Integrate Oracle Cloud
Overview
This guide covers setting up an IAM Auditor Group, assigning read-only access and security audit policies, generating an API key, and configuring the connector using your tenancy credentials.
Prerequisites
- Administrator access to the target OCI tenancy.
- An active OCI Domain.
Steps
1. Create the Auditor Group
- Log into your Oracle Cloud Infrastructure Account.
- Navigate to Identity & Security → Domains and click on your active domain (usually named
Default). - Under the User Management menu, click Groups, then click Create group.
- Enter
deeptraq@security-auditorsas the name and add a description (e.g., "Group for DeepTraq Security Scanner auditing tools"). - Click Create.
2. Add User to the Auditor Group
- Click on the newly created
deeptraq@security-auditorsgroup. - Click Assign users to group.
- Search for your dedicated DeepTraQ user account, select it, and click Add to assign the user to the group.
3. Create the Audit Policy
- Navigate to Identity & Security → Policies (located in the main sidebar, outside of Domains).
- Click Create Policy.
- Name the policy
deeptraq@audit-policy-v1.0and ensure the Compartment is set toroot(your main tenancy). - Click Show Manual Editor and paste the following permission into the Policy Builder:
Allow group 'Default'/'deeptraq@security-auditors' to read all-resources in tenancy(Note: If your domain name is different from 'Default', replace 'Default' with your actual domain name in the policy statement.) - Click Create to save the policy.
4. Generate API Key for Authentication
- Navigate back to Identity & Security → Domains → your domain → Users.
- Select the user you assigned to the
deeptraq@security-auditorsgroup. - Navigate to the API Keys section for this user and click Add API Key.
- Select Generate API Key Pair and click Download Private Key. Save this
.pemfile securely. - Click Add.
- A "Configuration File Preview" dialog will appear. Copy the entire configuration snippet displayed (this contains your User OCID, Fingerprint, Tenancy OCID, and Region).
5. Create the Connector in DeepTraQ
- In the DeepTraQ Integrations tab, select Oracle Cloud Infrastructure (OCI) from the dropdown.
- Enter the desired Connector Name, Description, and Tags.
- In the Scan Credentials section, locate the Config textbox. Paste the Configuration File Preview snippet you copied from OCI.
- Important: Manually delete the last line of the pasted snippet that contains the
key_file=<not_used>path. - Locate the Private Key textbox. Open your downloaded
.pemfile in a text editor, copy the entire content (including the-----BEGIN PRIVATE KEY-----and-----END PRIVATE KEY-----lines), and paste it here. Remove any extra OCI API key text if present. - Configure your Scan Settings to schedule a one-time scan or set up periodic scanning (Daily, Weekly, Bi-Weekly, or Monthly).
- Customize your Scan Options, such as saving all scan artifacts, logging information-level vulnerabilities, or selecting specific OCI services to scan.
- Click Add to complete your Oracle connection.
Field Reference
| Field | Description | Example |
|---|---|---|
| Config | The configuration snippet copied from the OCI API Key creation screen, with the key_file line removed. | [DEFAULT] |
user=ocid1.user.oc1...
fingerprint=xx:xx...
tenancy=ocid1.tenancy...
region=us-ashburn-1 |
| Private Key | The exact string contents of the downloaded .pem file, including the begin/end header lines. | -----BEGIN PRIVATE KEY-----
MIIEvgI...
-----END PRIVATE KEY----- |