Details for Resource Manager
Review details for writing policies to control access to the Resource Manager service.
Aggregate Resource-Type
orm-family
Individual Resource-Types
orm-config-source-providers
orm-jobs
orm-private-endpoints
orm-stacks
orm-template
orm-work-requests
Supported Variables
Resource Manager supports all the general variables (see General Variables for All Requests), plus the ones listed here.
The orm-jobs
resource type can use the following variables.
Variable | Variable Type | Comments |
---|---|---|
|
String |
Use this variable to control access for running specified job types. For example, to limit access to PLAN and APPLY jobs, use the following phrase: |
|
String |
Use this variable to limit access to specified stacks. For example, use the following phrase: where any {target.stack.id = ocid1.ormstack.uniqueid1, target.stack.id = ocid1.ormstack.uniqueid2} |
Details for Verb + Resource-Type Combinations
The following tables show the permissions and API operations covered by each verb. The level of access is cumulative as you go from inspect
> read
> use
> manage
. For example, a group that can use a resource can also inspect and read that resource. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access..
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
ListConfigurationSourceProviders
|
none |
read |
|
GetConfigurationSourceProvider
|
CreateStack : When creating stacks that use configuration source providers (configSourceType value GIT_CONFIG_SOURCE ), also need manage orm-stacks
|
use |
no extra |
no extra |
none |
manage |
|
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
ListJobs
|
none |
read |
|
|
none |
use |
no extra |
no extra |
none |
manage |
|
|
CreateJob (also need use orm-stacks ) |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | ORM_PRIVATE_ENDPOINT_INSPECT |
ListPrivateEndpoints
|
none |
read |
|
|
none |
use |
|
|
none |
manage |
|
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
|
none |
read |
|
|
none |
use |
|
no extra |
CreateJob (also need manage orm-jobs ) |
manage |
|
|
CreateStack : When creating stacks that use configuration source providers (configSourceType value GIT_CONFIG_SOURCE ), also need read orm-config-source-providers
|
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
ORM_TEMPLATE_INSPECT |
ListTemplates
|
none |
read |
|
|
none |
use |
|
|
none |
manage |
|
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect |
|
ListWorkRequests
|
none |
read |
|
|
none |
use |
no extra |
no extra |
none |
manage |
no extra |
no extra |
none |
Permissions Required for Each API Operation
The following table lists the API operations in alphabetical order.
For information about permissions, see Permissions.
API Operation | Permissions Required to Use the Operation |
---|---|
|
|
|
|
|
ORM_PRIVATE_ENDPOINT_MOVE |
|
|
|
ORM_TEMPLATE_MOVE |
|
ORM_CONFIG_SOURCE_PROVIDER_CREATE |
|
ORM_JOB_MANAGE and ORM_STACK_USE |
|
ORM_PRIVATE_ENDPOINT_CREATE |
|
If using configuration source providers ( |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
None |
|
|
|
|
ListWorkRequestErrors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|