To access these additional fields: Click HOSTS and click the name of the SSH/SFTP host. You can filter the list.
Note: The host's properties page shows the configured settings for each property area. To view all possible settings, click Edit.
For General properties, see SSH/SFTP Host Field Descriptions.
SSH/SFTP Host Field |
Description |
||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Uploads |
|
||||||||||||
Upload as temp file then rename |
Default is No (not selected). If selected: File is uploaded under a temporary filename, and then the just-uploaded file is renamed to a different name. This option can be used to avoid triggering another automation system that depends on the existence of a certain filename, but which cannot detect the difference between open/closed or started/finished files. Temp file upload name: Default: |
||||||||||||
Set file permissions after upload |
This setting affects only SSH hosts that are based on a UNIX-like file system. Default is not selected. If selected: You can set UNIX-style file attributes on the file after it uploads successfully. Enter a 3-digit octal numeric representation, or select checkboxes to set permissions. |
||||||||||||
Limits |
|
||||||||||||
File count download limit |
Maximum number of files that are downloaded from a source in a single task run against this host. If the limit is exceeded, and the Advanced task setting Automatically re-run task if source download limits are encountered is set, the task is automatically rerun. |
||||||||||||
File size download limit |
Maximum number of bytes that are downloaded from a source in a single task run against this host. Value of 0 means no limit. Downloading stops after the first file that causes the number of downloaded bytes to exceed the limit. If the limit is exceeded, and the Advanced task setting Automatically re-run task if source download limits are encountered is set, the task is automatically rerun. |
||||||||||||
Timeouts |
|
||||||||||||
Transfer Rescan Time |
The number of seconds between directory scans to detect changes in file size or date. The default is 0, which deactivates the feature. You can override the value in the individual task settings. The Transfer Rescan prevents the download of incomplete files. After a file that matches the download criteria is identified, MOVEit Automation rescans the directory to detect file changes. If file changes are identified, MOVEit Automation implements one of the following options:
|
||||||||||||
Retry Count |
Number of extra times that a transfer (get or put) is retried before MOVEit Automation no longer attempts the transfer. Default is 0 - transfer is not retried after a failure. The value can be overridden by settings in individual tasks. |
||||||||||||
Retry Timeout |
The number of seconds between retries of a transfer (get or put). Default is 30 seconds. The value can be overridden by settings in individual tasks. |
||||||||||||
Connect Timeout |
Number of seconds to wait when attempting to connect to the host. |
||||||||||||
Resume partial transfers (if possible) |
Applies to task runs in which the file is a binary file and the Retry Count is greater than zero. During the task run, if an upload or download fails, MOVEit Automation attempts to resume the transfer. The number of resume attempts is set in Retry Count. The transfer starts where the previous transfer failed. This setting can be overridden in a task by settings in Source and/or Destination. |
||||||||||||
Security |
|
||||||||||||
Encryption Algorithm List |
The encryption algorithm list allows you to choose which encryption algorithms are permissible, and the order of preference. By default, all encryption algorithms are enabled. To deselect an encryption algorithm, clear the check box. Encryption algorithms are listed in order of preference. To change the order, select the encryption algorithm and use the arrows to move the entry up or down. Note: Configurations prior to MOVEit Automation 2021.1 used grouped encryption algorithms. If you upgrade, the list of encryption algorithms associated with the encryption algorithm group is applied to the host. If the default encryption algorithm group was selected, the default list is selected. Encryption algorithm groups and associated encryption algorithm list selections are detailed below.
|
||||||||||||
Use MD5 |
Specifies whether MOVEit Automation looks for an MD5 file. MD5 files contain MD5 hashes of source files on the server. Options: Never: (default) MOVEit Automation does not look for an MD5 file. If Present: MOVEit Automation looks for the specified MD5 file. If the file contains a hash for a source file, the file is checked against the hash.
|
||||||||||||
MD5 Filename |
Name of the MD5 file to look for. Default is |
||||||||||||
Proxy Server |
|
||||||||||||
Proxy Type |
Options: SOCKS4, SOCKS5, WebStandard |
||||||||||||
Hostname/IP Address |
Hostname/IP Address |
||||||||||||
Port |
|
||||||||||||
Username, Password |
Credentials. SOCKS4 protocol does not support password authentication. |
||||||||||||
|
For more information, see Add a Proxy Server. |
||||||||||||
Advanced |
|
||||||||||||
Alternate Host |
Secondary host to which to rollover when the primary host is not available. For example, if after the designated Retry Count, problems are encountered connecting or logging in to the primary host. Rollover does not occur if other problems exist, such as: the directory does not exist, or there are insufficient permissions to access a file. For a host to appear as an option in this field, you must have previously created it. The alternate host must be the same type of host as the primary host. This field applies to the individual host. This is different from the failover feature that applies to nodes. |
||||||||||||
Delete State for Host path entries after |
Number of days after which State information for this host is deleted. Note: When this host is assigned as a task source that uses Collect Only New Files, MOVEit Automation saves file stamp information that is specific to this host and the task source's folder path and file mask. If a source's folder path and/or file mask contains a non-static macro (for example, [DD] or other date/time macros) the actual source folder path/file mask combination can potentially be different every time the task runs. This can cause the saved state information for this host to grow excessively large and without limits. |
||||||||||||
Use default state cache settings |
|
||||||||||||
Account for Daylight Savings |
This host automatically changes the apparent time of existing files when Daylight Savings Time comes into effect, or reverts to Standard Time. This setting changes the following:
|
||||||||||||
Optimize SSH transfer buffer |
This setting is useful if you are experiencing issues related to partial file downloads. Disabling this option might potentially resolve these issues. Default is selected. |
||||||||||||
Key exchange algorithms |
The key exchange algorithm list allows you to choose which algorithms are permissible, and the order of preference. By default, all key exchange algorithms are enabled. To deselect an algorithm, clear the check box. Key exchange algorithms are listed in order of preference. To change the order, select the key exchange algorithm and use the arrows to move the entry up or down.
|
||||||||||||
Directory List Parsing |
|
||||||||||||
|
Directory List Parsing is not supported by the current SFTP client. However, it is possible to revert to the previous SFTP client (WeOnlyDo - SftpDLL64.dll) for Directory List Parsing support. For more information, contact Technical Support. |