Eclipse uses communication profiles to help you define how you want to send your system files to another party. You can define how the files are handled once they are transmitted, such as execute operations on a remote computer, show folder contents, and add or delete files. Based on your needs, Eclipse provides the following profile options.
Note: As of this release, only FTP protocols can be created.
For information about how to use these profiles, see Using Communication Profiles in this documentation.
Used for the transfer of computer or system files between a client and a server on a computer network, the standard FTP protocol is built on client-server architecture using separate control and data connections between the two. You can receive or transmit files, as needed. However, this method is not secured, meaning that the password for the server must be entered each time and that password is therefore transmitted over the internet, making it possible accessible to outside parties. Use the SFTP or FTPS to send information in a closed and secure fashion.
For more information, see Creating Standard FTP Profiles in this document.
Secure FTP runs over the SSH or secure shell protocol which support full security and authentication functionality. Eclipse provides the option to set all the necessary authentication details for SFTP at a site level so that your system administration team can monitor and update, if required, and end users will not have to manage those details.
For more information, see Creating SFTP Profiles in this document.
FTP Secure works over an SSL or secure socket layer protocol which also supports security and authentication functionality using a user ID, password, and authentication certificates. These certificates must be up to date and the system checks the viability of the certificates before allowing the transfer. The certificate is considered trusted if either the certificate was signed off by a known certificate authority (CA), like Verisign®, or if the certificate was self-signed by your partner and you have a copy of their public certificate in your trusted key store.
For more information, see Creating FTPS Profiles in this document.