Overview
This guide outlines how to integrate Oracle Cloud Identity with Grip Security, enabling Grip Security to assess key security configurations for access control, data loss prevention, and other security requirements within your Oracle Cloud environment.
To connect the integration, you will need to provide Grip with the Oracle Cloud Identity Client ID, Client Secret, and Domain URL
Prerequisites
You need to have “Oracle Cloud Identity” admin access
Add the application to Oracle Cloud
From your account, click on the hamburger menu (1),» Identity & Security (2) » Domains (3)

Select the domain with which you want to associate the application (4)

Go to the Integrated application tab (5), Add application (6) » select Confidential Application (7).

In the Add Confidential Application page, name your app (8) and click Submit.

In the new app created, configure the OAuth grants (scopes)
Go to the OAuth configuration tab (9) and click on Edit OAuth configuration (10)

Under Client configuration, select the Configure the application as a client now option (11)
Scroll down to the Authorization section and check the Client credentials box.

Scroll further down and enable the Add app roles toggle (12)
Click on Add apps roles (13).

Check the Identity Domain Administrator box (14), and then click Add.

Once the App role is added, click on Submit.

After returning to the app page, go to Actions (15) and activate the app.

Get the Client ID & Client secret.
Navigate to the OAuth configuration tab, scroll down to the General information section (16), and copy the Client ID and Client secret to your clipboard. You will need them when connecting to Grip.

Navigate back to Domains, and select the domain on which the app was created.
Copy the Domain URL (17) to your clipboard.

Connect Oracle Cloud Identity to Grip SSPM
From the Grip platform, go to Posture Management>> Click on “Add Tenant” (1) >> “Oracle Cloud Identity” (2)
Enter the Client ID, Client Secret, and Domain URL (3) that you copied in the previous steps, then click Add Tenant.

Once connected, the Tenant will be added to the “Connected Tenants” list. There, you can view and filter your policy statuses, assess your security posture, and begin addressing issues.
