloud@Customer |
---|---|---|
Create an Exadata Infrastructure resource |
|
|
View a list of Exadata Infrastructure resources |
|
|
View details of an Exadata Infrastructure resource |
|
|
Change the maintenance schedule of an Exadata Infrastructure resource |
|
|
Move an Exadata Infrastructure resource to another compartment |
|
|
Manage the security certificates for an Exadata Infrastructure resource |
|
|
Terminate an Exadata Infrastructure resource |
|
|
Policies to Manage Autonomous Exadata VM Clusters
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Exadata VM Clusters.
Operation | Required IAM Policies on Oracle Public Cloud | Required IAM Policies on Exadata Cloud@Customer |
---|---|---|
Create an Autonomous Exadata VM Cluster |
|
|
View a list of Autonomous Exadata VM Clusters |
|
|
View details of an Autonomous Exadata VM Cluster |
|
|
Change the license type of an Autonomous VM Cluster |
Not Applicable |
|
Move an Autonomous Exadata VM Cluster to another compartment |
|
|
Terminate an Autonomous Exadata VM Cluster |
|
|
Policies to Manage Autonomous Container Databases
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Container Databases (ACD).
Operation | Required IAM Policies |
---|---|
Create an Autonomous Container Database |
|
View a list of Autonomous Container Databases |
|
View details of an Autonomous Container Database |
|
Change the backup retention policy of an Autonomous Container Database |
|
Edit the maintenance preferences of an Autonomous Container Database |
|
Restart an Autonomous Container Database |
|
Move an Autonomous Container Database to another compartment |
|
Rotate an Autonomous Container Database encryption key |
|
Terminate an Autonomous Container Database |
|
Policies to Manage Autonomous Data Guard Configuration
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Data Guard configurations.
Operation | Required IAM Policies |
---|---|
View the Autonomous Data Guard Association with an ACD. |
|
List the ACDs enabled with Autonomous Data Guard associated with the specified ACD or Autonomous Database. |
|
Reinstate the Disabled Standby to an active standby ACD. |
|
Switch Roles of the primary and standby ACDs. |
|
Fail Over to the Standby ACD. This standby ACD will become the new primary ACD when the failover completes successfully. |
|
Modify Autonomous Data Guard settings such as protection mode, automatic failover, and fast start failover lag limit. |
|
Get an Autonomous Data Guard-enabled database associated with the specified Autonomous Database. |
|
List Autonomous Database data guard associations. |
|
Enable Autonomous Data Guard on an ACD. |
|
Convert the standby ACD between physical standby and snapshot standby ACD. |
|
Policies to Manage Autonomous Databases
The following table lists the IAM policies required for a cloud user to perform management operations on Autonomous Databases.
Operation | Required IAM Policies |
---|---|
Create an Autonomous Database |
|
View a list of Autonomous Databases |
|
View details of an Autonomous Database |
|
Set the password of an Autonomous Database's ADMIN user |
|
Scale the CPU core count or storage of an Autonomous Database |
|
Enable or disable auto scaling for an Autonomous Database |
|
Move an Autonomous Database to another compartment |
|
Stop or start an Autonomous Database |
|
Restart an Autonomous Database |
|
Back up an Autonomous Database manually |
|
Restore an Autonomous Database |
|
Clone an Autonomous Database |
|
Terminate an Autonomous Database |
|