Additional Permissions Required to Use Diagnostics & Management for Autonomous AI Databases
To use Diagnostics & Management for Autonomous AI Databases, the following Oracle Cloud Infrastructure service permissions are required in addition to Database Management permissions.
- Autonomous AI Database permission: An
                Autonomous AI Database permission is required to view the total number of Autonomous
                AI Databases in the selected compartment on the Oracle
                    databases tile on the Database Management
                    Overview page and to retrieve data from the Autonomous AI
                Databases and display it on the Oracle Database fleet summary
                and Managed database details pages:
                     
To grant this permission, a policy with the
manageverb and the Autonomous AI Database resource-types must be created. Here's an example in which theautonomous-database-familyaggregate resource-type is used:Allow group DB-MGMT-USER to manage autonomous-database-family in compartment ABCNote
Alternatively, you can create the following policy to grant a user group the permission to view the total number of Oracle Databases, which include Autonomous AI Databases, External Databases, and Oracle Cloud Databases in the compartment, on the Oracle databases tile.Allow group DB-MGMT-USER to {DATABASE_SERVICE_USAGE_INSPECT} in compartment ABCFor more information on the Autonomous AI Database resource-types and permissions, see IAM Policies for Autonomous AI Database Serverless and IAM Policies for Autonomous AI Database on Dedicated Exadata Infrastructure.
 - Management Agent permission: Management Agent permission is
                required to monitor the Autonomous AI Database, if a Management Agent was used to
                enable communication between Database Management and the
                Autonomous AI Database.
                     
To grant this permission, a policy with the
readverb and the Management Agent resource-type,management-agents, must be created. Here's an example:Allow group DB-MGMT-USER to read management-agents in tenancy - Monitoring service permissions: Monitoring
                service permissions are required to:
                     
- View database metrics on the Oracle Database fleet summary and Managed database details pages.
 - View database performance data in Oracle-defined dashboards and use Monitoring service metrics to create widgets.
 - View open database alarms on Diagnostics & Management pages.
 - Perform alarm-related tasks in the Alarm definitions section on the Managed database details page.
 
Here's information on the policies that provide the permissions required to perform the tasks given in the preceding list:
- To view database performance data in Diagnostics &
                        Management and use Monitoring service metrics to create widgets, a policy
                        with the 
readverb for themetricsresource-type must be created. Here's an example:Allow group DB-MGMT-USER to read metrics in compartment ABC - To view the open database alarms on Diagnostics &
                        Management pages and the Alarm Status and
                            Alarm Definitions pages of the Monitoring
                        service, a policy with the 
readverb for thealarmsresource-type must be created (in addition to a policy with thereadverb for themetricsresource-type). Here's an example:Allow group DB-MGMT-USER to read alarms in compartment ABC - To perform alarm-related tasks in the Alarm
                            definitions section on the Managed database
                            details page, a policy with the 
manageverb for thealarmsresource-type must be created (in addition to a policy with thereadverb for themetricsresource-type). Here's an example:Allow group DB-MGMT-USER to manage alarms in compartment ABC 
To build queries and create alarms for database metrics using the Monitoring service, other permissions are required. For information on:
- 
Monitoring service resource-types and permissions, see Details for Monitoring.
 - 
Common Monitoring service policies, see Common Policies.
 
 - Notifications service permission: A Notifications service
                permission is required to use or create topics and subscriptions when creating
                alarms in the Alarm definitions section on the
                    Managed database details page.
                     
To grant this permission, a policy with the
useormanageverb for theons-topicsresource-type must be created (in addition to Monitoring service permissions). Here's an example of a policy with themanageverb that allows you to create a new topic when creating an alarm:Allow group DB-MGMT-USER to manage ons-topics in compartment ABCFor more information on the Notifications service resource-types and permissions, see Details for Notifications.
 - Vault service permissions: A Vault service
                permission is required to use secrets when specifying database credentials to
                perform tasks such as creating a job and editing database parameters in Diagnostics
                & Management. If preferred and named credentials are set, then this permission
                is also required to use these credentials to access, manage and monitor Managed
                    Databases.
                     
To grant this permission, a policy with the
readverb for the Vault service resource-types must be created. Here's an example in which thesecret-familyaggregate resource-type is used:Allow group DB-MGMT-USER to read secret-family in compartment ABCIf you want to grant the permission to access secrets only from a specific vault, then update the policy to:
Allow group DB-MGMT-USER to read secret-family in compartment ABC where target.vault.id = <Vault OCID>In addition to the user group policy for the Vault service, the following resource principal policy may be required to grant the permission to access secrets when creating a scheduled job:
Allow any-user to read secret-family in compartment ABC where ALL {target.secret.id = <Secret OCID>,request.principal.type = dbmgmtmanageddatabase}For more information on the Vault service resource-types and permissions, see Details for the Vault Service.
 - Management Dashboard permissions: Management Dashboard
                permissions are required to use dashboards for the Autonomous AI Databases for which
                Diagnostics & Management is enabled. 
                     
To perform tasks such as creating a dashboard or a widget, you must have the required permissions on the Management Dashboard resource-types:
management-dashboard: This resource-type allows a user group to use dashboards.management-saved-search: This resource-type allows a user group to use the saved searches in a dashboard.
For more information on the Management Dashboard resource-types, permissions, API operations, and examples of policies, see Details for Management Dashboard.
 - Object Storage service permissions: Object
                Storage service permissions are required to use the Jobs feature in Diagnostics
                & Management.
                     
- To enable a user group to read the Query
                        type job results stored in an Object Storage bucket, two policies must be
                        created. Here are
                            examples:
Allow group DB-MGMT-USER to read buckets in compartment ABCand
Allow group DB-MGMT-USER to manage objects in compartment ABC - In addition to the user group policy for the Object Storage
                        service, the following resource principal policy is required to grant
                        Managed Database resources the permission to write results of scheduled jobs
                        to the Object Storage
                        service:
Allow any-user to manage objects in compartment ABC where ALL {target.bucket.name = <Bucket Name>,request.principal.type = dbmgmtmanageddatabase} 
For more information on the Object Storage service resource-types and permissions, see Details for Object Storage, Archive Storage, and Data Transfer.
 - To enable a user group to read the Query
                        type job results stored in an Object Storage bucket, two policies must be
                        created. Here are
                            examples:
 - Tagging service permissions: For information on the permissions required to use tags in Diagnostics & Management, see Tagging Authentication and Authorization.