This topic covers details for writing policies to control access to the Vault service.
Individual Resource-Types
vaults
keys
key-delegate
hsm-cluster
secrets
secret-versions
secret-bundles
Supported Variables 🔗
Vault supports all the general variables, plus the ones
listed here. For more information about general variables supported by Oracle Cloud Infrastructure services, see General Variables for All Requests.
Variable
Variable Type
Comments
request.includePlainTextKey
String
Use this variable to control whether to return the plaintext key, in addition to the encrypted key, in response to a request to generate a data encryption key.
request.kms-key.id
String
Use this variable to control whether block volumes or buckets can be
created without a Vault master encryption
key.
target.boot-volume.kms-key.id
String
Use this variable to control whether Compute instances can be launched with
boot volumes that were created without a Vault master encryption key.
target.key.id
Entity (OCID)
Use this variable to control access to specific keys by OCID.
target.vault.id
Entity (OCID)
Use this variable to control access to specific vaults by OCID.
target.secret.name
String
Use this variable to control access to specific secrets, secret versions, and secret bundles by name.
target.secret.id
Entity (OCID)
Use this variable to control access to specific secrets, secret versions, and secret bundles by OCID.
Details for Verb + Resource-Type Combinations 🔗
The following tables show the permissions and API operations covered by each verb. The level of access is cumulative as you go from inspect > read > use > manage. For example, a group that can use a resource can also inspect and read that resource. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access.
For example, the use verb for the keys resource-type includes the same permissions and API operations as the read verb, plus the KEY_ENCRYPT and KEY_DECRYPT permissions and a number of API operations (Encrypt, Decrypt, and GenerateDataEncryptionKey). The manage verb allows even more permissions and API operations when compared to the use verb.