Skip to content

Commit 0b21656

Browse files
authored
Update README.md
1 parent b55e011 commit 0b21656

File tree

1 file changed

+2
-2
lines changed
  • cloud-infrastructure/private-cloud-and-edge/compute-cloud-at-customer/hsp/restrict-access-to-oci-console

1 file changed

+2
-2
lines changed

cloud-infrastructure/private-cloud-and-edge/compute-cloud-at-customer/hsp/restrict-access-to-oci-console/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Once the new Sign-On rule is created then it should be added to the Policy as sh
1616

1717
Note!
1818

19-
Even with OCI console access disabled there are still "live" OCI users who will have access to create/delete/modify resources via teh API in the OCI tenancy as well as the C3 as the policies and compartments are common across both. It would be wise to further restrict the capability of these users as per
19+
Even with OCI console access disabled there are still "live" OCI users who will have access to create/delete/modify resources via the API in the OCI tenancy as well as the C3 as the policies and compartments are common across both. It would be wise to further restrict the capability of these users as per
2020
<https://docs.oracle.com/en-us/iaas/Content/Identity/users/edit-users-capabilities.htm>
2121

2222
Ideally a policy should be implemented that restricts permissions **only** to the C3, see [this](../iam-policies-for-isolation/README.md) note.
@@ -27,4 +27,4 @@ Copyright (c) 2025 Oracle and/or its affiliates.
2727

2828
Licensed under the Universal Permissive License (UPL), Version 1.0.
2929

30-
See [LICENSE](https://github.com/oracle-devrel/technology-engineering/blob/main/LICENSE.txt) for more details.
30+
See [LICENSE](https://github.com/oracle-devrel/technology-engineering/blob/main/LICENSE.txt) for more details.

0 commit comments

Comments
 (0)