2021/05/25 - AWS Transfer Family - 5 new4 updated api methods
Changes AWS Transfer Family customers can now use AWS Managed Active Directory or AD Connector to authenticate their end users, enabling seamless migration of file transfer workflows that rely on AD authentication, without changing end users' credentials or needing a custom authorizer.
Allows you to update parameters for the access specified in the ServerID and ExternalID parameters.
See also: AWS API Documentation
Request Syntax
client.update_access( HomeDirectory='string', HomeDirectoryType='PATH'|'LOGICAL', HomeDirectoryMappings=[ { 'Entry': 'string', 'Target': 'string' }, ], Policy='string', PosixProfile={ 'Uid': 123, 'Gid': 123, 'SecondaryGids': [ 123, ] }, Role='string', ServerId='string', ExternalId='string' )
string
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory example is /directory_name/home/mydirectory.
string
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it LOGICAL, you must provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
list
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it will be displayed as is. You also must ensure that your AWS Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.
The following is an Entry and Target pair example.
[ { "Entry": "your-personal-report.pdf", "Target": "/bucket3/customized-reports/${transfer:UserName}.pdf" } ]
In most cases, you can use this value instead of the scope-down policy to lock down your user to the designated home directory (" chroot"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.
The following is an Entry and Target pair example for chroot.
[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
Required: No
(dict) --
Represents an object that contains entries and targets for HomeDirectoryMappings.
Entry (string) -- [REQUIRED]
Represents an entry and a target for HomeDirectoryMappings.
Target (string) -- [REQUIRED]
Represents the map target that is used in a HomeDirectorymapEntry.
string
A scope-down policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.
dict
The full POSIX identity, including user ID ( Uid), group ID ( Gid), and any secondary groups IDs ( SecondaryGids), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
Uid (integer) -- [REQUIRED]
The POSIX user ID used for all EFS operations by this user.
Gid (integer) -- [REQUIRED]
The POSIX group ID used for all EFS operations by this user.
SecondaryGids (list) --
The secondary POSIX group IDs used for all EFS operations by this user.
(integer) --
string
Specifies the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
string
[REQUIRED]
A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
string
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
dict
Response Syntax
{ 'ServerId': 'string', 'ExternalId': 'string' }
Response Structure
(dict) --
ServerId (string) --
The ID of the server that the user is attached to.
ExternalId (string) --
The external ID of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family.
Describes the access that is assigned to the specific file transfer protocol-enabled server, as identified by its ServerId property and its ExternalID.
The response from this call returns the properties of the access that is associated with the ServerId value that was specified.
See also: AWS API Documentation
Request Syntax
client.describe_access( ServerId='string', ExternalId='string' )
string
[REQUIRED]
A system-assigned unique identifier for a server that has this access assigned.
string
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
dict
Response Syntax
{ 'ServerId': 'string', 'Access': { 'HomeDirectory': 'string', 'HomeDirectoryMappings': [ { 'Entry': 'string', 'Target': 'string' }, ], 'HomeDirectoryType': 'PATH'|'LOGICAL', 'Policy': 'string', 'PosixProfile': { 'Uid': 123, 'Gid': 123, 'SecondaryGids': [ 123, ] }, 'Role': 'string', 'ExternalId': 'string' } }
Response Structure
(dict) --
ServerId (string) --
A system-assigned unique identifier for a server that has this access assigned.
Access (dict) --
The external ID of the server that the access is attached to.
HomeDirectory (string) --
Specifies the landing directory (or folder), which is the location that files are written to or read from in an Amazon S3 bucket, for the described access.
HomeDirectoryMappings (list) --
Specifies the logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to the associated access and how you want to make them visible. You must specify the " Entry" and " Target" pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or EFS path. If you only specify a target, it will be displayed as is. You also must ensure that your AWS Identity and Access Management (IAM) role provides access to paths in Target.
In most cases, you can use this value instead of the scope-down policy to lock down the associated access to the designated home directory (" chroot"). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.
(dict) --
Represents an object that contains entries and targets for HomeDirectoryMappings.
Entry (string) --
Represents an entry and a target for HomeDirectoryMappings.
Target (string) --
Represents the map target that is used in a HomeDirectorymapEntry.
HomeDirectoryType (string) --
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it to LOGICAL, you must provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
Policy (string) --
A scope-down policy for your user so that you can use the same AWS Identity and Access Management (IAM) role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.
PosixProfile (dict) --
The full POSIX identity, including user ID ( Uid), group ID ( Gid), and any secondary groups IDs ( SecondaryGids), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
Uid (integer) --
The POSIX user ID used for all EFS operations by this user.
Gid (integer) --
The POSIX group ID used for all EFS operations by this user.
SecondaryGids (list) --
The secondary POSIX group IDs used for all EFS operations by this user.
(integer) --
Role (string) --
The IAM role that controls access to your Amazon S3 bucket from the specified associated access. The policies attached to this role will determine the level of access that you want to provide the associated access when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows a server to access your resources when servicing transfer requests for the associated access.
ExternalId (string) --
A unique identifier that might be required when you assume a role in another account. Think of the ExternalID as a group membership mechanism that uses a unique identifier (often a SID, but could be a group name or something else) as a basis. If the administrator of the account to which the role belongs provided you with an external ID, then provide that value in the ExternalId parameter. A cross-account role is usually set up to trust everyone in an account. Therefore, the administrator of the trusting account might send an external ID to the administrator of the trusted account. That way, only someone with the ID can assume the role, rather than everyone in the account.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
Allows you to delete the access specified in the ServerID and ExternalID parameters.
See also: AWS API Documentation
Request Syntax
client.delete_access( ServerId='string', ExternalId='string' )
string
[REQUIRED]
A system-assigned unique identifier for a server that has this user assigned.
string
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
None
Used by administrators to choose which groups in the directory should have access to upload and download files over the enabled protocols using AWS Transfer Family. For example, a Microsoft Active Directory might contain 50,000 users, but only a small fraction might need the ability to transfer files to the server. An administrator can use CreateAccess to limit the access to the correct set of users who need this ability.
See also: AWS API Documentation
Request Syntax
client.create_access( HomeDirectory='string', HomeDirectoryType='PATH'|'LOGICAL', HomeDirectoryMappings=[ { 'Entry': 'string', 'Target': 'string' }, ], Policy='string', PosixProfile={ 'Uid': 123, 'Gid': 123, 'SecondaryGids': [ 123, ] }, Role='string', ServerId='string', ExternalId='string' )
string
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory example is /directory_name/home/mydirectory.
string
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it LOGICAL, you must provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
list
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it will be displayed as is. You also must ensure that your AWS Identity and Access Management (IAM) role provides access to paths in Target. This value can only be set when HomeDirectoryType is set to LOGICAL.
The following is an Entry and Target pair example.
[ { "Entry": "your-personal-report.pdf", "Target": "/bucket3/customized-reports/${transfer:UserName}.pdf" } ]
In most cases, you can use this value instead of the scope-down policy to lock down your user to the designated home directory (" chroot"). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.
The following is an Entry and Target pair example for chroot.
[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
Required: No
(dict) --
Represents an object that contains entries and targets for HomeDirectoryMappings.
Entry (string) -- [REQUIRED]
Represents an entry and a target for HomeDirectoryMappings.
Target (string) -- [REQUIRED]
Represents the map target that is used in a HomeDirectorymapEntry.
string
A scope-down policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName}, ${Transfer:HomeDirectory}, and ${Transfer:HomeBucket}.
dict
The full POSIX identity, including user ID ( Uid), group ID ( Gid), and any secondary groups IDs ( SecondaryGids), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
Uid (integer) -- [REQUIRED]
The POSIX user ID used for all EFS operations by this user.
Gid (integer) -- [REQUIRED]
The POSIX group ID used for all EFS operations by this user.
SecondaryGids (list) --
The secondary POSIX group IDs used for all EFS operations by this user.
(integer) --
string
[REQUIRED]
Specifies the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
string
[REQUIRED]
A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
string
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "YourGroupName*"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
dict
Response Syntax
{ 'ServerId': 'string', 'ExternalId': 'string' }
Response Structure
(dict) --
ServerId (string) --
The ID of the server that the user is attached to.
ExternalId (string) --
The external ID of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family.
Lists the details for all the accesses you have on your server.
See also: AWS API Documentation
Request Syntax
client.list_accesses( MaxResults=123, NextToken='string', ServerId='string' )
integer
Specifies the maximum number of access SIDs to return.
string
When you can get additional results from the ListAccesses call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional accesses.
string
[REQUIRED]
A system-assigned unique identifier for a server that has users assigned to it.
dict
Response Syntax
{ 'NextToken': 'string', 'ServerId': 'string', 'Accesses': [ { 'HomeDirectory': 'string', 'HomeDirectoryType': 'PATH'|'LOGICAL', 'Role': 'string', 'ExternalId': 'string' }, ] }
Response Structure
(dict) --
NextToken (string) --
When you can get additional results from the ListAccesses call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional accesses.
ServerId (string) --
A system-assigned unique identifier for a server that has users assigned to it.
Accesses (list) --
Returns the accesses and their properties for the ServerId value that you specify.
(dict) --
Lists the properties for one or more specified associated accesses.
HomeDirectory (string) --
Specifies the landing directory (or folder), which is the location that files are written to or read from in an Amazon S3 bucket, for the described access.
HomeDirectoryType (string) --
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH, the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it to LOGICAL, you must provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
Role (string) --
The AWS Identity and Access Management (IAM) role that controls access to your Amazon S3 bucket from the specified associated access. The policies attached to this role will determine the level of access that you want to provide the associated access when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows a server to access your resources when servicing transfer requests for the associated access.
ExternalId (string) --
A unique identifier that might be required when you assume a role in another account. Think of the ExternalID as a group membership mechanism that uses a unique identifier (often a SID, but could be a group name or something else) as a basis. If the administrator of the account to which the role belongs provided you with an external ID, then provide that value in the ExternalId parameter. A cross-account role is usually set up to trust everyone in an account. Therefore, the administrator of the trusting account might send an external ID to the administrator of the trusted account. That way, only someone with the ID can assume the role, rather than everyone in the account.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
{'IdentityProviderDetails': {'DirectoryId': 'string'}, 'IdentityProviderType': {'AWS_DIRECTORY_SERVICE'}}
Instantiates an auto-scaling virtual server based on the selected file transfer protocol in AWS. When you make updates to your file transfer protocol-enabled server or when you work with users, use the service-generated ServerId property that is assigned to the newly created server.
See also: AWS API Documentation
Request Syntax
client.create_server( Certificate='string', Domain='S3'|'EFS', EndpointDetails={ 'AddressAllocationIds': [ 'string', ], 'SubnetIds': [ 'string', ], 'VpcEndpointId': 'string', 'VpcId': 'string', 'SecurityGroupIds': [ 'string', ] }, EndpointType='PUBLIC'|'VPC'|'VPC_ENDPOINT', HostKey='string', IdentityProviderDetails={ 'Url': 'string', 'InvocationRole': 'string', 'DirectoryId': 'string' }, IdentityProviderType='SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE', LoggingRole='string', Protocols=[ 'SFTP'|'FTP'|'FTPS', ], SecurityPolicyName='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] )
string
The Amazon Resource Name (ARN) of the AWS Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS.
To request a new public certificate, see Request a public certificate in the AWS Certificate Manager User Guide.
To import an existing certificate into ACM, see Importing certificates into ACM in the AWS Certificate Manager User Guide.
To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the AWS Certificate Manager User Guide.
Certificates with the following cryptographic algorithms and key sizes are supported:
2048-bit RSA (RSA_2048)
4096-bit RSA (RSA_4096)
Elliptic Prime Curve 256 bit (EC_prime256v1)
Elliptic Prime Curve 384 bit (EC_secp384r1)
Elliptic Prime Curve 521 bit (EC_secp521r1)
string
The domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
dict
The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make it accessible only to resources within your VPC, or you can attach Elastic IP addresses and make it accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
AddressAllocationIds (list) --
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
(string) --
SubnetIds (list) --
A list of subnet IDs that are required to host your server endpoint in your VPC.
(string) --
VpcEndpointId (string) --
The ID of the VPC endpoint.
VpcId (string) --
The VPC ID of the VPC in which a server's endpoint will be hosted.
SecurityGroupIds (list) --
A list of security groups IDs that are available to attach to your server's endpoint.
(string) --
string
The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.
string
The RSA private key as generated by the ssh-keygen -N "" -m PEM -f my-new-server-key command.
For more information, see Change the host key for your SFTP-enabled server in the AWS Transfer Family User Guide.
dict
Required when IdentityProviderType is set to AWS_DIRECTORY_SERVICE or API_GATEWAY. Accepts an array containing all of the information required to use a directory in AWS_DIRECTORY_SERVICE or invoke a customer-supplied authentication API, including the API Gateway URL. Not required when IdentityProviderType is set to SERVICE_MANAGED.
Url (string) --
Provides the location of the service endpoint used to authenticate users.
InvocationRole (string) --
Provides the type of InvocationRole used to authenticate the user account.
DirectoryId (string) --
The identifier of the AWS Directory Service directory that you want to stop sharing.
string
Specifies the mode of authentication for a server. The default value is SERVICE_MANAGED, which allows you to store and access user credentials within the AWS Transfer Family service. Use AWS_DIRECTORY_SERVICE to provide access to Active Directory groups in AWS Managed Active Directory or Microsoft Active Directory in your on-premises environment or in AWS using AD Connectors. This option also requires you to provide a Directory ID using the IdentityProviderDetails parameter. Use the API_GATEWAY value to integrate with an identity provider of your choosing. The API_GATEWAY setting requires you to provide an API Gateway endpoint URL to call for authentication using the IdentityProviderDetails parameter.
string
Allows the service to write your users' activity to your Amazon CloudWatch logs for monitoring and auditing purposes.
list
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH
FTPS (File Transfer Protocol Secure): File transfer with TLS encryption
FTP (File Transfer Protocol): Unencrypted file transfer
(string) --
string
Specifies the name of the security policy that is attached to the server.
list
Key-value pairs that can be used to group and search for servers.
(dict) --
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
Key (string) -- [REQUIRED]
The name assigned to the tag that you create.
Value (string) -- [REQUIRED]
Contains one or more values that you assigned to the key name you create.
dict
Response Syntax
{ 'ServerId': 'string' }
Response Structure
(dict) --
ServerId (string) --
The service-assigned ID of the server that is created.
{'Server': {'IdentityProviderDetails': {'DirectoryId': 'string'}, 'IdentityProviderType': {'AWS_DIRECTORY_SERVICE'}}}
Describes a file transfer protocol-enabled server that you specify by passing the ServerId parameter.
The response contains a description of a server's properties. When you set EndpointType to VPC, the response will contain the EndpointDetails.
See also: AWS API Documentation
Request Syntax
client.describe_server( ServerId='string' )
string
[REQUIRED]
A system-assigned unique identifier for a server.
dict
Response Syntax
{ 'Server': { 'Arn': 'string', 'Certificate': 'string', 'Domain': 'S3'|'EFS', 'EndpointDetails': { 'AddressAllocationIds': [ 'string', ], 'SubnetIds': [ 'string', ], 'VpcEndpointId': 'string', 'VpcId': 'string', 'SecurityGroupIds': [ 'string', ] }, 'EndpointType': 'PUBLIC'|'VPC'|'VPC_ENDPOINT', 'HostKeyFingerprint': 'string', 'IdentityProviderDetails': { 'Url': 'string', 'InvocationRole': 'string', 'DirectoryId': 'string' }, 'IdentityProviderType': 'SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE', 'LoggingRole': 'string', 'Protocols': [ 'SFTP'|'FTP'|'FTPS', ], 'SecurityPolicyName': 'string', 'ServerId': 'string', 'State': 'OFFLINE'|'ONLINE'|'STARTING'|'STOPPING'|'START_FAILED'|'STOP_FAILED', 'Tags': [ { 'Key': 'string', 'Value': 'string' }, ], 'UserCount': 123 } }
Response Structure
(dict) --
Server (dict) --
An array containing the properties of a server with the ServerID you specified.
Arn (string) --
Specifies the unique Amazon Resource Name (ARN) of the server.
Certificate (string) --
Specifies the ARN of the AWS Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS.
Domain (string) --
Specifies the domain of the storage system that is used for file transfers.
EndpointDetails (dict) --
Specifies the virtual private cloud (VPC) endpoint settings that you configured for your server.
AddressAllocationIds (list) --
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
(string) --
SubnetIds (list) --
A list of subnet IDs that are required to host your server endpoint in your VPC.
(string) --
VpcEndpointId (string) --
The ID of the VPC endpoint.
VpcId (string) --
The VPC ID of the VPC in which a server's endpoint will be hosted.
SecurityGroupIds (list) --
A list of security groups IDs that are available to attach to your server's endpoint.
(string) --
EndpointType (string) --
Defines the type of endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
HostKeyFingerprint (string) --
Specifies the Base64-encoded SHA256 fingerprint of the server's host key. This value is equivalent to the output of the ssh-keygen -l -f my-new-server-key command.
IdentityProviderDetails (dict) --
Specifies information to call a customer-supplied authentication API. This field is not populated when the IdentityProviderType of a server is AWS_DIRECTORY_SERVICE or SERVICE_MANAGED.
Url (string) --
Provides the location of the service endpoint used to authenticate users.
InvocationRole (string) --
Provides the type of InvocationRole used to authenticate the user account.
DirectoryId (string) --
The identifier of the AWS Directory Service directory that you want to stop sharing.
IdentityProviderType (string) --
Specifies the mode of authentication method enabled for this service. A value of AWS_DIRECTORY_SERVICE means that you are providing access to Active Directory groups in AWS Managed Active Directory or Microsoft Active Directory in your on-premises environment or in AWS using AD Connectors. A value of SERVICE_MANAGED means that you are using this server to store and access user credentials within the service. A value of API_GATEWAY indicates that you have integrated an API Gateway endpoint that will be invoked for authenticating your user into the service.
LoggingRole (string) --
Specifies the AWS Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.
Protocols (list) --
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
SFTP (Secure Shell (SSH) File Transfer Protocol): File transfer over SSH
FTPS (File Transfer Protocol Secure): File transfer with TLS encryption
FTP (File Transfer Protocol): Unencrypted file transfer
(string) --
SecurityPolicyName (string) --
Specifies the name of the security policy that is attached to the server.
ServerId (string) --
Specifies the unique system-assigned identifier for a server that you instantiate.
State (string) --
Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.
The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.
Tags (list) --
Specifies the key-value pairs that you can use to search for and group servers that were assigned to the server that was described.
(dict) --
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
Key (string) --
The name assigned to the tag that you create.
Value (string) --
Contains one or more values that you assigned to the key name you create.
UserCount (integer) --
Specifies the number of users that are assigned to a server you specified with the ServerId.
{'Servers': {'IdentityProviderType': {'AWS_DIRECTORY_SERVICE'}}}
Lists the file transfer protocol-enabled servers that are associated with your AWS account.
See also: AWS API Documentation
Request Syntax
client.list_servers( MaxResults=123, NextToken='string' )
integer
Specifies the number of servers to return as a response to the ListServers query.
string
When additional results are obtained from the ListServers command, a NextToken parameter is returned in the output. You can then pass the NextToken parameter in a subsequent command to continue listing additional servers.
dict
Response Syntax
{ 'NextToken': 'string', 'Servers': [ { 'Arn': 'string', 'Domain': 'S3'|'EFS', 'IdentityProviderType': 'SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE', 'EndpointType': 'PUBLIC'|'VPC'|'VPC_ENDPOINT', 'LoggingRole': 'string', 'ServerId': 'string', 'State': 'OFFLINE'|'ONLINE'|'STARTING'|'STOPPING'|'START_FAILED'|'STOP_FAILED', 'UserCount': 123 }, ] }
Response Structure
(dict) --
NextToken (string) --
When you can get additional results from the ListServers operation, a NextToken parameter is returned in the output. In a following command, you can pass in the NextToken parameter to continue listing additional servers.
Servers (list) --
An array of servers that were listed.
(dict) --
Returns properties of a file transfer protocol-enabled server that was specified.
Arn (string) --
Specifies the unique Amazon Resource Name (ARN) for a server to be listed.
Domain (string) --
Specifies the domain of the storage system that is used for file transfers.
IdentityProviderType (string) --
Specifies the authentication method used to validate a user for a server that was specified. This can include Secure Shell (SSH), Active Directory groups, user name and password combinations, or your own custom authentication method.
EndpointType (string) --
Specifies the type of VPC endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
LoggingRole (string) --
Specifies the AWS Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging.
ServerId (string) --
Specifies the unique system assigned identifier for the servers that were listed.
State (string) --
Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.
The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.
UserCount (integer) --
Specifies the number of users that are assigned to a server you specified with the ServerId.
{'IdentityProviderDetails': {'DirectoryId': 'string'}}
Updates the file transfer protocol-enabled server's properties after that server has been created.
The UpdateServer call returns the ServerId of the server you updated.
See also: AWS API Documentation
Request Syntax
client.update_server( Certificate='string', EndpointDetails={ 'AddressAllocationIds': [ 'string', ], 'SubnetIds': [ 'string', ], 'VpcEndpointId': 'string', 'VpcId': 'string', 'SecurityGroupIds': [ 'string', ] }, EndpointType='PUBLIC'|'VPC'|'VPC_ENDPOINT', HostKey='string', IdentityProviderDetails={ 'Url': 'string', 'InvocationRole': 'string', 'DirectoryId': 'string' }, LoggingRole='string', Protocols=[ 'SFTP'|'FTP'|'FTPS', ], SecurityPolicyName='string', ServerId='string' )
string
The Amazon Resource Name (ARN) of the AWS Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS.
To request a new public certificate, see Request a public certificate in the AWS Certificate Manager User Guide.
To import an existing certificate into ACM, see Importing certificates into ACM in the AWS Certificate Manager User Guide.
To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the AWS Certificate Manager User Guide.
Certificates with the following cryptographic algorithms and key sizes are supported:
2048-bit RSA (RSA_2048)
4096-bit RSA (RSA_4096)
Elliptic Prime Curve 256 bit (EC_prime256v1)
Elliptic Prime Curve 384 bit (EC_secp384r1)
Elliptic Prime Curve 521 bit (EC_secp521r1)
dict
The virtual private cloud (VPC) endpoint settings that are configured for your server. With a VPC endpoint, you can restrict access to your server to resources only within your VPC. To control incoming internet traffic, you will need to associate one or more Elastic IP addresses with your server's endpoint.
AddressAllocationIds (list) --
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
(string) --
SubnetIds (list) --
A list of subnet IDs that are required to host your server endpoint in your VPC.
(string) --
VpcEndpointId (string) --
The ID of the VPC endpoint.
VpcId (string) --
The VPC ID of the VPC in which a server's endpoint will be hosted.
SecurityGroupIds (list) --
A list of security groups IDs that are available to attach to your server's endpoint.
(string) --
string
The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.
string
The RSA private key as generated by ssh-keygen -N "" -m PEM -f my-new-server-key.
For more information, see Change the host key for your SFTP-enabled server in the AWS Transfer Family User Guide.
dict
An array containing all of the information required to call a customer's authentication API method.
Url (string) --
Provides the location of the service endpoint used to authenticate users.
InvocationRole (string) --
Provides the type of InvocationRole used to authenticate the user account.
DirectoryId (string) --
The identifier of the AWS Directory Service directory that you want to stop sharing.
string
Changes the AWS Identity and Access Management (IAM) role that allows Amazon S3 or Amazon EFS events to be logged in Amazon CloudWatch, turning logging on or off.
list
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
Secure Shell (SSH) File Transfer Protocol (SFTP): File transfer over SSH
File Transfer Protocol Secure (FTPS): File transfer with TLS encryption
File Transfer Protocol (FTP): Unencrypted file transfer
(string) --
string
Specifies the name of the security policy that is attached to the server.
string
[REQUIRED]
A system-assigned unique identifier for a server instance that the user account is assigned to.
dict
Response Syntax
{ 'ServerId': 'string' }
Response Structure
(dict) --
ServerId (string) --
A system-assigned unique identifier for a server that the user account is assigned to.