Agent Usage Guide
This guide explains how to automate tasks and improve efficiency using agents provided by AIP.
Key Features
- View and select available agents
- Automate tasks through chat with agents
- Automate repetitive tasks through scheduling
- View agent execution history and results
Using Agents
Available Agents
Users can view all agents shared within the organization.
Agent Access Method:
- Click the Chat screen in the left menu to view available agent lists in the Agents area
- The Agents area is only displayed when there are available agents
Agent Selection:
- Clicking on a desired agent starts a chat session with that agent
- Each agent is optimized for specific tasks, so it’s important to select the right agent for your purpose
- Selecting an agent without a required MCP integration will trigger a notification at the top of the chat, guiding you to the agent’s detail page to complete the setup.
Agent Chat Features:
- You can visually check the context window usage at the bottom right of the chat input field. This helps you identify when to start a new conversation before the agent’s space for processing conversation context becomes full and degrades response quality.
- While the agent is generating a response, progress status text and a time count are displayed together, allowing for an intuitive understanding of the response generation process.
Agent Details
You can view detailed information about agents to understand the correct usage.
Agent Detail Access Method:
- Click the Agents menu in the left menu to view available agent lists, detailed descriptions of each agent, and authentication configuration items
Overview Tab:
- Detailed functional description of the agent
- Information about connectable services
Configuration Tab:
- When administrators set “Require User Authentication”, users must directly input authentication information
- After completing necessary service integration settings, you can use the agent
Important Notes
- Authentication Information Management: Safely manage information for services requiring personal authentication
- Permission Verification: Regularly check permissions for data and services that agents access
- Sensitive Information Protection: Handle requests containing personal or confidential information carefully
Last updated on