AWS managed policies for Amazon QuickSight - Amazon QuickSight

Important: We've redesigned the Amazon QuickSight analysis workspace. You might encounter screenshots or procedural text that doesn't reflect the new look in the QuickSight console. We're in the process of updating screenshots and procedural text.

To find a feature or item, use the Quick search bar.

For more information on QuickSight's new look, see Introducing new analysis experience on Amazon QuickSight.

AWS managed policies for Amazon QuickSight

To add permissions to users, groups, and roles, it is easier to use AWS managed policies than to write policies yourself. It takes time and expertise to create IAM customer managed policies that provide your team with only the permissions they need. To get started quickly, you can use our AWS managed policies. These policies cover common use cases and are available in your AWS account. For more information about AWS managed policies, see AWS managed policies in the IAM User Guide.

AWS services maintain and update AWS managed policies. You can't change the permissions in AWS managed policies. Services occasionally add additional permissions to an AWS managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an AWS managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an AWS managed policy, so policy updates won't break your existing permissions.

Additionally, AWS supports managed policies for job functions that span multiple services. For example, the ReadOnlyAccess AWS managed policy provides read-only access to all AWS services and resources. When a service launches a new feature, AWS adds read-only permissions for new operations and resources. For a list and descriptions of job function policies, see AWS managed policies for job functions in the IAM User Guide.

AWS managed policy: AWSQuickSightElasticsearchPolicy

This information is provided for backward compatibility only. The AWSQuickSightOpenSearchPolicy AWS managed policy replaces the AWSQuickSightElasticsearchPolicy AWS managed policy.

Previously, you used the AWSQuickSightElasticsearchPolicy AWS managed policy to provide access to Amazon Elasticsearch Service resources from Amazon QuickSight. Starting on or after September 7, 2021, Amazon Elasticsearch Service is renamed to Amazon OpenSearch Service.

Wherever you are using AWSQuickSightElasticsearchPolicy, you can update to the new AWS managed policy that's called AWSQuickSightOpenSearchPolicy. You can attach the policy to your IAM entities. Amazon QuickSight also attaches the policy to a service role that allows Amazon QuickSight to perform actions on your behalf. AWSQuickSightElasticsearchPolicy is still available and as of August 31, 2021, had the same permissions as the new policy. However, AWSQuickSightElasticsearchPolicy is no longer kept up-to-date with latest changes.

This policy grants read-only permissions that allow access to OpenSearch (previously known as Elasticsearch) resources from Amazon QuickSight.

Permissions details

This policy includes the following permissions:

  • es – Allows principals to use es:ESHttpGet to access your OpenSearch (previously known as Elasticsearch) domains, cluster settings, and indices. This is required to use the search service from QuickSight.

  • es – Allows principals to use es:ListDomainNames to list your OpenSearch (previously known as Elasticsearch) domains. This is required to initiate access of the search service from QuickSight.

  • es – Allows principals to use es:DescribeElasticsearchDomain to search your OpenSearch (previously known as Elasticsearch) domains. This is required to use the search service from QuickSight.

  • es – Allows principals to use es:ESHttpPost and es:ESHttpGet with your OpenSearch (previously known as Elasticsearch) domains. This is required to use a SQL plugin with read-only access to the search service domains from QuickSight.

For information on the contents of this IAM policy, see AWSQuickSightElasticsearchPolicy in the IAM console.

AWS managed policy: AWSQuickSightOpenSearchPolicy

Use the AWSQuickSightOpenSearchPolicy AWS managed policy to provide access to Amazon OpenSearch Service resources from Amazon QuickSight. AWSQuickSightOpenSearchPolicy replaces AWSQuickSightElasticsearchPolicy. As of August 31, 2021, this policy had the same permissions as the legacy policy, AWSQuickSightElasticsearchPolicy. For now, you can use them interchangeably. For the long term, we recommend updating your policy usage to AWSQuickSightOpenSearchPolicy.

You can attach AWSQuickSightOpenSearchPolicy to your IAM entities. Amazon QuickSight also attaches this policy to a service role that allows Amazon QuickSight to perform actions on your behalf.

This policy grants read-only permissions that allow access to OpenSearch resources from Amazon QuickSight.

Permissions details

This policy includes the following permissions:

  • es – Allows principals to use es:ESHttpGet to access your OpenSearch domains, cluster settings, and indices. This is required to use Amazon OpenSearch Service from QuickSight.

  • es – Allows principals to use es:ListDomainNames to list your OpenSearch domains. This is required to initiate access of Amazon OpenSearch Service from QuickSight.

  • es – Allows principals to use es:DescribeElasticsearchDomain and es:DescribeDomain to search your OpenSearch domains. This is required to use Amazon OpenSearch Service from QuickSight.

  • es – Allows principals to use es:ESHttpPost and es:ESHttpGet with your OpenSearch domains. This is required to use a SQL plugin with read-only access to Amazon OpenSearch Service domains from QuickSight.

For information on the contents of this IAM policy, see AWSQuickSightOpenSearchPolicy in the IAM console.

AWS managed policy: AWSQuickSightSageMakerPolicy

Use the AWSQuickSightSageMakerPolicy AWS managed policy to provide access to Amazon SageMaker resources from Amazon QuickSight.

You can attach AWSQuickSightSageMakerPolicy to your IAM entities. Amazon QuickSight also attaches this policy to a service role that allows Amazon QuickSight to perform actions on your behalf.

This policy grants read-only permissions that allow access to Amazon SageMaker resources from Amazon QuickSight.

To view the AWSQuickSightSageMakerPolicy, see AWSQuickSightSageMakerPolicy in the AWS Managed Policy reference.

Permissions details

This policy includes the following permissions:

  • sagemaker – Allows principals to use sagemaker:DescribeModel to access predictive models in . This is required to to support automatic loading of predictive model schemas shared from .

  • s3 – Allows principals to use s3:GetObject on all Amazon S3 buckets that start with the prefix arn:aws:s3:::sagemaker.* to access data stored in SageMaker default buckets. This is required to load models shared from Amazon SageMaker Canvas to the default Amazon SageMaker Canvas Amazon S3 bucket.

  • s3 – Allows principals to use s3:PutObject to export objects into an Amazon S3 bucket. This is required to support existing datasets from Amazon QuickSight to Amazon SageMaker Canvas to build predictive models.

  • s3 – Allows principals to use s3:ListBucket to allow Amazon QuickSight to validate an existing Amazon SageMaker Canvas bucket in Amazon S3. This is required to allow the export of data from Amazon QuickSight to Amazon SageMaker Canvas to build predictive models.

  • s3 – Allows principals to use s3:GetObject on all Amazon QuickSight– owned Amazon S3 buckets that start with the prefix arn:aws:s3:::quicksight-ml. This is required to allow Amazon QuickSight to access the predictions that are generated by Amazon SageMaker Canvas. The generated predictions can be appended to a Amazon QuickSight dataset.

  • sagemaker – Allows principals to use sagemaker:CreateTransformJob, sagemaker:DescribeTransformJob, and sagemaker:StopTransformJob to perform SageMaker transform jobs on your behalf. This is required for Amazon QuickSight to request predictions from SageMaker models that can be appended to a Amazon QuickSight dataset.

  • sagemaker – Allows principals to use sagemaker:ListModels to list your SageMaker models. This is required to allow generated SageMaker models to appear in Amazon QuickSight.

AWS managed policy: AWSQuickSightAssetBundleExportPolicy

Use the AWSQuickSightAssetBundleExportPolicy AWS managed policy to perform asset bundle export operations. You can attach AWSQuickSightAssetBundleExportPolicy to your IAM entities.

This policy grants read-only permissions that allow access to Amazon QuickSight asset resources. To view the details of this policy, see AWSQuickSightAssetBundleExportPolicy in the AWS Managed Policy reference.

This policy includes the following permissions:

  • quicksight – Allows principals to use quicksight:Describe* and quicksight:List* to find and fetch QuickSight assets and their corresponding permissions.

  • quicksight – Allows principals to use quicksight:ListTagsForResource to fetch tags of QuickSight assets.

  • quicksight – Allows principals to list, execute, and get the status of an Asset bundle export job. This policy uses the quicksight:ListAssetBundleExportJob, StartAssetBundleExportJob, and quicksight:DescribeAssetBundleExportJob permissions.

AWS managed policy: AWSQuickSightAssetBundleImportPolicy

Use the AWSQuickSightAssetBundleImportPolicy AWS managed policy to perform asset bundle import operations. This managed policy does not grant permissions for any run-as-role functionality with the iam:passrole that is required for some VPC connection and DataSource operations. This policy also does not grant access to retrieve objects from a users Amazon S3 bucket.

You can attach the AWSQuickSightAssetBundleImportPolicy to your IAM entities. This policy grants read and write permissions that allow access to Amazon QuickSight resources. To view the details of this policy, see AWSQuickSightAssetBundleImportPolicy in the AWS Managed Policy reference.

This policy includes the following permissions:

  • quicksight – Allows principals to use quicksight:Describe* and quicksight:List* to detect changes in the QuickSight assets and their permissions.

  • quicksight – Allows principals to use quicksight:Create* and quicksight:Update* to make changes to the QuickSight assets and permissions from the supplied asset bundle.

  • quicksight – Allows principals to use quicksight:ListTagsForResource, quicksight:TagResource, and quicksight:UntagResource to update the tags of QuickSight assets.

  • quicksight – Allows principals to list, execute, and get the status of an Asset bundle import job. This policy uses the quicksight:ListAssetBundleImportJob, quicksight:StartAssetBundleImportJob, and quicksight:DescribeAssetBundleImportJob permissions.

Amazon QuickSight updates to AWS managed policies

View details about updates to AWS managed policies for Amazon QuickSight since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Amazon QuickSight Document History page.

Change Description Date

AWSQuickSightAssetBundleExportPolicy – New policy

Amazon QuickSight added new permissions to simplify Asset bundle export operations.

March 27, 2024

AWSQuickSightAssetBundleImportPolicy – New policy

Amazon QuickSight added new permissions to simplify Asset bundle import operations.

March 27, 2024

AWSQuickSageMakerPolicy – Update to an existing policy

Amazon QuickSight added new permissions to allow integration with Amazon SageMaker Canvas.

July 25, 2023

AWSQuickSightElasticsearchPolicy – Update to an existing policy

Amazon QuickSight added new permissions to provide access to Amazon OpenSearch Service resources.

September 08, 2021

AWSQuickSightOpenSearchPolicy – New policy

Amazon QuickSight added a new policy to allow access to Amazon OpenSearch Service resources from Amazon QuickSight.

September 08, 2021

Amazon QuickSight started tracking changes

Amazon QuickSight started tracking changes for its AWS managed policies.

August 2, 2021