DEV Community

Cover image for Introduction to IAM in Oracle Cloud Infrastructure
Venkata Pavan Vishnu Rachapudi
Venkata Pavan Vishnu Rachapudi Subscriber

Posted on

Introduction to IAM in Oracle Cloud Infrastructure

πŸš€ Just Started Exploring OCI – Part 1

πŸ” Identity & Access Management (IAM) + πŸ”„ Compartments + 🌍 Regions

I’ve started diving into Oracle Cloud Infrastructure (OCI) and here’s what I’ve picked up so far from IAM & resource organization.

πŸ”‘ IAM = Who can do What on Which resources, and Where πŸ”

OCI’s Identity and Access Management (IAM) system helps you secure cloud resources by defining:

πŸ§β€β™‚οΈ Users
πŸ‘₯ Groups
πŸ” Policies
πŸ“¦ Compartments
πŸ› οΈ Resources

IAM Flow:
πŸ‘‰ Create Identity Domain
πŸ‘‰ Add Users
πŸ‘‰ Organize into Groups
πŸ‘‰ Define Policies for groups
πŸ‘‰ Scope them to Compartments inside your Tenancy
πŸ‘‰ Grant access to Resources πŸ’₯


🧠 IAM Concepts:

AuthN (Authentication) = Who you are
πŸ”Έ Username/password
πŸ”Έ API signing keys
πŸ”Έ Auth tokens
πŸ”Έ SAML, OAuth2

AuthZ (Authorization) = What you’re allowed to do
βœ… Authorization in OCI is handled through policies. These are plain-text statements that grant permissions to groups, not individual users, to perform actions on resources in specific compartments.

πŸ“œ Policies: Plain, Powerful & Human-readable
Example:

Allow group DevTeam to manage compute-instances in compartment ProjectA

Enter fullscreen mode Exit fullscreen mode

🧠 Understanding IAM Policies in OCI
Policies are defined using a simple, human-readable language that specifies:

  • Who (a group)
  • What permissions (verbs like inspect, read, use, or manage)
  • On what resource types (like instances, buckets, volumes)
  • In which compartment or tenancy

Verbs:

  • inspect: List and view metadata.
  • read: View full details (but no updates).
  • use: Perform standard operations (start/stop, etc.).
  • manage: Full control (create/update/delete).

Policy Scope:

  • Policies can be defined at the tenancy level (global) or at a compartment level (scoped).
  • You can also create dynamic groups (for resources like instances or functions) and attach policies to allow them to access other OCI servicesβ€”ideal for automation or service-to-service communication.

πŸ—‚οΈ Compartments = Logical Isolation

Think of compartments as folders πŸ—ƒοΈ:

  • Group resources by team/project/type
  • Root compartment holds everything, but best to organize using sub-compartments
  • Up to 6 levels of nesting allowed

Resources can:

  • πŸ”„ Move between compartments
  • 🌐 Belong to multiple regions
  • πŸ”— Interact across compartments

πŸ†” OCID – Oracle Cloud Identifier

Every OCI resource gets a globally unique ID:

ocid1.<resource_type>.<realm>.[region].<unique_id>
Enter fullscreen mode Exit fullscreen mode

Useful for tracing, automation, and scripting!


🌍 Regions, Availability Domains, and Fault Domains – for High Availability

OCI is designed to minimize single points of failure (SPOF) and maximize uptime πŸ”:

🟒 Region
β”‚
β”œβ”€β”€ 🟒 Availability Domains (ADs)
β”‚   β”œβ”€β”€ πŸ”Ή Fault Domain 1
β”‚   β”œβ”€β”€ πŸ”Ή Fault Domain 2
β”‚   └── πŸ”Ή Fault Domain 3
β”‚
└── πŸͺ’ Region Pair (for disaster recovery)

Enter fullscreen mode Exit fullscreen mode
  • Region: Geographical location (e.g., India Central, US East)
  • Availability Domain (AD): Physically isolated DC within a region
  • Fault Domain: Logical group within an AD – protects from rack/power failures

βœ… Use multiple fault domains within an AD for HA
βœ… Use multiple ADs across a region for redundancy
βœ… Use Region Pairs for cross-region disaster recovery (DR)


πŸ” IAM Best Practices in OCI

Start by creating an Identity Domain, then define users, group them

  • logically (e.g., by role or function), and attach policies to groups.
  • Avoid using the tenancy administrator for daily workβ€”create least-privilege roles.
  • Enable MFA for all users to prevent unauthorized access.
  • Use dedicated compartments for network, compute, security, audit logs, etc.
  • Regularly review and clean up unused users, groups, and policies.

IAM in OCI is built with enterprise-grade flexibility and security in mind. Whether you're building a secure landing zone, managing team access, or automating deployments, understanding IAM is essential to running a scalable and secure OCI environment.

πŸ’­ That's it for Part 1 of my OCI Journey! IAM + Compartments + Regions made clear 🧠
Coming up next: Networking, Compute & Storage modules πŸ”œ

Top comments (2)

Collapse
 
swethamudunuri profile image
Swetha Mudunuri

Nice blog Vishnu, looking forward for the next one :)

Collapse
 
cmegenius profile image
CMEGenius

Fantastic App – feature-rich and intuitive.