Chatbot Overview
Conversational Bots
Intents & Entities
Intelligent Bots's Approach Conversational Platform
Bot Concepts and Terminology
Natural Language Processing (NLP)
Bot Types
Bot Tasks
Starting with Platform
How to Access Bot Builder
Working with Bot Builder
Building your first Bot
Getting Started with Building Bots
Using the Dialog Builder Tool
Creating a Simple Bot
Release Notes
Latest Updates
Older Releases
Bot Builder
Creating a Bot
Dialog Task
Working with User Intent Node
Working with the Dialog Node
Working with Entity Node
Supported Entity Types
Working with Composite Entities
Supported Time Zones
Supported Colors
Supported Company Names
Working with Message Nodes
Working with the Confirmation Nodes
Working with Service Node
Implementing Custom Authentication
Enabling 2-way SSL for Service nodes
Working with Script Node
Working with Agent Transfer Node
Working with WebHook Node
Defining Connections & Transitions
Managing Dialogs
Prompt Editor
Action & Information Task
Working with Action Tasks
Working with Information Tasks
Establishing Flows
Alert Tasks
Working with Alert Tasks
Managing Ignore Words and Field Memory
Knowledge Graph
Building Knowledge Graph
Generation of Knowledge Graph
Importing and Exporting Knowledge Graph
Knowledge Graph Analysis
Knowledge Extraction
Natural Language
Machine Learning
ML Model
Fundamental Meaning
Knowledge Graph Training
Ranking and Resolver
NLP Detection
NLP Settings and Guidelines
Bot Intelligence
Context Management
Session and Context Variables
Context Object
Dialog Management
Amend Entity
Multi-Intent Detection
Sentiment Management
Tone Analysis
Sentiment Management
Default Conversations
Default Standard Responses
Channel Enablement
Test & Debug
Talking to Bot
Utterance Testing
Batch Testing
Recording Conversations
Publishing your Bot
Analyzing your Bot
Custom Dashboard
Conversation Flows
Bot Metrics
Advanced Topics
Bot Authorization
Language Management
Collaborative Development
IVR Integration
Universal Bots
Enabling Languages
Smart Bots
Sample Bots
Travel Planning
Flight Search
Event Based Bot Actions
Bot Settings
Bot Functions
General Settings
PII Settings
Customizing Error Messages
Bot Management
Using Bot Variables
API Guide
API Overview
API List
API Collection
SDK Overview
SDK Security
SDK App Registration Web SDK Tutorial
Message Formatting and Templates
Mobile SDK Push Notification
Web Socket Connect & RTM
Using the BotKit SDK
Installing the BotKit SDK
BotKit SDK Configuration
Events for the BotKit SDK
Functions for the BotKit SDK
BotKit SDK Tutorial – Agent Transfer
BotKit SDK Tutorial – Flight Search Sample Bot
Using an External NLP Engine
Bot Administration
Bots Admin Console
User Management
Managing Users
Managing Groups
Managing Role
Bots Management
Inviting Users
Sending Bulk Invites to Enroll Users
Importing Users and User Data
Synchronizing Users from Active Directory
Security & Compliance
Using Single Sign-On
Cloud Connector
How Tos
Context Switching
Using Traits
Live Agent Transfer
Schedule a Smart Alert
Configure Agent Transfer
Custom Dashboard
Patterns for Intents & Entities
Build Knowledge Graph
  1. Home
  2. Docs
  3. Bots
  4. Bot Administration
  5. Security & Compliance
  6. Connector Connector

On the Connector page, in the Security & Control module of the Bots Admin Console, you can download and configure the Connector Agent for Bots within your secure company intranet to provide secure communications between the Bots platform in the cloud and your network.

Why Connector? Bots are designed to make updates, provide notifications to users, and perform tasks. The tasks to perform are received from or performed on third-party applications available over the Internet as web-based applications or on-premises bots applications.

In a bots on-premises system, communications security is maintained by restricting users and systems within the company intranet or by configuring specific channels for specific data exchange. On the contrary, Bots reside and process data in the cloud environment and cannot directly connect to your bots premises applications.

You can use the Connector Agent to establish and maintain secure data connectivity between and your on-premises applications within your intranet.

The Connector is a stand-alone application that is installed and configured within your company intranet configured with restricted and secure connectivity to specified bots applications. The Connector Agent is designed to pass requests for data access between your on-premises applications and to process the specific Bot tasks configured by an end-user with rights and privileges for those applications.

The following illustration shows the Connector page in the Bots Admin Console Security & Control module. Connector Page Controls

The following controls are available on the Connector page in the Bots Admin Console.

Download Connector – Click the Download Connector drop-down arrow in and then select one of the following operating systems:

  • Windows Based
  • Unix/Linux Based

Download the Connector Agent to your default browser downloads directory. Install the agent in your DMZ or Intranet. For more information, see Installing the Connector Agent.

Add Connector – Click to add up to two connectors. After a connector is added, you should install and configure the Connector Agent.

Actions Menu – On the Connector page, against each added connector, click the Ellipsis  icon to display the Actions menu to run the following commands:

  • Instructions – Displays the Connector Instructions dialog that describes the overall steps to install and configure the Connector Agent.
  • Edit – Displays the Connector Details dialog that shows the Connector name, description, ID, status as CONNECTED or DISCONNECTED, and Last Connected date.
  • Generate Certificate – Displays the Generate Signed Certificate dialog used to create a .pem file for security along with instructions on how to create the file. For more information, see Installing the Connector Agent.
  • Enable/Disable – Click to show the Are you sure you want to enable this connector? dialog. Click Continue to enable the connector. When enabling a connector, any other enabled instances of the Connector Agent are disabled.
  • Delete – Click to display the Delete Connector dialog. To permanently delete the connector, click Confirm.


The Connector is an agent that runs behind your bots firewall within your company Intranet or perimeter network (DMZ) to provide secure data exchange between which operates in the cloud and your on-premises applications.

In the following diagram, end-users configure a Bot that connects to in the cloud. The Bot servers (5) contact the Connector Gateway (2) with the Bot request. The Connector Gateway relays the request to the Connector (3) installed and securely configured in your on-premises Intranet or DMZ to interact with your bots applications. The response from your applications is sent through the Connector back out to the cloud and processed. Optionally, you can enable your on-premises applications to push data, for example, alert messages, to the cloud using webhooks.


How it Works

After you install the Connector in your network, you configure the agent with details to specifically access, communicate, and request or post data to the bots application you define.

When started, the Connector Agent initiates a persistent SSL connection with and monitors requests for data transfer to or from your bots applications and If the persistent connection is broken, the Connector automatically attempts to reestablish communication. You can monitor connectivity directly in the Bots Admin console.


This topic describes how to install and configure the Connector Agent for Bots that you can use to securely connect the cloud-based Bots platform to your on-premises applications in your company Intranet.


To install the Connector, you should review the following hardware and software requirements.

Hardware Requirements

The server hosting the Connector Agent should have:
Hard disk space: 10 GB – To support the following:

  • Connector download – 10MB
  • Installation Files – 20MB
  • Logging and Configuration Files – < 5GB

Software Requirements

The Connector supports both Windows and Linux operating systems as follows:


The following Red Hat® Enterprise Linux® versions are supported:

  • RHEL 5 (32-bit and 64-bit)
  • RHEL 6 (32-bit and 64-bit)
  • RHEL 7 (64-bit)

The following CentOS versions are supported:

  • CentOS 5 (32-bit and 64-bit)
  • CentOS 6 (32-bit and 64-bit)
  • CentOS 7 (64-bit)

Node.js – Required to run the Connector Agent. Download and install from on the server where the Connector Agent is installed.


The following Microsoft Windows 64-bit operating systems are supported:

  • Windows 7 (64-bit)
  • Windows 8.1 (64-bit)
  • Windows 10 (64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2012 (64-bit)
  • Windows Server 2012 R2 (64-bit)

Node.js – Required to run the Connector Agent. Download and install from on the server where the Connector Agent is installed. In addition, you must also install the forever module. After node.js is installed, run the following command to install the forever module.
npm  install forever -g

Installation Process

This section describes the installation and configuration of your application server where the Connector Agent is installed, the configuration required in the Bots Admin Console, and finally, enabling enterprise Bots for the Connector Agent and deploying the upgraded Bots for enterprise users.


In the Bots Admin Console, you begin by adding a connector. When you add a connection, a unique ID is created for your company and your unique Connector.

  1. In the Bots Admin Console, in the Security & Control module, on the Connector page, click Add Connector. The Add Connector dialog is displayed.
  2. Optionally, in the first field, edit the name of the connector, and then enter a Description for the connector in the second field.
  3. Click Add. The Connector Instructions dialog is displayed as shown in the following illustration.
    Bots Admin Security Module Connector Instructions Dialog
  4. In the Connector Instructions dialog, click OK. The Connector page is displayed.
  5. In the Download Connector drop-down list, select you operating system and download the Connector Agent compressed file, one of:
    1. Linux/Unix – kore-connector-1.0.0.tar.gz
    2. Windows –
  6. Copy, and then uncompress the file to your application server.
    1. For Linux, use the following command:
      tar -xvf kore-connector-X.X.X.tar.gz
    2. For Windows, in File Explorer, right-click the file and select Extract to on the command menu.

The Connector Agent file is uncompressed into the following directory structure. Connector Directories

Generating a Signed Security Certificate

For secure data exchange between the servers in the cloud and your intranet, you need to generate a signed security certificate. First, create a .csr file on your application server using the command displayed in the Bots Admin Console, and then paste the content of the .csr file into the Generate Signed Certificate dialog. The .csr content is used to generate and download the .pem file. You will then copy the .pem file back to the Connector Agent installed on your application server.

  1. In the Bots Admin Console, in the Security & Control module, on the Connector page, click the Ellipsis  icon.
  2. On the Actions menu, click Generate Certificate. The Generate Signed Certificate dialog is displayed as shown in the following illustration.
  3. Review the instructions, and then copy your custom command displayed after step 6 in the instructions as shown in the following illustration.
  4. Paste and run the command on your application server within your company intranet in the /Credentials directory created when you installed the Connector Agent.
  5. In the /Credentials directory, the Kore.aiConnector.csr file is created, along with the Kore.aiConnector.key file. Open the Kore.aiConnector.csr file using a text editor, and copy the entire contents of the file, and then paste the contents into the Certificate signing request field in the Generate Signed Certificate dialog as shown in the following illustration.
  6. Click Generate. The Download Certificate and View Certificate buttons are displayed.
  7. Click Download Certificate. The Kore.aiConnectorCert.pem file is downloaded to your local computer browser default downloads folder.
  8. Copy the Kore.aiConnectorCert.pem file to the /Credentials folder created when you installed the Connector on your application server.

Your security files are in-place on the application server.


After you install the Connector Agent software, you must verify or set the properties for:

  • Certificate Information – See credentials in the connectorconfig.json file.
  • Log Directories – See logger in the connectorconfig.json file.
  • Cluster Environment – See cluster in the connectorconfig.json file.
  • Proxy Control for Outbound Connections – See tunnel in the connectorconfig.json file.
  • Access Control for Enterprise Applications – See the accesscontrol.json file.

Default Configuration Settings – connectorconfig.json

This section shows the default configuration settings for certificate information, logging, and cluster mode settings in the < Connector agent Installation Path >/config/connectorconfig.json file:


Certificate Information

You may want to store the security keys for the Connector Agent in another location other than the installation directory for the Connector Agent. You can move the credential files to another directory on the application server or another server in the network and specify the relative or absolute path in the credentials section in the connectorconfig.json file that contains the following parameters:

  • key – The client certificate. Default setting is:
  • cert – The .pem file generated in the Bots Admin Console. Default setting is:
  • ca –  Installed as part of the Connector Agent. Default setting is:

Logging Configuration

The Connector Agent generates two logging files at runtime:

  • kore-connector.log.< dd-MM-yyyy > – Application logging events to include:
    • Connector status – Any change in status such as agent start or stop is added as a log entry.
    • Errors – Any error message for the agent is captured in the app.log file.
  • kore-connector-audit.log.< dd-MM-yyyy > – Audit logging events.
    • Configuration changes – Any changes in connectorconfig.json file and accesscontrol.json file. The original file is backed up automatically and a log entry is made.
    • Requested URLs – All requested URLs coming into the Connector are captured as a log entry.

By default, logging files for the application and auditing logs are created and stored in the default installation pat in the < Connector Agent Installation Path >/logs and < Connector Agent Installation Path >/audits. You can specify another directory on the application server or another server in the network and specify the full path.
You can also increase or decrease the logging levels as needed for either logging file as:

  • fatal – Any error that is forcing a shutdown of the service or application to prevent data loss or further data loss. Occurs only once in a process and is usually the last entry in a log.
  • critical – An error which requires immediate investigation that has not yet shut down a service or application, but is likely to do so.
  • error – Any error which is fatal to the current operation but not fatal to the service or application, for example, cannot open a file, missing file, or missing data. This type of errors usually requires administrator intervention.
  • warn – Anything that can potentially cause application abnormalities with the ability to recover, for example, switching from a primary to backup server, retrying, or missing secondary data.
  • info – General information about normal application operations such as start and planning stopping of service, configuration assumptions, and so forth. This is the default setting for the Connector Agent.
  • debug – Diagnostic information, usually for system administrators and IT personnel.
  • trace – All operational information, for example, parts of a function.

Each log level below fatal includes the information from any logging level above. For example, the default level as info includes all the information for fatal, critical, error, warn, and info in the log file.

Scalability and Cluster Configuration

The Connector Agent is scalable to handle the request load as required. When you install the Connector Agent, cluster mode settings are enabled by default, with 2 workers, or CPUs, set for use.

For increased load handling for requests by the Connector Agent, you may want to enable more workers. If you do not want to use cluster mode, set the “enabled” property to false.

You can also run cloud connectors in more than one server to meet failover as well as scalability requirements. Certificate and other configurations will remain same. Cloud Connector is a client which makes outboud connection to Cloud Gateway. When more than one connectors are connected, Cloud Gateway will distribute the load to the connectors.

Proxy Control for Outbound Connections

You can configure outbound proxy settings for the Connector Agent in the < Connector agent Installation Path >/config/connectorconfig.json file. This configuration is optional unless all of your outbound data is routed through a proxy server.
To configure outbound proxy settings, add the following configuration shown as the entry labeled tunnel in the following configuration sample:


Access Control for Applications

The Connector Agent requires an explicit set of white-listed URLs to access specific applications on your company intranet. Any other HTTP requests are denied by the Connector.
You must configure access control for each bot application that will use the Connector Agent in the accesscontrol.json file in the Connector installation directory in the …/config/configs directory with the following parameters:

  • virtualhost – Specify the virtual host name exactly as specified in the Request URL property in the Set Up Request Chain dialog while configuring on-premises bots in the Bot Builder tool. For more information, see Defining a Request Chain Object in the Bot Builder documentation.
  • virtualport – Specify the virtual port exactly as specified in the Request URL property in the Set Up Request Chain dialog while configuring on-premises bots in the Bot Builder tool. For more information, see Defining a Request Chain Object in the Bot Builder documentation.
  • internalhost – Specify the actual host name of the on-premises enterprise application used for data exchange with your Bots.
  • internalport – Specify the actual port of the on-premises enterprise application used for data exchange with your Bots.
  • protocol – Specify HTTP or HTTPS for the connection to on-premises enterprise applications.
  • allowedPaths – Specify all paths as “/*” or a specific array of paths for the host, not to include any parameters. The Connector checks the path up to, but not including parameters beginning with ” ?

The following image is an example of a configured accesscontrol.json file with four Bot configurations.

Note: Comments cannot be used in configuration files.


This section describes how to start or stop the Connector Agent on Windows or Linux operating systems.

Linux/Unix Operating Systems

On Linux operating systems, you can manually start the Connector Agent, or configure the Connector Agent to autostart on boot.

Manually Starting/Stopping the Connector on Linux

Manually start or stop the Connector Agent on the Linux/Unit application server by running the following commands in the Connector installation directory, and check the status as follows:

./ start
./ stop    
./ status

The following image shows the response for a successful start and status check of the Connector.

Configuring Connector for Autostart on Linux

This section describes how to set the Connector Agent to automatically start when the Linux server is started or rebooted.

  • To configure the autostart for the Connector Agent, on the application server, in the /etc/rc.local file, add the following command:
    cd < Connector&nbsp;Installation Root> ; ./ start

    For example:

    cd /home/CompanyAdmin/kore-connector ; ./ start

Windows Operating Systems

On Windows operating systems, you can manually start or stop the Connector Agent, and check the status of the Connector Agent.

Manually Starting/Stopping the Connector on Windows

Manually start or stop the Connector Agent on the Windows application server by running the following commands in the Connector installation directory, and check the status as follows:

.\koreconnector.cmd start
.\koreconnector.cmd stop    
.\koreconnector.cmd status

Enabling Bots 

In this section, you can verify the connection to the Connector Agent in the Bots Admin Console, and then enable the connection. When the connection is enabled, you can modify your custom Bots in the Bot Builder tool to use the Connector, publish those Bots, and then in the Bots Admin Console, deploy the published Bots and assign the Bots to users in your company.

  1. In the Bots Admin Console, in the Security & Control module, on the Connector page, verify the Connector status as CONNECTED, click the Ellipsis icon, and then on the Actions menu, click Enable as shown in the following illustration.
  2. In Bot Builder, for each Bot task that you want to run using the Connector, clone or upgrade each Bot.
    1. In the Set up Request Chain Object dialog, select Access using connector, save the changes, and then publish the Bot. For more information about configuring the request object, see Configuring an Alert Task Request Object or  Configuring an Action Task Request Object in the Bot Builder tool documentation.

      Note: The option in the Set up Request Chain Object dialog for Access using connector is only available after the connector is enabled in the Bots Admin Console.

  3. In the Bots Admin Console, deploy the published Bot and assign the users that can use the Bot tasks in your enterprise. For more information, see Bot Management.

After the Connector is installed on your application server, enabled in Bots Admin Console, and your Bots customized to use the connector, you only need to monitor the status of your connector in the Bots Admin Console.
If you cannot start the Connector, or customers are reporting errors, you may need to reconfigure Connector settings.


Installing and configuring the Connector Agent involves many steps. And even after installation, you may need additional configuration to maintain connectivity between Bots and your on-premises applications. This topic describes some of the typical issues that may arise, and how to handle those issues. Connect Agent Server Issues Connector Fails to Start

Log Error Message: TypeError: Object #<Object> has no method ‘parse’
Solution: The server may have multiple node.js installations with different versions. You may need to specify which node.js version to run.
To check for versions, run the following command:
nvm list
This command may return:

To set the version to use, run the following command:
nvm use v4.0.0
The command should return:
Now using node v4.0.0

Client Issues

Users in your organization may experience connectivity issues with the Connector.

  • Error Message: “< Enterprise application >” is not reachable. Unable to communicate with the connector. Please try again.
    • Solution: The “virtualhost” entry in the Connector Install Dir >/config/configs/accesscontrol.json file is not defined, or is incorrectly configured. Verify the entry.
  • Error Message: The server returned an error. Try again later. (404 – System not reachable). 
    • Solution: Connectivity between the Connector on your application server and the Gateway is broken. The Connector Agent may have stopped running. You may need to restart the Connector on the application server.

If you cannot resolve your issue, contact Support.

Enterprise Key Page

On the Enterprise Key page in the Security & Control module of the Bots Admin Console, you can view, or regenerate your enterprise data encryption key.

By default, enterprise data, including user data, is automatically encrypted when stored on servers. The encryption key is reissued every 60 days, or whenever manually refreshed by an admin.

The latest refresh date is displayed next to the Refresh button as shown in the following illustration.

To generate a new enterprise data encryption key, click Refresh.