I created a new policy
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"sts:AssumeRole",
"sts:AssumeRoleWithSAML",
"sts:AssumeRoleWithWebIdentity"
],
"Resource": "*"
}
]
}
- I've added this policies as "Add permissions" to the user.
- I've added the policy to a group and added the user to this group
- I've added the policy to a role and edited the Trust Relationship
This it the trusted relationship definition
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"Service": [
"apigateway.amazonaws.com",
"lambda.amazonaws.com",
"events.amazonaws.com"
],
"AWS": [
"<user_arn>"
]
},
"Action": "sts:AssumeRole"
}
]
}
However, when calling
aws sts assume-role --role-arn "arn:aws:quicksight:us-east-1:<user_id>:user/default/..." --role-session-name test-session
I still receive an access denied?