Job Management Partner 1/Remote Control Description and Operator's Guide

[Contents][Glossary][Index][Back][Next]

4.3.3 File transfer security

Two types of security are available for file transfer.

Organization of this subsection
(1) Data encryption
(2) Setting file access permissions

(1) Data encryption

Data transferred "as is" across the network can be accessed by other people. You can encrypt the data to protect the contents of files transferred between the controller and the agent from unauthorized access.

To encrypt data contained in files to be transferred, specify appropriate settings in the Transfer Options dialog box or Properties dialog box on the controller. When the controller is configured for file transfer encryption, a lock is added to the controller and agent icons.

Figure 4-26 Icons displayed when the data encryption function is specified for transferring files

[Figure]

For further information on the encryption settings, see 3.3.6 File Transfer page or 4.3.9(2) Transfer page.

(2) Setting file access permissions

If the controller is assigned file transfer permission, the controller is granted the same access as agent users. Therefore, illegal access from the controller is possible. You can set file access permissions on the agent.

There are two file access permission types: Read and Write. Operations that can be performed on files vary depending on the access permissions assigned to the files. For example, if a file is only assigned Read permission, an attempt to send the file to the agent will result in the output of an error message.

You can set file access permissions when setting up the agent or making settings in the Remote Control Agent - Properties dialog box. For further information on the configuration method, see 3.4.6 File transmission settings.