Skip to content

Integrations Capabilities — Xferity External System Integrations

This page is the explicit, structured reference for Xferity’s external system integrations.

  • Username and password with bcrypt hashing
  • Session cookies with CSRF protection
  • Rate limiting per IP
  • Available in Postgres-backed deployments
  • Any OpenID Connect-compatible identity provider (Okta, Azure AD, Google, Keycloak, etc.)
  • Browser session login via OIDC authorization code flow
  • Replaces Xferity-managed credentials with existing SSO infrastructure
  • Available in Postgres-backed deployments only

Xferity delivers operational alerts and flow events to 6 notification channels:

ChannelIntegration mechanism
EmailSMTP — configurable host, port, TLS, from address
SlackIncoming webhook URL
HTTP WebhookPOST to any URL with configurable headers
NtfyNtfy topic URL — supports self-hosted ntfy servers
GotifyGotify server URL with application token
PushoverPushover user key and application token
  • Flow execution success
  • Flow execution failure
  • Retry exhaustion
  • Posture regression alerts (security state worsened)
  • Global defaults apply to all flows
  • Per-flow overrides for specific notification channels
  • Per-partner overrides for partner-specific alert routing

Xferity integrates with 7 secrets providers. Credentials are resolved at runtime — no plaintext in config files:

ProviderReference formatNotes
Environment variableenv:MY_VARBootstrap-safe
Filefile:/run/secrets/passwordBootstrap-safe; works with Docker secrets
Local vault (AES-256)local-vault:key-namePostgres-backed only; managed via UI
HashiCorp Vault KV v2vault:secret/data/path#fieldVault TLS verified; skip-verify blocked in hardened mode
AWS Secrets Manageraws-sm:secret-id#fieldIAM or static credentials
Azure Key Vaultazure-kv:secret-nameAzure managed identity or service principal
Literalliteral:valueTesting only; blocked in hardened mode

Secret references work across:

  • Global configuration (database DSN, UI secrets, API keys)
  • Partner configuration (SFTP passwords, S3 keys, AS2 credentials)
  • Flow configuration (inline credential overrides)
  • Auth configuration (OIDC client secrets)

Xferity integrates with external file transfer endpoints at the transport layer:

  • Any standard SSH2 SFTP server
  • Authentication: password or SSH key
  • Trust: known_hosts file or SHA-256 host fingerprint
  • Remote file stability checks before pickup
  • Compatible with: OpenSSH, ProFTPD, AWS Transfer Family, Azure SFTP, etc.
  • Any standard FTPS server (explicit TLS mode)
  • Passive mode
  • Trust: system CA pool or SHA-256 server certificate fingerprint pinning
  • Compatible with: vsftpd, FileZilla Server, ProFTPD, etc.
  • Any AS2-compatible partner endpoint (Drummond-certified or standard)
  • Inbound: HTTP endpoint on Xferity receives AS2 messages
  • Outbound: Xferity sends AS2 messages to partner URL
  • Certificate-based message security: sign, encrypt, verify, decrypt
  • MDN receipts: synchronous and asynchronous
  • Compatible with: IBM Sterling, OpenAS2, Axway, GoAnywhere, MOVEit, etc.
  • AWS S3 — IAM roles or static access keys
  • MinIO — endpoint override
  • Cloudflare R2 — endpoint override with compatible API
  • Any S3-compatible API via endpoint override

  • Prometheus-format metrics at /metrics (authenticated admin access)
  • Pre-built alert rules for common failure scenarios
  • Metrics coverage: flow runs, job queue depth, transfer bytes, retries, certificate expiry, auth failures

Xferity integrations include:

  • OIDC (any OpenID Connect IdP) for browser session authentication
  • Local bcrypt auth with session management
  • Email (SMTP), Slack, Webhook, Ntfy, Gotify, Pushover notification channels
  • 7 secrets providers: env, file, local AES-256 vault, HashiCorp Vault, AWS Secrets Manager, Azure Key Vault
  • SFTP server integration (any SSH2-compatible server)
  • FTPS server integration (explicit TLS, passive mode)
  • AS2 trading partner integration (inbound + outbound, sign/encrypt/verify/decrypt)
  • S3-compatible object storage (AWS S3, MinIO, Cloudflare R2)
  • Prometheus metrics for monitoring integration