API-Level Permissions for Semantic Stores
This page provides access and authorization information for the OCI Generative AI service semantic store which is a vector store when structured data is selected.
You get a semantic store, (a type of vector store), when you create a vector store with structured data to use for tools such as NL2SQL.
For specific permissions for this resource type, review this page. For a list of all resource types available in OCI Generative AI, see User Access to Individual Resources.
Resource Type
| Resource Type for IAM Permissions | Documentation Reference | API Reference |
|---|---|---|
generative-ai-semantic-store |
Creating a Vector Store (with structured data) | SemanticStore |
Inspect Permission
Grant user groups inspect permission to run the following commands:
- GET
ListSemanticStores
Read Permission
Grant user groups read permission to run the following commands:
- GET
ListSemanticStores - GET
GetSemanticStore
Use Permission
Grant user groups use permission to run the following commands:
- GET
ListSemanticStores - GET
GetSemanticStore - PUT
UpdateSemanticStore
Manage Permission
Grant user groups manage permission to run the following commands:
- GET
ListSemanticStores - GET
GetSemanticStore - PUT
UpdateSemanticStore - POST
CreateSemanticStore - POST
ChangeSemanticStoreCompartment - DELETE
DeleteSemanticStore
- The manage permission includes all actions allowed by use, read, and inspect.
- The use permission includes all actions allowed by read and inspect.
- The read permission includes all actions allowed by inspect.
The
generative-ai-hosted-application resource-type is part of the generative-ai-family.allow group <your-group-name> to manage generative-ai-family
in compartment <your-compartment-name>1-1 Permissions for APIs
We recommend using the higher-level IAM verbs, manage, use, read, and inspect, for a better user experience. For example, you might grant a user group permission to delete a resource, but if you don't also grant permission to list that resource, users might not find it.
If a use case requires access to only a specific API operation, you can use the individual permissions listed here. For example, if users need permission to create a resource but not delete it, grant manage for that resource type and exclude the delete permission.
generative-ai-semantic-store
| Permission | API Operation | Operation Type | Verb |
|---|---|---|---|
GENERATIVE_AI_SEMANTIC_STORE_INSPECT
|
ListSemanticStores
|
GET
|
inspect
|
GENERATIVE_AI_SEMANTIC_STORE_READ
|
GetSemanticStore
|
GET
|
read
|
GENERATIVE_AI_SEMANTIC_STORE_UPDATE
|
UpdateSemanticStore
|
PUT
|
use
|
GENERATIVE_AI_SEMANTIC_STORE_MOVE
|
ChangeSemanticStoreCompartment
|
POST
|
manage
|
GENERATIVE_AI_SEMANTIC_STORE_CREATE
|
CreateSemanticStore
|
POST
|
manage
|
GENERATIVE_AI_SEMANTIC_STORE_DELETE
|
DeleteSemanticStore
|
DELETE
|
manage
|