When a Digital Person has the Transcription Skill, the conversation session is stored as a text file in the Customer’s secure Amazon S3 container with the user's requests and conversation responses. The transcript is updated throughout the conversation until the session ends.
Provide the following information in the Transcription Skill configuration screen in Digital DNA Studio. See Adding Skills to your Digital Person for detailed instructions:
Field
Type
Description
AWS REGION
REQUIRED
TEXT
AWS region code based on where your Transcription Skill resource has been created. See this page for a list of region codes.
Note: Make sure to use the region code. For example, you should enter ap-southeast-2 rather than the region name, Asia Pacific (Sydney).
AWS ROLE ARN
REQUIRED
TEXT
Enter the ARN from step 7 below.
Format arn:aws:iam::{Account_ID}:role/{Role_Name}
UNIQUE EXTERNAL ID THAT CONNECTS TO YOUR AWS ACCOUNT
REQUIRED
TEXT
Is the same as the External ID generated in step 3 below.
NAME OF YOUR AWS S3 BUCKET
REQUIRED
TEXT
The name of the s3 bucket you would like the transcription files to be uploaded to
Please contact your DevOps/CloudOps team to set up the Amazon 3 bucket and role necessary for the transcription skill configuration.
Creating AWS Role for Transcription Skill
Log into your AWS account where the S3 bucket is provisioned.
You will need to generate an External ID that our services will use as a unique identifier to connect to your S3 bucket, the External ID is any unique string that should be a minimum of 16 characters alpha-numeric string.
Go into the IAM tab in the AWS Console and click Roles > Create Role at the top right corner.
In the role creation screen, click Custom trust policy entity type and copy the below code block into the policy field, make sure to replace <Your External ID> with the string generated in step 3 and click Next.
5. In the Add Permissions screen, click Create Policy and enter the below code:
Note: The S3 bucket(s) that the skill can access are listed in the Resource section of the policy. If the bucket isn't listed there you will not be able to use it.
6. Ensure to use the below value as the Role Name otherwise the bot will not be reachable using this Role (this is a case-sensitive value) and verify that all the other values (Aside from your unique External ID being different) match the code provided in step 4 and click Create Role.
SM_Transcription_Role
7. Once the role is created, navigate to the SM_Transcription_Role role under the Roles tab and you will be able to copy the Role ARN.
S3 Bucket Properties
You can find the details of the S3 bucket needed to configure the skill: