Propagating an EFT Site
For disaster recovery, some customers need to perform a unidirectional sync across settings from a live EFT site to another so that a backup system is available.
To propagate an EFT Site
- 
                                                            Internally, propagation is performed via target server’s REST Administrator interface, so target server must have Web-admin enabled for the feature to work. 
- 
                                                            The administrator must be at least a Site-level Administrator. 
- 
                                                            Administrator account must have Programmatic API Policy enabled. 
- 
                                                            The production and backup servers must have similar (or same) environments (file system structure, network neighborhood, and so on). 
- 
                                                            Both servers must use the same run-time variables to configure environment-specific parameters. 
- 
                                                            On the Server tab, right-click the Site node, then click Propagate. .  
- Target EFT Server administrative endpoint. URL:port such as https://192.168.118.128:4450. 
- Target EFT Server administrator username and password (EFT managed accounts only; there is no AD/LDAP support for administrator accounts in this dialog). 
- Shared folder to export the site to. The target server, receiving server, and the EFT Server service must each have an account that has read/write access to the shared folder. 
- Select the Save target... check box to save the propagation parameters for future reuse. If selected, after successful propagation, 
- All the parameters except for target server administration password are preserved across EFT administrator interface restart 
- Target server administration password is preserved during current EFT administrator interface session 
- If target server had no site with matching ID, the site is created. 
- If target server had the site with matching ID, it is replaced. 
                                                             
                                                        
The Propagate Site dialog box appears. Provide the target EFT Server details and a shared folder in which to export the Site, then click Propagate.
 
 The identity is provided by an internal site ID:
The following parts of the site are propagated:
Whole configuration database
- 
                                                            Except for node-specific parameters (“replace existing” scenario) - 
                                                                    Started/stopped status 
- 
                                                                    Listen IP 
- 
                                                                    DMZ gateway settings 
 
- 
                                                                    
- 
                                                            If the value of a filesystem-related parameter of source server site points to source server Configuration Directory (by default, C:\ProgramData\Globalscape\EFT Server\ for standalone deployment and HA cluster share for HA deployment), then the value of target server site points to the target server Configuration Directory - 
                                                                    The filesystem-related parameters are: - 
                                                                            Server SSL certificate and key 
- 
                                                                            DMZ Gateway SSL certificate 
- 
                                                                            DMZ internal SSL certificate and key 
- 
                                                                            SAML IdP certificate 
- 
                                                                            AS2 certificate and key 
- 
                                                                            AS2 Inbound/outbound partners’ certificates 
 
- 
                                                                            
 
- 
                                                                    
- 
                                                            For example, if a site of standalone-deployed source server is configured to use SSL certificate C:\ProgramData\Globalscape\EFT Server\Certificates\ssl.crt, then, after site propagation, the site of HA-deployed target server is configured to use SSL certificate <CLUSTER_SHARE>\Certificates\ssl.crt 
Site files
- 
                                                            Server SSL certificate and key 
- 
                                                            DMZ Gateway SSL certificate (only in “create new” scenario as it is a part of node-specific parameters which are preserved in “replace existing” scenario) 
- 
                                                            DMZ internal SSL certificate and key 
- 
                                                            SAML IdP certificate 
- 
                                                            AS2 certificate and key 
- 
                                                            AS2 Inbound/outbound partners’ certificates 
- 
                                                            Email templates 
- 
                                                            HTML templates 
- 
                                                            WTC customization files 
Files are propagated path-to-path, i.e., the file located at <PATH> at the source server is propagated to the <PATH> at the target server, except for the files located in Configuration Directory, HTML/email Template Directory, and WTC Customization Directory, which are propagated to the corresponding directory at the target server
- 
                                                            For “replace existing” scenario, the target server backs up and removes the entire existing WTC Customization Directory 
- 
                                                            For “replace existing” scenario, the target server backs up and removes all HTML/Email template files 
For any other file, if a corresponding file already exists at target server:
- 
                                                            For “create new” scenario, propagation fails (as it means that the file belongs to other site/service and it is unclear how to handle their propagation) 
- 
                                                            For “replace existing” scenario, EFT backs up the existing file and replaces it with up-to-date version from target server 
The following parts of site are not propagated:
- 
                                                            Admin ACLs 
- 
                                                            Site file system objects (physical files and folders) 
- 
                                                            Referenced external objects like Custom Command Executable, PowerShell Scripts, etc 
- 
                                                            SDConf.rec (RSA Securid config) 
For site propagation to succeed, the specified target server's administrator credentials should correspond to the Server-level (to create new site) or Site-level administrator target server administrator (to replace existing site) of target server.
- 
                                                            Site propagation fails if source or target server has SecretsModuleEncryptionKey Advanced Property defined 
- 
                                                            Source server records propagation progress to EFT.log via COMMON logger 
- 
                                                            Target server records propagation progress to EFT.log via COMMON logger 
- 
                                                            Target server registers propagation to ARM database as Admin Activity 
- 
                                                            Site.Created, for “create new” scenario 
- 
                                                            Site.Replaced, for “replace existing” scenario 
- 
                                                            Target server does not perform PCI audit when accepting site propagation 
- 
                                                            Site propagation is available via COM admin interface, ICISite::Propagate method 
- 
                                                            Site propagation is available via REST Admin interface; the request is POST to /Admin/v2/sites/<site-id> . The semantics of requests is RPC, and it is implemented based on JSON-RPC protocol (https://www.jsonrpc.org/specification) rather than in “standard” JSON:API model. The method name is “propagate.” 
Success Case Example:
                                                         
                                                    
Failure Case Example:
                                                        