Remove delete permission for the dataset in quicksight for any of the users.

0

The main purpose here is to prevent the deletion of dataset for all the users who are using quicksight. Here users are logging into quicksight using federated login, where role have been used to login to quicksight.

Tried adding inline policy to the federated role, tried preventing deletion using boto3 API's but it is not preventing deletion. Could someone help me here to fix it.

Any help would be much appreciated.

1개 답변
0

Hello.

To prevent users from deleting a dataset in Amazon QuickSight, you need to make sure that you have applied the necessary permissions correctly at both the AWS Identity and Access Management (IAM) level and within Amazon QuickSight. Here are the steps you can follow to achieve this:

IAM Role Permissions:

Ensure that the IAM role that federated users assume to log in to Amazon QuickSight does not have permissions to delete datasets. To do this: a. Go to the AWS IAM Console. b. Find the IAM role that federated users assume when logging in to QuickSight. c. Attach a policy to this IAM role that denies the quicksight:DeleteDataSet permission. You can use an inline policy like this:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Deny",
            "Action": "quicksight:DeleteDataSet",
            "Resource": "*"
        }
    ]
}

Amazon QuickSight Permissions: Now, you need to ensure that permissions are also restricted within Amazon QuickSight itself. Follow these steps: a. Log in to the Amazon QuickSight console. b. Click on your username in the top-right corner and choose "Manage QuickSight." c. In the QuickSight settings, click on "Security & permissions." d. Ensure that your QuickSight users/groups do not have any custom permissions that grant them the ability to delete datasets. Review their permissions to make sure they don't have the Delete action on datasets.

Best regards, Andrii

profile picture
전문가
답변함 8달 전
profile picture
전문가
검토됨 한 달 전
  • Hi Andrii, Thanks for the solution.

    Points to be noted:

    1. The user has been created with an ADMIN role.
    2. Within Security and Permissions, under Resource access for individual users and groups, a custom IAM policy has been assigned, the policy looks like this: { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Deny", "Action": [ "quicksight:DeleteDataSet", "quicksight:DeleteAnalysis", "quicksight:DeleteDataSource", "quicksight:DeleteDashboard" ], "Resource":"*" } ] }

    Could you please advise if i am doing something wrong here?

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠