Du bruger autorisationspolitikker til at styre adgang til ressourcer i din arkitektur. Du kan for eksempel oprette en politik, der autoriserer, at brugere opretter og håndterer Oracle Content Management-instanser.
Du opretter politikker ved hjælp af Infrastructure-konsollen Se Managing Policies.
Følgende oplysninger vedrører tjenestepolitikker for Oracle Content Management:
Denne tabel viser ressourcetyperne for Oracle Content Management.
Ressourcetype | Beskrivelse |
---|---|
oce-instance | En enkelt instans af Oracle Content Management. |
oce-instances | En eller flere instanser af Oracle Content Management. |
oce-workrequest | En enkelt arbejdsanmodning for Oracle Content Management.
Hver operation, som du udfører på en instans af Oracle Content Management, opretter en arbejdsanmodning. For eksempel operationer som opret, opdater, afslut og så videre. |
oce-workrequests | En eller flere arbejdsanmodninger for Oracle Content Management. |
Værdierne af disse variabler leveres af Oracle Content Management. Derudover understøttes andre generelle variabler. Se Generelle variabler for alle anmodninger.
Denne tabel viser de understøttede variabler for Oracle Content Management.
Variabel | Type | Beskrivelse | Eksempelværdi |
---|---|---|---|
target.compartment.id | Entitet | OCID'et for den primære ressource for anmodningen. | target.compartment.id = 'ocid1.compartment.oc1..<unique_ID>' |
request.operation | Streng | Operations-ID'et (for eksempel 'GetUser') for anmodningen. | request.operation = 'ocid1.compartment.oc1..<unique_ID>' |
target.resource.kind | Streng | Ressourcetypenavnet for den primære ressource for anmodningen. | target.resource.kind = 'ocid1.contentexperiencecloudservice.oc1..<unique_ID>' |
Oracle Cloud Infrastructure har et standardsæt af verber til at definere tilladelser på tværs af Oracle Cloud Infrastructure ressourcer (Inspicer, Læs, Brug, Håndter). Disse tabeller viser de Oracle Content Management-tilladelser, der er associeret med hvert verbum. Adgangsniveauet er kumulativt, mens du går fra Inspect til Read til Use til Manage.
INSPECT
Ressourcetype | INSPECT-tilladelser |
---|---|
|
|
|
|
|
|
READ
Ressourcetype | READ-tilladelser |
---|---|
|
|
|
|
|
|
USE
Ressourcetype | USE-tilladelser |
---|---|
|
|
|
|
|
|
MANAGE
Ressourcetype | MANAGE-tilladelser |
---|---|
|
|
|
|
|
|
Denne tabel viser de tilgængelige API-operationer for Oracle Content Management, grupperet efter ressourcetype.
REST-API-operation | CLI-kommando-operation | Tilladelse, der kræves for at bruge operationen |
---|---|---|
ListOceInstances | oce-instance list | OCE_INSTANCE_INSPECT |
GetOceInstance | oce-instance get | OCE_INSTANCE_READ |
CreateOceInstance | oce-instance create | OCE_INSTANCE_CREATE |
DeleteOceInstance | oce-instance delete | OCE_INSTANCE_DELETE |
UpdateOceInstance | oce-instance update | OCE_INSTANCE_UPDATE |
ChangeOceInstanceCompartment | oce-instance change-compartment | OCE_INSTANCE_UPDATE |
ListWorkRequests | work-request list | OCE_INSTANCE_WORKREQUEST_INSPECT |
GetWorkRequest | work-request get | OCE_INSTANCE_WORKREQUEST_READ |
ListWorkRequestErrors | work-request-error list | OCE_INSTANCE_WORKREQUEST_INSPECT |
ListWorkRequestLogs | work-request-log list | OCE_INSTANCE_WORKREQUEST_INSPECT |
Her er nogle typiske politikerklæringer, som du kan bruge til at autorisere adgang tilOracle Content Management-instanser.
Når du opretter en politik for din lejer, tildeler du brugerne adgang til alle rum via nedarvning af politik. Som et alternativ kan du begrænse adgangen til individuelle Oracle Content Management-instanser eller -rum.
Lad brugere i gruppen Administrators håndtere enhver Oracle Content Management-instans
# Full admin permissions (CRUD) allow group Administrators to manage oce-instances in tenancy allow group Administrators to manage oce-workrequests in tenancy
# Full admin permissions (CRUD) using family allow group Administrators to manage oce-instance-family in tenancy
Lad brugere i gruppen group1 inspicere enhver instans af Oracle Content Management og de tilknyttede arbejdsanmodninger
# Inspect permissions (list oce instances and work requests) using metaverbs: allow group group1 to inspect oce-instances in tenancy allow group group1 to inspect oce-workrequests in tenancy
# Inspect permissions (list oce instances and work requests) using permission names: allow group group1 to {OCE_INSTANCE_INSPECT} in tenancy allow group group1 to {OCE_INSTANCE_WORKREQUEST_INSPECT} in tenancy
Lad brugere i gruppen group2 læse detaljer om enhver instans af Oracle Content Management og de tilknyttede arbejdsanmodninger
# Read permissions (read complete oce instance and work request metadata) using metaverbs: allow group group2 to read oce-instances in tenancy allow group group2 to read oce-workrequests in tenancy
# Read permissions (read complete oce instance and work request metadata) using permission names: allow group group2 to {OCE_INSTANCE_INSPECT, OCE_INSTANCE_READ} in tenancy allow group group2 to {OCE_INSTANCE_WORKREQUEST_INSPECT, OCE_INSTANCE_WORKREQUEST_READ} in tenancy
Lad brugere i gruppen group3 læse alle instanser af Oracle Content Management og de tilknyttede arbejdsanmodninger
# Use permissions (read on oce instance, read on work request) using metaverbs: allow group group3 to use oce-instances in tenancy allow group group3 to read oce-workrequests in tenancy
# Use permissions (read on oce instance, read on work request) using permission names: allow group group3 to {OCE_INSTANCE_INSPECT, OCE_INSTANCE_READ, OCE_INSTANCE_UPDATE} in tenancy allow group group3 to {OCE_INSTANCE_WORKREQUEST_INSPECT, OCE_INSTANCE_WORKREQUEST_READ} in tenancy
Lad brugere i gruppen group4 håndtere enhver instans af Oracle Content Management og de tilknyttede arbejdsanmodninger
# Manage permissions (use/delete on oce instance, read/cancel on work request) using metaverbs: allow group group4 to manage oce-instances in tenancy allow group group4 to manage oce-workrequests in tenancy
# Manage permissions (use/delete on oce instance, read/cancel on work request) using permission names: allow group group4 to {OCE_INSTANCE_INSPECT, OCE_INSTANCE_READ, OCE_INSTANCE_UPDATE,OCE_INSTANCE_CREATE, OCE_INSTANCE_DELETE} in tenancy allow group group4 to {OCE_INSTANCE_WORKREQUEST_INSPECT, OCE_INSTANCE_WORKREQUEST_READ} in tenancy