Setting Up Authentication and Authorization
Setting up use authentication and authorization.
The user authentication and authorization process ensure that you establish a secure network connectivity to access Thales CipherTrust Manager resources. As an administrator you can control user access (signed in) and authorize (provide permissions) to Thales CipherTrust Manager (CM) resources. Once the OCI KMS service authenticates a user, the next step is to authorize the user permissions. Also, the External KMS feature uses OAuth 2 protocol for authorization, and for the protocol to work, you must complete the following:
If you haven't create a domain by searching for domain in your OCI Console. You can select Domain type as free.