Skip to content

Xferity Integrations — OIDC, Vault, AWS SM, Slack, Webhook, and Transfer Endpoints

Xferity integrates with the systems that surround managed file transfer operations: identity providers, notification channels, secret backends, and partner transfer endpoints.

In Postgres-backed deployments, the Web UI and API use session-backed authentication. Xferity supports two identity models:

  • Local auth — username and password with bcrypt hashing, session cookies, CSRF protection
  • OIDC — OpenID Connect login for browser sessions with any OIDC-compatible identity provider

OIDC is relevant when you have an existing SSO infrastructure and want operator browser sessions to use it rather than managing separate Xferity credentials.

Xferity supports 6 notification channels for operational events (flow success, failure, retry, posture regression alerts):

ChannelIntegration mechanism
EmailSMTP with configurable host, port, TLS, and from address
SlackIncoming webhook URL
WebhookHTTP POST to any URL with configurable headers
NtfyNtfy topic URL, supports self-hosted ntfy servers
GotifyGotify server URL with application token
PushoverPushover user key and application token

Notification routing can be configured globally and overridden per flow or per partner.

Xferity resolves credentials from 7 providers at runtime. Operators use secret references in config instead of embedding plaintext values:

ProviderReference syntax
Environment variableenv:MY_SECRET
Filefile:/run/secrets/password
Local vault (AES-256)local-vault:key-name
HashiCorp Vault KV v2vault:secret/data/path#field
AWS Secrets Manageraws-sm:secret-id#field
Azure Key Vaultazure-kv:secret-name
Literal (testing only)literal:value

The local vault stores secrets encrypted at rest in the Postgres backend. Operators create and manage local-vault secrets through the UI without the plaintext value ever being echoed back.

At the transfer layer, Xferity integrates with:

  • SFTP servers — SSH key or password auth, known-hosts verification
  • FTPS servers — Explicit TLS, passive mode, SHA-256 certificate fingerprint pinning
  • S3-compatible storage — AWS S3, MinIO, Cloudflare R2 via endpoint override
  • AS2 trading partners — Certificate-based B2B messaging with MDN receipts