We have a federated identity provider for quicksight which creates three roles [QuickSight-Admin-Role, QuickSight-Author-Role, QuickSight-Reader-Role] in AWS IAM. We have been using these roles to add and remove capabilities from these three user groups. This works when we add permissions but not when we deny permissions.
Specifically, I’ve been trying to add ‘deny’ permissions to dataset creation for the QuickSight-Federated-Author role and users with that role are still able to perform the actions in the ‘deny’ permission set. However, when I add permissions to the ‘allow’ permission set in the policy associated with that role, the users with that role then are given those capabilities.
The current author policy is
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor1",
"Effect": "Deny",
"Action": [
"quicksight:UpdateDataSourcePermissions",
"quicksight:PutDataSetRefreshProperties",
"quicksight:CreateDataSet",
"quicksight:UpdateDataSet",
"quicksight:DeleteDataSet",
"quicksight:DeleteDataSetRefreshProperties",
"quicksight:DeleteDataSource",
"quicksight:UpdateDataSource",
"quicksight:CreateDataSource",
"quicksight:UpdateDataSetPermissions"
],
"Resource": "*"
}
]
}```
Is this a bug or it intended that denying access does not work?