View Source aws_quicksight (aws v0.3.1)
Amazon QuickSight API Reference
Amazon QuickSight is a fully managed, serverless business intelligence service for the AWS Cloud that makes it easy to extend data and insights to every user in your organization.
This API reference contains documentation for a programming interface that you can use to manage Amazon QuickSight.Link to this section Summary
Functions
Creates Amazon QuickSight customizations the current AWS Region.
Creates a dashboard from a template.
Creates an Amazon QuickSight group.
Creates an assignment with one specified IAM policy, identified by its Amazon Resource Name (ARN).
Creates and starts a new SPICE ingestion on a dataset
(Enterprise edition only) Creates a new namespace for you to use with Amazon QuickSight.
Creates a template from an existing QuickSight analysis or template.
Creates a theme.
Deletes an analysis from Amazon QuickSight.
Deletes the data source permanently.
Deletes a namespace and the users and groups that are associated with the namespace.
Deletes the item that the specified template alias points to.
Deletes the version of the theme that the specified theme alias points to.
Deletes the Amazon QuickSight user that is associated with the identity of the AWS Identity and Access Management (IAM) user or role that's making the call.
Describes the customizations associated with the provided AWS account and Amazon QuickSight namespace in an AWS Region.
Describes the permissions on a dataset.
Generates a session URL and authorization code that you can use to embed an Amazon QuickSight read-only dashboard in your web server code.
Generates a session URL and authorization code that you can use to embed the Amazon QuickSight console in your web server code.
Lists all of the datasets belonging to the current AWS account in an AWS Region.
Assigns one or more tags (key-value pairs) to the specified QuickSight resource.
Updates Amazon QuickSight customizations the current AWS Region.
Updates the permissions on a dataset.
Updates an existing IAM policy assignment.
Updates the resource permissions for a theme.
Link to this section Functions
cancel_ingestion(Client, AwsAccountId, DataSetId, IngestionId, Input)
View Sourcecancel_ingestion(Client, AwsAccountId, DataSetId, IngestionId, Input0, Options0)
View SourceCreates Amazon QuickSight customizations the current AWS Region.
Currently, you can add a custom default theme by using the CreateAccountCustomization
or UpdateAccountCustomization
API operation. To further customize QuickSight by removing QuickSight sample assets and videos for all new users, see Customizing QuickSight in the Amazon QuickSight User Guide.
You can create customizations for your AWS account or, if you specify a namespace, for a QuickSight namespace instead. Customizations that apply to a namespace always override customizations that apply to an AWS account. To find out which customizations apply, use the DescribeAccountCustomization
API operation.
CreateAccountCustomization
API operation to add a theme as the namespace default, make sure that you first share the theme with the namespace. If you don't share it with the namespace, the theme isn't visible to your users even if you make it the default theme. To check if the theme is shared, view the current permissions by using the `DescribeThemePermissions
' API operation. To share the theme, grant permissions by using the `UpdateThemePermissions
' API operation.
create_account_customization(Client, AwsAccountId, Input0, Options0)
View Sourcecreate_analysis(Client, AnalysisId, AwsAccountId, Input0, Options0)
View SourceCreates a dashboard from a template.
To first create a template, see the `CreateTemplate
' API operation.
create_dashboard(Client, AwsAccountId, DashboardId, Input0, Options0)
View SourceCreates an Amazon QuickSight group.
The permissions resource is arn:aws:quicksight:us-east-1:<relevant-aws-account-id>:group/default/<group-name>
.
create_group_membership(Client, AwsAccountId, GroupName, MemberName, Namespace, Input)
View Sourcecreate_group_membership(Client, AwsAccountId, GroupName, MemberName, Namespace, Input0, Options0)
View Sourcecreate_iam_policy_assignment(Client, AwsAccountId, Namespace, Input)
View SourceCreates an assignment with one specified IAM policy, identified by its Amazon Resource Name (ARN).
This policy assignment is attached to the specified groups or users of Amazon QuickSight. Assignment names are unique per AWS account. To avoid overwriting rules in other namespaces, use assignment names that are unique.create_iam_policy_assignment(Client, AwsAccountId, Namespace, Input0, Options0)
View Sourcecreate_ingestion(Client, AwsAccountId, DataSetId, IngestionId, Input)
View SourceCreates and starts a new SPICE ingestion on a dataset
Any ingestions operating on tagged datasets inherit the same tags automatically for use in access control.
For an example, see How do I create an IAM policy to control access to Amazon EC2 resources using tags? in the AWS Knowledge Center. Tags are visible on the tagged dataset, but not on the ingestion resource.create_ingestion(Client, AwsAccountId, DataSetId, IngestionId, Input0, Options0)
View Source(Enterprise edition only) Creates a new namespace for you to use with Amazon QuickSight.
A namespace allows you to isolate the QuickSight users and groups that are registered for that namespace. Users that access the namespace can share assets only with other users or groups in the same namespace. They can't see users and groups in other namespaces. You can create a namespace after your AWS account is subscribed to QuickSight. The namespace must be unique within the AWS account. By default, there is a limit of 100 namespaces per AWS account. To increase your limit, create a ticket with AWS Support.Creates a template from an existing QuickSight analysis or template.
You can use the resulting template to create a dashboard.
A template is an entity in QuickSight that encapsulates the metadata required to create an analysis and that you can use to create s dashboard. A template adds a layer of abstraction by using placeholders to replace the dataset associated with the analysis. You can use templates to create dashboards by replacing dataset placeholders with datasets that follow the same schema that was used to create the source analysis and template.create_template(Client, AwsAccountId, TemplateId, Input0, Options0)
View Sourcecreate_template_alias(Client, AliasName, AwsAccountId, TemplateId, Input)
View Sourcecreate_template_alias(Client, AliasName, AwsAccountId, TemplateId, Input0, Options0)
View SourceCreates a theme.
A theme is set of configuration options for color and layout. Themes apply to analyses and dashboards. For more information, see Using Themes in Amazon QuickSight in the Amazon QuickSight User Guide.create_theme_alias(Client, AliasName, AwsAccountId, ThemeId, Input)
View Sourcecreate_theme_alias(Client, AliasName, AwsAccountId, ThemeId, Input0, Options0)
View Sourcedelete_account_customization(Client, AwsAccountId, Input0, Options0)
View SourceDeletes an analysis from Amazon QuickSight.
You can optionally include a recovery window during which you can restore the analysis. If you don't specify a recovery window value, the operation defaults to 30 days. QuickSight attaches a DeletionTime
stamp to the response that specifies the end of the recovery window. At the end of the recovery window, QuickSight deletes the analysis permanently.
At any time before recovery window ends, you can use the RestoreAnalysis
API operation to remove the DeletionTime
stamp and cancel the deletion of the analysis. The analysis remains visible in the API until it's deleted, so you can describe it but you can't make a template from it.
delete_analysis(Client, AnalysisId, AwsAccountId, Input0, Options0)
View Sourcedelete_dashboard(Client, AwsAccountId, DashboardId, Input0, Options0)
View Sourcedelete_data_set(Client, AwsAccountId, DataSetId, Input0, Options0)
View SourceDeletes the data source permanently.
This operation breaks all the datasets that reference the deleted data source.delete_data_source(Client, AwsAccountId, DataSourceId, Input0, Options0)
View Sourcedelete_group(Client, AwsAccountId, GroupName, Namespace, Input0, Options0)
View Sourcedelete_group_membership(Client, AwsAccountId, GroupName, MemberName, Namespace, Input)
View Sourcedelete_group_membership(Client, AwsAccountId, GroupName, MemberName, Namespace, Input0, Options0)
View Sourcedelete_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace, Input)
View Sourcedelete_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace, Input0, Options0)
View SourceDeletes a namespace and the users and groups that are associated with the namespace.
This is an asynchronous process. Assets including dashboards, analyses, datasets and data sources are not deleted. To delete these assets, you use the API operations for the relevant asset.delete_namespace(Client, AwsAccountId, Namespace, Input0, Options0)
View Sourcedelete_template(Client, AwsAccountId, TemplateId, Input0, Options0)
View Sourcedelete_template_alias(Client, AliasName, AwsAccountId, TemplateId, Input)
View SourceDeletes the item that the specified template alias points to.
If you provide a specific alias, you delete the version of the template that the alias points to.delete_template_alias(Client, AliasName, AwsAccountId, TemplateId, Input0, Options0)
View Sourcedelete_theme_alias(Client, AliasName, AwsAccountId, ThemeId, Input)
View SourceDeletes the version of the theme that the specified theme alias points to.
If you provide a specific alias, you delete the version of the theme that the alias points to.delete_theme_alias(Client, AliasName, AwsAccountId, ThemeId, Input0, Options0)
View SourceDeletes the Amazon QuickSight user that is associated with the identity of the AWS Identity and Access Management (IAM) user or role that's making the call.
The IAM user isn't deleted as a result of this call.delete_user(Client, AwsAccountId, Namespace, UserName, Input0, Options0)
View Sourcedelete_user_by_principal_id(Client, AwsAccountId, Namespace, PrincipalId, Input)
View Sourcedelete_user_by_principal_id(Client, AwsAccountId, Namespace, PrincipalId, Input0, Options0)
View SourceDescribes the customizations associated with the provided AWS account and Amazon QuickSight namespace in an AWS Region.
The QuickSight console evaluates which customizations to apply by running this API operation with the Resolved
flag included.
To determine what customizations display when you run this command, it can help to visualize the relationship of the entities involved.
AWS Account
- The AWS account exists at the top of the hierarchy. It has the potential to use all of the AWS Regions and AWS Services. When you subscribe to QuickSight, you choose one AWS Region to use as your home Region. That's where your free SPICE capacity is located. You can use QuickSight in any supported AWS Region.AWS Region
- In each AWS Region where you sign in to QuickSight at least once, QuickSight acts as a separate instance of the same service. If you have a user directory, it resides in us-east-1, which is the US East (N. Virginia). Generally speaking, these users have access to QuickSight in any AWS Region, unless they are constrained to a namespace.To run the command in a different AWS Region, you change your Region settings. If you're using the AWS CLI, you can use one of the following options:
Use command line options.
Use named profiles.
Run
aws configure
to change your default AWS Region. Use Enter to key the same settings for your keys. For more information, see Configuring the AWS CLI.
Namespace
- A QuickSight namespace is a partition that contains users and assets (data sources, datasets, dashboards, and so on). To access assets that are in a specific namespace, users and groups must also be part of the same namespace. People who share a namespace are completely isolated from users and assets in other namespaces, even if they are in the same AWS account and AWS Region.Applied customizations
- Within an AWS Region, a set of QuickSight customizations can apply to an AWS account or to a namespace. Settings that you apply to a namespace override settings that you apply to an AWS account. All settings are isolated to a single AWS Region. To apply them in other AWS Regions, run theCreateAccountCustomization
command in each AWS Region where you want to apply the same customizations.
describe_account_customization(Client, AwsAccountId, QueryMap, HeadersMap)
View Sourcedescribe_account_customization(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_account_settings(Client, AwsAccountId, QueryMap, HeadersMap)
View Sourcedescribe_account_settings(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_analysis(Client, AnalysisId, AwsAccountId, QueryMap, HeadersMap)
View Sourcedescribe_analysis(Client, AnalysisId, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_analysis_permissions(Client, AnalysisId, AwsAccountId, QueryMap, HeadersMap)
View Sourcedescribe_analysis_permissions(Client, AnalysisId, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_dashboard(Client, AwsAccountId, DashboardId, QueryMap, HeadersMap)
View Sourcedescribe_dashboard(Client, AwsAccountId, DashboardId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_dashboard_permissions(Client, AwsAccountId, DashboardId, QueryMap, HeadersMap)
View Sourcedescribe_dashboard_permissions(Client, AwsAccountId, DashboardId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_data_set(Client, AwsAccountId, DataSetId, QueryMap, HeadersMap)
View Sourcedescribe_data_set(Client, AwsAccountId, DataSetId, QueryMap, HeadersMap, Options0)
View SourceDescribes the permissions on a dataset.
The permissions resource isarn:aws:quicksight:region:aws-account-id:dataset/data-set-id
.
describe_data_set_permissions(Client, AwsAccountId, DataSetId, QueryMap, HeadersMap)
View Sourcedescribe_data_set_permissions(Client, AwsAccountId, DataSetId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_data_source(Client, AwsAccountId, DataSourceId, QueryMap, HeadersMap)
View Sourcedescribe_data_source(Client, AwsAccountId, DataSourceId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_data_source_permissions(Client, AwsAccountId, DataSourceId)
View Sourcedescribe_data_source_permissions(Client, AwsAccountId, DataSourceId, QueryMap, HeadersMap)
View Sourcedescribe_data_source_permissions(Client, AwsAccountId, DataSourceId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_group(Client, AwsAccountId, GroupName, Namespace, QueryMap, HeadersMap)
View Sourcedescribe_group(Client, AwsAccountId, GroupName, Namespace, QueryMap, HeadersMap, Options0)
View Sourcedescribe_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace)
View Sourcedescribe_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace, QueryMap, HeadersMap)
View Sourcedescribe_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace, QueryMap, HeadersMap, Options0)
View Sourcedescribe_ingestion(Client, AwsAccountId, DataSetId, IngestionId, QueryMap, HeadersMap)
View Sourcedescribe_ingestion(Client, AwsAccountId, DataSetId, IngestionId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_namespace(Client, AwsAccountId, Namespace, QueryMap, HeadersMap)
View Sourcedescribe_namespace(Client, AwsAccountId, Namespace, QueryMap, HeadersMap, Options0)
View Sourcedescribe_template(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap)
View Sourcedescribe_template(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_template_alias(Client, AliasName, AwsAccountId, TemplateId)
View Sourcedescribe_template_alias(Client, AliasName, AwsAccountId, TemplateId, QueryMap, HeadersMap)
View Sourcedescribe_template_alias(Client, AliasName, AwsAccountId, TemplateId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_template_permissions(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap)
View Sourcedescribe_template_permissions(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_theme(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap)
View Sourcedescribe_theme(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_theme_alias(Client, AliasName, AwsAccountId, ThemeId, QueryMap, HeadersMap)
View Sourcedescribe_theme_alias(Client, AliasName, AwsAccountId, ThemeId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_theme_permissions(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap)
View Sourcedescribe_theme_permissions(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap, Options0)
View Sourcedescribe_user(Client, AwsAccountId, Namespace, UserName, QueryMap, HeadersMap)
View Sourcedescribe_user(Client, AwsAccountId, Namespace, UserName, QueryMap, HeadersMap, Options0)
View Sourceget_dashboard_embed_url(Client, AwsAccountId, DashboardId, IdentityType)
View SourceGenerates a session URL and authorization code that you can use to embed an Amazon QuickSight read-only dashboard in your web server code.
Before you use this command, make sure that you have configured the dashboards and permissions.
Currently, you can use GetDashboardEmbedURL
only from the server, not from the user's browser. The following rules apply to the combination of URL and authorization code:
They must be used together.
They can be used one time only.
They are valid for 5 minutes after you run this command.
The resulting user session is valid for 10 hours.
get_dashboard_embed_url(Client, AwsAccountId, DashboardId, IdentityType, QueryMap, HeadersMap)
View Sourceget_dashboard_embed_url(Client, AwsAccountId, DashboardId, IdentityType, QueryMap, HeadersMap, Options0)
View SourceGenerates a session URL and authorization code that you can use to embed the Amazon QuickSight console in your web server code.
Use GetSessionEmbedUrl
where you want to provide an authoring portal that allows users to create data sources, datasets, analyses, and dashboards. The users who access an embedded QuickSight console need belong to the author or admin security cohort. If you want to restrict permissions to some of these features, add a custom permissions profile to the user with the `UpdateUser
' API operation. Use `RegisterUser
' API operation to add a new user with a custom permission profile attached. For more information, see the following sections in the Amazon QuickSight User Guide:
Embedding the Amazon QuickSight Console
Customizing Access to the Amazon QuickSight Console
get_session_embed_url(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcelist_analyses(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcelist_dashboard_versions(Client, AwsAccountId, DashboardId, QueryMap, HeadersMap)
View Sourcelist_dashboard_versions(Client, AwsAccountId, DashboardId, QueryMap, HeadersMap, Options0)
View Sourcelist_dashboards(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View SourceLists all of the datasets belonging to the current AWS account in an AWS Region.
The permissions resource isarn:aws:quicksight:region:aws-account-id:dataset/*
.
list_data_sets(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcelist_data_sources(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcelist_group_memberships(Client, AwsAccountId, GroupName, Namespace)
View Sourcelist_group_memberships(Client, AwsAccountId, GroupName, Namespace, QueryMap, HeadersMap)
View Sourcelist_group_memberships(Client, AwsAccountId, GroupName, Namespace, QueryMap, HeadersMap, Options0)
View Sourcelist_groups(Client, AwsAccountId, Namespace, QueryMap, HeadersMap)
View Sourcelist_groups(Client, AwsAccountId, Namespace, QueryMap, HeadersMap, Options0)
View Sourcelist_iam_policy_assignments(Client, AwsAccountId, Namespace, QueryMap, HeadersMap)
View Sourcelist_iam_policy_assignments(Client, AwsAccountId, Namespace, QueryMap, HeadersMap, Options0)
View Sourcelist_iam_policy_assignments_for_user(Client, AwsAccountId, Namespace, UserName)
View Sourcelist_iam_policy_assignments_for_user(Client, AwsAccountId, Namespace, UserName, QueryMap, HeadersMap)
View Sourcelist_iam_policy_assignments_for_user(Client, AwsAccountId, Namespace, UserName, QueryMap, HeadersMap, Options0)
View Sourcelist_ingestions(Client, AwsAccountId, DataSetId, QueryMap, HeadersMap)
View Sourcelist_ingestions(Client, AwsAccountId, DataSetId, QueryMap, HeadersMap, Options0)
View Sourcelist_namespaces(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcelist_tags_for_resource(Client, ResourceArn, QueryMap, HeadersMap, Options0)
View Sourcelist_template_aliases(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap)
View Sourcelist_template_aliases(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap, Options0)
View Sourcelist_template_versions(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap)
View Sourcelist_template_versions(Client, AwsAccountId, TemplateId, QueryMap, HeadersMap, Options0)
View Sourcelist_templates(Client, AwsAccountId, QueryMap, HeadersMap, Options0)
View Sourcelist_theme_aliases(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap)
View Sourcelist_theme_aliases(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap, Options0)
View Sourcelist_theme_versions(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap)
View Sourcelist_theme_versions(Client, AwsAccountId, ThemeId, QueryMap, HeadersMap, Options0)
View Sourcelist_user_groups(Client, AwsAccountId, Namespace, UserName, QueryMap, HeadersMap)
View Sourcelist_user_groups(Client, AwsAccountId, Namespace, UserName, QueryMap, HeadersMap, Options0)
View Sourcelist_users(Client, AwsAccountId, Namespace, QueryMap, HeadersMap, Options0)
View Sourcerestore_analysis(Client, AnalysisId, AwsAccountId, Input0, Options0)
View SourceAssigns one or more tags (key-value pairs) to the specified QuickSight resource.
Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only resources with certain tag values. You can use the TagResource
operation with a resource that already has tags. If you specify a new tag key for the resource, this tag is appended to the list of tags associated with the resource. If you specify a tag key that is already associated with the resource, the new tag value that you specify replaces the previous value for that tag.
You can associate as many as 50 tags with a resource. QuickSight supports tagging on data set, data source, dashboard, and template.
Tagging for QuickSight works in a similar way to tagging for other AWS services, except for the following:
You can't use tags to track AWS costs for QuickSight. This restriction is because QuickSight costs are based on users and SPICE capacity, which aren't taggable resources.
QuickSight doesn't currently support the Tag Editor for AWS Resource Groups.
Updates Amazon QuickSight customizations the current AWS Region.
Currently, the only customization you can use is a theme.
You can use customizations for your AWS account or, if you specify a namespace, for a QuickSight namespace instead. Customizations that apply to a namespace override customizations that apply to an AWS account. To find out which customizations apply, use theDescribeAccountCustomization
API operation.
update_account_customization(Client, AwsAccountId, Input0, Options0)
View Sourceupdate_analysis(Client, AnalysisId, AwsAccountId, Input0, Options0)
View Sourceupdate_analysis_permissions(Client, AnalysisId, AwsAccountId, Input)
View Sourceupdate_analysis_permissions(Client, AnalysisId, AwsAccountId, Input0, Options0)
View Sourceupdate_dashboard(Client, AwsAccountId, DashboardId, Input0, Options0)
View Sourceupdate_dashboard_permissions(Client, AwsAccountId, DashboardId, Input)
View Sourceupdate_dashboard_permissions(Client, AwsAccountId, DashboardId, Input0, Options0)
View Sourceupdate_dashboard_published_version(Client, AwsAccountId, DashboardId, VersionNumber, Input)
View Sourceupdate_dashboard_published_version(Client, AwsAccountId, DashboardId, VersionNumber, Input0, Options0)
View Sourceupdate_data_set(Client, AwsAccountId, DataSetId, Input0, Options0)
View Sourceupdate_data_set_permissions(Client, AwsAccountId, DataSetId, Input)
View SourceUpdates the permissions on a dataset.
The permissions resource isarn:aws:quicksight:region:aws-account-id:dataset/data-set-id
.
update_data_set_permissions(Client, AwsAccountId, DataSetId, Input0, Options0)
View Sourceupdate_data_source(Client, AwsAccountId, DataSourceId, Input0, Options0)
View Sourceupdate_data_source_permissions(Client, AwsAccountId, DataSourceId, Input)
View Sourceupdate_data_source_permissions(Client, AwsAccountId, DataSourceId, Input0, Options0)
View Sourceupdate_group(Client, AwsAccountId, GroupName, Namespace, Input0, Options0)
View Sourceupdate_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace, Input)
View SourceUpdates an existing IAM policy assignment.
This operation updates only the optional parameter or parameters that are specified in the request. This overwrites all of the users included inIdentities
.
update_iam_policy_assignment(Client, AssignmentName, AwsAccountId, Namespace, Input0, Options0)
View Sourceupdate_template(Client, AwsAccountId, TemplateId, Input0, Options0)
View Sourceupdate_template_alias(Client, AliasName, AwsAccountId, TemplateId, Input)
View Sourceupdate_template_alias(Client, AliasName, AwsAccountId, TemplateId, Input0, Options0)
View Sourceupdate_template_permissions(Client, AwsAccountId, TemplateId, Input)
View Sourceupdate_template_permissions(Client, AwsAccountId, TemplateId, Input0, Options0)
View Sourceupdate_theme_alias(Client, AliasName, AwsAccountId, ThemeId, Input)
View Sourceupdate_theme_alias(Client, AliasName, AwsAccountId, ThemeId, Input0, Options0)
View SourceUpdates the resource permissions for a theme.
Permissions apply to the action to grant or revoke permissions on, for example "quicksight:DescribeTheme"
.
Theme permissions apply in groupings. Valid groupings include the following for the three levels of permissions, which are user, owner, or no permissions:
User
"quicksight:DescribeTheme"
"quicksight:DescribeThemeAlias"
"quicksight:ListThemeAliases"
"quicksight:ListThemeVersions"
Owner
"quicksight:DescribeTheme"
"quicksight:DescribeThemeAlias"
"quicksight:ListThemeAliases"
"quicksight:ListThemeVersions"
"quicksight:DeleteTheme"
"quicksight:UpdateTheme"
"quicksight:CreateThemeAlias"
"quicksight:DeleteThemeAlias"
"quicksight:UpdateThemeAlias"
"quicksight:UpdateThemePermissions"
"quicksight:DescribeThemePermissions"
To specify no permissions, omit the permissions list.