21.5 Manage AWS Access
Use the AWS Management Console to manage AWS access.
IDDetails
: You need to specify the
IDDetails
in the trust policy when creating some of the IAM roles
described in this chapter. The IDDetails
to use depend on the
situation:
- To grant access to a specific DB System in the tenancy,
use <TenancyOCID>/<DBSystemResourceId>
(see Viewing OCID of the Tenancy on how to find the OCID of the tenancy, and see Viewing DB System Details on how to find the resource ID of the DB System). For
example:
ocid1.tenancy.oc1..aaaaaaaaba4pv6wkcr4jqae5f44n2b2m2yt2j6rx32uzr4h25vqstifsfdsk/5281bb96-99a1-23fe-a65f-370cd85b979g
- To grant access to all DB Systems in the tenancy, use
<TenancyOCID>/*. For
example:
ocid1.tenancy.oc1..aaaaaaaaba4pv6wkcr4jqae5f44n2b2m2yt2j6rx32uzr4h25vqstifsfdsk/*
Note:
If you are creating the IAM role to grant access to a specificDB System that is yet to be created, grant access to all DB Systems in the tenancy by using <TenancyOCID>/* first for theIDDetails
, and once
the DB System is created, update the trust policy to limit access to the
new DB System by using <TenancyOCID>/<DBSystemResourceId> instead.