Task 7: Set Up Role Based Access Control for Oracle Database@Azure

Use role based access control (RBAC) to control user access to Oracle Database@Azure resources.

This task has instructions to set up Azure RBAC for both Oracle Autonomous Database and Oracle Exadata Database Service. Note the following:

  • Pay as You Go customers only need to complete the instructions for Autonomous Database.
  • Private offer customers who want to provision both Autonomous Database and Exadata Database Service need to complete both sets of instructions in this topic. Otherwise, complete the set of instructions that matches the database service you plan to use.
Configuring Role Based Access Control for Oracle Autonomous Database

Autonomous Database Groups and Roles

Azure Group name Azure Role assignment Purpose
odbaa-adbs-db-administrators

Oracle.Database Autonomous Database Administrator

This group is for administrators who need to manage all Oracle Autonomous Database resources in Azure.
odbaa-db-family-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage all Oracle Database Service resources in OCI.

odbaa-db-family-readers Oracle.Database Reader

This group is replicated in OCI during the optional identity federation process.

This group is for readers who need to view all Oracle Database resources in OCI.

odbaa-network-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage all network resources in OCI.

odbaa-costmgmt-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage cost and billing resources in OCI.

To configure role based access control in the Azure portal for Autonomous Database

  1. Sign in to the Azure portal at https://portal.azure.com/.

  2. Search for "EntraID" in the Azure search tool, then select Microsoft Entra ID in the search results to navigate to the EntraID Overview page.

    An image of the Azure portal showing the Overview page for the EntraID service.
  3. Select Groups to navigate to the groups page. Then select All groups.

    An image of the Azure portal showing the EntraID all groups page.
  4. Select New group and enter the following information:

    • Group type: Security
    • Group name: Enter a group name from the table of Autonomous Database groups and roles in this topic. This table is also available in the Groups and roles in Azure reference.
    • Group description: Enter a description of the group to help you identify it later. You can use the descriptions provided in the Purpose column of the table at the beginning of this topic.
    An image of the New Group creation form in the Azure EntraID service.

    Select Create to create the new group.

  5. Repeat the previous step to create new groups for all the Azure groups listed in the table in this topic.
  6. Navigate to Subscriptions page in the Azure portal, then find your Azure subscription in the page. Click the name of the subscription to view the subscription details. See View all subscriptions in the Azure documentation for more information.

  7. On the Access Control (IAM) section of the Azure subscription details page, click +Add and select the Add role assignment option.

    An image of the subscription details page showing the Access Control (IAM) section.
  8. Search for any of the Autonomous Database roles listed in the table in this topic. For example, Oracle.Database Reader. Select the role, then click Next.

    An image of the add role assignment work flow.
  9. On the Members tab of the Add role assignment work flow, select +Select Members.

  10. Search for "odbaa" in the search field. Groups that begin with "odbaa" are displayed. Select a group name to select it. For example: "odbaa-db-family-readers".

  11. On the Members tab, select Review + assign.

    An image of the Add role assignment work flow.
  12. Repeat steps 7 to 11 for each Azure Autonomous Database group that have role assignments specified in the table.
Configuring Role Based Access Control for Exadata Database Service

Exadata Groups and Roles

Azure Group name Azure Role assignment Purpose
odbaa-exa-infra-administrators Oracle.Database Exadata Infrastructure Administrator This group is for administrators who need to manage all Exadata Database Service resources in Azure. Users with this role have all the permissions granted by "odbaa-vm-cluster-administrators".
odbaa-vm-cluster-administrators Oracle.Database VmCluster Administrator This group is for administrators who need to manage VM cluster resources in Azure.
odbaa-db-family-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage all Oracle Database Service resources in OCI.

odbaa-db-family-readers Oracle.Database Reader

This group is replicated in OCI during the optional identity federation process.

This group is for readers who need to view all Oracle Database resources in OCI.

odbaa-exa-cdb-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage all CDB resources in OCI.

odbaa-exa-pdb-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage all PDB resources in OCI.

odbaa-network-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage all network resources in OCI.

odbaa-costmgmt-administrators NONE

This group is replicated in OCI during the optional identity federation process.

This group is for administrators who need to manage cost and billing resources in OCI.

To configure role based access control in the Azure portal for Exadata Database

  1. Sign in to the Azure portal at https://portal.azure.com/.

  2. Search for "EntraID" in the Azure search tool, then select Microsoft Entra ID in the search results to navigate to the EntraID Overview page.

    An image of the Azure portal showing the Overview page for the EntraID service.
  3. Select Groups to navigate to the groups page. Then select All groups.

    An image of the Azure portal showing the EntraID all groups page.
  4. Click New group and enter the following information:

    • Group type: Security
    • Group name: Enter a group name from the table Exadata groups and roles in this topic. This table is also available in the Groups and roles in Azure reference.
    • Group description: Enter a description of the group to help you identify it later. You can use the descriptions provided in the Purpose column of the table of Exadata groups and roles.
    An image of the New Group creation form in the Azure EntraID service.

    Click Create to create the new group.

  5. Repeat the previous step to create new groups for all the Azure groups listed in the table in this topic.
  6. Navigate to Subscriptions page in the Azure portal, then find your Azure subscription in the page. Click the name of the subscription to view the subscription details. See View all subscriptions in the Azure documentation for more information.

  7. On the details page for your subscription, click Access Control (IAM), then click +Add and select the Add role assignment option.

    An image of the subscription details page showing the Access Control (IAM) section.
  8. Search for any of the roles listed in the table of Exadata groups and roles in this topic. For example, Oracle.Database Reader. Select the role, then click Next.

    An image of the add role assignment work flow.
  9. On the Members tab of the Add role assignment work flow, click +Select Members.

  10. Search for "odbaa" in the search field. Groups that begin with "odbaa" are displayed. Click a group name to select it. For example: "odbaa-db-family-readers".

  11. On the Members tab, click Review + assign.

    An image of the Add role assignment work flow.
  12. Repeat steps 12 to 16 for each Azure groups listed in the table of Exadata groups and roles that have role assignments specified in the table.

What's Next?

Oracle Database@Azure is ready for use. You can now do the following: