...
The JADE Client provides a number of authentication methods.
These are specified in the Fragments branch of the XSD Schema at the end of various ProtocolFragments branches in the schema. This is because the authentication method(s) that can be used as for a connection depend on the protocol used.
Note that any number of ProtocolFragments can be specified within a configuration, allowing a number of authentication methods to be predefined for a particular file transfer operation. The AlternativeFragments element can be used to specify a number of alternative connections and authentication methods for a file transfer profile.
The protocol-dependency of the various authentication methods is integrated into the XSD Schema and explains why authentication methods lie below ProtocolFragments in the XML hierarchy. This integration in the Schema ensures that the only authentication methods that are supported by a protocol can be specified.
The authentication methods that are supported are:
- BasicAuthentication:
- SSHAuthentication:
- an Account (i.e. user name) is required
- AND either:
- AuthenticationMethodPassword with a (required) Password
- OR AuthenticationMethodPublickey
- with a (required) AuthenticationFile location
- AND an optional Passphrase that protects the File
- SSHAuthentication can be used with with the following protocol fragments:
- SMBAuthentication (in conjunction with SMBFragment elements / the SMB protocol and a Hostmane)
- an Account (i.e. user name) is required
- AND an optional Domain
- AND an optional Password
- SMBAuthentication can only be used with with the SMB protocol fragment.
- an Account (i.e. user name) is required
Specifying Authentication Methods
Authentication methods are specified in the Fragments elements of the XSD Schema at the end of various ProtocolFragments branches in the schema. This is because the authentication method(s) that can be used as for a connection depend on the protocol used. This is shown schematically below:
- ProtocolFragments
- FTPFragment
- BasicConnection
- BasicAuthentication
- Account
- Password (optional)
- FTPSFragment
- etc ...
- FTPFragment
The protocol-dependency of the various authentication methods is integrated into the schema and explains why authentication methods lie below ProtocolFragments in the XML hierarchy. This integration in the Schema ensures that the only authentication methods that are supported by a protocol can be specified.
Note that any number of ProtocolFragments can be specified within a configuration, allowing a number of authentication methods to be predefined for a particular file transfer operation. The AlternativeFragments element can be used to specify a number of alternative connections and authentication methods for a file transfer profile.
Optional Authentication Elements
...