Access Quicksight console via an assumed IAM role instead of IDC

Hi there,

I’ve successfully configured QuickSight to use IAM Identity Center (IDC) as the identity provider, and it’s working well for direct user logins via the IDC portal.

However, I’m encountering an issue when accessing QuickSight via the AWS console using an assumed IAM administrator role. When I select QuickSight from the service list, a message appears:

You are signed in with IAM permissions and can only see Quick Suite IAM administration sections. Sign in as a Quick Suite administrator user to access all Quick Suite administration sections.

Clicking the “Quick Suite Sign In” button redirects me to the IDC login portal, requiring a separate authorization step using IDC credentials.

I attempted to modify the IAM role’s trust relationship by adding quicksight.amazonaws.com, but this did not resolve the issue.

My question is: Is it possible to access the full QuickSight console directly from the AWS console while logged in with an assumed IAM administrator role, bypassing the secondary IDC login prompt?

Thank you for your assistance.

Hello @dexterlien

Lets try to understand the situation

When QuickSight is integrated with IAM Identity Center, there are two distinct access paths with different permission models :

1. Direct IDC Access (What’s working)

  • Users sign in through the IDC portal

  • Full QuickSight functionality available

  • Uses IDC groups mapped to QuickSight roles

2. AWS Console Access via IAM Role (Your current issue) - typically when you first setup the Quick suite Account through AWS Console with IAM role

  • Accessing through AWS console with assumed IAM administrator role

  • Limited to IAM administration sections only

  • Requires specific IAM permissions for full QuickSight administration

Probable Reason :-

The message you’re seeing indicates that your IAM administrator role has limited IAM permissions but lacks the QuickSight-specific administrative permissions needed for full QuickSight administration when accessed via the AWS console.

See here below - Admin Actions Permission Matrix

Here’s what you can access based on your current setup :

Option 1: Use IDC Portal Access (Recommended)

For full QuickSight administration, continue using the IDC portal access where you have complete functionality.

Option 2: Enhance IAM Role Permissions

If you need AWS console access for QuickSight administration, your IAM administrator role may needs additional QuickSight-specific permissions. The role should include policies similar to those described in the IAM policy examples for QuickSight.

Option 3: Hybrid Approach

  • Use IDC portal for QuickSight-specific administration

  • Use AWS console access for infrastructure-level tasks (IAM, VPC, etc.)

Key Considerations

  1. Identity Method Limitation: Identity methods cannot be changed after your QuickSight account is created

  2. Permission Propagation: Changes to users or groups can take up to 5 minutes to take effect

  3. Mobile App: The QuickSight mobile app is not supported with IDC-integrated accounts

Suggestion -

  1. Immediate: Continue using IDC portal access for full QuickSight administration

  2. Long-term: If AWS console access is required, work with your AWS administrator to enhance the IAM role with appropriate QuickSight permissions

  3. Documentation: Review the IAM policy examples for Quick Suite - Amazon Quick Suite for the specific permissions needed Note: Please be mindful when interacting with displayed links.

The behavior you’re experiencing is by design when QuickSight is integrated with IAM Identity Center, ensuring proper separation between IAM infrastructure permissions and QuickSight application permissions.

Hope this helps a bit.

Cheers,

Deep

1 Like

Thanks @Deep for your detailed and professional explanation! Since the administrator IAM role already associated with AWS managed IAM policy AdministratorAccess, I thought it should cover the QuickSight-specific permissions. I’ll try to add explicit additional permissions.

1 Like