Deutsch
|
English

FTPSSLENABLED - Detailed description

FM-Portal

IC0000
FM-Portal

Overview

Parameters:FTPSSLENABLED
Category: Custom
Default value: 0
Product: eTASK.Other (Custom)


What does this parameter do?

This parameter enables or disables SSL/TLS encryption for FTP connections (FTPS - FTP over SSL). When enabled, all FTP file transfers are encrypted, protecting the transmission of login credentials and files from unauthorized access.


What is this parameter used for?

  • Enabling encrypted FTP connections (FTPS)

  • Protecting login credentials during FTP authentication

  • Securing data transmission against eavesdropping and man-in-the-middle attacks

  • Compliance with security policies for encrypted data transfers


Technical Details (for Administrators)

Format: Integer / Boolean
Default value: 0

Valid values:

  • 0 = FTP without SSL/TLS (unencrypted)

  • 1 = FTP with SSL/TLS enabled (encrypted, FTPS)

Important notes:

  • The parameter is stored in the system configuration, not in the database

  • When enabled, the FTP server must support FTPS

  • FTPS uses SSL/TLS to encrypt the connection

  • Works in conjunction with FTPUSER and FTPPASSWORD

Dependent parameters:

  • FTPUSER: Username for FTP access

  • FTPPASSWORD: Password for FTP access


When should you change this value?

Set the value to 1 (enable FTPS) if:

  • The FTP server supports FTPS

  • Confidential data is being transferred

  • Security policies require encrypted transfers

  • Protection against eavesdropping on login credentials is required

Leave 0 (FTPS disabled) if:

  • The FTP server does not support FTPS

  • Only unencrypted FTP is available

  • No FTP import is used

  • The transfer takes place in a trusted, isolated network


Important Notes

  1. The FTP server must support FTPS
    Before setting this parameter to 1 , ensure that the FTP server supports FTPS (FTP over SSL/TLS). If FTPS is not supported, the connection will fail.

  2. FTPS is not SFTP
    FTPS (FTP over SSL) is a different protocol than SFTP (SSH File Transfer Protocol). This parameter enables FTPS, not SFTP.

  3. Interaction with login credentials
    This parameter works in conjunction with FTPUSER and FTPPASSWORD. When FTPS is enabled, login credentials are transmitted in encrypted form.

  4. Certificate verification Server certificates
    are verified for FTPS connections. Additional configuration may be required for self-signed certificates.


Security

Does changing this parameter affect security?

Yes, this parameter has a direct impact on the security of data transmission.

  • If the value is 0 , access data and files are transmitted unencrypted—risk of eavesdropping and man-in-the-middle attacks

  • When set to 1 all FTP communications are encrypted—significantly higher security

  • Unencrypted FTP transmits passwords in plain text

  • FTPS protects against network sniffing and unauthorized data access

Security recommendations:

  • Always enable FTPS if the server supports it

  • Use FTPS especially when transferring confidential or personal data

  • Use FTPS for connections over unsecured networks (Internet)

  • Regularly check the server certificates

Conclusion: This parameter is security-relevant. FTPS should be enabled whenever possible to protect data transfers. Unencrypted FTP (value 0) poses a significant security risk.


Practical example

Initial situation:
A company imports files daily from an external service provider via the Internet using FTP. FTPSSLENABLED is set to 0 . A network analysis shows that the username and password are transmitted in plain text and that files are unencrypted.

Configuration:
The administrator verifies that the FTP server supports FTPS and sets FTPSSLENABLED to 1.

After the change:

  • All FTP connections are established using SSL/TLS encryption

  • Usernames and passwords are no longer transmitted in plain text

  • File contents are encrypted during transmission

  • Network sniffing cannot reveal login credentials or file contents

  • The connection is protected against man-in-the-middle attacks

Result:
Secure, encrypted data transmission in accordance with modern security standards. Protection against eavesdropping and unauthorized access during transmission.


For standard installations:1(FTPS enabled)

Reason:

  • Modern security standards require encrypted transmissions

  • Protection of login credentials and files against eavesdropping

  • Minimal security risk during data transfers

  • Most modern FTP servers support FTPS

Exceptions:

  • Value 0 Only if the FTP server does not support FTPS

  • In isolated, trusted networks without internet access

  • For legacy systems that do not support FTPS

note92c552e0-e20e-47a8-89eb-349b3989d8ca

Tip: Before enabling this, check whether the FTP server supports FTPS. Unencrypted FTP should only be used in exceptional cases.

Tip: Before enabling this feature, check whether the FTP server supports FTPS. Unencrypted FTP should only be used in exceptional cases.


War dieser Artikel hilfreich?