SFTP File Automation Options
An SFTP server is included with every CommerceHub Dsco account, each having its own unique SFTP credentials. The directories below are created for every SFTP account and for every account record created in the Dsco platform. The directories will house the files used to retrieve and deposit data associated with the automated jobs you’ll create. For more information about creating automated jobs, see Creating an Automated Job.
Ready to access the SFTP page in the Dsco portal? Go to https://app.dsco.io/automation/sftp.
For more information about your account-specific SFTP credentials, see Your SFTP Site Credentials.
The following directories are available for every SFTP account.
Directory |
Description |
/in/ | Used to store files to be processed by the Dsco platform (if you choose to reference CommerceHub’s SFTP instance instead of another URL for automated file-processing). |
/in/processing/ | Used to store files that are currently being processed by the Dsco platform. Once the files are processed, they will be moved to the /in/archive/ folder. |
/in/archive/ | Used to store files from the /in/ folder that have been processed by the Dsco platform. You’ll have access to the files in /in/archive/ folder for 60 days. |
/out/ | Used to store files that have been exported from the Dsco platform (if you choose to reference CommerceHub’s SFTP instance instead of another URL for automated file-processing). |
/out/archive/ | Used to store files that you’ve downloaded from the /out/ folder. You’ll have access to the files in /out/archive/ for 60 days. |
/misc/ | Used to temporarily store files. No automation is used with this folder. |
CommerceHub also supports the use of external SFTP servers for all incoming and outgoing operations. Additionally, if a job is configured as an import, CommerceHub supports the use of both HTTP and HTTPS file-path URLs.
Using Identity Keys instead of Whitelisting IP Addresses
Trading partners can use our public keys to verify the identify of our servers. While this is configured differently for different SFTP clients, you can find the necessary information regarding what we support and our public keys when configuring the use of identity keys with the Dsco Platform sFTP servers.
The public keys for CommerceHub servers are below. While SSH supports multiple key types, we recommend using ED25519. To confirm that these are ED25519 keys, refer to the ssh-ed25519 prefix.
Production |
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMARMCy7o7wub7kewRWCqxD0mb8jz5wibtK7hRYcNHv0 |
Staging |
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOnta2KQAh7e/clxfypuSuPmyI/lXEOmk/H0QoBChpPy |
CommerceHub also supports RSA public keys. Be aware that RSA keys are subject to change at any time, which may require configuration updates from most SFTP partners. Here are CommerceHub’s RSA public keys.
Production | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdcEEDx9FJH9olVIdkrpdJ5xm21l0+8ZI00Papc9tgSFaMr77jGEofkqq1WcdoQrdNCt+3QuhNo79wUidZRNQFb0oQHZ4oB6qi0cJnNhxRJWSr3v+y58RHnJhac3v+MOiT4Wq/GDiU1ubtsI4kSlzOv7w7AO2QAUQiaDoy4VZdg+eZIJHk+Sh22V5GQlwJ7wGdmlqEGSIm3/vd6qyG0oF7faB6JsWrXYbyzmf/taFdl8VBOi6iINX68qUdrUQeH0o7tqxnPDGruM8fbMQsz5BWVf9g/vS1pEo85yzF7cd+AZYSBImwGk/TVnme10X04IO+l9lD0q2sMppDqLRG7Acz |
Staging | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSUhRlZhem1xuvvd9J72Pfyisvy1+fVTQqblDYKUkuQk2IBm4t18RWXckdLdL4TbsS4lo2uHLRVwrbcKo/8aKTsq45G2cscRURtMr12uH01aOBcrg18vMtUxfJcQp6la8dYvwvlbby7jrJiszEebTMjr4g2mlX3ifHNj7qSFj3xzNXkA3BlUKB8nuSWhA/vRfOSrI2kCzzront33+Gy/hCR2DMV8eUZ1odATPLIJ+/RD2zqHL1fbhnPl1kLkScNgVLAkaNPFV3Z9uDtjw1jhcBQNj/zhkUV62Rq4Zo6OvpOQzGc9AyaGxHgsdtLNEPcmGwT0uIRVdLP3fPuC+hQqHV |
Supported Ciphers
Ciphers
- aes256-gcm@openssh.com
- chacha20-poly1305@openssh.com
- aes256-ctr
- aes128-gcm@openssh.com
- aes128-ctr
MACs
- hmac-sha2-256-etm@openssh.com
- hmac-sha1-etm@openssh.com
- umac-128-etm@openssh.com
- hmac-sha2-512-etm@openssh.com
- hmac-sha2-256
- hmac-sha1
- umac-128@openssh.com
- hmac-sha2-512
Key Algorithms
- curve25519-sha256
- curve25519-sha256@libssh
- org,ecdh-sha2-nistp256
- ecdh-sha2-nistp384
- ecdh-sha2-nistp521
- diffie-hellman-group-exchange-sha256
- diffie-hellman-group14-sha256
- diffie-hellman-group16-sha512
- diffie-hellman-group18-sha512
Host Key Algorithms
- ssh-ed25519 (preferred)
- rsa-sha2-256
- rsa-sha2-512
Public Key Accepted Algorithms
- ecdsa-sha2-nistp256
- ecdsa-sha2-nistp256-cert-v01@openssh.com
- sk-ecdsa-sha2-nistp256@openssh.com
- sk-ecdsa-sha2-nistp256-cert-v01@openssh.com
- ecdsa-sha2-nistp384
- ecdsa-sha2-nistp384-cert-v01@openssh.com
- ecdsa-sha2-nistp521
- ecdsa-sha2-nistp521-cert-v01@openssh.com
- ssh-ed25519 (preferred)
- ssh-ed25519-cert-v01@openssh.com
- sk-ssh-ed25519@openssh.com
- sk-ssh-ed25519-cert-v01@openssh.com
- rsa-sha2-256
- rsa-sha2-256-cert-v01@openssh.com
- rsa-sha2-512
- rsa-sha2-512-cert-v01@openssh.com
Required RSA Size
- Keys smaller than 2048 bytes are not allowed.
Comments
Please sign in to leave a comment.