Managing User Access to Applications Environments

Set up users to work with applications environments in the Oracle Cloud Console.

This topic explains how you can set up additional users to work with applications environments that are managed in the Oracle Cloud Console. If you need to add users to work in your application, see your application documentation.

Applications environment management integrates with the Identity and Access Management Service (IAM) service for authentication and authorization. IAM uses policies to grant permissions to groups. Users have access to resources (such as applications environments) based on the groups that they belong to.

The user entered during the tenancy creation step is the default administrator of the tenancy. The default administrator can perform all tasks for all services, including create groups, policies, and users to give access to the resources.

Tip

This topic provides the basic procedures for creating specific user types in your account to get you started with application environment management. For full details on managing users in the Oracle Cloud Console, see Managing Users.

Add a Tenancy Administrator

You can add a tenancy administrator by creating a user and adding them to the tenancy Administrators group. Members of the Administrators group have access to all features and services in the Oracle Cloud Console.

To add a tenancy administrator:

  1. On the Oracle Cloud Console home page, click Add a user to your tenancy. The list of Users in the current domain is displayed.
  2. Click Create user.
  3. Enter the user's First name and Last name.
  4. To have the user log in with their email address:
    • Leave the Use the email address as the username check box selected.
    • In the Username / Email field, enter the email address for the user account.

    or

    To have the user log in with their user name:
    • Clear the Use the email address as the username check box.
    • In the Username field, enter the user name that the user is to use to log in to the Console.
    • In the Email field, enter the email address for the user account.
  5. Under Select groups to assign this user to, select the check box for Administrators.
  6. Click Create.

A welcome email is sent to the address you entered for the new user. The new user can follow the account activation instructions in the email to sign in and start using the tenancy.

Add a User with Limited Access

For users who shouldn't have full administrator access, you can create policies that define the allowed access. This process consists of four steps:

  1. Find the identity domain.
  2. Create a group.
  3. Create a policy that grants the group appropriate access to the resources.
  4. Create a user and add them to the group.

You can create policies that grant different levels of access for different groups. For example, you can create a policy that grants full environment management permissions for a group called Environment-Admins. You can create a second policy that grants only monitoring capabilities for a group called Environment-Viewers.

The following tasks walk you through creating a group, policy, and user in the Identity and Access Management (IAM) service. Either the default administrator can perform these tasks, or another user that has been granted access to administer IAM.

Applications Services Policy Reference

Note

The applications services shown here support self-service environment provisioning and management. For help writing policies for applications services that do not support self-service provisioning, see Adding Oracle Cloud Console Users.

The following sections provide sample policies that you can use to create an environment administrator role and an environment viewer role. To create a user with the access granted through these policies, you can copy and paste the provided policy for your service, substituting your group name. For details, see the Tip in the Create the policy task above.

Permission Level

The permission level is specified by the verb in the statement. To give another user access to interact with your environments in the Oracle Cloud Console, use one of the following verbs in your policy statements:

  • manage - allows the user to perform all management tasks for an environment, including create and delete (when supported).
  • use - allows the user to update an existing environment; user can't create or delete an environment.
  • read - allows the user to view all information about the environment.
  • inspect - allows the user to list the environments only; user can't view the details pages.

For more information on the operations permitted by each of these verbs, see Applications Environment Management IAM Policy Reference.

Required Statements

Both the environment administrator and environment viewer roles require access to the application environment resources. The administrator requires manage permissions, while the viewer only needs read permissions. In addition, both roles require permissions to read applications subscriptions.

Required Statements for Environment Administrator

The environment administrator can perform all tasks required to create and manage environments. The administrator can also view the subscriptions in your tenancy and access metrics data. See Application-Specific Policy Examples for the <application> value for your application.

Allow group '<identity-domain-name>'/'<your-group-name>' to manage <application>-environment-family in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-assigned-subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-subscription-regions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read app-listing-environments in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read metrics in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to inspect domains in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read announcements in tenancy 

Details for each policy statement:

Policy Statement What It's For
Allow group '<identity-domain-name>'/'<your-group-name>' to manage <application>-environment-family in tenancy
Grants full management permissions for the specified application environments. Includes access to compliance documentation.
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-subscriptions in tenancy 
Allow group '<identity-domain-name>'/'<your-group-name>' to read subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-assigned-subscriptions in tenancy 
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-subscription-regions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read app-listing-environments in tenancy
Grants permissions to read subscriptions-related information to access your applications subscriptions in the Console. Required for viewing your subscriptions; must be at the tenancy level.
Allow group '<identity-domain-name>'/'<your-group-name>' to read metrics in tenancy
Grants access to metrics charts and metrics data for OCI resources.
Allow group '<identity-domain-name>'/'<your-group-name>' to read announcements in tenancy
Grants access to read announcements.
Allow group '<identity-domain-name>'/'<your-group-name>' to inspect domains in tenancy
Grants access to list identity domains.

Required Statements for Environment Viewer

This user can view details and monitor the environments in the Oracle Cloud Console. This role can't make any updates. The environment viewer can also view the subscriptions in your tenancy and access metrics data. See Application-Specific Policy Examples for the <application> value for your application.

Allow group '<identity-domain-name>'/'<your-group-name>' to read <application>-environment-family in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-assigned-subscriptions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read organizations-subscription-regions in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read app-listing-environments in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read metrics in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to inspect domains in tenancy
Allow group '<identity-domain-name>'/'<your-group-name>' to read announcements in tenancy
 

The only difference between this policy and the administrator policy is the read verb for the environment-family resource.

Application-Specific Policy Examples

Use the examples in this section to create environment administrator and environment viewer roles for your application.