| # | ID | NAME | STATEMENTS |
|---|---|---|---|
| 1 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to read all-resources in compartment managedcompartmentforpaas |
| 2 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow service PSM to manage all-resources in compartment managedcompartmentforpaas |
| 3 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to manage virtual-network-family in compartment managedcompartmentforpaas where all { target.vcn.display-name != /mgmt-vcn*/, request.operation != 'CreateVcn' } |
| 4 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to use buckets in compartment managedcompartmentforpaas where request.instance.compartment.id = 'ocid1.compartment.oc1..000000000000000000000000000000000000000000000000000000000228' |
| 5 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000595 | PSM-mgd-comp-policy | allow any-user to use objects in compartment managedcompartmentforpaas where request.instance.compartment.id = 'ocid1.compartment.oc1..000000000000000000000000000000000000000000000000000000000228' |
| 6 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000594 | Key_Management | allow service blockstorage to use keys in tenancy where target.key.id = 'ocid1.key.oc1.iad.000000000000000000000000000000000000000000000000000000000582.abuwcljtzqo2437emqosisvntzyv4szps4bfxaynvotjmasftcuk5xe6dhlq' |
| 7 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow group oci360_group to read objects in tenancy where target.bucket.name='oci360_bucket' |
| 8 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow dynamic-group OCI360_DG to read all-resources in tenancy |
| 9 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow dynamic-group OCI360_DG to manage objects in tenancy where target.bucket.name='oci360_bucket' |
| 10 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow group oci360_group to read objects in tenancy where target.bucket.name='pnb_bucket' |
| 11 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000591 | oci360_policy | allow dynamic-group OCI360_DG to manage objects in tenancy where target.bucket.name='pnb_bucket' |
| 12 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000592 | OS_Management_Service | allow dynamic-group OsmsManagedInstance to use osms-managed-instances in tenancy |
| 13 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000592 | OS_Management_Service | allow dynamic-group OsmsManagedInstance to read instance-family in tenancy |
| 14 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000592 | OS_Management_Service | allow service osms to read instances in tenancy |
| 15 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to manage all-resources in compartment managedcompartmentforpaas |
| 16 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service OracleEnterpriseManager to manage all-resources in compartment managedcompartmentforpaas |
| 17 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to manage users in tenancy where target.user.name = /__PSM*/ |
| 18 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow any-user to manage all-resources in compartment managedcompartmentforpaas where request.user.name = /__PSM*/ |
| 19 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow any-user to manage all-resources in compartment managedcompartmentforpaas where request.instance.compartment.id = 'ocid1.compartment.oc1..000000000000000000000000000000000000000000000000000000000228' |
| 20 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to inspect tenant in tenancy |
| 21 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000589 | PSM-root-policy | allow service PSM to inspect compartments in tenancy |
| 22 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000593 | Tenant Admin Policy | ALLOW GROUP Administrators to manage all-resources IN TENANCY |
| 23 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000590 | Usage_Report | define tenancy usage-report as ocid1.tenancy.oc1..000000000000000000000000000000000000000000000000000000000685 |
| 24 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000590 | Usage_Report | endorse group Administrators to read objects in tenancy usage-report |
| 25 | ocid1.policy.oc1..000000000000000000000000000000000000000000000000000000000590 | Usage_Report | endorse dynamic-group OCI360_DG to read objects in tenancy usage-report |
#: click on a column heading to sort on it
Name Null? Type
----------------------------------------------------------------------------------- -------- --------------------------------------------------------
ID VARCHAR2(128)
NAME VARCHAR2(32)
DESCRIPTION VARCHAR2(64)
DEFINED_TAGS$ORACLE_TAGS$CREATEDBY VARCHAR2(64)
DEFINED_TAGS$ORACLE_TAGS$CREATEDON VARCHAR2(32)
TIME_CREATED VARCHAR2(32)
VERSION_DATE VARCHAR2(4)
COMPARTMENT_ID VARCHAR2(128)
INACTIVE_STATUS VARCHAR2(4)
LIFECYCLE_STATE VARCHAR2(8)
STATEMENTS VARCHAR2(256)
SELECT ID,
NAME,
STATEMENTS
FROM OCI360_POLICIES t1;
25 rows selected.