Hello, this is Agata.
It is convenient to manage users with single sign-on using IAM Identity Center, but it is still a hassle to manage permissions in detail as with IAM.
This time I’m talking about the Health Dashboard related permissions since ViewOnlyAccess didn’t have them.
I had attached the AWS Managed Policy ViewOnlyAccess in the IAM Identity Center permission set to a user who does not work directly and only views AWS status.
However, I was told that Health Dashboard could not be viewed with only this permission, so I checked and sure enough, no Health Dashboard-related permissions were granted.
It would be better if someone in charge of monitoring and such could see it…. Well, it was no use, so I decided to add my own authorization.
Create a policy in IAM.
The policy should look something like the following, allowing all health:Describe~.
(Arrange this area as needed.)
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"health:Describe*"
],
"Resource": "*"
}
]
}
To create a policy, follow these steps
If you are configuring settings for multiple AWS accounts, do this for all of the target AWS accounts. At this time, the policy name must be the same.
Attach the created policy.
You should now be able to see the Haelth Dashboard.