Oracle Cloud
Visualize OCI compute instances, virtual machine hosts, domains, access policies, oracle object storage, vaults, nosql services, streaming services , devops, functions, redis, resource manager , map OCI users to employees, and monitor changes through queries and alerts.
- Installation
- Data Model
- Types
Installation
This guide walks you through setting up the Oracle Cloud Infrastructure (OCI) integration in JupiterOne. The process involves two main steps:
- Configure API access in Oracle Cloud - Set up authentication credentials
- Configure the integration in JupiterOne - Connect JupiterOne to your OCI account
Prerequisites
Before you begin, make sure you have:
- Admin access to your Oracle Cloud Infrastructure account (or a user with sufficient permissions)
- The ability to create API keys and configure IAM policies in OCI
- Access to your JupiterOne account
Step 1: Configure API Access in Oracle Cloud
To connect JupiterOne to your Oracle Cloud account, you'll need to create API credentials. Here's what you'll be collecting:
| Credential | What It Is | Where You'll Get It |
|---|---|---|
| Private Key | The private half of an RSA key pair used for API authentication | Generated/downloaded during API key creation |
| Tenancy OCID | Your Oracle Cloud tenancy's unique identifier | Shown in the configuration preview after creating the API key |
| User OCID | The unique identifier for your OCI user account | Shown in the configuration preview after creating the API key |
| Fingerprint | A unique identifier for your public key | Shown in the configuration preview after creating the API key |
| Region | The Oracle Cloud region you want to connect to | Shown in the configuration preview after creating the API key |
| Passphrase | Optional password protecting your private key | Only needed if you used a passphrase when generating the key |
Create an API Key in Oracle Cloud
-
Log into Oracle Cloud Infrastructure Console
- Sign in as the root user or a user with permissions to create API keys and manage IAM policies
-
Navigate to User Profile
- Click on your profile icon in the top-right corner of the screen
- Select My profile from the dropdown menu
-
Add API Key
- In your profile, scroll to the Tokens and Keys section
- Click Add API Key
-
Generate or Upload Key Pair
- Recommended: Select "Generate a key pair for me" (easiest option)
- Alternative: Upload your own public key if you already have one
-
Download Your Private Key ⚠️ Important
- If you generated a new key pair, you'll see an option to download the private key
- Download and securely store this file - you'll need it for the JupiterOne integration
- The private key file will have a
.pemextension - Click Add Key
-
Save Your Configuration Values
- After adding the API key, Oracle Cloud will display a configuration file preview
- This preview contains the following values you'll need:
- User OCID:
ocid1.user.oc1..xxxxx - Tenancy OCID:
ocid1.tenancy.oc1..xxxxx - Fingerprint: A string like
aa:bb:cc:dd:ee:ff:... - Region: Your region identifier (e.g.,
us-ashburn-1)
- User OCID:
- Copy and save these values - you'll enter them in JupiterOne in the next step
Set Up Required Permissions
JupiterOne needs specific permissions to collect data from your Oracle Cloud account. This section walks you through creating a user group and assigning the necessary permissions via an IAM policy.
Why create a group? Oracle Cloud policies are typically applied to groups rather than individual users. This makes management easier and follows security best practices.
Step 1: Create a User Group
-
Navigate to Identity & Security
- In the OCI Console, open Identity & Security from the main menu
-
Select Domains
- Click Domains in the left sidebar
- Select your default domain (usually named "Default")
-
Create a New Group
- Click the User Management tab
- Scroll to the Groups section
- Click Create Group
-
Configure the Group
- Name: Enter
J1Group(or any name you prefer) - Description: Add a description like "JupiterOne integration access group"
- Users: Add your current user (the one with the API key) to this group
- Click Create
- Name: Enter
Step 2: Create an IAM Policy
Now you'll create a policy that grants the necessary permissions to your group. You can choose between two approaches:
Option A: Simple (Recommended for Most Users)
- Fastest to set up
- Grants broad read and inspect permissions
- Perfect if you don't need fine-grained control
Option B: Granular
- More restrictive permissions
- Follows the principle of least privilege
- Better for organizations with strict security requirements
Option A: Simple Permissions (Recommended)
This approach grants JupiterOne the permissions it needs with just 3 policy statements:
-
Navigate to Policies
- In the OCI Console, go to Identity & Security > Identity > Policies
-
Create New Policy
- Click Create Policy
- Name: Enter a name like
J1-Integration-Policy - Description: Add a description like "Policy for JupiterOne integration access"
- Policy Builder: Select Show manual builder
-
Add Policy Statements
- Copy and paste the following three statements into the policy editor:
Allow group J1Group to inspect all-resources in tenancy
Allow group J1Group to read all-resources in tenancy
Allow group J1Group to use network-security-groups in tenancy
- Save the Policy
- Click Create to save the policy
Important: Replace
J1Groupwith your actual group name if you used something different.
Option B: Granular Permissions (Advanced)
If you prefer more restrictive, fine-grained permissions, use this comprehensive policy set instead:
-
Navigate to Policies
- In the OCI Console, go to Identity & Security > Identity > Policies
-
Create New Policy
- Click Create Policy
- Name: Enter a name like
J1-Integration-Policy-Granular - Description: Add a description like "Granular policy for JupiterOne integration access"
- Policy Builder: Select Show manual builder
-
Add Policy Statements
- Copy and paste all of the following statements into the policy editor:
Allow group J1Group to inspect groups in tenancy
Allow group J1Group to read policies in tenancy
Allow group J1Group to inspect devops-family in tenancy
Allow group J1Group to read fn-function in tenancy
Allow group J1Group to read fn-app in tenancy
Allow group J1Group to read instances in tenancy
Allow group J1Group to inspect dedicated-vm-hosts in tenancy
Allow group J1Group to read nosql-indexes in tenancy
Allow group J1Group to inspect nosql-tables in tenancy
Allow group J1Group to read buckets in tenancy
Allow group J1Group to inspect redis-clusters in tenancy
Allow group J1Group to inspect orm-stacks in tenancy
Allow group J1Group to inspect streams in tenancy
Allow group J1Group to inspect stream-pools in tenancy
Allow group J1Group to inspect keys in tenancy
Allow group J1Group to inspect vaults in tenancy
Allow group J1Group to inspect secrets in tenancy
Allow group J1Group to inspect secret-bundles in tenancy
Allow group J1Group to inspect cloud-guard-problems in tenancy
Allow group J1Group to inspect cloud-guard-detectors in tenancy
Allow group J1Group to inspect cloud-guard-detector-recipes in tenancy
Allow group J1Group to inspect cloud-guard-detector-rule-definitions in tenancy
Allow group J1Group to inspect cloud-exadata-infrastructures in tenancy
Allow group J1Group to inspect cloud-vmclusters in tenancy
Allow group J1Group to read vcns in tenancy
Allow group J1Group to read subnets in tenancy
Allow group J1Group to read vnics in tenancy
Allow group J1Group to inspect load-balancers in tenancy
Allow group J1Group to inspect file-systems in tenancy
Allow group J1Group to inspect mount-targets in tenancy
Allow group J1Group to inspect volumes in tenancy
Allow group J1Group to inspect volume-groups in tenancy
Allow group J1Group to inspect log-groups in tenancy
Allow group J1Group to inspect ons-topics in tenancy
Allow group J1Group to inspect ons-subscriptions in tenancy
Allow group J1Group to inspect analytics-instances in tenancy
Allow group J1Group to inspect integration-instances in tenancy
Allow group J1Group to use network-security-groups in tenancy
Allow group J1Group to read security-lists in tenancy
Allow group J1Group to inspect recovery-service-protected-databases in tenancy
Allow group J1Group to inspect instance-images in tenancy
Allow group J1Group to read authentication-policies in tenancy
Allow group J1Group to read compartments in tenancy
Allow group J1Group to read domains in tenancy
Allow group J1Group to read users in tenancy
Allow group J1Group to inspect vnic-attachments in tenancy
Allow group J1Group to inspect loganalytics-resources-family in tenancy
Allow group J1Group to inspect db-homes in tenancy
- Save the Policy
- Click Create to save the policy
Important: Replace
J1Groupwith your actual group name if you used something different.
Verify Your Setup
Before proceeding, confirm that:
- ✅ Your user is a member of the group you created