Here are four different personas who can use Database Tools. Each
persona can have a different level of management access to the accompanying Oracle
Cloud Infrastructure service as shown in the following table:
The Database Tools administrator can manage all aspects of the service.
The following policies grant them the permissions required to manage networking,
vaults, keys, secrets, databases, and Database Tools in a specific compartment.
Replace <group_name> and <compartment_name> with your
own values.
Table 6-7 Database Tools Administrator
Policies
Policy
Access Level
allow group <group_name> to manage virtual-network-family
in compartment <compartment_name>
allow group <group_name> to manage mysql-family
in compartment <compartment_name>
To manage MySQL Database Services.
allow group <group_name> to manage vaults
in compartment <compartment_name>
To manage vaults.
allow group <group_name> to manage keys
in compartment <compartment_name>
To manage keys.
allow group <group_name> to manage secret-family
in compartment <compartment_name>
To manage secrets.
allow group <group_name> to manage database-tools-family
in compartment <compartment_name>
To manage Database Tools.
Database Tools Manager 🔗
The Database Tools Manager can manage networking (including private
endpoints), secrets, and Database Tools connections but has limited access to the
Oracle Cloud Infrastructure Vault and Database services.
Replace <group_name> and <compartment_name> with
your own values.
Table 6-8 Database Tools Manager
Policies
Policy
Access Level
allow group <group_name> to manage virtual-network-family
in compartment <compartment_name>
To use virtual cloud networks (VCNs), subnets,
virtual network interface cards, and network security
groups.
allow group <group_name> to read mysql-family
in compartment <compartment_name>
To read MySQL Database Services.
allow group <group_name> to use vaults
in compartment <compartment_name>
To use vault (for example, create secret).
allow group <group_name> to use keys
in compartment <compartment_name>
To use keys (for example, create secret).
allow group <group_name> to manage secret-family
in compartment <compartment_name>
To manage secrets.
allow group <group_name> to manage database-tools-family
in compartment <compartment_name>
To manage Database Tools.
Database Tools Connection
Manager 🔗
The Database Tools Connection Manager manages creating connections to
Database services and has read-only access on the other services.
Replace <group_name> and <compartment_name> with
your own values..
If using a where clause in the policy to restrict access based on the connection
OCID, use the following: