Create Groups, Dynamic Groups, and Policies
You can control how users manage instances of Resource Analytics in your tenancy.
Typically, you create a user group in the tenancy and give that group the rights to manage the service in a particular compartment, and you give the resource principal of your Resource Analytics instance the rights to observe the resource metadata of your tenancy.
1. Create a Group and Dynamic Group
2. Create Policies
For more information about adding policies to the tenancy, see Overview of Working with Policies. For older tenancies that don't support Identity Domains, see Managing Policies.
Create Policies for the Administrator Group
You create the policies with different statements depending on whether you're in the Default
domain or another domain.
Create Policies for the Administrator Group in the Default Domain
Default
domain.Create Policies for the Administrator Group in a non-Default Identity Domain
resource-analytics-admins
isn't Default
,
but another name, such as MyDomain
, use the qualified name syntax to refer to the group.Create Policies for the Resource Analytics Instance
You create the policies with different statement depending on whether you're in the Default
domain or another domain.
Create Policies for the Resource Analytics Instance in the Default Domain
Default
domain.resource-analytics-instances
dynamic group observe and report the metadata for resources in your tenancy, create a policy with the
following statements at the root compartment:
allow dynamic-group resource-analytics-instances to read resource-metadata in tenancy
allow dynamic-group resource-analytics-instances to read compartments in tenancy
allow dynamic-group resource-analytics-instances to read autonomous-databases in compartment resource-analytics-compartment
allow dynamic-group resource-analytics-instances to use virtual-network-family in compartment resource-analytics-compartment
allow dynamic-group resource-analytics-instances to read analytics-instance-work-requests in compartment resource-analytics-compartment
allow dynamic-group resource-analytics-instances to manage analytics-instances in compartment resource-analytics-compartment
Create Policies for the Resource Analytics Instance in a non-Default Identity Domain
resource-analytics-instances
isn't
Default
, but another name, such as MyDomain
, use the qualified name syntax to refer to your dynamic group.resource-analytics-instances
dynamic group observe and report the metadata for resources in your tenancy, create a policy with the
following statements at the root compartment:
allow dynamic-group 'MyDomain'/'resource-analytics-instances' to read resource-metadata in tenancy
allow dynamic-group 'MyDomain'/'resource-analytics-instances' to read compartments in tenancy
allow dynamic-group 'MyDomain'/'resource-analytics-instances' to read autonomous-databases in compartment resource-analytics-compartment
allow dynamic-group 'MyDomain'/'resource-analytics-instances' to use virtual-network-family in compartment resource-analytics-compartment
allow dynamic-group 'MyDomain'/'resource-analytics-instances' to read analytics-instance-work-requests in compartment resource-analytics-compartment
allow dynamic-group 'MyDomain'/'resource-analytics-instances' to manage analytics-instances in compartment resource-analytics-compartment