Changes for page SFTP Security
Last modified by Danniar Firdausy on 2024/09/18 20:33
From version 25.9
edited by Danniar Firdausy
on 2024/09/18 20:33
on 2024/09/18 20:33
Change comment:
There is no comment for this version
To version 25.4
edited by Danniar Firdausy
on 2024/09/11 16:30
on 2024/09/11 16:30
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,6 +1,6 @@ 1 1 {{container}}{{container layoutStyle="columns"}}((( 2 2 3 -In th is microlearning, wewill buildon our previousdiscussionabout connectingto SFTP from eMagizbydivinginto amore advancedsecurity configuration:privatekeysetup.Wewillexplorehowtouse private keystoensure secureandtrusted communicationwith SFTP servers.3 +In the last microlearning, we discussed how to connect to an SFTP from eMagiz. In this microlearning, we want to expand our knowledge and look at a more complex security configuration when connecting to SFTP instances. The configuration we are talking about is the private key configuration. 4 4 5 5 Should you have any questions, please get in touch with [[academy@emagiz.com>>mailto:academy@emagiz.com]]. 6 6 ... ... @@ -12,8 +12,14 @@ 12 12 == 2. Key concepts == 13 13 14 14 This microlearning is about SFTP security. 15 -* By SFTP security, we mean: Making sure that the SFTP we connect knows that we are indeed eMagiz. 16 16 16 +By SFTP security, we mean: Making sure that the SFTP we connect knows that we are indeed eMagiz 17 + 18 +* Private key is unique per client 19 +* Private key should only be known to the client 20 +* Public key should be known to the SFTP (server), so they trust us when we set up the communication 21 +* A private key comes with a passphrase 22 + 17 17 == 3. SFTP Security == 18 18 19 19 In the last microlearning, we discussed how to connect to an SFTP from eMagiz. In this microlearning, we want to expand our knowledge and look at a more complex security configuration when connecting to SFTP instances. The configuration we are talking about is the private key configuration. ... ... @@ -25,7 +25,7 @@ 25 25 26 26 If you are looking for some introductory reading into certificates, please check this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Novice.Securing Data Traffic.novice-securing-your-data-traffic-what-are-certificates.WebHome||target="blank"]]. 27 27 28 -As the private key is yours, you can ask a trusted party to generate the key, or you could create it yourself. The latter part happens a lot when connecting to an SFTP. You could use a tool like PuttyGen to achieve this. As a result, you will have a keypair. The private key should be kept safely with you in eMagiz, and you need to share the public key with the SFTP server party. In this microlearning, wewill not explore on how PuttyGen works in detail. Instead, we will focus on the part in eMagiz. In eMagiz, we need to refer to the key file (linked under Resources), and we need to refer to the password we use to save our key file securely.34 +As the private key is yours, you can ask a trusted party to generate the key, or you could create it yourself. The latter part happens a lot when connecting to an SFTP. You could use a tool like PuttyGen to achieve this. As a result, you will have a keypair. The private key should be kept safely with you in eMagiz, and you need to share the public key with the SFTP server party. In this microlearning, I will not explain how PuttyGen works in detail. Instead, we will focus on the part in eMagiz. In eMagiz, we need to refer to the key file (linked under Resources), and we need to refer to the password we use to save our key file securely. 29 29 30 30 [[image:Main.Images.Microlearning.WebHome@intermediate-file-based-connectivity-sftp-security--private-key-config.png]] 31 31 ... ... @@ -37,10 +37,10 @@ 37 37 38 38 == 4. Key takeaways == 39 39 40 -* Eachclientshouldhave aunique privatekey.41 -* The private keymustbe kept secret and knownonlyto the client.42 -* The public keycan beshared withthe SFTP server soitcan authenticateyourconnection.43 -* Theprivate keyisprotectedbya passphraseto enhance security.46 +* Private key is unique per client 47 +* Private key should only be known to the client 48 +* Public key should be known to the SFTP (server), so they trust us when we set up the communication 49 +* A private key comes with a passphrase 44 44 45 45 == 5. Suggested Additional Readings == 46 46 ... ... @@ -49,7 +49,7 @@ 49 49 * [[Novice (Menu)>>doc:Main.eMagiz Academy.Microlearnings.Novice.WebHome||target="blank"]] 50 50 ** [[Securing Data Traffic (Navigation)>>doc:Main.eMagiz Academy.Microlearnings.Novice.Securing Data Traffic.WebHome||target="blank"]] 51 51 *** [[What are certificates (Explanation)>>doc:Main.eMagiz Academy.Microlearnings.Novice.Securing Data Traffic.novice-securing-your-data-traffic-what-are-certificates.WebHome||target="blank"]] 52 - * [[SFTP (Search Results)>>url:https://docs.emagiz.com/bin/view/Main/Search?sort=score&sortOrder=desc&highlight=true&facet=true&r=1&f_space_facet=0%2FMain.&l_space_facet=10&f_type=DOCUMENT&f_locale=en&f_locale=&f_locale=en&text=%22sftp%22||target="blank"]]58 + 53 53 * [[SFTP Authentication (External)>>https://www.2brightsparks.com/resources/articles/sftp-authentication.html||target="blank"]] 54 54 * [[SFTP Outbound (External)>>https://docs.spring.io/spring-integration/docs/2.2.6.RELEASE/reference/html/sftp.html#sftp-outbound||target="blank"]] 55 55 * [[SFTP Session Factory (External)>>https://docs.spring.io/spring-integration/docs/2.2.6.RELEASE/reference/html/sftp.html#sftp-session-factory||target="blank"]]