The File Transfer Function Component enables files to be copied securely to remote machines. The design and implementation uses the RXA toolkit v2.2 to connect to remote machines and execute the secure copy.
The File Transfer CLFC has the ability to connect to remote machines using any of the following protocols: SSH or Windows. You can select which of the protocols will be used, however, if left to the default value of 'ANY', the FC will attempt to connect to the remote machine using each of the available protocols one-by-one until a successful connection is made.
You will need to provide information about the remote machine including hostname, username and password. You have the option of providing a keystore name and passphrase instead of using a password for authentication.
Some of the parameters configured in the Configuration screen of the File Transfer FC can be provided as Attributes mapped from the work Entry in the Output Map. When present and non-empty, they take precedence over the parameters in the Configuration screen:
In other words, if an attribute called source.file is provided in the input entry object then any source file that was entered in the Config Editor will be disregarded. This allows you to call the File Transfer FC repeatedly by other components in the AssemblyLine to perform different file transfers.
The File Transfer FC may be used within an AssemblyLine containing other TDI components such as Connectors and other Function Components. To function correctly, you must configure the File Transfer FC correctly using the Config Editor. When it is initialized it will establish a connection with the remote machine and then when its perform() method is called (normally when it is reached in the AssemblyLine it is part of), it will transfer the source file to the target directory.
The target machines must satisfy the following requirements:
To disable Simple File Sharing, you need to start Windows Explorer and click Tools->Folder Options. Select the View tab, scroll through the list of settings until you find Use Simple File Sharing. Remove the check mark next to Use Simple File Sharing, then click Apply and OK.
Windows XP includes a built-in firewall called the Internet Connection Firewall (ICF). By default, ICF is disabled on Windows XP systems, except on Windows XP Service Pack 2 where it is on by default. If either firewall is enabled on a Windows XP target, it will block attempted accesses by Remote Execution and Access. On Service Pack 2, you can select the File and Printer Sharing box in the Exceptions tab of the Windows Firewall configuration to allow access.
The target machine must have remote registry administration enabled (which is the default configuration) in order for Remote Execution and Access to run commands and execute scripts on the target machine.
The default hidden administrative disk shares (such as C$, D$, etc) are required for proper operation of Remote Execution and Access.
RXA cannot establish connections with any UNIX target that has ssh remote access protocol disabled.
In order for RXA to communicate with Linux and other SSH targets using password authentication, you must edit the file /etc/ssh/sshd_config file on target machines and set:
PasswordAuthentication yes (the default is 'no')
After changing this setting, stop and restart the SSH daemon using the following commands:
/etc/init.d/sshd stop /etc/init.d/sshd start
For further details on how to configure SSH between the local machine and the target, either using password authentication or a keystore, please refer to the relevant OpenSSH documentation at http://www.openssh.com .