Part III IAM, Database, and Application Configuration

Learn how to configure your external identity and access management (IAM) system, the Oracle AI Database, and your application layer to support authentication and authorization with Oracle Deep Data Security (Deep Sec).

Begin by identifying the deployment scenario that matches your environment. Then complete the applicable configuration steps.
  • IAM system setup: Register applications, users, and roles in the IAM platform you use, for example, Microsoft Entra ID or OCI IAM.
  • Database setup: Configure the database to establish end-user security contexts for both application-mediated connections and direct connections, using either OAuth 2.0 tokens (from the configured IAM platform) or local end-user authentication. Additionally, for direct-logon scenarios with token-based authentication, set up a SQL client.
  • Application setup: Configure the application to build and propagate the end-user security context payload.

To understand the trust chain (end user, application, and database) and how scopes, roles, and user identities flow through the architecture, see Application Registrations, Users, and Roles.