Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Minor addition to text

...

  • BasicAuthentication:
    • an Account (i.e. user name) is required
    • AND an optional Password
    • BasicAuthentication can be used with the following protocol fragments:
    • Note that BasicAuthentication requires that Passwords are stored in the configuration files, bringing a.
    • The  article describes the considerations behind an example with BasicAuthentication that is available as a working download.
  • SSHAuthentication:
    • an Account (i.e. user name) is required
    • AND either:
      • AuthenticationMethodPassword with a (required) Password
      • OR AuthenticationMethodPublickey
        • with a (required) AuthenticationFile location
        • AND an optional Passphrase that protects the File
    • SSHAuthentication can be used with with the following protocol fragments:
    • The File Transfer with SSH authentication article describes the considerations behind an example with SSHAuthentication that is available as a working download.
  • SMBAuthentication (in conjunction with SMBFragment elements / the SMB protocol and a Hostmane)
    • an Account (i.e. user name) is required
      • AND an optional Domain
      • AND an optional Password
    • SMBAuthentication can only be used with with the SMB protocol fragment.

...

Authentication methods are specified in the Fragments elements of the XSD Schema at the end of various ProtocolFragments branches in the schema. This is because the authentication method(s) that can be used as for a connection depend on the protocol used. This hierarchy is shown schematically below:

  • ProtocolFragments
    • FTPFragment
      • BasicConnection
      • BasicAuthentication
        • Account
        • Password (optional)
    • FTPSFragment
      • BasicConnection
      • BasicAuthentication
        • Account
        • Password (optional)
    • HTTPFragment
      • etc ...
    • etc ...

The protocol-dependency of the various authentication methods is integrated into the schema and explains why authentication methods lie below ProtocolFragments in the XML hierarchy. This integration in the Schema ensures that the only authentication methods that are supported by a protocol can be specified.

...