9.1 Configure Oracle AI Database
Configure Oracle AI Database to accept end-user security context payloads by setting up identity provider configuration, connection pool user accounts, data roles, and local end-user accounts.
The procedures differ depending on whether your end users are managed in an identity and access management (IAM) system or managed locally — either in the application's own user store or in the database.
Note:
Connect to the database as a named user with the DBA role to perform the configuration tasks in this section.9.1.1 Configure the Database for IAM Integration
Complete the required configuration in your database to integrate with an IAM system and implement Oracle Deep Data Security (Deep Sec). Your specific configuration steps vary depending on whether your IAM-managed users connect through an application or directly through a SQL client.
9.1.1.1 Set Up IAM Integration for Application-Mediated Connections
If your IAM-managed users connect to the database through an application, complete the following configuration steps in your database to enable end-user security context establishment.
Note:
- On Oracle AI
Database, run the SQL and PL/SQL statements in this section as a named user with
the DBA role. Run the statements that create the OCI IAM credential object
as
SYS. - On Oracle Autonomous AI Database, run the statements as the
ADMINuser.
9.1.2 Configure the Database for Local End-User Authentication
Complete the required configuration in your database to implement Oracle Deep Data Security (Deep Sec) when your end users are managed locally rather than through an IAM system. Your specific configuration steps vary depending on whether your local end users connect through an application or establish direct database sessions with password authentication.
9.1.2.1 Set Up Local Authentication for Application-Mediated Connections
If your application maintains its own user store (for example, a user registry in a separate database, LDAP directory, or an application-managed identity system) and those users connect to the database through the application, use the database configuration detailed here to implement Deep Sec, without requiring the users to have IAM accounts.
In this scenario, the local end user is identified by a user name and a security context lookup key supplied by the application.
Even though the end users are managed locally, the application must still be registered in your IAM system and must obtain a database-access token to authorize its own connection to the database. A TLS-secured connection, a connection pool user account, and the identity provider configuration in the database are therefore required. For application registration in IAM, see Register the Application in Microsoft Entra ID and Register the Application in OCI IAM.