1 Answers
0
Currently, only users who have the ALTER and SHARE privileges can see the shares that they have privileges for. Therefore, SVV_DATASHARE_OBJECTS result is empty for any user that doesn't have permission on datashare, even with permission SYSLOG ACCESS UNSRESTRICTED.
As superuser, you can grant SHARE on the datashare to the user in order for the user to access the views.
Example: grant share on datashare <datashare_name> to <user_name>;
Once this is granted, the user should be able to view the data in SVV_DATASHARE_OBJECTS only for the datashares where access is granted.
One other workaround is to copy the data from SVV_DATASHARE_OBJECTS to a user table and grant SELECT access on this user table to the user.
Relevant questions
Redshift - How to grant user permission to SELECT from a view without granting access to the underlying external table
asked a month agoRedshift superuser permission denied to STL tables
Accepted Answerasked 4 months agoDMS 3.4.7 Fails on some tables upload to Redshift : Access denied to KMS key
asked a month agoRDSADMIN_UTIL: what syntax to grant a system privilege?
asked 5 months agoHow to give users a limited access time to a web app running on ECS/EC2
asked 4 months agoRedshift - Grant users access to system tables
asked 2 months agoRedshift Maximum tables limit exceeded problem, how to prevent this behavior
asked 2 months agoAre you able to hide tables in a database using Lake Formation Tagging
asked 4 months agoRedshift Datashare: Grant CREATE DATASHARE permissions to users
Accepted Answerasked 2 months agoHow to grant users read only permission to Athena
Accepted Answerasked 2 years ago
Is there a way to do this for cross-account datashares? Im my case, I have a datashare from AWS Account 1(Producer) thats accessible on AWS Account 2(Consumer). Running the below on Account 2 returns an error about the datashare not existing;
grant share on datashare <datashare_name> to <user_name>;