Back to Search AI connectors list The Egnyte connector lets Search AI ingest and index files from your Egnyte account, enabling search across your shared content.Documentation Index
Fetch the complete documentation index at: https://koreai.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
| Specification | Details |
|---|---|
| Repository type | Cloud |
| Supported content | .doc, .docx, .ppt, .pptx, .pdf, .txt |
| RACL support | Yes |
| Content filtering | No |
Prerequisites
- An Egnyte account with admin access to the Developer Portal
- Access to the Search AI application
Step 1: Register Search AI as an OAuth Client in Egnyte
- Go to the Egnyte Developer Portal.
- Register a new client app to enable communication between Egnyte and Search AI:
- Set Platform to Web App and Type to Publicly Available Application.
- Set the Registered OAuth Redirect URI to the URL matching your deployment region:
- JP Region:
https://jp-bots-idp.kore.ai/workflows/callback - DE Region:
https://de-bots-idp.kore.ai/workflows/callback - Prod:
https://idp.kore.com/workflows/callback
- JP Region:
- Ensure a key is generated for the Connect API.
- Click Register to generate the client key and secret.
Step 2: Configure the Egnyte Connector in Search AI
- In Search AI, go to the Authorization page of the Egnyte connector.
-
Provide the following fields and click Connect:
Field Value Name Unique name for the connector Authorization Type OAuth 2.0 Grant Type Authorization Code Client ID Key generated in Step 1 Client Secret Secret generated in Step 1 Host URL Domain URL for content ingestion (e.g., https://domain.egnyte.com) - Complete the authentication prompt to confirm the connection.
Content Ingestion
After connecting, go to the Configuration tab to set up synchronization:- Sync Now — triggers an immediate sync.
- Schedule Sync — sets up automatic sync on a recurring schedule.
RACL Support
Search AI enforces permissions at the folder level. Any user or group with access to a folder can access all files in that folder. File-level permissions and link-based sharing are not supported. For nested folders, files inherit permissions from the immediate parent folder. Permissions are stored in thesys_racl field.
- Individual users: The user’s email address is added to
sys_racl. - User groups: The group ID is added to
sys_racl. - Administrators: Admin permissions are explicitly listed in
sys_racl.