Details for IAM without Identity Domains
This topic covers details for writing policies to control access to IAM.
Resource-Types
authentication
authentication-policies
compartments
credentials
domain
dynamic-groups
groups
group-memberships
iamworkrequest
identity-providers
network-sources
oauth2-clients
policies
regions
service-principal
tag-defaults
tag-namespaces
tagRules
tasdomain
tagNamespaces
tenancies
users
x
workrequest
Supported Variables
IAM supports all the general variables (see General Variables for All Requests), plus additional ones listed here:
Operations for This Resource-Type... | Can Use These Variables... | Variable Type | Comments |
---|---|---|---|
users
|
target.user.id
|
Entity (OCID) | Not available to use with CreateUser. |
target.user.name
|
String | ||
groups
|
target.group.id
|
Entity (OCID) | Not available to use with CreateGroup. |
target.group.name
|
String | ||
target.group.member
|
Boolean | True if request.user is a member of target.group. | |
policies
|
target.policy.id
|
Entity (OCID) | Not available to use with CreatePolicy. |
target.policy.name
|
String | ||
compartments
|
target.compartment.id
|
Entity (OCID) |
For CreateCompartment, this will be the value of the parent compartment (e.g., the root compartment). This is a universal variable available to use with any request across all services (see General Variables for All Requests). |
target.compartment.name
|
String | ||
tag-namespace
|
target.tag-namespace.id
|
Entity (OCID) |
This variable is supported only in statements granting permissions for the |
target.tag-namespace.name
|
String |
Details for Verbs + Resource-Type Combinations
The following tables show the permissions and API operations covered by each verb. The level of access is cumulative as you go from inspect
> read
> use
> manage
. For example, a group that can use a resource can also inspect and read that resource. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access.
For example, the read
verb for compartments covers no extra permissions or API operations compared to the inspect
verb. The use
verb includes the same ones as the read
verb, plus the COMPARTMENT_UPDATE permission and UpdateCompartment
API operation. The manage
verb includes the same permissions and API operations as the use
verb, plus the COMPARTMENT_CREATE permission and two API operations: CreateCompartment
and DeleteCompartment
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | AUTHENTICATION_POLICY_INSPECT |
|
none |
read | no extra |
no extra |
none |
use | no extra |
no extra |
none |
manage | USE + AUTHENTICATION_POLICY_UPDATE |
USE +
|
none |
To move a compartment (that is, use the MoveCompartment
operation) you must belong to a group that has manage all-resources
permissions on the lowest shared parent compartment of the current compartment and the destination compartment.
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | COMPARTMENT_INSPECT |
|
none |
read | no extra |
no extra |
none |
use | READ + COMPARTMENT_UPDATE |
READ +
|
none |
manage | USE + COMPARTMENT_CREATE COMPARTMENT_DELETE COMPARTMENT_RECOVER |
USE +
|
none |
The credentials
resource type refers to only the SMTP credentials. Permissions to work with other credentials that can be added to a user (such as auth tokens, API keys, and customer secret keys) are included with users
resource permissions.
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | CREDENTIAL_INSPECT |
ListSmtpCredentials
|
none |
read | no extra |
no extra |
none |
use | no extra |
no extra |
none |
manage | USE + CREDENTIAL_ADD CREDENTIAL_UPDATE CREDENTIAL_REMOVE |
USE +
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | DYNAMIC_GROUP_INSPECT |
|
No extra |
read | no extra |
no extra |
no extra |
use | READ + DYNAMIC_GROUP_UPDATE |
READ +
|
No extra |
manage | USE + DYNAMIC_GROUP_CREATE DYNAMIC_GROUP_DELETE |
USE +
|
no extra |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | GROUP_INSPECT |
|
|
read | no extra |
no extra |
no extra |
use | READ + GROUP_UPDATE |
READ +
|
READ +
|
manage | USE + GROUP_CREATE GROUP_DELETE |
USE +
|
no extra |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | IDENTITY_PROVIDER_INSPECT |
|
ListIdpGroupMappings , GetIdpGroupMapping (both also need inspect groups )
|
read | no extra |
no extra |
no extra |
use | no extra |
no extra |
no extra |
manage | USE + IDENTITY_PROVIDER_UPDATE IDENTITY_PROVIDER_CREATE IDENTITY_PROVIDER_DELETE |
USE +
|
USE +
|
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | NETWORK_SOURCE_INSPECT |
|
No extra |
read | no extra |
no extra |
no extra |
use | READ + NETWORK_SOURCE_UPDATE |
READ +
|
No extra |
manage | USE + NETWORK_SOURCE_CREATE NETWORK_SOURCE_DELETE |
USE +
|
no extra |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | POLICY_READ |
|
none |
read | no extra |
no extra |
none |
use | no extra |
no extra Note: The ability to update policies is available only with |
none |
manage | USE + POLICY_UPDATE POLICY_CREATE POLICY_DELETE |
USE +
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | TAG_NAMESPACE_INSPECT |
|
none |
read | no extra |
no extra |
none |
use | READ + TAG_NAMESPACE_USE Note: To apply, update, or remove defined tags for a resource, a user must be granted permissions on the resource and permissions to use the tag namespace. |
READ +
|
none |
manage | USE + TAG_NAMESPACE_UPDATE TAG_NAMESPACE_CREATE TAG_NAMESPACE_MOVE TAG_NAMESPACE_DELETE |
USE +
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | TAG_DEFAULT_INSPECT TAG_NAMESPACE_READ (Use both permissions) |
|
none |
read | no extra |
no extra |
none |
use | no extra |
no extra |
none |
manage | INSPECT + TAG_DEFAULT_CREATE TAG_DEFAULT_UPDATE TAG_DEFAULT_DELETE |
USE +
|
none |
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | TENANCY_INSPECT |
|
none |
read | no extra |
no extra |
none |
use | READ + TENANCY_UPDATE |
no extra |
none |
manage | USE + TENANCY_UPDATE |
USE +
|
none |
Note that to work with the SMTP credentials for a user, you must have permissions for the credentials
resource type.
Verbs | Permissions | APIs Fully Covered | APIs Partially Covered |
---|---|---|---|
inspect | USER_INSPECT |
|
GetUserGroupMembership (also need inspect groups )
|
read | INSPECT + USER_READ |
INSPECT +
|
no extra |
use | READ + USER_UPDATE |
READ +
|
READ +
|
manage | USE + USER_CREATE USER_DELETE USER_UNBLOCK USER_APIKEY_ADD USER_APIKEY_REMOVE USER_UIPASS_SET USER_UIPASS_RESET USER_SWIFTPASS_SET USER_SWIFTPASS_RESET USER_SWIFTPASS_REMOVE USER_AUTHTOKEN_SET USER_AUTHTOKEN_RESET USER_AUTHTOKEN_REMOVE USER_OAUTH2_CLIENT_CRED_CREATE USER_OAUTH2_CLIENT_CRED_UPDATE USER_OAUTH2_CLIENT_CRED_REMOVE USER_SECRETKEY_ADD USER_SECRETKEY_UPDATE USER_SECRETKEY_REMOVE USER_SUPPORT_ACCOUNT_LINK USER_SUPPORT_ACCOUNT_UNLINK USER_TOTPDEVICE_ADD USER_TOTPDEVICE_REMOVE USER_TOTPDEVICE_UPDATE |
USE +
|
no extra |
Permissions Required for Each API Operation
The following table lists the API operations in a logical order, grouped by resource type.
For information about permissions, see Permissions.
API Operation | Permissions Required to Use the Operation |
---|---|
ListRegions
|
TENANCY_INSPECT |
ListRegionSubscriptions
|
TENANCY_INSPECT |
CreateRegionSubscription
|
TENANCY_UPDATE |
GetTenancy
|
TENANCY_INSPECT |
GetAuthenticationPolicy
|
AUTHENTICATION_POLICY_INSPECT |
UpdateAuthenticationPolicy
|
AUTHENTICATION_POLICY_UPDATE |
ListAvailabilityDomains
|
COMPARTMENT_INSPECT |
ListFaultDomains
|
COMPARTMENT_INSPECT |
ListCompartments
|
COMPARTMENT_INSPECT |
GetCompartment
|
COMPARTMENT_INSPECT |
UpdateCompartment
|
COMPARTMENT_UPDATE |
CreateCompartment
|
COMPARTMENT_CREATE |
RecoverCompartment
|
COMPARTMENT_RECOVER |
DeleteCompartment
|
COMPARTMENT_DELETE |
MoveCompartment
|
There is not a single permission associated with the MoveCompartment operation. This operation requires manage all-resources permissions on the lowest shared parent compartment of the current compartment and the destination compartment. |
GetWorkRequest
|
COMPARTMENT_READ |
ListUsers
|
USER_INSPECT |
GetUser
|
USER_INSPECT |
UpdateUser
|
USER_UPDATE |
UpdateUserState
|
USER_UPDATE and USER_UNBLOCK |
CreateUser
|
USER_CREATE |
DeleteUser
|
USER_DELETE |
CreateOrResetUIPassword
|
USER_UPDATE and USER_UIPASS_RESET |
ListApiKeys
|
USER_READ |
UploadApiKey
|
USER_UPDATE and USER_APIKEY_ADD |
DeleteApiKey
|
USER_UPDATE and USER_APIKEY_REMOVE |
ListAuthTokens
|
USER_READ |
UpdateAuthToken
|
USER_UPDATE and USER_AUTHTOKEN_RESET |
CreateAuthToken
|
USER_UPDATE and USER_AUTHTOKEN_SET |
DeleteAuthToken
|
USER_UPDATE and USER_AUTHTOKEN_REMOVE |
ListSwiftPasswords
|
USER_READ |
UpdateSwiftPassword
|
USER_UPDATE and USER_SWIFTPASS_RESET |
CreateSwiftPassword
|
USER_UPDATE and USER_SWIFTPASS_SET |
DeleteSwiftPassword
|
USER_UPDATE and USER_SWIFTPASS_REMOVE |
ListCustomerSecretKeys
|
USER_READ |
CreateSecretKey
|
USER_UPDATE and USER_SECRETKEY_ADD |
UpdateCustomerSecretKey
|
USER_UPDATE and USER_SECRETKEY_UPDATE |
DeleteCustomerSecretKey
|
USER_UPDATE and USER_SECRETKEY_REMOVE |
CreateOAuthClientCredential |
USER_UPDATE and USER_OAUTH2_CLIENT_CRED_CREATE |
UpdateOAuthClientCredential |
USER_UPDATE and USER_OAUTH2_CLIENT_CRED_UPDATE |
ListOAuthClientCredentials |
USER_READ |
DeleteOAuthClientCredential |
USER_UPDATE and USER_OAUTH2_CLIENT_CRED_REMOVE |
LinkSupportAccount |
USER_SUPPORT_ACCOUNT_LINK |
UnlinkSupportAccount |
USER_SUPPORT_ACCOUNT_UNLINK |
CreateSmtpCredential |
CREDENTIAL_ADD |
ListSmtpCredentials |
CREDENTIAL_INSPECT |
UpdateSmtpCredential |
CREDENTIAL_UPDATE |
DeleteSmtpCredential |
CREDENTIAL_REMOVE |
ListUserGroupMemberships
|
GROUP_INSPECT and USER_INSPECT |
GetUserGroupMembership
|
USER_INSPECT and GROUP_INSPECT |
AddUserToGroup
|
GROUP_UPDATE and USER_UPDATE |
RemoveUserFromGroup
|
GROUP_UPDATE and USER_UPDATE |
ListGroups
|
GROUP_INSPECT |
GetGroup
|
GROUP_INSPECT |
UpdateGroup
|
GROUP_UPDATE |
CreateGroup
|
GROUP_CREATE |
DeleteGroup
|
GROUP_DELETE |
ListDynamicGroups
|
DYNAMIC_GROUP_INSPECT |
GetDynamicGroup
|
DYNAMIC_GROUP_INSPECT |
UpdateDynamicGroup
|
DYNAMIC_GROUP_UPDATE |
CreateDynamicGroup
|
DYNAMIC_GROUP_CREATE |
DeleteDynamicGroup
|
DYNAMIC_GROUP_DELETE |
GetNetworkSource
|
NETWORK_SOURCE_INSPECT |
ListNetworkSources
|
NETWORK_SOURCE_INSPECT |
CreateNetworkSource
|
NETWORK_SOURCE_CREATE |
UpdateNetworkSource
|
NETWORK_SOURCE_UPDATE |
DeleteNetworkSource
|
NETWORK_SOURCE_DELETE |
ListPolicies
|
POLICY_READ |
GetPolicy
|
POLICY_READ |
UpdatePolicy
|
POLICY_UPDATE |
CreatePolicy
|
POLICY_CREATE |
DeletePolicy
|
POLICY_DELETE |
ListIdentityProviders
|
IDENTITY_PROVIDER_INSPECT |
GetIdentityProvider
|
IDENTITY_PROVIDER_INSPECT |
UpdateIdentityProvider
|
IDENTITY_PROVIDER_UPDATE |
CreateIdentityProvider
|
IDENTITY_PROVIDER_CREATE |
DeleteIdentityProvider
|
IDENTITY_PROVIDER_DELETE |
ListIdpGroupMappings
|
IDENTITY_PROVIDER_INSPECT and GROUP_INSPECT |
GetIdpGroupMapping
|
IDENTITY_PROVIDER_INSPECT and GROUP_INSPECT |
AddIdpGroupMapping
|
IDENTITY_PROVIDER_UPDATE and GROUP_UPDATE |
DeleteIdpGroupMapping
|
IDENTITY_PROVIDER_UPDATE and GROUP_UPDATE |
ListTagNamespaces
|
TAG_NAMESPACE_INSPECT |
ListTaggingWorkRequest
|
TAG_NAMESPACE_INSPECT |
ListTaggingWorkRequestErrors
|
TAG_NAMESPACE_INSPECT |
ListTaggingWorkRequestLogs
|
TAG_NAMESPACE_INSPECT |
GetTaggingWorkRequest
|
TAG_NAMESPACE_INSPECT |
GetTagNamespace
|
TAG_NAMESPACE_INSPECT |
CreateTagNamespace
|
TAG_NAMESPACE_CREATE |
UpdateTagNamespace
|
TAG_NAMESPACE_UPDATE |
ChangeTagNamespaceCompartment
|
TAG_NAMESPACE_MOVE |
CascadeDeleteTagNamespace
|
TAG_NAMESPACE_DELETE |
DeleteTagNamespace
|
TAG_NAMESPACE_DELETE |
ListTags
|
TAG_NAMESPACE_INSPECT |
BulkEditTags
|
TAG_NAMESPACE_INSPECT |
ListCostTrackingTags
|
TAG_NAMESPACE_INSPECT |
GetTag
|
TAG_NAMESPACE_INSPECT |
CreateTag
|
TAG_NAMESPACE_USE |
UpdateTag
|
TAG_NAMESPACE_USE |
DeleteTag
|
TAG_NAMESPACE_DELETE |
BulkDeleteTags
|
TAG_NAMESPACE_DELETE |
ListTagDefaults
|
TAG_DEFAULT_INSPECT |
GetTagDefault
|
TAG_DEFAULT_INSPECT |
CreateTagDefault
|
TAG_DEFAULT_MANAGE |
UpdateTagDefault
|
TAG_DEFAULT_MANAGE |
DeleteTagDefault
|
TAG_DEFAULT_MANAGE |