The following tables show the permissions and API operations covered by each verb. The level of access is cumulative as you go from inspect > read > use > manage. For example, a group that can use a resource can also inspect and read that resource. A plus sign (+) in a table cell indicates incremental access compared to the cell directly above it, whereas "no extra" indicates no incremental access.
For example, the read verb for load-balancers includes the same permissions and API operations as the inspect verb, plus the LOAD_BALANCER_READ permission and a number of API operations (e.g., GetLoadBalancer, ListWorkRequests, etc.). The use verb covers still another permission and set of API operations compared to read. And manage covers two more permissions and operations compared to use.
load-balancers
Verbs
Permissions
APIs Fully Covered
APIs Partially Covered
inspect
LOAD_BALANCER_INSPECT
ListLoadBalancers
ListShapes
ListPolicies
ListProtocols
none
read
INSPECT +
LOAD_BALANCER_READ
INSPECT +
GetLoadBalancer
ListWorkRequests
GetWorkRequest
ListBackendSets
GetBackendSet
ListBackends
GetBackend
GetHealthChecker
ListCertificates
none
use
READ +
LOAD_BALANCER_UPDATE
LOAD_BALANCER_MOVE
READ +
UpdateLoadBalancer
ChangeLoadBalancerCompartment
UpdateBackendSet
CreateBackendSet
DeleteBackendSet
UpdateBackend
CreateBackend
DeleteBackend
UpdateHealthChecker
CreateCertificate
DeleteCertificate
UpdateListener
CreateListener
DeleteListener
none
manage
USE +
LOAD_BALANCER_CREATE
LOAD_BALANCER_DELETE
USE +
CreateLoadBalancer
DeleteLoadBalancer
none
Permissions Required for Each API Operation 🔗
The following table lists the API operations in a logical order, grouped by resource type.
Tip
If a group uses the Console to manage load balancers, permissions to use the associated networking resources are required. See the load balancing policy examples for further guidance.
For information about permissions, see Permissions.