IAM policy examples for Amazon QuickSight
This section provides examples of IAM policies that you can use with Amazon QuickSight.
IAM identity-based policies for Amazon QuickSight
This section shows examples of identity-based policies to use with Amazon QuickSight.
Topics
IAM identity-based policies for QuickSight IAM console administration
IAM identity-based policies for Amazon QuickSight: dashboards
IAM identity-based policies for Amazon QuickSight: namespaces
IAM identity-based policies for Amazon QuickSight: custom permissions
IAM identity-based policies for Amazon QuickSight: customizing email report templates
IAM identity-based policies for Amazon QuickSight: creating users
IAM identity-based policies for Amazon QuickSight: creating and managing groups
IAM identity-based policies for Amazon QuickSight: All access for Standard edition
IAM identity-based policies for Amazon QuickSight: active directory groups
IAM identity-based policies for Amazon QuickSight: using the admin asset management console
IAM identity-based policies for Amazon QuickSight: using the admin key management console
AWS resources Amazon QuickSight: scoping policies in Enterprise edition
IAM identity-based policies for QuickSight IAM console administration
The following example shows the IAM permissions needed for QuickSight IAM console administration actions.
IAM identity-based policies for Amazon QuickSight: dashboards
The following example shows an IAM policy that allows dashboard sharing and embedding for specific dashboards.
IAM identity-based policies for Amazon QuickSight: namespaces
The following examples show IAM policies that allow a QuickSight administrator to create or delete namespaces.
Creating namespaces
Deleting namespaces
IAM identity-based policies for Amazon QuickSight: custom permissions
The following example shows an IAM policy that allows a QuickSight administrator or a developer to manage custom permissions.
The following example shows another way to grant the same permissions as shown in the previous example.
IAM identity-based policies for Amazon QuickSight: customizing email report templates
The following example shows a policy that allows viewing, updating, and creating email report templates in QuickSight, as well as obtaining verification attributes for an Amazon Simple Email Service identity. This policy allows a QuickSight administrator to create and update custom email report templates, and to confirm that any custom email address they want to send email reports from is a verified identity in SES.
IAM identity-based policies for Amazon QuickSight: create an Enterprise account with QuickSight managed users
The following example shows a policy that allows QuickSight admins to create an Enterprise edition QuickSight account with QuickSight managed users.
IAM identity-based policies for Amazon QuickSight: creating users
The following example shows a policy that allows creating Amazon QuickSight users only. For
quicksight:CreateReader
, quicksight:CreateUser
, and
quicksight:CreateAdmin
, you can limit the permissions to
"Resource":
"arn:aws:quicksight::
.
For all other permissions described in this guide, use <YOUR_AWS_ACCOUNTID>
:user/${aws:userid}""Resource":
"*"
. The resource you specify limits the scope of the permissions to the
specified resource.
IAM identity-based policies for Amazon QuickSight: creating and managing groups
The following example shows a policy that allows QuickSight administrators and developers to create and manage groups.
IAM identity-based policies for Amazon QuickSight: All access for Standard edition
The following example for Amazon QuickSight Standard edition shows a policy that allows subscribing and creating authors and readers. This example explicitly denies permission to unsubscribe from Amazon QuickSight.
IAM identity-based policies for Amazon QuickSight: All access for Enterprise edition with IAM Identity Center (Pro roles)
The following example for Amazon QuickSight Enterprise edition shows a policy that allows a QuickSight user to subscribe to QuickSight, create users, and manage Active Directory in a QuickSight account that is integrated with IAM Identity Center.
This policy also allows users to subscribe to QuickSight Pro roles that grant access to Amazon Q in QuickSight Generative BI capabilities. For more information about Pro roles in Amazon QuickSight, see Get started with Generative BI.
This example explicitly denies permission to unsubscribe from Amazon QuickSight.
{ "Statement": [ { "Sid": "Statement1", "Effect": "Allow", "Action": [ "quicksight:*", "iam:AttachRolePolicy", "iam:DetachRolePolicy", "iam:ListAttachedRolePolicies", "iam:GetPolicy", "iam:CreatePolicyVersion", "iam:DeletePolicyVersion", "iam:GetPolicyVersion", "iam:ListPolicyVersions", "iam:DeleteRole", "iam:CreateRole", "iam:GetRole", "iam:ListRoles", "iam:CreatePolicy", "iam:ListEntitiesForPolicy", "iam:listPolicies", "iam:CreateServiceLinkedRole", "s3:ListAllMyBuckets", "athena:ListDataCatalogs", "athena:GetDataCatalog", "sso:DescribeApplication", "sso:DescribeInstance", "sso:CreateApplication", "sso:PutApplicationAuthenticationMethod", "sso:PutApplicationGrant", "sso:DeleteApplication", "sso:SearchGroups", "sso:GetProfile", "sso:CreateApplicationAssignment", "sso:DeleteApplicationAssignment", "sso:ListInstances", "sso:DescribeRegisteredRegions", "organizations:DescribeOrganization", "user-subscriptions:CreateClaim", "user-subscriptions:UpdateClaim", "sso-directory:DescribeUser", "sso:ListApplicationAssignments", "sso-directory:DescribeGroup", "organizations:ListAWSServiceAccessForOrganization", "identitystore:DescribeUser", "identitystore:DescribeGroup" ], "Resource": [ "*" ] } ] }
IAM identity-based policies for Amazon QuickSight: All access for Enterprise edition with IAM Identity Center
The following example for Amazon QuickSight Enterprise edition shows a policy that allows subscribing, creating users, and managing Active Directory in a QuickSight account that is integrated with IAM Identity Center.
This policy does not grant permissions to create Pro roles in QuickSight. To create a policy that grants permission to subscribe to Pro roles in QuickSight, see IAM identity-based policies for Amazon QuickSight: All access for Enterprise edition with IAM Identity Center (Pro roles).
This example explicitly denies permission to unsubscribe from Amazon QuickSight.
{ "Statement": [ { "Sid": "Statement1", "Effect": "Allow", "Action": [ "quicksight:*", "iam:AttachRolePolicy", "iam:DetachRolePolicy", "iam:ListAttachedRolePolicies", "iam:GetPolicy", "iam:CreatePolicyVersion", "iam:DeletePolicyVersion", "iam:GetPolicyVersion", "iam:ListPolicyVersions", "iam:DeleteRole", "iam:CreateRole", "iam:GetRole", "iam:ListRoles", "iam:CreatePolicy", "iam:ListEntitiesForPolicy", "iam:listPolicies", "s3:ListAllMyBuckets", "athena:ListDataCatalogs", "athena:GetDataCatalog", "sso:DescribeApplication", "sso:DescribeInstance", "sso:CreateApplication", "sso:PutApplicationAuthenticationMethod", "sso:PutApplicationGrant", "sso:DeleteApplication", "sso:SearchGroups", "sso:GetProfile", "sso:CreateApplicationAssignment", "sso:DeleteApplicationAssignment", "sso:ListInstances", "sso:DescribeRegisteredRegions", "organizations:DescribeOrganization" ], "Resource": [ "*" ] } ] }
IAM identity-based policies for Amazon QuickSight: all access for Enterprise edition with Active Directory
The following example for Amazon QuickSight Enterprise edition shows a policy that allows subscribing, creating users, and managing Active Directory in a QuickSight account that uses Active Directory for identity management. This example explicitly denies permission to unsubscribe from Amazon QuickSight.
IAM identity-based policies for Amazon QuickSight: active directory groups
The following example shows an IAM policy that allows Active Directory group management for an Amazon QuickSight Enterprise edition account.
IAM identity-based policies for Amazon QuickSight: using the admin asset management console
The following example shows an IAM policy that allows access to the admin asset management console.
IAM identity-based policies for Amazon QuickSight: using the admin key management console
The following example shows an IAM policy that allows access to the admin key management console.
The "quicksight:ListKMSKeysForUser"
and "kms:ListAliases"
permissions are required to access customer managed keys from the QuickSight console. "quicksight:ListKMSKeysForUser"
and "kms:ListAliases"
are not required to use the QuickSight key management APIs.
To specify which keys you want a user to be able to access, add the ARNs of the keys that you want the user to access to the UpdateKeyRegistration
condition with the quicksight:KmsKeyArns
condition key. Users can only access the keys specified in UpdateKeyRegistration
. For more information about supported condition keys for QuickSight, see Condition keys for Amazon QuickSight.
The example below grants Describe
permissions for all CMKs that are registered to a QuickSight account and Update
permissons to specific CMKs that are registered to the QuickSight account.
AWS resources Amazon QuickSight: scoping policies in Enterprise edition
The following example for Amazon QuickSight Enterprise edition shows a policy that allows setting default access to AWS resources and scoping policies for permissions to AWS resources.