# | ID | NAME | STATEMENTS |
---|---|---|---|
1 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to read all-resources in compartment managedcompartmentforpaas |
2 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow service PSM to manage all-resources in compartment managedcompartmentforpaas |
3 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to manage virtual-network-family in compartment managedcompartmentforpaas where all { target.vcn.display-name != /mgmt-vcn*/, request.operation != 'CreateVcn' } |
4 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to use buckets in compartment managedcompartmentforpaas where request.instance.compartment.id = 'ocid1.compartment.oc1..000000000000000000000000000000000000000000000000000000000228' |
5 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to use objects in compartment managedcompartmentforpaas where request.instance.compartment.id = 'ocid1.compartment.oc1..000000000000000000000000000000000000000000000000000000000228' |
6 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000594 | Key_Management | allow service blockstorage to use keys in tenancy where target.key.id = 'ocid1.key.oc1.iad.000000000000000000000000000000000000000000000000000000000582.abuwcljtzqo2437emqosisvntzyv4szps4bfxaynvotjmasftcuk5xe6dhlq' |
7 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow group oci360_group to read objects in tenancy where target.bucket.name='oci360_bucket' |
8 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow dynamic-group OCI360_DG to read all-resources in tenancy |
9 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow dynamic-group OCI360_DG to manage objects in tenancy where target.bucket.name='oci360_bucket' |
10 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow group oci360_group to read objects in tenancy where target.bucket.name='pnb_bucket' |
11 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow dynamic-group OCI360_DG to manage objects in tenancy where target.bucket.name='pnb_bucket' |
12 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000592 | OS_Management_Service | allow dynamic-group OsmsManagedInstance to use osms-managed-instances in tenancy |
13 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000592 | OS_Management_Service | allow dynamic-group OsmsManagedInstance to read instance-family in tenancy |
14 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000592 | OS_Management_Service | allow service osms to read instances in tenancy |
15 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to manage all-resources in compartment managedcompartmentforpaas |
16 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service OracleEnterpriseManager to manage all-resources in compartment managedcompartmentforpaas |
17 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to manage users in tenancy where target.user.name = /__PSM*/ |
18 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow any-user to manage all-resources in compartment managedcompartmentforpaas where request.user.name = /__PSM*/ |
19 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow any-user to manage all-resources in compartment managedcompartmentforpaas where request.instance.compartment.id = 'ocid1.compartment.oc1..000000000000000000000000000000000000000000000000000000000228' |
20 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to inspect tenant in tenancy |
21 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to inspect compartments in tenancy |
22 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000593 | Tenant Admin Policy | ALLOW GROUP Administrators to manage all-resources IN TENANCY |
23 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000590 | Usage_Report | define tenancy usage-report as ocid1.tenancy.oc1..000000000000000000000000000000000000000000000000000000000685 |
24 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000590 | Usage_Report | endorse group Administrators to read objects in tenancy usage-report |
25 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000590 | Usage_Report | endorse dynamic-group OCI360_DG to read objects in tenancy usage-report |
#: click on a column heading to sort on it
Name Null? Type
----------------------------------------------------------------------------------- -------- --------------------------------------------------------
ID VARCHAR2(128)
NAME VARCHAR2(32)
DESCRIPTION VARCHAR2(64)
DEFINED_TAGS$ORACLE_TAGS$CREATEDBY VARCHAR2(64)
DEFINED_TAGS$ORACLE_TAGS$CREATEDON VARCHAR2(32)
TIME_CREATED VARCHAR2(32)
VERSION_DATE VARCHAR2(4)
COMPARTMENT_ID VARCHAR2(128)
INACTIVE_STATUS VARCHAR2(4)
LIFECYCLE_STATE VARCHAR2(8)
STATEMENTS VARCHAR2(256)
SELECT ID,
NAME,
STATEMENTS
FROM OCI360_POLICIES t1;
25 rows selected.