Deny Policies Known Issues
Known issues for working with IAM deny policies.
Initial Propagation Delay for Tag-based Deny Policies
When you enable IAM deny policies in a tenancy for the first time, tag-based deny policies on users, groups, and dynamic groups can take up to 24 hours to become fully effective.
IAM Deny Policies Don't Override Identity Domain Administration Roles
IAM Deny policies don't override identity domains administration roles (for example, identity domain administrator, security administrator, or user manager).
Target Resource Tag-based Deny Policies Don't Block Console-initiated Deletions
IAM deny policies that use target tags don't prevent the deletion of users, groups, or dynamic groups when these actions are initiated from the Console.
Example:
deny group low-privilege-peter to manage dynamic-groups in tenancy where target.resource.tag.{tagNamespace}.{tagKeyDefinition}='<value>'
Deny Conditions Using Dynamic Group Identifiers Aren't Supported
IAM deny policies don't enforce policies that use target.dynamicgroup.id or target.dynamicgroup.name across the Console, SDK, or API.
You can manage access using tags in two ways:
- By using the tags applied to the requesting resource (which ever resource is requesting the access).
- By using the tags applied to the Target resource (tags on the resource for which access is being restricted).
See Using Tags to Manage Access
deny group low-privilege-peter to manage dynamic-groups in tenancy where target.dynamicgroup.id = '<dynamicGroupOCID>'deny group low-privilege-peter to manage dynamic-groups in tenancy where target.dynamicgroup.name = '<dynamicGroupName>'