2 Identity and Access Management Overview

This chapter provides an introduction to working with Oracle Cloud Infrastructure Identity and Access Management (IAM) with Identity Domains.

Oracle Cloud Infrastructure tenancy is provisioned to customers with subscriptions to Oracle Utilities cloud services. Identity and Access Management (IAM) is a built-in part of the Oracle Cloud Infrastructure, and it governs the access to Oracle Cloud Infrastructure resources and Oracle Cloud Services. Identity domains are part of IAM and is where users and access to Oracle Cloud Services are configured and managed.

Each cloud service subscription includes at least one Identity Domain. The identity domains are managed exclusively by the customer (see Identity Domains below for more information).

About This Section

The Identity and Access Management section of this guide contains the following:

Identify Domains

The Oracle Utilities Cloud Service configurations are defined and maintained in an Identity Domain. Initial provision of the service results in all environments being connected to a single Identity Domain (usually a Default domain).


Diagram illustrating all environments connected to a single Identity Domain

This topology may be modified in the future. For example, you may create an additional Identity Domain that is dedicated for production environment. In this scenario, you should submit a request for the re-connection to the Oracle support team.


Diagram illustrating environments connected to multiple Identity Domains

The following configurations are necessary to perform the identity and access management for the Oracle Utilities Cloud Services

  • Application: For Oracle Utilities cloud services the application represents a single environment, Production or non-Production. Applications are created by the service provisioning process.
  • Application Role: The Application Role represents an entitlement to access one of the components within the environment. By assigning user or groups to an Application Role the security administrator is authorizing access to the corresponding component(s). Application Roles are created by the service provisioning process.
  • User: Users represent a human or non-human entity that is accessing the environment. User records are created and managed by the Security Administrator.
  • Group: Groups comprise of one or more users. Groups are created and managed by the Security Administrator.


Diagram illustrating relationships between specific user roles and individual user groups and users