This page explains how to set up an Oracle Cloud Infrastructure (OCI) account so that ACTIVATE can manage your Oracle Cloud infrastructure, clusters, and usage data.
Feature Availability
Oracle Cloud support is currently feature-flagged and may not be available in all ACTIVATE deployments. Contact your ACTIVATE administrator to enable Oracle Cloud support.
Persona
The steps included on this page should be completed by a cloud engineer in your organization.
We recommend creating a dedicated compartment for the ACTIVATE platform, which will allow you to keep your existing resources separate from the platform and make it easier to manage usage data. You can create a compartment in the Oracle Cloud Console under Identity > Compartments.
ACTIVATE authenticates with Oracle Cloud using API key-based authentication. You will need to provide the following information when adding your Oracle Cloud account in ACTIVATE.
| Field | Description | Format |
|---|---|---|
| Tenancy OCID | The OCID of your Oracle Cloud tenancy. Found in the Oracle Cloud Console under Administration > Tenancy Details. | ocid1.tenancy.oc1...<unique_ID> |
| Compartment OCID | The OCID of the compartment to use for resources. Found under Identity > Compartments. | ocid1.compartment.oc1...<unique_ID> |
Oracle Cloud uses API signing keys for authentication. To set up API key credentials:
For more details, see the Oracle Cloud documentation on API signing keys.
You will need the following credentials:
| Field | Description | Format |
|---|---|---|
| User OCID | The OCID of the user. Found under Identity > Users. | ocid1.user.oc1...<unique_ID> |
| API Key Fingerprint | The fingerprint of the API signing key. Generated when you add an API key to your user. | aa:bb:cc:dd:ee:ff:00:11:22:33:44:55:66:77:88:99 |
| API Private Key (PEM) | The private key in PEM format used for API authentication. This is the private key you downloaded when creating the API key pair. | PEM-encoded RSA private key |
Ensure the user has sufficient permissions to manage resources in the target compartment. At a minimum, you can assign the user to a group with the following policy:
Allow group <group_name> to manage all-resources in compartment <compartment_name>
For more restrictive access, create policies that grant permissions for compute, networking, and storage resources. See the Oracle Cloud policy reference for details.