Skip to content

/AWS1/IF_KND=>CREATEACCESSCONTROLCONF()

About CreateAccessControlConfiguration

Creates an access configuration for your documents. This includes user and group access information for your documents. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents.

You can use this to re-configure your existing document level access control without indexing all of your documents again. For example, your index contains top-secret company documents that only certain employees or users should access. One of these users leaves the company or switches to a team that should be blocked from accessing top-secret documents. The user still has access to top-secret documents because the user had access when your documents were previously indexed. You can create a specific access control configuration for the user with deny access. You can later update the access control configuration to allow access if the user returns to the company and re-joins the 'top-secret' team. You can re-configure access control for your documents as circumstances change.

To apply your access control configuration to certain documents, you call the BatchPutDocument API with the AccessControlConfigurationId included in the Document object. If you use an S3 bucket as a data source, you update the .metadata.json with the AccessControlConfigurationId and synchronize your data source. Amazon Kendra currently only supports access control configuration for S3 data sources and documents indexed using the BatchPutDocument API.

You can't configure access control using CreateAccessControlConfiguration for an Amazon Kendra Gen AI Enterprise Edition index. Amazon Kendra will return a ValidationException error for a Gen_AI_ENTERPRISE_EDITION index.

Method Signature

IMPORTING

Required arguments:

iv_indexid TYPE /AWS1/KNDINDEXID /AWS1/KNDINDEXID

The identifier of the index to create an access control configuration for your documents.

iv_name TYPE /AWS1/KNDACCESSCONTROLCONFNAME /AWS1/KNDACCESSCONTROLCONFNAME

A name for the access control configuration.

Optional arguments:

iv_description TYPE /AWS1/KNDDESCRIPTION /AWS1/KNDDESCRIPTION

A description for the access control configuration.

it_accesscontrollist TYPE /AWS1/CL_KNDPRINCIPAL=>TT_PRINCIPALLIST TT_PRINCIPALLIST

Information on principals (users and/or groups) and which documents they should have access to. This is useful for user context filtering, where search results are filtered based on the user or their group access to documents.

it_hierarchicalaccessctllist TYPE /AWS1/CL_KNDHIERARCHICALPRINC=>TT_HIERARCHICALPRINCIPALLIST TT_HIERARCHICALPRINCIPALLIST

The list of principal lists that define the hierarchy for which documents users should have access to.

iv_clienttoken TYPE /AWS1/KNDCLIENTTOKENNAME /AWS1/KNDCLIENTTOKENNAME

A token that you provide to identify the request to create an access control configuration. Multiple calls to the CreateAccessControlConfiguration API with the same client token will create only one access control configuration.

RETURNING

oo_output TYPE REF TO /aws1/cl_kndcreaccctlconfrsp /AWS1/CL_KNDCREACCCTLCONFRSP

Domain /AWS1/RT_ACCOUNT_ID
Primitive Type NUMC

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->/aws1/if_knd~createaccesscontrolconf(
  it_accesscontrollist = VALUE /aws1/cl_kndprincipal=>tt_principallist(
    (
      new /aws1/cl_kndprincipal(
        iv_access = |string|
        iv_datasourceid = |string|
        iv_name = |string|
        iv_type = |string|
      )
    )
  )
  it_hierarchicalaccessctllist = VALUE /aws1/cl_kndhierarchicalprinc=>tt_hierarchicalprincipallist(
    (
      new /aws1/cl_kndhierarchicalprinc(
        it_principallist = VALUE /aws1/cl_kndprincipal=>tt_principallist(
          (
            new /aws1/cl_kndprincipal(
              iv_access = |string|
              iv_datasourceid = |string|
              iv_name = |string|
              iv_type = |string|
            )
          )
        )
      )
    )
  )
  iv_clienttoken = |string|
  iv_description = |string|
  iv_indexid = |string|
  iv_name = |string|
).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
  lv_accesscontrolconfigurat = lo_result->get_id( ).
ENDIF.