Knowledge Source Configurations (KSC)
Knowledge Source Configurations (KSCs) combine multiple knowledge sources into a single configuration that channels and deal rooms use. This page allows administrators to create and manage these configurations to control which content the AI can access in different contexts.
Overview
Each channel is linked to exactly one KSC, which determines what information the AI can retrieve and use for responses. KSCs provide a way to group knowledge sources logically and control access to confidential content.
Confidentiality Cascade Rules: If any source in a KSC is confidential → the KSC is confidential → only confidential channels can use it.
See detailed explanation: Confidentiality Rules
Key Capabilities
KSC Management
Add Knowledge Source Configuration
The "Add a knowledge source configuration" button opens a form to create new configurations:
Required Information:
- Configuration Name: Descriptive identifier for the KSC
- Confidentiality Setting: Mark entire configuration as confidential if needed
- Knowledge Sources: Select which sources to include
- Description: Optional documentation of the KSC's purpose
KSC Table
The main table displays all existing configurations:
Column | Description |
---|---|
Name | Configuration name and identifier |
Confidential | Checkbox indicating if KSC contains confidential sources |
Knowledge Sources | List of included knowledge sources |
Last Updated | Most recent modification date |
Configuration Actions
- Edit Configuration: Click any row to modify KSC settings
- Usage Monitoring: Track which channels use each KSC
- Source Management: Add or remove knowledge sources from configurations
KSC Detail Page
Clicking a KSC row opens a configuration page with a summary card and source management:
Summary Card
The summary card displays and allows editing of key configuration information:
Card Contents:
- KSC ID: Unique identifier for the configuration (read-only)
- Name: Editable configuration name with pencil icon for inline editing
- Confidential Toggle: Switch to mark entire configuration as confidential
- Description: Editable description field with pencil icon for inline editing
Card Actions:
- Edit Name: Click pencil icon to modify the configuration name
- Edit Description: Click pencil icon to update the configuration description
- Toggle Confidentiality: Use the toggle switch to mark the configuration as confidential
- Save Changes: Changes are automatically saved when modified
Knowledge Sources Multi-Select Field
The main interface for managing which knowledge sources are included in this configuration:
Multi-Select Interface:
- Knowledge Sources Field: Multi-select dropdown showing all available knowledge sources
- Current Sources: Selected sources are displayed as removable items
- Add Sources: Use the dropdown to select additional sources to include
- Remove Sources: Click the "×" on individual sources to remove them
- Search Function: Type in the dropdown to filter available sources
- Bulk Selection: Select multiple sources at once from the dropdown
Because a KSC may be used by multiple channels and deal rooms, modifications here have a broad impact. Before adding or removing sources, confirm that the change will not inadvertently remove critical content or expose confidential material.
Confidentiality Management
Configuration-Level Settings:
- Confidential Toggle: Marks entire KSC as confidential
- Source-Level Inheritance: Individual source confidentiality settings are also respected
- Channel Restrictions: Confidential KSCs can only be used by private channels
- Access Control: Public channels cannot access confidential KSCs
How KSCs Work
Channel Integration
- Single KSC per Channel: Each channel references exactly one KSC
- Content Access: AI can only access knowledge sources included in the channel's KSC
- Dynamic Updates: KSC changes immediately affect all linked channels
- Confidentiality Enforcement: System enforces confidential access rules
Content Aggregation
- Source Combination: KSC aggregates content from multiple knowledge sources
- Unified Search: AI searches across all included sources simultaneously
- Priority Handling: All sources have equal priority unless otherwise configured
- Conflict Resolution: System handles overlapping or conflicting information
Access Control Model
Configuration Strategies
By Use Case
Public Information KSC:
- Public documentation
- Marketing materials
- General product information
- Non-confidential support content
Internal Knowledge KSC:
- Internal procedures
- Confidential documentation
- Employee resources
- Sensitive product details
Customer-Specific KSC:
- Account-specific information
- Custom implementations
- Private agreements
- Specialized configurations
By Department
Sales KSC:
- Product information
- Pricing guidelines
- Sales playbooks
- Customer success stories
Support KSC:
- Technical documentation
- Troubleshooting guides
- Known issues database
- Resolution procedures
Engineering KSC:
- Technical specifications
- API documentation
- Code repositories
- Development guidelines
Troubleshooting
Channel Missing Data
If a channel can't find expected information:
- KSC Verification: Check that the channel's KSC includes the correct knowledge sources
- Source Status: Verify included sources are active and properly ingested
- Confidentiality Match: Ensure confidential settings align between sources, KSC, and channel
- Recent Changes: Check if sources were recently removed from the KSC
- Source Content: Verify the knowledge source actually contains the expected information
Unintended Content Disclosure
If confidential information appears in public channels:
- Confidentiality Audit: Review confidential flags on sources and KSC
- Channel Review: Check which channels use the KSC
- Source Classification: Verify individual source confidentiality settings
- Immediate Action: Remove problematic sources from public KSCs
- Process Review: Update procedures to prevent future disclosure
Performance Issues
If responses are slow or incomplete:
- Source Count: Large numbers of sources in a KSC can slow retrieval
- Source Size: Very large knowledge sources may impact performance
- Optimization: Consider splitting large KSCs into more focused configurations
- Monitoring: Use response analytics to identify performance bottlenecks
Best Practices
Configuration Design
- Logical Grouping: Group sources by purpose, audience, or content type
- Clear Naming: Use descriptive names that indicate KSC purpose and scope
- Documentation: Maintain clear descriptions for each KSC
- Regular Review: Periodically audit KSC contents and usage
- Change Planning: Consider impact before modifying existing KSCs
Security Management
- Confidentiality Principle: Mark KSCs confidential when containing any sensitive sources
- Least Privilege: Only include sources necessary for the intended use case
- Regular Audits: Review confidential settings and channel assignments
- Change Documentation: Log changes to confidential KSCs for compliance
- Access Validation: Verify that channel confidentiality settings match KSC requirements
Operational Excellence
- Backup Strategy: Consider creating new KSCs instead of modifying critical existing ones
- Testing: Test KSC changes in development channels before production use
- Monitoring: Track response quality after KSC modifications
- Communication: Inform stakeholders of planned KSC changes
- Rollback Plan: Know how to quickly revert problematic changes
Related Features
- Knowledge Sources - Manage the individual sources that make up KSCs
- Channels - Configure which KSC each channel uses
- Deal Rooms - Create deal rooms with specific KSC configurations
- Responses - Monitor how KSC configurations affect AI response quality