简体   繁体   English

AWS:AccessDeniedException:用户:{user} 无权执行:quicksight:ListDashboards on resource

[英]AWS: AccessDeniedException: User: {user} is not authorized to perform: quicksight:ListDashboards on resource

I'm getting AccessDeniedException: User: {user{ is not authorized to perform: quicksight:ListDashboards on resource but I cannot find where I can give access to the user to do this operation.我收到AccessDeniedException: User: {user{ is not authorized to perform: quicksight:ListDashboards on resource但我找不到可以授予用户访问权限以执行此操作的位置。 Where/how can I give this permission?我在哪里/如何授予此权限? I've searched for the action on IAM policies but can't find it.我搜索了有关 IAM 策略的操作,但找不到。

I had the same problem and there's truly a dearth of QuickSight help available online.我遇到了同样的问题,并且在线提供的 QuickSight 帮助确实很缺乏。 Here's the policy you need to attach to your user's IAM role, assuming you want the user to have access to list all dashboards in your account:以下是您需要附加到用户的 IAM 角色的策略,假设您希望用户有权列出您账户中的所有仪表板:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "quicksight:ListDashboards"
            ],
            "Resource": "arn:aws:quicksight:*:<your-AWS-acct-id>:dashboard/*"
        }
    ]
}

暂无
暂无

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 AWS IAM / QuickSight-用户无权执行:quicksight:资源上的GetDashboardEmbedUrl - AWS IAM / QuickSight - user is not authorized to perform: quicksight:GetDashboardEmbedUrl on resource 错误代码:AccessDeniedException。 用户:arn:aws:iam::xxx:user/xxx 无权执行:lambda:CreateEventSourceMapping on resource:* - Error code: AccessDeniedException. User: arn:aws:iam::xxx:user/xxx is not authorized to perform: lambda:CreateEventSourceMapping on resource: * AWS IAM / QuickSight - 用户:arn:aws:sts::xxxxxxxx:assumed-role/yyyy/nnnnnn 无权执行:quicksight:RegisterUser on resource - AWS IAM / QuickSight - User: arn:aws:sts::xxxxxxxx:assumed-role/yyyy/nnnnnn is not authorized to perform: quicksight:RegisterUser on resource AccessDeniedException:用户无权对资源执行 dynamodb BatchWriteItem:表 - AccessDeniedException: User is not authorized to perform dynamodb BatchWriteItem on resource: table 调用Scan操作时如何解决(AccessDeniedException):User: arn:aws:sts... is not authorized to perform: dynamodb:Scan on resource.."? - How to solve (AccessDeniedException) when calling the Scan operation: User: arn:aws:sts... is not authorized to perform: dynamodb:Scan on resource.."? AccessDeniedException:用户无权执行:lambda:InvokeFunction - AccessDeniedException: User is not authorized to perform: lambda:InvokeFunction AccessDeniedException:用户:arn:aws:iam::xxxxxxx:root 无权执行:lambda:UpdateFunctionCode - AccessDeniedException: User: arn:aws:iam::xxxxxxx:root is not authorized to perform: lambda:UpdateFunctionCode AWS AssumeRole - 用户无权对资源执行:sts:AssumeRole - AWS AssumeRole - User is not authorized to perform: sts:AssumeRole on resource AWS Boto3-用户无权在资源上执行sts :: AssumeRole吗? - AWS Boto3 - User is not authorized to perform sts::AssumeRole on resource? aws lambda - 用户无权执行:cognito-idp:ListUsers on resource - aws lambda - user is not authorized to perform: cognito-idp:ListUsers on resource
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM