Add or Edit a Box Business Source
Add or Edit a Box Business Source
Members of the Administrators and Content Managers built-in groups can add the content of users' Box enterprise accounts to a Coveo organization.
|
Leading practice
The number of items that a source processes per hour (crawling speed) depends on various factors, such as network bandwidth and source configuration. See About Crawling Speed for information on what can impact crawling speed, as well as possible solutions. |
|
The Box Business Legacy connector has been deprecated for security reasons. If you still have a Box Business Legacy source, it will still work, but we recommend that you create a Box Business source to replace it. The difference between the two connectors lies in how you identify your Box account when creating the source: with a Box Business Legacy, you entered a Box Enterprise ID, whereas with a Box Business source, a JSON configuration containing credentials is required. Moreover, Box Business Legacy sources provided a Coveo application API key to enter in your Box application to authorize Coveo. With the new connector, this is no longer required. |
Source Key Characteristics
Features | Supported | Additional information | |
---|---|---|---|
Box version | Latest cloud version | Following available Box releases | |
Searchable content types |
|
Files, folders, enterprises, users, and web links | |
Content update operations | Refresh |
|
Takes place every three hours by default. A rescan or rebuild is required to:
|
Rescan |
|
||
Rebuild |
|
||
Content security options | Determined by source permissions |
|
|
Source creator |
|
||
Everyone |
|
Add or Edit a Box Business Source
"Configuration" Tab
On the Add/Edit a Box Business Source subpage, the Configuration tab is selected by default. It contains your source general and authentication information, as well as other parameters.
General Information
Source Name
Enter a name for your source.
|
Leading practice
A source name can’t be modified once it’s saved, therefore be sure to use a short and descriptive name, using letters, numbers, hyphens ( |
Authorization
Provide the Box application credentials in JSON format, either by pasting the configuration in the box or clicking Choose File and selecting the file to upload.
|
Note
If you still have a Box Business Legacy source, an enterprise ID is required instead. In the Box Enterprise ID box, enter the unique identifier that’s displayed in your Box Enterprise Admin Console, in the Account & Billing tab. |
Character Optical Recognition (OCR)
If you want Coveo to extract text from image files or PDF files containing images, check the appropriate box. OCR-extracted text is processed as item data, meaning that it’s fully searchable and will appear in the item Quick View. See Enable Optical Character Recognition for details on this feature.
|
Note
Contact Coveo Sales to add this feature to your organization license. |
"Users to Include" Section
Choose whether you want to make all your managed Box accounts searchable or only some specific accounts. If you select Specific, enter the user email addresses corresponding to the Box accounts you want to make searchable.
|
Note
When you want users to be included as separate items, add |
"Content Security" Tab
Select who will be able to access the source items through a Coveo-powered search interface. For details on this parameter, see Content Security.
|
When using the Everyone content security option, see Safely Apply Content Filtering for information on how to ensure that your source content is safely filtered and only accessible by intended users. |
"Access" Tab
In the Access tab, set whether each group and API key can view or edit the source configuration (see Resource Access):
-
If available, in the left pane, click Groups or API Keys to select the appropriate list.
-
In the Access Level column for groups or API keys with access to source content, select View or Edit.
Completion
-
Finish adding or editing your source:
-
When you want to save your source configuration changes without starting a build/rebuild, such as when you know you want to do other changes soon, click Add Source/Save.
NoteOn the Sources (platform-eu | platform-au) page, you must click Launch build or Start required rebuild in the source Status column to add the source content or to make your changes effective, respectively.
-
When you’re done editing the source and want to make changes effective, click Add and Build Source/Save and Rebuild Source.
Back on the Sources (platform-eu | platform-au) page, you can review the progress of your source addition or modification.
Once the source is built or rebuilt, you can review its content in the Content Browser.
-
-
Optionally, consider editing or adding mappings once your source is done building or rebuilding.
Safely Apply Content Filtering
The best way to ensure that your indexed content is seen only by the intended users is to enforce content security by selecting either the Source creator or Determined by source permissions option when available.
However, if you need to configure your source so that the indexed source content is accessible to Everyone, you should adhere to the following leading practices to ensure that your source content is safely filtered and only accessible by the appropriate users:
-
Configure query filters: Apply filter rules on a query pipeline to filter the source content that appears in search results when a query goes through that pipeline.
-
Use condition-based query pipeline routing: Apply a condition on a query pipeline to make sure that every query originating from a specific search hub is routed to the right query pipeline.
-
Configure the search token: Authenticate user queries via a search token that’s generated server-side that enforces a specific search hub.
Following the above leading practices results in a workflow whereby the user query is authenticated server side via a search token that enforces the search hub from which the query originates, which can’t be modified by users or client-side code. The query then passes through a specific query pipeline based on a search hub condition, and the query results are filtered using the pipeline filter rules.
Configure Query Filters
Filter rules allow you to enter hidden query expressions to be added to all queries going through a given query pipeline.
They’re typically used to add a field-based expression to the constant query expression (cq
).
You apply the @objectType=="Solution"
query filter to the pipeline to which the traffic of your public support portal is directed.
As a result, the @objectType=="Solution"
query expression is added to any query sent via this support portal.
Therefore, if a user types Speedbit watch wristband
in the searchbox, the items returned are those that match these keywords and whose objectType
has the Solution
value.
Items matching these keywords but having a different objectType
value aren’t returned in the user’s search results.
To learn how to configure query pipeline filter rules, see Manage Filter Rules.
|
Note
You can also enforce a filter expression directly in the search token. |
Use Condition-Based Query Pipeline Routing
The most recommended and flexible query pipeline routing mechanism is condition-based routing.
When using this routing mechanism, you ensure that search requests are routed to a specific query pipeline according to the search interface from which they originate, and the authentication is done server-side.
To accomplish this:
-
Apply a condition to a query pipeline based on a search hub value, such as Search Hub is Community Search or Search Hub is Agent Panel. This condition ensures that all queries that originate from a specific search hub go through that query pipeline.
-
Authenticate user queries via a search token that’s generated server side and that contains the search hub parameter that you specified in the query pipeline.
Configure the Search Token
When using query filters to secure content, the safest way to enforce content security is to authenticate user queries using a search token that’s generated server side. For instance, when using this approach, you can enforce a search hub value in the search token. This makes every authenticated request that originates from a component use the specified search hub, and therefore be routed to the proper query pipeline. Because this configuration is stored server side and encrypted in the search token, it can’t be modified by users or client-side code.
Implementing search token authentication requires you to add server-side logic to your web site or application. Therefore, the actual implementation details will vary from one project to another.
The following procedure provides general guidelines:
|
Note
If you’re using the Coveo In-Product Experience (IPX) feature, see Implementing Advanced Search Token Authentication. |
-
Authenticate the user.
-
Call a service exposed through Coveo to request a search token for the authenticated user.
-
Specify the
userIDs
for the search token, and enforce asearchHub
parameter in the search token.
|
Note
You can specify other parameters in the search token, such as a query |
For more information and examples, see Search Token Authentication.