Setting Up Users and Groups in
Cloud Accounts That Do Not Use Identity Domains
For a cloud account in a region not yet updated to use identity domains prior to the creation of the cloud account, users and groups are set up in Oracle Cloud Infrastructure Identity and Access Management (IAM) and Oracle Identity Cloud Service (IDCS).
Note
This section applies only to cloud accounts that do not use identity domains. If you are not sure if your cloud account uses identity domains, see About Setting Up Users and Groups.
For more information about Oracle Cloud Infrastructure IAM, IDCS, and the documentation that provides the information you need, see Documentation to Use for Cloud Identity in Overview of Identity and Access Management in the Oracle Cloud Infrastructure documentation.
Without identity domains, roles are assigned to IDCS groups, then linked to Oracle Cloud Infrastructure IAM groups using federation, as illustrated in the following diagram.
If your cloud account does not use identity domains, Oracle Cloud Infrastructure Identity and Access Management (IAM) must be federated with Oracle Identity Cloud Service (IDCS) for your tenancy.
User federation refers to linking a user's identity and attributes across multiple identity management systems. Oracle Visual Builder federation means that identities are linked in IDCS and Oracle Cloud Infrastructure Identity and Access Management (IAM).
Oracle Visual Builder uses both IDCS and IAM to manage users and groups:
Create and manage users in IDCS. By default, most tenancies are federated with IDCS. For more information about Oracle Identity Cloud
Service, see Understanding Administrator Roles in Administering Oracle
Identity Cloud Service.
Manage permissions using policies in Oracle Cloud Infrastructure's IAM service.
Whether your tenancy needs federation depends on several factors, such as when your cloud account was created and the Oracle Visual Builder version you're provisioning. Your tenancy may be:
Already fully federated: Nearly all accounts in regions that have not yet been updated to use identity domains fall into this category. You'll follow standard steps to set up users and groups, as described in the topics in this section.
Mostly federated: If you have an older account that was created before 21 December 2018, you may need to complete a final federation step. You'll follow steps to set up users and groups, as described in the topics in this section. At the mapping step (Mapping the IDCS and OCI Groups), you'll be asked to enter information.
Needing federation: If youβre configuring Oracle Visual Builder with a government SKU in a commercial data center, you'll likely need to perform manual federation steps as part of setting up users and groups. See Manually Federating Your Tenancy.
To grant access to Visual Builder instances, assign the users a Visual Builder role. You can grant the role individually to each IDCS user, or create an IDCS group of users and assign the role to the group. You can create Oracle Identity Cloud Service groups for later mapping them to Oracle Cloud Infrastructure Identity and Access Management identities.
Select Identity & Security and then under
Identity, select
Federation.
The Federation screen is shown, and includes the identity provider, called OracleIdentityCloudService. This is the default federation between the Oracle Identity Cloud Service stripe and the OCI tenancy in a cloud account.
Click the Oracle Identity Cloud Service Console link.
In the upper-left corner, click Navigation Menu and select Oracle Cloud Services.
Click the Visual Builder service name.
Click the Application Roles tab.
Click the menu options icon shown next the role, and select Assign
Users. If you want to assign the role to a group, select
Assign Groups.
Select the check box next to the name of each user or group that you want to
add to the role, and then click OK.
Create Oracle Cloud Infrastructure Groups and Policies π
To allow other non-admin users to create and manage Visual Builder instances, create an OCI group of non-admin users and assign them the correct OCI
policies.
If you're a tenant administrator and plan to create Visual Builder instances yourself, skip this procedure.
Sign in to the OCI Console.
Open the navigation menu and click Identity & Security. Under Identity, click Groups.
In the Create Group screen, assign a name to the group that differentiates it from the IDCS group (for example, oci-visualbuilder-admins), and enter a description.
Table 3-1 Syntax for policy statements for a group
Policy
Syntax
Allow the group to manage (create, delete, edit, move,
and view) the Visual Builder instance in a compartment
Allow group <group_name> to manage visualbuilder-instances in compartment <compartment-name>
Here's an example:
Allow group VBInstanceAdmins to manage visualbuilder-instances in compartment MyVBCompartment
Allow the group to manage (create, delete, edit, move,
and view) all Visual Builder instances of the tenancy
Allow group <group_name> to manage visualbuilder-instances in tenancy
Here's an example:
Allow group VBInstanceAdmins to manage visualbuilder-instances in tenancy
If you intend to use custom endpoints, allow the group to
access secrets and vaults of a compartment.
allow group <group-name> to manage secrets in compartment <secrets-compartment>
allow group <group-name> to manage vaults in compartment <secrets-compartment>
Here's an example:
Allow group VBInstanceAdmins to manage secrets in compartment MySecretCompartment
and
Allow group VBInstanceAdmins to manage vaults in compartment MySecretCompartment
Mapping the IDCS and OCI Groups π
You can now map your instance administrator group in IAM to your previously created IDCS group. For details, see Map the IDCS group with the OCI group.
Open the OCI navigation menu and click Identity & Security. Under Identity, click Federation.
On the Federation page, select the
OracleIdentityCloudService
link.
From the Resources options, choose
Group Mapping.
Click Edit Mapping.
In the Edit Identity Provider dialog, click Add Mapping
at the bottom.
If the following dialog appears prompting you to provide credentials, enter this information from the COMPUTEBAREMETAL IDCS application in your IDCS account. This dialog indicates that your tenancy is mostly federated and requires only this final step. See Understanding Federation. (If you aren't able to locate this information, file a service request to get help from Oracle Support.)
Upon signing in, the user will be prompted to enter a new
password.
View Visual Builder instances.
Read only users can view Visual Builder instances by selecting Visual Builder in the navigation pane.
Assigning Oracle Visual Builder Service Roles to Groups π
After a Visual Builder instance has been created, assign Visual Builder roles to groups of users in Oracle Visual Builder to allow them to work with the features of the Visual Builder instance.
Note
It's a best practice to assign Visual Builder service roles to selected groups rather than individual users.
Oracle Visual Builder provides a standard set of set of service roles, which govern access to features. Depending on the Visual Builder features your organization uses, you may choose to create groups named for the service role they are granted. For example, VBServiceAdministrators for administration permissions.
Open the navigation menu and click Identity &
Security. Under
Identity, click
Federation.
On the Federation screen, select the OracleIdentityCloudService link to view the default Oracle Identity Cloud Service identity federation.
On the Identity Provider Details page, select
Groups from the
Resources options.
From the table, select an IDCS group to grant the users in the
group access.
On the Group Details page, click Manage Service
Roles.
On the Manage Service Roles page, locate your Visual Builder service (VISUALBUILDERAUTO). At the far right, click , and select Manage instance access.
The Manage Access screen lists instances. Note
that you must assign roles for each instance
individually.
Instance names follow this format:
displayname-tenancyid-regionid
Instance URLs follow this format: https://displayname-tenancyid-regionid.visualbuilder.ocp.oraclecloud.com/ic/home/
From the Manage Access options, select instance roles for the
group under one or more specified instances.
Click Save Instance Settings, then
Apply Service Role
Settings.