Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

Host Key Fingerprints

Host Key Fingerprints

For added authentication, Host Key Fingerprints can be used by the client (
Managed File Transfer
), to verify the authenticity of the host SFTP server. If, when connecting to the SFTP server, the host key fingerprint entered into
Managed File Transfer
does not match the fingerprint on the server's private key,
Managed File Transfer
will error and then display a message that it does not trust the target server. This is to prevent connecting to the wrong server in a case where someone is trying to spoof the IP of the SFTP server in question resulting in the data going to a wrong and most likely malicious destination. Follow the steps below to add Host Key Fingerprint verification to a SFTP Task:
  1. Contact the administrator of the host server to which the
    Managed File Transfer
    SFTP Task is connecting.
  2. Ask them for the Fingerprint of the Private Key used in the SFTP session.
  3. On the SFTP Task page, click the
    SFTP Server
    tab, open the SSH Keys fold and then type the fingerprint in the Host Key field.

0 COMMENTS

We’d like to hear from you!