Syncplify.me Server!: more on Active Directory authentication

This article covers the interaction between the client and Syncplify.me Server! in case of Active Directory authentication, and explains how auth-data sent by the client is interpreted by the server.

For the sake of our example we have set up a Windows Server 2012 R2 virtual machine, and created the “syncplify.local” domain (totally made up, you can use your own domain name of course). We have then created an AD group called “SFTP Users” (again you can create your own groups) and a couple users: “testuser” and “groupuser”. The testuser profile is only member of the “Domain Users” group, while the groupuser profile is member of “Domain Users” as well as of “SFTP Users”.

Important: if you’re using Syncplify.me Server! v4.0 or greater, please make sure you also carefully read this article before you continue.

Then we have created the two virtual profiles in Syncplify.me Server! with the usernames exactly as you see them in the picture here below:

2012R2-AD-1

Continue reading

Syncplify.me Server! and Active Directory user authentication

Besides it own internal user database, Syncplify.me Server! can authenticate users against the Windows user database and/or the Active Directory.

This article explains how to authenticate users against the Active Directory. A different article explains how to use the Windows (local) user database.

Continue reading

RSA or DSA keys for public-key authentication with Syncplify.me Server!?

Some SFTP clients have the ability to generate key-pairs for SSH2 public-key authentication, and – in some cases – our users are presented with the question: do you want to generate RSA or DSA keys?

When you want to authenticate against a Syncplify.me Server!, please, always use RSA keys. If you use DSA keys you may not be able to successfully authenticate.