Back to Search AI connectors list Airtable combines spreadsheet and database functionality for organizing structured data. The Airtable connector ingests table data from Airtable into Search AI, making it searchable.Documentation Index
Fetch the complete documentation index at: https://koreai.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
| Specification | Details |
|---|---|
| Repository type | Cloud |
| Supported content | Tables (Records) |
| RACL support | Yes |
| Content filtering | No |
Authorization Support
Search AI supports two authentication methods for Airtable:- Personal Access Token (PAT)
- OAuth 2.0
Airtable Configuration
Personal Access Token- Log in to the Airtable Builder Hub.
- Create a new PAT with the following scopes:
data.records:readdata.recordComments:readschema.bases:read
- Register a new integration for Search AI.
- Set the OAuth Redirect URL based on your region or deployment:
- JP Region:
https://jp-bots-idp.kore.ai/workflows/callback - DE Region:
https://de-bots-idp.kore.ai/workflows/callback - Production:
https://idp.kore.com/workflows/callback
- JP Region:
- Click Generate Client Secret after the client ID is created.
- Enable the following permissions:
data.records:readdata.recordComments:readschema.bases:read
Configure the Airtable Connector in Search AI
On the Authorization page of the Airtable connector, provide the following fields and click Connect.| Field | Description |
|---|---|
| Name | Unique name for the connector |
| Authorization Type | Personal Access Token or OAuth 2.0 |
| Personal Access Token | (If PAT selected) Token generated in Airtable |
| Client ID / Client Secret | (If OAuth 2.0 selected) Credentials from the registered integration |
Content Ingestion
After authorization, go to the Configuration tab. Click Sync Now for an immediate sync, or set up a Schedule Sync for future runs.RACL Support
Search AI supports permission-aware search for Airtable content when RACL is enabled. Airtable implements base-level access control — all records within a base inherit the same base-level permissions, and no granular record-level permissions are available. Thesys_racl field is set to the base_id of the base to which the record belongs, serving as the permission entity for access control.
For example:
base_id permission entity so they can access the related content.