Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Learn about enabling FTP access to Couchdrop
Unlike SFTP, FTP is disabled by default in Couchdrop. This is because FTP is comparitively buggy and insecure and so we do not recommend using it where there are other options.
To enable FTPs access, you must be an administrator or the owner in Couchdrop.
Login to Couchdrop's web app
Click SFTP Server
Click FTP Connectivity
Click Enable FTP
This setting will activate immediately.
SFTP and FTP
Learn about using Couchdrop as an SFTP and FTP server for the Cloud
Transfer Automations
Learn about automating file transfers between platforms with Couchdrop
Inboxes and Mailboxes
Learn about secure file inboxes with Couchdrop. An easy way to collect files
Connect Couchdrop to SharePoint
Learn how to connect Couchdrop to Sharepoint online
Add a user to Couchdrop
Learn how to add a user for SFTP or FTP in Couchdrop. It's simple, get started now.
Connect to Couchdrop with SFTP or FTP
Learn how to connect to Couchdrop with various clients
Learn about using Couchdrop as an SFTP server.
The primary use case for Couchdrop is as a SFTP server. It's easy to setup, fast, autoscaling and works with your cloud storage.
What is SFTP you might ask?
SFTP is currently the most robust and well supported protocol for backend and automated file transfers over the internet. File transfers have been a part of the internet since it was first invented and file transfers are amongst the most frequent operations on the internet today.
The successor to FTP
If you have not heard of FTP, you might have been living in a cave. A pretty big cave. Go back inside, you're probably lost.
SFTP is the successor to FTP and is simpler, faster and more robust than the traditional FTP protocol. FTP was a great solution for how the internet used to work, before NAT and private ip addresses. Before firewalls and hackers. The modern internet has changed a bit and FTP has not stood the test of time.
SFTP fixes a lot of the underlying issues with FTP and adds asymmetric encryption (the magic behind HTTPS) to the mix, which means along with it being incredibly robust and simple in design, it's also extremely secure.
Both FTP and SFTP are well supported
As protocols, both SFTP and FTP are very well supported by systems, which make them ideal for transferring data in an automated way between disparate systems. SFTP is used across the board to transfer anything from banking transactions to power grid logs and everything in between.
Not a file sharing tool
It's worth noting at this point, that SFTP is not a file sharing or collaboration tool.
It could be used in that way, but it's really not well suited to it. Dropbox, Box, SharePoint and Google Drive are just better for this use case. Where SFTP and FTP really shine is when there are robots (computers) talking to each other. You can think of it like a pipe rather than a piece of paper.
SFTP sits in the backend and works its magic, away from the eyes of most.
Neat huh.
SFTP is not Secure File Transfers. It is SFTP.
So, you might ask, where does Couchdrop fit in. Well remember ^above how I mentioned that Dropbox, Google Drive and SharePoint are not SFTP servers. Well, sometimes you need them to be. And sometimes, you want to standup a SFTP or FTP server, without the "Server Part". This is where Couchdrop shines.
It's an SFTP server for SharePoint, without the server part.
Couchdrop is your scalable SFTP server in the cloud, allowing direct connection of your own storage (or ours) with no need to deploy and manage infrastructure.
When you first register for Couchdrop, SFTP based access is enabled by default. You have a SFTP server and you didn't have to raise a finger.
Learn how to create a new transfer automation
Creating a new transfer automation is a simple process. It can be done in a few steps from the Couchdrop Web App, by administrators and authorised users.
To get started, you will most likely need the following:
A folder, or connection details to a remote server or cloud storage provider that you want to poll for new files or changes
A destination folder
Details regarding required actions
Follow the steps below to create a new automation:
Login to the Couchdrop Web App
Click Transfer Automations and then Create New Transfer
Choose a name for your new automation. This is to make management easier.
Choose a source and select a file or folder for Couchdrop to poll
Choose matching conditions
Choose required actions
Configure notifications
Configure scheduling. Scheduling is optional and automations can be triggered on-demand through web hooks or manually from the Couchdrop Web App.
Your automation should now be configured.
Learn about Storage with Couchdrop SFTP
Traditional SFTP and FTP servers use local storage and most cloud hosted SFTP servers provide some level of storage. Couchdrop is a bit different in this regard. Rather than including storage that is on disk, Couchdrop connects to your storage platform.
We support over 30 different cloud storage engines, including:
Dropbox
SharePoint
Google Drive
Amazon S3
Backblaze B2
Wasabi
Azure Files
External SFTP and FTP servers
Microsoft Windows File Servers
This means that you can bring your own storage to Couchdrop and use SFTP on top of your existing collection of folders and documents.
We do offer storage, but we are using Amazon S3 buckets to store that data. Meaning that you benefit from the amazing reliability and security of Amazon S3 without having to worry about the config.
Learn about connecting Cloud Storage:
Learn about allowed users for SFTP and FTP
Accessing Couchdrop via SFTP or FTP requires a user account. We do not recommend using your owner account as they have elevated permissions to Couchdrop and generally SFTP users are shared with external systems and providers.
You can see who has access directly in the Couchdrop SFTP section from the web app.
Access to SFTP and FTP is granted on a user level and on a group level. Account administrators and owners can manage these settings from Couchdrop Administration section.
To manage, open a user or group and click the Access Controls tab.
Learn about supported Actions with Transfer Automations in Couchdrop
Couchdrop supports several key actions when configuring and managing automations. These actions modify or move files that are being processed by Couchdrop.
Actions can be nestled in Automations, which means one action depends on the success and output of the previous action. This is a unique feature of Couchdrop and allows for very complex scenarios.
If a sub-action fails, then Couchdrop will not continue to process any child actions
The following actions are available in Couchdrop
Actions support variable use for directory and file locations
Connect To SharePoint
Learn how to connect Couchdrop directly to SharePoint
Connect to Amazon S3
Learn how to connect Couchdrop to Amazon S3
Learn about Storage Connectors
Get the nuts and bolts covered with Storage in Couchdrop
Users and Groups
Learn more about users and groups in Couchdrop
RSA and DSA Keys
Learn about configuring key based access to Couchdrop SFTP
Adding a User
Learn how to add users to Couchdrop
Send Web-hook
Fire a HTTP web-hook with metadata regarding the file object to the specified URL endpoint
Rename file
Rename the file without copying the file to a new location
Move file
Copy the file to a new location and delete the file from the source location
Transfer/copy
Copy the file to a new location, retaining the original file in the source
Delete file
Delete the file
Compress File
Create a compressed archive of the file
Decompress File
Uncompress the file
PGP Encrypt
Encrypt and sign a file with a PGP key
PGP Decrypt
Decrypt and verify a file encrypted and signed with PGP
AES Encrypt
Encrypt a file with AES
AES Decrypt
Decrypt a file encrypted with AES
Create Empty File
Create a new empty marker file in a location spe
Learn about shared links in Couchdrop
Shared links are a simple feature in Couchdrop to facilitate link-based sharing of files and folders. They are relatively simple in nature and are not designed as a replacement for more comprehensive sharing facilities available in some of the cloud platforms on the market.
To use shared links, you can simply create one from the Couchdrop App under Browse Files.
From the dropdown menu on a folder or file, click Create Shared Link
Couchdrop will then create a new shared link, with a unique url
You can customise the shared link, with a Password or by making it a One Time Use link
To access the shared link, copy the link provided in the Couchdrop App.
Learn about the reporting Couchdrop provides around transfer automations
Troubleshooting transfer automations is done through the Couchdrop Web App. Most failures or issues come down to configuration or connectivity issues. To make things easy, we provide verbose logging around each.
Learn the steps to create a simple web upload inbox with Couchdrop
Web upload inboxes are the most popular type of inboxes in Couchdrop. Inboxes can be created by any user and can be mapped directly to a folder or cloud storage platform, either existing or new.
It's a simple process and at the end of it, you will have an upload link that can be shared with external parties in a secure way.
To setup an inbox, generally you will need the following:
Access to Couchdrop, with the appropriate user rights. Talk to your admin to get these.
A folder or details for a cloud storage drive and rights to manage it
To create the inbox, follow the steps below:
Login to Couchdrop and click Inboxes
Click Create New Inbox. If you don't see this option, talk to your administrator.
Provide a name for the inbox. This is simply so you can identify it.
Select a location for files to arrive. This is the place where user delivered files will be located. You can choose an existing folder, or configure a new cloud storage connection here. Once you are done, click Save and Continue.
Enable the Web Inbox for uploads by toggling the Enabled checkbox
If you want to collect metadata with the uploads, you can configure this at this step.
Click Save and Continue and skip over the Email Inbox step
Choose an expiry. This is an optional step.
Now you will see your newly created Inbox. Copy the web url field by clicking Web Link and test it.
Learn about transfer automations in Couchdrop
Transfer automations are a key feature in Couchdrop. At a simple level, Transfer Automations automate the exchange of data in backend systems.
Transfer Automations in Couchdrop are sometimes referred to as MFT in other, more old school systems
Automations allow you to push, pull, or modify files automatically based on activation triggers or on a set schedule with robust set and forget configurations.
Automations can work with any one of the supported Couchdrop storage connections, including external SFTP, FTP, Windows file servers and over 30 different cloud storage platforms including SharePoint and Amazon S3.
Automations support not only transferring files, but also the automatic encryption/decryption, renaming, duplication and more.
Learn about host key authentication
Couchdrop provides a public host key that can be used to verify the authenticity of the endpoint you are connecting to. This key is static and we do not expect it to change in the future.
The host key for all Couchdrop endpoints
Learn about file actions in Couchdrop
File actions are traditional automations. While Transfer Automationswill poll for files and transfer them on a set cadence, File Actions bind to an existing event inside Couchdrop.
For example: User x uploads a file via SFTP to Couchdrop.
A file action can be configured to perform a certain action after another action occurs. You can have as many file actions as you like and they reuse a lot of the existing functionality from Transfer Automations.
Learn about variable use in Transfer Automations
Variables are used in Couchdrop to support custom filename and path creation in automations. Whenever setting a location or path in an automation, you can use variables to generate an appropriate path.
The following variables are available for automations
{USER}
michael.lawson
The user who was uploading the file
{EXISTING_NAME}
test.txt
The current filename
{YYYY}
2023
The current timestamp year
{YY}
23
The current timestamp year in shortform
{MMM}
AUG
The month in a human readable format
{MM}
03
The month in a numerical format
{DD}
02
The day of the month
{TIME_HH}
23
Hour in 24 hour time
{TIME_MM}
30
Minutes of the hour
{TIMESTAMP}
1711330141
Unix timestamp. Number of seconds since Jan 1st 1970.
{EVENT.additional_info.required_fields.<FIELD_NAME>}
Substitute <field_name> with the name of the Web Inbox required field to access data provided on upload.
Learn how to connect to Couchdrop with SFTP or FTP
Connecting to Couchdrop with a SFTP or FTP client is simple. To get started, you will need:
A username and password or
A username and key
The hostname for your Couchdrop POP. This can be found by clicking Connect
A SFTP or FTP client
Couchdrop uses the default ports for both SFTP and FTP.
Your hostname will look like <my domain>.couchdrop.io and can be found under Connect in the Couchdrop web app.
SFTP
22
The standard port for SFTP, SCP and Rsync.
FTP
20
The standard port for FTP and FTPs via TLS
SCP
22
The standard port for SCP traffic
SFTP is beautifully simple in terms of configuration options. There are normally only two.
Hostname
<yourdomain>.couchdrop.io
Couchdrop provides a domain name for each tenant. You can find this under Connect in the Couchdrop web app
Port
22
The standard port for SFTP and SCP
FTP has a few options around networking and security. Couchdrop attempts to support as many clients as feasible, but these are the recommendations.
TLS auto negotiation
ON
FTP by default is insecure. It is unencrypted and very easy to break. FTPs use an auto negotiation process that occurs during authentication that uses encrypted channels. We recommended always enabling this option.
Port
20
Couchdrop uses the default port for FTP access
Passive Mode
ON
Passive FTP mode forces the client to negotiate data channels with the server. This alleviates most of the issues with NAT and firewalls that do not support active channel negotiation.
Hostname
<yourdomain>.couchdrop.io
Couchdrop provides a domain name for each tenant. You can find this under Connect in the Couchdrop web app
Mail inboxes are a very useful feature of Couchdrop. Mail Inboxes can be created by any user and can be mapped directly to a folder or cloud storage platform, either existing or new.It's a simple process and at the end of it, you will have a unique email address that can be shared with clients or partners. When an email is sent to the email address in question, any included attachments will be uploaded to the folder specified in the inbox.
To setup an inbox, generally you will need the following:
Access to Couchdrop, with the appropriate user rights. Talk to your admin to get these.
A folder or details for a cloud storage drive and rights to manage it
A list of email addresses that Couchdrop should allow uploads from
To create the inbox, follow the steps below:
Login to Couchdrop and click Inboxes
Click Create New Inbox. If you don't see this option, talk to your administrator.
Provide a name for the inbox. This is simply so you can identify it.
Select a location for files to arrive. This is the place where user delivered files will be located. You can choose an existing folder, or configure a new cloud storage connection here. Once you are done, click Save and Continue.
Skip the the Web Inbox step and Enable the mailbox for uploads, by toggling the Enabled checkbox
Configure the allowed senders. Wildcards are supported and you can include as many addresses as you like by using a comma.
Click Save and Continue
Choose an expiry. This is an optional step.
Now you will see your newly created Inbox. Copy the email address by clicking Email.
Couchdrop has a very simple role structure. When thinking about users in Couchdrop, there are Internal Users and External Users.
Internal Users are users within your organisation. Typically, they are management users with permission to configure and manage file transfers and can create/manage External Users.
Internal users are managed from the Administration --> Users section of the Couchdrop interface. Internal users can only be managed by users who have the Owner or Administrator role
External Users are users that are sending and/or receiving files to/from your organisation. These accounts are normally very limited in scope and are often headless.
External users can be managed under Users in the main navigation if you are an Owner, Administrator, or Manager, as well as from the Administration --> Users page.
Couchdrop has four different types of user accounts.
Owner
Internal
The account owner. Owner accounts have access to all functionality and settings, including billing and advanced security settings.
There can only be one Owner per Couchdrop account.
Administrator
Internal
Administrators have access to the Administration section of Couchdrop, but are still restricted in terms of what data they can access.
Managers (In BETA)
Internal
Managers in Couchdrop cannot access the Administration section, but they can create and manage Standard Users.
Standard Users
External
Standard Users have no access to Administration functionality and can only access the features and functionality that have been granted to them by an Administrator or Manager.
When creating a user, you must specify a role. This role can be adjusted at any time.
Feature access can be managed at multiple levels.
Globally
Administration -> Security Settings
Update default access to features for all Managers and Standard Users across the Couchdrop account.
Group Level
Administration -> Groups
Features can be enabled for all members of a specified group.
User Level
Administration -> Users
Features can be enabled for an individual Standard User or Manager.
Create an AS2 Station to receive files from your trading partners using the AS2 protocol and map them directly to a folder or cloud storage platform. Once created, every station will have a unique URL where your partners can send you files.
To set up an AS2 Station, generally, you will need the following:
Access to Couchdrop, with the appropriate user rights. Talk to your admin to get these.
A folder or details for a cloud storage drive and rights to manage it.
Information from the partners you wish to receive files such as their AS2 ID and the signing certificate to validate the signature of the incoming files.
AS2 ID
Required
Signing Certificate
Required
To create the AS2 Station, follow the steps below:
Login to Couchdrop and click AS2 Stations
Click Create New AS2 Station. If you don't see this option, talk to your administrator.
Provide a name for the AS2 Station. This is simply so you can identify it.
Provide the AS2 ID for your station. You will need to share this ID with your trading partners.
Add your private key and public certificate for file decryption and MDN (Message disposition notification) signing. You can choose to use the same key pair for decryption and signing or use a different pair for each.
Select a location for files to arrive. This is the place where files sent by your AS2 trading partners will be located. You can choose an existing folder, or configure a new cloud storage connection here. Once you are done, click Save and Continue.
Add your AS2 trading partner
Click Create New AS2 Trading Partner.
Provide a name for your AS2 partner
Add the partner's AS2 ID provided by them.
Add the partner's signing certificate provided by them.
Once you are done, click Save and Back.
Now you will see your recently added trading partner in the AS2 Trading Partners table, you could add more trading partners by repeating the steps described above. When done, click Save and Continue.
Optionally, you can set alerts to receive email notifications for successful and/or failed file transactions for this AS2 Station. Click Save and Continue
Now you will see your newly created AS2 Station. For the file transmission to be successful you will need to share the following information with your AS2 trading partners:
Station AS2 ID
Station URL
Certificate file for signing
Certificate file for encryption
As an option, you can use the Share Instructions action to send this information.
Learn how to create and add users to Couchdrop
Creating users in Couchdrop is a simple process and can be done a couple of different ways.
Jump to our video guide on how to create users manually
To add a user to Couchdrop manually:
Login to Couchdrop
Navigate to Administration --> Users
Click Create New User
From here, you will need to provide details for their account:
Pick a username, this needs to be unique across Couchdrop
Supply an email address. This is optional but is important if you expect the user to be used for more than just SFTP and FTP access
Set a password.
Choose the user's role
The final step is choosing the user's root directly. Information on what is a root directory can be found The Root Directory.
Users can be invited via email to Couchdrop. When invited, users will be provided with a password and basic settings.
To invite users to Couchdrop:
Login to Couchdrop
Navigate to Administration --> Users
Click the ... menu button and choose Invite User
Learn about authentication in Couchdrop
Authentication in Couchdrop comes in two flavours. Password based authentication, and for SFTP and SCP, RSA based authentication. Couchdrop has extensive support for both, and users can self manage keys and passwords if granted access to the Couchdrop Web App.
Password only authentication is the default setting for Couchdrop. When a user is first configured, they will need to provide a secure password that is used to login to both the web app and the SFTP and SCP server.
Passwords can be managed and changed by an administrator and the user themselves.
All users, regardless of key settings, need a password to be configured.
Couchdrop supports standard key based authentication for SFTP and SCP. Key based authentication requires a private key and a public key. The public key is shared with Couchdrop and the private key remains a secret.
Keys can be re-used across multiple users and are configurable under Administration --> Users --> RSA Public Keys
We support the following key types.
Creating a new key is not something that we facilitate inside Couchdrop. This is to ensure that Couchdrop is never the holder (even by accident) of SSH private keys. Not to worry, creating a key pair is simple.
On a Mac, Linux Box or any other Unix Server:
From a console:
This will generate two files.
abc
abc.pub
The abc.pub file is what we need.
Open the file and copy it to Couchdrop: The file will look something like this:
Never share your private key. It's safe to share the public key, but not the private key.
Arguably the easiest step in the process.
Login to Couchdrop
Navigate to the user Administration --> Users --> User --> RSA Public Keys
Paste the public key into the field and click add.
You can add as many keys to a user account as you like. We don't judge.
For additional security, some clients support requiring both a key and a password for successful authentication. Couchdrop supports this out of the box and this can be enforced by toggling the option: Require Password and Public Key
RSA
The most common key type - by far. RSA keys are considered secure and have stood the test of time.
DSA
The precursor to RSA. Using DSA keys is generally frowned upon, but well supported in Couchdrop
ECDSA
The newest kid on the block.
Learn about the root directory in Couchdrop.
The root directory in Couchdrop is a key security mechanism.
When users are added, you must choose a root directory. The root directory in Couchdrop behaves a bit like the home directory in a unix environment with a couple of caveats.
Users cannot navigate outside the root directory
Users can only see paths relative to the root directory
The true location of the root directory is hidden
Users can share the same root directory
Root directories can have permissions to give added controls.
Read only users: Can only download and view content in directory
Write only users: Users can only upload files to the directory, they cannot view existing files or folders
Example Root Directory:
Learn how to configure a connection to SharePoint with Couchdrop
Connecting to SharePoint online is fast to set up and fully supported in Couchdrop. Couchdrop uses the Microsoft Graph API, which is the recommended method for connecting to SharePoint and OneDrive.
There are two different authentication methods available with SharePoint Online, Delegate Access or Application Access. The Couchdrop team recommends you use the default Delegate Access method, as it's simpler to configure.
For connecting with Delgate Access, you can follow our step-by-step video guide below.
Configuring Delegate access involves a standard OAuth login, and Application Access requires creating a custom application in your Azure Domain.
To connect to SharePoint online in Couchdrop using Delegate Access you will need:
An account in SharePoint
The account needs to be licensed
The account has access to the sites you are wanting to connect to
You have the SharePoint domain/hostname on hand
Log in to Couchdrop and add a new storage connection
Select SharePoint from the list of available connections and set the connection name
Provide your SharePoint domain/hostname in the field required
Click Connect to Sharepoint and authorize the connection through the popup window. You will be required to log in to SharePoint with your account
Check that the status is connected successfully
Choose a SharePoint Site, Document Library, User or Folder
Click Save Settings
Learn about feature access rights on users and groups
Outside of the standard user roles, access to various features can be managed on an individual user and a group basis.
When adding a user, we pick reasonable defaults based on your environment and then you can modify this access.
Learn about storage connections in Couchdrop
The key difference between Couchdrop and other SFTP servers, is that Couchdrop works with your Cloud Storage instead of local hard disks. This means you can turn any storage platform, shared drive or server into a SFTP and MFT server in a matter of seconds.
Couchdrop is also not limited to one particular storage integration, rather you can mount hundreds of stores in Couchdrop and they appear as independent folders. Neato right!
To connect to over 30 different cloud platforms of a server the process is simple. You will of course need credentials or an API keyset for the storage you want to connect, but that aside, the process is simple.
From the Browser or Storage Admin, click Add Storage Integration. This will pop open a modal window with some options.
Storage connections appear as folders in Couchdrop. So a crucial step in this process is to choose a folder name and location. Couchdrop supports nestling storage connections as well.
Next up - choose a connection type. At this stage, you will be redirected to the configuration panel to manage this connection.
For detailed information, see the child articles here or reach out to support.
Couchdrop supports over 30 different storage platforms. The most common ones are well documented.
SharePoint and OneDrive
Learn how to configure Couchdrop to connect to SharePoint.
Azure Files
Learn how to connect Couchdrop to Azure files
Amazon S3
Learn how to connect Couchdrop to Amazon S3 or an S3 compatible storage provider
External SFTP Connections
Learn how to connect Couchdrop to an external SFTP server
Google Drive
Learn how to connect Couchdrop to Google Drive
Box
Learn how to connect Couchdrop to Box
Learn how to configure a connection to Azure Files with Couchdrop
Connecting to Azure Files online is fast to set up and fully supported in Couchdrop.
To connect to Azure Files online in Couchdrop you will need:
Azure Account Name
Azure Secret Key
Azure Share Name
To learn how to configure Azure - you can visit https://docs.microsoft.com/en-us/azure/storage/common/storage-account-manage
Log in to Couchdrop and add a new storage connection
Select Azure Files from the list of available connections
Provide your account name, secret and share name.
Click Test Connection
Choose a subfolder in Azure
Click Save Settings
Learn about Firewall and ACLs in Couchdrop
A key security mechanism in Couchdrop is ACLs. ACLs limit access to particular IP addresses or netwrok ranges.
There are three levels of ACL controls in Couchdrop:
User based
Group based
Tenant based
ACLs are additive, in that if the user authenticating originates from an IP address in a range at all three levels, then we will allow the request.
Configuring an IP address or network range is simple:
Learn how to configure a connection to Amazon S3 with Couchdrop
Connecting Couchdrop to an Amazon S3 bucket is done using an IAM keyset. It can be completed in a few minutes if you have the right access in AWS.
To connect to Amazon S3 in Couchdrop you will need:
An S3 Bucket already configured
An AWS IAM Key
An AWS IAM Secret
The AWS region
The IAM role must have adequate access to S3 and the targeted bucket
Log in to Couchdrop and add a new storage connection
Select Amazon S3 from the list of available connections
Provide the details above
Click Test Connection
Select a subfolder or bucket in S3 from the browser
Click Save Settings
Learn how to connect Couchdrop to a Google Drive folder
Couchdrop can be connected to a Google Drive folder in a few simple steps. Couchdrop works with Personal Google Drive accounts and Google Workspaces.
To connect to Google Drive online in Couchdrop you will need:
A licensed Google Drive Account
A folder in Google Drive
Log in to Couchdrop and add a new storage connection
Select Google Drive Personal from the list of available connections
Click Connect to Google.
Click Test Connection
Choose a subfolder in Google Drive from the folder selector (Optional)
Click Save Settings
Learn how to connect Couchdrop to a Google Workspace account
Couchdrop can be connected to a Google Workspace by creating a service account, which Couchdrop can do for you automatically. Couchdrop works with both Personal Google Drive accounts and Google Workspace accounts.
To connect to Google Workspace in Couchdrop you will need:
A licensed Google Workspace Account
A folder in Google Drive
Access to an Admin User account in Google Workspace
Log in to Couchdrop and add a new storage connection
Select Google Workspace from the list of available connections
Enter the email of an admin user and the domain of the Google Workspace Account you wish to connect to.
Click Create Service Account. Couchdrop will create a service account and generate a Client ID.
To proceed, you'll need to Delegate Domain Wide Authority to Couchdrop using the Admin Console. If you are unsure how to do this, see Delegating Domain-Wide Authority in Google Workspace
After granting Domain Wide Authority, click Test Connection
Choose a user or subfolder in Google Drive from the folder selector to be used as the root in Couchdrop (Optional)
Click Save Settings.
Learn how to configure a connection to Box with Couchdrop
Connecting to Box is fast to set up and fully supported in Couchdrop.
To connect to Box in Couchdrop you will need:
A licensed Box account
Access as a Team Admin (if connecting to other Box users in the organization)
Log in to Couchdrop and add a new storage connection
Provide a name for the connection. This is how the Box connection will appear in Couchdrop
Select Box from the list of available connections
Choose Authorize Now and grant access to Couchdrop. Check "As Team Admin" if you wish to connect to folders from other users in the organization
Click Test Connection
Select a user or sub-folder in Box (Optional)
Click Save Settings.
Learn how to connect Couchdrop to Dropbox
Connecting to Dropbox is fast to set up and fully supported in Couchdrop. Couchdrop can connect to both Dropbox Personal and Dropbox Business accounts.
To connect to Dropbox in Couchdrop you will need:
A licensed Dropbox account
Access to an Admin account to connect to Couchdrop (if connecting to Dropbox Business)
Log in to Couchdrop and add a new storage connection
Provide a name for the connection. This is how the Dropbox connection will appear in Couchdrop
Select Dropbox Personal or Dropbox Team from the list of available connections
Choose Authorize Now and grant access to Couchdrop.
Click Test Connection
Select a User or sub-folder in Dropbox (Optional)
Click Save Settings.
Learn how to connect Couchdrop to Egnyte
Connecting to Egnyte is fast to set up and fully supported in Couchdrop.
To connect to Egnyte in Couchdrop you will need:
A licensed Egnyte account
A folder in Google Drive
Your Egnyte Domain
Log in to Couchdrop and add a new storage connection
Provide a name for the connection. This is how the Egnyte connection will appear in Couchdrop
Select Egnyte from the list of available connections
Type in your Egnyte domain without egnyte.com (yourdomain.egnyte.com)
Choose Authorize Now. A window will open to grant access to Couchdrop. Click Allow Access.
Click Test Connection in Couchdrop
Select a user or sub-folder in Egnyte (Optional)
Click Save Settings.
Learn about working with proxy configuration for file servers
In networks where internet access is only allowed behind a proxy server some additional manual configuration is needed.
Install and run the agent
Set the token
Stop the agent and then add the proxy configuration manually
To add the proxy configuration, you will need to locate the Movebot configuration file, normally it's located in the directory, C:\Users\%username%\AppData\Local\CouchdropCloudConnector.
Open the file with Notepad, or something similar, and you will find a JSON with a base config.
Edit the "proxies" section, adding an HTTP and HTTPS proxy with the syntax below:
Save the file, and start the agent again.
You can also find proxy settings and shortcut links to logs & configuration files in the settings section (gear) within the Couchdrop agent.
Simple, no username and password
http://<ip>:<port>
With username and password
http://username:password@<ip>:<port>
Socks
socks://<ip>:<port>
To debug connection issues, check the log files located in the same directory as the configuration files and feel free to contact support for help at support@couchdrop.io.
Learn about connecting the Couchdrop agent in a Non-GUI environment
First, you need to install and configure the Couchdrop agent (Couchdrop Cloud Connector) on your workstation.
On your workstation, browse to the folder
Copy configuration.conf to a location you can access on the new server and also copy the Couchdrop Cloud Connector installer. Now you can uninstall the Agent from your workstation.
On the server, you will need to open the command prompt as an administrator. Once you have done that, you will need to locate where you copied your installer and configuration.conf file on the server.
Below is an example command of how to install silently, but your path may vary on your location.
Once this is complete, you need to apply the configuration to the server. To do this, copy your configuration.conf.
On the server, you will need to browse to this location. You may need to create the CouchdropCloudConnector folder under your Appdata\Local as the agent has not run yet.
Once you have completed installing the agent as a service and the service is running, you can check your Couchdrop Cloud Connector configuration integration in Couchdrop and see if it shows a successful connection.
Learn how to run the Couchdrop Agent as a Service for file server transfers.
The Couchdrop Agent (Couchdrop Cloud Connector) can be run as a Windows service.
Installing the agent as a service requires some understanding of how Windows services work and the service must be configured to run as the same user that is performing the configuration.
Next in a command line, open the Couchdrop Cloud Connector folder located under Program Files and run the following command.
Next, open the service manager:
Find the service for "Couchdrop Cloud Connector" and open it.
Adjust the Log On configuration specifying the user account that you are logged in as the account to run the service under. This step is important as the agent configuration is stored under the user's profile. Without configuring the correct user, the service will not properly connect.
Finally, you can start the service. Once it's running, you can reopen the Couchdrop Cloud Connector configuration application and it should show the service as Running in Background.
You can for configuration instructions. Once you have installed and configured the agent, you need to copy the configuration.
Now, we need to set up the agent as a service. for instructions on how to do that. Be aware you don't need to install the agent again. You can go to the area of the article where it tells you to run the following command.
Before starting, make sure that you have installed the Couchdrop Cloud Connector by Make sure you have run and configured everything properly and check that it is working. We recommend closing the desktop configuration app and systray application before starting the service.
Learn about logging and debugging with regards to Windows file servers
The Windows agent has a collection of logfiles that can be useful for debugging issues. Our support team might also ask for them from time to time.
You can find the default location for the logs here:
You can also jump directly to the local logs and configuration file within the settings (gear) within the Couchdrop agent.
Learn about configuring folder permissions in Couchdrop
Couchdrop allows administrators to define complex permissions on folders and their child files. Permissions apply across the board regardless of the accessing system and can be used to ensure that appropriate access levels are maintained.
When viewing a folder, permissions can be applied. Couchdrop applies an inheritance model to permissions, which means folders inherit the permissions of their closest parent.
When enabling permissions on a folder you must keep in mind:
By default, access to the folder will be denied to all users
Enabling permissions on a folder breaks the inherited permissions
To grant access you must:
Select a user or group for the permission
Add user roles.
User roles in Couchdrop are very granular:
List Contents
Allow the listing of child files and folders
Get Properties
Get properties for child files and folders
Delete
Delete child files and folders
Upload
Upload files into this folder
Download
Download and read files in this folder
Share
Create shared links for files and folder
Create Inbox
Create an inbox for this folder and all children
Manage Permissions
Manage permissions on this folder
Manage Notifications
Manage notifications on this folder
Folder sharing works the same as folder permissions with one caveat. If a folder is shared, then it will appear in the users root directory as a link.
Folder sharing is enabled by checking "Appear in users home directory" when configuring permissions.
Learn how to configure an Azure Blob connection for Couchdrop
Connecting to Azure Blob is fast to set up and fully supported in Couchdrop.
To connect to Azure Blob in Couchdrop you will need:
A Licensed Microsoft Azure account
Azure Account Name
Azure Account Key
Azure Container Name
Endpoint Suffix (Optional)
To learn how to configure Azure - you can visit https://docs.microsoft.com/en-us/azure/storage/common/storage-account-manage
Log in to Couchdrop and add a new storage connection
Select Azure Blob from the list of available connections
Provide your Azure Account Name, an Azure Account Access Key, and the name of the Container you wish to connect to.
Click Test Connection
Choose a subfolder or bucket in Azure Blob (Optional)
Click Save Settings
Learn how to connect Couchdrop to an external SFTP server folder
Couchdrop can be connected to an external SFTP (or FTPs) server folder in a few simple steps.
To connect to an external SFTP server with Couchdrop you will need:
The hostname or IP address for the external server
The port number (normally 22)
A username for the external server
The password or private key for the server
Access to the folder you want to connect
Log in to Couchdrop and add a new storage connection
Select SFTP Server from the list of available connections
Provide the configuration details as listed above
Click Test Connection
Choose a subfolder from the folder selector
Click Save Settings
Learn how to connect Couchdrop to a OneDrive folder
Couchdrop can be connected to a OneDrive folder in a few simple steps. Couchdrop works with Personal OneDrive accounts and SharePoint Sites.
To connect a personal OneDrive folder in Couchdrop you will need:
A licensed OneDrive Account
A folder in OneDrive
Log in to Couchdrop and add a new storage connection
Select OneDrive from the list of available connections
Choose whether or not to connect as an Administrator User,
Click Authorize Now. This will open a page to connect to Microsoft via OAuth. Click Accept.
Click Test Connection
Choose a subfolder in OneDrive from the folder selector (Optional)
Click Save Settings
Learn about custom domains and whitelabelling in Couchdrop
Create your own secure, customer-facing file transfer portals by applying your branding to Couchdrop.
Before beginning this process, we recommend you have good quality logos and your brand guide (with hex colours) available.
Log in to Couchdrop as the Owner user.
Navigate to Administration → Whitelabelling
Whitelabelling can be configured separately for the main Couchdrop web portal and/or the Shared Link and Inbox landing pages. Check the options you wish to enable and provide a Company Name.
Optionally, provide your own domain which is configured to point to Couchdrop. Use a DNS CNAME for this, eg: files.mycompany.com -> mycompany.couchdrop.io
Enter hex codes for your custom colours and upload your logos. You may need to manipulate the dimensions of your logo files to best suit the page layout before uploading them. Portal settings apply to the main Couchdrop login page and web portal interface. Inbox Branding applies to Shared Links and Inboxes.
Click Save Settings when all configuration is complete.
Couchdrop login page.
Couchdrop main web portal.
Inbox portal.
Learn how to configure Couchdrop to sync with Okta
This guide will help you if you want to provision Users between Okta and Couchdrop.
Push Users Users created in Okta will also be created in Couchdrop
Push User Updates User updates in Okta will be pushed to the corresponding users in Couchdrop
User deactivation Users deactivated in Okta will be deactivated in Couchdrop
Push Groups Groups created in Okta will also be created in Couchdrop
Push Group updates Group updates in Okta will be pushed to the corresponding users in Couchdrop
Group deactivation Groups deactivated in Okta will be deactivated in Couchdrop
Import Users Users created in Couchdrop can be imported into Okta
Import Groups Groups created in Couchdrop can be imported into Okta
Navigate to User Provisioning in Couchdrop’s interface and create a new Provisioning Token. This will be used in the Azure Active Directory provisioning process.
Select and configure the Couchdrop SCIM application from the Okta Application Catalogue.
Under Application - Application select Browse App Catalog
Search for Couchdrop SCIM and select the application
Click on Add Integration and then on Done
Assign User and Groups to the Application
Then configure the user provisioning by selecting the Provisioning tab and click Configure API Integration
Check the Enable API integration checkbox, provide the User Provisioning Token which you configured in the Couchdrop SSO interface into the API Token field and click Test API Credentials to verify the token and hit Save.
Select Edit and enable Create User, Update User Attributes and Deactivate Users
To push groups and their memberships from Okta into Couchdrop you can use the Push Group option. More information about this can be found here
If you want to import users and groups from Couchdrop into Okta select the To Okta Setting on the Provisioning Tab and select the scheduled import frequency and matching rules.
Then on the Import Tab click the Import Now button
You will see a list of all potential users and groups to import and can select the one you wish to import into Okta
and click Confirm Assignments to trigger the import.
Learn about configuring Couchdrop to sync with Azure for accounts
Push Users Users created in Azure will also be created in Couchdrop
Push User Updates User updates in Azure will be pushed to the corresponding users in Couchdrop
User deactivation Users deactivated in Azure will be deactivated in Couchdrop
Push Groups Groups created in Azure will also be created in Couchdrop
Push Group updates Group updates in Azure will be pushed to the corresponding users in Couchdrop
Group deactivation Groups deactivated in Azure will be deactivated in Couchdrop
Navigate to User Provisioning in Couchdrop’s interface and create a new Provisioning Token. This will be used in the Azure Active Directory provisioning process.
Navigate to your Administration dashboard in Microsoft’s admin portal and create an enterprise application.
Provide a name for the application and select “Integrate any other application you don’t find in the gallery (Non-gallery)
Next assign users and groups to the newly created application that you would like to have provisioned in Couchdrop.
Select Add user/group
Select the desired users or groups that should be provisioned through to Couchdrop then Select and Assign.
Navigate to the Provisioning Tab on the left hand side. Next select Get started to configure the tenant URL and the User Provisioning Token that was created in Step 1. Provisioning mode should be set to automatic. The Tenant URL is: https://api.couchdrop.io/scim/v2.
Select Test Connection and Azure will attempt to connect as well and vwill retrieve schema information needed for the user and group mapping. If tested successfully then select Save.
Select Provision Azure Active Directory Users as required.
Couchdrop requires the following user SCIM attributes for the SCIM system to be mapped, all others should be removed.
Custom Application SSO Attribute
userName
active
emails[type eq "work"].value
name.givenName
name.familyName
externalId
The externalId attribute may need to be remapped from mailNickname to objectId on the Azure Active Directory attribute side depending on your settings.
Select Provision Azure Active Directory Groups as required.
Couchdrop requires the following user SCIM attributes for the SCIM system to be mapped.
Custom Application SSO Attribute
displayName
externalId
members
Navigate back to the custom application breadcrumb (in this case it’s Couchdrop SCIM) and to Provisioning. From here select the Start provisioning button.
After the provisioning has completed running the first time a status should be required that indicates how many users and groups were provisioned within the Couchdrop product. Further information can be located by selecting View provisioning logs.
Learn about alerting and notifications in Couchdrop
Couchdrop has three different mechanisms for alerting and notifications. Each is independant of the other and is managed slightly differently.
Global alerting lives across the tenant and provides the broadest framework for providing notifications on events. You can configure global alerting to notify users when:
A file is uploaded or downloaded
A user logs in
An event fails
These notifications are configured under Administration --> Reporting --> Alerting
Notifications are either by email or via web hooks. Couchdrop expects a HTTP 200 response to web hooks or else it will retry 15 times with an exponential backoff.
Folder alerting offers the same alerting facilities as Global Alerting, but they are configured and bound to a folder and its children.
Folder alerting is configured through the manage folder menu and can be configured globally as folder settings under Administration --> Permissions.
Folder alerting supports the following events:
A file is uploaded or downloaded
An event fails
Alerting can also be configured as an action in File Actions.
SAML SSO
Learn how to configure SSO through a SAML IDP in Couchdrop
Azure SCIM and SSO
Learn how to configure Couchdrop to sync user identities with Azure
Okta Configuration
Learn how to configure Couchdrop to integrate with Okta
Couchdrop can be configured for SAML authentication via the web interface.
Users must already exist in Couchdrop for SAML login and as Couchdrop supports login via SFTP and FTP, they must have a password set as well. SAML Login is only available through the web interface.
Enable SAML SSO
Login to Couchdrop as the owner. Navigate to Administration --> SSO --> SAML SSO
You will need to provide the following details to Couchdrop so that it can connect to your identity provider.
SAML IDP Identity ID
https://sts.windows.net/6c4526c1-a311-479b-af9c-1e0ecc4122be/
(Microsoft Entra Identifier) See Step 4 of your Entra Single Sign-On App Settings.
SAML IDP SSO URL
https://login.microsoftonline.com/6c4526c1-a311-479b-af9c-1e0ecc4122be/saml2
(Login URL) See Step 4 of your Entra Single Sign-On App Settings.
SAML IDP Certificate
-----BEGIN CERTIFICATE----- MIIC8DCCAdigAwIBAgIQeTBhv/RYZrpAXGf+yF185DANBgkqhkiG9w0BAQsFADA0MTIwMAYDVQQD ..... -----END CERTIFICATE----
Certificate (Base64) See Step 3 of your Entra Single Sign-On App Settings.
SAML IDP Email Attribute Key
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
The example provided is the default for all Microsoft Single Sign-On Apps.
Learn about Static IPs with Couchdrop
Couchdrop uses a vast network of cloud computing resources to provide you with a robust and fast SFTP and file automation platform. Since we are using dynamic cloud computing, geographically located in over 15 different datacenters, we can't publish or guarantee that our IPs won't change. In fact, they do change, and very frequently.
Don't attempt to enumerate our IP addresses. They change frequently, without warning, sometimes multiple times a day. It will hurt.
If static IPs are a hard requirement, then reach out to sales@couchdrop.io and we can assign your account to a POD that is configured for them.
Learn about account lockout in Couchdrop
SFTP and SCP are easy targets for brute force attacks on the internet. To protect our customers from unauthorised access, Couchdrop implements an account lockout policy by default.
After 5 incorrect attempts in 5 minutes, accounts are locked for 15 minutes.
This option can be disabled globally, but we do not recommend it.
Learn about Couchdrop's password policy management
Couchdrop allows administrators to create comprehensive password policies that enforce good password management to meet security and compliance requirements.
Under administration, Couchdrop allows admins to configure a global password policy that applies to all users. This global password policy is managed under Administration --> Security --> Password Policies
Password policies can also be explicitly applied to groups. Different groups in Couchdrop can have different policies applied. This provides an additional level of customisation and allows for compliance with SFTP and FTP clients that may not support complex passwords.
Along with managing password complexity, password policies can be configured to expire passwords. Once a password has expired, it will need to be reset, either by an administrator or by the user through the reset password mechanism.
Learn about account expiry in Couchdrop
Account expiry in Couchdrop is a useful tool for ensuring that accounts are short lived.
Any account except the owner can be configured with an expiry. When an account has expired, all access with be disabled.
Learn about configuring MFA/2fa in Couchdrop
Couchdrop supports MFA/2FA natively through an integration with Authy (by Twilio). All users can configure 2fa for the Couchdrop Web App and when they first login to Couchdrop.
Authy supports SMS based 2FA and QR code based authenticator apps like the Microsoft Authenticator, 1password and the Google Authenticator. Setup is quick and easy and users can self manage.
Users can self manage 2fa by logging into the Couchdrop Web App and clicking on their user profile.
Couchdrop now supports 2fa enforcement via a new security option. When enabled, users who have not configured 2fa will be required to configure it the next time they login.
How to Enable
To enable 2fa enforcement;
Login to Couchdrop as the owner
Click Administration --> Security
Under Password Policies, toggle the checkbox for Enforced MFA
Couchdrop administrators with permissions to manage users can disable 2fa for users in their tenant. Disabling 2fa for a user will allow the user login to Couchdrop without 2fa and retry configuration.
Cyberduck is another popular open-source file transfer client, similar to FileZilla. Learn how to connect to an SFTP server with Cyberduck in this simple walkthrough.
Cyberduck is another popular open-source file transfer client, similar to FileZilla. It's primarily used for transferring files to and from FTP, SFTP, WebDAV, and other cloud storage servers. Like FileZilla, Cyberduck is available for various operating systems including Windows and macOS.
Cyberduck provides a user-friendly interface and supports drag-and-drop functionality for easy file transfers. It also offers features such as bookmarking, integration with external editors, and advanced file permissions management.
Using Cyberduck with SFTP is quite straightforward. Here's a step-by-step guide on how to do it:
Download and Install Cyberduck:
Visit the Cyberduck website (https://cyberduck.io/) and download the appropriate version for your operating system.
Follow the installation instructions to install Cyberduck on your computer.
Open Cyberduck:
After installation, launch Cyberduck.
Create a New Connection:
Click on the "Open Connection" button in the top left corner, or go to "File" > "Open Connection".
Configure Connection Settings:
In the "Open Connection" window, select "SFTP (SSH File Transfer Protocol)" from the dropdown menu for "Connection Type".
Enter the server address (hostname or IP address) in the "Server" field.
Enter your username in the "Username" field.
If the server uses a non-standard port for SFTP (other than 22), specify it in the "Port" field.
If you have a specific folder you want to open on the server upon connection, you can enter it in the "Path" field.
Click "Connect".
Authenticate:
If this is your first time connecting to the server, you'll be prompted to verify the server's fingerprint. Make sure it matches the expected fingerprint to ensure you're connecting to the correct server.
Enter your password when prompted, and optionally, you can choose to save your password to the keychain for future logins.
Transferring Files:
Once connected, you'll see the file browser window showing the files on the server.
To upload files to the server, drag them from your local file browser (left pane) to the remote file browser (right pane).
To download files from the server to your local machine, drag them from the remote file browser to the local file browser.
Managing Files:
Cyberduck allows you to perform various file operations such as creating directories, renaming files, deleting files, and changing file permissions.
Disconnecting:
When you're finished with your file transfers, click the "Disconnect" button in the Cyberduck toolbar or go to "File" > "Disconnect".
Close Cyberduck:
Finally, you can close Cyberduck when you're done.
That's it! You've successfully used Cyberduck with SFTP to transfer files securely between your local machine and a remote server.
Couchdrop supports Cyberduck via SFTP and FTP. When configuring your server connection in the Site Manager, use the hostname, username and password provided in the Couchdrop admin interface.
Learn how to use Python with SFTP
Uploading and downloading files with Python is a great way to automate transfers or build out support for SFTP inside you application.
Using Python with SFTP (SSH File Transfer Protocol) can be accomplished using the paramiko
library, which allows you to create SSH connections and perform file operations securely. Here's a basic guide on how to use Python with SFTP using paramiko
:
Install Paramiko: Before you can use Paramiko, you need to install it. You can install it via pip:
Connect to the SFTP Server: Below is an example of how to connect to an SFTP server using Paramiko:
Perform SFTP Operations: Once you've established an SFTP connection, you can perform various operations such as uploading files, downloading files, listing directory contents, creating directories, etc. Here are a few examples:
Upload a file:
Download a file:
List directory contents:
Create a directory:
Close the Connection: After you've finished with the SFTP operations, make sure to close the connection:
By following these steps, you can use Python to interact with SFTP servers securely and perform various file operations. Make sure to handle exceptions and errors appropriately, especially when dealing with network connections and file operations.
Couchdrop has full support for SFTP uploads with python using Paramiko. Simply use your Couchdrop hostname and credentials and you can connect to Couchdrop like any other SFTP server.
Couchdrop also has a comprehensive API, that you can find
Learn how to use SFTP in a bash script.
You can use the sftp
command-line utility directly in a Bash script to perform SFTP operations. Here's a basic guide on how to use SFTP with Bash:
Connecting to an SFTP Server: You can use the sftp
command to establish a connection to an SFTP server. Below is an example of how to connect to an SFTP server:
Replace "sftp.example.com"
with the hostname or IP address of your SFTP server, "your_username"
with your username, and "your_password"
with your password. You can also adjust the port number if your SFTP server uses a different port.
Performing SFTP Operations: Once connected, you can execute SFTP commands interactively or within the script to perform various operations such as uploading files, downloading files, listing directory contents, creating directories, etc. For example:
Uploading a file:
Downloading a file:
Listing directory contents:
Creating a directory:
Exiting SFTP: Once you've finished with your SFTP operations, you can exit the SFTP session by typing exit
or by sending an EOF (End-of-File) signal (usually by pressing Ctrl+D
).
Using Password in Bash Script: Storing passwords directly in Bash scripts is not recommended for security reasons. However, if you need to automate SFTP operations in a script, you can use tools like sshpass
to provide the password securely. Make sure to install sshpass
first (e.g., sudo apt-get install sshpass
on Debian-based systems).
Here's an example of how to use sshpass
in a Bash script:
Replace "your_password"
with your actual password. This approach securely provides the password to the sftp
command without exposing it in the script itself.
By following these steps, you can use Bash scripts to automate SFTP operations securely. Ensure that you handle errors and exceptions appropriately in your scripts.
Learn how to use SFTP with Golang, a popular programming language.
Uploading and downloading files programatically with Golang is a great way to automate transfers or build out support for SFTP inside you application.
To interact with SFTP servers in Go, you can use the github.com/pkg/sftp
package, which provides SFTP support on top of github.com/pkg/ssh
. Here's a basic guide on how to use Go with SFTP:
Install Dependencies: First, you need to install the required dependencies using go get
:
Create an SSH Client and Connect to the Server: Below is an example of how to connect to an SFTP server using Go:
Perform SFTP Operations: Once you've established an SFTP connection, you can perform various operations such as uploading files, downloading files, listing directory contents, creating directories, etc. Here are a few examples:
Upload a file:
Download a file:
Close the Connection: After you've finished with the SFTP operations, make sure to close the SFTP session and the SSH connection:
By following these steps, you can use Go to interact with SFTP servers and perform various file operations. Make sure to handle errors appropriately when dealing with network connections and file operations.
Couchdrop has full support for SFTP uploads with Golang. Simply use your Couchdrop hostname and credentials and you can connect to Couchdrop like any other SFTP server.
Couchdrop also has a comprehensive API, that you can find couchdrop-api
Learn how to use the default SFTP client in Linux and Unix operating systems
OpenSSH, which is a suite of secure networking utilities based on the SSH (Secure Shell) protocol, includes a command-line utility for interacting with SSH servers for file transfer purposes. This utility is simply called sftp
.
Here's a brief overview of how to use the sftp
command:
Connecting to a Server:
To connect to an SSH server using SFTP, you would typically use the following command:
Replace username
with your username on the server and hostname
with the hostname or IP address of the server.
Authenticating:
After executing the command, you will be prompted to enter your password for the specified username.
Navigating Directories:
Once connected, you'll be in the SFTP interactive shell, similar to a command-line interface.
You can use commands like ls
, cd
, and pwd
to navigate directories on the server.
Transferring Files:
To upload a file from your local machine to the server, you can use the put
command:
To download a file from the server to your local machine, you can use the get
command:
Exiting SFTP:
To exit the SFTP session, you can use the exit
command:
Or simply type exit
and press Enter.
The sftp
command-line utility provides a straightforward way to perform secure file transfers over SSH connections without needing a separate FTP client. It's often used in scripting and automation tasks where manual interaction isn't required.
Couchdrop supports the default sftp command natively. Simply switch out the hostname and credentials from the example above.
Learn about Malware Scanning in Couchdrop
Couchdrop has support for scanning data prior to uploading through our integrated malware scanner. This functionality is an additional paid add-on, so reach out to sales@couchdrop.io if you do not have it enabled.
Malware scanning must be configured on folders to become active. This is because most customers do not want it across the board.
Couchdrop's automated malware scanning provides an additional layer of protection for customers who are receiving files from external parties and wish to ensure the integrity of the files entering their infrastructure and file pipelines. While many cloud platforms (SharePoint, Dropbox, Google Drive, etc.) have a layer of protection, other platforms do not offer this natively.
Access to this functionality can be requested via support@couchdrop.io. Once enabled, you can enable malware scanning for specific folders.
Malware Scanning is provided by ClamAV (https://www.clamav.net)
Malware scanning is limited to files that are 1GB or less.
No. Admins cannot adjust the scan behaviour. Where can I find events generated by Malware Scanning?
Events will appear as "malware_scan_failed" under the reporting section of your admin portal.
Which storage platforms support Malware Scanning?
You can enable Malware Scanning for any storage platform that can be connected to Couchdrop. Once you have connected your storage to Couchdrop, you must enable scanning on that folder.
Learn how to connect to an SFTP server with Filezilla in this simple walkthrough
FileZilla is a popular open-source SFTP client used for transferring files between a client and a server over the internet. It has full support for FTP, FTPS (FTP over SSL/TLS), and SFTP (SSH File Transfer Protocol).
FileZilla is available for various operating systems including Windows, macOS, and Linux. It provides a user-friendly interface for managing file transfers, directory listings, and remote file editing.
FileZilla is widely used by web developers, system administrators, and anyone who needs to transfer files securely over the internet.
Using FileZilla with SFTP (SSH File Transfer Protocol) is quite straightforward. Here's a step-by-step guide on how to do it:
Download and Install FileZilla:
Visit the official FileZilla website (https://filezilla-project.org/) and download the appropriate version for your operating system.
Follow the installation instructions to install FileZilla on your computer.
Open FileZilla:
After installation, launch FileZilla.
Connect to a Server:
In FileZilla, navigate to "File" > "Site Manager" or use the shortcut Ctrl+S
(Windows/Linux) or Cmd+S
(Mac) to open the Site Manager.
Click on the "New Site" button and give your site a name.
In the "Protocol" dropdown menu, select "SFTP - SSH File Transfer Protocol".
Enter the hostname (or IP address) of the server in the "Host" field.
Enter the port number if it's different from the default (22 for SFTP).
Choose "Normal" as the Logon Type.
Enter your username and password in the respective fields.
Click on "Connect" to save the settings and establish the connection.
Transferring Files:
Once connected, you will see the local files on the left side and remote files on the right side of the FileZilla interface.
Navigate through the directories to find the files you want to transfer.
To upload files from your local machine to the server, simply drag them from the local pane to the remote pane.
To download files from the server to your local machine, drag them from the remote pane to the local pane.
Managing Files:
You can create, delete, rename, and move files and directories directly from within FileZilla.
Disconnecting:
Once you're done with your file transfers, you can disconnect from the server by clicking on the "Server" menu and selecting "Disconnect".
Close FileZilla:
Finally, you can close FileZilla when you're finished with your transfers.
That's it! You've successfully used FileZilla with SFTP. Remember to always secure your login credentials and use SFTP for encrypted file transfers.
Couchdrop supports FileZilla via SFTP and FTP. When configuring your server connection in the Site Manager, use the hostname, username and password provided in the Couchdrop admin interface.
Common questions and answers for Couchdrop
Couchdrop’s support team may access your file metadata (not file data) and logs for support purposes only. Couchdrop’s engineering staff have access to the underlying technology that can access metadata and log information and the storage locations of the actual data. The encryption keys required to decrypt the actual data are stored in a key-management escrow service operated by Doppler.
It is possible within the product to block Couchdrop employees' access within the application. It is a check box under Administration -> Security.
Note, if you do require support, Couchdrop may request you enable this or join them for a screen sharing session.
Yes, see Account Lockout for more details
Couchdrop stores configuration and metadata in the USA, deep inside fort Amazon AWS. For more information on our approach to data soverienty and security, visit our trusts center https://trust.couchdrop.io
No no, we hear you. Couchdrop comes with storage through AWS. Learn more about this Storage
Learn about SCP and using it to upload and download files
SCP (Secure Copy Protocol) and SFTP (SSH File Transfer Protocol) are two distinct protocols used for file transfer over SSH. SCP is specifically designed for copying files between hosts on a network, SFTP provides a more feature-rich file transfer capability, including file manipulation, directory listing, and more.
If you want to use SCP with an SFTP server, you need to ensure that the server supports both protocols. However, if the server only supports SFTP, you won't be able to use SCP directly with it.
Couchdrop supports both SFTP and SCP.
Here's how you can use SCP with an SFTP server if the server supports both protocols:
Check Server Support: First, confirm that the SFTP server you are connecting to supports SCP. Some SFTP servers might have SCP support disabled or not implemented.
Connect with SCP: If the server supports SCP, you can use the scp
command just like you would with any other SCP-enabled server. Here's the basic syntax:
Replace source_file
with the path to the file you want to transfer, username
with your username on the server, hostname
with the hostname or IP address of the server, and /path/to/destination
with the destination directory on the server.
For example:
Authentication: SCP uses SSH for authentication, so you might be prompted to enter your password or provide a private key passphrase if you're using key-based authentication.
Transferring Files: Once authenticated, SCP will securely transfer the specified file to the destination directory on the server.
Close Connection: After the transfer is complete, SCP will close the connection, and you'll return to your local shell prompt.
If the SFTP server does not support SCP, you'll need to use SFTP commands or a dedicated SFTP client to transfer files. Most SFTP servers support a wide range of client applications, making it easy to find one that suits your needs.
Walkthrough of how to delegate Domain-Wide Authority in Google Workspace to connect Couchdrop to a Google Workspace account
Learn how to connect Google Workspace to Couchdrop with a Client ID and domain-wide delegation
To connect a Google Workspace account to Couchdrop you need to delegate domain-wide authority so Couchdrop can access your users and migrate them automatically.
Delegating Domain-Wide Authority requires the following:
A Google Workspace Administrator Account to access the Admin Console
Familiarity with the Google Admin Console
Client ID for Google generated in Couchdrop when configuring a Google Workspace connection
Login to the admin console for your Google Workspace domain.
Select the Security tab. If you don't see Security, select Show More from the bottom of the menu list.
Choose Access and data control and then API controls.
In the Domain wide delegation section, choose MANAGE DOMAIN WIDE DELEGATION.
In the API clients section, click Add new. Paste the Client ID generated from Couchdrop into the Client ID field.
In the OAuth scopes (comma-delimited) field, paste the following:
Click Authorize. Test that the connection in Couchdrop is successful to complete your configuration.
For more information on domain-wide delegation, see this Support article from Google: https://support.google.com/a/answer/162106?hl=en
Learn about connecting to an SFTP server and Couchdrop with Java.
To use SFTP with Java, you can leverage the JSch library, which provides support for SSH communication in Java. Below is a basic guide on how to use JSch to interact with SFTP servers:
Add JSch Dependency: First, you need to include the JSch library in your Java project. You can do this by adding the dependency to your Maven or Gradle configuration, or by downloading the JAR file and including it in your project manually.
For Maven, add the following dependency to your pom.xml
file:
Create SFTP Connection: Below is an example of how to connect to an SFTP server using JSch:
Perform SFTP Operations: Once you've established an SFTP connection, you can perform various operations such as uploading files, downloading files, listing directory contents, creating directories, etc. Here are a few examples:
Upload a file:
Download a file:
List directory contents:
Close the Connection: After you've finished with the SFTP operations, make sure to close the SFTP channel and the SSH session:
By following these steps, you can use Java with JSch to interact with SFTP servers and perform various file operations. Make sure to handle exceptions appropriately when dealing with network connections and file operations.
Learn how to connect Couchdrop to a Windows or OSX File Server
Couchdrop supports Microsoft Windows and Apple OSX using a lightweight agent that is installed directly on the file server, another server, or on a virtual machine.
The agent uses a shared token for authentication and communicates with Couchdrop's infrastructure via secure HTTPS calls. The agent can be run in a standalone fashion or as a service.
To connect a Windows / OSX file server to Couchdrop you will need:
Remote access via RDP to the file server or a suitable VM
To have an administrator account
A reliable internet connection
A minimum of 16GB and 2 cores on the host or virtual machine
To be running Windows 10 or above (for Windows Servers)
For a full list of requirements, see Server Requirements.
Log in to Couchdrop and add a new integration, either from +New > Connect Integration or the Integrations sidebar
Click to add a new integration or Storage connector (Cloud Folder)
Select Windows/OSX Server from the list of available connections
Name the connection and create a cloud folder for Couchdrop
Copy the Agent Token and download the agent. This token is only viewable once so be sure to copy it before leaving the screen.
Log in to the remote target file server as an administrator
Install the agent and launch it
Paste the Agent Token from Couchdrop and click Connect. After a few seconds, the status indicator should change to show that the server is connected to Couchdrop.
Return to the Couchdrop interface, click Test and Save.
Learn about requirements for connecting Couchdrop to file servers
The Windows / OSX Agent allows for connections to on-prem file servers running Microsoft Windows or macOS. This software is run as an executable and can also be run as a service.
While connection requirements can vary depending on the types of transfers involved, we recommend the resources below.
CPU
4-8 VCPU Core
Memory
16GB
Hard Disk Space
32GB of free disk
Below are the current supported and tested versions of Microsoft Windows that the agent supports.
Windows XP
No
Windows 10
Yes
Windows Server 2012 R2
No
Windows Server 2016
Yes
Windows Server 2019
Yes
Windows Server 2022
Yes
You will need Microsoft .NET Framework 4.7.2 to open the agent.
The speed of your transfers will be heavily dependant on your internal and external network capacity. We recommend having the highest available uplink speed, with 1GB uplink speed over fiber if possible when moving high volumes of data or files.
If you are experiencing performance issues with the agent, we recommend running a speed test and ensuring you've chosen a data region that is close to the agent when applicable.
The Couchdrop agent communicates with the Couchdrop control plane and APIs exclusively via HTTPS. This means that no additional ports are needed to be opened. However, if your organization has a proxy server or web filter, you may need to allow the following domains out.
fileio.couchdrop.io
api.couchdrop.io
*.couchdrop.io
8.8.8.8, 8.8.4.4
For more information, get in touch with support via support@couchdrop.io