SlideShare a Scribd company logo
1 of 15
Download to read offline
AS2 vs. SFTP
for secure document exchange
AS2 stands for Applicability Statement 2. Originally, Applicability Statement was
created in the 1990s as AS1.
It was later upgraded when Walmart adopted and required their suppliers and
other third-party vendors to use it in 2002.
The upgrade included the encryption of messages, known as AS2 messages,
that were exchanged with trading partners, vendors, and remote systems.
What is AS2?
SFTP (Secure File Transfer Protocol) is built on the SSH (Secure Shell) network
security protocol.
It is designed to allow for the secure transfer of files between users (from a SFTP
client to a SFTP server, and vice versa).
Primary functionality of SFTP is generally similar to standard FTP (File Transfer
Protocol); however, there is no direct relationship between the two.
What is SFTP?
Why do I need AS2?
Once you send files over the Internet, you'll be exposing them to various
network-based threats. Malicious individuals can intercept your message and then
steal whatever sensitive information you have in there.
AS2 protocol, allows you to securely transfer your data by encrypting your
payload.
Since AS2 protocol itself make sure your data is encrypted in transit, you do not
need to depend on the TCP level security measurement.
You can safely transfer your data over even HTTP protocol without compromising
security.
In Transit Encryption
Digital signature is a key feature of AS2 because they help enforce authentication,
data integrity, and non-repudiation, which are essential in maintaining the integrity
of business transactions. When you apply digital signatures, you'll be able to:
● Ascertain that the trading partner who sent you a message or file is in fact the
entity it claims to be (authentication)
● Verify whether the message received by the recipient is in fact the message
sent by the sender and not altered along the way (data integrity)
● Prevent a sender from disowning/refuting a transmission sent in the past
(non-repudiation)
Digital Signature
Before you carry out a transaction, it's important to make sure the entity you're
about to transact with is in fact the one whom you intended to transact with.
There are some cases where cyber criminals can spoof a trading partner's host and
participate in the transactions in their stead.
AS2's certificate-based authentication can minimize this risk.
Certificate Based Authentication
Once you shared your data with your trading partner, there should be a
confirmation whether they received/accepted the content you send.
AS2 protocol have a option to request an electronic receipt from the recipient
confirming message delivery status.
This receipt is known as MDN (Message Disposition Notification).
Message sender can also request from the recipient to add their digital signature to
the MDN, eliminating the chance of MDN spoofing and preserving the end-to-end
integrity of the overall transaction.
Electronic Receipts (MDN)
Message Disposition Notification includes a Message Integrity Check (MIC)
computed by your trading partner, based on the payload they received.
When compared with the MIC computed for the initial payload at your (sender's)
end, will stand as strong proof that the content integrity was preserved.
Message Integrity Check (MIC)
If you wish to utilize these integrity and non-repudiation features under SFTP, you
and your partner would need to implement an additional protocol layer on top of
SFTP and explicitly adhere to it.
However, AS2 is a standardized protocol that already includes all these features,
with a strong track record from leading B2B giants like Walmart, Amazon and
Target Corporation.
Unlike SFTP which operates over the SSH port - and hence requires need to
expose that (generally administrative) port for outside access, AS2 operates over
standard HTTP/HTTPS. So it is compatible with any generic network, safer, and
more firewall-friendly.
Why MFT Gateway?
MFT Gateway is a SaaS (Software as a Service) application for Managed File
Transfer, over AS2 protocol, developed on top of Amazon Web Service
infrastructure.
Since MFT Gateway is implemented using cloud native architecture, we deliver high
availability and rapid scalability for our clients.
Hare are the AWS services that MFT Gateway uses for the core functionality of the
application.
● User Management: Amazon Cognito
● Database: Amazon DynamoDB
● Content Store: Dedicated Amazon S3 bucket for each client
● Processing: AWS lambda
Cloud Native Architecture
● AS2/Web app traffic receive interface: API Gateway
● Internal signalling: Amazon SNS
● Email notifications: Amazon SES
● Recording message statistics: Amazon TimeStream
● Deployment aspect: CloudFormation
MFT Gateway allows you to automate your message flows through multiple
integrations.
● S3: S3 integration allows you to directly access your dedicated S3 bucket and
send and receive messages using it, by uploading attachments to S3 bucket.
● SFTP: You can also send and receive messages through SFTP by enabling
SFTP integration.
● Webhook: MFT Gateway allows you to configure multiple webhook endpoints
to receive notifications for incoming AS2 messages, and message send
failures.
● REST API: You can use use the REST API for sending messages and
downloading received content.
Integration Support

More Related Content

What's hot

Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceHem Pokhrel
 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slidesrahul kundu
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxssuser403d87
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data InterchangeSharad Srivastava
 
Introduction to column oriented databases
Introduction to column oriented databasesIntroduction to column oriented databases
Introduction to column oriented databasesArangoDB Database
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentalsarunv
 
Open Source Ajax Solution @OSDC.tw 2009
Open Source Ajax  Solution @OSDC.tw 2009Open Source Ajax  Solution @OSDC.tw 2009
Open Source Ajax Solution @OSDC.tw 2009Robbie Cheng
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data InterchangeStudent
 
Introduction to xml
Introduction to xmlIntroduction to xml
Introduction to xmlsoumya
 
Soap and restful webservice
Soap and restful webserviceSoap and restful webservice
Soap and restful webserviceDong Ngoc
 

What's hot (20)

EDI
EDIEDI
EDI
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-Commerce
 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slides
 
Soap Vs Rest
Soap Vs RestSoap Vs Rest
Soap Vs Rest
 
Managing File Transfers (MFT)
Managing File Transfers (MFT)Managing File Transfers (MFT)
Managing File Transfers (MFT)
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
EDI
 EDI EDI
EDI
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data Interchange
 
as2 concepts
as2 conceptsas2 concepts
as2 concepts
 
Introduction to column oriented databases
Introduction to column oriented databasesIntroduction to column oriented databases
Introduction to column oriented databases
 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentals
 
Open Source Ajax Solution @OSDC.tw 2009
Open Source Ajax  Solution @OSDC.tw 2009Open Source Ajax  Solution @OSDC.tw 2009
Open Source Ajax Solution @OSDC.tw 2009
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
 
Introduction to xml
Introduction to xmlIntroduction to xml
Introduction to xml
 
Client and server side scripting
Client and server side scriptingClient and server side scripting
Client and server side scripting
 
Web application architecture
Web application architectureWeb application architecture
Web application architecture
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Soap and restful webservice
Soap and restful webserviceSoap and restful webservice
Soap and restful webservice
 
Xml
XmlXml
Xml
 

Similar to AS2 vs. SFTP

VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptSonukumarRawat
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3Gurpreet singh
 
Securing mule
Securing   muleSecuring   mule
Securing muleSindhu VL
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
 

Similar to AS2 vs. SFTP (20)

Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Module 2.pdf
Module 2.pdfModule 2.pdf
Module 2.pdf
 
Module 2.Cryptography and Cryptanalysis
Module 2.Cryptography and CryptanalysisModule 2.Cryptography and Cryptanalysis
Module 2.Cryptography and Cryptanalysis
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 
Unit 6
Unit 6Unit 6
Unit 6
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
Securing mule
Securing   muleSecuring   mule
Securing mule
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusiness
 
application layer
application layerapplication layer
application layer
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

AS2 vs. SFTP

  • 1. AS2 vs. SFTP for secure document exchange
  • 2. AS2 stands for Applicability Statement 2. Originally, Applicability Statement was created in the 1990s as AS1. It was later upgraded when Walmart adopted and required their suppliers and other third-party vendors to use it in 2002. The upgrade included the encryption of messages, known as AS2 messages, that were exchanged with trading partners, vendors, and remote systems. What is AS2?
  • 3. SFTP (Secure File Transfer Protocol) is built on the SSH (Secure Shell) network security protocol. It is designed to allow for the secure transfer of files between users (from a SFTP client to a SFTP server, and vice versa). Primary functionality of SFTP is generally similar to standard FTP (File Transfer Protocol); however, there is no direct relationship between the two. What is SFTP?
  • 4. Why do I need AS2?
  • 5. Once you send files over the Internet, you'll be exposing them to various network-based threats. Malicious individuals can intercept your message and then steal whatever sensitive information you have in there. AS2 protocol, allows you to securely transfer your data by encrypting your payload. Since AS2 protocol itself make sure your data is encrypted in transit, you do not need to depend on the TCP level security measurement. You can safely transfer your data over even HTTP protocol without compromising security. In Transit Encryption
  • 6. Digital signature is a key feature of AS2 because they help enforce authentication, data integrity, and non-repudiation, which are essential in maintaining the integrity of business transactions. When you apply digital signatures, you'll be able to: ● Ascertain that the trading partner who sent you a message or file is in fact the entity it claims to be (authentication) ● Verify whether the message received by the recipient is in fact the message sent by the sender and not altered along the way (data integrity) ● Prevent a sender from disowning/refuting a transmission sent in the past (non-repudiation) Digital Signature
  • 7. Before you carry out a transaction, it's important to make sure the entity you're about to transact with is in fact the one whom you intended to transact with. There are some cases where cyber criminals can spoof a trading partner's host and participate in the transactions in their stead. AS2's certificate-based authentication can minimize this risk. Certificate Based Authentication
  • 8. Once you shared your data with your trading partner, there should be a confirmation whether they received/accepted the content you send. AS2 protocol have a option to request an electronic receipt from the recipient confirming message delivery status. This receipt is known as MDN (Message Disposition Notification). Message sender can also request from the recipient to add their digital signature to the MDN, eliminating the chance of MDN spoofing and preserving the end-to-end integrity of the overall transaction. Electronic Receipts (MDN)
  • 9. Message Disposition Notification includes a Message Integrity Check (MIC) computed by your trading partner, based on the payload they received. When compared with the MIC computed for the initial payload at your (sender's) end, will stand as strong proof that the content integrity was preserved. Message Integrity Check (MIC)
  • 10. If you wish to utilize these integrity and non-repudiation features under SFTP, you and your partner would need to implement an additional protocol layer on top of SFTP and explicitly adhere to it. However, AS2 is a standardized protocol that already includes all these features, with a strong track record from leading B2B giants like Walmart, Amazon and Target Corporation. Unlike SFTP which operates over the SSH port - and hence requires need to expose that (generally administrative) port for outside access, AS2 operates over standard HTTP/HTTPS. So it is compatible with any generic network, safer, and more firewall-friendly.
  • 12. MFT Gateway is a SaaS (Software as a Service) application for Managed File Transfer, over AS2 protocol, developed on top of Amazon Web Service infrastructure.
  • 13. Since MFT Gateway is implemented using cloud native architecture, we deliver high availability and rapid scalability for our clients. Hare are the AWS services that MFT Gateway uses for the core functionality of the application. ● User Management: Amazon Cognito ● Database: Amazon DynamoDB ● Content Store: Dedicated Amazon S3 bucket for each client ● Processing: AWS lambda Cloud Native Architecture
  • 14. ● AS2/Web app traffic receive interface: API Gateway ● Internal signalling: Amazon SNS ● Email notifications: Amazon SES ● Recording message statistics: Amazon TimeStream ● Deployment aspect: CloudFormation
  • 15. MFT Gateway allows you to automate your message flows through multiple integrations. ● S3: S3 integration allows you to directly access your dedicated S3 bucket and send and receive messages using it, by uploading attachments to S3 bucket. ● SFTP: You can also send and receive messages through SFTP by enabling SFTP integration. ● Webhook: MFT Gateway allows you to configure multiple webhook endpoints to receive notifications for incoming AS2 messages, and message send failures. ● REST API: You can use use the REST API for sending messages and downloading received content. Integration Support