Configuring OFTP2 Transfers

OFTP2 (ODETTE File Transfer Protocol) is an updated version of the OFTP standard. It was defined to address the data transfer requirements of the European automotive industry.

Types of OFTP2 Transfers

MFT supports two types of OFTP2 transfers:

OFTP2 Restrictions

While OFTP2 supports client initiated Send and Receive transfers, MFT only supports Send transfers.

OFTP2 does not implement a directory list capability:

OFTP2 file names are virtualized.

When an OFTP2 client initiates a transfer to the MFT OFTP2 transfer server, the target server definition cannot be an OFTP2 server. For example, this is not supported:

OFTP2 Client > MFT OFTP2 Transfer Server > OFTP2 Server

Required Information

Before you begin to configure OFTP2, you need the following information from the OFTP2 partner:

Parameter Description
Partner Odette ID A string that identifies the partner.
Partner Password The password that is validated by the partner.
TLS Support Whether the OFTP2 request is encrypted by TLS.

The following partner public certificates must optionally be provided:

Partner Public Certificate Description
TLS Public Certificate The TLS certificate associated with the Partner TLS private key.
Session Authentication Public Certificate Certificate used to authenticate the OFTP2 partner.
Encryption Public Certificate The certificate used to encrypt data sent to the OFTP2 partner.
Signing Public Certificate The certificate used to verify the OFTP2 data signature.
EERP Public Certificate Certificate used by the End-to-End Response Protocol.

Securing incoming OFTP2 Requests

Incoming OFTP2 Requests are secured by the following criteria:

Criteria Requirement
Odette ID Must match the partner Odette ID defined in a server definition.
Password Must match the partner password defined in a server definition.
TLS Certificate Must match the OFTP2 client TLS certificate.
Session Authentication Provides a means of authenticating OFTP2 requests.
Note: The Partner Odette ID and password are required. TLS certificate and session authentication are optional. We strongly suggest using OFTP2 session authentication and TLS client certificates (where supported) to secure OFTP2 transfers.

The section titled "Create a Server Definition for Incoming and Outgoing OFTP2 requests" has more detail about configuring these parameters.

More about OFTP2 Passwords

OFTP2 passwords are only 8 characters and are defined in the RFC as upper case only. While MFT requires OFTP2 clients to send an OFTP2 password and MFT validates the password, OFTP2 password authentication is not a good way to secure OFTP2. That is why we strongly suggest using session authentication and TLS certificate authentication. Both Local and Partner Passwords are required fields. Some OFTP2 clients and servers do not validate the incoming password. When the OFTP2 partner does not validate the incoming password, you can set the LOCAL password to any value.

OFTP2 Virtual File names

OFTP2 does not support directories and files. Rather, it supports a virtual file name. The virtual file name is only 26 bytes. Here is how MFT handles OFTP2 virtual file names.

Incoming Requests:

Outgoing Requests:

MFT sets the virtual file name to the first 26 bytes of the server file name as defined in the Transfer definition.

Steps to Configure MFT for OFTP2 Transfers

To configure MFT for incoming and outgoing OFTP2 transfers, complete the following steps. These steps are discussed in more detail later.

    Procedure
  1. Create OFTP2 System Keys

  2. Configure the MFT OFTP2 Transfer Server

  3. Create a User Definition for incoming OFTP2 Requests

  4. Create a Server Definition for Incoming and Outgoing OFTP2 requests

  5. Create Transfer definitions for Incoming and Outgoing OFTP2 requests

  6. Start the OFTP2 Service

  7. Send Information about the MFT OFTP2 environment to the OFTP2 transfer partner

  8. Executing OFTP2 transfers