SFTP host verification
Verify SSH servers with known_hosts or SHA-256 host fingerprints. Xferity does not silently accept unknown host keys.
Verify partner endpoints, protect payloads, control secrets, enforce safe configuration, and produce audit-ready evidence without outsourcing trust to scripts or shared SaaS runtime.
Transport trust
Xferity keeps trust explicit for each protocol instead of burying it in client defaults, manual runbooks, or one-off script flags.
Verify SSH servers with known_hosts or SHA-256 host fingerprints. Xferity does not silently accept unknown host keys.
Use explicit TLS, passive mode, standard CA validation, and optional SHA-256 certificate fingerprint pinning when CA trust alone is not enough.
Separate signing, verification, encryption, decryption, and HTTPS transport trust per partner instead of collapsing AS2 trust into one certificate.
Apply TLS, credential scoping, and endpoint control for Amazon S3, S3-compatible storage, and Azure Blob workflows.
Run WebDAV exchange through HTTPS with explicit credential handling and transport validation for document and collaboration platforms.
Keep trust anchored to the actual endpoint, certificate, key, bucket, or collection each partner uses instead of relying on global defaults.
Payload protection
Encrypt, decrypt, sign, verify, manage certificate roles, and control enterprise key handling without splitting cryptography into disconnected tooling.
Encrypt before upload and decrypt after download as part of the flow, using native gopenpgp or GnuPG execution where required.
Sign outbound payloads and verify inbound signatures with detached or inline signature support.
Use auto mode only for named compatibility cases. Fallback is controlled, explicit, and not treated as a generic retry path.
Run each GnuPG operation in its own temporary home to avoid shared keyring state, agent side effects, and cross-flow contamination.
Import, generate, store, bind, and track X.509 certificates with expiry awareness and role validation.
Track PGP key capabilities, bind keys to the right partner roles, and review crypto posture from a single operator view.
Security controls
Use runtime secret resolution, hardened-mode startup enforcement, strict validation, and authenticated operator surfaces to reduce configuration drift and unsafe defaults.
Resolve credentials from env, file, local-vault, HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, or literal references instead of embedding routine secrets in config.
Store local-vault secrets encrypted at rest in Postgres-backed deployments and manage them without exposing plaintext back to operators.
Fail at startup when plaintext secrets, insecure TLS, weak transport settings, or unsafe auth configuration are present.
Reject unknown fields and silent misconfiguration at startup so security settings do not drift quietly into production.
Use bcrypt-backed local auth, session cookies, CSRF protection, OIDC browser login, and configurable per-IP rate limiting for operator surfaces.
Apply role-aware access control to the Postgres-backed Web UI and REST API, with hardened mode able to block startup if required auth and TLS settings are missing.
| Domain | What Xferity evaluates |
|---|---|
| Crypto | Certificate expiry, PGP key bindings, AS2 certificate role coverage |
| Secrets | Plaintext credentials, missing secret references, unsafe secret handling |
| Transport | SFTP host key status, FTPS TLS settings, AS2 TLS settings |
| Auth | UI authentication enforcement, rate limiting, access posture |
| Flow drift | Scheduled flows that are no longer executing as expected |
| Platform | Runtime health and required backend/security features |
Book a technical security walkthrough focused on trust models, cryptography, secrets handling, hardened mode, audit evidence, and the deployment boundaries your team needs.