oracle-idcs-org-provisioning by acedergren/agentic-tools
npx skills add https://github.com/acedergren/agentic-tools --skill oracle-idcs-org-provisioning当登录成功但租户、角色或组织成员资格仍需在 Oracle 中实际生效时,使用此技能。
mapProfileToUser、session.create.before 或 session.create.after 中admin 或 userorg_members 必须被幂等地写入before 钩子中控制会话创建。广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
after 钩子中解析组织并更新插入 org_members。| 情况 | 决策 |
|---|---|
没有 groups 声明 | 在归咎于配置问题之前,检查作用域和 IDCS 应用配置 |
| 没有显式的数据库允许群组 | 访问控制门保持开放(允许访问) |
| 找到现有成员资格 | 在租户/默认回退之前重用该成员资格 |
| 找到租户映射匹配 | 使用映射的组织 |
| 没有租户匹配但存在默认组织 | 使用默认组织 |
| 组织尚无管理员 | 首次提升第一个被配置的用户为管理员 |
| 数据库查找或写入失败 | 登录保持开放,记录日志,并在保持优先级规则的同时避免锁定 |
使用以 sub 为键的短期缓存:
stashsession.create.before 期间 peeksession.create.after 期间 consume这是两个不同的决策:
数据库配置的允许群组应控制访问。环境默认值应仅影响角色映射。
使用此顺序:
MERGE INTO 写入成员资格不要为 org_members 执行 SELECT 然后 INSERT。使用一个原子的 MERGE INTO,以便重试和并发登录保持安全。
全新安装可能没有管理员群组配置。如果组织尚无管理员,则首次将第一个被配置的用户提升为管理员,以便系统可以完成设置。
org_members 执行 SELECT 然后 INSERT。before 中消费缓存的声明并期望它们在 after 中仍然存在。node scripts/preview-group-role-mapping.js "PortalAdmins,Developers"
node scripts/verify-org-resolution.js --tenant sandbox --map "sandbox:org-123,prod:org-999" --default-org org-000
groups 声明通常意味着错误的作用域或 IDCS 应用设置。sub、租户和群组。before 钩子的允许检查逻辑。after 钩子的组织解析和成员资格更新插入。org_members 使用 MERGE INTO。$ARGUMENTS:可选的配置焦点
/oracle-idcs-org-provisioning tenant-map/oracle-idcs-org-provisioning first-admin每周安装次数
1
代码仓库
GitHub 星标数
6
首次出现
1 天前
安全审计
安装于
amp1
cline1
opencode1
cursor1
kimi-cli1
codex1
Use this skill when login succeeds but tenant, role, or organization membership still has to become real in Oracle.
mapProfileToUser, session.create.before, or session.create.afteradmin or userorg_members must be written idempotentlybefore hooks when explicit allow-rules exist.org_members in after hooks.| Situation | Decision |
|---|---|
No groups claim | check scopes and IDCS app config before blaming provisioning |
| No explicit DB allow-groups | fail open for access gate |
| Existing membership found | reuse it before tenant/default fallbacks |
| Tenant map match found | use mapped org |
| No tenant match but default org exists | use default org |
| Org has no admin yet | promote first provisioned user once |
| DB lookup or write fails | fail open for login, log it, and avoid lockout while preserving precedence rules |
Use a short-lived cache keyed by sub:
stash during profile mappingpeek during session.create.beforeconsume during session.create.afterThese are different decisions:
DB-configured allow-groups should control access. Env defaults should influence role mapping only.
Use this order:
MERGE INTO for membership writesDo not do SELECT then INSERT for org_members. Use one atomic MERGE INTO so retries and concurrent logins remain safe.
Fresh installs can have zero admin-group config. If the org has no admin yet, promote the first provisioned user to admin once so the system can finish setup.
SELECT then INSERT into org_members for this flow.before and expect them to exist in after.node scripts/preview-group-role-mapping.js "PortalAdmins,Developers"
node scripts/verify-org-resolution.js --tenant sandbox --map "sandbox:org-123,prod:org-999" --default-org org-000
groups claim usually means wrong scope or IDCS app setup.sub, tenant, and groups in profile mapping.before hook allow-check logic.after hook org resolution and membership upsert.MERGE INTO for org_members.$ARGUMENTS: Optional provisioning focus
/oracle-idcs-org-provisioning tenant-map/oracle-idcs-org-provisioning first-adminWeekly Installs
1
Repository
GitHub Stars
6
First Seen
1 day ago
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
amp1
cline1
opencode1
cursor1
kimi-cli1
codex1
Azure Data Explorer (Kusto) 查询技能:KQL数据分析、日志遥测与时间序列处理
114,200 周安装