IBM Aspera HST Admin Manual page 342

High-speed transfer server
Table of Contents

Advertisement

containing both the encrypted contents of the file and the encryption metadata, and it also changes the name of
the file by adding the file extension .aspera-env.)
It works with both regular transfers (FASP) and HTTP fallback transfers.
Limitations and Other Considerations
Server-side EAR is not designed for cases where files need to move in an encrypted state between multiple
computers. For that purpose, client-side EAR is more suitable: files are encrypted when they first leave the
client, then stay encrypted as they move between other computers, and are decrypted when they reach the
final destination and the passphrase is available. See Step 4 of this section for more information on client-side
encryption.
Do not mix server-side EAR and non-EAR files in transfers, which can happen if server-side EAR is enabled
after the server is in use or if multiple users have access to the same area of the file system but have different
EAR configurations. Doing so can cause problems for clients by overwriting files when downloading or
uploading and corrupting metadata.
Server-side EAR does not work with multi-session transfers (using ascp -C or node API multi_session
set to greater than 1) or Watch Folders (versions prior to 3.8.0 that do not support URI docroots).
To enable server-side EAR:
a) Set users' docroots in URI format (local docroots are prepended with file:///).
# asconfigurator -x "set_user_data;user_name,username;absolute,file:///path"
b) Set the server-side EAR password.
Set a different EAR password for each user or group:
# asconfigurator -x
"set_user_data;user_name,username;transfer_encryption_content_protection_secret,passphrase"
# asconfigurator -x
"set_group_data;group_name,group_name;transfer_encryption_content_protection_secret,passphrase"
Important: If the EAR password is lost or aspera.conf is compromised, you cannot access the data on
the server.
c) Require content protection and strong passwords.
These settings cause server-side EAR to fail if a password is not given or if a password is not strong enough.
For example, the following asconfigurator command adds both these options for all users (global):
# asconfigurator -x "set_node_data;transfer_encryption_content_protection_required,true"
# asconfigurator -x "set_node_data;transfer_encryption_content_protection_strong_pass_required,true"
2. Never use "shared" user accounts.
Configure each user as their own Aspera transfer user. Sharing Aspera transfer user account credentials with
multiple users limits user accountability (you cannot determine which of the users sharing the account performed
an action).
3. Use passphrase-protected private keys.
The ssh-keygen tool can protect an existing key or create a new key that is passphrase protected.
If you cannot use private key authentication and use password authentication, use strong passwords and change
them periodically.
4. If your workflow allows, require client-side encryption-at-rest (EAR).
Aspera clients can set their transfers to encrypt content in transit and on the server, and the server can be
configured to require client-side EAR. You can combine client-side and server-side EAR, in which case files are
doubly encrypted on the server. Client-side encryption-at-rest is not supported for ascp4 or async transfers.
Client configuration
The client specifies a password and the files are uploaded to the server with a .aspera-env extension. Anyone
downloading these .aspera-env files must have the password to decrypt them. Users can enable client-side
EAR in the GUI or on the ascp command line.
| Appendix | 342

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents