Support for SFTP connection

Introduction

The SFTP stands for Secure File Transfer Protocol. The core feature of SFTP connection is its higher security. It is much more secure than an FTP connection, which makes it more useful for businesses.

Overview

Transferring files through traditional FTP protocols puts your data at extreme risk for a man-in-the-middle attack. An SFTP connection uses an encrypted method to transfer your business files securely between remote systems. This means that using an SFTP connection is the best choice when looking to preserve the confidentiality and integrity of your business data. In addition, an SFTP connection will always lower the risk of corruption during data transfers. Secure File Transfer Protocol (SFTP) works on Secure Shell (SSH) data streams to provide secure connectivity and provide organizations with a high level of file transfer protection. This is because SFTP uses cryptographic algorithms to securely move data to the server, prevent files from being read during the process, and authentication prevents unauthorized file access during the process. It does not require two-factor authentication, but you can choose to require both a user ID and password and an SSH key for a more secure connection. Creating an SSH key can prevent fraudsters from connecting to your SFTP server.

The SSH key pair must be generated in advance. Secure File Transfer Protocol (SFTP) allows you to perform a variety of tasks on sensitive files, from deleting files to resuming a paused transfer. Unlike FTP over SSL / TLS (FTPS), SFTP requires only a single port number (port 22) to establish a server connection. Before you start exchanging data through SFTP, you should set up an SFTP connection through the Manager File Transfer service. SFTP connection is a cost effective process for conducting the data transfer. It is a secures and compresses process of the data transmission. With the help of SFTP connection you will be able to improve the file uploading and downloading functions effectively. You can authenticate the SFTP connection with the help of public key. Although SFTP is built into many graphical tools, this guide shows you how to use SFTP through an interactive command line interface.

Core Features

The SFTP connection consists of various feature's. Those are mentioned below.

  • SFTP connection provide a private key. An SSH key logs in to the SFTP server more securely than a regular password.

  • The key is used for the automatic data transfer process and single sign-on by the administrator.

  • The generated key pair consists of a public key and a private key. You need to save the public key to the SFTP server and then connect to the server using a client that already has the uploaded private key. Provides a private SSH key, an SSH key and an optional passphrase for that key.

  • It is a secure connection, and protected with a user Credentials. You need to enter the user name and password for the SFTP connection.

  • It use 2FA—provide a username, a password, and a SSH key with an optional passphrase if the key is protected.

  • Connect to an SFTP (SSH File Transfer Protocol) server to monitor file changes and perform various operations on remote files and directories.

  • For SSH private key authentication, provide the SSH private key file. This key must be in PuTTY format.

  • SFTP connection consists of a strong firewalls. It dedicated to SFTP security, not just perimeter protection from the data center.

  • It provide the data encryption for the both in transit and at rest.

  • The SFTP connection has a restricted IP address. It has both site wide by country (geo IP) and per individual user (IP or IP range).

  • SFTP connection has the strict password requirements

  • To access the SFTP connection you need to process for the multi-factor authentication methods

  • SFTP connection provides the granular folder access controls

  • SFTP connection makes the data transfer process connivant.

Benefits

SFTP connection involves with a various benefits. Those are mentioned below.

  • Establish a secure connection with encryption.

  • Safely exchange data.

  • Protection against attacks while sending data.

  • The SFTP server can support large files and bulk file transfers, increasing the speed and efficiency of business processes.

  • Security requirements by implementing secure file transfer.

Drawbacks

Each connection has limitations, here are few of the limitation of the SFTP connection. Those are mentioned below.

  • The SFTP connection communication is conducted in a binary and cannot be logged.

  • Managing and validating SSH keys is difficult.

  • SFTP connection does not prevent unauthorized transmission of data to third parties.

  • SFTP does not manage cross script vulnerabilities.

 

How to use SFTP Connection?

  1. Click on the automation tab from the “Sapper home page”.

2. Now open the required “Automation” from the list, or create a new one.

3. To create a new automation click on the “Create Automation” tab.

4. Once you click on the “Create automation” a new form will be pop up on the screen.

 

5. Now, fill the details, provide the “Name” and “Description” based on your requirement, and “Save” it.

 

6. Select the “SFTP Reader or Writer” based on your requirements.

 

7. Now select the connection as “SFTP connection” from the drop-down list.

 

8. Provide the information for “Directory Path” for accessing the data.

 

9. Now, choose the way you want to read the file. You will get two option in this field, i.e., Using file name and Using regular expression.

 

10. If you select by “Using file name” you will get another field for searching the file from the “Select files” field.

 

11. On the other hand, if you select “Using regular expressions” you will get the option for adding the regular expressions.

12. Add the expression and save it for further use.

 

13. On the other hand, if you choose “SFTP writer”, you will be redirect to the another form.

14. Now, you need to select the SFTP connection from the “Connection” field.

 

15. Now, add the “Directory Path” for fetching the data from the specific field.

 

16. Add the “File Name” and “File Content” based on your requirement.

 

 

 

17. You will also get the option for “Configure Additional Properties”. Once you click on this option a new popup will be visible on the screen. Here you need to select the properties and provide the value and actions.

For more information visit

18. Now, save it for further process.

 

Key

Description

Key

Description

Directory Path

A path is a string of characters used to uniquely identify a location in a directory structure. It is composed by following the directory tree hierarchy in which components, separated by a delimiting character, represent each directory.

Using file name

This field provide you the option to get the details for read the data by using the file name.

Using regular expressions

A regular expression is a method used in programming for pattern matching. Regular expressions provide a flexible and concise means to match strings of text. In this field, you will be able to read the data by using the regular expressions based on the requirements.

File Name

The file name is helpful for write the data by the name of the file.

File Content

The file content is helpful for write the data by the content of the file.