MFT Platform Server Features

MFT Platform Servers have the following features:

  1. They use a proprietary protocol to transfer files.
  2. They can initiate a file send or a file receive to a target Platform Server
  3. They can initiate a directory send or directory receive from a target Platform Server
  4. They can initiate a file send or file receive to a target Internet Server.
  5. They can initiate a directory send or directory receive from a target Internet Server.
  6. They support the following levels of data encryption:
    1. Use no data encryption.
    2. Use AES 256 encryption.
    3. Use a TLS session to negotiate symmetric keys for AES 256 encryption.
    4. Encapsulate all data through TLS tunnel.
  7. They allow multiple ways to authenticate and pass credentials.
    1. User profiles allow users to transfer files without knowing the target system credentials.
    2. Responder profiles allow users to transfer files without providing any credentials to the target Server.
  8. When using TLS or Tunnel Mode, they allow you to configure the software to accept only specific certificates
  9. When running on z/Linux, Linux, or UNIX, the Platform Server Daemon can run as root or non-root.
  10. When running on Windows, requests can be validated against the responder profiles or Active Directory.
  11. When running on z/Linux, Linux, or UNIX, requests can be validated against the responder profiles or the password or shadow password files. PAM authentication is also supported.
  12. Command Center can manage some Platform Server functionality, such as the following functions.
    1. View completed Platform Server transfers.
    2. View and update node definitions.
    3. View and update profile and responder profile definitions.
    4. Execute a transfer.
  13. They can perform post processing actions when a transfer completes. This is discussed in more detail later in this document.
  14. They can execute a command on a target system.
  15. They can send an email when a transfer completes, either successfully or unsuccessfully.
  16. They do authorization using the security of the UNIX or Windows platform.