Event Data Publishing Reference Schemas and Sample Files

Defines schema and sample output code snippet of Oracle Access Governance components published to Oracle Cloud Infrastructure (OCI) Buckets and OCI Streams.

Header Schema and Sample Output Reference

There are headers related to event types, covering Day 0 and Day N export, and another event types, covering for publishing of data objects, which includes policies, identities, resources, and so on for create, update, and delete operations.

Day 0 Message Header Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "eventId": {
      "type": "string"
    },
    "correlationId": {
      "type": "string"
    },
    "eventTime": {
      "type": "string"
    },
    "eventTypeVersion": {
      "type": "string"
    },
    "version": {
      "type": "string"
    },
    "operation": {
      "type": "string"
    },
    "messageType": {
      "type": "string"
    },
    "eventType": {
      "type": "string"
    },
    "opcRequestId": {
      "type": "string"
    },
    "tenancyId": {
      "type": "string"
    },
    "serviceInstanceId": {
      "type": "string"
    }
  },
  "additionalProperties": false
}

Day 0 Sample Header

{
  "headers": {
    "eventId": "752d5e14-a784-4d91-9cf4-57c0a72d7620",
    "correlationId": "9a0041f5-f67f-4b06-8fbd-c9b64d1d5ee3",
    "eventTime": "2024-09-05T16:57:59.922065942Z",
    "eventTypeVersion": "1.0",
    "version": "1.0",
    "operation": "CREATE",
    "messageType": "DAY0",
    "eventType": "com.oracle.idm.agcs.data.enablement.DAY0",
    "opcRequestId": "2cec8907-abcd-1234-be17-2dc91122/00ab2d02/2497,
    "tenancyId": "ocid1.tenancy.oc1..aaaaaaaazp2vvzjsn6newkqrpkwndxpdoixtqfgyhnf4y24h7d5ny27h6f3q",
    "serviceInstanceId": "ocid1.agcsgovernanceinstance.oc1.iad.amaaaaaaebkbezqawho7s4aseb4u43vrzy53yiv7ylgfjqk223wpjc7j4ubq"
  }
}

Day 0 Object Export Header Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "eventId": {
      "type": "string"
    },
    "correlationId": {
      "type": "string"
    },
    "eventTime": {
      "type": "string"
    },
    "eventTypeVersion": {
      "type": "string"
    },
    "operation": {
      "type": "string"
    },
    "messageType": {
      "type": "string"
    },
    "status": {
      "type": "string"
    },
    "eventType": {
      "type": "string"
    },
    "opcRequestId": {
      "type": "string"
    },
    "tenancyId": {
      "type": "string"
    },
    "serviceInstanceId": {
      "type": "string"
    }
  },
  "additionalProperties": false
}

Sample Output: Day 0 Object Export Header

{
  "headers": {
    "eventId": "8787e121-abcd-1234",
    "correlationId": "dc989b5c-abcd-1234",
    "eventTime": "2024-08-27T21:44:15.274034651Z",
    "eventType": "com.oracle.idm.agcs.data.enablement.policyStatement.created",
    "eventTypeVersion": "1.0",
    "operation": "CREATE",
    "messageType": "TARGET_ACCESS_POLICY_STATEMENT",
    "status": "IN_PROGRESS",
    "opcRequestId": "2cec8907-abcd-1234-be17-2dc91122/00ab2d02/2497",
    "tenancyId": "ocid1.tenancy.oc1..abcd1234",
    "serviceInstanceId": "ocid1.dev.dev.1234"
  }
}

Day N Object Export Header Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "eventId": {
      "type": "string"
    },
    "eventTime": {
      "type": "string"
    },
    "eventTypeVersion": {
      "type": "string"
    },
    "operation": {
      "type": "string"
    },
    "messageType": {
      "type": "string"
    },
    "eventType": {
      "type": "string"
    },
    "opcRequestId": {
      "type": "string"
    },
    "tenancyId": {
      "type": "string"
    },
    "serviceInstanceId": {
      "type": "string"
    }
  },
  "additionalProperties": false
}

Sample Output: Day 0 Object Export Header

{
  "headers": {
    "eventId": "b8bfe07f-1234",
    "eventTime": "2024-05-18T23:19:56.360412Z",
    "tenancyId": "ocid.tenancy.oc1.1234",
    "serviceInstanceId": "ocid1.instance.oc1.1234",
    "opcRequestId": "request-1234",
    "eventType": "com.oracle.idm.agcs.cloudGroup.created",
    "eventTypeVersion": "1.0",
    "operation": "CREATE",
    "messageType": "GROUP"
  }
}

Header Schema Attribute Definition

Here's the schema for Day 0 and Day N headers available in the output file.

Table - Header Schema Attribute Definition for Day 0

Attributes Description
correlationId Unique identifier to correlate two or more events. For example, if a new resource is created and a new policy grants access to the resource, two events will be published and be identified with this identifier.
eventId Unique identifier for each event published either to OCI Bucket or OCI Streams. It ensures that each event can be processed and traced distinctly.
eventTime Timestamp when the event occurred with nanosecond precision. This is required to consume data sequentially and accurately.

Format: YYYY-MM-DDTHH:MM:SS.sssssssssZ

eventTypeversion Schema version used for sending response for each event. If there are significant changes to schema, then version is updated. For more details, refer Semantic Versioning Guidelines.
messageType Type of data component being published. For example, a few possible values:
IDENTITY, GROUP, POLICY, RESOURCE, ACCESS_GUARDRAIL, ACCESS_BUNDLE, OCI_GROUP 
operation Basic operations associated with the data publishing event. It can be CREATE, UPDATE, DELETE. For some operations, such as policies, if you have to update a policy, events are published with a combination of Create and Delete operations than the update operation.
status Event Publishing status. Possible values: START, IN PROGRESS, SUCCESS, FAILED. These are sent in the output files. However, on the Oracle Access Governance Console, you can see Success or Failure status.
eventType Event value used by the service to track the event operation. For example, if we add a new policy statement in a policy, the value is com.oracle.idm.agcs.data.enablement.policyStatement.created
opcRequestId Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
tenancyId Tenancy Oracle Cloud Identifier (OCID) where data is published by .Oracle Access Governance.
serviceInstanceId Service Instance OCID of your Oracle Access Governance application.

Audit History Schema and Sample Output File

Here's Audit History schema.

Audit Events Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "$defs": {
    "AuditHeaders": {
      "type": "object",
      "additionalProperties": {
        "type": "array",
        "items": "string"
      }
    },
    "AuditParameters": {
      "type": "object",
      "additionalProperties": {
        "type": "array",
        "items": "string"
      }
    },
    "AuditIdentity": {
      "type": "object",
      "properties": {
        "host": {
          "type": "string"
        },
        "userAgent": {
          "type": "string"
        },
        "principalId": {
          "type": "string"
        }
      },
      "additionalProperties": false
    },
    "AuditRequest": {
      "type": "object",
      "properties": {
        "requestTime": {
          "type": "integer",
          "format": "date-time"
        },
        "id": {
          "type": "string"
        },
        "path": {
          "type": "string"
        },
        "action": {
          "type": "string"
        },
        "parameters": {
          "type": "object",
          "existingJavaType": "Object"
        },
        "headers": {
          "type": "object",
          "existingJavaType": "Object"
        },
        "payload": {
          "type": "object",
          "existingJavaType": "Object"
        }
      },
      "additionalProperties": false
    },
    "AuditResponse": {
      "type": "object",
      "properties": {
        "responseTime": {
          "type": "integer",
          "format": "date-time"
        },
        "status": {
          "type": "string"
        },
        "headers": {
          "type": "object",
          "existingJavaType": "Object"
        },
        "payload": {
          "type": "object",
          "existingJavaType": "Object"
        }
      },
      "additionalProperties": false
    },
    "AuditStateChange": {
      "type": "object",
      "properties": {
        "previous": {
          "type": "object",
          "existingJavaType": "Object"
        },
        "current": {
          "type": "object",
          "existingJavaType": "Object"
        }
      },
      "additionalProperties": false
    }
  },
  "type": "object",
  "properties": {
    "source": {
      "type": "string"
    },
    "eventType": {
      "type": "string"
    },
    "eventTypeVersion": {
      "type": "string"
    },
    "contentType": {
      "type": "string"
    },
    "region": {
      "type": "string"
    },
    "availabilityDomain": {
      "type": "string"
    },
    "identity": {
      "$ref": "#/$defs/AuditIdentity"
    },
    "request": {
      "$ref": "#/$defs/AuditRequest"
    },
    "response": {
      "$ref": "#/$defs/AuditResponse"
    },
    "stateChange": {
      "$ref": "#/$defs/AuditStateChange"
    }
  },
  "additionalProperties": false,
  "required": [
    "eventType",
    "source",
    "identity"
  ]
}

Sample Output Code Snippet

The data section of the JSONL contains details about an audit event related to creating an access bundle in Oracle Access Governance. The event type is com.example.idm.agcs.audit.permission-manager.createAccessBundle. In this example, the bundle named de-test was created with Active status, requiring no approval, and is managed by Ama Maclead.

{
  "headers": {
    "eventType": "com.example.idm.agcs.data.enablement.auditEvents",
    "operation": "CREATE",
    "messageType": "AUDIT_EVENTS",
    "eventTime": "2025-03-11T15:54:27.324101844Z",
    "tenancyId": "ocid1.tenancy.oc1..aaaaaaaahvjxelu7yccuhj3wrq5uqiybu7f5tfxvwteiwaupnlkj4woz6ybq",
    "serviceInstanceId": "ocid1.notreviewedplaceholder.dev.dev.amaaaaaapzw5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq",
    "opcRequestId": "c58addc8-21f8-44b7-bc52-622be741/a478894e-f008-47fb-839a-d56ca9bf/1CBBC187BDBAC903BE9719055AF7A296",
    "eventTypeVersion": "1.0",
    "eventId": "ebb9f39d-28c9-49ff-8313-b9d69a5ef73b"
  },
  "data": "{\"source\":\"permission-manager\",\"eventType\":\"com.example.idm.agcs.audit.permission-manager.createAccessBundle\",\"eventTypeVersion\":\"20230331\",\"contentType\":\"application/json\",\"region\":\"IAD\",\"availabilityDomain\":\"IAD_AD_1\",\"identity\":{\"host\":\"sept12-test-1-idatelmkmn63.campaign.access-governance.oci.oc-test.com\",\"userAgent\":\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0\",\"principalId\":\"globalId.sept12-test-1-agent.18.w5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\"},\"request\":{\"requestTime\":1741708466446,\"id\":\"c58addc8-21f8-44b7-bc52-622be741/xxxxxx-f008-47fb-839a-d56ca9bf\",\"path\":\"/pm/20230331/accessBundles\",\"action\":\"POST\",\"parameters\":{},\"headers\":{\"X-RESOURCE-ACCOUNT-GUID\":[\"idcs-cloudservices-us-phoenix-idcs-1\"],\"Origin\":[\"https://sept12-test-1-idatelmkmn63.campaign.access-governance.oci.oc-test.com\"],\"idcs_authn_strength\":[\"2\"],\"X-REQ-POLICY\":[\"mypolicy\"],\"User-Agent\":[\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0\"],\"X-RESOURCE-IDENTITY-SERVICE-GUID\":[\"idcs-824f604a4d4b48b8918cde1416682c66\"],\"Sec-Fetch-Dest\":[\"empty\"],\"Accept-Encoding\":[\"gzip, deflate, br, zstd\"],\"DNT\":[\"1\"],\"idcs_user_tenant_name\":[\"idcs-824f604a4d4b48b8918cde1416682c66\"],\"Sec-Fetch-Mode\":[\"cors\"],\"remote_user\":[\"AMACLEAD@TESTMAIL.COM\"],\"idcs_cloudgate_id\":[\"ag-idcs-app_APPID\"],\"X-RESOURCE-IDENTITY-DOMAIN-NAME\":[\"idcs-824f604a4d4b48b8918cde1416682c66\"],\"idcs_user_csr\":[\"false\"],\"X-RESOURCE-SERVICE-INSTANCE-IDENTITY-POLICYNAME\":[\"mypolicy\"],\"Cookie\":[\"*****\"],\"X-RESOURCE-LISTENER-PATH-PREFIX\":[\"/pm\"],\"Accept\":[\"*/*\"],\"Priority\":[\"u\\u003d0\"],\"X-USERID\":[\"e4b4b893e2f8448ab76bf5ba85dad344\"],\"idcs_user_id\":[\"e4b4b893e2f8448ab76bf5ba85dad344\"],\"Accept-Language\":[\"en-US,en;q\\u003d0.5\"],\"x-user-identity-domain-name\":[\"idcs-824f604a4d4b48b8918cde1416682c66\"],\"X-RESOURCE-LOGICAL-SERVICE-GUID\":[\"0747931e-0c54-4cb2-9ba5-7a2daf70ba20\"],\"opc-request-id\":[\"c58addc8-21f8-44b7-bc52-622be741/a478894e-f008-47fb-839a-d56ca9bf\"],\"X-USERNAME\":[\"Pre1 Ama Middle1 Maclead Suf1\"],\"X-RESOURCE-SERVICE-PERMANENT-HOST\":[\"sept12-test-1-idatelmkmn63.campaign.access-governance.oci.oc-test.com\"],\"idcs_user_assertion\":[\"*****\"],\"X-RESOURCE-SERVICE-INSTANCE-IDENTITY-APPNAME\":[\"AG-sept12-test-1_APPID\"],\"idcs_authn_method\":[\"oauth\"],\"X-RESOURCE-SERVICE-INSTANCE-POLICY-APPNAME\":[\"AG-sept12-test-1_APPID\"],\"x-user-identity-service-guid\":[\"idcs-824f604a4d4b48b8918cde1416682c66\"],\"idcs_user_display_name\":[\"Ama Maclead\"],\"WL-Proxy-SSL\":[\"true\"],\"X-POLICY-IDENTITY-SERVICE-GUID\":[\"idcs-824f604a4d4b48b8918cde1416682c66\"],\"X-RESOURCE-SUB-ACCOUNT-NAMES\":[\"idcs-cloudservices-us-phoenix-idcs-1\"],\"is_ssl\":[\"ssl\"],\"Sec-GPC\":[\"1\"],\"idcs_service_url\":[\"https://idcs-824f604a4d4b48b8918cde1416682c66.identity.oraclecloud.com:443\"],\"Content-Length\":[\"4415\"],\"idcs_session_id\":[\"6190bce48bdd4a8b8ad233e06e21e980:9cf06f\"],\"Content-Type\":[\"application/json\"],\"X-USERGROUPS\":[\"Auditor-Group,NewGrpCreate,QAGrp GA1,00jc,FlatFileMgr,joe-data,Administrators,AGCS_groot_001,ag_policy_user_test_group,AccessGovPPGrp5324_1,Auto_OCIGroup,AGCSGroup6658,API_NS_GROUP46,Nandha-test,EWBGroup1,agcs_cross,AGFFGrp5342,AdvancedGovernance,TestCreate2,TestPolicyagcs,QAGrp GA2,OCIMembGroup,TestAug29Nandhatest,Create1,hamburger,agcs_email_group,DataFeed_writer_access_group,Admin,Badge_Access,vasil-test-user,AGCS_Users,Test45Nandha,agcs_agent_users,AG_User\"],\"Referer\":[\"https://sept12-test-1-idatelmkmn63.campaign.access-governance.oci.oc-test.com/ui/access-bundle/create/\"],\"Sec-Fetch-Site\":[\"same-origin\"],\"Host\":[\"sept12-test-1-idatelmkmn63.campaign.access-governance.oci.oc-test.com\"],\"X-RESOURCE-WEBTIER-POLICY-DISABLED\":[\"false\"],\"X-RESOURCE-SERVICE-INSTANCE-GUID\":[\"ocid1.notreviewedplaceholder.dev.dev.amaaaaaapzw5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\"],\"idcs_remote_user\":[\"AMACLEAD@TESTMAIL.COM\"],\"X-RESOURCE-SERVICE-TYPE\":[\"AccessGovernance\"],\"idcs_remote_user_mappingattr\":[\"userName\"]}},\"response\":{\"responseTime\":1741708466994,\"status\":\"200\",\"headers\":{\"Content-Type\":[\"application/json\"]},\"payload\":{\"permissions\":[{\"id\":\"groups.ICF.e933985f-fd7c-487f-86f4-9743c5c7f4ed.2b512719820c9a2004c592558020f4f3\",\"name\":\"2222222\",\"type\":\"ENTITLEMENTS\",\"timeCreatedOn\":1.737460861402E12,\"resource\":{\"id\":\"resource.ICF.e933985f-fd7c-487f-86f4-9743c5c7f4ed.1313a1286b70dddd47d43ceb507d9f84\",\"name\":\"AD_FULL_DN_QA\",\"displayName\":\"AD_FULL_DN_QA\",\"type\":\"AD\"},\"entitlementType\":{\"id\":\"etype.ICF.e933985f-fd7c-487f-86f4-9743c5c7f4ed.4b32eb973e48ea15527a4fc67f17574e\",\"name\":\"icf.connector.entitlement.type.groups\",\"displayName\":\"Group\",\"externalId\":\"groups\"}}],\"id\":\"de8a3a17-fc25-492f-838d-bb323c4b22f4\",\"name\":\"de-test\",\"description\":\"\",\"requestableBy\":{\"id\":\"ANY\",\"name\":\"Anyone\",\"displayName\":\"Anyone\"},\"status\":\"Active\",\"approvalWorkflowId\":{\"id\":\"NO_APPROVAL_REQUIRED\",\"name\":\"No Approval Required\",\"displayName\":\"No Approval Required\"},\"target\":{\"id\":\"e933985f-fd7c-487f-86f4-9743c5c7f4ed\",\"name\":\"AD_FULL_DN_QA\",\"displayName\":\"AD_FULL_DN_QA\"},\"targetType\":\"ICF\",\"timeCreatedOn\":1.741708466865E12,\"timeUpdatedOn\":1.741708466865E12,\"ownershipCollectionId\":\"5da53d00-4cde-4309-a284-11c492aba2e0\",\"owners\":[{\"id\":\"globalId.sept12-test-1-agent.18.w5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\",\"name\":\"Ama Maclead\",\"isPrimary\":true}],\"createdBy\":{\"id\":\"globalId.sept12-test-1-agent.18.w5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\",\"name\":\"Ama Maclead\",\"displayName\":\"Ama Maclead\"},\"updatedBy\":{\"id\":\"globalId.sept12-test-1-agent.18.w5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\",\"name\":\"Ama Maclead\",\"displayName\":\"Ama Maclead\"},\"customAttributes\":{},\"targetAttributes\":{\"accountAttributes\":[{\"name\":\"password\",\"title\":\"Password\",\"values\":[],\"type\":\"GuardedString\",\"children\":[],\"discriminator\":\"AccountPassword\",\"isQuestion\":false},{\"name\":\"organizationName\",\"title\":\"Organization\",\"values\":[\"OU\\u003dABC,DC\\u003dadlrg12c,DC\\u003dus,DC\\u003doracle,DC\\u003dcom\"],\"type\":\"String\",\"children\":[],\"isQuestion\":false},{\"name\":\"passwordNeverExpires\",\"title\":\"Password never expires\",\"values\":[\"false\"],\"type\":\"Boolean\",\"children\":[],\"isQuestion\":false},{\"name\":\"userMustChangePasswordAtNextLogon\",\"title\":\"User must change password at next logon\",\"values\":[\"false\"],\"type\":\"Boolean\",\"children\":[],\"isQuestion\":false},{\"name\":\"passwordNotRequired\",\"title\":\"Do not require a password\",\"values\":[\"false\"],\"type\":\"Boolean\",\"children\":[],\"isQuestion\":false},{\"name\":\"accountExpirationDate\",\"title\":\"Account expiration date\",\"values\":[],\"type\":\"String\",\"children\":[],\"isQuestion\":false},{\"name\":\"company\",\"title\":\"Company\",\"values\":[],\"type\":\"String\",\"children\":[],\"isQuestion\":true},{\"name\":\"manager\",\"title\":\"Manager\",\"values\":[],\"type\":\"String\",\"children\":[],\"isQuestion\":false},{\"name\":\"office\",\"title\":\"Office\",\"values\":[],\"type\":\"String\",\"children\":[],\"isQuestion\":true}],\"entitlementAttributes\":[{\"name\":\"groups.ICF.e933985f-fd7c-487f-86f4-9743c5c7f4ed.2b512719820c9a2004c592558020f4f3\",\"title\":\"2222222\",\"values\":[\"CN\\u003d2222222,OU\\u003dstaging_adgroup,OU\\u003dagcs-itsuite,DC\\u003dadlrg12c,DC\\u003dus,DC\\u003doracle,DC\\u003dcom\"],\"type\":\"RepeatableFieldSet\",\"entitlementType\":\"groups\",\"children\":[]}]},\"externalId\":\"ocid1.notreviewedplaceholder.dev.dev.amaaaaaapzw5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\",\"isAgManaged\":true,\"displayName\":\"de-test\",\"isAccountProfileExists\":true,\"accountProfileId\":\"462ac465-c0a3-48d4-bb60-3c7b5cae0882\",\"accountProfileName\":\"AD_Profile_Jan21\",\"accessGuardrails\":[],\"createdByRef\":{\"value\":\"globalId.sept12-test-1-agent.18.w5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\",\"displayName\":\"Ama Maclead\",\"resourceType\":\"AccessBundle\"},\"updatedByRef\":{\"value\":\"globalId.sept12-test-1-agent.18.w5rdiaifkgmp5r4e3e6u2vsmpomz2hwywo7maxrwy6zjr2wamq\",\"displayName\":\"Ama Maclead\",\"resourceType\":\"AccessBundle\"}}},\"stateChange\":{}}"
}

Audit History Schema Attribute Definition

Here's the attribute definition for an Audit History output file, containing creation of access bundle event.

Table - Audit History Data Schema Attribute Definition

Attributes Description
data Contains detailed request, response, identity, and event-related details.
source Name of the Oracle Access Governance service that generated the event. For example, access bundle originate from source permission-manager.
request Details of the API request, if the event was triggered by an API request.
response Details of the API response to the request if the event was triggered by an API request.
identity The client identifiers and Oracle Access Governance global identity associated with the API request that triggered the event.
eventType A unique identifier for the type of event that was generated.
eventTypeVersion REST API version of the service that generated the event .
contentType

The format of the data sent in the event

availabilityDomain The OCI availability domain from which the event was generated.
stateChange Details of changes in state of Oracle Access Governance resource.

Access Bundle Schema and Sample Output File

Here's Access Bundle schema for creation, modification, and deletion.

Access Bundle Create/Update Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "description": {
        "type": "string"
      },
      "displayName": {
        "type": "string"
      },
      "referenceRequestId": {
        "type": "string"
      },
      "requestableBy": {
        "type": "string"
      },
      "status": {
        "type": "string"
      },
      "approvalWorkflow": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/approvalWorkflow.json"
      },
      "accessGuardrailIds": {
        "type": "array",
        "items": {
          "type": "string"
        }
      },
      "targetId": {
        "type": "string"
      },
      "tags": {
        "type": "string"
      },
      "classifications": {
        "type": "string"
      },
      "accessBundleType": {
        "type": "string"
      },
      "permissionIds": {
        "type": "array",
        "items": {
          "type": "string"
        }
      },
      "createdBy": {
        "type": "string"
      },
      "createdByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "createdOn": {
        "type": "integer"
      },
      "updatedBy": {
        "type": "string"
      },
      "updatedByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "updatedOn": {
        "type": "integer"
      },
      "agManaged": {
        "type": "boolean"
      },
      "managedByIds": {
        "type": "array",
        "items": {
          "type": "string"
        }
      },
      "owner": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "ownerShipCollectionId": {
        "type": "string"
      },
      "ownerUIDs": {
        "type": "array",
        "items": {
          "type": "string"
        }
      }
    },
    "additionalProperties": false,
    "required": [
      "id"
    ]
  }
}

Access Bundle Delete Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Sample Output Code Snippet

{
  "headers": {
    "eventId": "3d69xx10-0183-4abe-a813-2469b02de0xx",
    "correlationId": "838exx73d-3fc2-42fd-9469-e52fb3b76xx",
    "eventTime": "2025-02-12T17:11:15.816211Z",
    "eventType": "com.oracle.idm.agcs.data.enablement.accessBundle.created",
    "eventTypeVersion": "1.0",
    "operation": "CREATE",
    "messageType": "ACCESS_BUNDLE",
    "status": "IN_PROGRESS",
    "opcRequestId": "oci-BAE8B2xx9941CDD-202502121711/51051CFFE76EFAE84DAE1B3C22ABCF61/BCB684CC00A2F596FC28902A234FBAFE",
    "tenancyId": "ocid1.tenancy.oc1..axxxxxxxvhjxelu7yccuhj3wrq5uqiybu7f5tfxvwteiwaupnlkj4woz6ybq",
    "serviceInstanceId": "ocid1.notreviewedplaceholder.dev.dev.amaxxxxxxzw5rdiarmplc2m2fwyd4z3h7gbxkwkasgeu64a7n6kx5ulgsbaa"
  },
  "id": "68cbxxxx-7c1f-4e29-b1c0-8b3cc9d311xx",
  "externalId": "ocid1.notreviewedplaceholder.dev.dev.amaxxxxxxzw5rdiarmplc2m2fwyd4z3h7gbxkwkasgeu64a7n6kx5ulgsbaa",
  "name": "AG_System_Shared_groups.ICF.VisionDirectory.e3bxxc25839ed26ce3083fd65d966e29",
  "description": "AG_System_Shared_MS_8740_MT_xx",
  "displayName": "AG_System_Shared_MS_8740_MT_xx",
  "requestableBy": "ANY",
  "status": "ACTIVE",
  "approvalWorkflow": {
    "id": "NO_APPROVAL_REQUIRED"
  },
  "targetId": "1ce4xx23-fc60-4dc4-9926-16ec93a4e6xx",
  "accessBundleType": "ACCESS_BUNDLE",
  "permissions": [
    "groups.ICF.VisionDirectory.e3bxxc25839ed26ce3083fd65d966e29"
  ],
  "createdBy": "AG_System_Shared",
  "createdOn": 1702546950027,
  "updatedBy": "AG_System_Shared",
  "updatedOn": 1702546950027,
  "agManaged": false
}

Access Bundle Schema Attribute Definition

Here's the attribute definition for an Access Bundle output file.

Table - Access Bundle Schema Attribute Definition

Attributes Description
id Unique identifier for each access bundle.
externalId External system identifier for the system.
name Name of the Access Bundle.
description Description of Access Bundle.
displayName Display name of the access bundle.
requestableBy The identity type that may request the Access Bundle. For example, ANY or NONE.
status

Status of the Access Bundle. For example, ACTIVE, DRAFT, and so on.

approvalWorkflow The id of the approval workflow that is applicable to the Access Bundle.
targetId Orchestrated system identifier.
accessBundleType ACCESS_BUNDLE
permissions Lists the specific permissions associated with this Access Bundle.

Access Guardrails Reference Schema and Sample Output File

Here's Access Guardrails schema for creation, modification, and deletion.

Access Guardrails Create/Update Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "$defs": {
    "BasicCondition": {
      "type": "object",
      "properties": {
        "dataType": {
          "type": "string"
        },
        "displayName": {
          "type": "string"
        },
        "lhs": {
          "type": "string"
        },
        "operator": {
          "type": "string"
        },
        "rhs": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "rhsUiDetails": {
          "type": "array",
          "items": {
            "type": "object",
            "properties": {
              "name": {
                "type": "string"
              },
              "value": {
                "type": "string"
              }
            }
          }
        }
      }
    }
  },
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "description": {
        "type": "string"
      },
      "etag": {
        "type": "string"
      },
      "tags": {
        "type": "string"
      },
      "isDetectiveViolationCheckEnabled": {
        "type": "boolean"
      },
      "lifecycleState": {
        "type": "string"
      },
      "rules": {
        "type": "array",
        "items": {
          "type": "object",
          "properties": {
            "conditions": {
              "type": "array",
              "items": {
                "type": "object",
                "properties": {
                  "additionalAttributes": {
                    "type": "object"
                  },
                  "basicCondition": {
                    "$ref": "#/$defs/BasicCondition"
                  },
                  "childConditions": {
                    "type": "array",
                    "items": {
                      "$ref": "#/$defs/BasicCondition"
                    }
                  },
                  "type": {
                    "type": "string"
                  }
                }
              }
            },
            "id": {
              "type": "string"
            },
            "operator": {
              "type": "string"
            },
            "type": {
              "type": "string",
              "const": "DEFAULT"
            }
          }
        }
      },
      "actionOnFailure": {
        "type": "object",
        "properties": {
          "actionType": {
            "type": "string"
          },
          "revokeLaterAfterNumberOfDays": {
            "type": "integer"
          },
          "risk": {
            "type": "string"
          },
          "shouldUserManagerBeNotified": {
            "type": "boolean"
          }
        }
      },
      "createdByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "updatedByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "owner": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "ownerShipCollectionId": {
        "type": "string"
      }
    }
  }
}

Access Guardrails Delete Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "required": [
    "id"
  ]
}

Sample Output Code Snippet

{
  "headers": {
    "eventId": "f56fxxx4-8978-41fb-9c65-4d76c62dxxxx",
    "correlationId": "06c5xxxda-1197-4bbb-af61-f52b3c3axx",
    "eventTime": "2025-02-13T20:06:46.552420Z",
    "eventType": "com.oracle.idm.agcs.data.enablement.accessGuardrail.created",
    "eventTypeVersion": "1.0",
    "operation": "CREATE",
    "messageType": "ACCESS_GUARDRAIL",
    "status": "IN_PROGRESS",
    "opcRequestId": "oci-6274xxx9150164E-202502132006/8BA77549ECC927ABE9AF11A5C8C36634/85A585D070E8CCCEA80DA02F16D22FD8",
    "tenancyId": "ocid1.tenancy.oc1..axxaaaaahvjxelu7yccuhj3wrq5uqiybu7f5tfxvwteiwaupnlkj4woz6ybq",
    "serviceInstanceId": "ocid1.agcsgovernanceinstance.dev.dev.amxxxxxxpzw5rdiax5zfaryw34s3l763zzn7lzott4cvv2d4bqb6lmzhqmiq"
  }
}
{
  "id": "1a1xxx8c-18f2-42f2-979d-ebd06adaxxxx",
  "externalId": "1a1xxx8c-18f2-42f2-979d-ebd06adaxxxx",
  "name": "MS_LowRisk",
  "description": "MS_LowRisk",
  "etag": "5fa7xxxface30e64407aec2349cb5d056aaaf9705d9d0a4caac7c15b799d7904343",
  "tags": "",
  "isDetectiveViolationCheckEnabled": false,
  "lifecycleState": "ACTIVE",
  "rules": [
    {
      "conditions": [
        {
          "basicCondition": {
            "dataType": "String",
            "displayName": "Location",
            "lhs": "addresses.country",
            "operator": "Eq",
            "rhs": ["AD"],
            "rhsUiDetails": []
          },
          "childConditions": [],
          "type": "IDENTITY_ATTRIBUTE"
        }
      ],
      "id": "b2e0xxx05-baca-4d56-953c-fb8cbf508xxx",
      "operator": "OR",
      "type": "DEFAULT"
    }
  ],
  "actionOnFailure": {
    "actionType": "REVOKE_LATER",
    "revokeLaterAfterNumberOfDays": 1.0,
    "risk": "LOW",
    "shouldUserManagerBeNotified": false
  },
  "createdByRef": {
    "displayName": "Ama Maclead",
    "resourceType": "ACCESS_GUARDRAIL",
    "value": "globalId.OCI.xxx98-5989-4da8-b35b-ede2039defxxx"
  },
  "updatedByRef": {
    "displayName": "Ama Maclead",
    "value": "globalId.OCI.xxx98-5989-4da8-b35b-ede2039defxxx"
  },
  "owner": {
    "displayName": "Ama Maclead",
    "value": "globalId.OCI.xxx98-5989-4da8-b35b-ede2039defxxx"
  },
  "ownerShipCollectionId": "38a8xxx4-db2f-4556-bb2b-804def74dxxx"
}

Access Guardrails Schema Attribute Definition

Here's the attribute definition for an Access Guardrails output file.

Table - Access Guardrails Attribute Definition

Attributes Description
id Unique identifier for access guardrails.
externalId External system identifier for tracking. This is same as id for access guardrails,as it is created within Oracle Access Governance.
name Name of access guardrails.
description Identifier for the type of permission granted.
isDetectiveViolationCheckEnabled Boolean flag indicating if violation detection is enabled.
lifecycleState

The current state of the access guardrails. For example, ACTIVE, INACTIVE, DELETED.

rules List of conditions for the access guardrails.
conditions Specific constraints what you want to enforce.
actionOnFailure Specifies the action or operation that Oracle Access Governance must perform when an access guardrails violation is triggered. The failure action is governed by actionType (e.g., REVOKE_LATER or REVOKE_IMMEDIATELY)
createdByRef Reference to the who created the Access Guardrails.

Identity Reference Schema and Sample Output File

Here's Identity schema for creation, modification, and deletion.

Identity Creation Schema

{
   "$schema": "https://json-schema.org/draft/2019-09/schema",
   "title": "identities",
   "type": "array",
   "items": {
      "type": "object",
      "properties": {
         "compartmentId": {
            "type": "string"
         },
         "messageType": {
            "type": "string"
         },
         "correlationId": {
            "type": "string"
         },
         "globalIdentity": {
            "type": "object",
            "properties": {
               "identity": {
                  "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/identity.json"
               },
               "attributes": {
                  "type": "object",
                  "properties": {
                     "clearance": {
                        "type": "string"
                     },
                     "employeeNumber": {
                        "type": "string"
                     }
                  }
               },
               "id": {
                  "type": "string"
               },
               "targetIdentities": {
                  "type": "array",
                  "items": {
                     "properties": {
                        "targetIdentity": {
                           "type": "object",
                           "properties": {
                              "targetId": {
                                 "type": "string"
                              },
                              "identity": {
                                 "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/identity.json"
                              },
                              "externalId": {
                                 "type": "string"
                              },
                              "id": {
                                 "type": "string"
                              },
                              "domainId": {
                                 "type": "string"
                              }
                           }
                        }
                     }
                  }
               }
            }
         },
         "operation": {
            "type": "string"
         },
         "timestamp": {
            "type": "string"
         }
      },
      "additionalProperties": false,
      "required": [
         "globalIdentity"
      ]
   }
}

Identity Modification Schema

{
   "$schema": "https://json-schema.org/draft/2019-09/schema",
   "title": "identities",
   "type": "object",
   "properties": {
      "compartmentId": {
         "type": "string"
      },
      "messageType": {
         "type": "string"
      },
      "correlationId": {
         "type": "string"
      },
      "globalIdentity": {
         "type": "object",
         "properties": {
            "identity": {
               "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/identity.json"
            },
            "attributes": {
               "type": "object",
               "properties": {
                  "clearance": {
                     "type": "string"
                  },
                  "employeeNumber": {
                     "type": "string"
                  }
               }
            },
            "id": {
               "type": "string"
            },
            "targetIdentities": {
               "type": "array",
               "items": {
                  "properties": {
                     "targetIdentity": {
                        "type": "object",
                        "properties": {
                           "targetId": {
                              "type": "string"
                           },
                           "identity": {
                              "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/identity.json"
                           },
                           "externalId": {
                              "type": "string"
                           },
                           "id": {
                              "type": "string"
                           },
                           "domainId": {
                              "type": "string"
                           }
                        }
                     }
                  }
               }
            }
         }
      },
      "operation": {
         "type": "string"
      },
      "timestamp": {
         "type": "string"
      }
   },
   "additionalProperties": false,
   "required": [
      "globalIdentity"
   ]
}

Identity Deletion Schema

{
   "$schema": "https://json-schema.org/draft/2019-09/schema",
   "title": "identities",
   "type": "object",
   "properties": {
      "compartmentId": {
         "type": "string"
      },
      "globalIdentity": {
         "type": "object",
         "properties": {
            "id": {
               "type": "string"
            },
            "targetIdentities": {
               "type": "array",
               "items": {
                  "properties": {
                     "targetIdentity": {
                        "type": "object",
                        "properties": {
                           "id": {
                              "type": "string"
                           }
                        },
                        "additionalProperties": false
                     }
                  }
               }
            }
         },
         "additionalProperties": false
      }
   },
   "additionalProperties": false,
   "required": [
      "globalIdentity"
   ]
}

Sample Output Code Snippet

{
   "globalIdentity": {
      "id": "globalId.ICF.EBS_HRMS_STAGE.f014bda5ef4003efa0d8149e59216953",
      "identity": {
         "agStatus": "AG_ACTIVE",
         "agSubType": "WORKFORCE",
         "agRisk": {
            "value": 0,
            "customAttributes": {}
         },
         "agOrganizations": [
            {
               "value": "ba987bed-15ae-47a2-a5b0-265432568ed0",
               "displayName": "PERF_ORGANIZATION-1708541816625"
            },
            {
               "value": "4bf99c0b-ae99-4787-a318-b5eb1e30b89d",
               "displayName": "PERF_ORGANIZATION-1708541866473"
            }
         ],
         "customAttributes": {
            "dateOfBirth": 56160000000,
            "businessGroupId": "7328",
            "supervisorName": "Ivanchuk, Mr. Dmytro",
            "personType": "8351",
            "personId": "28727",
            "grade": "Professional.1",
            "maritalStatus": "S",
            "nationality": "UKR",
            "job": "Buyer",
            "startDate": 828921600000
         },
         "department": "Purchasing",
         "displayName": "Ivan Shevchuk",
         "emails": [
            {
               "value": "Ivan.Shevchuk@example.com"
            }
         ],
         "name": {
            "familyName": "Shevchuk",
            "givenName": "Ivan"
         },
         "organization": {},
         "primaryEmail": "Ivan.Shevchuk@example.com",
         "status": "Active",
         "title": "MR.",
         "userName": "28727"
      },
      "targetIdentities": [
         {
            "id": "targetId.account.ICF.EBS-UM.bdf6f156f130553394a859e02f793182",
            "externalId": "1015628",
            "targetId": "a83f87df-75ca-4c4d-966a-2928626e82b8",
            "identity": {
               "customAttributes": {
                  "operationType": "CREATE_OR_UPDATE",
                  "passwordExpireType": "None",
                  "effectiveStartDate": 1689206400000,
                  "roles": []
               },
               "name": {},
               "primaryEmail": "Ivan.Shevchuk@example.com",
               "status": "true"
            }
         },
         {
            "id": "targetId.account.ICF.EBS_HRMS_STAGE.f014bda5ef4003efa0d8149e59216953",
            "externalId": "28727",
            "targetId": "f2a858e5-c449-4a5a-9714-c2e7471b1d2a",
            "identity": {
               "customAttributes": {
                  "personType": "8351",
                  "title": "MR.",
                  "businessGroupId": "7328",
                  "dateOfBirth": 56160000000,
                  "employeeNumber": "4",
                  "assignments": [
                     {
                        "element": {
                           "organizationId": "7376",
                           "UID": "28936",
                           "jobId": "30930",
                           "gradeId": "18000",
                           "supervisorId": "28725",
                           "effectiveDate": "828921600000"
                        }
                     }
                  ],
                  "hireDate": 828921600000,
                  "gender": "M",
                  "maritalStatus": "S",
                  "operationType": "CREATE_OR_UPDATE",
                  "nationality": "UKR",
                  "lastName": "Shevchuk",
                  "firstName": "Ivan",
                  "addresses": []
               },
               "name": {},
               "primaryEmail": "Ivan.Shevchuk@example.com",
               "status": "true"
            }
         }
      ]
   }
}

Identity Schema Attribute Definition

Here's the attribute definition for an identity export file.

Table - Identity Schema Attribute Definition for Day 0

Attributes Description
globalIdentity Composite identity profile object used by Oracle Access Governance as a source of truth to perform various governance and provisioning operations. It contains access profile details, including core and custom attributes. For more information, refer to Identities Access Details Reference,
globalIdentity → id Unique identifier for the resource within Oracle Access Governance. This also includes the orchestrated system information from where the resource value is ingested.
targetIdentities Orchestrated identity object integrated with Oracle Access Governance and matched with the composite identity profile.
targetIdentities → id Unique identifier for the resource within Oracle Access Governance. In this case, it depicts orchestrated system integrated with Oracle Access Governance. This includes the orchestrated system name identifier.
targetId Unique identifier for the orchestrated system integrated with Oracle Access Governance.

Group Reference Schema and Sample Output File

Here's group schema for creation, modification, and deletion.

Group Created/Updated Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "domainId": {
        "type": "string"
      },
      "compartmentId": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "description": {
        "type": "string"
      },
      "add": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/group/identities.json"
      },
      "remove": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/group/identities.json"
      }
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Group Identities Modification Sub-Schema

Whenever identities in the group changes.

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "identities": {
      "type": "array",
      "items": {
        "properties": {
          "id": {
            "type": "string"
          },
          "externalId": {
            "type": "string"
          },
          "targetIdentityId": {
            "type": "string"
          }
        }
      }
    }
  }
}

Group Deleted Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Sample Output Code Snippet

[
  {
    "id": "group.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.50cbbfe63d291f31cbcb6e4f948445f7",
    "domainId": "resource.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.acbae60a4440ffff0b51950c34c3c6e6",
    "compartmentId": "resource.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.ff11b1e772ef27a021fc45519970f965",
    "externalId": "ocid1.group.oc1..aaaaaaaag5ltzaypusliz5owrqshcrd6kvtiy7gz3eqfha22bpfvgxzlscxq",
    "targetId": "435e1c98-5989-4da8-b35b-ede2039defa0",
    "name": "ab-testgroup1",
    "add": {
      "identities": [
        {
          "id": "globalId.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.8cbb3bb593396504e540b75c4900d59e",
          "externalId": "fec6a739324843ecbc7d6add45180b58",
          "targetIdentityId": "targetId.account.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.8cbb3bb593396504e540b75c4900d59e"
        }
      ]
    },
    "remove": {
      "identities": []
    }
  },
  {
    "id": "group.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.53b402291db7755134f6663ff22cd1a7",
    "domainId": "resource.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.acbae60a4440ffff0b51950c34c3c6e6",
    "compartmentId": "resource.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.ff11b1e772ef27a021fc45519970f965",
    "externalId": "ocid1.group.oc1..aaaaaaaaz2oxykpn5cn6ex2jfbgaymtsmalmltopeuu4acmfmwsq4cv55gia",
    "targetId": "435e1c98-5989-4da8-b35b-ede2039defa0",
    "name": "grp-lca1s",
    "add": {
      "identities": [
        {
          "externalId": "ff09a2c5bee34be0ad88564381f93fbd",
          "targetIdentityId": "targetId.account.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.a30f20e40ac98bbc43a6b0c0387cf196"
        },
        {
          "id": "globalId.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.8cbb3bb593396504e540b75c4900d59e",
          "externalId": "fec6a739324843ecbc7d6add45180b58",
          "targetIdentityId": "targetId.account.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.8cbb3bb593396504e540b75c4900d59e"
        }
      ]
    },
    "remove": {
      "identities": []
    }
  }

Group Schema Attribute Definition

Here's the attribute definition for a group export file. You'll only be able to publish OCI group details.

Table - Group Schema Attribute Definition

Attributes Description
id Unique identifier for the resource within Oracle Access Governance. This also includes the orchestrated system information from where the resource value is ingested.
domainId Unique domain identifier (OCID) associated with the identity collection (IAM group) ingested into Oracle Access Governance. This is applicable only for OCI orchestrated system and contains OCI IAM groups.
externalId Refers to OCID of the object on the OCI console. For an OCI group, the external id may look like ocid1.group.oc1.ab1234a
compartmentId Unique compartment identifier (OCID) associated with the identity collection. This is applicable only for OCI orchestrated system and contains OCI IAM groups.
name Identity collection name.
description Identity collection description.
add Array of identities included in the identity collection.
remove Array of identities excluded from this identity collection. Update and Create operations share the same schema. However, when a new identity collection is created, you'll not receive any identities in this attribute.

Global Identity Collection Reference Schema and Sample Output File

Here's Global identity collection schema for creation, modification, and deletion.

Global Identity Collection Created/Updated Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "displayName": {
        "type": "string"
      },
      "identityCollectionId": {
        "type": "string"
      },
      "identityCollectionDescription": {
        "type": "string"
      },
      "identityCollectionType": {
        "type": "string"
      },
      "isManagedAtTarget": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "status": {
        "type": "string"
      },
      "tags": {
        "type": "array",
        "items": {
          "type": "string"
        }
      },
      "createdBy": {
        "type": "string"
      },
      "createdByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "createdOn": {
        "type": "integer"
      },
      "updatedBy": {
        "type": "string"
      },
      "updatedByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "updatedOn": {
        "type": "integer"
      },
      "agRisk": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/agRisk.json"
      },
      "agManaged": {
        "type": "boolean"
      },
      "managedByIds": {
        "type": "array",
        "items": {
          "type": "string"
        }
      },
      "owner": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "ownerShipCollectionId": {
        "type": "string"
      },
      "ownerUIDs": {
        "type": "array",
        "items": {
          "type": "string"
        }
      }
    },
    "additionalProperties": false,
    "required": [
      "id"
    ]
  }
}

Global Identity Collection Deleted Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Sample Output Code Snippet

[
  {
    "agManaged": true,
    "displayName": "MS_Testing_Creater",
    "identityGroupType": "HUMAN",
    "membershipRule": "",
    "identityGroupDescription": "",
    "managedByIds": [],
    "tags": [],
    "name": "MS_Testing_Creater",
    "status": "ACTIVE",
    "createdBy": "globalId.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.e316de730fdbd176fceb9a39cd0c5199",
    "updatedBy": "AG_System",
    "createdOn": 1729868777184,
    "updatedOn": 1739700586808,
    "isManagedAtTarget": "false",
    "membersCount": 4.0,
    "agRisk": {
      "value": 1.0,
      "customAttributes": {}
    },
    "currentMembers": 4.0,
    "expectedMembers": 1.0,
    "createdByRef": {
      "value": "globalId.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.e316de730fdbd176fceb9a39cd0c5199",
      "displayName": "Ama Maclead",
      "resourceType": "IDENTITY_GROUP"
    },
    "updatedByRef": {
      "value": "AG_System",
      "displayName": "AG System",
      "resourceType": "IDENTITY_GROUP"
    },
    "owner": {
      "value": "globalId.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.e316de730fdbd176fceb9a39cd0c5199",
      "displayName": "Ama Maclead"
    },
    "ownerShipCollectionId": "f60c54b8-6cda-4e54-ae54-793b877cee80",
    "id": "00074b25-d331-449e-a496-636f556ccabe",
    "externalId": "ocid1.agcsgovernanceinstance.dev.dev.amaaaaaapzw5rdiax5zfaryw34s3l763zzn7lzott4cvv2d4bqb6lmzhqmiq",
    "schemas": [],
    "meta": {
      "resourceType": "IDENTITY_GROUP",
      "created": 1729868777184,
      "lastModified": 1739700586818
    }
  },
  {
    "agManaged": false,
    "displayName": "jh-test-groupC",
    "identityGroupType": "OCI_GROUP",
    "membershipRule": "",
    "managedByIds": [],
    "name": "jh-test-groupC_accessgovtest_Default_accessgovtest",
    "status": "ACTIVE",
    "createdBy": "AG_System",
    "updatedBy": "AG_System",
    "createdOn": 1729164621130,
    "updatedOn": 1739700455175,
    "customAttributes": {
      "compartmentFQN": "accessgovtest",
      "ocid": "ocid1.group.oc1..aaaaaaaaaohimj6cm4pvztilf3afvqbjhp6ozeihks54xrfdwpq6wzgt6r4a",
      "domainOCID": "ocid1.domain.oc1..aaaaaaaayrdl7hgnjeqbpi4nvt72hxtki4uw7o5zif4j3zfh7zpfc6truzoq",
      "cloudAccountName": "accessgovtest",
      "domainId": "resource.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.acbae60a4440ffff0b51950c34c3c6e6",
      "roleAssignments": [],
      "compartmentId": "resource.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.ff11b1e772ef27a021fc45519970f965",
      "compartmentOCID": "ocid1.tenancy.oc1..aaaaaaaazp2vvzjsn6newkqrpkwndxpdoixtqfgyhnf4y24h7d5ny27h6f3q",
      "idcsId": "077d73db4c344f2bbf2d18a11a6550b7",
      "mappedTo": [],
      "compartmentName": "accessgovtest",
      "domainName": "Default",
      "mappedFrom": [],
      "tags": [],
      "isReviewable": true
    },
    "isManagedAtTarget": "false",
    "membersCount": 0.0,
    "agRisk": {
      "value": 0.0,
      "customAttributes": {}
    },
    "currentMembers": 0.0,
    "expectedMembers": 2.0,
    "createdByRef": {
      "value": "AG_System",
      "displayName": "AG System",
      "resourceType": "IDENTITY_GROUP"
    },
    "updatedByRef": {
      "value": "AG_System",
      "displayName": "AG System",
      "resourceType": "IDENTITY_GROUP"
    },
    "owner": {},
    "id": "0028ba84-1029-4fcd-aa61-b30f6b730f29",
    "externalId": "group.OCI.435e1c98-5989-4da8-b35b-ede2039defa0.55702b2d2cfdb76a5539e2c310e0751b",
    "schemas": [],
    "meta": {
      "resourceType": "IDENTITY_GROUP",
      "created": 1729164621130,
      "lastModified": 1739700455183
    }
  }
]

Global Identity Collection Schema Attribute Definition

Here's the attribute definition for the global identity collection managed by or ingested into Oracle Access Governance.

Table - Global Identity Collection Schema Attribute Definition

Attributes Description
agManaged Indicated if the identity collection is managed by Oracle Access Governance.
displayName Identity collection display name.
identityGroupType Specifies the type of identity group (HUMAN or OCI_GROUP).
membershipRule Defines rules for membership criteria based on certain conditional statements.
managedByIds List of IDs managing this identity group.
tags Any associated tags for categorization
name Identity Collection name.
status Current status of the identity collection. (For example, ACTIVE, DRAFT, and so on).
createdBy Identity that created the group. For OCI Identity Collections, it is AG System.
currentMembers Number of active members in the group.
expectedMembers Expected number of members based on rules.

Cloud Policies Reference Schema and Sample Output File

Here's cloud policy schema for creation and deletion.

Policies Creation Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "cloudType": {
        "type": "string"
      },
      "compartmentId": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "policyStatementId": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "description": {
        "type": "string"
      },
      "statement": {
        "type": "string"
      },
      "subjects": {
        "type": "array",
        "items": {
          "properties": {
            "id": {
              "type": "string"
            },
            "name": {
              "type": "string"
            },
            "type": {
              "type": "string"
            }
          }
        }
      },
      "verb": {
        "type": "string"
      },
      "resourceType": {
        "type": "string"
      },
      "location": {
        "type": "object",
        "properties": {
          "compartment": {
            "type": "string"
          }
        }
      },
      "tags": {
        "type": "object"
      }
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Policies Modification Schema

Policy Modifications are handled using a combination of create and delete operations. To update a policy, existing policy is first deleted before replacing it with a policy with new parameters.

Policies Deletion Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    },
    "additionalProperties": false,
    "required": [
      "id"
    ]
  }
}

Sample Output Code Snippet

{
  "headers": {
    "eventId": "8788h161-acde-43a4-87e4-b6f01ca3aaf0",
    "correlationId": "dc98e55c-f574-422f-a9ce-326fce9d9edc",
    "eventTime": "2024-08-27T21:44:15.274034651Z",
    "eventType": "com.oracle.idm.agcs.data.enablement.policyStatement.created",
    "eventTypeVersion": "1.0",
    "operation": "CREATE",
    "messageType": "TARGET_ACCESS_POLICY_STATEMENT",
    "status": "IN_PROGRESS",
    "opcRequestId": <opc-request-id>,
    "tenancyId": <tenancy-id>,
    "serviceInstanceId": <service-instance-ocid>
  },
  "data": "[{\"id\":\"tapolicy.OCI.agcusttokyo.aed5bbcee30da0a828e76f01deef7090\",\"externalId\":\"ocid1.policy.oc1..aaaaaaaabgvxsco3avg772ehflmwvljaur75zvzdwh6y7wqhzhvcvp2mxtha\",\"targetId\":\"fdb6c5f7-6e3a-4f36-9dd0-a17993be389f\",\"policyStatementId\":\"tapolicystmt.OCI.agcusttokyo.a72df097dce1deecf8606c59b6dec588\",\"name\":\"DummyPolicy20Nov\",\"description\":\"DummyPolicy20Nov\",\"statement\":\"Allow group \\u0027TestAlpha\\u0027/\\u0027ComputeGroup\\u0027 to manage instance-family in tenancy\",\"subjects\":[{\"id\":\"TestAlpha/ComputeGroup\"}],\"verb\":\"MANAGE\",\"resourceTypes\":[\"VolumeAttachment\",\"InstanceConsoleConnection\",\"Instance\",\"AppCatalogListing\",\"ComputeCapacityReservation\",\"DedicatedVmHost\",\"AutoScalingConfiguration\",\"InstanceAgentCommand\",\"ConsoleHistory\"],\"location\":{\"compartment\":\"agcusttokyo\"}},{\"id\":\"tapolicy.OCI.agcusttokyo.aed5bbcee30da0a828e76f01deef7090\",\"externalId\":\"ocid1.policy.oc1..aaaaaaaabgvxsco3avg772ehflmwvljaur75zvzdwh6y7wqhzhvcvp2mxtha\",\"targetId\":\"fdb6c5f7-6e3a-4f36-9dd0-a17993be389f\",\"policyStatementId\":\"tapolicystmt.OCI.agcusttokyo.08940cfb6db80a7d9b4027e3c9994d51\",\"name\":\"DummyPolicy20Nov\",\"description\":\"DummyPolicy20Nov\",\"statement\":\"Allow group \\u0027TestAlpha\\u0027/\\u002726DecCloudCompute\\u0027 to read app-catalog-listing in tenancy\",\"subjects\":[{\"id\":\"TestAlpha/26DecCloudCompute\"}],\"verb\":\"READ\",\"resourceTypes\":[\"AppCatalogListing\"],\"location\":{\"compartment\":\"agcusttokyo\"}}]"
}

Cloud Policies Schema Attribute Definition

Here's the attribute definition for cloud policy that grants access to resources.

Table - Cloud Policy Schema Attribute Definition

Attributes Description
id Unique identifier for the policy assigned within Oracle Access Governance.
cloudType Indicates that policy applies to OCI.
compartmentId Unique compartment identifier (OCID) associated with the policy. This is applicable only for OCI policies.
externalId Unique policy identifier in OCI, called OCID. For policy, the external id may look like ocid1.policy.oc1.aa1234
policyStatementId Unique identifier for each policy statement associated with the policy.
name Cloud policy name.
description Cloud policy description
statement Policy rules governing control of resources. Each policy consists of one or more policy statements
subjects Array of principals to which the access is granted by this policy, for example, IAM group-name.
verb Access grant type assigned to a resource by using verbs in the policy. Possible verbs may be inspect, read, use, inspect. manage.
resourceType Array of resource types associated with a policy. It can be family resource-type or individual resource-type. For example, instance, volumes, volume-family, and so on. For more information, see Resource Types in OCI.
location Scope of access granted through this policy, such as specific compartment or entire tenancy.

Policy Schema and Sample Output File

Here's policy schema for creation, modification, and deletion. It contains policy rules and statements that govern access to resources.

Policy Created/Updated Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "description": {
        "type": "string"
      },
      "displayName": {
        "type": "string"
      },
      "status": {
        "type": "string"
      },
      "isTransformedPolicy": {
        "type": "string"
      },
      "constraints": {
        "type": "string"
      },
      "tags": {
        "type": "string"
      },
      "policyType": {
        "type": "string"
      },
      "policyVersion": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "targetPolicyId": {
        "type": "string"
      },
      "policyRules": {
        "type": "array",
        "items": {
          "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/policyRule.json"
        }
      },
      "createdBy": {
        "type": "string"
      },
      "createdByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "createdOn": {
        "type": "integer"
      },
      "updatedBy": {
        "type": "string"
      },
      "updatedByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "updatedOn": {
        "type": "integer"
      },
      "agRisk": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/agRisk.json"
      },
      "agManaged": {
        "type": "boolean"
      },
      "managedByIds": {
        "type": "array",
        "items": {
          "type": "string"
        }
      },
      "owner": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "ownerShipCollectionId": {
        "type": "string"
      },
      "ownerUIDs": {
        "type": "array",
        "items": {
          "type": "string"
        }
      }
    },
    "additionalProperties": false,
    "required": [
      "id"
    ]
  }
}

Policy Rule sub-schema

Whenever policy rules change for a policy, it uses the following schema.

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    },
    "externalId": {
      "type": "string"
    },
    "assignmentId": {
      "type": "string"
    },
    "containerId": {
      "type": "string"
    },
    "accessBundleId": {
      "type": "string"
    },
    "identityAttributes": {
      "type": "string"
    },
    "identityCollectionId": {
      "type": "string"
    },
    "identityId": {
      "type": "string"
    },
    "operationId": {
      "type": "string"
    },
    "parsedOn": {
      "existingJavaType": "Long",
      "type": "integer"
    },
    "permissionAttributes": {
      "type": "string"
    },
    "policyRuleVersion": {
      "type": "string"
    },
    "referenceRequestId": {
      "type": "string"
    },
    "resourceBundleId": {
      "type": "string"
    },
    "resourceId": {
      "type": "string"
    },
    "roleId": {
      "type": "string"
    },
    "ruleAction": {
      "type": "string"
    },
    "ruleConstraints": {
      "type": "string"
    },
    "ruleStatement": {
      "type": "string"
    },
    "ruleStatus": {
      "type": "string"
    },
    "ruleType": {
      "type": "string"
    },
    "ruleVerb": {
      "type": "string"
    },
    "targetId": {
      "type": "string"
    },
    "targetIdentityId": {
      "type": "string"
    },
    "createdBy": {
      "type": "string"
    },
    "createdOn": {
      "type": "integer"
    },
    "updatedBy": {
      "type": "string"
    },
    "updatedOn": {
      "type": "integer"
    }
  }
}

Policy Deleted Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Sample Output Code Snippet

  {
    "id": "d1a34f78-5bdc-4e9d-bc6e-3fbb134f76a2",
    "name": "Dev_Policy",
    "displayName": "Development Access Policy",
    "status": "ACTIVE",
    "policyType": "STANDARD_POLICY",
    "policyVersion": "1",
    "policyRules": [
      {
        "id": "f23a6c89-1bd1-4d76-98bc-e4c3a75d68e2",
        "ruleAction": "Assign",
        "ruleStatement": "Assign access-bundle [Dev_Env_Access] to identity-group [Development_Team]",
        "ruleStatus": "ACTIVE",
        "ruleType": "RBAC_RULE"
      }
    ]
  },
  {
    "id": "b6f29a32-9fdc-4a6e-a34b-5cd761f84b73",
    "name": "QA_Policy",
    "displayName": "Quality Assurance Access Policy",
    "status": "ACTIVE",
    "policyType": "STANDARD_POLICY",
    "policyVersion": "1",
    "policyRules": [
      {
        "id": "e7a54b21-3c8d-496f-91ea-5c32b764f3d9",
        "ruleAction": "Assign",
        "ruleStatement": "Assign access-bundle [QA_Testing_Env_Access] to identity-group [QA_Team]",
        "ruleStatus": "ACTIVE",
        "ruleType": "RBAC_RULE"
      }
    ]
  },
  {
    "id": "a9d45162-5f7e-47ca-a215-8b6c7f90e372",
    "name": "DevOps_Policy",
    "displayName": "DevOps Access Policy",
    "status": "ACTIVE",
    "policyType": "STANDARD_POLICY",
    "policyVersion": "1",
    "policyRules": [
      {
        "id": "c5b687f4-2a8d-41fb-b9ec-f3a9d76c5e91",
        "ruleAction": "Assign",
        "ruleStatement": "Assign access-bundle [DevOps_Admin_Access] to identity-group [DevOps_Team]",
        "ruleStatus": "ACTIVE",
        "ruleType": "RBAC_RULE"
      }
    ]
  }

Policy Schema Attribute Definition

Here's the attribute definition for an policy output file.

Table - Policy Schema Attribute Definition

Attributes Description
id Unique identifier for each policy.
name Name of the policy.
displayName Display name of the policy.
requestableBy The identity type that may request the Access Bundle. For example, ANY or NONE.
status

Status of the policy. For example, ACTIVE, INACTIVE.

policyVersion Version of the policy indicating updates.
policyRules List of rules associated with the policy
ruleAction Defines the action taken, such as Assign or Allow.
ruleStatement Specifies what the rule does in a statement form.

Assign role [AG_System_Sharedgroups.ICF.VisionDirectory.f9b72xxxx834] to identity-group [DevOps_Team]

ruleStatus Current status of the rule (e.g., ACTIVE).
ruleType Rule type. For example, RBAC_RULE, ABAC_RULE.

Permission Reference Schema and Sample Output File

Here's Permission schema for creation, modification, and deletion.

Permission Create/Update Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "name": {
        "type": "string"
      },
      "description": {
        "type": "string"
      },
      "displayName": {
        "type": "string"
      },
      "permissionTypeId": {
        "type": "string"
      },
      "granteeName": {
        "type": "string"
      },
      "granteeType": {
        "type": "string"
      },
      "resourceId": {
        "type": "string"
      },
      "resourceName": {
        "type": "string"
      },
      "riskLevel": {
        "type": "string"
      },
      "status": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "userDefinedTags": {
        "type": "string"
      },
      "owner": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "customAttributes": {
        "type": "object"
      }
    },
    "additionalProperties": false,
    "required": [
      "id"
    ]
  }
}

Permission Delete Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "additionalProperties": false,
  "required": [
    "id"
  ]
}

Sample Output Code Snippet

You'll receive JSONL format. The headers section contains metadata such as event type, timestamps, correlation IDs, tenancy details, and request identifiers. Each line represents permission entries, each defining permission details, group IDs, external identifiers, associated resource IDs, target IDs, and operation types.

{"headers":{"eventId":"a20187cX-8bbX-460d-a8X0-55806d7e235c","correlationId":"824dc4fX-7e6X-450a-aaXb-c356f3ae6fbd","eventTime":"2025-02-12T17:28:34.879845Z","eventType":"com.oracle.idm.agcs.data.enablement.permission.created","eventTypeVersion":"1.0","operation":"CREATE","messageType":"PERMISSION","status":"IN_PROGRESS","opcRequestId":"oci-D69EFA92F9FXXF1A-202502121725/39F44AEA185XXE1CF9D200A4840B7A49/CF1A12B2886X01E19C642AE5DF909F9A","tenancyId":"ocid1.tenancy.oc1..aaaaaaaahvjXXlu7yccuhj3wrq5uqiybu7f5tfxvwteiwaupnlkj4woz6ybq","serviceInstanceId":"ocid1.notreviewedplaceholder.dev.dev.amaaaaaapzwXXrdiarmplc2m2fwyd4z3h7gbxkwkasgeu64a7n6kx5ulgsbaa"}}

{"id":"groups.ICF.AD2.0013a594f9XXXe2d766114aef26a73b90","externalId":"CN\u003dADUpgradeGrp a16ug7rXXX_a1oqif0idk,OU\u003dVision,dc\u003dserverad,dc\u003dcom","name":"ADUpgradeGrp a16ug7rXXX_a1oqif0idk","permissionTypeId":"etype.ICF.AD2.ea72c837XXaa05daf0123ae94d7b0ff4","resourceId":"resource.ICF.AD2.f775de49XXdadcea269cc5072261730ac","targetId":"05452611-7305-43c3-b0XX-0ba9936a8553","customAttributes":{"operationType":"CREATE_OR_UPDATE"}}
{"id":"groups.ICF.AD2.001d73d254XXea03ba76ceab1201f083","externalId":"CN\u003dENTL_LHBPS,OU\u003dVision,dc\u003dserverad,dc\u003dcom","name":"ENTL_LHBPS","permissionTypeId":"etype.ICF.AD2.ea72c837XXaa05daf0123ae94d7b0ff4","resourceId":"resource.ICF.AD2.f775de49XXdadcea269cc5072261730ac","targetId":"05452611-7305-43c3-b0XX-0ba9936a8553","customAttributes":{"operationType":"CREATE_OR_UPDATE"}}
{"id":"groups.ICF.AD2.001ead5fXXf0d8b17161eb92b9954740","externalId":"CN\u003dEntl_TCA,OU\u003dVision,dc\u003dserverad,dc\u003dcom","name":"Entl_TCA","permissionTypeId":"etype.ICF.AD2.ea72c837XXaa05daf0123ae94d7b0ff4","resourceId":"resource.ICF.AD2.f775de49XXdadcea269cc5072261730ac","targetId":"05452611-7305-43c3-b0XX-0ba9936a8553","customAttributes":{"operationType":"CREATE_OR_UPDATE"}}

Permission Schema Attribute Definition

Here's the attribute definition for an permission output file.

Table - Permission Schema Attribute Definition

Attributes Description
id Unique identifier for each permission, such as groups or privileges .
externalId External system identifier for the permission, such as distinguished name identifier
name Name of the permission. For example, Active Directory Group IT_Admins
permissionTypeId Identifier for the type of permission granted.
resourceId Unique identifier for the resource associated with the permission.
targetId Identifier of the target system where permissions apply.
customAttributes Additional attributes related to the permission.
operationType Specifies the operation performed while provisioning. For example CREATE or UPDATE.

Permission Assignment Reference Schema and Sample Output File

Here's permission assignment schema for creation, modification, and deletion, including the sub-schema.

Permission Assignment Create/Update Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "targetIdentityId": {
        "type": "string"
      },
      "globalIdentityId": {
        "type": "string"
      },
      "add": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/permissionAssignments.json"
      },
      "remove": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/permissionAssignments.json"
      }
    },
    "additionalProperties": false,
    "required": [
      "targetIdentityId"
    ]
  }
}

Permission Assignment Sub-Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": { "type": "string" },
      "externalId": { "type": "string" },
      "status": { "type": "string" },
      "accountStatus": { "type": "string" },
      "targetId": { "type": "string" },
      "targetType": { "type": "string" },
      "granttype": { "type": "string" },
      "permissionType": { "type": "string" },
      "permissionId": { "type": "string" },
      "permissionName": { "type": "string" },
      "accessBundleId": { "type": "string" },
      "accessBundleName": { "type": "string" },
      "roleId": { "type": "string" },
      "roleName": { "type": "string" },
      "identityGroupId": { "type": "string" },
      "identityGroupName": { "type": "string" },
      "resourceId": { "type": "string" },
      "resourceDisplayName": { "type": "string" },
      "policyId": { "type": "string" },
      "policyName": { "type": "string" },
      "policyRuleId": { "type": "string" },
      "userLogin": { "type": "string" },
      "validFrom": { "type": "integer" },
      "validTo": { "type": "integer" }
    },
    "additionalProperties": false,
    "required": ["id", "permissionId"]
  }
}

Permission Assignment Delete Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "globalIdentityId": {
      "type": "string"
    },
    "targetIdentityId": {
      "type": "string"
    },
    "ids": {
      "type": "array",
      "items": {
        "type": "string"
      }
    }
  },
  "additionalProperties": false,
  "required": [
    "targetIdentityId"
  ]
}

Sample Output Code Snippet

This JSON data represents global identities and their associated access permissions, detailing which identity accounts have been granted access. It includes permission assignments linked to a specific resource and tracks the provisioning status of each account.

{
  "targetIdentityId": "targetId.account.ICF.AD2.193b1cacbe9aceeee750c3191c119d91d",
  "globalIdentityId": "globalId.ICF.ADWildFire.30309426d8d71699f2139c093e41dacb",
  "add": [
    {
      "id": "215CEE0D5E52FCB8E063DB15000A41cF",
      "externalId": "34a6e879c9e8084fac787d3b59d8bf08",
      "status": "PROVISIONED",
      "accountStatus": "true",
      "targetId": "05452611-7305-43c3-b0cc-0bac936a855c",
      "targetType": "ICF",
      "granttype": "DIRECT",
      "permissionId": "groups.ICF.AD2.b11900a7c06b0b6344dec199ba54c23a",
      "permissionName": "ADVP2",
      "resourceId": "resource.ICF.AD2.f77cde493dadceac69cc507226173cac",
      "resourceDisplayName": "AD2"
    },
    {
      "id": "215CEE102C4CFCB8E063DB15000A41cF",
      "externalId": "f6aaec83c51db144a7e0acde8f4b9d65",
      "status": "PROVISIONED",
      "accountStatus": "true",
      "targetId": "05452611-7305-43c3-b0cc-0bac936a855c",
      "targetType": "ICF",
      "granttype": "DIRECT",
      "permissionId": "groups.ICF.AD2.9797bc45058c8d4fd4c1fa3282a8b6a4",
      "permissionName": "ADVP3",
      "resourceId": "resource.ICF.AD2.f77cde493dadceac69cc507226173cac",
      "resourceDisplayName": "AD2"
    }
  ]
}

Permission Assignment Schema Attribute Definition

Here's the attribute definition for an permission assignment output file.

Table - Identity Schema Attribute Definition for Day 0

Attributes Description
globalIdentity Composite identity profile object used by Oracle Access Governance as a source of truth to perform various governance and provisioning operations. It contains access profile details, including core and custom attributes. For more information, refer to Identities Access Details Reference,
targetIdentities Unique identifier of the orchestrated identity object integrated with Oracle Access Governance and matched with the composite identity profile.
add List of permissions granted to the global identity.
id Unique identifier for each permission assignment.
externalId External system identifier for the permission entry.
status Provisioning status of the permission (for example, PROVISIONED).
accountStatus Indicates whether the account is active (true or false).
targetId Identifier of the target system where permissions apply.
targetType Type of the target system (for example, ICF).
granttype Specifies how permission is granted (For example, DIRECT).
permissionId Unique identifier for the assigned permission.
permissionName Name of the permission granted.
resourceId Identifier of the resource associated with the permission.
resourceDisplayName User-friendly name of the resource (For example, AD2).

Roles Reference Schema and Sample Output File

Here's Oracle Access Governance roles schema for creation, modification, and deletion.

Roles Created/Updated Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "id": { "type": "string" },
      "externalId": { "type": "string" },
      "name": { "type": "string" },
      "description": { "type": "string" },
      "displayName": { "type": "string" },
      "requestableBy": { "type": "string" },
      "referenceRequestId": { "type": "string" },
      "status": { "type": "string" },
      "approvalWorkflow": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/approvalWorkflow.json"
      },
      "tags": { "type": "string" },
      "classifications": { "type": "string" },
      "accessBundleIds": {
        "type": "array",
        "items": { "type": "string" }
      },
      "createdBy": { "type": "string" },
      "createdByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "createdOn": { "type": "integer" },
      "updatedBy": { "type": "string" },
      "updatedByRef": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "updatedOn": { "type": "integer" },
      "agManaged": { "type": "boolean" },
      "managedByIds": {
        "type": "array",
        "items": { "type": "string" }
      },
      "owner": {
        "$ref": "resource:com/oracle/idm/agcs/data/enablement/schema/reference.json"
      },
      "ownerShipCollectionId": { "type": "string" },
      "ownerUIDs": {
        "type": "array",
        "items": { "type": "string" }
      }
    },
    "additionalProperties": false,
    "required": ["id"]
  }
}

Roles Deleted Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "type": "object",
  "properties": {
    "id": {
      "type": "string"
    }
  },
  "additionalProperties": false,
  "required": ["id"]
}

Sample Output Code Snippet

{
  "id": "1bce7e90-XXXX-41ea-8d1c-bceXXXXe31099",
  "externalId": "ocid1.dev.dev.amcxxxvcaaapzw5rdiarmplc2m2fwXXXXz3h7gbxkwkasgeu64a7n6kx5ulgsbaa",
  "name": "AD_User_Groups_Access",
  "description": "Access permissions for Active Directory User Groups",
  "displayName": "AD Group Role",
  "requestableBy": "ANY",
  "status": "ACTIVE",
  "approvalWorkflow": {
    "id": "NO_APPROVAL_REQUIRED"
  },
  "accessBundles": [
    "7c4e49ad-XXXX-4051-8b9a-80543acfXXXX"
  ],
  "createdBy": "Amel MacLead",
  "createdOn": 1703145588737,
  "updatedBy": "AG_System_Shared",
  "updatedOn": 1703145588737,
  "agManaged": false
}

Roles Schema Attribute Definition

Here's the attribute definition for an Roles output file.

Table - Roles Schema Attribute Definition

Attributes Description
id Unique identifier for each access bundle.
externalId External system identifier for the system.
name Name of the role.
description Description of role.
displayName Display name of the role.
requestableBy The identity type that may request the role. For example, ANY or NONE.
status

Status of the role. For example, ACTIVE, DRAFT, and so on.

approvalWorkflow The id of the approval workflow that is applicable to the role.
accessBundles List of associated access bundles.
createdOn Timestamp indicating when the role was created.
createdBy User who created the role.
updatedBy User who last modified the role.
updatedOn Timestamp indicating when the role was last updated.
agManaged Boolean flag indicating if the entity is managed automatically

Resource Reference Schema and Sample

Here's resource schema for creation, modification, and deletion.

Resource Creation Schema

{
   "$schema": "https://json-schema.org/draft/2019-09/schema",
   "title": "resources",
   "type": "array",
   "items": {
      "type": "object",
      "properties": {
         "id": {
            "type": "string"
         },
         "externalId": {
            "type": "string"
         },
         "targetId": {
            "type": "string"
         },
         "tenancyId": {
            "type": "string"
         },
         "resourceName": {
            "type": "string"
         },
         "resourceType": {
            "type": "string"
         },
         "description": {
            "type": "string"
         }
      },
      "additionalProperties": false
   }
}

Resource Modification Schema

{
   "$schema": "https://json-schema.org/draft/2019-09/schema",
   "title": "resources",
   "type": "array",
   "items": {
      "type": "object",
      "properties": {
         "id": {
            "type": "string"
         },
         "externalId": {
            "type": "string"
         },
         "targetId": {
            "type": "string"
         },
         "tenancyId": {
            "type": "string"
         },
         "resourceName": {
            "type": "string"
         },
         "resourceType": {
            "type": "string"
         },
         "description": {
            "type": "string"
         }
      },
      "additionalProperties": false
   }
}

Resource Deletion Schema

{
   "$schema": "https://json-schema.org/draft/2019-09/schema",
   "type": "object",
   "properties": {
      "id": {
         "type": "string"
      },
      "additionalProperties": false,
      "required": [
         "id"
      ]
   }
}

Sample Output Code Snippet

{
   "id": "resource.ICF.ADUPDATE.4bbac5904b6302dc82871da2c9756fea",
   "externalId": "48713388",
   "targetId": "ade93352-e7d5-46e6-847a-c765be1f0aad",
   "tenancyId": "ocid1.tenancy.oc1..aaaaaaaahvjxelu7yccuhj3wrq5uqiybu7f5tfxvwteiwaupnlkj4woz6ybq",
   "resourceName": "ADUPDATE",
   "resourceType": "AD",
   "description": ""
}

Resources Schema Attribute Definition

Here's the attribute definition for an resource export file.

Table - Resource Schema Attribute Definition

Attributes Description
id Unique identifier assigned within Oracle Access Governance for resource tracing. It also contains orchestrated system identifier from which the resource is ingested into Oracle Access Governance.
externalId Unique resource identifier in OCI.
targetId Unique identifier for the orchestrated system integrated with Oracle Access Governance.
tenancyId Unique tenancy identifier (OCID) in which the resource is located. This is applicable only for OCI orchestrated system and contains OCI resources.
resourceName Resource name.
resourceType Resource Type
description Resource description

Resource to Policy Statement

Here's a schema for list of policies associated with a resource.

Policy Statement to Resource Creation Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "title": "accessPolicyStatementResourceMapping",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "compartmentId": {
        "type": "string"
      },
      "id": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "policies": {
        "type": "array",
        "items": {
          "type": "object",
          "properties": {
            "id": {
              "type": "string"
            },
            "externalId": {
              "type": "string"
            },
            "policyStatementId": {
              "type": "string"
            }
          }
        }
      }
    }
  }
}

Sample Output Code Snippet

{
  "compartmentId": "ocid1.tenancy.oc1..ppppppp2h5y42lkaalhtrwmqyinmwipjyxc3xmod4h7m3d2bmdjg6qwerty",
  "id": "resource.OCI.agcusttokyo.1b65a16c154269702eea873f34cef690",
  "externalId": "ocid1.database.oc1.ap-tokyo-1.anxhiljrzqwertya7o46ijh4nv3rjzpnqjwqidqh37rcptyngy5g46ebnlea",
  "targetId": "e88d075e-d2a6-4f1d-8c1b-f472917b8770",
  "policies": [
    {
      "id": "tapolicy.OCI.agcusttokyo.70ffb4c4f706aa55a5a35cb7902fe47a",
      "externalId": "ocid1.policy.oc1..aaaaaaaaxkyqwertyenond5hoclrmmvhlxw3tjukgqbbstfmepigetr6ulqq",
      "policyStatementId": "tapolicystmt.OCI.agcusttokyo.99cd276ef37300a357c0a1488dae2567"
    }
  ]
}

Resources to Policy Schema Attribute Definition

Here's the attribute definition for an identity export file.

Table - Resource to Policy Schema Attribute Definition

Attributes Description
compartmentId Unique compartment identifier (OCID) associated with the resource. This is applicable only for OCI resources.
id Unique identifier for the resource assigned within Oracle Access Governance.
externalId Unique resource identifier in OCI, called resource OCID.
targetId Unique identifier to identify orchestrated system associated with the resource.
policies Array of policies attached to a resource. Each policy contains details like policy id, policy statement id, and external id to identify policies

Policy Statement to Resource

Here's a schema for a policy statement associated with a list of resources.

Policy Statement to Resource Creation Schema

{
  "$schema": "https://json-schema.org/draft/2019-09/schema",
  "title": "accessPolicyStatementResourceMapping",
  "type": "array",
  "items": {
    "type": "object",
    "properties": {
      "compartmentId": {
        "type": "string"
      },
      "id": {
        "type": "string"
      },
      "externalId": {
        "type": "string"
      },
      "policyStatementId": {
        "type": "string"
      },
      "targetId": {
        "type": "string"
      },
      "resources": {
        "type": "array",
        "items": {
          "type": "object",
          "properties": {
            "id": {
              "type": "string"
            },
            "externalId": {
              "type": "string"
            }
          }
        }
      }
    }
  }
}

Sample Output Code Snippet

{
  "compartmentId": "ocid1.tenancy.oc1..aaaaaaaazp2vvzjsn6newkqrpkwndxpdoixtqfgyhnf4y24h7d5ny27h6f3q",
  "id": "tapolicy.OCI.ag-test.58a173b97f94c6ff0046448470573609",
  "externalId": "ocid1.policy.oc1..aaaaaaaa3axgfgqgc3f4xcbno5p7driojc2hnaxr3jw3pu5xs7lhkoopo55a",
  "policyStatementId": "tapolicystmt.OCI.ag-test.2dc34ea12d5f0cbd7e9429029b257c99",
  "targetId": "2879c2b3-721c-4ede-afc5-5aa6c3b54e99",
  "resources": [
    {
      "id": "resource.OCI.ag-test.189fa43b2323037d1da11e6f0e488296",
      "externalId": "ocid1.instance.oc1.me-abudhabi-1.anqxkljrebkbezqcpoofyvho44qcyb76uu75aonuhexk42ibcv4ohpfat5iq"
    },
    {
      "id": "resource.OCI.ag-test.s563541re3fca34e7105fe5a7c516025",
      "externalId": "ocid1.instance.oc1.iad.anuwcljsebkbezqcowg5so6mnuewanlrohoovt7ce54ujhuqxi3h75hm6mrq"
    },
    {
      "id": "resource.OCI.ag-test.d3e8c10a5659d18dda403bf00e1e2aea",
      "externalId": "ocid1.instance.oc1.iad.anuwcljtebkbezqcxvwlq62t4ldkyb5kkttgvyobqvuh3tltz7qjtxchldja"
    },
    {
      "id": "resource.OCI.ag-test.c189f74e4c77ca6416f0d92bb2db9f2a",
      "externalId": "ocid1.instance.oc1.us-sanjose-1.abcdejrebkbezqctftv5vbfucdb3amdgslvbptnjpdqyvporupbhr3sluqq"
    },
    {
      "id": "resource.OCI.ag-test.a1f0662fd624e07c6b41e14fdf918591",
      "externalId": "ocid1.instance.oc1.iad.abcdejtebkbezqctyoxut22u26pvej5wglyodyjen6fb7qqid3ovy4sfbxa"
    },
    {
      "id": "resource.OCI.ag-test.8d177901e639e144b6289ed1d81fe255",
      "externalId": "ocid1.instance.oc1.iad.qwertyjtebkbezqcoxwhqw4wfpmlozp5ghrhr74222jcivbdaannyo6a26xq"
    },
    {
      "id": "resource.OCI.ag-test.81bdacf188ed585e3aca85a131e23df5",
      "externalId": "ocid1.instance.oc1.iad.qwertyjtebkbezqcdtejri54el6u7dw4bvjmz5t2rzxar76oz5szigf2o4aq"
    },
    {
      "id": "resource.OCI.ag-test.3883fc488ff0531274fcee9d87f00fd2",
      "externalId": "ocid1.instance.oc1.iad.qwertyjtebkbezqczdrg677joyhxf2kdm2jzlzmetzzylox4lptxd2svbnva"
    },
    {
      "id": "resource.OCI.ag-test.3480fad0d9bf8a3fe13c54028f13f66c",
      "externalId": "ocid1.instance.oc1.us-sanjose-1.qwertyjrebkbezqcyrzc7xu3flvidhwoyssaoiyyewi3bidnnnuucpfjmwwq"
    },
    {
      "id": "resource.OCI.ag-test.3480fad0d9bf8a3fe13c54028f13f66c",
      "externalId": "ocid1.instance.oc1.us-sanjose-1.qwertyjrebkbezqcyrzc7xu3flvidhwoyssaoiyyewi3bidnnnuucpfjmwwq"
    },
    {
      "id": "resource.OCI.ag-test.2a14a90e547488318d2bca0b30a247f1",
      "externalId": "ocid1.instance.oc1.ad.qwertyjtebkbezqcwyajizhztiujrmmshn3cuqiou4vtodhv4femidlpj7ha"
    }
  ]
}

Policy to Resources Schema Attribute Definition

Here are the definitions of the attribute included in the policy access to resource export file.

Attributes Description
compartmentId Unique compartment identifier (OCID) associated with a policy. This is applicable only for OCI policies.
id Unique identifier for the policy assigned within Oracle Access Governance.
externalId Unique policy identifier in OCI, called OCID.
targetId Unique identifier to identify orchestrated system associated with the policy.
resources Array of resources attached to a resource. Each policy contains details like policy id, policy statement id, and external id to identify policies