OCI

Modified on Thu, 26 Feb at 12:22 PM

WIV OCI Integration: Cloud Shell Setup Guide



This document outlines the steps to set up WIV's read-only integration with your Oracle Cloud Infrastructure (OCI) tenancy using a Terraform script executed via OCI Cloud Shell.


The Terraform configuration creates the following dedicated resources in your OCI tenancy for the WIV platform:

  1. Service User: wiv-service

    • Dedicated API-only user account.

    • No console access.

    • Contact email is stored for this user.

  2. Service Group: WivServiceGroup

    • Contains the wiv-service user.

    • Assigned the WivServicePolicy.

  3. Policy: WivServicePolicy

    • Grants READ-ONLY permissions to WivServiceGroup. (See permissions list below).

  4. API Key:

    • RSA key pair for secure API authentication.

    • Public key is stored in OCI.

    • Private key is exported to a credentials file.

  5. Tag Namespace: WivIntegration

    • Used for tracking and identifying the integration resources.

      Permissions Granted to WIV (All Read-Only)


The WivServicePolicy grants the WivServiceGroup READ-ONLY access across key areas:

Resource Family

Verb/Access

Purpose

COST & BILLING

read usage-reportsread usage-budgetsinspect usage-reports

For cost optimization and viewing budget/usage data.

COMPUTE

inspect instance-familyinspect instance-images

Infrastructure inventory (instances, configurations, pools, images).

STORAGE

inspect volume-familyinspect object-family

Storage resources (volumes, boot volumes, backups, Object Storage buckets).

DATABASE

inspect database-familyinspect autonomous-database-family

Database resources (DB Systems, DB Homes, Autonomous Databases).

NETWORK

inspect virtual-network-family

Network topology (VCNs, subnets, load balancers).

MONITORING

read metrics

Performance data metrics.

GOVERNANCE

inspect compartmentsinspect tenancies

Organization structure (compartments, tenancy information).

WIV Security Assurance: Access Limitations


WIV's access is strictly limited to ensure the security of your environment and data.What WIV Cannot Do

  • No Mutating Operations: WIV is prohibited from performing any write, modify, or delete operations on your resources. All permissions are strictly for inspection or reading.

  • No Sensitive Data Access: WIV cannot read the contents of your storage buckets, database data, instance internals, or vault secrets. Access is limited to resource metadata, not the data itself.

Security Controls and Notes

  • Zero Write Permissions: WIV cannot create, modify, or delete any resources.

  • Auditability: Every API call made by WIV is logged in Governance → Audit. These logs can be filtered by Request Principal = wiv-service.

  • Revocation: Access can be immediately and easily revoked by deleting the wiv-service user.

  • Access Method: Access is exclusively via API keys; WIV has no console access or password.

OCI Cloud Shell Setup Steps

STEP 1: Open OCI

  1. Log into your OCI Console: [https://cloud.oracle.com](https://cloud.oracle.com)

  2. Click the Cloud Shell icon (terminal icon) in the top-right corner.

  3. Wait for the Cloud Shell to initialize (approximately 30 seconds).

STEP 2: Download Setup Files



Run these commands in the Cloud Shell:

wget https://wiv-onboarding.s3.us-east-1.amazonaws.com/oci/wiv-oci-setup.zip

unzip wiv-oci-setup.zip

STEP 3: Run Setup Script


Run the setup script. It will automatically detect your Tenancy OCID and Region.

chmod +x setup.sh

./setup.sh

The script will prompt you for:

  • Your Company Name: [Enter your company name]

  • Contact Email: [Enter your email] (This will be the email for the wiv-service user)

  • Environment: [Press Enter for 'prod']

Confirm and deploy when prompted.STEP 4: Download Credentials File


Once deployment is complete:

  1. Click the Cloud Shell menu (⋮) in the top-right.

  2. Select "Download".

  3. Enter the filename: wiv-credentials-[YourCompany]-prod.json

  4. The file will download to your local computer.

STEP 5: upload the json file to wiv OCI integration  



Check that the resources were created successfully:

  • Identity → Users: Find wiv-service

  • Identity → Groups: Find WivServiceGroup

  • Identity → Policies: Find WivServicePolicy

Revoke Access (If Needed)


Access is IMMEDIATELY revoked upon user deletion.


Option 1: Via Terraform (Recommended)

cd wiv-oci-setup/

terraform destroy

Option 2: Via OCI Console

  1. Navigate to Identity → Users.

  2. Select wiv-service.

  3. Click Delete.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article