Configuring federated user access to QuickSight through IAM and an external IdP
The following are the characteristics of this architecture:
-
The Amazon QuickSight user record is linked to an AWS Identity and Access Management (IAM) role and the username in the IdP, such as
QuickSightReader/DiegoRamirez@example.com
. -
Users can self-provision access.
-
Users log in to their external identity provider.
-
If email synchronization is disabled, users can provide their preferred email address when they sign into QuickSight. If email synchronization is enabled, QuickSight uses the email address defined in the enterprise IdP. For more information, see QuickSight email synchronization for federated users in this guide.
-
The IAM role contains a trust policy that allows only federated users from your external IdP to assume the role.
Considerations and use cases
If you already use identity federation to access your AWS accounts, you can use this existing configuration to also extend access to QuickSight. For QuickSight access, you can reuse the same processes that you have in place for provisioning and reviewing access to AWS accounts.
Prerequisites
-
Administrative permissions in QuickSight.
-
Your organization is already using an external identity provider, such as Okta or Ping.
Configuring access
For instructions, see Setting up IdP federation using IAM and QuickSight in the QuickSight documentation. For more information about configuring the permissions policy for QuickSight, see Configuring IAM policies in this guide.