Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???

Slides:



Advertisements
Similar presentations
Welcome to eDMR This PowerPoint presentation is designed to show eDMR users how to login and begin using the eDMR system.
Advertisements

FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
An Introduction to Using
SAM 2007 v4 The Student Experience Including SAM Projects, SAM Exams and SAM Training.
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills Mark Worden Instructor Use your spacebar or down arrow key to advance slides.
Refresher Instruction Guide Strategic Planning and Assessment Module
Student Getting Started Guide Updated June Ensure that you are connected to the Internet. 2. Launch your web browser (Internet Explorer, Firefox,
Using FTP Prof. Wayne Pollock Hillsborough Community College Tampa, FL
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 2 1 Microsoft Office Access 2003 Tutorial 2 – Creating And Maintaining A.
CIS101 Introduction to Computing Week 05. Agenda Your questions CIS101 Survey Introduction to the Internet & HTML Online HTML Resources Using the HTML.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
1 Computing for Todays Lecture 22 Yumei Huo Fall 2006.
Creating And Maintaining A Database. 2 Learn the guidelines for designing databases When designing a database, first try to think of all the fields of.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Chapter 1 Getting Started With Dreamweaver. Explore the Dreamweaver Workspace The Dreamweaver workspace is where you can find all the tools to create.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
IWebFolio Using a Template Tutorial Images in this tutorial:
Creating and Publishing Your own website
New School Websites Teacher Pages. Visit the SCUSD Website for videos tutorials: For more information.
Creating a Web Page HTML, FrontPage, Word, Composer.
Lawson System Foundation 9.0
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills.
So – You want to learn how to put an advanced article submission (cut and paste) onto the state website. (Note: If you have not done so, you will need.
The basics of the Online Portal
Panorama High School E.G.P./ Training to Put Students’ Grades on the Website Wednesday, September 29,
Configuring the MagicInfo Pro Display
Josh Probert – Yankee A Prototype based on Sierra’s SRS.
Welcome to the University of West Florida Online Employment System Applicant Tutorial.
Using Dreamweaver. Slide 1 Dreamweaver has 2 screens that do different things The Document window where you create your WebPages The Site window where.
Office 2013 and Windows 8: Essential Concepts and Skills
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Targeted Training, LLC. APPLYING STYLES DOWNLOAD FREE TRIAL OF ADOBE CONTRIBUTE ADOBE CONTRIBUTE CONNECTION WIZARD ENTERING EDIT MODE WEB PUBLISHING PROCESS.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Microsoft Windows Vista Chapter 1 Fundamentals of Using Microsoft Windows Vista.
Office 2013 and Windows 8: Essential Concepts and Skills Microsoft Access 2013.
Microsoft Windows 7 Part 1 Fundamentals of Using Windows 7.
Credit Union National Association Installing and Uploading Project Zip Code.
1 INITIAL SETUP OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY AO DESIGNEES September, 2000.
Creating and Publishing Your own web site PC Version SEAS 001 Professor Ahmadi.
XP New Perspectives on Microsoft Access 2002 Tutorial 21 Microsoft Access Tutorial 2 – Creating And Maintaining A Database.
Training Guide for Inzalo SOP Users. This guide has been prepared to demonstrate the use of the Inzalo Intranet based SOP applications. The scope of this.
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
Downloading and Installing Autodesk Revit 2016
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
 To begin you first need to sign up to Weebly by going to or alternatively and we will create an account.
1 ACTIVATION OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY INSTITUTIONAL AUTHORIZING OFFICIALS January, 2001.
XP Browser and Basics COM111 Introduction to Computer Applications.
Chapter 1 Getting Started With Dreamweaver. Exploring the Dreamweaver Workspace The Dreamweaver workspace is where you can find all the tools to create.
How to Setup and Score a Tournament May Let’s Get Organized The setup and organization outlined in this clinic are suggested steps however can be.
HTML Concepts and Techniques Fifth Edition Chapter 3 Creating Web Pages with Links, Images, and Formatted Text.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
XP Creating Web Pages with Microsoft Office
Classroom Wiki Tutorial EDIC 763 Instructional Design Fall 2011 Aysha Bajabaa Dr. Gary Whitt 1 NextBack.
Basic Web Design UVICELL Week 4 Templates and site management Week 4 Templates and site management.
Using the Personal Image Photo Library
Account Management Demonstration.
Hillsborough Community College
Uploading Files to the Remote Server Using Win_SCP Portable
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
CGS 3175: Internet Applications Fall 2009
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
Presentation transcript:

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy??? A Secure File Transfer Protocol is an Internet Standard for transferring data between computer Servers; in Delaware’s case, between the Host Server within Delaware Health and Social Services (DHSS) and the remote sub-grantee location computers. This protocol basically allows one computer to talk to another. The Secure Copy allows the data to be encrypted so it must be dragged with the mouse from the SFTP into whatever application it has been created in; Word, Excel, Access, etc.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Both locations provide a secure client SFTP connection to the DHSS Server by encrypting the information that is sent between the sub-grantee’s computer to the Server and back to State office staff computers. A "client" means any program running on one computer that interacts with another program running on a Server).  In order to input an SFTP with SC, the SFTP software must first be downloaded and established on both the Host Server computers and the remote location computers. This is done through the establishment of Public and Private Keys, which are basically secure recognition programs through each user’s login and location set-up.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) So how is this accomplished?? Through working directly with your State’s….. Information Technology Department

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) My first thought when I contacted the Department’s IT folks was to create an icon on our Division’s home page. Each sub-grantee could then click the icon, enter a password, and access their own reports. SOV state office staff would then be able to enter a “master” password and retrieve the data. This was not a feasible solution, as in talking with the IT personnel, this method would require the remote sub-grantee computers to actually transfer their data into the State’s Mainframe system, which raised several issues…

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) The submitted sub-grantee data could not be limited to sole access to SOV personnel; The data could not be segregated from other data ports within the Server’s Main-Fraim; The data could not be properly protected; Because the sub-grantees were not state entities, their systems could not access the State’s Firewall.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) The next idea came from the IT personnel…..rather than an icon on the public State Website, why not use a direct-communication type of program that would allow the sub-grantee information to simply filter through our Mainframe and link directly to an external file on chosen state staff computers? After discussions regarding the formats of the reporting data, IT chose an SFTP application.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) The next steps before downloading this program were: Ensuring the data transmission ports between the remote sub-grantee’s computers and the State’s mainframe were accessible to each other. Ensuring the sub-grantee’s were registered with the state IT Department. Collaboration between IT, SOV, and the sub-grantees throughout the entire process. IT personnel worked closely with the sub-grantees to help them set up the application on their end, pass through our firewall and access into our port, and establish their “Keys” for log-on.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Although there are several sites that SFTP can be downloaded from, our IT personnel obtained the application from www.winscp.net Once all of the sub-grantee registration information was updated, and both SOV staff and authorized sub-grantee staff had downloaded the application, our IT personnel began working in teams with all of us following the same, process for installation. The following slides depict the steps necessary for connectivity of this application.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Once the program is downloaded and installed, the program window will open.  In the window, click the Profiles button, then select Add Profile, as shown below. SFTP – Profiles Box

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Type a descriptive name for your profile and press the Enter key: First/Last Name Click the Profiles button again and select Edit Profiles.  The Profiles dialog box will open.  On the left side of this box, select the name of the Server for which you wish to create a profile.  Then on the right side, in the Connection tab, enter the Server's host name in the Host Name box and your account's username in the User Name box. Select OK.

Your Name Your.Name@sftp--- Your.Name

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Connecting to a Server To connect to a Server (for which you have already defined a profile, as previously described), click the Profiles button and select the profile name for that Server, as below: SFTP Your Profile First/Last Name

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) The first time you connect to a Server, you will be asked to save a new host key in the local database. Select Yes.  In the future when you connect to this Server, you will (usually) not be asked this again. You will then be prompted for your password, as shown below: Type your password and press Enter.  This will connect you to the Server, and you will receive a command prompt for your account on the Server.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Transferring Files We are now ready to transfer files, as all locations have now established a Profile for the main Server, and can now connect to the Server. NOW WHAT???

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) You need to open the SFTP client window by displaying the Window menu and selecting New File Transfer: SFTP Your Profile

The SFTP Client Window will open, as shown above.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) The left half of the window displays "local" folders and files that are on your computer.  The right half displays "remote" folders and files that are on the Server.  To copy a file from your computer to the Server, or vice-versa, simply use your mouse to "drag" the file from one side and "drop" it on the other side in whatever format your file is in; Word, Excel, etc.  The file transfer will begin immediately.  A summary of the transfer progress will be displayed in the area at the bottom of the window.  Note that you are copying the file and not moving it (i.e., the original file will remain in place).

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Before you copy a file, you should set the proper transfer mode, using the three toolbar buttons as shown: Select the left, middle, or right button to set the transfer mode to ASCII, binary, or automatic, respectively:  ASCII mode is appropriate for copying plain text files. Binary mode is appropriate for image, zip, and program files. Automatic mode will select the mode according to the file’s filename extension, if the extension is any of the following…..

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) .txt .html .htm .bat then ASCII mode will be used; otherwise binary mode will be used.  If desired, the above list of extensions can be altered by displaying the Edit menu and selecting Settings and then Global Settings, then File Transfer, then Mode.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) So, what exactly makes the data secure????? Why, the Public and Private…… The Private Key is the protective login dialog stored in each remote computer location within the SFTP application; just as when you log into your computer with that login and password data. The Public Key is what allows the Host Mainframe computers to access each remote user’s data. One remote user cannot access another remote users data; only the Mainframe remote user has that capability.

Secure File Transfer Protocol (SFTP) With Secure Cop (SC) CONCLUSION: Let me conclude by saying that while I can present the principles of the SFTP/SC application, I am NOT an IT or computer guru by any stretch of the imagination!! To input this application took the efforts of several of our IT folks working both from the State’s mainframe end and working extensively with each of the sub-grantees on their end. The entire process from conception, to testing, to verification took approximately four month. It is important to test this application with all remote sites and with all data formats you will be collecting to ensure there are no bugs. However, it is a compatible, Web-based, and user friendly system, and is free to download and utilize.

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) Questions???????