Skip to main content

Sitecore Cortex - Content Auto Tagging

 Sitecore Cortex - Content Auto Tagging


Sitecore Cortex Content Tagging feature is available from Sitecore 9.1. Sitecore Cortex Content Tagging feature provides auto-tagging with the integration with Refinitiv Intelligent Tagging Open Calais which will tag the people, places, products, companies, facts, and events that are mentioned in your content.  

Automated AI-based content tagging can be done with the help of Sitecore Cortex. 

Setup

Register Account

  • Go to this URL https://my.refinitiv.com/content/mytr/en/register.html and fill your details and submit the form.
  • After submitting you will receive an email for email verification.

Get Secret key 

  • After email verification, you will receive another email with a token for API Access.


Create Config Patch for OpenCalais Settings 

  • Open App_Config/Sitecore/ContentTagging/Sitecore.ContentTagging.OpenCalais.config file and update token which you have received on email in this setting “Sitecore.ContentTagging.OpenCalais.CalaisAccessToken”.

Tag Content

  • Go to Sitecore instance, now in the Home ribbon “Content tagging” will be enabled.

  • In Tag item, there are two options are available for tagging the content, either use “Tag item” or use “Tag item and subitems” to do content tagging for sub-items as well.



  • The job will start once you will click on Tag item/Tag item and subitems which will take few seconds to do content tagging.

Verify Tag

  • Now go to Tagging field and verify the tags.


Comments

Popular posts from this blog

Sitecore 10.2 - “Failed to start service ‘Sitecore Marketing Automation Engine’” on Windows 11

Sitecore 10.2 - “Failed to start service ‘Sitecore Marketing Automation Engine' ” on Windows 11 Today I started to install Sitecore 10.2 using Sitecore Instance Manager on Windows 11 and I got this issue “Failed to start service ‘Sitecore Marketing Automation Engine' ” . Error : On event viewer it was showing the below error: I also tried to run ‘ Sitecore.MAEngine.exe ’ like this C:\Windows\system32>C:\inetpub\wwwroot\sclocal102xconnect.dev.local\App_Data\jobs\continuous\AutomationEngine\Sitecore.MAEngine.exe Which was throwing below error: Starting Marketing Automation Engine... 2022-01-29 22:21:11 ERR Error initializing XConnect client. System.AggregateException: One or more errors occurred. ---> Sitecore.XConnect.XdbCollectionUnavailableException: An error occurred while sending the request. ---> System.Net.Http.HttpRequestException: An error occurred while sending the request. ---> System.Net.WebException: The underlying connection was closed: An unexpected err

Azure AD Integration with Sitecore 10.2

 Azure AD Integration with Sitecore 10.2 Sitecore identity server that comes with Sitecore 9.1 allows you to log in through an external identity provider like Azure Active Directory, Facebook, Apple, or Google. It is built on Federation Authentication. What is Federation Authentication? Federation authentication is a technology to allows users to access multiples application, tools, and domains using one credential. Using one set of credential user can access multiple applications, and resources after authentication.  Federation authentication consists of two systems, the Identity provider and the Service provider. Identity providers that maintain/create/manage identity information like name, email address, device, and location. Some examples of identity providers are Azure AD, Google, Facebook, and Apple. Service providers basically refer to a website, software, or app that the user is trying to access and SP basically relies on the identity provider to authenticate the user and provi

Sitecore Custom API Issue with Federation Authentication

Sitecore Custom API Issue with Federation Authentication In earlier segments, detailed in Part 1 and Part 2 of the blogs on Keycloak Integration with Sitecore, I introduced Keycloak functionality for CM login. Concurrently, I addressed a necessity to develop custom APIs for retrieving Sitecore users and roles. Following the development of custom APIs, during authentication failures, the API erroneously returned a status code of 200 instead of 401. The problem arose because API requests were being routed through the "owin.identityProviders" pipeline, which was not intended for API usage. Solution: When OWIN identifies a 401 response and the AuthenticationMode is set to "Active," it fails to capture the URL hash included in the request. Another choice is to activate the "Passive" AuthenticationMode, wherein OWIN refrains from actively intercepting 401 responses. In passive mode, your application needs to explicitly issue a Challenge to trigger the OWIN aut