{ "version": "2.0", "metadata": { "apiVersion": "2018-11-05", "endpointPrefix": "transfer", "jsonVersion": "1.1", "protocol": "json", "protocols": [ "json" ], "serviceAbbreviation": "AWS Transfer", "serviceFullName": "AWS Transfer Family", "serviceId": "Transfer", "signatureVersion": "v4", "signingName": "transfer", "targetPrefix": "TransferService", "uid": "transfer-2018-11-05" }, "operations": { "CreateAccess": { "name": "CreateAccess", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "CreateAccessRequest" }, "output": { "shape": "CreateAccessResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "ResourceExistsException" } ], "documentation": "
Used by administrators to choose which groups in the directory should have access to upload and download files over the enabled protocols using Transfer Family. For example, a Microsoft Active Directory might contain 50,000 users, but only a small fraction might need the ability to transfer files to the server. An administrator can use CreateAccess
to limit the access to the correct set of users who need this ability.
Creates an agreement. An agreement is a bilateral trading partner agreement, or partnership, between an Transfer Family server and an AS2 process. The agreement defines the file and message transfer relationship between the server and the AS2 process. To define an agreement, Transfer Family combines a server, local profile, partner profile, certificate, and other attributes.
The partner is identified with the PartnerProfileId
, and the AS2 process is identified with the LocalProfileId
.
Creates the connector, which captures the parameters for a connection for the AS2 or SFTP protocol. For AS2, the connector is required for sending files to an externally hosted AS2 server. For SFTP, the connector is required when sending files to an SFTP server or receiving files from an SFTP server. For more details about connectors, see Configure AS2 connectors and Create SFTP connectors.
You must specify exactly one configuration object: either for AS2 (As2Config
) or SFTP (SftpConfig
).
Creates the local or partner profile to use for AS2 transfers.
" }, "CreateServer": { "name": "CreateServer", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "CreateServerRequest" }, "output": { "shape": "CreateServerResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "ResourceExistsException" }, { "shape": "AccessDeniedException" } ], "documentation": "Instantiates an auto-scaling virtual server based on the selected file transfer protocol in Amazon Web Services. When you make updates to your file transfer protocol-enabled server or when you work with users, use the service-generated ServerId
property that is assigned to the newly created server.
Creates a user and associates them with an existing file transfer protocol-enabled server. You can only create and associate users with servers that have the IdentityProviderType
set to SERVICE_MANAGED
. Using parameters for CreateUser
, you can specify the user name, set the home directory, store the user's public key, and assign the user's Identity and Access Management (IAM) role. You can also optionally add a session policy, and assign metadata with tags that can be used to group and search for users.
Allows you to create a workflow with specified steps and step details the workflow invokes after file transfer completes. After creating a workflow, you can associate the workflow created with any transfer servers by specifying the workflow-details
field in CreateServer
and UpdateServer
operations.
Allows you to delete the access specified in the ServerID
and ExternalID
parameters.
Delete the agreement that's specified in the provided AgreementId
.
Deletes the certificate that's specified in the CertificateId
parameter.
Deletes the connector that's specified in the provided ConnectorId
.
Deletes the host key that's specified in the HostKeyId
parameter.
Deletes the profile that's specified in the ProfileId
parameter.
Deletes the file transfer protocol-enabled server that you specify.
No response returns from this operation.
", "idempotent": true }, "DeleteSshPublicKey": { "name": "DeleteSshPublicKey", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "DeleteSshPublicKeyRequest" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Deletes a user's Secure Shell (SSH) public key.
" }, "DeleteUser": { "name": "DeleteUser", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "DeleteUserRequest" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Deletes the user belonging to a file transfer protocol-enabled server you specify.
No response returns from this operation.
When you delete a user from a server, the user's information is lost.
Deletes the specified workflow.
", "idempotent": true }, "DescribeAccess": { "name": "DescribeAccess", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "DescribeAccessRequest" }, "output": { "shape": "DescribeAccessResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Describes the access that is assigned to the specific file transfer protocol-enabled server, as identified by its ServerId
property and its ExternalId
.
The response from this call returns the properties of the access that is associated with the ServerId
value that was specified.
Describes the agreement that's identified by the AgreementId
.
Describes the certificate that's identified by the CertificateId
.
Describes the connector that's identified by the ConnectorId.
You can use DescribeExecution
to check the details of the execution of the specified workflow.
This API call only returns details for in-progress workflows.
If you provide an ID for an execution that is not in progress, or if the execution doesn't match the specified workflow ID, you receive a ResourceNotFound
exception.
Returns the details of the host key that's specified by the HostKeyId
and ServerId
.
Returns the details of the profile that's specified by the ProfileId
.
Describes the security policy that is attached to your server or SFTP connector. The response contains a description of the security policy's properties. For more information about security policies, see Working with security policies for servers or Working with security policies for SFTP connectors.
" }, "DescribeServer": { "name": "DescribeServer", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "DescribeServerRequest" }, "output": { "shape": "DescribeServerResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Describes a file transfer protocol-enabled server that you specify by passing the ServerId
parameter.
The response contains a description of a server's properties. When you set EndpointType
to VPC, the response will contain the EndpointDetails
.
Describes the user assigned to the specific file transfer protocol-enabled server, as identified by its ServerId
property.
The response from this call returns the properties of the user associated with the ServerId
value that was specified.
Describes the specified workflow.
" }, "ImportCertificate": { "name": "ImportCertificate", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ImportCertificateRequest" }, "output": { "shape": "ImportCertificateResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Imports the signing and encryption certificates that you need to create local (AS2) profiles and partner profiles.
" }, "ImportHostKey": { "name": "ImportHostKey", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ImportHostKeyRequest" }, "output": { "shape": "ImportHostKeyResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "ResourceExistsException" } ], "documentation": "Adds a host key to the server that's specified by the ServerId
parameter.
Adds a Secure Shell (SSH) public key to a Transfer Family user identified by a UserName
value assigned to the specific file transfer protocol-enabled server, identified by ServerId
.
The response returns the UserName
value, the ServerId
value, and the name of the SshPublicKeyId
.
Lists the details for all the accesses you have on your server.
" }, "ListAgreements": { "name": "ListAgreements", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ListAgreementsRequest" }, "output": { "shape": "ListAgreementsResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "InvalidNextTokenException" } ], "documentation": "Returns a list of the agreements for the server that's identified by the ServerId
that you supply. If you want to limit the results to a certain number, supply a value for the MaxResults
parameter. If you ran the command previously and received a value for NextToken
, you can supply that value to continue listing agreements from where you left off.
Returns a list of the current certificates that have been imported into Transfer Family. If you want to limit the results to a certain number, supply a value for the MaxResults
parameter. If you ran the command previously and received a value for the NextToken
parameter, you can supply that value to continue listing certificates from where you left off.
Lists the connectors for the specified Region.
" }, "ListExecutions": { "name": "ListExecutions", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ListExecutionsRequest" }, "output": { "shape": "ListExecutionsResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "InvalidNextTokenException" } ], "documentation": "Lists all in-progress executions for the specified workflow.
If the specified workflow ID cannot be found, ListExecutions
returns a ResourceNotFound
exception.
Returns a list of host keys for the server that's specified by the ServerId
parameter.
Returns a list of the profiles for your system. If you want to limit the results to a certain number, supply a value for the MaxResults
parameter. If you ran the command previously and received a value for NextToken
, you can supply that value to continue listing profiles from where you left off.
Lists the security policies that are attached to your servers and SFTP connectors. For more information about security policies, see Working with security policies for servers or Working with security policies for SFTP connectors.
" }, "ListServers": { "name": "ListServers", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ListServersRequest" }, "output": { "shape": "ListServersResponse" }, "errors": [ { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "InvalidNextTokenException" } ], "documentation": "Lists the file transfer protocol-enabled servers that are associated with your Amazon Web Services account.
" }, "ListTagsForResource": { "name": "ListTagsForResource", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ListTagsForResourceRequest" }, "output": { "shape": "ListTagsForResourceResponse" }, "errors": [ { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "InvalidNextTokenException" } ], "documentation": "Lists all of the tags associated with the Amazon Resource Name (ARN) that you specify. The resource can be a user, server, or role.
" }, "ListUsers": { "name": "ListUsers", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "ListUsersRequest" }, "output": { "shape": "ListUsersResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "InvalidNextTokenException" } ], "documentation": "Lists the users for a file transfer protocol-enabled server that you specify by passing the ServerId
parameter.
Lists all workflows associated with your Amazon Web Services account for your current region.
" }, "SendWorkflowStepState": { "name": "SendWorkflowStepState", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "SendWorkflowStepStateRequest" }, "output": { "shape": "SendWorkflowStepStateResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "AccessDeniedException" } ], "documentation": "Sends a callback for asynchronous custom steps.
The ExecutionId
, WorkflowId
, and Token
are passed to the target resource during execution of a custom step of a workflow. You must include those with their callback as well as providing a status.
Retrieves a list of the contents of a directory from a remote SFTP server. You specify the connector ID, the output path, and the remote directory path. You can also specify the optional MaxItems
value to control the maximum number of items that are listed from the remote directory. This API returns a list of all files and directories in the remote directory (up to the maximum value), but does not return files or folders in sub-directories. That is, it only returns a list of files and directories one-level deep.
After you receive the listing file, you can provide the files that you want to transfer to the RetrieveFilePaths
parameter of the StartFileTransfer
API call.
The naming convention for the output file is connector-ID-listing-ID.json
. The output file contains the following information:
filePath
: the complete path of a remote file, relative to the directory of the listing request for your SFTP connector on the remote server.
modifiedTimestamp
: the last time the file was modified, in UTC time format. This field is optional. If the remote file attributes don't contain a timestamp, it is omitted from the file listing.
size
: the size of the file, in bytes. This field is optional. If the remote file attributes don't contain a file size, it is omitted from the file listing.
path
: the complete path of a remote directory, relative to the directory of the listing request for your SFTP connector on the remote server.
truncated
: a flag indicating whether the list output contains all of the items contained in the remote directory or not. If your Truncated
output value is true, you can increase the value provided in the optional max-items
input attribute to be able to list more items (up to the maximum allowed list size of 10,000 items).
Begins a file transfer between local Amazon Web Services storage and a remote AS2 or SFTP server.
For an AS2 connector, you specify the ConnectorId
and one or more SendFilePaths
to identify the files you want to transfer.
For an SFTP connector, the file transfer can be either outbound or inbound. In both cases, you specify the ConnectorId
. Depending on the direction of the transfer, you also specify the following items:
If you are transferring file from a partner's SFTP server to Amazon Web Services storage, you specify one or more RetrieveFilePaths
to identify the files you want to transfer, and a LocalDirectoryPath
to specify the destination folder.
If you are transferring file to a partner's SFTP server from Amazon Web Services storage, you specify one or more SendFilePaths
to identify the files you want to transfer, and a RemoteDirectoryPath
to specify the destination folder.
Changes the state of a file transfer protocol-enabled server from OFFLINE
to ONLINE
. It has no impact on a server that is already ONLINE
. An ONLINE
server can accept and process file transfer jobs.
The state of STARTING
indicates that the server is in an intermediate state, either not fully able to respond, or not fully online. The values of START_FAILED
can indicate an error condition.
No response is returned from this call.
" }, "StopServer": { "name": "StopServer", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "StopServerRequest" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Changes the state of a file transfer protocol-enabled server from ONLINE
to OFFLINE
. An OFFLINE
server cannot accept and process file transfer jobs. Information tied to your server, such as server and user properties, are not affected by stopping your server.
Stopping the server does not reduce or impact your file transfer protocol endpoint billing; you must delete the server to stop being billed.
The state of STOPPING
indicates that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of STOP_FAILED
can indicate an error condition.
No response is returned from this call.
" }, "TagResource": { "name": "TagResource", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "TagResourceRequest" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Attaches a key-value pair to a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities.
There is no response returned from this call.
" }, "TestConnection": { "name": "TestConnection", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "TestConnectionRequest" }, "output": { "shape": "TestConnectionResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "Tests whether your SFTP connector is set up successfully. We highly recommend that you call this operation to test your ability to transfer files between local Amazon Web Services storage and a trading partner's SFTP server.
" }, "TestIdentityProvider": { "name": "TestIdentityProvider", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "TestIdentityProviderRequest" }, "output": { "shape": "TestIdentityProviderResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" } ], "documentation": "If the IdentityProviderType
of a file transfer protocol-enabled server is AWS_DIRECTORY_SERVICE
or API_Gateway
, tests whether your identity provider is set up successfully. We highly recommend that you call this operation to test your authentication method as soon as you create your server. By doing so, you can troubleshoot issues with the identity provider integration to ensure that your users can successfully use the service.
The ServerId
and UserName
parameters are required. The ServerProtocol
, SourceIp
, and UserPassword
are all optional.
Note the following:
You cannot use TestIdentityProvider
if the IdentityProviderType
of your server is SERVICE_MANAGED
.
TestIdentityProvider
does not work with keys: it only accepts passwords.
TestIdentityProvider
can test the password operation for a custom Identity Provider that handles keys and passwords.
If you provide any incorrect values for any parameters, the Response
field is empty.
If you provide a server ID for a server that uses service-managed users, you get an error:
An error occurred (InvalidRequestException) when calling the TestIdentityProvider operation: s-server-ID not configured for external auth
If you enter a Server ID for the --server-id
parameter that does not identify an actual Transfer server, you receive the following error:
An error occurred (ResourceNotFoundException) when calling the TestIdentityProvider operation: Unknown server
.
It is possible your sever is in a different region. You can specify a region by adding the following: --region region-code
, such as --region us-east-2
to specify a server in US East (Ohio).
Detaches a key-value pair from a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities.
No response is returned from this call.
" }, "UpdateAccess": { "name": "UpdateAccess", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "UpdateAccessRequest" }, "output": { "shape": "UpdateAccessResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "ResourceExistsException" } ], "documentation": "Allows you to update parameters for the access specified in the ServerID
and ExternalID
parameters.
Updates some of the parameters for an existing agreement. Provide the AgreementId
and the ServerId
for the agreement that you want to update, along with the new values for the parameters to update.
Updates the active and inactive dates for a certificate.
" }, "UpdateConnector": { "name": "UpdateConnector", "http": { "method": "POST", "requestUri": "/" }, "input": { "shape": "UpdateConnectorRequest" }, "output": { "shape": "UpdateConnectorResponse" }, "errors": [ { "shape": "ResourceNotFoundException" }, { "shape": "InvalidRequestException" }, { "shape": "ThrottlingException" }, { "shape": "InternalServiceError" }, { "shape": "ServiceUnavailableException" }, { "shape": "ResourceExistsException" } ], "documentation": "Updates some of the parameters for an existing connector. Provide the ConnectorId
for the connector that you want to update, along with the new values for the parameters to update.
Updates the description for the host key that's specified by the ServerId
and HostKeyId
parameters.
Updates some of the parameters for an existing profile. Provide the ProfileId
for the profile that you want to update, along with the new values for the parameters to update.
Updates the file transfer protocol-enabled server's properties after that server has been created.
The UpdateServer
call returns the ServerId
of the server you updated.
Assigns new properties to a user. Parameters you pass modify any or all of the following: the home directory, role, and policy for the UserName
and ServerId
you specify.
The response returns the ServerId
and the UserName
for the updated user.
In the console, you can select Restricted when you create or update a user. This ensures that the user can't access anything outside of their home directory. The programmatic way to configure this behavior is to update the user. Set their HomeDirectoryType
to LOGICAL
, and specify HomeDirectoryMappings
with Entry
as root (/
) and Target
as their home directory.
For example, if the user's home directory is /test/admin-user
, the following command updates the user so that their configuration in the console shows the Restricted flag as selected.
aws transfer update-user --server-id <server-id> --user-name admin-user --home-directory-type LOGICAL --home-directory-mappings \"[{\\\"Entry\\\":\\\"/\\\", \\\"Target\\\":\\\"/test/admin-user\\\"}]\"
A unique identifier for the AS2 local profile.
" }, "PartnerProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the partner profile for the connector.
" }, "MessageSubject": { "shape": "MessageSubject", "documentation": "Used as the Subject
HTTP header attribute in AS2 messages that are being sent with the connector.
Specifies whether the AS2 file is compressed.
" }, "EncryptionAlgorithm": { "shape": "EncryptionAlg", "documentation": "The algorithm that is used to encrypt the file.
Note the following:
Do not use the DES_EDE3_CBC
algorithm unless you must support a legacy client that requires it, as it is a weak encryption algorithm.
You can only specify NONE
if the URL for your connector uses HTTPS. Using HTTPS ensures that no traffic is sent in clear text.
The algorithm that is used to sign the AS2 messages sent with the connector.
" }, "MdnSigningAlgorithm": { "shape": "MdnSigningAlg", "documentation": "The signing algorithm for the MDN response.
If set to DEFAULT (or not set at all), the value for SigningAlgorithm
is used.
Used for outbound requests (from an Transfer Family server to a partner AS2 server) to determine whether the partner response for transfers is synchronous or asynchronous. Specify either of the following values:
SYNC
: The system expects a synchronous MDN response, confirming that the file was transferred successfully (or not).
NONE
: Specifies that no MDN response is required.
Provides Basic authentication support to the AS2 Connectors API. To use Basic authentication, you must provide the name or Amazon Resource Name (ARN) of a secret in Secrets Manager.
The default value for this parameter is null
, which indicates that Basic authentication is not enabled for the connector.
If the connector should use Basic authentication, the secret needs to be in the following format:
{ \"Username\": \"user-name\", \"Password\": \"user-password\" }
Replace user-name
and user-password
with the credentials for the actual user that is being authenticated.
Note the following:
You are storing these credentials in Secrets Manager, not passing them directly into this API.
If you are using the API, SDKs, or CloudFormation to configure your connector, then you must create the secret before you can enable Basic authentication. However, if you are using the Amazon Web Services management console, you can have the system create the secret for you.
If you have previously enabled Basic authentication for a connector, you can disable it by using the UpdateConnector
API call. For example, if you are using the CLI, you can run the following command to remove Basic authentication:
update-connector --connector-id my-connector-id --as2-config 'BasicAuthSecretId=\"\"'
Contains the details for an AS2 connector object. The connector object is used for AS2 outbound processes, to connect the Transfer Family customer with the trading partner.
" }, "As2ConnectorSecretId": { "type": "string", "max": 2048, "min": 0 }, "As2Id": { "type": "string", "max": 128, "min": 1, "pattern": "[\\p{Print}\\s]*" }, "As2Transport": { "type": "string", "enum": [ "HTTP" ] }, "As2Transports": { "type": "list", "member": { "shape": "As2Transport" }, "max": 1, "min": 1 }, "CallbackToken": { "type": "string", "max": 64, "min": 1, "pattern": "\\w+" }, "CertDate": { "type": "timestamp" }, "CertSerial": { "type": "string", "max": 48, "min": 0, "pattern": "[\\p{XDigit}{2}:?]*" }, "Certificate": { "type": "string", "max": 1600, "min": 0 }, "CertificateBodyType": { "type": "string", "max": 16384, "min": 1, "pattern": "[\\u0009\\u000A\\u000D\\u0020-\\u00FF]*", "sensitive": true }, "CertificateChainType": { "type": "string", "max": 2097152, "min": 1, "pattern": "[\\u0009\\u000A\\u000D\\u0020-\\u00FF]*", "sensitive": true }, "CertificateId": { "type": "string", "max": 22, "min": 22, "pattern": "cert-([0-9a-f]{17})" }, "CertificateIds": { "type": "list", "member": { "shape": "CertificateId" } }, "CertificateStatusType": { "type": "string", "enum": [ "ACTIVE", "PENDING_ROTATION", "INACTIVE" ] }, "CertificateType": { "type": "string", "enum": [ "CERTIFICATE", "CERTIFICATE_WITH_PRIVATE_KEY" ] }, "CertificateUsageType": { "type": "string", "enum": [ "SIGNING", "ENCRYPTION", "TLS" ] }, "CompressionEnum": { "type": "string", "enum": [ "ZLIB", "DISABLED" ] }, "ConnectorId": { "type": "string", "max": 19, "min": 19, "pattern": "c-([0-9a-f]{17})" }, "ConnectorSecurityPolicyName": { "type": "string", "max": 100, "min": 0, "pattern": "TransferSFTPConnectorSecurityPolicy-[A-Za-z0-9-]+" }, "CopyStepDetails": { "type": "structure", "members": { "Name": { "shape": "WorkflowStepName", "documentation": "The name of the step, used as an identifier.
" }, "DestinationFileLocation": { "shape": "InputFileLocation", "documentation": "Specifies the location for the file being copied. Use ${Transfer:UserName}
or ${Transfer:UploadDate}
in this field to parametrize the destination prefix by username or uploaded date.
Set the value of DestinationFileLocation
to ${Transfer:UserName}
to copy uploaded files to an Amazon S3 bucket that is prefixed with the name of the Transfer Family user that uploaded the file.
Set the value of DestinationFileLocation
to ${Transfer:UploadDate}
to copy uploaded files to an Amazon S3 bucket that is prefixed with the date of the upload.
The system resolves UploadDate
to a date format of YYYY-MM-DD, based on the date the file is uploaded in UTC.
A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE
.
If the workflow is processing a file that has the same name as an existing file, the behavior is as follows:
If OverwriteExisting
is TRUE
, the existing file is replaced with the file being processed.
If OverwriteExisting
is FALSE
, nothing happens, and the workflow processing stops.
Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
To use the previous file as the input, enter ${previous.file}
. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value.
To use the originally uploaded file location as input for this step, enter ${original.file}
.
Each step type has its own StepDetails
structure.
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry
and Target
pair, where Entry
shows how the path is made visible and Target
is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target
. This value can be set only when HomeDirectoryType
is set to LOGICAL.
The following is an Entry
and Target
pair example.
[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
In most cases, you can use this value instead of the session policy to lock down your user to the designated home directory (\"chroot
\"). To do this, you can set Entry
to /
and set Target
to the HomeDirectory
parameter value.
The following is an Entry
and Target
pair example for chroot
.
[ { \"Entry\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
A session policy for your user so that you can use the same Identity and Access Management (IAM) role across multiple users. This policy scopes down a user's access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}
, ${Transfer:HomeDirectory}
, and ${Transfer:HomeBucket}
.
This policy applies only when the domain of ServerId
is Amazon S3. Amazon EFS does not use session policies.
For session policies, Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy
argument.
For an example of a session policy, see Example session policy.
For more information, see AssumeRole in the Security Token Service API Reference.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regular expression used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
" } } }, "CreateAccessResponse": { "type": "structure", "required": [ "ServerId", "ExternalId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "The identifier of the server that the user is attached to.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "The external identifier of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family.
" } } }, "CreateAgreementRequest": { "type": "structure", "required": [ "ServerId", "LocalProfileId", "PartnerProfileId", "BaseDirectory", "AccessRole" ], "members": { "Description": { "shape": "Description", "documentation": "A name or short description to identify the agreement.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance. This is the specific server that the agreement uses.
" }, "LocalProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the AS2 local profile.
" }, "PartnerProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the partner profile used in the agreement.
" }, "BaseDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for files transferred by using the AS2 protocol.
A BaseDirectory
example is /DOC-EXAMPLE-BUCKET/home/mydirectory
.
Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use.
For AS2 connectors
With AS2, you can send files by calling StartFileTransfer
and specifying the file paths in the request parameter, SendFilePaths
. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt
, parent directory is /bucket/dir/
) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole
needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer
request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer
.
If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue
permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt
permission for that key.
For SFTP connectors
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer
request. Additionally, make sure that the role provides secretsmanager:GetSecretValue
permission to Secrets Manager.
The status of the agreement. The agreement can be either ACTIVE
or INACTIVE
.
Key-value pairs that can be used to group and search for agreements.
" } } }, "CreateAgreementResponse": { "type": "structure", "required": [ "AgreementId" ], "members": { "AgreementId": { "shape": "AgreementId", "documentation": "The unique identifier for the agreement. Use this ID for deleting, or updating an agreement, as well as in any other API calls that require that you specify the agreement ID.
" } } }, "CreateConnectorRequest": { "type": "structure", "required": [ "Url", "AccessRole" ], "members": { "Url": { "shape": "Url", "documentation": "The URL of the partner's AS2 or SFTP endpoint.
" }, "As2Config": { "shape": "As2ConnectorConfig", "documentation": "A structure that contains the parameters for an AS2 connector object.
" }, "AccessRole": { "shape": "Role", "documentation": "Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use.
For AS2 connectors
With AS2, you can send files by calling StartFileTransfer
and specifying the file paths in the request parameter, SendFilePaths
. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt
, parent directory is /bucket/dir/
) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole
needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer
request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer
.
If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue
permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt
permission for that key.
For SFTP connectors
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer
request. Additionally, make sure that the role provides secretsmanager:GetSecretValue
permission to Secrets Manager.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for connectors. Tags are metadata attached to connectors for any purpose.
" }, "SftpConfig": { "shape": "SftpConnectorConfig", "documentation": "A structure that contains the parameters for an SFTP connector object.
" }, "SecurityPolicyName": { "shape": "ConnectorSecurityPolicyName", "documentation": "Specifies the name of the security policy for the connector.
" } } }, "CreateConnectorResponse": { "type": "structure", "required": [ "ConnectorId" ], "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector, returned after the API call succeeds.
" } } }, "CreateProfileRequest": { "type": "structure", "required": [ "As2Id", "ProfileType" ], "members": { "As2Id": { "shape": "As2Id", "documentation": "The As2Id
is the AS2-name, as defined in the RFC 4130. For inbound transfers, this is the AS2-From
header for the AS2 messages sent from the partner. For outbound connectors, this is the AS2-To
header for the AS2 messages sent to the partner using the StartFileTransfer
API operation. This ID cannot include spaces.
Determines the type of profile to create:
Specify LOCAL
to create a local profile. A local profile represents the AS2-enabled Transfer Family server organization or party.
Specify PARTNER
to create a partner profile. A partner profile represents a remote organization, external to Transfer Family.
An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for AS2 profiles.
" } } }, "CreateProfileResponse": { "type": "structure", "required": [ "ProfileId" ], "members": { "ProfileId": { "shape": "ProfileId", "documentation": "The unique identifier for the AS2 profile, returned after the API call succeeds.
" } } }, "CreateServerRequest": { "type": "structure", "members": { "Certificate": { "shape": "Certificate", "documentation": "The Amazon Resource Name (ARN) of the Certificate Manager (ACM) certificate. Required when Protocols
is set to FTPS
.
To request a new public certificate, see Request a public certificate in the Certificate Manager User Guide.
To import an existing certificate into ACM, see Importing certificates into ACM in the Certificate Manager User Guide.
To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the Certificate Manager User Guide.
Certificates with the following cryptographic algorithms and key sizes are supported:
2048-bit RSA (RSA_2048)
4096-bit RSA (RSA_4096)
Elliptic Prime Curve 256 bit (EC_prime256v1)
Elliptic Prime Curve 384 bit (EC_secp384r1)
Elliptic Prime Curve 521 bit (EC_secp521r1)
The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.
The domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
After the server is created, the domain cannot be changed.
The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make your endpoint accessible only to resources within your VPC, or you can attach Elastic IP addresses and make your endpoint accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
" }, "EndpointType": { "shape": "EndpointType", "documentation": "The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.
After May 19, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT
in your Amazon Web Services account if your account hasn't already done so before May 19, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT
in your Amazon Web Services account on or before May 19, 2021, you will not be affected. After this date, use EndpointType
=VPC
.
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
It is recommended that you use VPC
as the EndpointType
. With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with EndpointType
set to VPC_ENDPOINT
.
The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms.
Use the following command to generate an RSA 2048 bit key with no passphrase:
ssh-keygen -t rsa -b 2048 -N \"\" -m PEM -f my-new-server-key
.
Use a minimum value of 2048 for the -b
option. You can create a stronger key by using 3072 or 4096.
Use the following command to generate an ECDSA 256 bit key with no passphrase:
ssh-keygen -t ecdsa -b 256 -N \"\" -m PEM -f my-new-server-key
.
Valid values for the -b
option for ECDSA are 256, 384, and 521.
Use the following command to generate an ED25519 key with no passphrase:
ssh-keygen -t ed25519 -N \"\" -f my-new-server-key
.
For all of these commands, you can replace my-new-server-key with a string of your choice.
If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive.
For more information, see Manage host keys for your SFTP-enabled server in the Transfer Family User Guide.
" }, "IdentityProviderDetails": { "shape": "IdentityProviderDetails", "documentation": "Required when IdentityProviderType
is set to AWS_DIRECTORY_SERVICE
, Amazon Web Services_LAMBDA
or API_GATEWAY
. Accepts an array containing all of the information required to use a directory in AWS_DIRECTORY_SERVICE
or invoke a customer-supplied authentication API, including the API Gateway URL. Not required when IdentityProviderType
is set to SERVICE_MANAGED
.
The mode of authentication for a server. The default value is SERVICE_MANAGED
, which allows you to store and access user credentials within the Transfer Family service.
Use AWS_DIRECTORY_SERVICE
to provide access to Active Directory groups in Directory Service for Microsoft Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connector. This option also requires you to provide a Directory ID by using the IdentityProviderDetails
parameter.
Use the API_GATEWAY
value to integrate with an identity provider of your choosing. The API_GATEWAY
setting requires you to provide an Amazon API Gateway endpoint URL to call for authentication by using the IdentityProviderDetails
parameter.
Use the AWS_LAMBDA
value to directly use an Lambda function as your identity provider. If you choose this value, you must specify the ARN for the Lambda function in the Function
parameter for the IdentityProviderDetails
data type.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFSevents. When set, you can view user activity in your CloudWatch logs.
" }, "PostAuthenticationLoginBanner": { "shape": "PostAuthenticationLoginBanner", "documentation": "Specifies a string to display when users connect to a server. This string is displayed after the user authenticates.
The SFTP protocol does not support post-authentication display banners.
Specifies a string to display when users connect to a server. This string is displayed before the user authenticates. For example, the following banner displays details about using the system:
This system is for the use of authorized users only. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
SFTP
(Secure Shell (SSH) File Transfer Protocol): File transfer over SSH
FTPS
(File Transfer Protocol Secure): File transfer with TLS encryption
FTP
(File Transfer Protocol): Unencrypted file transfer
AS2
(Applicability Statement 2): used for transporting structured business-to-business data
If you select FTPS
, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS.
If Protocol
includes either FTP
or FTPS
, then the EndpointType
must be VPC
and the IdentityProviderType
must be either AWS_DIRECTORY_SERVICE
, AWS_LAMBDA
, or API_GATEWAY
.
If Protocol
includes FTP
, then AddressAllocationIds
cannot be associated.
If Protocol
is set only to SFTP
, the EndpointType
can be set to PUBLIC
and the IdentityProviderType
can be set any of the supported identity types: SERVICE_MANAGED
, AWS_DIRECTORY_SERVICE
, AWS_LAMBDA
, or API_GATEWAY
.
If Protocol
includes AS2
, then the EndpointType
must be VPC
, and domain must be Amazon S3.
The protocol settings that are configured for your server.
To indicate passive mode (for FTP and FTPS protocols), use the PassiveIp
parameter. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.
To ignore the error that is generated when the client attempts to use the SETSTAT
command on a file that you are uploading to an Amazon S3 bucket, use the SetStatOption
parameter. To have the Transfer Family server ignore the SETSTAT
command and upload files without needing to make any changes to your SFTP client, set the value to ENABLE_NO_OP
. If you set the SetStatOption
parameter to ENABLE_NO_OP
, Transfer Family generates a log entry to Amazon CloudWatch Logs, so that you can determine when the client is making a SETSTAT
call.
To determine whether your Transfer Family server resumes recent, negotiated sessions through a unique session ID, use the TlsSessionResumptionMode
parameter.
As2Transports
indicates the transport method for the AS2 messages. Currently, only HTTP is supported.
Specifies the name of the security policy for the server.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for servers.
" }, "WorkflowDetails": { "shape": "WorkflowDetails", "documentation": "Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow.
In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails
can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when the server session disconnects while the file is still being uploaded.
Specifies the log groups to which your server logs are sent.
To specify a log group, you must provide the ARN for an existing log group. In this case, the format of the log group is as follows:
arn:aws:logs:region-name:amazon-account-id:log-group:log-group-name:*
For example, arn:aws:logs:us-east-1:111122223333:log-group:mytestgroup:*
If you have previously specified a log group for a server, you can clear it, and in effect turn off structured logging, by providing an empty value for this parameter in an update-server
call. For example:
update-server --server-id s-1234567890abcdef0 --structured-log-destinations
Specifies whether or not performance for your Amazon S3 directories is optimized. This is disabled by default.
By default, home directory mappings have a TYPE
of DIRECTORY
. If you enable this option, you would then need to explicitly set the HomeDirectoryMapEntry
Type
to FILE
if you want a mapping to have a file target.
The service-assigned identifier of the server that is created.
" } } }, "CreateUserRequest": { "type": "structure", "required": [ "Role", "ServerId", "UserName" ], "members": { "HomeDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry
and Target
pair, where Entry
shows how the path is made visible and Target
is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target
. This value can be set only when HomeDirectoryType
is set to LOGICAL.
The following is an Entry
and Target
pair example.
[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory (\"chroot
\"). To do this, you can set Entry
to /
and set Target
to the value the user should see for their home directory when they log in.
The following is an Entry
and Target
pair example for chroot
.
[ { \"Entry\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
A session policy for your user so that you can use the same Identity and Access Management (IAM) role across multiple users. This policy scopes down a user's access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}
, ${Transfer:HomeDirectory}
, and ${Transfer:HomeBucket}
.
This policy applies only when the domain of ServerId
is Amazon S3. Amazon EFS does not use session policies.
For session policies, Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy
argument.
For an example of a session policy, see Example session policy.
For more information, see AssumeRole in the Amazon Web Services Security Token Service API Reference.
Specifies the full POSIX identity, including user ID (Uid
), group ID (Gid
), and any secondary groups IDs (SecondaryGids
), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in Amazon EFS determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
" }, "SshPublicKeyBody": { "shape": "SshPublicKeyBody", "documentation": "The public portion of the Secure Shell (SSH) key used to authenticate the user to the server.
The three standard SSH public key format elements are <key type>
, <body base64>
, and an optional <comment>
, with spaces between each element.
Transfer Family accepts RSA, ECDSA, and ED25519 keys.
For RSA keys, the key type is ssh-rsa
.
For ED25519 keys, the key type is ssh-ed25519
.
For ECDSA keys, the key type is either ecdsa-sha2-nistp256
, ecdsa-sha2-nistp384
, or ecdsa-sha2-nistp521
, depending on the size of the key you generated.
Key-value pairs that can be used to group and search for users. Tags are metadata attached to users for any purpose.
" }, "UserName": { "shape": "UserName", "documentation": "A unique string that identifies a user and is associated with a ServerId
. This user name must be a minimum of 3 and a maximum of 100 characters long. The following are valid characters: a-z, A-Z, 0-9, underscore '_', hyphen '-', period '.', and at sign '@'. The user name can't start with a hyphen, period, or at sign.
The identifier of the server that the user is attached to.
" }, "UserName": { "shape": "UserName", "documentation": "A unique string that identifies a Transfer Family user.
" } } }, "CreateWorkflowRequest": { "type": "structure", "required": [ "Steps" ], "members": { "Description": { "shape": "WorkflowDescription", "documentation": "A textual description for the workflow.
" }, "Steps": { "shape": "WorkflowSteps", "documentation": "Specifies the details for the steps that are in the specified workflow.
The TYPE
specifies which of the following actions is being taken for this step.
COPY
- Copy the file to another location.
CUSTOM
- Perform a custom step with an Lambda function target.
DECRYPT
- Decrypt a file that was encrypted before it was uploaded.
DELETE
- Delete the file.
TAG
- Add a tag to the file.
Currently, copying and tagging are supported only on S3.
For file location, you specify either the Amazon S3 bucket and key, or the Amazon EFS file system ID and path.
" }, "OnExceptionSteps": { "shape": "WorkflowSteps", "documentation": "Specifies the steps (actions) to take if errors are encountered during execution of the workflow.
For custom steps, the Lambda function needs to send FAILURE
to the call back API to kick off the exception steps. Additionally, if the Lambda does not send SUCCESS
before it times out, the exception steps are executed.
Key-value pairs that can be used to group and search for workflows. Tags are metadata attached to workflows for any purpose.
" } } }, "CreateWorkflowResponse": { "type": "structure", "required": [ "WorkflowId" ], "members": { "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" } } }, "CustomStepDetails": { "type": "structure", "members": { "Name": { "shape": "WorkflowStepName", "documentation": "The name of the step, used as an identifier.
" }, "Target": { "shape": "CustomStepTarget", "documentation": "The ARN for the Lambda function that is being called.
" }, "TimeoutSeconds": { "shape": "CustomStepTimeoutSeconds", "documentation": "Timeout, in seconds, for the step.
" }, "SourceFileLocation": { "shape": "SourceFileLocation", "documentation": "Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
To use the previous file as the input, enter ${previous.file}
. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value.
To use the originally uploaded file location as input for this step, enter ${original.file}
.
Each step type has its own StepDetails
structure.
The name of the step, used as an identifier.
" }, "Type": { "shape": "EncryptionType", "documentation": "The type of encryption used. Currently, this value must be PGP
.
Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
To use the previous file as the input, enter ${previous.file}
. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value.
To use the originally uploaded file location as input for this step, enter ${original.file}
.
A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE
.
If the workflow is processing a file that has the same name as an existing file, the behavior is as follows:
If OverwriteExisting
is TRUE
, the existing file is replaced with the file being processed.
If OverwriteExisting
is FALSE
, nothing happens, and the workflow processing stops.
Specifies the location for the file being decrypted. Use ${Transfer:UserName}
or ${Transfer:UploadDate}
in this field to parametrize the destination prefix by username or uploaded date.
Set the value of DestinationFileLocation
to ${Transfer:UserName}
to decrypt uploaded files to an Amazon S3 bucket that is prefixed with the name of the Transfer Family user that uploaded the file.
Set the value of DestinationFileLocation
to ${Transfer:UploadDate}
to decrypt uploaded files to an Amazon S3 bucket that is prefixed with the date of the upload.
The system resolves UploadDate
to a date format of YYYY-MM-DD, based on the date the file is uploaded in UTC.
Each step type has its own StepDetails
structure.
A system-assigned unique identifier for a server that has this user assigned.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regular expression used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
" } } }, "DeleteAgreementRequest": { "type": "structure", "required": [ "AgreementId", "ServerId" ], "members": { "AgreementId": { "shape": "AgreementId", "documentation": "A unique identifier for the agreement. This identifier is returned when you create an agreement.
" }, "ServerId": { "shape": "ServerId", "documentation": "The server identifier associated with the agreement that you are deleting.
" } } }, "DeleteCertificateRequest": { "type": "structure", "required": [ "CertificateId" ], "members": { "CertificateId": { "shape": "CertificateId", "documentation": "The identifier of the certificate object that you are deleting.
" } } }, "DeleteConnectorRequest": { "type": "structure", "required": [ "ConnectorId" ], "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector.
" } } }, "DeleteHostKeyRequest": { "type": "structure", "required": [ "ServerId", "HostKeyId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "The identifier of the server that contains the host key that you are deleting.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "The identifier of the host key that you are deleting.
" } } }, "DeleteProfileRequest": { "type": "structure", "required": [ "ProfileId" ], "members": { "ProfileId": { "shape": "ProfileId", "documentation": "The identifier of the profile that you are deleting.
" } } }, "DeleteServerRequest": { "type": "structure", "required": [ "ServerId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A unique system-assigned identifier for a server instance.
" } } }, "DeleteSshPublicKeyRequest": { "type": "structure", "required": [ "ServerId", "SshPublicKeyId", "UserName" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a file transfer protocol-enabled server instance that has the user assigned to it.
" }, "SshPublicKeyId": { "shape": "SshPublicKeyId", "documentation": "A unique identifier used to reference your user's specific SSH key.
" }, "UserName": { "shape": "UserName", "documentation": "A unique string that identifies a user whose public key is being deleted.
" } } }, "DeleteStepDetails": { "type": "structure", "members": { "Name": { "shape": "WorkflowStepName", "documentation": "The name of the step, used as an identifier.
" }, "SourceFileLocation": { "shape": "SourceFileLocation", "documentation": "Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
To use the previous file as the input, enter ${previous.file}
. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value.
To use the originally uploaded file location as input for this step, enter ${original.file}
.
The name of the step, used to identify the delete step.
" }, "DeleteUserRequest": { "type": "structure", "required": [ "ServerId", "UserName" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance that has the user assigned to it.
" }, "UserName": { "shape": "UserName", "documentation": "A unique string that identifies a user that is being deleted from a server.
" } } }, "DeleteWorkflowRequest": { "type": "structure", "required": [ "WorkflowId" ], "members": { "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" } } }, "DescribeAccessRequest": { "type": "structure", "required": [ "ServerId", "ExternalId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server that has this access assigned.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regular expression used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
" } } }, "DescribeAccessResponse": { "type": "structure", "required": [ "ServerId", "Access" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server that has this access assigned.
" }, "Access": { "shape": "DescribedAccess", "documentation": "The external identifier of the server that the access is attached to.
" } } }, "DescribeAgreementRequest": { "type": "structure", "required": [ "AgreementId", "ServerId" ], "members": { "AgreementId": { "shape": "AgreementId", "documentation": "A unique identifier for the agreement. This identifier is returned when you create an agreement.
" }, "ServerId": { "shape": "ServerId", "documentation": "The server identifier that's associated with the agreement.
" } } }, "DescribeAgreementResponse": { "type": "structure", "required": [ "Agreement" ], "members": { "Agreement": { "shape": "DescribedAgreement", "documentation": "The details for the specified agreement, returned as a DescribedAgreement
object.
An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" } } }, "DescribeCertificateResponse": { "type": "structure", "required": [ "Certificate" ], "members": { "Certificate": { "shape": "DescribedCertificate", "documentation": "The details for the specified certificate, returned as an object.
" } } }, "DescribeConnectorRequest": { "type": "structure", "required": [ "ConnectorId" ], "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector.
" } } }, "DescribeConnectorResponse": { "type": "structure", "required": [ "Connector" ], "members": { "Connector": { "shape": "DescribedConnector", "documentation": "The structure that contains the details of the connector.
" } } }, "DescribeExecutionRequest": { "type": "structure", "required": [ "ExecutionId", "WorkflowId" ], "members": { "ExecutionId": { "shape": "ExecutionId", "documentation": "A unique identifier for the execution of a workflow.
" }, "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" } } }, "DescribeExecutionResponse": { "type": "structure", "required": [ "WorkflowId", "Execution" ], "members": { "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" }, "Execution": { "shape": "DescribedExecution", "documentation": "The structure that contains the details of the workflow' execution.
" } } }, "DescribeHostKeyRequest": { "type": "structure", "required": [ "ServerId", "HostKeyId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "The identifier of the server that contains the host key that you want described.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "The identifier of the host key that you want described.
" } } }, "DescribeHostKeyResponse": { "type": "structure", "required": [ "HostKey" ], "members": { "HostKey": { "shape": "DescribedHostKey", "documentation": "Returns the details for the specified host key.
" } } }, "DescribeProfileRequest": { "type": "structure", "required": [ "ProfileId" ], "members": { "ProfileId": { "shape": "ProfileId", "documentation": "The identifier of the profile that you want described.
" } } }, "DescribeProfileResponse": { "type": "structure", "required": [ "Profile" ], "members": { "Profile": { "shape": "DescribedProfile", "documentation": "The details of the specified profile, returned as an object.
" } } }, "DescribeSecurityPolicyRequest": { "type": "structure", "required": [ "SecurityPolicyName" ], "members": { "SecurityPolicyName": { "shape": "SecurityPolicyName", "documentation": "Specify the text name of the security policy for which you want the details.
" } } }, "DescribeSecurityPolicyResponse": { "type": "structure", "required": [ "SecurityPolicy" ], "members": { "SecurityPolicy": { "shape": "DescribedSecurityPolicy", "documentation": "An array containing the properties of the security policy.
" } } }, "DescribeServerRequest": { "type": "structure", "required": [ "ServerId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server.
" } } }, "DescribeServerResponse": { "type": "structure", "required": [ "Server" ], "members": { "Server": { "shape": "DescribedServer", "documentation": "An array containing the properties of a server with the ServerID
you specified.
A system-assigned unique identifier for a server that has this user assigned.
" }, "UserName": { "shape": "UserName", "documentation": "The name of the user assigned to one or more servers. User names are part of the sign-in credentials to use the Transfer Family service and perform file transfer tasks.
" } } }, "DescribeUserResponse": { "type": "structure", "required": [ "ServerId", "User" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server that has this user assigned.
" }, "User": { "shape": "DescribedUser", "documentation": "An array containing the properties of the Transfer Family user for the ServerID
value that you specified.
A unique identifier for the workflow.
" } } }, "DescribeWorkflowResponse": { "type": "structure", "required": [ "Workflow" ], "members": { "Workflow": { "shape": "DescribedWorkflow", "documentation": "The structure that contains the details of the workflow.
" } } }, "DescribedAccess": { "type": "structure", "members": { "HomeDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry
and Target
pair, where Entry
shows how the path is made visible and Target
is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target
. This value can be set only when HomeDirectoryType
is set to LOGICAL.
In most cases, you can use this value instead of the session policy to lock down the associated access to the designated home directory (\"chroot
\"). To do this, you can set Entry
to '/' and set Target
to the HomeDirectory
parameter value.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
A session policy for your user so that you can use the same Identity and Access Management (IAM) role across multiple users. This policy scopes down a user's access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}
, ${Transfer:HomeDirectory}
, and ${Transfer:HomeBucket}
.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regular expression used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
" } }, "documentation": "Describes the properties of the access that was specified.
" }, "DescribedAgreement": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "The unique Amazon Resource Name (ARN) for the agreement.
" }, "AgreementId": { "shape": "AgreementId", "documentation": "A unique identifier for the agreement. This identifier is returned when you create an agreement.
" }, "Description": { "shape": "Description", "documentation": "The name or short description that's used to identify the agreement.
" }, "Status": { "shape": "AgreementStatusType", "documentation": "The current status of the agreement, either ACTIVE
or INACTIVE
.
A system-assigned unique identifier for a server instance. This identifier indicates the specific server that the agreement uses.
" }, "LocalProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the AS2 local profile.
" }, "PartnerProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the partner profile used in the agreement.
" }, "BaseDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for files that are transferred by using the AS2 protocol.
" }, "AccessRole": { "shape": "Role", "documentation": "Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use.
For AS2 connectors
With AS2, you can send files by calling StartFileTransfer
and specifying the file paths in the request parameter, SendFilePaths
. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt
, parent directory is /bucket/dir/
) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole
needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer
request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer
.
If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue
permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt
permission for that key.
For SFTP connectors
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer
request. Additionally, make sure that the role provides secretsmanager:GetSecretValue
permission to Secrets Manager.
Key-value pairs that can be used to group and search for agreements.
" } }, "documentation": "Describes the properties of an agreement.
" }, "DescribedCertificate": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "The unique Amazon Resource Name (ARN) for the certificate.
" }, "CertificateId": { "shape": "CertificateId", "documentation": "An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" }, "Usage": { "shape": "CertificateUsageType", "documentation": "Specifies how this certificate is used. It can be used in the following ways:
SIGNING
: For signing AS2 messages
ENCRYPTION
: For encrypting AS2 messages
TLS
: For securing AS2 communications sent over HTTPS
The certificate can be either ACTIVE
, PENDING_ROTATION
, or INACTIVE
. PENDING_ROTATION
means that this certificate will replace the current certificate when it expires.
The file name for the certificate.
" }, "CertificateChain": { "shape": "CertificateChainType", "documentation": "The list of certificates that make up the chain for the certificate.
" }, "ActiveDate": { "shape": "CertDate", "documentation": "An optional date that specifies when the certificate becomes active.
" }, "InactiveDate": { "shape": "CertDate", "documentation": "An optional date that specifies when the certificate becomes inactive.
" }, "Serial": { "shape": "CertSerial", "documentation": "The serial number for the certificate.
" }, "NotBeforeDate": { "shape": "CertDate", "documentation": "The earliest date that the certificate is valid.
" }, "NotAfterDate": { "shape": "CertDate", "documentation": "The final date that the certificate is valid.
" }, "Type": { "shape": "CertificateType", "documentation": "If a private key has been specified for the certificate, its type is CERTIFICATE_WITH_PRIVATE_KEY
. If there is no private key, the type is CERTIFICATE
.
The name or description that's used to identity the certificate.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for certificates.
" } }, "documentation": "Describes the properties of a certificate.
" }, "DescribedConnector": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "The unique Amazon Resource Name (ARN) for the connector.
" }, "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector.
" }, "Url": { "shape": "Url", "documentation": "The URL of the partner's AS2 or SFTP endpoint.
" }, "As2Config": { "shape": "As2ConnectorConfig", "documentation": "A structure that contains the parameters for an AS2 connector object.
" }, "AccessRole": { "shape": "Role", "documentation": "Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use.
For AS2 connectors
With AS2, you can send files by calling StartFileTransfer
and specifying the file paths in the request parameter, SendFilePaths
. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt
, parent directory is /bucket/dir/
) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole
needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer
request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer
.
If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue
permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt
permission for that key.
For SFTP connectors
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer
request. Additionally, make sure that the role provides secretsmanager:GetSecretValue
permission to Secrets Manager.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for connectors.
" }, "SftpConfig": { "shape": "SftpConnectorConfig", "documentation": "A structure that contains the parameters for an SFTP connector object.
" }, "ServiceManagedEgressIpAddresses": { "shape": "ServiceManagedEgressIpAddresses", "documentation": "The list of egress IP addresses of this connector. These IP addresses are assigned automatically when you create the connector.
" }, "SecurityPolicyName": { "shape": "ConnectorSecurityPolicyName", "documentation": "The text name of the security policy for the specified connector.
" } }, "documentation": "Describes the parameters for the connector, as identified by the ConnectorId
.
A unique identifier for the execution of a workflow.
" }, "InitialFileLocation": { "shape": "FileLocation", "documentation": "A structure that describes the Amazon S3 or EFS file location. This is the file location when the execution begins: if the file is being copied, this is the initial (as opposed to destination) file location.
" }, "ServiceMetadata": { "shape": "ServiceMetadata", "documentation": "A container object for the session details that are associated with a workflow.
" }, "ExecutionRole": { "shape": "Role", "documentation": "The IAM role associated with the execution.
" }, "LoggingConfiguration": { "shape": "LoggingConfiguration", "documentation": "The IAM logging role associated with the execution.
" }, "PosixProfile": { "shape": "PosixProfile" }, "Status": { "shape": "ExecutionStatus", "documentation": "The status is one of the execution. Can be in progress, completed, exception encountered, or handling the exception.
" }, "Results": { "shape": "ExecutionResults", "documentation": "A structure that describes the execution results. This includes a list of the steps along with the details of each step, error type and message (if any), and the OnExceptionSteps
structure.
The details for an execution object.
" }, "DescribedHostKey": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "The unique Amazon Resource Name (ARN) for the host key.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "A unique identifier for the host key.
" }, "HostKeyFingerprint": { "shape": "HostKeyFingerprint", "documentation": "The public key fingerprint, which is a short sequence of bytes used to identify the longer public key.
" }, "Description": { "shape": "HostKeyDescription", "documentation": "The text description for this host key.
" }, "Type": { "shape": "HostKeyType", "documentation": "The encryption algorithm that is used for the host key. The Type
parameter is specified by using one of the following values:
ssh-rsa
ssh-ed25519
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
The date on which the host key was added to the server.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for host keys.
" } }, "documentation": "The details for a server host key.
" }, "DescribedProfile": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "The unique Amazon Resource Name (ARN) for the profile.
" }, "ProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the local or partner AS2 profile.
" }, "ProfileType": { "shape": "ProfileType", "documentation": "Indicates whether to list only LOCAL
type profiles or only PARTNER
type profiles. If not supplied in the request, the command lists all types of profiles.
The As2Id
is the AS2-name, as defined in the RFC 4130. For inbound transfers, this is the AS2-From
header for the AS2 messages sent from the partner. For outbound connectors, this is the AS2-To
header for the AS2 messages sent to the partner using the StartFileTransfer
API operation. This ID cannot include spaces.
An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for profiles.
" } }, "documentation": "The details for a local or partner AS2 profile.
" }, "DescribedSecurityPolicy": { "type": "structure", "required": [ "SecurityPolicyName" ], "members": { "Fips": { "shape": "Fips", "documentation": "Specifies whether this policy enables Federal Information Processing Standards (FIPS). This parameter applies to both server and connector security policies.
" }, "SecurityPolicyName": { "shape": "SecurityPolicyName", "documentation": "The text name of the specified security policy.
" }, "SshCiphers": { "shape": "SecurityPolicyOptions", "documentation": "Lists the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
" }, "SshKexs": { "shape": "SecurityPolicyOptions", "documentation": "Lists the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
" }, "SshMacs": { "shape": "SecurityPolicyOptions", "documentation": "Lists the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server or connector. This parameter applies to both server and connector security policies.
" }, "TlsCiphers": { "shape": "SecurityPolicyOptions", "documentation": "Lists the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.
This parameter only applies to security policies for servers.
Lists the host key algorithms for the security policy.
This parameter only applies to security policies for connectors.
The resource type to which the security policy applies, either server or connector.
" }, "Protocols": { "shape": "SecurityPolicyProtocols", "documentation": "Lists the file transfer protocols that the security policy applies to.
" } }, "documentation": "Describes the properties of a security policy that you specify. For more information about security policies, see Working with security policies for servers or Working with security policies for SFTP connectors.
" }, "DescribedServer": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "Specifies the unique Amazon Resource Name (ARN) of the server.
" }, "Certificate": { "shape": "Certificate", "documentation": "Specifies the ARN of the Amazon Web ServicesCertificate Manager (ACM) certificate. Required when Protocols
is set to FTPS
.
The protocol settings that are configured for your server.
To indicate passive mode (for FTP and FTPS protocols), use the PassiveIp
parameter. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.
To ignore the error that is generated when the client attempts to use the SETSTAT
command on a file that you are uploading to an Amazon S3 bucket, use the SetStatOption
parameter. To have the Transfer Family server ignore the SETSTAT
command and upload files without needing to make any changes to your SFTP client, set the value to ENABLE_NO_OP
. If you set the SetStatOption
parameter to ENABLE_NO_OP
, Transfer Family generates a log entry to Amazon CloudWatch Logs, so that you can determine when the client is making a SETSTAT
call.
To determine whether your Transfer Family server resumes recent, negotiated sessions through a unique session ID, use the TlsSessionResumptionMode
parameter.
As2Transports
indicates the transport method for the AS2 messages. Currently, only HTTP is supported.
Specifies the domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
" }, "EndpointDetails": { "shape": "EndpointDetails", "documentation": "The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make your endpoint accessible only to resources within your VPC, or you can attach Elastic IP addresses and make your endpoint accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
" }, "EndpointType": { "shape": "EndpointType", "documentation": "Defines the type of endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
" }, "HostKeyFingerprint": { "shape": "HostKeyFingerprint", "documentation": "Specifies the Base64-encoded SHA256 fingerprint of the server's host key. This value is equivalent to the output of the ssh-keygen -l -f my-new-server-key
command.
Specifies information to call a customer-supplied authentication API. This field is not populated when the IdentityProviderType
of a server is AWS_DIRECTORY_SERVICE
or SERVICE_MANAGED
.
The mode of authentication for a server. The default value is SERVICE_MANAGED
, which allows you to store and access user credentials within the Transfer Family service.
Use AWS_DIRECTORY_SERVICE
to provide access to Active Directory groups in Directory Service for Microsoft Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connector. This option also requires you to provide a Directory ID by using the IdentityProviderDetails
parameter.
Use the API_GATEWAY
value to integrate with an identity provider of your choosing. The API_GATEWAY
setting requires you to provide an Amazon API Gateway endpoint URL to call for authentication by using the IdentityProviderDetails
parameter.
Use the AWS_LAMBDA
value to directly use an Lambda function as your identity provider. If you choose this value, you must specify the ARN for the Lambda function in the Function
parameter for the IdentityProviderDetails
data type.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFSevents. When set, you can view user activity in your CloudWatch logs.
" }, "PostAuthenticationLoginBanner": { "shape": "PostAuthenticationLoginBanner", "documentation": "Specifies a string to display when users connect to a server. This string is displayed after the user authenticates.
The SFTP protocol does not support post-authentication display banners.
Specifies a string to display when users connect to a server. This string is displayed before the user authenticates. For example, the following banner displays details about using the system:
This system is for the use of authorized users only. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
SFTP
(Secure Shell (SSH) File Transfer Protocol): File transfer over SSH
FTPS
(File Transfer Protocol Secure): File transfer with TLS encryption
FTP
(File Transfer Protocol): Unencrypted file transfer
AS2
(Applicability Statement 2): used for transporting structured business-to-business data
If you select FTPS
, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS.
If Protocol
includes either FTP
or FTPS
, then the EndpointType
must be VPC
and the IdentityProviderType
must be either AWS_DIRECTORY_SERVICE
, AWS_LAMBDA
, or API_GATEWAY
.
If Protocol
includes FTP
, then AddressAllocationIds
cannot be associated.
If Protocol
is set only to SFTP
, the EndpointType
can be set to PUBLIC
and the IdentityProviderType
can be set any of the supported identity types: SERVICE_MANAGED
, AWS_DIRECTORY_SERVICE
, AWS_LAMBDA
, or API_GATEWAY
.
If Protocol
includes AS2
, then the EndpointType
must be VPC
, and domain must be Amazon S3.
Specifies the name of the security policy for the server.
" }, "ServerId": { "shape": "ServerId", "documentation": "Specifies the unique system-assigned identifier for a server that you instantiate.
" }, "State": { "shape": "State", "documentation": "The condition of the server that was described. A value of ONLINE
indicates that the server can accept jobs and transfer files. A State
value of OFFLINE
means that the server cannot perform file transfer operations.
The states of STARTING
and STOPPING
indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED
or STOP_FAILED
can indicate an error condition.
Specifies the key-value pairs that you can use to search for and group servers that were assigned to the server that was described.
" }, "UserCount": { "shape": "UserCount", "documentation": "Specifies the number of users that are assigned to a server you specified with the ServerId
.
Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow.
In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails
can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when the server session disconnects while the file is still being uploaded.
Specifies the log groups to which your server logs are sent.
To specify a log group, you must provide the ARN for an existing log group. In this case, the format of the log group is as follows:
arn:aws:logs:region-name:amazon-account-id:log-group:log-group-name:*
For example, arn:aws:logs:us-east-1:111122223333:log-group:mytestgroup:*
If you have previously specified a log group for a server, you can clear it, and in effect turn off structured logging, by providing an empty value for this parameter in an update-server
call. For example:
update-server --server-id s-1234567890abcdef0 --structured-log-destinations
Specifies whether or not performance for your Amazon S3 directories is optimized. This is disabled by default.
By default, home directory mappings have a TYPE
of DIRECTORY
. If you enable this option, you would then need to explicitly set the HomeDirectoryMapEntry
Type
to FILE
if you want a mapping to have a file target.
The list of egress IP addresses of this server. These IP addresses are only relevant for servers that use the AS2 protocol. They are used for sending asynchronous MDNs.
These IP addresses are assigned automatically when you create an AS2 server. Additionally, if you update an existing server and add the AS2 protocol, static IP addresses are assigned as well.
" } }, "documentation": "Describes the properties of a file transfer protocol-enabled server that was specified.
" }, "DescribedUser": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "Specifies the unique Amazon Resource Name (ARN) for the user that was requested to be described.
" }, "HomeDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry
and Target
pair, where Entry
shows how the path is made visible and Target
is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target
. This value can be set only when HomeDirectoryType
is set to LOGICAL.
In most cases, you can use this value instead of the session policy to lock your user down to the designated home directory (\"chroot
\"). To do this, you can set Entry
to '/' and set Target
to the HomeDirectory parameter value.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
A session policy for your user so that you can use the same Identity and Access Management (IAM) role across multiple users. This policy scopes down a user's access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}
, ${Transfer:HomeDirectory}
, and ${Transfer:HomeBucket}
.
Specifies the full POSIX identity, including user ID (Uid
), group ID (Gid
), and any secondary groups IDs (SecondaryGids
), that controls your users' access to your Amazon Elastic File System (Amazon EFS) file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "SshPublicKeys": { "shape": "SshPublicKeys", "documentation": "Specifies the public key portion of the Secure Shell (SSH) keys stored for the described user.
" }, "Tags": { "shape": "Tags", "documentation": "Specifies the key-value pairs for the user requested. Tag can be used to search for and group users for a variety of purposes.
" }, "UserName": { "shape": "UserName", "documentation": "Specifies the name of the user that was requested to be described. User names are used for authentication purposes. This is the string that will be used by your user when they log in to your server.
" } }, "documentation": "Describes the properties of a user that was specified.
" }, "DescribedWorkflow": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "Specifies the unique Amazon Resource Name (ARN) for the workflow.
" }, "Description": { "shape": "WorkflowDescription", "documentation": "Specifies the text description for the workflow.
" }, "Steps": { "shape": "WorkflowSteps", "documentation": "Specifies the details for the steps that are in the specified workflow.
" }, "OnExceptionSteps": { "shape": "WorkflowSteps", "documentation": "Specifies the steps (actions) to take if errors are encountered during execution of the workflow.
" }, "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for workflows. Tags are metadata attached to workflows for any purpose.
" } }, "documentation": "Describes the properties of the specified workflow
" }, "Description": { "type": "string", "max": 200, "min": 1, "pattern": "[\\p{Graph}]+" }, "DirectoryId": { "type": "string", "max": 12, "min": 12, "pattern": "d-[0-9a-f]{10}" }, "DirectoryListingOptimization": { "type": "string", "documentation": "Indicates whether optimization to directory listing on S3 servers is used. Disabled by default for compatibility.
", "enum": [ "ENABLED", "DISABLED" ] }, "Domain": { "type": "string", "enum": [ "S3", "EFS" ] }, "EfsFileLocation": { "type": "structure", "members": { "FileSystemId": { "shape": "EfsFileSystemId", "documentation": "The identifier of the file system, assigned by Amazon EFS.
" }, "Path": { "shape": "EfsPath", "documentation": "The pathname for the folder being used by a workflow.
" } }, "documentation": "Specifies the details for the file location for the file that's being used in the workflow. Only applicable if you are using Amazon Elastic File Systems (Amazon EFS) for storage.
" }, "EfsFileSystemId": { "type": "string", "max": 128, "min": 0, "pattern": "(arn:aws[-a-z]*:elasticfilesystem:[0-9a-z-:]+:(access-point/fsap|file-system/fs)-[0-9a-f]{8,40}|fs(ap)?-[0-9a-f]{8,40})" }, "EfsPath": { "type": "string", "max": 65536, "min": 1, "pattern": "[^\\x00]+" }, "EncryptionAlg": { "type": "string", "enum": [ "AES128_CBC", "AES192_CBC", "AES256_CBC", "DES_EDE3_CBC", "NONE" ] }, "EncryptionType": { "type": "string", "enum": [ "PGP" ] }, "EndpointDetails": { "type": "structure", "members": { "AddressAllocationIds": { "shape": "AddressAllocationIds", "documentation": "
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
An address allocation ID corresponds to the allocation ID of an Elastic IP address. This value can be retrieved from the allocationId
field from the Amazon EC2 Address data type. One way to retrieve this value is by calling the EC2 DescribeAddresses API.
This parameter is optional. Set this parameter if you want to make your VPC endpoint public-facing. For details, see Create an internet-facing endpoint for your server.
This property can only be set as follows:
EndpointType
must be set to VPC
The Transfer Family server must be offline.
You cannot set this parameter for Transfer Family servers that use the FTP protocol.
The server must already have SubnetIds
populated (SubnetIds
and AddressAllocationIds
cannot be updated simultaneously).
AddressAllocationIds
can't contain duplicates, and must be equal in length to SubnetIds
. For example, if you have three subnet IDs, you must also specify three address allocation IDs.
Call the UpdateServer
API to set or change this parameter.
A list of subnet IDs that are required to host your server endpoint in your VPC.
This property can only be set when EndpointType
is set to VPC
.
The identifier of the VPC endpoint.
This property can only be set when EndpointType
is set to VPC_ENDPOINT
.
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
The VPC identifier of the VPC in which a server's endpoint will be hosted.
This property can only be set when EndpointType
is set to VPC
.
A list of security groups IDs that are available to attach to your server's endpoint.
This property can only be set when EndpointType
is set to VPC
.
You can edit the SecurityGroupIds
property in the UpdateServer API only if you are changing the EndpointType
from PUBLIC
or VPC_ENDPOINT
to VPC
. To change security groups associated with your server's VPC endpoint after creation, use the Amazon EC2 ModifyVpcEndpoint API.
The virtual private cloud (VPC) endpoint settings that are configured for your file transfer protocol-enabled server. With a VPC endpoint, you can restrict access to your server and resources only within your VPC. To control incoming internet traffic, invoke the UpdateServer
API and attach an Elastic IP address to your server's endpoint.
After May 19, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT
in your Amazon Web Servicesaccount if your account hasn't already done so before May 19, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT
in your Amazon Web Servicesaccount on or before May 19, 2021, you will not be affected. After this date, use EndpointType
=VPC
.
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
Specifies the error type.
ALREADY_EXISTS
: occurs for a copy step, if the overwrite option is not selected and a file with the same name already exists in the target location.
BAD_REQUEST
: a general bad request: for example, a step that attempts to tag an EFS file returns BAD_REQUEST
, as only S3 files can be tagged.
CUSTOM_STEP_FAILED
: occurs when the custom step provided a callback that indicates failure.
INTERNAL_SERVER_ERROR
: a catch-all error that can occur for a variety of reasons.
NOT_FOUND
: occurs when a requested entity, for example a source file for a copy step, does not exist.
PERMISSION_DENIED
: occurs if your policy does not contain the correct permissions to complete one or more of the steps in the workflow.
TIMEOUT
: occurs when the execution times out.
You can set the TimeoutSeconds
for a custom step, anywhere from 1 second to 1800 seconds (30 minutes).
THROTTLED
: occurs if you exceed the new execution refill rate of one workflow per second.
Specifies the descriptive message that corresponds to the ErrorType
.
Specifies the error message and type, for an error that occurs during the execution of the workflow.
" }, "ExecutionErrorMessage": { "type": "string" }, "ExecutionErrorType": { "type": "string", "enum": [ "PERMISSION_DENIED", "CUSTOM_STEP_FAILED", "THROTTLED", "ALREADY_EXISTS", "NOT_FOUND", "BAD_REQUEST", "TIMEOUT", "INTERNAL_SERVER_ERROR" ] }, "ExecutionId": { "type": "string", "max": 36, "min": 36, "pattern": "[0-9a-fA-F]{8}\\-[0-9a-fA-F]{4}\\-[0-9a-fA-F]{4}\\-[0-9a-fA-F]{4}\\-[0-9a-fA-F]{12}" }, "ExecutionResults": { "type": "structure", "members": { "Steps": { "shape": "ExecutionStepResults", "documentation": "Specifies the details for the steps that are in the specified workflow.
" }, "OnExceptionSteps": { "shape": "ExecutionStepResults", "documentation": "Specifies the steps (actions) to take if errors are encountered during execution of the workflow.
" } }, "documentation": "Specifies the steps in the workflow, as well as the steps to execute in case of any errors during workflow execution.
" }, "ExecutionStatus": { "type": "string", "enum": [ "IN_PROGRESS", "COMPLETED", "EXCEPTION", "HANDLING_EXCEPTION" ] }, "ExecutionStepResult": { "type": "structure", "members": { "StepType": { "shape": "WorkflowStepType", "documentation": "One of the available step types.
COPY
- Copy the file to another location.
CUSTOM
- Perform a custom step with an Lambda function target.
DECRYPT
- Decrypt a file that was encrypted before it was uploaded.
DELETE
- Delete the file.
TAG
- Add a tag to the file.
The values for the key/value pair applied as a tag to the file. Only applicable if the step type is TAG
.
Specifies the details for an error, if it occurred during execution of the specified workflow step.
" } }, "documentation": "Specifies the following details for the step: error (if any), outputs (if any), and the step type.
" }, "ExecutionStepResults": { "type": "list", "member": { "shape": "ExecutionStepResult" }, "max": 50, "min": 1 }, "ExternalId": { "type": "string", "max": 256, "min": 1, "pattern": "S-1-[\\d-]+" }, "FileLocation": { "type": "structure", "members": { "S3FileLocation": { "shape": "S3FileLocation", "documentation": "Specifies the S3 details for the file being used, such as bucket, ETag, and so forth.
" }, "EfsFileLocation": { "shape": "EfsFileLocation", "documentation": "Specifies the Amazon EFS identifier and the path for the file being used.
" } }, "documentation": "Specifies the Amazon S3 or EFS file details to be used in the step.
" }, "FilePath": { "type": "string", "max": 1024, "min": 1, "pattern": "(.)+" }, "FilePaths": { "type": "list", "member": { "shape": "FilePath" }, "max": 10, "min": 1 }, "Fips": { "type": "boolean", "box": true }, "Function": { "type": "string", "max": 170, "min": 1, "pattern": "arn:[a-z-]+:lambda:.*" }, "HomeDirectory": { "type": "string", "max": 1024, "min": 0, "pattern": "(|/.*)" }, "HomeDirectoryMapEntry": { "type": "structure", "required": [ "Entry", "Target" ], "members": { "Entry": { "shape": "MapEntry", "documentation": "Represents an entry for HomeDirectoryMappings
.
Represents the map target that is used in a HomeDirectoryMapEntry
.
Specifies the type of mapping. Set the type to FILE
if you want the mapping to point to a file, or DIRECTORY
for the directory to point to a directory.
By default, home directory mappings have a Type
of DIRECTORY
when you create a Transfer Family server. You would need to explicitly set Type
to FILE
if you want a mapping to have a file target.
Represents an object that contains entries and targets for HomeDirectoryMappings
.
The following is an Entry
and Target
pair example for chroot
.
[ { \"Entry\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
Provides the location of the service endpoint used to authenticate users.
" }, "InvocationRole": { "shape": "Role", "documentation": "This parameter is only applicable if your IdentityProviderType
is API_GATEWAY
. Provides the type of InvocationRole
used to authenticate the user account.
The identifier of the Directory Service directory that you want to use as your identity provider.
" }, "Function": { "shape": "Function", "documentation": "The ARN for a Lambda function to use for the Identity provider.
" }, "SftpAuthenticationMethods": { "shape": "SftpAuthenticationMethods", "documentation": "For SFTP-enabled servers, and for custom identity providers only, you can specify whether to authenticate using a password, SSH key pair, or both.
PASSWORD
- users must provide their password to connect.
PUBLIC_KEY
- users must provide their private key to connect.
PUBLIC_KEY_OR_PASSWORD
- users can authenticate with either their password or their key. This is the default value.
PUBLIC_KEY_AND_PASSWORD
- users must provide both their private key and their password to connect. The server checks the key first, and then if the key is valid, the system prompts for a password. If the private key provided does not match the public key that is stored, authentication fails.
Returns information related to the type of user authentication that is in use for a file transfer protocol-enabled server's users. A server can have only one method of authentication.
" }, "IdentityProviderType": { "type": "string", "documentation": "The mode of authentication for a server. The default value is SERVICE_MANAGED
, which allows you to store and access user credentials within the Transfer Family service.
Use AWS_DIRECTORY_SERVICE
to provide access to Active Directory groups in Directory Service for Microsoft Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connector. This option also requires you to provide a Directory ID by using the IdentityProviderDetails
parameter.
Use the API_GATEWAY
value to integrate with an identity provider of your choosing. The API_GATEWAY
setting requires you to provide an Amazon API Gateway endpoint URL to call for authentication by using the IdentityProviderDetails
parameter.
Use the AWS_LAMBDA
value to directly use an Lambda function as your identity provider. If you choose this value, you must specify the ARN for the Lambda function in the Function
parameter for the IdentityProviderDetails
data type.
Specifies how this certificate is used. It can be used in the following ways:
SIGNING
: For signing AS2 messages
ENCRYPTION
: For encrypting AS2 messages
TLS
: For securing AS2 communications sent over HTTPS
For the CLI, provide a file path for a certificate in URI format. For example, --certificate file://encryption-cert.pem
. Alternatively, you can provide the raw content.
For the SDK, specify the raw content of a certificate file. For example, --certificate \"`cat encryption-cert.pem`\"
.
An optional list of certificates that make up the chain for the certificate that's being imported.
" }, "PrivateKey": { "shape": "PrivateKeyType", "documentation": "For the CLI, provide a file path for a private key in URI format.For example, --private-key file://encryption-key.pem
. Alternatively, you can provide the raw content of the private key file.
For the SDK, specify the raw content of a private key file. For example, --private-key \"`cat encryption-key.pem`\"
An optional date that specifies when the certificate becomes active.
" }, "InactiveDate": { "shape": "CertDate", "documentation": "An optional date that specifies when the certificate becomes inactive.
" }, "Description": { "shape": "Description", "documentation": "A short description that helps identify the certificate.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for certificates.
" } } }, "ImportCertificateResponse": { "type": "structure", "required": [ "CertificateId" ], "members": { "CertificateId": { "shape": "CertificateId", "documentation": "An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" } } }, "ImportHostKeyRequest": { "type": "structure", "required": [ "ServerId", "HostKeyBody" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "The identifier of the server that contains the host key that you are importing.
" }, "HostKeyBody": { "shape": "HostKey", "documentation": "The private key portion of an SSH key pair.
Transfer Family accepts RSA, ECDSA, and ED25519 keys.
" }, "Description": { "shape": "HostKeyDescription", "documentation": "The text description that identifies this host key.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs that can be used to group and search for host keys.
" } } }, "ImportHostKeyResponse": { "type": "structure", "required": [ "ServerId", "HostKeyId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "Returns the server identifier that contains the imported key.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "Returns the host key identifier for the imported key.
" } } }, "ImportSshPublicKeyRequest": { "type": "structure", "required": [ "ServerId", "SshPublicKeyBody", "UserName" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server.
" }, "SshPublicKeyBody": { "shape": "SshPublicKeyBody", "documentation": "The public key portion of an SSH key pair.
Transfer Family accepts RSA, ECDSA, and ED25519 keys.
" }, "UserName": { "shape": "UserName", "documentation": "The name of the Transfer Family user that is assigned to one or more servers.
" } } }, "ImportSshPublicKeyResponse": { "type": "structure", "required": [ "ServerId", "SshPublicKeyId", "UserName" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server.
" }, "SshPublicKeyId": { "shape": "SshPublicKeyId", "documentation": "The name given to a public key by the system that was imported.
" }, "UserName": { "shape": "UserName", "documentation": "A user name assigned to the ServerID
value that you specified.
Identifies the user, the server they belong to, and the identifier of the SSH public key associated with that user. A user can have more than one key on each server that they are associated with.
" }, "InputFileLocation": { "type": "structure", "members": { "S3FileLocation": { "shape": "S3InputFileLocation", "documentation": "Specifies the details for the Amazon S3 file that's being copied or decrypted.
" }, "EfsFileLocation": { "shape": "EfsFileLocation", "documentation": "Specifies the details for the Amazon Elastic File System (Amazon EFS) file that's being decrypted.
" } }, "documentation": "Specifies the location for the file that's being processed.
" }, "ListAccessesRequest": { "type": "structure", "required": [ "ServerId" ], "members": { "MaxResults": { "shape": "MaxResults", "documentation": "Specifies the maximum number of access SIDs to return.
" }, "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListAccesses
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional accesses.
A system-assigned unique identifier for a server that has users assigned to it.
" } } }, "ListAccessesResponse": { "type": "structure", "required": [ "ServerId", "Accesses" ], "members": { "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListAccesses
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional accesses.
A system-assigned unique identifier for a server that has users assigned to it.
" }, "Accesses": { "shape": "ListedAccesses", "documentation": "Returns the accesses and their properties for the ServerId
value that you specify.
The maximum number of agreements to return.
" }, "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListAgreements
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional agreements.
The identifier of the server for which you want a list of agreements.
" } } }, "ListAgreementsResponse": { "type": "structure", "required": [ "Agreements" ], "members": { "NextToken": { "shape": "NextToken", "documentation": "Returns a token that you can use to call ListAgreements
again and receive additional results, if there are any.
Returns an array, where each item contains the details of an agreement.
" } } }, "ListCertificatesRequest": { "type": "structure", "members": { "MaxResults": { "shape": "MaxResults", "documentation": "The maximum number of certificates to return.
" }, "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListCertificates
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional certificates.
Returns the next token, which you can use to list the next certificate.
" }, "Certificates": { "shape": "ListedCertificates", "documentation": "Returns an array of the certificates that are specified in the ListCertificates
call.
The maximum number of connectors to return.
" }, "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListConnectors
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional connectors.
Returns a token that you can use to call ListConnectors
again and receive additional results, if there are any.
Returns an array, where each item contains the details of a connector.
" } } }, "ListExecutionsRequest": { "type": "structure", "required": [ "WorkflowId" ], "members": { "MaxResults": { "shape": "MaxResults", "documentation": "Specifies the maximum number of executions to return.
" }, "NextToken": { "shape": "NextToken", "documentation": " ListExecutions
returns the NextToken
parameter in the output. You can then pass the NextToken
parameter in a subsequent command to continue listing additional executions.
This is useful for pagination, for instance. If you have 100 executions for a workflow, you might only want to list first 10. If so, call the API by specifying the max-results
:
aws transfer list-executions --max-results 10
This returns details for the first 10 executions, as well as the pointer (NextToken
) to the eleventh execution. You can now call the API again, supplying the NextToken
value you received:
aws transfer list-executions --max-results 10 --next-token $somePointerReturnedFromPreviousListResult
This call returns the next 10 executions, the 11th through the 20th. You can then repeat the call until the details for all 100 executions have been returned.
" }, "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" } } }, "ListExecutionsResponse": { "type": "structure", "required": [ "WorkflowId", "Executions" ], "members": { "NextToken": { "shape": "NextToken", "documentation": " ListExecutions
returns the NextToken
parameter in the output. You can then pass the NextToken
parameter in a subsequent command to continue listing additional executions.
A unique identifier for the workflow.
" }, "Executions": { "shape": "ListedExecutions", "documentation": "Returns the details for each execution, in a ListedExecution
array.
The maximum number of host keys to return.
" }, "NextToken": { "shape": "NextToken", "documentation": "When there are additional results that were not returned, a NextToken
parameter is returned. You can use that value for a subsequent call to ListHostKeys
to continue listing results.
The identifier of the server that contains the host keys that you want to view.
" } } }, "ListHostKeysResponse": { "type": "structure", "required": [ "ServerId", "HostKeys" ], "members": { "NextToken": { "shape": "NextToken", "documentation": "Returns a token that you can use to call ListHostKeys
again and receive additional results, if there are any.
Returns the server identifier that contains the listed host keys.
" }, "HostKeys": { "shape": "ListedHostKeys", "documentation": "Returns an array, where each item contains the details of a host key.
" } } }, "ListProfilesRequest": { "type": "structure", "members": { "MaxResults": { "shape": "MaxResults", "documentation": "The maximum number of profiles to return.
" }, "NextToken": { "shape": "NextToken", "documentation": "When there are additional results that were not returned, a NextToken
parameter is returned. You can use that value for a subsequent call to ListProfiles
to continue listing results.
Indicates whether to list only LOCAL
type profiles or only PARTNER
type profiles. If not supplied in the request, the command lists all types of profiles.
Returns a token that you can use to call ListProfiles
again and receive additional results, if there are any.
Returns an array, where each item contains the details of a profile.
" } } }, "ListSecurityPoliciesRequest": { "type": "structure", "members": { "MaxResults": { "shape": "MaxResults", "documentation": "Specifies the number of security policies to return as a response to the ListSecurityPolicies
query.
When additional results are obtained from the ListSecurityPolicies
command, a NextToken
parameter is returned in the output. You can then pass the NextToken
parameter in a subsequent command to continue listing additional security policies.
When you can get additional results from the ListSecurityPolicies
operation, a NextToken
parameter is returned in the output. In a following command, you can pass in the NextToken
parameter to continue listing security policies.
An array of security policies that were listed.
" } } }, "ListServersRequest": { "type": "structure", "members": { "MaxResults": { "shape": "MaxResults", "documentation": "Specifies the number of servers to return as a response to the ListServers
query.
When additional results are obtained from the ListServers
command, a NextToken
parameter is returned in the output. You can then pass the NextToken
parameter in a subsequent command to continue listing additional servers.
When you can get additional results from the ListServers
operation, a NextToken
parameter is returned in the output. In a following command, you can pass in the NextToken
parameter to continue listing additional servers.
An array of servers that were listed.
" } } }, "ListTagsForResourceRequest": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "Requests the tags associated with a particular Amazon Resource Name (ARN). An ARN is an identifier for a specific Amazon Web Services resource, such as a server, user, or role.
" }, "MaxResults": { "shape": "MaxResults", "documentation": "Specifies the number of tags to return as a response to the ListTagsForResource
request.
When you request additional results from the ListTagsForResource
operation, a NextToken
parameter is returned in the input. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional tags.
The ARN you specified to list the tags of.
" }, "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListTagsForResource
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional tags.
Key-value pairs that are assigned to a resource, usually for the purpose of grouping and searching for items. Tags are metadata that you define.
" } } }, "ListUsersRequest": { "type": "structure", "required": [ "ServerId" ], "members": { "MaxResults": { "shape": "MaxResults", "documentation": "Specifies the number of users to return as a response to the ListUsers
request.
If there are additional results from the ListUsers
call, a NextToken
parameter is returned in the output. You can then pass the NextToken
to a subsequent ListUsers
command, to continue listing additional users.
A system-assigned unique identifier for a server that has users assigned to it.
" } } }, "ListUsersResponse": { "type": "structure", "required": [ "ServerId", "Users" ], "members": { "NextToken": { "shape": "NextToken", "documentation": "When you can get additional results from the ListUsers
call, a NextToken
parameter is returned in the output. You can then pass in a subsequent command to the NextToken
parameter to continue listing additional users.
A system-assigned unique identifier for a server that the users are assigned to.
" }, "Users": { "shape": "ListedUsers", "documentation": "Returns the Transfer Family users and their properties for the ServerId
value that you specify.
Specifies the maximum number of workflows to return.
" }, "NextToken": { "shape": "NextToken", "documentation": " ListWorkflows
returns the NextToken
parameter in the output. You can then pass the NextToken
parameter in a subsequent command to continue listing additional workflows.
ListWorkflows
returns the NextToken
parameter in the output. You can then pass the NextToken
parameter in a subsequent command to continue listing additional workflows.
Returns the Arn
, WorkflowId
, and Description
for each workflow.
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regular expression used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
" } }, "documentation": "Lists the properties for one or more specified associated accesses.
" }, "ListedAccesses": { "type": "list", "member": { "shape": "ListedAccess" } }, "ListedAgreement": { "type": "structure", "members": { "Arn": { "shape": "Arn", "documentation": "The Amazon Resource Name (ARN) of the specified agreement.
" }, "AgreementId": { "shape": "AgreementId", "documentation": "A unique identifier for the agreement. This identifier is returned when you create an agreement.
" }, "Description": { "shape": "Description", "documentation": "The current description for the agreement. You can change it by calling the UpdateAgreement
operation and providing a new description.
The agreement can be either ACTIVE
or INACTIVE
.
The unique identifier for the agreement.
" }, "LocalProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the AS2 local profile.
" }, "PartnerProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the partner profile.
" } }, "documentation": "Describes the properties of an agreement.
" }, "ListedAgreements": { "type": "list", "member": { "shape": "ListedAgreement" } }, "ListedCertificate": { "type": "structure", "members": { "Arn": { "shape": "Arn", "documentation": "The Amazon Resource Name (ARN) of the specified certificate.
" }, "CertificateId": { "shape": "CertificateId", "documentation": "An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" }, "Usage": { "shape": "CertificateUsageType", "documentation": "Specifies how this certificate is used. It can be used in the following ways:
SIGNING
: For signing AS2 messages
ENCRYPTION
: For encrypting AS2 messages
TLS
: For securing AS2 communications sent over HTTPS
The certificate can be either ACTIVE
, PENDING_ROTATION
, or INACTIVE
. PENDING_ROTATION
means that this certificate will replace the current certificate when it expires.
An optional date that specifies when the certificate becomes active.
" }, "InactiveDate": { "shape": "CertDate", "documentation": "An optional date that specifies when the certificate becomes inactive.
" }, "Type": { "shape": "CertificateType", "documentation": "The type for the certificate. If a private key has been specified for the certificate, its type is CERTIFICATE_WITH_PRIVATE_KEY
. If there is no private key, the type is CERTIFICATE
.
The name or short description that's used to identify the certificate.
" } }, "documentation": "Describes the properties of a certificate.
" }, "ListedCertificates": { "type": "list", "member": { "shape": "ListedCertificate" } }, "ListedConnector": { "type": "structure", "members": { "Arn": { "shape": "Arn", "documentation": "The Amazon Resource Name (ARN) of the specified connector.
" }, "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector.
" }, "Url": { "shape": "Url", "documentation": "The URL of the partner's AS2 or SFTP endpoint.
" } }, "documentation": "Returns details of the connector that is specified.
" }, "ListedConnectors": { "type": "list", "member": { "shape": "ListedConnector" } }, "ListedExecution": { "type": "structure", "members": { "ExecutionId": { "shape": "ExecutionId", "documentation": "A unique identifier for the execution of a workflow.
" }, "InitialFileLocation": { "shape": "FileLocation", "documentation": "A structure that describes the Amazon S3 or EFS file location. This is the file location when the execution begins: if the file is being copied, this is the initial (as opposed to destination) file location.
" }, "ServiceMetadata": { "shape": "ServiceMetadata", "documentation": "A container object for the session details that are associated with a workflow.
" }, "Status": { "shape": "ExecutionStatus", "documentation": "The status is one of the execution. Can be in progress, completed, exception encountered, or handling the exception.
" } }, "documentation": "Returns properties of the execution that is specified.
" }, "ListedExecutions": { "type": "list", "member": { "shape": "ListedExecution" } }, "ListedHostKey": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "The unique Amazon Resource Name (ARN) of the host key.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "A unique identifier for the host key.
" }, "Fingerprint": { "shape": "HostKeyFingerprint", "documentation": "The public key fingerprint, which is a short sequence of bytes used to identify the longer public key.
" }, "Description": { "shape": "HostKeyDescription", "documentation": "The current description for the host key. You can change it by calling the UpdateHostKey
operation and providing a new description.
The encryption algorithm that is used for the host key. The Type
parameter is specified by using one of the following values:
ssh-rsa
ssh-ed25519
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
The date on which the host key was added to the server.
" } }, "documentation": "Returns properties of the host key that's specified.
" }, "ListedHostKeys": { "type": "list", "member": { "shape": "ListedHostKey" } }, "ListedProfile": { "type": "structure", "members": { "Arn": { "shape": "Arn", "documentation": "The Amazon Resource Name (ARN) of the specified profile.
" }, "ProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the local or partner AS2 profile.
" }, "As2Id": { "shape": "As2Id", "documentation": "The As2Id
is the AS2-name, as defined in the RFC 4130. For inbound transfers, this is the AS2-From
header for the AS2 messages sent from the partner. For outbound connectors, this is the AS2-To
header for the AS2 messages sent to the partner using the StartFileTransfer
API operation. This ID cannot include spaces.
Indicates whether to list only LOCAL
type profiles or only PARTNER
type profiles. If not supplied in the request, the command lists all types of profiles.
Returns the properties of the profile that was specified.
" }, "ListedProfiles": { "type": "list", "member": { "shape": "ListedProfile" } }, "ListedServer": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "Specifies the unique Amazon Resource Name (ARN) for a server to be listed.
" }, "Domain": { "shape": "Domain", "documentation": "Specifies the domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
" }, "IdentityProviderType": { "shape": "IdentityProviderType", "documentation": "The mode of authentication for a server. The default value is SERVICE_MANAGED
, which allows you to store and access user credentials within the Transfer Family service.
Use AWS_DIRECTORY_SERVICE
to provide access to Active Directory groups in Directory Service for Microsoft Active Directory or Microsoft Active Directory in your on-premises environment or in Amazon Web Services using AD Connector. This option also requires you to provide a Directory ID by using the IdentityProviderDetails
parameter.
Use the API_GATEWAY
value to integrate with an identity provider of your choosing. The API_GATEWAY
setting requires you to provide an Amazon API Gateway endpoint URL to call for authentication by using the IdentityProviderDetails
parameter.
Use the AWS_LAMBDA
value to directly use an Lambda function as your identity provider. If you choose this value, you must specify the ARN for the Lambda function in the Function
parameter for the IdentityProviderDetails
data type.
Specifies the type of VPC endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
" }, "LoggingRole": { "shape": "Role", "documentation": "The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFSevents. When set, you can view user activity in your CloudWatch logs.
" }, "ServerId": { "shape": "ServerId", "documentation": "Specifies the unique system assigned identifier for the servers that were listed.
" }, "State": { "shape": "State", "documentation": "The condition of the server that was described. A value of ONLINE
indicates that the server can accept jobs and transfer files. A State
value of OFFLINE
means that the server cannot perform file transfer operations.
The states of STARTING
and STOPPING
indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED
or STOP_FAILED
can indicate an error condition.
Specifies the number of users that are assigned to a server you specified with the ServerId
.
Returns properties of a file transfer protocol-enabled server that was specified.
" }, "ListedServers": { "type": "list", "member": { "shape": "ListedServer" } }, "ListedUser": { "type": "structure", "required": [ "Arn" ], "members": { "Arn": { "shape": "Arn", "documentation": "Provides the unique Amazon Resource Name (ARN) for the user that you want to learn about.
" }, "HomeDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
The IAM role that controls your users' access to your Amazon S3 bucket for servers with Domain=S3
, or your EFS file system for servers with Domain=EFS
.
The policies attached to this role determine the level of access you want to provide your users when transferring files into and out of your S3 buckets or EFS file systems.
Specifies the number of SSH public keys stored for the user you specified.
" }, "UserName": { "shape": "UserName", "documentation": "Specifies the name of the user whose ARN was specified. User names are used for authentication purposes.
" } }, "documentation": "Returns properties of the user that you specify.
" }, "ListedUsers": { "type": "list", "member": { "shape": "ListedUser" } }, "ListedWorkflow": { "type": "structure", "members": { "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" }, "Description": { "shape": "WorkflowDescription", "documentation": "Specifies the text description for the workflow.
" }, "Arn": { "shape": "Arn", "documentation": "Specifies the unique Amazon Resource Name (ARN) for the workflow.
" } }, "documentation": "Contains the identifier, text description, and Amazon Resource Name (ARN) for the workflow.
" }, "ListedWorkflows": { "type": "list", "member": { "shape": "ListedWorkflow" } }, "ListingId": { "type": "string", "max": 512, "min": 1, "pattern": "[0-9a-zA-Z./-]+" }, "LogGroupName": { "type": "string", "max": 512, "min": 1, "pattern": "[\\.\\-_/#A-Za-z0-9]*" }, "LoggingConfiguration": { "type": "structure", "members": { "LoggingRole": { "shape": "Role", "documentation": "The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFSevents. When set, you can view user activity in your CloudWatch logs.
" }, "LogGroupName": { "shape": "LogGroupName", "documentation": "The name of the CloudWatch logging group for the Transfer Family server to which this workflow belongs.
" } }, "documentation": "Consists of the logging role and the log group name.
" }, "MapEntry": { "type": "string", "max": 1024, "min": 0, "pattern": "/.*" }, "MapTarget": { "type": "string", "max": 1024, "min": 0, "pattern": "/.*" }, "MapType": { "type": "string", "enum": [ "FILE", "DIRECTORY" ] }, "MaxItems": { "type": "integer", "box": true, "max": 10000, "min": 1 }, "MaxResults": { "type": "integer", "box": true, "max": 1000, "min": 1 }, "MdnResponse": { "type": "string", "enum": [ "SYNC", "NONE" ] }, "MdnSigningAlg": { "type": "string", "enum": [ "SHA256", "SHA384", "SHA512", "SHA1", "NONE", "DEFAULT" ] }, "Message": { "type": "string" }, "MessageSubject": { "type": "string", "max": 1024, "min": 1, "pattern": "[\\p{Print}\\p{Blank}]+" }, "NextToken": { "type": "string", "max": 6144, "min": 1 }, "NullableRole": { "type": "string", "max": 2048, "min": 0, "pattern": "(|arn:.*role/\\S+)" }, "OnPartialUploadWorkflowDetails": { "type": "list", "member": { "shape": "WorkflowDetail" }, "max": 1, "min": 0 }, "OnUploadWorkflowDetails": { "type": "list", "member": { "shape": "WorkflowDetail" }, "max": 1, "min": 0 }, "OutputFileName": { "type": "string", "max": 537, "min": 26, "pattern": "c-([0-9a-f]{17})-[0-9a-zA-Z./-]+.json" }, "OverwriteExisting": { "type": "string", "enum": [ "TRUE", "FALSE" ] }, "PassiveIp": { "type": "string", "max": 15, "min": 0 }, "Policy": { "type": "string", "max": 2048, "min": 0 }, "PosixId": { "type": "long", "box": true, "max": 4294967295, "min": 0 }, "PosixProfile": { "type": "structure", "required": [ "Uid", "Gid" ], "members": { "Uid": { "shape": "PosixId", "documentation": "The POSIX user ID used for all EFS operations by this user.
" }, "Gid": { "shape": "PosixId", "documentation": "The POSIX group ID used for all EFS operations by this user.
" }, "SecondaryGids": { "shape": "SecondaryGids", "documentation": "The secondary POSIX group IDs used for all EFS operations by this user.
" } }, "documentation": "The full POSIX identity, including user ID (Uid
), group ID (Gid
), and any secondary groups IDs (SecondaryGids
), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
Indicates passive mode, for FTP and FTPS protocols. Enter a single IPv4 address, such as the public IP address of a firewall, router, or load balancer. For example:
aws transfer update-server --protocol-details PassiveIp=0.0.0.0
Replace 0.0.0.0
in the example above with the actual IP address you want to use.
If you change the PassiveIp
value, you must stop and then restart your Transfer Family server for the change to take effect. For details on using passive mode (PASV) in a NAT environment, see Configuring your FTPS server behind a firewall or NAT with Transfer Family.
Special values
The AUTO
and 0.0.0.0
are special values for the PassiveIp
parameter. The value PassiveIp=AUTO
is assigned by default to FTP and FTPS type servers. In this case, the server automatically responds with one of the endpoint IPs within the PASV response. PassiveIp=0.0.0.0
has a more unique application for its usage. For example, if you have a High Availability (HA) Network Load Balancer (NLB) environment, where you have 3 subnets, you can only specify a single IP address using the PassiveIp
parameter. This reduces the effectiveness of having High Availability. In this case, you can specify PassiveIp=0.0.0.0
. This tells the client to use the same IP address as the Control connection and utilize all AZs for their connections. Note, however, that not all FTP clients support the PassiveIp=0.0.0.0
response. FileZilla and WinSCP do support it. If you are using other clients, check to see if your client supports the PassiveIp=0.0.0.0
response.
A property used with Transfer Family servers that use the FTPS protocol. TLS Session Resumption provides a mechanism to resume or share a negotiated secret key between the control and data connection for an FTPS session. TlsSessionResumptionMode
determines whether or not the server resumes recent, negotiated sessions through a unique session ID. This property is available during CreateServer
and UpdateServer
calls. If a TlsSessionResumptionMode
value is not specified during CreateServer
, it is set to ENFORCED
by default.
DISABLED
: the server does not process TLS session resumption client requests and creates a new TLS session for each request.
ENABLED
: the server processes and accepts clients that are performing TLS session resumption. The server doesn't reject client data connections that do not perform the TLS session resumption client processing.
ENFORCED
: the server processes and accepts clients that are performing TLS session resumption. The server rejects client data connections that do not perform the TLS session resumption client processing. Before you set the value to ENFORCED
, test your clients.
Not all FTPS clients perform TLS session resumption. So, if you choose to enforce TLS session resumption, you prevent any connections from FTPS clients that don't perform the protocol negotiation. To determine whether or not you can use the ENFORCED
value, you need to test your clients.
Use the SetStatOption
to ignore the error that is generated when the client attempts to use SETSTAT
on a file you are uploading to an S3 bucket.
Some SFTP file transfer clients can attempt to change the attributes of remote files, including timestamp and permissions, using commands, such as SETSTAT
when uploading the file. However, these commands are not compatible with object storage systems, such as Amazon S3. Due to this incompatibility, file uploads from these clients can result in errors even when the file is otherwise successfully uploaded.
Set the value to ENABLE_NO_OP
to have the Transfer Family server ignore the SETSTAT
command, and upload files without needing to make any changes to your SFTP client. While the SetStatOption
ENABLE_NO_OP
setting ignores the error, it does generate a log entry in Amazon CloudWatch Logs, so you can determine when the client is making a SETSTAT
call.
If you want to preserve the original timestamp for your file, and modify other file attributes using SETSTAT
, you can use Amazon EFS as backend storage with Transfer Family.
Indicates the transport method for the AS2 messages. Currently, only HTTP is supported.
" } }, "documentation": "The protocol settings that are configured for your server.
" }, "Protocols": { "type": "list", "member": { "shape": "Protocol" }, "max": 4, "min": 1 }, "Response": { "type": "string" }, "Role": { "type": "string", "max": 2048, "min": 20, "pattern": "arn:.*role/\\S+" }, "S3Bucket": { "type": "string", "max": 63, "min": 3, "pattern": "[a-z0-9][\\.\\-a-z0-9]{1,61}[a-z0-9]" }, "S3Etag": { "type": "string", "max": 65536, "min": 1, "pattern": ".+" }, "S3FileLocation": { "type": "structure", "members": { "Bucket": { "shape": "S3Bucket", "documentation": "Specifies the S3 bucket that contains the file being used.
" }, "Key": { "shape": "S3Key", "documentation": "The name assigned to the file when it was created in Amazon S3. You use the object key to retrieve the object.
" }, "VersionId": { "shape": "S3VersionId", "documentation": "Specifies the file version.
" }, "Etag": { "shape": "S3Etag", "documentation": "The entity tag is a hash of the object. The ETag reflects changes only to the contents of an object, not its metadata.
" } }, "documentation": "Specifies the details for the file location for the file that's being used in the workflow. Only applicable if you are using S3 storage.
" }, "S3InputFileLocation": { "type": "structure", "members": { "Bucket": { "shape": "S3Bucket", "documentation": "Specifies the S3 bucket for the customer input file.
" }, "Key": { "shape": "S3Key", "documentation": "The name assigned to the file when it was created in Amazon S3. You use the object key to retrieve the object.
" } }, "documentation": "Specifies the customer input Amazon S3 file location. If it is used inside copyStepDetails.DestinationFileLocation
, it should be the S3 copy destination.
You need to provide the bucket and key. The key can represent either a path or a file. This is determined by whether or not you end the key value with the forward slash (/) character. If the final character is \"/\", then your file is copied to the folder, and its name does not change. If, rather, the final character is alphanumeric, your uploaded file is renamed to the path value. In this case, if a file with that name already exists, it is overwritten.
For example, if your path is shared-files/bob/
, your uploaded files are copied to the shared-files/bob/
, folder. If your path is shared-files/today
, each uploaded file is copied to the shared-files
folder and named today
: each upload overwrites the previous version of the bob file.
Specifies whether or not performance for your Amazon S3 directories is optimized. This is disabled by default.
By default, home directory mappings have a TYPE
of DIRECTORY
. If you enable this option, you would then need to explicitly set the HomeDirectoryMapEntry
Type
to FILE
if you want a mapping to have a file target.
The Amazon S3 storage options that are configured for your server.
" }, "S3Tag": { "type": "structure", "required": [ "Key", "Value" ], "members": { "Key": { "shape": "S3TagKey", "documentation": "The name assigned to the tag that you create.
" }, "Value": { "shape": "S3TagValue", "documentation": "The value that corresponds to the key.
" } }, "documentation": "Specifies the key-value pair that are assigned to a file during the execution of a Tagging step.
" }, "S3TagKey": { "type": "string", "max": 128, "min": 1, "pattern": "([\\p{L}\\p{Z}\\p{N}_.:/=+\\-@]*)" }, "S3TagValue": { "type": "string", "max": 256, "min": 0, "pattern": "([\\p{L}\\p{Z}\\p{N}_.:/=+\\-@]*)" }, "S3Tags": { "type": "list", "member": { "shape": "S3Tag" }, "max": 10, "min": 1 }, "S3VersionId": { "type": "string", "max": 1024, "min": 1, "pattern": ".+" }, "SecondaryGids": { "type": "list", "member": { "shape": "PosixId" }, "max": 16, "min": 0 }, "SecretId": { "type": "string", "max": 2048, "min": 1 }, "SecurityGroupId": { "type": "string", "max": 20, "min": 11, "pattern": "sg-[0-9a-f]{8,17}" }, "SecurityGroupIds": { "type": "list", "member": { "shape": "SecurityGroupId" } }, "SecurityPolicyName": { "type": "string", "max": 100, "min": 0, "pattern": "Transfer[A-Za-z0-9]*SecurityPolicy-[A-Za-z0-9-]+" }, "SecurityPolicyNames": { "type": "list", "member": { "shape": "SecurityPolicyName" } }, "SecurityPolicyOption": { "type": "string", "max": 50, "min": 0 }, "SecurityPolicyOptions": { "type": "list", "member": { "shape": "SecurityPolicyOption" } }, "SecurityPolicyProtocol": { "type": "string", "enum": [ "SFTP", "FTPS" ] }, "SecurityPolicyProtocols": { "type": "list", "member": { "shape": "SecurityPolicyProtocol" }, "max": 5, "min": 1 }, "SecurityPolicyResourceType": { "type": "string", "enum": [ "SERVER", "CONNECTOR" ] }, "SendWorkflowStepStateRequest": { "type": "structure", "required": [ "WorkflowId", "ExecutionId", "Token", "Status" ], "members": { "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" }, "ExecutionId": { "shape": "ExecutionId", "documentation": "A unique identifier for the execution of a workflow.
" }, "Token": { "shape": "CallbackToken", "documentation": "Used to distinguish between multiple callbacks for multiple Lambda steps within the same execution.
" }, "Status": { "shape": "CustomStepStatus", "documentation": "Indicates whether the specified step succeeded or failed.
" } } }, "SendWorkflowStepStateResponse": { "type": "structure", "members": {} }, "ServerId": { "type": "string", "max": 19, "min": 19, "pattern": "s-([0-9a-f]{17})" }, "ServiceManagedEgressIpAddress": { "type": "string", "pattern": "\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}" }, "ServiceManagedEgressIpAddresses": { "type": "list", "member": { "shape": "ServiceManagedEgressIpAddress" }, "documentation": "The list of egress IP addresses of this server. These IP addresses are only relevant for servers that use the AS2 protocol. They are used for sending asynchronous MDNs. These IP addresses are assigned automatically when you create an AS2 server. Additionally, if you update an existing server and add the AS2 protocol, static IP addresses are assigned as well.
" }, "ServiceMetadata": { "type": "structure", "required": [ "UserDetails" ], "members": { "UserDetails": { "shape": "UserDetails", "documentation": "The Server ID (ServerId
), Session ID (SessionId
) and user (UserName
) make up the UserDetails
.
A container object for the session details that are associated with a workflow.
" }, "SessionId": { "type": "string", "max": 32, "min": 3, "pattern": "[\\w-]*" }, "SetStatOption": { "type": "string", "enum": [ "DEFAULT", "ENABLE_NO_OP" ] }, "SftpAuthenticationMethods": { "type": "string", "enum": [ "PASSWORD", "PUBLIC_KEY", "PUBLIC_KEY_OR_PASSWORD", "PUBLIC_KEY_AND_PASSWORD" ] }, "SftpConnectorConfig": { "type": "structure", "members": { "UserSecretId": { "shape": "SecretId", "documentation": "The identifier for the secret (in Amazon Web Services Secrets Manager) that contains the SFTP user's private key, password, or both. The identifier must be the Amazon Resource Name (ARN) of the secret.
" }, "TrustedHostKeys": { "shape": "SftpConnectorTrustedHostKeyList", "documentation": "The public portion of the host key, or keys, that are used to identify the external server to which you are connecting. You can use the ssh-keyscan
command against the SFTP server to retrieve the necessary key.
The three standard SSH public key format elements are <key type>
, <body base64>
, and an optional <comment>
, with spaces between each element. Specify only the <key type>
and <body base64>
: do not enter the <comment>
portion of the key.
For the trusted host key, Transfer Family accepts RSA and ECDSA keys.
For RSA keys, the <key type>
string is ssh-rsa
.
For ECDSA keys, the <key type>
string is either ecdsa-sha2-nistp256
, ecdsa-sha2-nistp384
, or ecdsa-sha2-nistp521
, depending on the size of the key you generated.
Run this command to retrieve the SFTP server host key, where your SFTP server name is ftp.host.com
.
ssh-keyscan ftp.host.com
This prints the public host key to standard output.
ftp.host.com ssh-rsa AAAAB3Nza...<long-string-for-public-key
Copy and paste this string into the TrustedHostKeys
field for the create-connector
command or into the Trusted host keys field in the console.
Contains the details for an SFTP connector object. The connector object is used for transferring files to and from a partner's SFTP server.
Because the SftpConnectorConfig
data type is used for both creating and updating SFTP connectors, its parameters, TrustedHostKeys
and UserSecretId
are marked as not required. This is a bit misleading, as they are not required when you are updating an existing SFTP connector, but are required when you are creating a new SFTP connector.
Specifies the date that the public key was added to the Transfer Family user.
" }, "SshPublicKeyBody": { "shape": "SshPublicKeyBody", "documentation": "Specifies the content of the SSH public key as specified by the PublicKeyId
.
Transfer Family accepts RSA, ECDSA, and ED25519 keys.
" }, "SshPublicKeyId": { "shape": "SshPublicKeyId", "documentation": "Specifies the SshPublicKeyId
parameter contains the identifier of the public key.
Provides information about the public Secure Shell (SSH) key that is associated with a Transfer Family user for the specific file transfer protocol-enabled server (as identified by ServerId
). The information returned includes the date the key was imported, the public key contents, and the public key ID. A user can store more than one SSH public key associated with their user name on a specific server.
The unique identifier for the connector.
" }, "RemoteDirectoryPath": { "shape": "FilePath", "documentation": "Specifies the directory on the remote SFTP server for which you want to list its contents.
" }, "MaxItems": { "shape": "MaxItems", "documentation": "An optional parameter where you can specify the maximum number of file/directory names to retrieve. The default value is 1,000.
" }, "OutputDirectoryPath": { "shape": "FilePath", "documentation": "Specifies the path (bucket and prefix) in Amazon S3 storage to store the results of the directory listing.
" } } }, "StartDirectoryListingResponse": { "type": "structure", "required": [ "ListingId", "OutputFileName" ], "members": { "ListingId": { "shape": "ListingId", "documentation": "Returns a unique identifier for the directory listing call.
" }, "OutputFileName": { "shape": "OutputFileName", "documentation": "Returns the file name where the results are stored. This is a combination of the connector ID and the listing ID: <connector-id>-<listing-id>.json
.
The unique identifier for the connector.
" }, "SendFilePaths": { "shape": "FilePaths", "documentation": "One or more source paths for the Amazon S3 storage. Each string represents a source file path for one outbound file transfer. For example, DOC-EXAMPLE-BUCKET/myfile.txt
.
Replace DOC-EXAMPLE-BUCKET
with one of your actual buckets.
One or more source paths for the partner's SFTP server. Each string represents a source file path for one inbound file transfer.
" }, "LocalDirectoryPath": { "shape": "FilePath", "documentation": "For an inbound transfer, the LocaDirectoryPath
specifies the destination for one or more files that are transferred from the partner's SFTP server.
For an outbound transfer, the RemoteDirectoryPath
specifies the destination for one or more files that are transferred to the partner's SFTP server. If you don't specify a RemoteDirectoryPath
, the destination for transferred files is the SFTP user's home directory.
Returns the unique identifier for the file transfer.
" } } }, "StartServerRequest": { "type": "structure", "required": [ "ServerId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server that you start.
" } } }, "State": { "type": "string", "documentation": "Describes the condition of a file transfer protocol-enabled server with respect to its ability to perform file operations. There are six possible states: OFFLINE
, ONLINE
, STARTING
, STOPPING
, START_FAILED
, and STOP_FAILED
.
OFFLINE
indicates that the server exists, but that it is not available for file operations. ONLINE
indicates that the server is available to perform file operations. STARTING
indicates that the server's was instantiated, but the server is not yet available to perform file operations. Under normal conditions, it can take a couple of minutes for the server to be completely operational. Both START_FAILED
and STOP_FAILED
are error conditions.
A system-assigned unique identifier for a server that you stopped.
" } } }, "StructuredLogDestinations": { "type": "list", "member": { "shape": "Arn" }, "max": 1, "min": 0 }, "SubnetId": { "type": "string" }, "SubnetIds": { "type": "list", "member": { "shape": "SubnetId" } }, "Tag": { "type": "structure", "required": [ "Key", "Value" ], "members": { "Key": { "shape": "TagKey", "documentation": "The name assigned to the tag that you create.
" }, "Value": { "shape": "TagValue", "documentation": "Contains one or more values that you assigned to the key name you create.
" } }, "documentation": "Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group
and assign the values Research
and Accounting
to that group.
An Amazon Resource Name (ARN) for a specific Amazon Web Services resource, such as a server, user, or role.
" }, "Tags": { "shape": "Tags", "documentation": "Key-value pairs assigned to ARNs that you can use to group and search for resources by type. You can attach this metadata to resources (servers, users, workflows, and so on) for any purpose.
" } } }, "TagStepDetails": { "type": "structure", "members": { "Name": { "shape": "WorkflowStepName", "documentation": "The name of the step, used as an identifier.
" }, "Tags": { "shape": "S3Tags", "documentation": "Array that contains from 1 to 10 key/value pairs.
" }, "SourceFileLocation": { "shape": "SourceFileLocation", "documentation": "Specifies which file to use as input to the workflow step: either the output from the previous step, or the originally uploaded file for the workflow.
To use the previous file as the input, enter ${previous.file}
. In this case, this workflow step uses the output file from the previous workflow step as input. This is the default value.
To use the originally uploaded file location as input for this step, enter ${original.file}
.
Each step type has its own StepDetails
structure.
The key/value pairs used to tag a file during the execution of a workflow step.
" }, "TagValue": { "type": "string", "max": 256, "min": 0 }, "Tags": { "type": "list", "member": { "shape": "Tag" }, "max": 50, "min": 1 }, "TestConnectionRequest": { "type": "structure", "required": [ "ConnectorId" ], "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector.
" } } }, "TestConnectionResponse": { "type": "structure", "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "Returns the identifier of the connector object that you are testing.
" }, "Status": { "shape": "Status", "documentation": "Returns OK
for successful test, or ERROR
if the test fails.
Returns Connection succeeded
if the test is successful. Or, returns a descriptive error message if the test fails. The following list provides troubleshooting details, depending on the error message that you receive.
Verify that your secret name aligns with the one in Transfer Role permissions.
Verify the server URL in the connector configuration , and verify that the login credentials work successfully outside of the connector.
Verify that the secret exists and is formatted correctly.
Verify that the trusted host key in the connector configuration matches the ssh-keyscan
output.
A system-assigned identifier for a specific server. That server's user authentication method is tested with a user name and password.
" }, "ServerProtocol": { "shape": "Protocol", "documentation": "The type of file transfer protocol to be tested.
The available protocols are:
Secure Shell (SSH) File Transfer Protocol (SFTP)
File Transfer Protocol Secure (FTPS)
File Transfer Protocol (FTP)
Applicability Statement 2 (AS2)
The source IP address of the account to be tested.
" }, "UserName": { "shape": "UserName", "documentation": "The name of the account to be tested.
" }, "UserPassword": { "shape": "UserPassword", "documentation": "The password of the account to be tested.
" } } }, "TestIdentityProviderResponse": { "type": "structure", "required": [ "StatusCode", "Url" ], "members": { "Response": { "shape": "Response", "documentation": "The response that is returned from your API Gateway or your Lambda function.
" }, "StatusCode": { "shape": "StatusCode", "documentation": "The HTTP status code that is the response from your API Gateway or your Lambda function.
" }, "Message": { "shape": "Message", "documentation": "A message that indicates whether the test was successful or not.
If an empty string is returned, the most likely cause is that the authentication failed due to an incorrect username or password.
The endpoint of the service used to authenticate a user.
" } } }, "TlsSessionResumptionMode": { "type": "string", "enum": [ "DISABLED", "ENABLED", "ENFORCED" ] }, "TransferId": { "type": "string", "max": 512, "min": 1, "pattern": "[0-9a-zA-Z./-]+" }, "UntagResourceRequest": { "type": "structure", "required": [ "Arn", "TagKeys" ], "members": { "Arn": { "shape": "Arn", "documentation": "The value of the resource that will have the tag removed. An Amazon Resource Name (ARN) is an identifier for a specific Amazon Web Services resource, such as a server, user, or role.
" }, "TagKeys": { "shape": "TagKeys", "documentation": "TagKeys are key-value pairs assigned to ARNs that can be used to group and search for resources by type. This metadata can be attached to resources for any purpose.
" } } }, "UpdateAccessRequest": { "type": "structure", "required": [ "ServerId", "ExternalId" ], "members": { "HomeDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry
and Target
pair, where Entry
shows how the path is made visible and Target
is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target
. This value can be set only when HomeDirectoryType
is set to LOGICAL.
The following is an Entry
and Target
pair example.
[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
In most cases, you can use this value instead of the session policy to lock down your user to the designated home directory (\"chroot
\"). To do this, you can set Entry
to /
and set Target
to the HomeDirectory
parameter value.
The following is an Entry
and Target
pair example for chroot
.
[ { \"Entry\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
A session policy for your user so that you can use the same Identity and Access Management (IAM) role across multiple users. This policy scopes down a user's access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}
, ${Transfer:HomeDirectory}
, and ${Transfer:HomeBucket}
.
This policy applies only when the domain of ServerId
is Amazon S3. Amazon EFS does not use session policies.
For session policies, Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy
argument.
For an example of a session policy, see Example session policy.
For more information, see AssumeRole in the Amazon Web ServicesSecurity Token Service API Reference.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like \"YourGroupName*\"} -Properties * | Select SamAccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regular expression used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
" } } }, "UpdateAccessResponse": { "type": "structure", "required": [ "ServerId", "ExternalId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "The identifier of the server that the user is attached to.
" }, "ExternalId": { "shape": "ExternalId", "documentation": "The external identifier of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using Amazon Web ServicesTransfer Family.
" } } }, "UpdateAgreementRequest": { "type": "structure", "required": [ "AgreementId", "ServerId" ], "members": { "AgreementId": { "shape": "AgreementId", "documentation": "A unique identifier for the agreement. This identifier is returned when you create an agreement.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance. This is the specific server that the agreement uses.
" }, "Description": { "shape": "Description", "documentation": "To replace the existing description, provide a short description for the agreement.
" }, "Status": { "shape": "AgreementStatusType", "documentation": "You can update the status for the agreement, either activating an inactive agreement or the reverse.
" }, "LocalProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the AS2 local profile.
To change the local profile identifier, provide a new value here.
" }, "PartnerProfileId": { "shape": "ProfileId", "documentation": "A unique identifier for the partner profile. To change the partner profile identifier, provide a new value here.
" }, "BaseDirectory": { "shape": "HomeDirectory", "documentation": "To change the landing directory (folder) for files that are transferred, provide the bucket folder that you want to use; for example, /DOC-EXAMPLE-BUCKET/home/mydirectory
.
Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use.
For AS2 connectors
With AS2, you can send files by calling StartFileTransfer
and specifying the file paths in the request parameter, SendFilePaths
. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt
, parent directory is /bucket/dir/
) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole
needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer
request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer
.
If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue
permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt
permission for that key.
For SFTP connectors
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer
request. Additionally, make sure that the role provides secretsmanager:GetSecretValue
permission to Secrets Manager.
A unique identifier for the agreement. This identifier is returned when you create an agreement.
" } } }, "UpdateCertificateRequest": { "type": "structure", "required": [ "CertificateId" ], "members": { "CertificateId": { "shape": "CertificateId", "documentation": "The identifier of the certificate object that you are updating.
" }, "ActiveDate": { "shape": "CertDate", "documentation": "An optional date that specifies when the certificate becomes active.
" }, "InactiveDate": { "shape": "CertDate", "documentation": "An optional date that specifies when the certificate becomes inactive.
" }, "Description": { "shape": "Description", "documentation": "A short description to help identify the certificate.
" } } }, "UpdateCertificateResponse": { "type": "structure", "required": [ "CertificateId" ], "members": { "CertificateId": { "shape": "CertificateId", "documentation": "Returns the identifier of the certificate object that you are updating.
" } } }, "UpdateConnectorRequest": { "type": "structure", "required": [ "ConnectorId" ], "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "The unique identifier for the connector.
" }, "Url": { "shape": "Url", "documentation": "The URL of the partner's AS2 or SFTP endpoint.
" }, "As2Config": { "shape": "As2ConnectorConfig", "documentation": "A structure that contains the parameters for an AS2 connector object.
" }, "AccessRole": { "shape": "Role", "documentation": "Connectors are used to send files using either the AS2 or SFTP protocol. For the access role, provide the Amazon Resource Name (ARN) of the Identity and Access Management role to use.
For AS2 connectors
With AS2, you can send files by calling StartFileTransfer
and specifying the file paths in the request parameter, SendFilePaths
. We use the file’s parent directory (for example, for --send-file-paths /bucket/dir/file.txt
, parent directory is /bucket/dir/
) to temporarily store a processed AS2 message file, store the MDN when we receive them from the partner, and write a final JSON file containing relevant metadata of the transmission. So, the AccessRole
needs to provide read and write access to the parent directory of the file location used in the StartFileTransfer
request. Additionally, you need to provide read and write access to the parent directory of the files that you intend to send with StartFileTransfer
.
If you are using Basic authentication for your AS2 connector, the access role requires the secretsmanager:GetSecretValue
permission for the secret. If the secret is encrypted using a customer-managed key instead of the Amazon Web Services managed key in Secrets Manager, then the role also needs the kms:Decrypt
permission for that key.
For SFTP connectors
Make sure that the access role provides read and write access to the parent directory of the file location that's used in the StartFileTransfer
request. Additionally, make sure that the role provides secretsmanager:GetSecretValue
permission to Secrets Manager.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a connector to turn on CloudWatch logging for Amazon S3 events. When set, you can view connector activity in your CloudWatch logs.
" }, "SftpConfig": { "shape": "SftpConnectorConfig", "documentation": "A structure that contains the parameters for an SFTP connector object.
" }, "SecurityPolicyName": { "shape": "ConnectorSecurityPolicyName", "documentation": "Specifies the name of the security policy for the connector.
" } } }, "UpdateConnectorResponse": { "type": "structure", "required": [ "ConnectorId" ], "members": { "ConnectorId": { "shape": "ConnectorId", "documentation": "Returns the identifier of the connector object that you are updating.
" } } }, "UpdateHostKeyRequest": { "type": "structure", "required": [ "ServerId", "HostKeyId", "Description" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "The identifier of the server that contains the host key that you are updating.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "The identifier of the host key that you are updating.
" }, "Description": { "shape": "HostKeyDescription", "documentation": "An updated description for the host key.
" } } }, "UpdateHostKeyResponse": { "type": "structure", "required": [ "ServerId", "HostKeyId" ], "members": { "ServerId": { "shape": "ServerId", "documentation": "Returns the server identifier for the server that contains the updated host key.
" }, "HostKeyId": { "shape": "HostKeyId", "documentation": "Returns the host key identifier for the updated host key.
" } } }, "UpdateProfileRequest": { "type": "structure", "required": [ "ProfileId" ], "members": { "ProfileId": { "shape": "ProfileId", "documentation": "The identifier of the profile object that you are updating.
" }, "CertificateIds": { "shape": "CertificateIds", "documentation": "An array of identifiers for the imported certificates. You use this identifier for working with profiles and partner profiles.
" } } }, "UpdateProfileResponse": { "type": "structure", "required": [ "ProfileId" ], "members": { "ProfileId": { "shape": "ProfileId", "documentation": "Returns the identifier for the profile that's being updated.
" } } }, "UpdateServerRequest": { "type": "structure", "required": [ "ServerId" ], "members": { "Certificate": { "shape": "Certificate", "documentation": "The Amazon Resource Name (ARN) of the Amazon Web ServicesCertificate Manager (ACM) certificate. Required when Protocols
is set to FTPS
.
To request a new public certificate, see Request a public certificate in the Amazon Web ServicesCertificate Manager User Guide.
To import an existing certificate into ACM, see Importing certificates into ACM in the Amazon Web ServicesCertificate Manager User Guide.
To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the Amazon Web ServicesCertificate Manager User Guide.
Certificates with the following cryptographic algorithms and key sizes are supported:
2048-bit RSA (RSA_2048)
4096-bit RSA (RSA_4096)
Elliptic Prime Curve 256 bit (EC_prime256v1)
Elliptic Prime Curve 384 bit (EC_secp384r1)
Elliptic Prime Curve 521 bit (EC_secp521r1)
The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.
The protocol settings that are configured for your server.
To indicate passive mode (for FTP and FTPS protocols), use the PassiveIp
parameter. Enter a single dotted-quad IPv4 address, such as the external IP address of a firewall, router, or load balancer.
To ignore the error that is generated when the client attempts to use the SETSTAT
command on a file that you are uploading to an Amazon S3 bucket, use the SetStatOption
parameter. To have the Transfer Family server ignore the SETSTAT
command and upload files without needing to make any changes to your SFTP client, set the value to ENABLE_NO_OP
. If you set the SetStatOption
parameter to ENABLE_NO_OP
, Transfer Family generates a log entry to Amazon CloudWatch Logs, so that you can determine when the client is making a SETSTAT
call.
To determine whether your Transfer Family server resumes recent, negotiated sessions through a unique session ID, use the TlsSessionResumptionMode
parameter.
As2Transports
indicates the transport method for the AS2 messages. Currently, only HTTP is supported.
The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make your endpoint accessible only to resources within your VPC, or you can attach Elastic IP addresses and make your endpoint accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
" }, "EndpointType": { "shape": "EndpointType", "documentation": "The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.
After May 19, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT
in your Amazon Web Servicesaccount if your account hasn't already done so before May 19, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT
in your Amazon Web Servicesaccount on or before May 19, 2021, you will not be affected. After this date, use EndpointType
=VPC
.
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
It is recommended that you use VPC
as the EndpointType
. With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with EndpointType
set to VPC_ENDPOINT
.
The RSA, ECDSA, or ED25519 private key to use for your SFTP-enabled server. You can add multiple host keys, in case you want to rotate keys, or have a set of active keys that use different algorithms.
Use the following command to generate an RSA 2048 bit key with no passphrase:
ssh-keygen -t rsa -b 2048 -N \"\" -m PEM -f my-new-server-key
.
Use a minimum value of 2048 for the -b
option. You can create a stronger key by using 3072 or 4096.
Use the following command to generate an ECDSA 256 bit key with no passphrase:
ssh-keygen -t ecdsa -b 256 -N \"\" -m PEM -f my-new-server-key
.
Valid values for the -b
option for ECDSA are 256, 384, and 521.
Use the following command to generate an ED25519 key with no passphrase:
ssh-keygen -t ed25519 -N \"\" -f my-new-server-key
.
For all of these commands, you can replace my-new-server-key with a string of your choice.
If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive.
For more information, see Manage host keys for your SFTP-enabled server in the Transfer Family User Guide.
" }, "IdentityProviderDetails": { "shape": "IdentityProviderDetails", "documentation": "An array containing all of the information required to call a customer's authentication API method.
" }, "LoggingRole": { "shape": "NullableRole", "documentation": "The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFSevents. When set, you can view user activity in your CloudWatch logs.
" }, "PostAuthenticationLoginBanner": { "shape": "PostAuthenticationLoginBanner", "documentation": "Specifies a string to display when users connect to a server. This string is displayed after the user authenticates.
The SFTP protocol does not support post-authentication display banners.
Specifies a string to display when users connect to a server. This string is displayed before the user authenticates. For example, the following banner displays details about using the system:
This system is for the use of authorized users only. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
SFTP
(Secure Shell (SSH) File Transfer Protocol): File transfer over SSH
FTPS
(File Transfer Protocol Secure): File transfer with TLS encryption
FTP
(File Transfer Protocol): Unencrypted file transfer
AS2
(Applicability Statement 2): used for transporting structured business-to-business data
If you select FTPS
, you must choose a certificate stored in Certificate Manager (ACM) which is used to identify your server when clients connect to it over FTPS.
If Protocol
includes either FTP
or FTPS
, then the EndpointType
must be VPC
and the IdentityProviderType
must be either AWS_DIRECTORY_SERVICE
, AWS_LAMBDA
, or API_GATEWAY
.
If Protocol
includes FTP
, then AddressAllocationIds
cannot be associated.
If Protocol
is set only to SFTP
, the EndpointType
can be set to PUBLIC
and the IdentityProviderType
can be set any of the supported identity types: SERVICE_MANAGED
, AWS_DIRECTORY_SERVICE
, AWS_LAMBDA
, or API_GATEWAY
.
If Protocol
includes AS2
, then the EndpointType
must be VPC
, and domain must be Amazon S3.
Specifies the name of the security policy for the server.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a server instance that the Transfer Family user is assigned to.
" }, "WorkflowDetails": { "shape": "WorkflowDetails", "documentation": "Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow.
In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails
can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when the server session disconnects while the file is still being uploaded.
To remove an associated workflow from a server, you can provide an empty OnUpload
object, as in the following example.
aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{\"OnUpload\":[]}'
Specifies the log groups to which your server logs are sent.
To specify a log group, you must provide the ARN for an existing log group. In this case, the format of the log group is as follows:
arn:aws:logs:region-name:amazon-account-id:log-group:log-group-name:*
For example, arn:aws:logs:us-east-1:111122223333:log-group:mytestgroup:*
If you have previously specified a log group for a server, you can clear it, and in effect turn off structured logging, by providing an empty value for this parameter in an update-server
call. For example:
update-server --server-id s-1234567890abcdef0 --structured-log-destinations
Specifies whether or not performance for your Amazon S3 directories is optimized. This is disabled by default.
By default, home directory mappings have a TYPE
of DIRECTORY
. If you enable this option, you would then need to explicitly set the HomeDirectoryMapEntry
Type
to FILE
if you want a mapping to have a file target.
A system-assigned unique identifier for a server that the Transfer Family user is assigned to.
" } } }, "UpdateUserRequest": { "type": "structure", "required": [ "ServerId", "UserName" ], "members": { "HomeDirectory": { "shape": "HomeDirectory", "documentation": "The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory
example is /bucket_name/home/mydirectory
.
The HomeDirectory
parameter is only used if HomeDirectoryType
is set to PATH
.
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH
, the user will see the absolute Amazon S3 bucket or Amazon EFS path as is in their file transfer protocol clients. If you set it to LOGICAL
, you need to provide mappings in the HomeDirectoryMappings
for how you want to make Amazon S3 or Amazon EFS paths visible to your users.
If HomeDirectoryType
is LOGICAL
, you must provide mappings, using the HomeDirectoryMappings
parameter. If, on the other hand, HomeDirectoryType
is PATH
, you provide an absolute path using the HomeDirectory
parameter. You cannot have both HomeDirectory
and HomeDirectoryMappings
in your template.
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry
and Target
pair, where Entry
shows how the path is made visible and Target
is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it is displayed as is. You also must ensure that your Identity and Access Management (IAM) role provides access to paths in Target
. This value can be set only when HomeDirectoryType
is set to LOGICAL.
The following is an Entry
and Target
pair example.
[ { \"Entry\": \"/directory1\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
In most cases, you can use this value instead of the session policy to lock down your user to the designated home directory (\"chroot
\"). To do this, you can set Entry
to '/' and set Target
to the HomeDirectory parameter value.
The following is an Entry
and Target
pair example for chroot
.
[ { \"Entry\": \"/\", \"Target\": \"/bucket_name/home/mydirectory\" } ]
A session policy for your user so that you can use the same Identity and Access Management (IAM) role across multiple users. This policy scopes down a user's access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}
, ${Transfer:HomeDirectory}
, and ${Transfer:HomeBucket}
.
This policy applies only when the domain of ServerId
is Amazon S3. Amazon EFS does not use session policies.
For session policies, Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy
argument.
For an example of a session policy, see Creating a session policy.
For more information, see AssumeRole in the Amazon Web Services Security Token Service API Reference.
Specifies the full POSIX identity, including user ID (Uid
), group ID (Gid
), and any secondary groups IDs (SecondaryGids
), that controls your users' access to your Amazon Elastic File Systems (Amazon EFS). The POSIX permissions that are set on files and directories in your file system determines the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role that controls your users' access to your Amazon S3 bucket or Amazon EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or Amazon EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
" }, "ServerId": { "shape": "ServerId", "documentation": "A system-assigned unique identifier for a Transfer Family server instance that the user is assigned to.
" }, "UserName": { "shape": "UserName", "documentation": "A unique string that identifies a user and is associated with a server as specified by the ServerId
. This user name must be a minimum of 3 and a maximum of 100 characters long. The following are valid characters: a-z, A-Z, 0-9, underscore '_', hyphen '-', period '.', and at sign '@'. The user name can't start with a hyphen, period, or at sign.
A system-assigned unique identifier for a Transfer Family server instance that the account is assigned to.
" }, "UserName": { "shape": "UserName", "documentation": "The unique identifier for a user that is assigned to a server instance that was specified in the request.
" } }, "documentation": " UpdateUserResponse
returns the user name and identifier for the request to update a user's properties.
A unique string that identifies a Transfer Family user associated with a server.
" }, "ServerId": { "shape": "ServerId", "documentation": "The system-assigned unique identifier for a Transfer server instance.
" }, "SessionId": { "shape": "SessionId", "documentation": "The system-assigned unique identifier for a session that corresponds to the workflow.
" } }, "documentation": "Specifies the user name, server ID, and session ID for a workflow.
" }, "UserName": { "type": "string", "max": 100, "min": 3, "pattern": "[\\w][\\w@.-]{2,99}" }, "UserPassword": { "type": "string", "max": 1024, "min": 0, "sensitive": true }, "VpcEndpointId": { "type": "string", "max": 22, "min": 22, "pattern": "vpce-[0-9a-f]{17}" }, "VpcId": { "type": "string" }, "WorkflowDescription": { "type": "string", "max": 256, "min": 0, "pattern": "[\\w- ]*" }, "WorkflowDetail": { "type": "structure", "required": [ "WorkflowId", "ExecutionRole" ], "members": { "WorkflowId": { "shape": "WorkflowId", "documentation": "A unique identifier for the workflow.
" }, "ExecutionRole": { "shape": "Role", "documentation": "Includes the necessary permissions for S3, EFS, and Lambda operations that Transfer can assume, so that all workflow steps can operate on the required resources
" } }, "documentation": "Specifies the workflow ID for the workflow to assign and the execution role that's used for executing the workflow.
In addition to a workflow to execute when a file is uploaded completely, WorkflowDetails
can also contain a workflow ID (and execution role) for a workflow to execute on partial upload. A partial upload occurs when the server session disconnects while the file is still being uploaded.
A trigger that starts a workflow: the workflow begins to execute after a file is uploaded.
To remove an associated workflow from a server, you can provide an empty OnUpload
object, as in the following example.
aws transfer update-server --server-id s-01234567890abcdef --workflow-details '{\"OnUpload\":[]}'
A trigger that starts a workflow if a file is only partially uploaded. You can attach a workflow to a server that executes whenever there is a partial upload.
A partial upload occurs when a file is open when the session disconnects.
" } }, "documentation": "Container for the WorkflowDetail
data type. It is used by actions that trigger a workflow to begin execution.
Currently, the following step types are supported.
COPY
- Copy the file to another location.
CUSTOM
- Perform a custom step with an Lambda function target.
DECRYPT
- Decrypt a file that was encrypted before it was uploaded.
DELETE
- Delete the file.
TAG
- Add a tag to the file.
Details for a step that performs a file copy.
Consists of the following values:
A description
An Amazon S3 location for the destination of the file copy.
A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE
.
Details for a step that invokes an Lambda function.
Consists of the Lambda function's name, target, and timeout (in seconds).
" }, "DeleteStepDetails": { "shape": "DeleteStepDetails", "documentation": "Details for a step that deletes the file.
" }, "TagStepDetails": { "shape": "TagStepDetails", "documentation": "Details for a step that creates one or more tags.
You specify one or more tags. Each tag contains a key-value pair.
" }, "DecryptStepDetails": { "shape": "DecryptStepDetails", "documentation": "Details for a step that decrypts an encrypted file.
Consists of the following values:
A descriptive name
An Amazon S3 or Amazon Elastic File System (Amazon EFS) location for the source file to decrypt.
An S3 or Amazon EFS location for the destination of the file decryption.
A flag that indicates whether to overwrite an existing file of the same name. The default is FALSE
.
The type of encryption that's used. Currently, only PGP encryption is supported.
The basic building block of a workflow.
" }, "WorkflowStepName": { "type": "string", "max": 30, "min": 0, "pattern": "[\\w-]*" }, "WorkflowStepType": { "type": "string", "enum": [ "COPY", "CUSTOM", "TAG", "DELETE", "DECRYPT" ] }, "WorkflowSteps": { "type": "list", "member": { "shape": "WorkflowStep" }, "max": 8, "min": 0 } }, "documentation": "Transfer Family is a fully managed service that enables the transfer of files over the File Transfer Protocol (FTP), File Transfer Protocol over SSL (FTPS), or Secure Shell (SSH) File Transfer Protocol (SFTP) directly into and out of Amazon Simple Storage Service (Amazon S3) or Amazon EFS. Additionally, you can use Applicability Statement 2 (AS2) to transfer files into and out of Amazon S3. Amazon Web Services helps you seamlessly migrate your file transfer workflows to Transfer Family by integrating with existing authentication systems, and providing DNS routing with Amazon Route 53 so nothing changes for your customers and partners, or their applications. With your data in Amazon S3, you can use it with Amazon Web Services for processing, analytics, machine learning, and archiving. Getting started with Transfer Family is easy since there is no infrastructure to buy and set up.
" }