IAM (Infrastructure Identity and Access Management), as the name suggests it is used to control an access to cloud resources. Which real user should have access to which compartment , network or tenancy and which type of access they should have is decided by configuring IAM. There are different components which helps you configure IAM […]