Community articleSeedlist SPI
Added by IBM contributorIBM | Edited by IBM contributorLDD Webmaster on March 28, 2016
Rate this article 1 starsRate this article 2 starsRate this article 3 starsRate this article 4 starsRate this article 5 stars

Use the Seedlist service provider interface (SPI) provided with IBM® Connections to integrate your search engine with IBM Connections content.




Use the Seedlist service provider interface (SPI) provided with IBM® Connections to integrate your search engine with IBM Connections content.

This SPI applies to versions 4.5 of IBM Connections and later. Changes to your application may be required to maintain equivalent functionality when integrating with a future release.

Unlike the general purpose IBM Connections application programming interfaces (API), the Seedlist SPI is intended specifically for the purpose of creating a search index. Independent applications that use this SPI should carefully follow all aspects of the framework outlined in this document to correctly index all content without impeding the operation of the IBM Connections server. Implementers should have a good understanding of REST-style architecture and the Atom syndication format.

In addition, an independent application using these interfaces must be carefully constructed to correctly use the access control information provided by this SPI and the application must ensure that nonpublic crawled information is only made available to those users who are intended to have access to it.

 

Securing access to seedlist SPIs
Make sure that you secure the seedlist SPIs.

Crawling data
IBM Connections enables crawling of content through its seedlist SPIs. These interfaces provide a mechanism for iterating over all indexable text content and for iterating over only recently updated content.

Validating access at query time
The seedlist SPIs allow all IBM Connections content to be crawled, including access-controlled content. You must take steps to ensure that the data is accessed by only those with the appropriate access privileges.