Permissions for Amazon QuickSight Resources

To call these operations, you need the quicksight:operation-name permission in a policy attached to your IAM identity. For example, to call list-users, you need the permission quicksight:ListUsers. The same pattern applies to all operations.

If you’re not sure what the necessary permission is, you can attempt to make the call and the resulting error shows you what the missing permission is. You can put an asterisk (*) in the resource field of your permission policy in place of explicit resources, but we highly recommended that you restrict each permission as much as possible. You can restrict user access by specifying or excluding resources in the policy, using their Amazon QuickSight ARN (Amazon Resource Name) identifier.

To retrieve the ARN of a user or a group, use the Describe operation on the relevant resource. You can also add conditions in IAM to further restrict access to an API in some scenarios. For example, when you add User1 to Group1, the main resource is Group1. You can allow or deny access to certain groups. Alternatively, you can also edit the IAM QuickSight key quicksight:UserName, to add a condition to allow or prevent certain users from being added to that group.

The following example policy allows the caller who has this policy attached to invoke the CreateGroupMembership operation on any group, provided that the user name they are adding to the group is not user1.

{ "Effect": "Allow", "Action": "quicksight:CreateGroupMembership", "Resource": "arn:aws:quicksight:us-east-1:aws-account-id:group/default/*", "Condition": { "StringNotEquals": { "quicksight:UserName": "user1" } } }