Object Storage Bucket Creation and OIC Connection
Object Storage Bucket Creation and OIC Connection
Abstract
This blog presents a step-by-step approach to
establishing a secure and functional integration between Oracle Integration
Cloud (OIC) and Oracle Cloud Infrastructure (OCI) Object Storage. It outlines
the prerequisites and detailed configuration steps required to enable OIC to
interact with Object Storage for various integration use cases, such as
file-based data exchange, archiving, and payload management.
The process includes the creation of an Object Storage
bucket, setting up a service account and IAM group, defining access policies,
and finally, configuring the Object Storage connection within OIC. By following
this guide, users can ensure proper access control, security compliance, and
operational efficiency when handling files through Oracle's integration
platform.
This blog is particularly useful for cloud integration
practitioners and enterprise IT teams seeking to enable OIC-to-Object Storage
connectivity in a controlled and scalable manner.
Introduction
This blog provides a comprehensive guide to
integrating Oracle Integration Cloud (OIC) with Oracle Cloud Infrastructure
(OCI) Object Storage. It outlines the detailed steps required to set up and
configure the necessary cloud components to enable secure and seamless
connectivity between OIC and Object Storage.
The blog is intended for integration architects,
developers, and cloud administrators who are responsible for designing and
implementing integration solutions using Oracle's cloud services. Whether the
goal is to store files, retrieve data, or enable file-based integrations, this
guide ensures that all foundational elements are correctly configured.
Key setup steps covered in this blog include:
- Creating
an Object Storage bucket to serve as the data repository.
- Creating
a Service Account with appropriate privileges for OIC interactions.
- Defining
a Group and assigning the service account to it.
- Adding
IAM policies to grant the necessary access rights to Object Storage.
- Configuring
the Object Storage connection in OIC using service principal
authentication.
By following this step-by-step guide, organizations can ensure a secure, scalable, and efficient setup for leveraging Object Storage within their OIC integrations.
Object Storage Bucket Creation
Login to OCI Console.
Navigate to Storage -> Buckets under Object Storage &
Archive Storage
Select the Compartment that you want to create a bucket in.
Click on the Create Bucket button and provide the details as
shown below.
Once all the details are completed
click on the Create button.
The bucket will be created.
Create Service Account User for Object Storage
Navigate to Identity & Security -> Domains under
Identity
Select the compartment.
Then click on the users count of the domain of your
interest.
Click on Create.
Provide the details of the service account user to be
created.
Click on Create button and the user will be created.
Create Group and assign the service account user
created
Now Navigate to Groups by Clicking on the count of groups.
Click on the Create Group button.
Click on Create after filling in the Name and Description.
Goto Users tab in the group and click on Assign user to
group.
Search for the service account user you need to add to the group and Click on Add button.
Now select the user for which you need to create the API Key
Click on Add API key.
Download the Private Key and Public Key and click Add
button.
You will see the window below, click close.
You will now see the fingerprint for the API Key generated.
Make a note of this, it will be used in the OIC Connection.
Convert the PGP Private Key
On your local machine where the key is downloaded, open
command prompt and navigate to the folder where the key is present.
Run the below command to convert the public key to RSA.
ssh-keygen -p -f
svc-dev-oic-objs-hcm-2025-07-14T12_58_18.669Z.pem -N "Welcome123" -t
rsa -m pem
This is done. This key will be used in OIC Connection.
Add the Policy for Object Storage Bucket
Navigate to Identity & Security -> Select Policies
under Identity.
Select the compartment where the bucket is created.
Click Create Policy button to add the Policy.
Provide the Name, Description.
In Policy Builder section click on Show manual editor.
Add the below policy statements.
Allow group fa-ibavqqwey-dev1-blq7t/oci_ocs_streaming_admin
to manage buckets in compartment DEV-Storage
Allow group fa-ibavqqwey-dev1-blq7t/oci_ocs_streaming_admin
to manage objects in compartment DEV-Storage
Click Create
Object Storage Bucket OIC Connection
Login to OIC and Navigate to Connections under Design.
Click Create and search for REST Adapter.
Provide the Name, Description and Role (Trigger and Invoke).
Click on Create.
Now provide the details for Properties and Security
sections.
You can get the Tenancy OCID from OCI.
Click on the Tenancy name, you will see the Tenancy information and copy OCID.
Click on the User name, you will see the User information
and copy OCID.
Now upload the pgp private key which we converted to RSA
format in earlier step.
Enter the Fingerprint and under optional security enter Pass
Phrase.
Click on Test and then Save.
Conclusion
Establishing a reliable and secure connection between Oracle
Integration Cloud (OIC) and Oracle Cloud Infrastructure (OCI) Object Storage is
a foundational step for enabling file-based integrations and data exchange
scenarios in the cloud. This blog has detailed the end-to-end process,
including the creation of the Object Storage bucket, setting up a service
account and IAM group, assigning the necessary policies, and configuring the
OIC connection.
By following these steps, organizations can ensure that
their integration flows can safely store, retrieve, and manage files within OCI
Object Storage while adhering to best practices in identity and access
management. This setup not only supports current integration needs but also
lays the groundwork for scalable and secure expansion of cloud-native workflows
in the future.
Implementing this integration framework empowers enterprises
to streamline operations, maintain compliance, and fully leverage the
capabilities of Oracle’s cloud ecosystem.
Comments
Post a Comment