Skip to main content

Knowledge Source Configurations (KSC)

Knowledge Source Configurations (KSCs) combine multiple knowledge sources into a single configuration that channels and deal rooms use. This page allows administrators to create and manage these configurations to control which content the AI can access in different contexts.

Overview

Each channel is linked to exactly one KSC, which determines what information the AI can retrieve and use for responses. KSCs provide a way to group knowledge sources logically and control access to confidential content.

Before You Go Live

Confidentiality Cascade Rules: If any source in a KSC is confidential → the KSC is confidential → only confidential channels can use it.

See detailed explanation: Confidentiality Rules

Key Capabilities

KSC Management

Add Knowledge Source Configuration

The "Add a knowledge source configuration" button opens a form to create new configurations:

Required Information:

  • Configuration Name: Descriptive identifier for the KSC
  • Confidentiality Setting: Mark entire configuration as confidential if needed
  • Knowledge Sources: Select which sources to include
  • Description: Optional documentation of the KSC's purpose

KSC Table

The main table displays all existing configurations:

ColumnDescription
NameConfiguration name and identifier
ConfidentialCheckbox indicating if KSC contains confidential sources
Knowledge SourcesList of included knowledge sources
Last UpdatedMost recent modification date

Configuration Actions

  • Edit Configuration: Click any row to modify KSC settings
  • Usage Monitoring: Track which channels use each KSC
  • Source Management: Add or remove knowledge sources from configurations

KSC Detail Page

Clicking a KSC row opens a configuration page with a summary card and source management:

Summary Card

The summary card displays and allows editing of key configuration information:

Card Contents:

  • KSC ID: Unique identifier for the configuration (read-only)
  • Name: Editable configuration name with pencil icon for inline editing
  • Confidential Toggle: Switch to mark entire configuration as confidential
  • Description: Editable description field with pencil icon for inline editing

Card Actions:

  • Edit Name: Click pencil icon to modify the configuration name
  • Edit Description: Click pencil icon to update the configuration description
  • Toggle Confidentiality: Use the toggle switch to mark the configuration as confidential
  • Save Changes: Changes are automatically saved when modified

Knowledge Sources Multi-Select Field

The main interface for managing which knowledge sources are included in this configuration:

Multi-Select Interface:

  • Knowledge Sources Field: Multi-select dropdown showing all available knowledge sources
  • Current Sources: Selected sources are displayed as removable items
  • Add Sources: Use the dropdown to select additional sources to include
  • Remove Sources: Click the "×" on individual sources to remove them
  • Search Function: Type in the dropdown to filter available sources
  • Bulk Selection: Select multiple sources at once from the dropdown
Impact Warning

Because a KSC may be used by multiple channels and deal rooms, modifications here have a broad impact. Before adding or removing sources, confirm that the change will not inadvertently remove critical content or expose confidential material.

Confidentiality Management

Configuration-Level Settings:

  • Confidential Toggle: Marks entire KSC as confidential
  • Source-Level Inheritance: Individual source confidentiality settings are also respected
  • Channel Restrictions: Confidential KSCs can only be used by private channels
  • Access Control: Public channels cannot access confidential KSCs

How KSCs Work

Channel Integration

  1. Single KSC per Channel: Each channel references exactly one KSC
  2. Content Access: AI can only access knowledge sources included in the channel's KSC
  3. Dynamic Updates: KSC changes immediately affect all linked channels
  4. Confidentiality Enforcement: System enforces confidential access rules

Content Aggregation

  • Source Combination: KSC aggregates content from multiple knowledge sources
  • Unified Search: AI searches across all included sources simultaneously
  • Priority Handling: All sources have equal priority unless otherwise configured
  • Conflict Resolution: System handles overlapping or conflicting information

Access Control Model

Configuration Strategies

By Use Case

Public Information KSC:

  • Public documentation
  • Marketing materials
  • General product information
  • Non-confidential support content

Internal Knowledge KSC:

  • Internal procedures
  • Confidential documentation
  • Employee resources
  • Sensitive product details

Customer-Specific KSC:

  • Account-specific information
  • Custom implementations
  • Private agreements
  • Specialized configurations

By Department

Sales KSC:

  • Product information
  • Pricing guidelines
  • Sales playbooks
  • Customer success stories

Support KSC:

  • Technical documentation
  • Troubleshooting guides
  • Known issues database
  • Resolution procedures

Engineering KSC:

  • Technical specifications
  • API documentation
  • Code repositories
  • Development guidelines

Troubleshooting

Channel Missing Data

If a channel can't find expected information:

  1. KSC Verification: Check that the channel's KSC includes the correct knowledge sources
  2. Source Status: Verify included sources are active and properly ingested
  3. Confidentiality Match: Ensure confidential settings align between sources, KSC, and channel
  4. Recent Changes: Check if sources were recently removed from the KSC
  5. Source Content: Verify the knowledge source actually contains the expected information

Unintended Content Disclosure

If confidential information appears in public channels:

  1. Confidentiality Audit: Review confidential flags on sources and KSC
  2. Channel Review: Check which channels use the KSC
  3. Source Classification: Verify individual source confidentiality settings
  4. Immediate Action: Remove problematic sources from public KSCs
  5. Process Review: Update procedures to prevent future disclosure

Performance Issues

If responses are slow or incomplete:

  1. Source Count: Large numbers of sources in a KSC can slow retrieval
  2. Source Size: Very large knowledge sources may impact performance
  3. Optimization: Consider splitting large KSCs into more focused configurations
  4. Monitoring: Use response analytics to identify performance bottlenecks

Best Practices

Configuration Design

  1. Logical Grouping: Group sources by purpose, audience, or content type
  2. Clear Naming: Use descriptive names that indicate KSC purpose and scope
  3. Documentation: Maintain clear descriptions for each KSC
  4. Regular Review: Periodically audit KSC contents and usage
  5. Change Planning: Consider impact before modifying existing KSCs

Security Management

  1. Confidentiality Principle: Mark KSCs confidential when containing any sensitive sources
  2. Least Privilege: Only include sources necessary for the intended use case
  3. Regular Audits: Review confidential settings and channel assignments
  4. Change Documentation: Log changes to confidential KSCs for compliance
  5. Access Validation: Verify that channel confidentiality settings match KSC requirements

Operational Excellence

  1. Backup Strategy: Consider creating new KSCs instead of modifying critical existing ones
  2. Testing: Test KSC changes in development channels before production use
  3. Monitoring: Track response quality after KSC modifications
  4. Communication: Inform stakeholders of planned KSC changes
  5. Rollback Plan: Know how to quickly revert problematic changes
  • Knowledge Sources - Manage the individual sources that make up KSCs
  • Channels - Configure which KSC each channel uses
  • Deal Rooms - Create deal rooms with specific KSC configurations
  • Responses - Monitor how KSC configurations affect AI response quality