Skip to content

Commit

Permalink
Remove reference to provisioning Amazon Q users, since user provision…
Browse files Browse the repository at this point in the history
…ing has now been disabled in preview
  • Loading branch information
rstrahan committed Dec 7, 2023
1 parent 964cd36 commit 8fa4739
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions lambdas/qna_bot_qbusiness_lambdahook/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,8 +27,8 @@ Use AWS CloudFormation to deploy one or more of the sample plugin Lambdas in you

*Note on UserId:*
You have two options:
1. (Default) Map each bot user's email to a Q Business userid. This means that each QnAbot user must be an authenticated user (e.g. logged in via Cognito using Lex Web UI) and the user's email must mapped to a provisioned user in Amazon Q. ACLs will be observed per user. This is the default setup.
2. (Proxy) Alternatively, when you deploy you can choose a single email to use when QnABot invokes Amazon Q. This removes the need for QnABot users to be authenticated (logged in) or for their emails to be registered in Amazon Q, but it also means that no per-user ACLs are supported since ACLS will be based on the single proxy userId. Requests will be throttled based on the user request quota.
1. (Default) Map each bot user's email to a Q Business userid. This means that each QnAbot user must be an authenticated user (e.g. logged in via Cognito using Lex Web UI). ACLs will be observed per user. This is the default setup.
2. (Proxy) Alternatively, when you deploy you can choose a single email to use when QnABot invokes Amazon Q. This removes the need for QnABot users to be authenticated (logged in), but it also means that no per-user ACLs are supported since ACLS will be based on the single proxy userId.


#### <u>N. Virginia (us-east-1)</u>
Expand Down

0 comments on commit 8fa4739

Please sign in to comment.