Changes for page SFTP Security
Last modified by Danniar Firdausy on 2024/09/18 20:33
From version 25.4
edited by Danniar Firdausy
on 2024/09/11 16:30
on 2024/09/11 16:30
Change comment:
There is no comment for this version
To version 25.9
edited by Danniar Firdausy
on 2024/09/18 20:33
on 2024/09/18 20:33
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,6 +1,6 @@ 1 1 {{container}}{{container layoutStyle="columns"}}((( 2 2 3 -In th e lastmicrolearning, we discussed howto connect toanSFTP from eMagiz.Inthis microlearning,we wanttoexpandourknowledgeandlookat a morecomplexsecurity configurationwhenconnectingto SFTP instances.Theconfigurationwearetalking aboutisthe private keyconfiguration.3 +In this microlearning, we will build on our previous discussion about connecting to SFTP from eMagiz by diving into a more advanced security configuration: private key setup. We will explore how to use private keys to ensure secure and trusted communication with SFTP servers. 4 4 5 5 Should you have any questions, please get in touch with [[academy@emagiz.com>>mailto:academy@emagiz.com]]. 6 6 ... ... @@ -12,14 +12,8 @@ 12 12 == 2. Key concepts == 13 13 14 14 This microlearning is about SFTP security. 15 +* By SFTP security, we mean: Making sure that the SFTP we connect knows that we are indeed eMagiz. 15 15 16 -By SFTP security, we mean: Making sure that the SFTP we connect knows that we are indeed eMagiz 17 - 18 -* Private key is unique per client 19 -* Private key should only be known to the client 20 -* Public key should be known to the SFTP (server), so they trust us when we set up the communication 21 -* A private key comes with a passphrase 22 - 23 23 == 3. SFTP Security == 24 24 25 25 In the last microlearning, we discussed how to connect to an SFTP from eMagiz. In this microlearning, we want to expand our knowledge and look at a more complex security configuration when connecting to SFTP instances. The configuration we are talking about is the private key configuration. ... ... @@ -31,7 +31,7 @@ 31 31 32 32 If you are looking for some introductory reading into certificates, please check this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Novice.Securing Data Traffic.novice-securing-your-data-traffic-what-are-certificates.WebHome||target="blank"]]. 33 33 34 -As the private key is yours, you can ask a trusted party to generate the key, or you could create it yourself. The latter part happens a lot when connecting to an SFTP. You could use a tool like PuttyGen to achieve this. As a result, you will have a keypair. The private key should be kept safely with you in eMagiz, and you need to share the public key with the SFTP server party. In this microlearning, Iwill not explain how PuttyGen works in detail. Instead, we will focus on the part in eMagiz. In eMagiz, we need to refer to the key file (linked under Resources), and we need to refer to the password we use to save our key file securely.28 +As the private key is yours, you can ask a trusted party to generate the key, or you could create it yourself. The latter part happens a lot when connecting to an SFTP. You could use a tool like PuttyGen to achieve this. As a result, you will have a keypair. The private key should be kept safely with you in eMagiz, and you need to share the public key with the SFTP server party. In this microlearning, we will not explore on how PuttyGen works in detail. Instead, we will focus on the part in eMagiz. In eMagiz, we need to refer to the key file (linked under Resources), and we need to refer to the password we use to save our key file securely. 35 35 36 36 [[image:Main.Images.Microlearning.WebHome@intermediate-file-based-connectivity-sftp-security--private-key-config.png]] 37 37 ... ... @@ -43,10 +43,10 @@ 43 43 44 44 == 4. Key takeaways == 45 45 46 -* Privatekeyis unique perclient47 -* Private keyshouldonlybe known to the client48 -* Public keyshouldbeknowntothe SFTP(server),so theytrustus whenwe setupthecommunication49 -* Aprivate keycomeswitha passphrase40 +* Each client should have a unique private key. 41 +* The private key must be kept secret and known only to the client. 42 +* The public key can be shared with the SFTP server so it can authenticate your connection. 43 +* The private key is protected by a passphrase to enhance security. 50 50 51 51 == 5. Suggested Additional Readings == 52 52 ... ... @@ -55,7 +55,7 @@ 55 55 * [[Novice (Menu)>>doc:Main.eMagiz Academy.Microlearnings.Novice.WebHome||target="blank"]] 56 56 ** [[Securing Data Traffic (Navigation)>>doc:Main.eMagiz Academy.Microlearnings.Novice.Securing Data Traffic.WebHome||target="blank"]] 57 57 *** [[What are certificates (Explanation)>>doc:Main.eMagiz Academy.Microlearnings.Novice.Securing Data Traffic.novice-securing-your-data-traffic-what-are-certificates.WebHome||target="blank"]] 58 - 52 +* [[SFTP (Search Results)>>url:https://docs.emagiz.com/bin/view/Main/Search?sort=score&sortOrder=desc&highlight=true&facet=true&r=1&f_space_facet=0%2FMain.&l_space_facet=10&f_type=DOCUMENT&f_locale=en&f_locale=&f_locale=en&text=%22sftp%22||target="blank"]] 59 59 * [[SFTP Authentication (External)>>https://www.2brightsparks.com/resources/articles/sftp-authentication.html||target="blank"]] 60 60 * [[SFTP Outbound (External)>>https://docs.spring.io/spring-integration/docs/2.2.6.RELEASE/reference/html/sftp.html#sftp-outbound||target="blank"]] 61 61 * [[SFTP Session Factory (External)>>https://docs.spring.io/spring-integration/docs/2.2.6.RELEASE/reference/html/sftp.html#sftp-session-factory||target="blank"]]