Chapter 5. Secure Your Environment
To secure your BI environment, you need to control which users have access to QuickSight and also what resources QuickSight has permissions to read. In this chapter, we will review the following in detail:
- Managing users and access
- Managing QuickSight permissions on AWS resources
- Authorizing connections from QuickSight to RDS and Redshift instances
- Authorizing connections from QuickSight to EC2 instances
Managing users and access
There are two types of users supported by QuickSight: the first type of user is the AWS IAM (Identity and Access Management) user and the second type is the user managed completely within QuickSight. If your enterprise has IAM-managed users, this is the recommended approach since IAM enables ...
Get Effective Business Intelligence with QuickSight now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.