Skip to content
Xferity
Protocols, automation, security, operations, integrations, deployment

Everything Xferity includes for secure file transfer operations

Run partner exchange, transfer automation, security controls, operator workflows, and deployment your way — without cutting critical capabilities or forcing a SaaS runtime.

Feature overview

Category What Xferity gives you
Protocols SFTP, FTPS, AS2, Amazon S3 / S3-compatible storage, WebDAV, Azure Blob Storage
Automation YAML flows, cron scheduling, interval polling, retry, idempotency, flow locking, resume, dead-letter
Cryptography OpenPGP encrypt/decrypt/sign/verify, GnuPG fallback, certificate inventory, PGP key inventory
Security Host key verification, TLS validation, AS2 certificate roles, 7 secrets providers, hardened mode, posture engine, audit chain
Operations CLI, Web UI, REST API, run history, trace, Prometheus metrics, health endpoints, durable jobs
Deployment File-backed or Postgres-backed, single binary, Docker, Docker Compose, Windows-native, Linux-native, air-gapped

Transfer protocols

Use the protocols your partners and internal systems already require

Xferity supports the protocol mix real enterprise environments deal with, with explicit trust and transport behavior for each one.

SFTP

Run SSH-based file exchange with required host key verification, password or key authentication, and remote file stability checks.

FTPS

Use explicit TLS, passive mode, and optional SHA-256 certificate fingerprint pinning for FTP-compatible partner workflows.

AS2

Exchange signed and encrypted B2B messages with inbound and outbound support, certificate roles, and synchronous or asynchronous MDN receipts.

S3-compatible storage

Move files through Amazon S3, MinIO, Cloudflare R2, and compatible object storage endpoints with scoped credentials and endpoint override support.

WebDAV

Run upload and download workflows against WebDAV-compatible platforms with PROPFIND listing, MKCOL collection creation, and HTTPS-based exchange.

Azure Blob Storage

Handle Azure object storage workflows with shared-key, connection-string, or DefaultAzureCredential authentication and custom endpoint support.

Automation

Automate transfers without rebuilding the same logic in scripts

Scheduling, retries, idempotency, recovery, and cleanup are part of the platform, not an afterthought spread across cron jobs and task runners.

Flow-driven execution

Define every workflow as a named YAML flow so transfer behavior is reviewable, repeatable, and version-controlled.

Scheduling and polling

Use six-field cron expressions or interval-based run-service execution for recurring pickups, deliveries, and background automation.

Retry and recovery

Recover from transient failures with configurable retry, bounded backoff, jitter, dead-letter handling, and resume from last committed state.

SHA-256 idempotency

Prevent duplicate processing across retries, reruns, and restarts by tracking files with SHA-256 content-hash idempotency.

Flow locking

Avoid duplicate concurrent execution with distributed locking and stale-lock takeover when a lock outlives its owner.

Cleanup and notifications

Apply delete, archive, and dead-letter behavior with notification routing across Email, Slack, Webhook, Ntfy, Gotify, and Pushover.

Security and cryptography

Apply trust, secrets, cryptography, and audit controls in one operating model

Xferity combines transport trust, OpenPGP, secrets resolution, posture review, and tamper-evident auditability so security is operational, not bolted on.

OpenPGP operations

Encrypt, decrypt, sign, verify, and combine OpenPGP steps inside the flow instead of bolting crypto onto external scripts.

Certificate and key inventory

Manage X.509 certificates, PGP keys, partner crypto roles, expiry tracking, and Partner Crypto Policy from one operator surface.

Secrets management

Resolve credentials from env, file, local-vault, HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, or literal references at runtime.

Authentication and access control

Use bcrypt-based local auth, session cookies, CSRF protection, rate limiting, and OIDC browser login in Postgres-backed deployments.

Audit-ready evidence

Write structured JSONL audit records with SHA-256 hash-chain tamper evidence and fast trace lookups for file-level investigation.

Security posture engine

Track findings, suppressions, snapshots, trends, and regression alerts across crypto, secrets, transport, auth, flow drift, and platform scope.

Operations

Give operators the tools to run, monitor, and investigate file transfer properly

Use the CLI for lean operation, or move to the full Postgres-backed operator platform with UI, API, workers, inventory, and posture data when the environment demands it.

CLI for operators

Validate, diagnose, run, resume, inspect logs, review flow status, query history, and trace files from the xferity CLI.

Web UI and REST API

Use the Postgres-backed operator platform for partner management, crypto inventory, posture review, AS2 inbox, secrets vault, and API-backed control.

Durable job execution

Run worker-based durable jobs with PostgreSQL-backed state when you need richer operating workflows and shared execution history.

Monitoring and health

Expose Prometheus metrics, authenticated health endpoints, worker readiness, structured logs, and alert-friendly runtime data.

File-backed and Postgres-backed modes

Start with simple file-backed operation or move to the broader Postgres-backed platform when you need UI, workers, inventory, and posture data.

Deployment flexibility

Run Xferity as a single Go binary, Docker deployment, Docker Compose stack, Windows-native runtime, Linux-native runtime, or air-gapped installation.

Integration coverage

  • OIDC identity providers for browser session authentication
  • Email, Slack, Webhook, Ntfy, Gotify, and Pushover notifications
  • HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, env, file, and local encrypted vault secret providers
  • Prometheus scraping for operational visibility and alerting
  • SFTP, FTPS, AS2, S3-compatible storage, WebDAV, and Azure Blob transport endpoints

See the full feature set in your environment

Book a technical walkthrough focused on protocols, automation, security controls, operator workflows, and the deployment model that fits your team.