Managing Tenancy Users

Compartments

Compartments are a powerful feature of OCI IAM for security isolation and access control, offering a mechanism that allows an enterprise customer to meet its accountability requirements within an account or tenancy.

The primary consideration for the design and layout of your compartment hierarchy is to enable easy policy creation and management that sets the proper access controls for the tenancy.

Logo

Compartment Considerations

Logo

IAM Security Policies & Tagging

IAM policies are used to govern access of IAM groups to resources in compartments and in the tenancy.

Important:

Oracle recommends assigning the least powerful set of privileges needed to fulfil your administrative requirements.

ALLOW GROUP TENANCYADMIN TO MANAGE ALL-RESOURCES IN TENANCY
ALLOW GROUP VOLUMEADMINS TO MANAGE VOLUME-FAMILY IN TENANCY
ALLOW GROUP NETWORKADMINS TO MANAGE VIRTUAL-NETWORK-FAMILY IN TENANCY
ALLOW GROUP STORAGEADMINS TO MANAGE OBJECT-FAMILY IN TENANCY
ALLOW GROUP DBADMINS TO MANAGE DATABASE FAMILY IN TENANCY
ALLOW GROUP HRADMINS TO MANAGE ALL-RESOURCES IN COMPARTMENT HR-COMPARTMENT
ALLOW GROUP HRNETWORKADMINS TO MANAGE VIRTUAL-NETWORK-FAMILY IN COMPARTMENT HR-COMPARTMENT
ALLOW GROUP POLICYADMINS TO MANAGE POLICIES IN TENANCY 
WHERE REQUEST.PERMISSION='POLICY CREATE'

Instance Principals & Dynamic Groups

The Instance Principals feature of IAM allows users to call IAM-protected APIs from an Oracle Cloud Infrastructure Compute instance (virtual machine or bare metal) without the need to create IAM users or manage credentials for each instance.

Tip:

Use Instance Principals instead of storing keys and passwords on the server where your service is running.

Dynamic Group Name : DYNAMIC-GROUP-TEST

When creating a dynamic group, instead of adding members explicitly to the group, define a set of matching rules to define the group members. Resources that match the rule criteria are members of the dynamic group.

Matching Rules : ALL {INSTANCCE.COMPARTMENT.ID = 'OCID1.COMPARTMENT.OCI..XXXX'}
Policy: ALLOW DYNAMIC-GROUP DYNAMIC-GROUP-TEST TO MANAGE BUCKETS IN TENANCY

Multi-Factor Authentication

The IAM service supports two-factor authentication using a password (first factor) and a device that can generate a time-based one-time password (TOTP) (second factor).

ALLOW GROUP GROUPA TO MANAGE INSTANCE-FAMILY IN TENANCY WHERE 
REQUEST.USER.MFATOTPVERIFIED='TRUE'

With this policy in place, only the members of GroupA who have successfully signed in by entering both their password and the time-based one-time passcode generated by their registered mobile device are allowed to access and manage instances. Users who have not enabled MFA and sign in using only their password will not be allowed access to manage instances.

Identity Federation

Logo

Federating IAM with Active Directory

Logo

  1. Get the required information from Active Directory Federation Services (SAML metadata document)
  2. Federate Active Directory with Oracle Cloud Infrastructure: a) Add the identity provider (AD FS) to your tenancy and provide the required information. b) Map Active Directory groups to IAM groups.
  3. In Active Directory Federation Services, add Oracle Cloud Infrastructure as a trusted, relying party.
  4. In Active Directory Federation Services, add the claim rules required in the authentication response by Oracle Cloud Infrastructure.
  5. Test your configuration by logging in to Oracle Cloud Infrastructure with your Active Directory credentials.