Blog

Managed File Transfer and Network Solutions

Setting Up An SFTP Server

Posted by John Carl Villanueva on Mon, Dec 08, 2014 @ 12:53 AM


Overview

I've been going over our posts lately and just realised that, while we've managed to put together a decent collection of information regarding SFTP file transfers, we actually don't have an article that teaches how to set up an SFTP server. I'm sure some of you have been resourceful enough to go through the documentation and sift through all the relevant pages in there. But for those who just want one place for it all, this is the article for you.

setting_up_sftp_server

For this tutorial, I'll be using JSCAPE MFT Server, our managed file transfer server that supports SFTP as well as a number of other secure file transfer protocols. Since this managed file transfer server is built from Java, it can run on different platforms, including Windows (32 and 64 bit), Linux, Solaris, AIX, IBM z/OS, and Mac OS X. 

If you want to follow this tutorial step by step, you may download a free evaluation edition of JSCAPE MFT Server by clicking the button below. Don't forget to select the installer that corresponds to your operating system.

On the other hand, if you're just here to read, then please proceed.

 

Download Now


Installing your managed file transfer server

 

Once you've downloaded the installation file, follow the appropriate instructions in this documentation. Go to the Installation section and look for the instructions that correspond to your operating system.

 

installation_documentation-1

 

If you're using Linux, you can also watch any of the video tutorials below:

For Debian-based Linux

For RPM-based Linux

You can also follow the instructions on this 3-part series (still for Linux installations). That particular tutorial already includes instructions for activating a file transfer service (like FTP or SFTP) and for creating a user account. Both are essential elements of your SFTP server and will be discussed again later in this article.

 

Preparing server and client keys

 

SFTP protects file transfers through various security mechanisms, including data-in-motion encryption, 2-factor client authentication, and data integrity checks. Data-in-motion encryption renders files unreadable during transmission, thereby protecting data from eavesdroppers. Strong authentication, on the other hand, prevents impostors from gaining access to files stored on the server. Lastly, data integrity checks ensure that any changes to the data while in transit can be detected.

These security mechanisms are implemented through the use of server keys, client keys, and various algorithms. For a thorough discussion on server and client keys, please read the article:Roles of Server and Client Keys in Secure File Transfers. SFTP algorithms are covered in the article Setting SFTP Algorithms On Your SFTP Server.

Setting up server keys

Server keys are used for encrypting your SFTP file transfers. To start setting up your server keys, go to the Server menu and click the Key Manager submenus

 

01-managed-file-transfer-server-key-manager

 

Next, navigate to the Server Keys tab and then click the Generate button.

 

02-managed-file-transfer-server-server-keys-generate

 

Fill up the fields in the Generate Server Key dialog. You'll need to enter the following information:

Key alias - The key alias is just the name that will be used in referring to this particular key within the JSCAPE MFT Server Manager environment, e.g. your_server_key

Key algorithm - Choose between RSA or DSA. Click that link for an enlightening discussion on these two key algorithms.

Key length - Choose between 1024 and 2048. Read the post "Choosing Key Lengths for Encrypted File Transfers" if you need more information on the subject.

Validity - Specifies how many days you would like this key to remain valid.

Common name (CN) - This will be the name of the key. Normally, you would use the domain name of the server, e.g. "sftp.yourdomain.com"

Organization unit (OU) - Indicates the specific unit in your organization that will be using this key, e.g. Accounting

Organization (O) - The name of your organization

Locality (L) - The name of your city.

State/Province (ST) - The name of your state or province.

Country (C) - Your 2-character country code, e.g. "US"

 

03-mft-server-key-info

 

When you're done, click the OK button.

You should now be able to see your newly created server key in the list of server keys.

 

04-mft-server-newly-created-server-key

 

Setting up client keys

Client keys are used to establish a stronger authentication process during client logins. Basically, regular SFTP logins only require usernames and passwords. But these login credentials can sometimes be obtained by cyber criminals through brute force attacks or social engineering methods.

Client keys allow you to add another layer of protection because users would then be required to submit something in their possession, namely their respective client key private keys. In other words, each client key should correspond to a single user.

When two different methods of authentication are combined - in this case password authentication and public key authentication - you call it 2-factor authentication. This results in a much stronger method of authentication. Read more about SFTP's public key authentication in the article What Is An SFTP Key?

To set up a client key, go to the Client Keys tab and click the Generate button.

 

05client-keys-generate-mft-server

 

You'll then be presented with a dialog similar to the one shown earlier. Most of the fields have exactly the same definition as those fields on the server key dialog, except for these two:

Key alias - We recommend you use the username of the user account this key will be binded with. 

Common name (CN) - This should be the full name of the user.

 

06-client-key-dialog-mft-server

 

Click the OK button when done.

You'll then be asked to specify the name of the file that will hold this key. Make sure the file is saved in the PEM format. Otherwise, you won't be able to use it for SFTP public key authentication. 

 

07-private-key-file
 

Click the OK button when done. 

Because it is this file which the user will be required to submit during login, you will have to send this file to the user after it has been created. It's just a file, so you can send it via email, burn it to a CD, or copy it to a USB stick. As an added layer of protection, you can also specify a password (better known as a "passphrase") for this file.

Note: Make sure the user keeps the file in a secret location.

 

08-private-key-file

 

You should be able to see your newly created client key in your list of client key certificates.

 

09-client-key-certificates

 

At this point, you would have already successfully prepared your server and client keys. Click OK to proceed.

 

Activating the SFTP service

 

To enable your SFTP service, go back to the JSCAPE MFT Server Manager main screen, navigate to the Domains tab, select the domain name of the server whose SFTP service you want to enable, and then click the Edit button.

 

10-mft-server-domains

 

Next, go to the Services module and then click the Add button. 

 

11-add-service-mft-server

 

Once the Add Service dialog appears, select SFTP/SCP from the drop-down list.

Move on to the Host/IP drop-down list and select the host or IP address of your server.

Leave the Port number as is. Make sure it is set to 22.

In the Private key drop-down list, select the alias of the server key you created earlier.

Finally, choose password AND publickey from the list of Authentication methods. This will enable SFTP 2-factor authentication. Meaning, a user who attempts to log in to your SFTP server will have to enter his username and password AND load his private key file (the file you downloaded earlier and sent to the user).

 

12-add-service-mft-server-dialog

 

Click the OK button to proceed.

Your newly activated SFTP service should now be added to your list of services.

 

13-newly-added-sftp-service

 

Adding users

 

The final step is to add users. Go to the Users module and then click the Add button. 

 

14-add-users-mft-server

 

Once you User Template dialog appears, just click the OK button to select the default template.

 

15-user-default-mft-server

 

In the Add User dialog, enter the fullname of the user whose account you want to create.

Specify a Login username and an initial Password.

 

16-username-password-mft-server

 

You may also enter additional information if you want (e.g. email, company name, phone number, etc.). 

If you created a client key earlier, you will want to associate that key with this user (assuming of course that key was meant for this user). To do that, scroll down to the bottom and then tick the checkbox beside the name of the client key you want to associate/bind with this user. 

 

17-assigning-client-key-to-mft-server-user

 

Click OK once you're done.

 

18-newly-created-user-mft-server

 

That's it! Barring any hitches, you should now have your fully-functional SFTP server up and running. If you want to learn how to connect to this service using an SFTP client and to actually exchange files with it, read the article How To Use An SFTP Client. Or, if you like to use the terminal, read the article Using SFTP On The Command Line to learn how to connect via a terminal-based client. 


 

That's it! To be up to date on tips like this. Follow us on Twitter!  





 

Topics: JSCAPE MFT Server, Managed File Transfer, Secure File Transfer, SFTP