Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Authentication methods

The JADE YADE Client provides a number of authentication methods.These are specified in the Fragments branch of the XSD Schema at the end of various ProtocolFragments branches in the schema. This is because the authentication method(s) that can be used as for a connection depend on the protocol used.

Note that any number of ProtocolFragments can be specified within a configuration, allowing a number of authentication methods to be predefined for a particular file transfer operation. The AlternativeFragments element can be used to specify a number of alternative connections and authentication methods for a file transfer profile.

The protocol-dependency of the various authentication methods is integrated into the XSD Schema and explains why authentication methods lie below ProtocolFragments in the XML hierarchy. This integration in the Schema ensures that the only authentication methods that are supported by a protocol can be specified.The authentication methods that are supported are:

Specifying Authentication Methods

Authentication methods are specified in the Fragments elements of the XSD Schema at the end of various ProtocolFragments branches in the schema. This is because the authentication method(s) that can be used as for a connection depend on the protocol used. This hierarchy is shown schematically below:

  • Fragments
    • ProtocolFragments
      • FTPFragment
        • BasicConnection
        • BasicAuthentication
          • Account
          • Password (optional)
      • FTPSFragment
        • BasicConnection
        • BasicAuthentication
          • Account
          • Password (optional)
      • HTTPFragment
        • etc ...
      • etc ...

The protocol-dependency of the various authentication methods is integrated into the schema and explains why authentication methods lie below ProtocolFragments in the XML hierarchy. This integration in the schema ensures that the only authentication methods that are supported by a protocol can be specified.

Note that any number of ProtocolFragments can be specified within a configuration, allowing a number of authentication methods to be predefined for a particular file transfer operation. The AlternativeFragments element can be used to specify a number of alternative connections and authentication methods for a file transfer profile.

Optional Authentication-Related Elements

Note that the following additional authentication elements can be optionally specified:

Proxies

Proxies can be specified for each connection in the relevant connection fragment. For example, the ProxyForFTP element is specified as a child of the FTPFragment.

Alternative Connections

Alternative protocols and thereby alternative authentication methods can be specified using the AlternativeFragments element.

This element is used to define a series of connections that are tried one after the other in the event of a primary connection not being available.

Strict Host Key Checking

Untrusted Certificates

Authentication using the SOS Credential Store

JADE YADE can use the SOS Credential Store to securely access authentication credentials. StatuscolourYellowtitleADD Link to CS