Create a policy in the root compartment for non-administrator users:
Copy
allow group <group-name> to read buckets in compartment <compartment-name>
allow group <group-name> to manage objects in compartment <compartment-name>
allow group <group-name> to read objectstorage-namespaces in compartment <compartment-name>
allow group <group-name> to manage data-labeling-family in compartment <compartment-name>
Create a policy in the root compartment for the dynamic group:
Copy
allow dynamic-group <dynamic-group-name> to read buckets in compartment <compartment-name>
allow dynamic-group <dynamic-group-name> to read objects in compartment <compartment-name>
allow dynamic-group <dynamic-group-name> to manage objects in compartment <compartment-name> where any {request.permission='OBJECT_CREATE', request.permission='OBJECT_OVERWRITE'}
Follow these steps to set up cross tenancy policies in Data Labeling.
A cross tenancy policy lets you share resources with users in another tenancy. For
example, you can write cross tenancy policies that let your users in an IAM group in the source tenancy carry out
operations on datasets in the destination tenancy. For more information on cross
tenancy policies, see Accessing Object Storage Resources Across
Tenancies.
In the following example, the users under the group, group-name, in
the tenancy, source-tenancy, want to use Data Labeling
functionality in a different tenancy, called destination-tenancy.
Create a group in source-tenancy and add users to it.
Add the following policies in source-tenancy, so that
group-name is endorsed and can manage the dataset in
destination-tenancy:
Copy
DEFINE tenancy destination-tenancy AS <destination-tenancy-ocid>
ENDORSE group group-name TO manage data-labeling-family IN tenancy destination-tenancy
In destination-tenancy add policy statements that let
group-name operate on the dataset:
Copy
DEFINE tenancy source-tenancy AS <source-tenancy-ocid>
DEFINE group group-name AS <source-tenancy-group-ocid>
ADMIT group group-name OF tenancy source-tenancy TO manage data-labeling-family IN tenancy
(Optional)
You can add a policy to limit access to a specific
compartment within destination-tenancy. In this example, the
compartment is called dataset-compartment:
Copy
DEFINE tenancy source-tenancy AS <source-tenancy-ocid>
DEFINE group group-name AS <source-tenancy-group-ocid>
ADMIT group group-name OF tenancy source-tenancy TO manage data-labeling-family IN compartment dataset-compartment
(Optional)
If the bucket is present in destination-tenancy, then you must
add cross-tenancy policies for Object Storage
resources too. Add the following policy statements to let the group,
group-name, to access the Object Storage resources in
destination-tenancy:
In source-tenancy, add:
Copy
ENDORSE group group-name to read buckets in tenancy destination-tenancy
ENDORSE group group-name to manage objects in tenancy destination-tenancy
ENDORSE group group-name to read objectstorage-namespaces in tenancy destination-tenancy
In
destination-tenancy, add:
Copy
ADMIT group group-name of tenancy source-tenancy to read buckets in tenancy
ADMIT group group-name of tenancy source-tenancy to manage objects in tenancy
ADMIT group group-name of tenancy source-tenancy to read objectstorage-namespaces in tenancy
Setting Up Cross Tenancy Policies to Associate the Dataset with an Object Storage Bucket 🔗
If the Data Labeling dataset is created in a different
tenancy to the Object Storage bucket, you need a policy to
associate the dataset and bucket.
For cross tenancy access, you might have one of the following three scenarios, which
require an association policy.
The user and Object Storage bucket are in the
same tenancy (which in this example is tenancy A), and the dataset is in a
different tenancy (which in this example is tenancy B).
Add the following policy in tenancy
A:
Copy
define tenancy B as <tenancy-B-ocid>
endorse group Group-A associate buckets in tenancy with data-labeling-datasets in tenancy B
Add the following policy in tenancy
B:
Copy
define tenancy A as <tenancy-A-ocid>
define group Group-A as <Group-A-ocid>
Admit group Group-B of tenancy A associate buckets in tenancy A with data-labeling-datasets in tenancy
The user and dataset are in same tenancy (which in this example is tenancy A),
and the bucket is in a different tenancy (which in this example is tenancy
B).
Add the following policy in tenancy
A:
Copy
define tenancy B as <tenancy-B-ocid>
endorse group Group-A associate buckets in tenancy B with data-labeling-datasets in tenancy
Add the following policy in tenancy
B:
Copy
define tenancy A as <tenancy-A-ocid>
define group Group-A as <Group-A-ocid>
Admit group Group-A of tenancy A associate buckets in tenancy with data-labeling-datasets in tenancy A
The user is in one tenancy (which in this example is tenancy A), the dataset is
in another tenancy (which in this example is tenancy B), and the bucket is in a
third tenancy (which in this example is tenancy C).
Add the following policy in tenancy
A:
Copy
define tenancy B as <tenancy-B-ocid>
define tenancy C as <tenancy-C-ocid>
endorse group Group-A associate buckets in tenancy C with data-labeling-datasets in tenancy B
Add the following policy in tenancy
B:
Copy
define tenancy A as <tenancy-A-ocid>
define tenancy C as <tenancy-C-ocid>
define group Group-A as <Group-A-ocid>
Admit group Group-A of tenancy A associate buckets in tenancy C with data-labeling-datasets in tenancy
Add the following policy in tenancy
C:
Copy
define tenancy A as <tenancy-A-ocid>
define tenancy B as <tenancy-B-ocid>
define group Group-A as <Group-A-ocid>
Admit group Group-A of tenancy A associate buckets in tenancy with data-labeling-datasets in tenancy B