- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
Hello.
To prevent users from deleting a dataset in Amazon QuickSight, you need to make sure that you have applied the necessary permissions correctly at both the AWS Identity and Access Management (IAM) level and within Amazon QuickSight. Here are the steps you can follow to achieve this:
IAM Role Permissions:
Ensure that the IAM role that federated users assume to log in to Amazon QuickSight does not have permissions to delete datasets. To do this: a. Go to the AWS IAM Console. b. Find the IAM role that federated users assume when logging in to QuickSight. c. Attach a policy to this IAM role that denies the quicksight:DeleteDataSet permission. You can use an inline policy like this:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Action": "quicksight:DeleteDataSet",
"Resource": "*"
}
]
}
Amazon QuickSight Permissions: Now, you need to ensure that permissions are also restricted within Amazon QuickSight itself. Follow these steps: a. Log in to the Amazon QuickSight console. b. Click on your username in the top-right corner and choose "Manage QuickSight." c. In the QuickSight settings, click on "Security & permissions." d. Ensure that your QuickSight users/groups do not have any custom permissions that grant them the ability to delete datasets. Review their permissions to make sure they don't have the Delete action on datasets.
Best regards, Andrii
Relevanter Inhalt
- AWS OFFICIALAktualisiert vor 3 Jahren
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor 2 Jahren
Hi Andrii, Thanks for the solution.
Points to be noted:
Could you please advise if i am doing something wrong here?