Add new attachment

Only authorized users are allowed to upload new attachments.

List of attachments

Kind Attachment Name Size Version Date Modified Author Change note
png
Encrypt.png 78.1 kB 2 05-Dec-2023 05:32 Halmágyi Árpád
png
Screen Shot 2013-11-23 at 1.35... 30.3 kB 1 05-Dec-2023 05:32 Halmágyi Árpád
png
Screen Shot 2013-11-23 at 1.37... 72.2 kB 1 05-Dec-2023 05:32 Halmágyi Árpád
png
as2_options.png 55.7 kB 2 05-Dec-2023 05:32 Ben Spink
png
as2_receive.png 25.8 kB 2 05-Dec-2023 05:32 Ben Spink
png
as2_signing.png 17.1 kB 2 05-Dec-2023 05:32 Ben Spink
jpg
as2_user_options2.jpg 456.8 kB 1 30-May-2024 03:44 Ada Csaba
png
complete.png 158.7 kB 1 05-Dec-2023 05:32 Halmágyi Árpád
png
delete.png 49.4 kB 1 05-Dec-2023 05:32 Halmágyi Árpád
png
exclude1.png 42.0 kB 1 05-Dec-2023 05:32 Halmágyi Árpád
png
exclude2.png 41.1 kB 1 05-Dec-2023 05:32 Halmágyi Árpád
png
find.png 92.8 kB 4 05-Dec-2023 05:32 Halmágyi Árpád
png
new_vfs.png 3.6 kB 1 05-Dec-2023 05:32 Ben Spink
png
options.png 135.7 kB 2 05-Dec-2023 05:32 Halmágyi Árpád
png
signing.png 76.2 kB 2 05-Dec-2023 05:32 Halmágyi Árpád
png
tasks.png 47.0 kB 1 05-Dec-2023 05:32 Halmágyi Árpád

This page (revision-26) was last changed on 30-May-2024 04:34 by Ada Csaba

This page was created on 05-Dec-2023 05:32 by Ben Spink

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Difference between version and

At line 1 changed one line
To configure AS2 you need two parts. One a job to send the AS2 file to your partner, and two a user in the User Manager to receive the MDN response, or to receive files from your partner.\\
In this area __[AS2 or AS3|AS2 EDI]__ payload cryptography related settings are configured.\\
At line 3 removed one line
First lets create a job. Notice there is no copy or move operation here. The AS2 item is the special protocol that does this type of activity. When the remote server sends a MDN, it is sent to an account you have setup for this in the User Manager...and this AS2 job waits for the MDN notification to come back internally from CrushFTP when that file is received.\\
At line 5 changed 4 lines
If the remote company is just sending you a file (not a MDN) it also comes in through the account in CrushFTP. In the User Manager, you can make accounts, and on each account you can configure the AS2 information to use for decrypting the incoming file. This account could also be used for normal FTP/SFTP/HTTP transfers too, but if you have AS2 configured, that info is used to decode and decrypt the AS2 data.\\
----
First you should have a Find task in the job. It is searching the specified folder to find items to use in future task items.\\
[attachment|AS2/find.png]\\
[{Image src='as2_user_options2.jpg' width='1600' height='..' align='left' style='..' class='..' }]\\
At line 10 removed 2 lines
For the second step, you have to exclude old files that are already encrypted.
[attachment|AS2/exclude1.png]\\
At line 13 changed 2 lines
After that is done, you should exclude the MDN responses that you already have.\\
[attachment|AS2/exclude2.png]\\
__AS2/3 Decryption Key__\\
At line 16 changed one line
(This assumes you have the MDN responses coming into this same folder too with your user you configure in the User Manager.)\\
__Keystore Path:__ the path of a PKCS11 cert store holding the private key used for payload decryption and signing the MDN.\\
__Keystore format:__ dropdown selector, allows choosing the keystore format type, Java JKS and generic p12 PFX formats are supported.\\
__Keystore Password:__ enter the password of the keystore here\\
__Key name(alias):__ the __private cert__ identifier (internal name). We load the cert based on it's alias, in case the keystore has multiple certs.\\
__Key Password:__ the protection password of the private key inside the keystore. In case of JKS type keystores, keystore and key passwords are always identical. PFX may contain unprotected private key, in that case, this field needs to be left empty.\\
At line 18 changed one line
Make sure you have the certificate of the AS2 receiving machine added as a trusted certificate in the keystore that you use. This certificate will be used for encrypting the data using the partners key. Your key will be used for signing the data.\\
__AS2/3 Signature Verification Key__\\
At line 20 changed 5 lines
The AS2 task should be set similar to this:\\
[attachment|AS2/Encrypt.png]\\
[attachment|AS2/signing.png]\\
[attachment|AS2/options.png]\\
-----
__Keystore Path:__ the path of a PKCS11 cert store holding the public cert used for payload signature validation. \\
__Keystore format:__ same as in the above section, to choose the keystore type\\
__Keystore Password:__ enter the password of the keystore here\\
__Key name(alias):__ the __public cert__ identifier (internal name)\\
At line 26 changed one line
You can create your own keystore using [Portecle]. Generate a new key pair, and give it a name appropriate to your company. Its this item you will right click on and share with your trading partner.
__Unique AS2 filenames__ when enabled, a unique random ID is appended to the received file name to prevent overwriting existing files.\\
At line 28 changed one line
You also use the tools menu to import your partner's public key too and give it an appropriate name. You can have these in separate keystores, or in one single one.
__Process As3 Files__ toggles support for AS3.\\
\\
Version Date Modified Size Author Changes ... Change note
26 30-May-2024 04:34 1.577 kB Ada Csaba to previous
25 30-May-2024 04:19 1.577 kB Ada Csaba to previous | to last
24 30-May-2024 04:17 1.541 kB Ada Csaba to previous | to last
23 30-May-2024 04:12 1.345 kB Ada Csaba to previous | to last
22 30-May-2024 04:07 1.096 kB Ada Csaba to previous | to last
21 30-May-2024 04:06 0.945 kB Ada Csaba to previous | to last
« This page (revision-26) was last changed on 30-May-2024 04:34 by Ada Csaba
G’day (anonymous guest)
CrushFTP11 | What's New

Referenced by
LeftMenu

JSPWiki