Setting up permissions to use AWS IQ - AWS IQ

Setting up permissions to use AWS IQ

To access AWS IQ, you must have the necessary permissions. Navigate to the AWS Management Console to view or set up permissions. To leverage all resources on AWS IQ, add the AWSIQFullAccess managed policy. For more granular controls, add specific permissions to your IAM identity.

Note

As a security best practice, we recommend periodically changing your user access keys. For more information, see Managing access keys in IAM.

This topic describes how to create an IAM user, attach policies to an existing user, and set up granular permissions in the AWS Management Console.

Creating a user with AWSIQFullAccess permissions

You, or your AWS account administrator, can create a new user with the AWSIQFullAccess managed policy on your AWS account. You can also attach this managed policy to an existing user. For more information, see AWSIQFullAccess in the AWS Managed Policy Reference Guide.

To create an IAM user with managed policies
  1. Sign in to the AWS Management Console.

  2. Choose Users and then choose Add users.

  3. Enter a User name, and then choose AWS Management Console access. Accept the default information or change to custom values.

  4. Choose Next: Permissions and then choose Attach existing policies directly.

  5. Choose AWSIQFullAccess from the list of policy names, and then choose Next: Tags.

    1. (Optional) Add tags and then choose Next: Review.

  6. Choose Create user.

  7. Choose Show to display the password, and then copy your password to a secure location. You can also choose Send email to send the login instructions within an email message.

Attaching managed policies to an existing user

If you already have an IAM user, you can attach the AWSIQFullAccess managed policy using the following procedure.

To attach managed policies to an existing IAM user
  1. Sign in to the IAM console.

  2. Choose Users.

  3. Choose the user name to see the summary page for the user.

  4. Choose Add permissions.

  5. Choose Attach existing policies directly.

  6. Choose AWSIQFullAccess from the list of policy names.

    If you don't see the policy names on the first page, filter the policies or search for the names using the console.

  7. Choose Next: Review.

  8. Choose Add permissions.

For more information, see Adding and removing identity permissions.

Granular IAM permissions

As a user with administrative access, you can create one or more users in your AWS account. To configure your users with chosen levels of access on AWS IQ, you can deny specific permissions. First, add the AWSIQFullAccess managed policy. Then, you can add inline policies to deny specific permissions. For more information, see Actions, resource, and condition keys for AWS IQ.

The following are examples of how to use granular permissions in AWS IQ.

To use granular permissions in AWS IQ
  1. Sign in to the IAM console.

  2. To restrict a user from requesting access to a customer’s AWS account, create a deny policy on the CreatePermissionRequest, which is used to grant permission for creating permission requests.

    { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Deny", "Action": "iq-permission:CreatePermissionRequest", "Resource": "*" } ] }
  3. To restrict a user from requesting payments and proposals, create a deny policy for the following permissions:

    • CreatePaymentRequest – grants permission to create a payment request.

    • CreateMilestoneProposal – grants permission to create a milestone proposal.

    • CreateUpfrontProposal – grants permission to create an upfront proposal.

    • CreateScheduledProposal – grants permission to create a scheduled billing proposal.

      { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Deny", "Action": [ "iq:CreateScheduledProposal", "iq:CreatePaymentRequest", "iq:CreateMilestoneProposal", "iq:CreateUpfrontProposal" ], "Resource": "*" } ] }
  4. To restrict a user from sending chat messages, create a deny policy on all resources for the following permissions:

    • SendIndividualChatMessage – grants permission to chat messages as an individual.

    • SendCompanyChatMessage – grants permission to send chat messages as a company.

    { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Deny", "Action": [ "iq:SendIndividualChatMessage", "iq:SendCompanyChatMessage" ], "Resource": "*" } ] }
To attach inline policies to an existing IAM identity
  1. Sign in to the IAM console.

  2. Choose Users.

  3. Choose the username to see the summary page for the user.

  4. Choose Add permissions.

  5. Choose Create inline policy.

  6. Select Switch to deny permissions to deny access.

  7. Under Service, search for IQ or IQ Permissions.

    Note

    If you’re searching for permission requests and access grants, use IQ Permissions. For all other permissions, use IQ.

  8. Under Access level, select the permissions to deny.

  9. Choose Review policy, provide the name for your policy, and then choose Create policy.