Task 5: Set Up Role Based Access Control

Use role based access control (RBAC) to control user access to Oracle Database@Google Cloud resources.

Use Google Cloud RBAC for both Oracle Autonomous Database and Oracle Exadata Database Service to control user access.

Note the following:

  • Pay as You Go customers only need to complete the instructions for Autonomous Database.
  • Private offer customers who want to provision both Oracle Autonomous Database and Exadata Database Service need to complete both sets of instructions in this topic. Otherwise, complete the set of instructions that matches the database service you plan to use.
Configuring Role Based Access Control for Oracle Autonomous Database

The following table provides details for the Google Cloud groups and roles for Autonomous Database. The Google Cloud Group email values provided in the table are suggested values, but you can use other group email names as needed. Note that you must replace the <email_domain> string with your organization's email domain. For example: odbg-adbs-db-administrators@example.com

Google Cloud Group name Google Cloud Group email Google Cloud Role assignment Purpose
odbg-adbs-db-administrators odbg-adbs-db-administrators@<email_domain>

Oracle Database@Google Cloud Autonomous Database Admin

This group is for administrators who need to manage all Oracle Autonomous Database resources in Google Cloud .
odbg-adbs-db-readers odbg-adbs-db-readers@<email_domain> Oracle Database@Google Cloud Autonomous Database Viewer This group is for viewers who need to view all Oracle Autonomous Database resources in Google Cloud.
odbg-db-family-administrators odbg-db-family-administrators@<email_domain> Oracle Database@Google Cloud admin

This group is for administrators who need to manage all Oracle Database Service resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbaa-db-family-readers odbaa-db-family-readers@<email_domain> Oracle Database@Google Cloud viewer

This group is for readers who need to view all Oracle Database resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbg-network-administrators odbg-network-administrators@<email_domain> not applicable

This group is for administrators who need to manage all network resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbg-costmgmt-administrators odbg-costmgmt-administrators@<email_domain> not applicable

This group is for administrators who need to manage cost and billing resources in OCI.

This group is replicated in OCI during the optional identity federation process.

To configure role based access control for Oracle Autonomous Database in the Google Cloud console

  1. Sign in to the Google Cloud Admin console using the URL https://admin.google.com/ac/groups. The Groups list view page is displayed.

  2. On the Groups list view page, click Create group.

    An image of the Google Cloud admin console showing the IAM Groups interface.
  3. In Group information tab, enter the following details for the group your are creating. For each row in the table in this topic, you will need to create a group using the steps in this task. Follow the steps in the task for a single group to create that group, then repeat the steps for the additional groups listed in the table.

    • Group name: Use the "Google Cloud Group name" values from the table in this topic. For example: odbg-adbs-db-administrators.
    • Group email: You can use the "Google Cloud Group email" values in the table in this topic, or create your own values, as needed. For example: odbg-adbs-db-administrators@example.com
    • Group Description: You can use the descriptions found in the "Purpose" column in the table in this topic. For example: "This group is for administrators who need to manage all Oracle Autonomous Database resources in Google Cloud."

    Before entering information:

    An image of the "Create group" form in the Google Cloud admin console.

    After entering information:

    An image of the "Create group" form in the Google Cloud admin console.

    After entering these values, click NEXT.

  4. In the Group settings tab, update the access settings based on your company's security best practices, then click CREATE GROUP.

    An image of the Group settings tab in the Create group dialog of the Google Cloud admin console.
  5. Click Create another group to begin creating the next group in the table of groups in this topic.

    An image of the Create group dialog after a group has been successfully created.
  6. After repeating steps 3 to 5 to create the rest of the required groups, click DONE.
  7. Assign roles to the Google Cloud groups you have just created in IAM & Admin. Search "IAM & Admin" in the Google Cloud console and click on the search result to navigate to this service in the console.

    An image of a search for "IAM & Admin" in the Google Cloud console.
  8. In the IAM & Admin navigation menu, click IAM, and then select Grant access.

    An image of the Grant access screen in the IAM section of the Google Cloud console.
  9. On the Grant access to dialog, assign roles to the groups created in steps 2 to 5 of this task.

    Enter the following, then click SAVE and repeat this step until you have assigned roles to all the groups listed in the table at the beginning of this topic.

    • Add principals: In the New principals field, enter the Google Cloud group email for the group you are assigning roles to. In the table at the beginning of this topic, you can find a suggested naming pattern for the group email names. For example: odbg-adbs-db-administrators@example.com
    • Assign roles: in the Role field, select the Google Group Role Assignment listed in the table at the beginning of this topic that corresponds to the group email you entered in the New principals field. For example: "Oracle Database@Google Cloud Autonomous Database Admin"
    An image of the "Grant access" dialog in Google Cloud IAM.
Configuring Role Based Access Control for Oracle Exadata Database Service

Use the information in the following table to create new Google Cloud groups and roles for Exadata Database Service. The Google Cloud Group email values provided in the table are suggested values, but you can use other group email names as needed. Note that you must replace the <email_domain> string with your organization's email domain. For example: odbg-adbs-db-administrators@example.com

Google Cloud Group name Google Cloud Group email Google Cloud Role assignment Purpose

odbg-exa-infra-administrators

odbg-exa-infra-administrators@<email_domain>

Oracle Database@Google Cloud Exadata Infrastructure Admin

This group is for administrators who need to manage all Oracle Exadata Database Service resources in Google Cloud.

odbg-exa-infra-readers

odbg-exa-infra-readers@<email_domain>

Oracle Database@Google Cloud Exadata Infrastructure Viewer

This group is for viewers who need to view all Oracle Exadata Database Service resources in Google Cloud

odbg-vm-cluster-administrators

odbg-vm-cluster-administrators@<email_domain>

Oracle Database@Google Cloud VM Cluster Admin

This group is for administrators who need to manage VM Clusters resources in Google Cloud.

odbg-vm-cluster-readers

odbg-vm-cluster-readers@<email_domain>

Oracle Database@Google Cloud VM Cluster Viewer

This group is for viewers who need to view VM Clusters resources in Google Cloud

odbg-db-family-administrators

odbg-db-family-administrators@<email_domain>

Oracle Database@Google Cloud admin

This group is for administrators who need to manage all Oracle Database Service resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbaa-db-family-readers

odbaa-db-family-readers@<email_domain>

Oracle Database@Google Cloud viewer

This group is for readers who need to view all Oracle Database resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbg-exa-cdb-administrators

odbg-exa-cdb-administrators@<email_domain>

none

This group is for administrators who need to manage all CDB resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbg-exa-pdb-administrators

odbg-exa-pdb-administrators@<email_domain>

none

This group is for administrators who need to manage all PDB resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbg-network-administrators

odbg-network-administrators@<email_domain>

none

This group is for administrators who need to manage all network resources in OCI.

This group is replicated in OCI during the optional identity federation process.

odbg-costmgmt-administrators

odbg-costmgmt-administrators@<email_domain>

none

This group is for administrators who need to manage cost and billing resources in OCI.

This group is replicated in OCI during the optional identity federation process.

To configure role based access control for Exadata Database Service in the Google Cloud console

  1. Sign in to the Google Cloud Admin console using the URL https://admin.google.com/ac/groups. The Groups list view page is displayed.

  2. On the Groups list view page, click Create group.

    An image of the Google Cloud admin console showing the IAM Groups interface.
  3. In Group information tab, enter the following details for the group your are creating. For each row in the table in this topic, you will need to create a group using the steps in this task. Follow the steps in the task for a single group to create that group, then repeat the steps for the additional groups listed in the table.

    • Group name: Use the "Google Cloud Group name" values from the table in this topic. For example: odbg-exa-infra-administrators.
    • Group email: You can use the "Google Cloud Group email" values in the table in this topic, or create your own values, as needed. For example: odbg-exa-infra-administrators@example.com
    • Group Description: You can use the descriptions found in the "Purpose" column in the table in this topic. For example: "This group is for administrators who need to manage all Oracle Exadata Database Service resources in Google Cloud."

    Before entering information:

    An image of the "Create group" form in the Google Cloud admin console.

    After entering information:

    An image of the "Create group" form in the Google Cloud admin console.

    After entering these values, click NEXT.

  4. In the Group settings tab, update the access settings based on your company's security best practices, then click CREATE GROUP.

    An image of the Group settings tab in the Create group dialog of the Google Cloud admin console.
  5. Click Create another group to begin creating the next group in the table of groups in this topic.

    An image of the Create group dialog after a group has been successfully created.
  6. After repeating steps 3 to 5 to create the rest of the required groups, click DONE.
  7. Assign roles to the Google Cloud groups you have just created in IAM & Admin. Search "IAM & Admin" in the Google Cloud console and click on the search result to navigate to this service in the console.

    An image of a search for "IAM & Admin" in the Google Cloud console.
  8. In the IAM & Admin navigation menu, click IAM, and then select Grant access.

    An image of the Grant access screen in the IAM section of the Google Cloud console.
  9. On the Grant access to dialog, assign roles to the groups created in steps 2 to 5 of this task.

    Enter the following, then click SAVE and repeat this step until you have assigned roles to all the groups listed in the table at the beginning of this topic.

    • Add principals: In the New principals field, enter the Google Cloud group email for the group you are assigning roles to. In the table at the beginning of this topic, you can find a suggested naming pattern for the group email names. For example: odbg-adbs-db-administrators@example.com
    • Assign roles: in the Role field, select the Google Group Role Assignment listed in the table at the beginning of this topic that corresponds to the group email you entered in the New principals field. For example: "Oracle Database@Google Cloud Autonomous Database Admin"
    An image of the "Grant access" dialog in Google Cloud IAM.

What's Next?

Oracle Database@Google Cloud is ready for use. You can now do the following: