How Amazon Q Business connector crawls GitHub (Cloud) ACLs
When you connect an GitHub (Cloud) data source to Amazon Q Business, Amazon Q crawls ACL information attached to a document (user and group information) from your GitHub (Cloud) instance. If you choose to activate ACL crawling, the information can be used to filter chat responses to your end user's document access level.
The user IDs are mapped as follows:
-
_user_id
– User IDs exist in GitHub (Cloud) on files where there are set access permissions. They are mapped from the user emails as the IDs in GitHub (Cloud) if the email is public in a GitHub (Cloud) profile. If the email in a GitHub (Cloud) profile is not public, they are mapped from the username as the IDs.
For more information, see: