Microsoft Teams is an enterprise collaboration tool for messaging, meetings and file sharing. If you are a Microsoft Teams user, you can use Amazon Kendra to index your Microsoft Teams data source.
You can connect Amazon Kendra to your Microsoft Teams data source using the Amazon Kendra console
For troubleshooting your Amazon Kendra Microsoft Teams data source connector, see Troubleshooting data sources.
Supported features
-
Field mappings
-
User access control
-
Inclusion/exclusion filters
-
Full and incremental content syncs
-
Virtual private cloud (VPC)
Prerequisites
Before you can use Amazon Kendra to index your Microsoft Teams data source, make these changes in your Microsoft Teams and AWS accounts.
In Microsoft Teams, make sure you have:
-
Created a Microsoft Teams account in Office 365.
-
Noted your Microsoft 365 tenant ID. You can find your tenant ID in the Properties of your Azure Active Directory Portal or in your OAuth application.
-
Configured an OAuth application in the Azure portal and noted the client ID and client secret or client credentials. See Microsoft tutorial
and Registered app example for more information. Note
When you create or register an app in the Azure portal, the secret ID represents the actual secret value. You must take note or save the actual secret value immediately when creating the secret and app. You can access your secret by selecting the name of your application in the Azure portal and then navigating to the menu option on certificates and secrets.
You can access your client ID by selecting the name of your application in the Azure portal and then navigating to the overview page. The Application (client) ID is the client ID.
Note
We recommend that you regularly refresh or rotate your credentials and secret. Provide only the necessary access level for your own security. We do not recommend that you re-use credentials and secrets across data sources, and connector versions 1.0 and 2.0 (where applicable).
-
Added the necessary permissions. You can choose to add all permissions, or you can limit the scope by selecting fewer permissions based on which entities you'd like to crawl. The following table lists the application level permissions by corresponding entity:
Entity Required Permissions for Data Sync Required Permissions for Identity Sync Channel Post -
ChannelMessage.Read.All
-
Group.Read.All
-
User.Read
-
User.Read.All
TeamMember.Read.All Channel Attachment -
ChannelMessage.Read.All
-
Group.Read.All
-
User.Read
-
User.Read.All
TeamMember.Read.All Channel Wiki -
Group.Read.All
-
User.Read
-
User.Read.All
TeamMember.Read.All Chat Message -
Chat.Read.All
-
ChatMessage.Read.All
-
ChatMember.Read.All
-
User.Read
-
User.Read.All
-
Group.Read.All
TeamMember.Read.All Meeting Chat -
Chat.Read.All
-
ChatMessage.Read
-
ChatMember.Read.All
-
User.Read
-
User.Read.All
-
Group.Read.All
TeamMember.Read.All Chat Attachment -
Chat.Read.All
-
ChatMessage.Read
-
ChatMember.Read.All
-
User.Read
-
User.Read.All
-
Group.Read.All
TeamMember.Read.All Meeting File -
Chat.Read.All
-
ChatMessage.Read.All
-
ChatMember.Read.All
-
User.Read
-
User.Read.All
-
Group.Read.All
-
Files.Read.All
TeamMember.Read.All Calendar Meeting -
Chat.Read.All
-
ChatMessage.Read.All
-
ChatMember.Read.All
-
User.Read
-
User.Read.All
-
Group.Read.All
-
Files.Read.All
TeamMember.Read.All Meeting Notes -
User.Read
-
User.Read.All
-
Group.Read.All
-
Files.Read.All
TeamMember.Read.All -
-
Checked each document is unique in Microsoft Teams and across other data sources you plan to use for the same index. Each data source that you want to use for an index must not contain the same document across the data sources. Document IDs are global to an index and must be unique per index.
In your AWS account, make sure you have:
-
Created an Amazon Kendra index and, if using the API, noted the index ID.
-
Created an IAM role for your data source and, if using the API, noted the ARN of the IAM role.
Note
If you change your authentication type and credentials, you must update your IAM role to access the correct AWS Secrets Manager secret ID.
-
Stored your Microsoft Teams authentication credentials in an AWS Secrets Manager secret and, if using the API, noted the ARN of the secret.
Note
We recommend that you regularly refresh or rotate your credentials and secret. Provide only the necessary access level for your own security. We do not recommend that you re-use credentials and secrets across data sources, and connector versions 1.0 and 2.0 (where applicable).
If you don’t have an existing IAM role or secret, you can use the console to create a new IAM role and Secrets Manager secret when you connect your Microsoft Teams data source to Amazon Kendra. If you are using the API, you must provide the ARN of an existing IAM role and Secrets Manager secret, and an index ID.
Connection instructions
To connect Amazon Kendra to your Microsoft Teams data source, you must provide the necessary details of your Microsoft Teams data source so that Amazon Kendra can access your data. If you have not yet configured Microsoft Teams for Amazon Kendra, see Prerequisites.
To connect Amazon Kendra to Microsoft Teams
-
Sign in to the AWS Management Console and open the Amazon Kendra console
. -
From the left navigation pane, choose Indexes and then choose the index you want to use from the list of indexes.
Note
You can choose to configure or edit your User access control settings under Index settings.
-
On the Getting started page, choose Add data source.
-
On the Add data source page, choose Microsoft Teams connector, and then choose Add connector. If using version 2 (if applicable), choose Microsoft Teams connector with the "V2.0" tag.
-
On the Specify data source details page, enter the following information:
-
In Name and description, for Data source name—Enter a name for your data source. You can include hyphens but not spaces.
-
(Optional) Description—Enter an optional description for your data source.
-
In Default language—Choose a language to filter your documents for the index. Unless you specify otherwise, the language defaults to English. Language specified in the document metadata overrides the selected language.
-
In Tags, for Add new tag—Include optional tags to search and filter your resources or track your AWS costs.
-
Choose Next.
-
-
On the Define access and security page, enter the following information:
-
Tenant ID—Enter your Microsoft 365 tenant ID. You can find your tenant ID in the Properties of your Azure Active Directory Portal or in your OAuth application.
-
Authorization—Turn on or off access control list (ACL) information for your documents, if you have an ACL and want to use it for access control. The ACL specifies which documents that users and groups can access. The ACL information is used to filter search results based on the user or their group access to documents. For more information, see User context filtering.
-
AWS Secrets Manager secret—Choose an existing secret or create a new Secrets Manager secret to store your Microsoft Teams authentication credentials. If you choose to create a new secret an AWS Secrets Manager secret window opens.
-
Enter following information in the Create an AWS Secrets Manager secret window:
-
Secret name—A name for your secret. The prefix ‘AmazonKendra-Microsoft Teams-’ is automatically added to your secret name.
-
For Client ID and Client secret—Enter the authentication credentials configured in Microsoft Teams in the Azure portal.
-
-
Save and add your secret.
-
-
Payment model—You can choose a licensing and payment model for your Microsoft Teams account. Model A payment models are restricted to licensing and payment models that require security compliance. Model B payment models are suitable for licensing and payment models that do not require security compliance.
-
Virtual Private Cloud (VPC)—You can choose to use a VPC. If so, you must add Subnets and VPC security groups.
-
Identity crawler—Specify whether to turn on Amazon Kendra’s identity crawler. The identity crawler uses the access control list (ACL) information for your documents to filter search results based on the user or their group access to documents. If you have an ACL for your documents and choose to use your ACL, you can then also choose to turn on Amazon Kendra’s identity crawler to configure user context filtering of search results. Otherwise, if identity crawler is turned off, all documents can be publicly searched. If you want to use access control for your documents and identity crawler is turned off, you can alternatively use the PutPrincipalMapping API to upload user and group access information for user context filtering.
-
IAM role—Choose an existing IAM role or create a new IAM role to access your repository credentials and index content.
Note
IAM roles used for indexes cannot be used for data sources. If you are unsure if an existing role is used for an index or FAQ, choose Create a new role to avoid errors.
-
Choose Next.
-
-
On the Configure sync settings page, enter the following information:
-
Sync contents—Select the types of content to crawl. You can choose to crawl chat, teams, and calendar content.
-
Additional configuration—Specify certain calendar start and end dates, user emails, team names, and channel names, attachments, and OneNotes.
-
Sync mode—Choose how you want to update your index when your data source content changes. When you sync your data source with Amazon Kendra for the first time, all content is crawled and indexed by default. You must run a full sync of your data if your initial sync failed, even if you don't choose full sync as your sync mode option.
-
Full sync: Freshly index all content, replacing existing content each time your data source syncs with your index.
-
New, modified sync: Index only new and modified content each time your data source syncs with your index. Amazon Kendra can use your data source's mechanism for tracking content changes and index content that changed since the last sync.
-
New, modified, deleted sync: Index only new, modified, and deleted content each time your data source syncs with your index. Amazon Kendra can use your data source's mechanism for tracking content changes and index content that changed since the last sync.
-
-
In Sync run schedule, for Frequency—Choose how often to sync your data source content and update your index.
-
Choose Next.
-
-
On the Set field mappings page, enter the following information:
-
Default data source fields—Select from the Amazon Kendra generated default data source fields you want to map to your index.
-
Add field—To add custom data source fields to create an index field name to map to and the field data type.
-
Choose Next.
-
-
On the Review and create page, check that the information you have entered is correct and then select Add data source. You can also choose to edit your information from this page. Your data source will appear on the Data sources page after the data source has been added successfully.
Learn more
To learn more about integrating Amazon Kendra with your Microsoft Teams data source, see: