Supported SFTP/SCP Algorithms
SCP and SFTP are ideal for ActiveBatch because they provide secure, standards-based file transfers using SSH algorithms like AES for encryption, RSA for server authentication, and SHA-2 MACs for data integrity—ensuring that any files ActiveBatch moves between systems remain protected from interception or tampering. Since ActiveBatch often automates cross-system workflows, using SCP/SFTP reduces security risk, supports compliance requirements, and offers reliable, script-friendly integration, making them strong choices for secure, automated file movement within job plans.
The following table contains the algorithms currently supported by ActiveBatch.
| Algorithm | Version |
|---|---|
|
Key Exchanges |
|
|
|
diffie-hellman-group1-sha1 |
|
|
diffie-hellman-group-exchange-sha256 |
|
|
diffie-hellman-group-exchange-sha1 |
|
|
diffie-hellman-group18-sha512 |
|
|
diffie-hellman-group16-sha512 |
|
|
diffie-hellman-group14-sha256 |
|
|
diffie-hellman-group14-sha1 |
|
CIPHER |
|
|
|
3des-cbc |
|
|
aes128-ctr |
|
|
aes192-ctr |
|
|
aes128-ctr |
|
|
aes128-cbc |
|
|
aes192-cbc |
|
|
aes256-cbc |
|
|
aes256-ctr |
|
|
aes128-gcm@openssh.com |
|
|
aes256-gcm@openssh.com |
|
MAC |
|
|
|
hmac-sha2-256 |
|
|
hmac-sha1 |
|
|
hmac-sha2-512 |
|
|
hmac-sha2-256-etm |
|
|
hmac-sha2-512-etm |
|
Host/Public (Signature) Keys |
|
|
|
ssh-rsa |
|
|
rsa-sha2-256 |
|
|
rsa-sha2-512 |
|
|
ecdh-sha2-nistp521 |
|
|
ecdh-sha2-nistp384 |
|
|
ecdh-sha2-nistp256 |
Note: When using ECDSA keys, PKCC#8 (.pem) and PKCS#12 (.pfx) are supported. Putty key file formats are not, but are supported when using RSA or DSA keys.