Skip to main content

WIV OCI Integration: Cloud Shell Setup Guide

This document outlines the steps to set up Wiv’s read-only integration with your Oracle Cloud Infrastructure (OCI) tenancy using a Terraform script executed via OCI Cloud Shell. The Terraform configuration creates the following dedicated resources in your OCI tenancy for the Wiv platform:
  1. Service User: wiv-service
    • Dedicated API-only user account.
    • No console access.
    • Contact email is stored for this user.
  2. Service Group: WivServiceGroup
    • Contains the wiv-service user.
    • Assigned the WivServicePolicy.
  3. Policy: WivServicePolicy
    • Grants read-only permissions to WivServiceGroup (see permissions list below).
  4. API Key
    • RSA key pair for secure API authentication.
    • Public key is stored in OCI.
    • Private key is exported to a credentials file.
  5. Tag Namespace: WivIntegration
    • Used for tracking and identifying the integration resources.

Permissions granted to Wiv (all read-only)

The WivServicePolicy grants the WivServiceGroup read-only access across key areas:
Resource FamilyVerb/AccessPurpose
Cost & Billingread usage-reports, read usage-budgets, inspect usage-reportsCost optimization and viewing budget/usage data.
Computeinspect instance-family, inspect instance-imagesInfrastructure inventory (instances, configurations, pools, images).
Storageinspect volume-family, inspect object-familyStorage resources (volumes, boot volumes, backups, Object Storage buckets).
Databaseinspect database-family, inspect autonomous-database-familyDatabase resources (DB Systems, DB Homes, Autonomous Databases).
Networkinspect virtual-network-familyNetwork topology (VCNs, subnets, load balancers).
Monitoringread metricsPerformance data metrics.
Governanceinspect compartments, inspect tenanciesOrganization structure (compartments, tenancy information).

Wiv security assurance: access limitations

Wiv’s access is strictly limited to ensure the security of your environment and data.

What Wiv cannot do

  • No Mutating Operations: Wiv is prohibited from performing any write, modify, or delete operations on your resources. All permissions are strictly for inspection or reading.
  • No Sensitive Data Access: Wiv cannot read the contents of your storage buckets, database data, instance internals, or vault secrets. Access is limited to resource metadata, not the data itself.

Security controls and notes

  • Zero Write Permissions: Wiv cannot create, modify, or delete any resources.
  • Auditability: Every API call made by Wiv is logged in Governance → Audit. These logs can be filtered by Request Principal = wiv-service.
  • Revocation: Access can be immediately and easily revoked by deleting the wiv-service user.
  • Access Method: Access is exclusively via API keys; Wiv has no console access or password.

OCI Cloud Shell setup steps

1

Open OCI

  1. Log into your OCI Console: https://cloud.oracle.com
  2. Click the Cloud Shell icon (terminal icon) in the top-right corner.
  3. Wait for the Cloud Shell to initialize (approximately 30 seconds).
2

Download setup files

Run these commands in the Cloud Shell:
wget https://wiv-onboarding.s3.us-east-1.amazonaws.com/oci/wiv-oci-setup.zip
unzip wiv-oci-setup.zip
3

Run setup script

Run the setup script. It will automatically detect your Tenancy OCID and Region.
chmod +x setup.sh
./setup.sh
The script will prompt you for:
  • Your Company Name: Enter your company name.
  • Contact Email: Enter your email (this will be the email for the wiv-service user).
  • Environment: Press Enter for prod.
Confirm and deploy when prompted.
4

Download credentials file

Once deployment is complete:
  1. Click the Cloud Shell menu (⋮) in the top-right.
  2. Select Download.
  3. Enter the filename: wiv-credentials-[YourCompany]-prod.json
  4. The file will download to your local computer.
5

Upload the JSON file to Wiv OCI integration

Check that the resources were created successfully:
  • Identity → Users: Find wiv-service
  • Identity → Groups: Find WivServiceGroup
  • Identity → Policies: Find WivServicePolicy

Revoke access (if needed)

Access is immediately revoked upon user deletion.
cd wiv-oci-setup/
terraform destroy

Option 2: Via OCI Console

  1. Navigate to Identity → Users.
  2. Select wiv-service.
  3. Click Delete.