DEV Community

Bonthu Durga Prasad
Bonthu Durga Prasad

Posted on

Understanding Identity and Access Management (IAM) Architecture in Oracle Cloud Infrastructure

Understanding Identity and Access Management (IAM) Architecture in Oracle Cloud Infrastructure

Security is one of the most critical aspects when designing cloud infrastructure. In Oracle Cloud Infrastructure, Identity and Access Management (IAM) provides a centralized framework to control access to resources and services.

IAM allows administrators to define who can access cloud resources and what actions they are allowed to perform, ensuring a secure and well-managed cloud environment.

In this article, we will explore the core IAM architecture and understand how its components work together.

Why IAM is Important

In a cloud environment, multiple users, applications, and services interact with infrastructure resources. Without proper access control, organizations risk exposing sensitive data or critical infrastructure.

OCI IAM helps organizations:

  • Implement secure access control
  • Enforce the principle of least privilege
  • Organize resources effectively
  • Manage identities and permissions centrally

Core Components of OCI IAM

OCI IAM is built using several key components.

Compartments

Compartments are logical containers used to organize and isolate OCI resources.

They allow administrators to structure cloud environments and apply access control boundaries.

Example compartment hierarchy:

Root Tenancy

├── Development
│ ├── Compute
│ └── Storage

└── Production
├── Application Servers
└── Databases

This structure helps maintain clear separation between environments.

Users and Groups

Users represent identities that can access the OCI Console or APIs.

Groups are collections of users with similar responsibilities.

Instead of assigning permissions to individual users, administrators assign policies to groups.

Example:
Group: DevOps
Users:

  • Alice
  • Bob

This simplifies permission management across teams.

IAM Policies

Policies define what actions users or groups are allowed to perform on OCI resources.

Example policy:

Allow group DevOps to manage instance-family in compartment Production

Policies usually define:

  • Subject (group or dynamic group)
  • Action (inspect, read, use, manage)
  • Resource type
  • Compartment scope

Policies form the core of OCI authorization.

Dynamic Groups and Instance Principals

Modern cloud applications often run on compute instances and need access to OCI services.

Instead of storing API credentials on servers, OCI provides Instance Principals.

Instance principals allow compute instances to authenticate with OCI services using instance identity.

Example access flow:

Compute Instance


Instance Principal


Dynamic Group


IAM Policy


OCI Service Access

Dynamic groups automatically include instances based on matching rules.

Example dynamic group rule:

ALL {instance.compartment.id = ''}

Example policy:

Allow dynamic-group app-instances to read buckets in compartment Storage

This architecture eliminates the need to store credentials on servers.

*Real-World Example
*

Imagine an application running on an OCI compute instance that needs to upload files to Object Storage.

  • Instead of storing API keys on the instance:
  • The instance is added to a dynamic group
  • A policy grants access to Object Storage
  • The application authenticates using instance principals

This enables secure and automated access to OCI services.

Best Practices for OCI IAM

When designing IAM architecture in OCI, follow these best practices:

  • Use groups for permission management
  • Follow the principle of least privilege
  • Organize resources using compartments
  • Avoid storing API keys on compute instances
  • Use instance principals whenever possible

*Conclusion
*

Identity and Access Management is a foundational security service in Oracle Cloud Infrastructure. By combining compartments, users, groups, policies, and dynamic groups, organizations can build a secure access control framework for their cloud environments.

Understanding IAM architecture is essential for designing secure and scalable OCI workloads.

GitHub Repository

You can explore the complete IAM implementation and architecture documentation here:

GitHub logo Durgaprasad9346 / oci-iam-access-control-guide

OCI IAM deep dive covering users, groups, policies, dynamic groups, instance principals and advanced access patterns in Oracle Cloud Infrastructure.

oci-iam-access-control-guide

OCI IAM deep dive covering users, groups, policies, dynamic groups, instance principals and advanced access patterns in Oracle Cloud Infrastructure.

Overview

Identity and Access Management (IAM) is the security foundation of Oracle Cloud Infrastructure (OCI). It controls authentication and authorization for users, services, and applications interacting with cloud resources.

OCI IAM allows administrators to define who can access resources and what actions they can perform through policies, groups, and dynamic access mechanisms.

This repository provides an in-depth explanation of OCI IAM components and advanced access patterns used in enterprise cloud environments.


Core IAM Components

OCI IAM consists of several key components:

  • Compartments
  • Users
  • Groups
  • Policies
  • Dynamic Groups
  • Instance Principals
  • Resource Principals

These components work together to implement secure access control across OCI services.


IAM Access Flow

Typical access flow:

User │ ▼ OCI IAM │ ▼ Group Membership │ ▼ Policy Evaluation │ ▼ Access to OCI Resource


Repository

Top comments (0)