-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SCP error handling in Quicksight identity region checks #896
Conversation
Tested in AWS
|
Re-Tested in AWS
Screenshot for "Create session with new user for Quicksight with identity region |
I have tested the above in an AWS Deployment with the following tests:
I believe I found 1 issue, when I perform the following steps:
I believe this is because we do not actually create the Then, when Some ideas to resolve the above:
|
Along similar lines to the above comment - do we not need to specify the correct identity region for I imagine it depends on the SCP being enforced whether this will work or not but to be safe should we ensure this check is also using the correct identity region, otherwise we may face trouble creating datasets or processing shares when QS is enabled on the parent environment |
Hi @noah-paige sorry for the bug :S Finding 1: Finding 2: Finding 3: |
With the above in mind I am implementing the following changes:
|
Re-tested in AWS:
On a new QS subscription (no groups or user created) with SCPs blocking all except environment.region (
|
Deploying the latest changes now to test... I think the assumption is fair that if Dashboards are enabled on an environment then Quicksight should not be restricted by SCPs. Using env region aligns with the way we set up client in |
Final Testing:
So our prescriptive guidance will have to be - you must allow quicksight permissions to both the identity region and the environment region (if they differ) Ultimately one could break down the exact permissions required for each (i.e. identity region needs CreateGroup,... while env region needs GenerateEmbedUrlForRegisteredUser,...) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After final review of the code and final testing in AWS I think this PR looks good to be merged!
Feature or Bugfix
Detail
There is no API to obtain the Quicksight identity region used for an account, we obtain it form the error logs of the response of describe_groups. However, it does not take into account AccessDenied errors based on SCPs.
A more detailed description of the issue can be found in #851
This PR:
Relates
Security
Please answer the questions below briefly where applicable, or write
N/A
. Based onOWASP 10. -->
N/A
fetching data from storage outside the application (e.g. a database, an S3 bucket)?
eval
or similar functions are used?By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.