The following configuration properties determine which configuration mode and connection type the (S)FTP Client communication point is to use:
Configuration Mode
Configuration Mode determines whether the (S)FTP Client communication point is operating in static, or dynamic mode using XML configuration templates or message properties:
Property Option | Description |
---|---|
Use Static Configuration† |
A static mode in which all parameters except the Base Filename and suffix are set statically at configuration time. |
Dynamic Using XML Configuration Templates |
A dynamic mode in which XML configuration templates can be used to override the static configuration when a message is sent or received. This dynamic mode cannot be used in Input-only mode. |
|
A dynamic mode in which message properties can be used to override the static configuration when a message is sent or received. This dynamic mode cannot be used in Input-only mode. |
† Default option.
In dynamic mode, all properties are available for modification.
Configuration Templates
Configuration Templates allows multiple sets of configuration settings to be set using an auxiliary configuration XML file. It must be provided and be valid if XML configuration templates are in use. Refer to Dynamic Mode and Dynamic Configuration Using XML Templates for details.
Protocol
Protocol determines the type of FTP connection that should be used:
Property Option | Description |
---|---|
|
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network. |
|
Implicit FTPS is a deprecated standard for FTP that requires the use of an SSL or TLS connection. |
|
Explicit FTPS is an extension to the FTP standard that allows clients to request that the FTP session be encrypted. |
|
SSH File Transfer Protocol is an FTP-like protocol that operates over an SSH connection. Normally, an SFTP/SSH server listens on port 22 for a connection. SFTP connections are protected using DSA or RSA key pairs to encrypt the secure channel between the client and the server. In order to verify that the (S)FTP Client Communication Point is connected to the correct SFTP server (rather than some arbitrary SSH server), it is mandatory to configure it with the SFTP server's SSH public key. Rhapsody is then able to validate that the correct public key is presented by the SFTP server before it sends any authentication information or message data to the server. The SFTP server almost always authenticates the client using the following authentication modes:
The SSH keys used to validate the server and perform client authentication are retrieved from the Certificate and Key Manager in Rhapsody IDE. |
† Default option.