Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Intermediate save

...

  • Compliance:
    • All sensitive configuration information is encrypted.
    • Access to the Credential Store can be securely protected by password, key file or password and key file.
      "Password-free" authentication is possible.
    • Connection Authentication files such as public key files are used without being written to the file system.
  • Management
    • Configuration information can be centrally managed outside of a file transfer environment.
  • Deployment
    • The same file transfer configuration file can be used for development and production environments - only the Credential Store needs to be changed during deployment.
  • Scope
    • The Credential Store can be used for the following configuration information:
      • file transfer source, target, proxy and  jump host / DMZ,
      • pre- and post-processing operations.
    • The Credential Store can be used for file transfers carried out with both the YADE Client and the JobScheduler JADEJob and JADE4DMZJob JITL jobs.
  • Database Format and Applications
    • The Credential Store uses the standard .kdb or .kdbx open database formats. A number of commercial and open source tools are available for configuring these database formats on a range of operating systems. These tools include KeePass 1.x, KeePass 2.x and KeePassX. 

Anchor
example
example
Example

...

Descriptions

The example examples presented in this article illustrates illustrate the configuration and use of the Credential Store in a simple file transfer operation operations that is are carried out with the YADE Client and the JobScheduler JITL file transfer jobs.

The file transfer operation first example is based on the file transfer example described in detail in The YADE Client Command Line Interface - Tutorial 1 - Getting Started article. The tutorial describes the configuration required to download a number of files from an online server provided by the SOS GmbH and save these files on the user's local file system. Using this server example means that users can get a working Credential Store example up, running and running tested with a minimum of effort.

In the examples described in the current examplearticle, the Credential Store is to store configuration information for the online server - i.e. for the file transfer source. The principle described can be equally well used for the configuration of multiple file transfer source, target, proxy and jump-host servers and for the other file transfer protocols that can be used by the YADE Client.

...

The following screenshot shows that two three Groups have been configured for in the current exampledatabase, a main group named "demo" and subgroups "ftp" , along with the Entry and "sftp". In addition an Entry has been configured, "demo_on_test.sos-berlin.com".

...