How EFT Server Supports AS2

EFT Server Enterprise edition incorporates a Drummond-certified  AS2 adapter to support inbound and outbound AS2 transfers. Drummond certified means that EFT Server's AS2 module has achieved interoperability with other Drummond-certified AS2 servers and clients. (The AS2 component used in EFT Server is /n software's IP*Works EDI v8.3 Engine, in compliance with RFC4130.)

If you are transferring files using HTTP, the payload must be encrypted; if the payload is not encrypted, HTTPS must be used. This rule applies to both inbound and outbound transactions. Encrypting the payload and sending it over HTTPS provides additional protection from "man-in-the-middle" attacks.

EFT Server supports inbound Multiple Attachments (MA) for processing a single message with multiple payloads. MA messages are treated the same as normal messages with the exception that multiple files are processed.

EFT Server supports certificate-based authentication for outbound transactions. This means EFT Server will be logged in to the remote server and placed in the correct mailbox (folder), assuming you have provisioned your partner with your SSL certificate beforehand, and your partner has associated your certificate with a specific ”mailbox” on that server.

What EFT Server's AS2 module does not do

EFT Server does not support non-encrypted payloads over plaintext HTTP, asynchronous MDN deliveries via SMTP for outbound transactions (but does support inbound ones), EDI file content manipulation (translation, extraction, transformation, loading), or outbound Multiple Attachments (MA). EFT Server does not determine if the data sent or received is usable; it only transfers the data. The AS2 module is "push only"; that is, EFT Server does not request files.

EFT Server requires HTTP/S authentication for AS2 inbound transactions. Therefore, the connecting AS2 clients must enable HTTP/S authentication and provide login credentials (along with their certificate) to log in.

How EFT Server manages AS2 transmissions

In receiver mode (inbound), EFT Server examines the header, then determines whether to process it as a normal file transfer, as an MDN, or as an AS2 transmission. If the file is an AS2 transmission, EFT Server sends a receipt and an HTTP response.

In sender mode (outbound), EFT Server provides granular control over AS2 configuration, such as synchronous versus asynchronous receipts.

EFT Server sends e-mails and executes commands only after the final transaction status (Failure or Success) is known. The success or failure to receive the MDN is stored in the database and can be viewed in reports and AS2 Transactions node.

How EFT Server determines failed AS2 transmissions

AS2 transfers may have more than a simple success or failure outcome. For example, an outbound AS2 file transfer may succeed, but no MDN received from the remote host. This could be considered an outright failure in some cases. Another example of a failure is when a file is successfully sent, but the received MDN’s signature cannot be verified. Not all AS2 systems consider these partial failures an overall failure. For example, a remote host may accept an inbound file even though its signature was bad or had other issues, yet still accept the file.

EFT Server accepts most AS2 transmissions, even if there is a MIC (The message integrity check (MIC), also called the message digest, is the digest output of the hash algorithm used by the digital signature. The digital signature is computed over the MIC.) mismatch or the signature used to sign the payload was not found. However, the overall transaction is not considered a success unless every part of the transmission succeeds. That is, EFT Server's acceptance of the transmission does not mean that the transmission was successful.

EFT Server's implementation of AS2 considers the following transmissions permanent failures:

In each of these situations, the transmission is rejected automatically. An error is returned to the client, audited to the database, and can trigger an AS2 transaction failure event, if configured.

Redirecting AS2 transfers from HTTP to HTTPS

You can configure EFT Server to redirect HTTP connections to HTTPS. The redirect HTTP to HTTPS option affects incoming AS2 requests through HTTP. When you have configured redirection, EFT Server simply tells the connecting client that the resource was moved to the new HTTPS URL. The connecting client decides whether it will allow the redirect, because the new URL could be on different server. If the connecting AS2 client does not allow redirection to a different port, the connection will fail.

You can also configure EFT Server to accept AS2 transactions, but not allow HTTP and/or HTTPS transactions. To do this, simply turn off HTTP and/or HTTPS and turn on AS2. The HTTP engine will stay active and only process HTTPS requests that include the AS2 headers.