Part III IAM, Database, and Application Configuration

Learn how to configure your external identity and access management (IAM) system, the Oracle AI Database, and your application layer to support authentication and authorization with Oracle Deep Data Security (Deep Sec).

Begin by identifying the deployment scenario that matches your environment. Then complete the applicable configuration steps.
  • IAM system setup: Register applications, users, and roles in your IAM system.
  • Database configuration: Configure the database to establish end-user security contexts for both application-mediated connections and direct connections, using either IAM OAuth 2.0 tokens or local end-user authentication.
  • Application setup: Configure the application to build and propagate the end-user security context payload.
  • SQL client configuration: For direct logon scenarios with token-based authentication, set up a SQL client.

To understand the trust chain (end user, application, and database) and how scopes, roles, and user identities flow through the architecture, see Application Registrations, Users, and Roles.