- Newest
- Most votes
- Most comments
You might want to check which security policy is set for your AWS Transfer server: https://docs.aws.amazon.com/transfer/latest/userguide/security-policies.html
I don't know exactly what the Azure connector supports, but my guess would be that your earlier Transfer server had been deployed with an older policy by default, and your new deployment uses a newer, more restrictive policy version that the Azure side doesn't support. This would explain why your local test works; your local client would simply support more modern cryptographic mechanisms than the Azure connector does.
Even if the production Transfer server is using the same settings as your new test Transfer server, that doesn't guarantee that the Azure connector is configured the same way for your production environment as the other connector for the test environment.
Relevant content
- asked 4 months ago
- asked 6 hours ago
- asked 2 years ago
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated 3 years ago
Yes! I did compare sftp prod server and it has TransferSecurityPolicy-2018-11, and test sftp server deployed with default which is currently TransferSecurityPolicy-2024-01. I will define the SecurityPolicyName: 'TransferSecurityPolicy-2018-11' in cloudformation and redeploy to verify. Thanks