Table of Contents
A low-level client representing AWS Transfer Family
AWS Transfer Family is a fully managed service that enables the transfer of files over the File Transfer Protocol (FTP), File Transfer Protocol over SSL (FTPS), or Secure Shell (SSH) File Transfer Protocol (SFTP) directly into and out of Amazon Simple Storage Service (Amazon S3). AWS helps you seamlessly migrate your file transfer workflows to AWS Transfer Family by integrating with existing authentication systems, and providing DNS routing with Amazon Route 53 so nothing changes for your customers and partners, or their applications. With your data in Amazon S3, you can use it with AWS services for processing, analytics, machine learning, and archiving. Getting started with AWS Transfer Family is easy since there is no infrastructure to buy and set up.
import boto3
client = boto3.client('transfer')
These are the available methods:
Check if an operation can be paginated.
Used by administrators to choose which groups in the directory should have access to upload and download files over the enabled protocols using AWS Transfer Family. For example, a Microsoft Active Directory might contain 50,000 users, but only a small fraction might need the ability to transfer files to the server. An administrator can use CreateAccess to limit the access to the correct set of users who need this ability.
See also: AWS API Documentation
Request Syntax
response = client.create_access(
HomeDirectory='string',
HomeDirectoryType='PATH'|'LOGICAL',
HomeDirectoryMappings=[
{
'Entry': 'string',
'Target': 'string'
},
],
Policy='string',
PosixProfile={
'Uid': 123,
'Gid': 123,
'SecondaryGids': [
123,
]
},
Role='string',
ServerId='string',
ExternalId='string'
)
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory example is /directory_name/home/mydirectory .
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it will be displayed as is. You also must ensure that your AWS Identity and Access Management (IAM) role provides access to paths in Target . This value can only be set when HomeDirectoryType is set to LOGICAL .
The following is an Entry and Target pair example.
[ { "Entry": "your-personal-report.pdf", "Target": "/bucket3/customized-reports/${transfer:UserName}.pdf" } ]
In most cases, you can use this value instead of the scope-down policy to lock down your user to the designated home directory ("chroot "). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.
The following is an Entry and Target pair example for chroot .
[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
Note
If the target of a logical directory entry does not exist in Amazon S3 or Amazon EFS, the entry will be ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0-byte objects as place holders for your directory. If using the AWS CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you can use the following.
aws s3api put-object --bucket bucketname --key path/to/folder/
The end of the key name must end in a / for it to be considered a folder.
Required: No
Represents an object that contains entries and targets for HomeDirectoryMappings .
Represents an entry and a target for HomeDirectoryMappings .
Represents the map target that is used in a HomeDirectorymapEntry .
A scope-down policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName} , ${Transfer:HomeDirectory} , and ${Transfer:HomeBucket} .
Note
This only applies when domain of ServerId is S3. Amazon EFS does not use scope down policy.
For scope-down policies, AWS Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.
For an example of a scope-down policy, see Example scope-down policy .
For more information, see AssumeRole in the AWS Security Token Service API Reference .
The full POSIX identity, including user ID (Uid ), group ID (Gid ), and any secondary groups IDs (SecondaryGids ), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The POSIX user ID used for all EFS operations by this user.
The POSIX group ID used for all EFS operations by this user.
The secondary POSIX group IDs used for all EFS operations by this user.
[REQUIRED]
Specifies the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role determine the level of access that you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
[REQUIRED]
A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "*YourGroupName* *"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
dict
Response Syntax
{
'ServerId': 'string',
'ExternalId': 'string'
}
Response Structure
(dict) --
ServerId (string) --
The ID of the server that the user is attached to.
ExternalId (string) --
The external ID of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family.
Exceptions
Instantiates an auto-scaling virtual server based on the selected file transfer protocol in AWS. When you make updates to your file transfer protocol-enabled server or when you work with users, use the service-generated ServerId property that is assigned to the newly created server.
See also: AWS API Documentation
Request Syntax
response = client.create_server(
Certificate='string',
Domain='S3'|'EFS',
EndpointDetails={
'AddressAllocationIds': [
'string',
],
'SubnetIds': [
'string',
],
'VpcEndpointId': 'string',
'VpcId': 'string',
'SecurityGroupIds': [
'string',
]
},
EndpointType='PUBLIC'|'VPC'|'VPC_ENDPOINT',
HostKey='string',
IdentityProviderDetails={
'Url': 'string',
'InvocationRole': 'string',
'DirectoryId': 'string'
},
IdentityProviderType='SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE',
LoggingRole='string',
Protocols=[
'SFTP'|'FTP'|'FTPS',
],
SecurityPolicyName='string',
Tags=[
{
'Key': 'string',
'Value': 'string'
},
]
)
The Amazon Resource Name (ARN) of the AWS Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS .
To request a new public certificate, see Request a public certificate in the AWS Certificate Manager User Guide .
To import an existing certificate into ACM, see Importing certificates into ACM in the AWS Certificate Manager User Guide .
To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the AWS Certificate Manager User Guide .
Certificates with the following cryptographic algorithms and key sizes are supported:
Note
The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.
The domain of the storage system that is used for file transfers. There are two domains available: Amazon Simple Storage Service (Amazon S3) and Amazon Elastic File System (Amazon EFS). The default value is S3.
Note
After the server is created, the domain cannot be changed.
The virtual private cloud (VPC) endpoint settings that are configured for your server. When you host your endpoint within your VPC, you can make it accessible only to resources within your VPC, or you can attach Elastic IP addresses and make it accessible to clients over the internet. Your VPC's default security groups are automatically assigned to your endpoint.
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
Note
This property can only be set when EndpointType is set to VPC and it is only valid in the UpdateServer API.
A list of subnet IDs that are required to host your server endpoint in your VPC.
Note
This property can only be set when EndpointType is set to VPC .
The ID of the VPC endpoint.
Note
This property can only be set when EndpointType is set to VPC_ENDPOINT .
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
The VPC ID of the VPC in which a server's endpoint will be hosted.
Note
This property can only be set when EndpointType is set to VPC .
A list of security groups IDs that are available to attach to your server's endpoint.
Note
This property can only be set when EndpointType is set to VPC .
You can edit the SecurityGroupIds property in the UpdateServer API only if you are changing the EndpointType from PUBLIC or VPC_ENDPOINT to VPC . To change security groups associated with your server's VPC endpoint after creation, use the Amazon EC2 ModifyVpcEndpoint API.
The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.
Note
After March 31, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT in your AWS account if your account hasn't already done so before March 31, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT in your AWS account on or before March 31, 2021, you will not be affected. After this date, use EndpointType =``VPC`` .
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
It is recommended that you use VPC as the EndpointType . With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with EndpointType set to VPC_ENDPOINT .
The RSA private key as generated by the ssh-keygen -N "" -m PEM -f my-new-server-key command.
Warning
If you aren't planning to migrate existing users from an existing SFTP-enabled server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive.
For more information, see Change the host key for your SFTP-enabled server in the AWS Transfer Family User Guide .
Required when IdentityProviderType is set to AWS_DIRECTORY_SERVICE or API_GATEWAY . Accepts an array containing all of the information required to use a directory in AWS_DIRECTORY_SERVICE or invoke a customer-supplied authentication API, including the API Gateway URL. Not required when IdentityProviderType is set to SERVICE_MANAGED .
Provides the location of the service endpoint used to authenticate users.
Provides the type of InvocationRole used to authenticate the user account.
The identifier of the AWS Directory Service directory that you want to stop sharing.
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
Note
If you select FTPS , you must choose a certificate stored in AWS Certificate Manager (ACM) which will be used to identify your server when clients connect to it over FTPS.
If Protocol includes either FTP or FTPS , then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY .
If Protocol includes FTP , then AddressAllocationIds cannot be associated.
If Protocol is set only to SFTP , the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED .
Key-value pairs that can be used to group and search for servers.
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
The name assigned to the tag that you create.
Contains one or more values that you assigned to the key name you create.
dict
Response Syntax
{
'ServerId': 'string'
}
Response Structure
(dict) --
ServerId (string) --
The service-assigned ID of the server that is created.
Exceptions
Creates a user and associates them with an existing file transfer protocol-enabled server. You can only create and associate users with servers that have the IdentityProviderType set to SERVICE_MANAGED . Using parameters for CreateUser , you can specify the user name, set the home directory, store the user's public key, and assign the user's AWS Identity and Access Management (IAM) role. You can also optionally add a scope-down policy, and assign metadata with tags that can be used to group and search for users.
See also: AWS API Documentation
Request Syntax
response = client.create_user(
HomeDirectory='string',
HomeDirectoryType='PATH'|'LOGICAL',
HomeDirectoryMappings=[
{
'Entry': 'string',
'Target': 'string'
},
],
Policy='string',
PosixProfile={
'Uid': 123,
'Gid': 123,
'SecondaryGids': [
123,
]
},
Role='string',
ServerId='string',
SshPublicKeyBody='string',
Tags=[
{
'Key': 'string',
'Value': 'string'
},
],
UserName='string'
)
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory example is /bucket_name/home/mydirectory .
Logical directory mappings that specify what Amazon S3 or EFS paths and keys should be visible to your user and how you want to make them visible. You will need to specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or EFS path. If you only specify a target, it will be displayed as is. You will need to also make sure that your IAM role provides access to paths in Target . This value can only be set when HomeDirectoryType is set to LOGICAL .
The following is an Entry and Target pair example.
[ { "Entry": "your-personal-report.pdf", "Target": "/bucket3/customized-reports/${transfer:UserName}.pdf" } ]
In most cases, you can use this value instead of the scope-down policy to lock your user down to the designated home directory ("chroot "). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.
The following is an Entry and Target pair example for chroot .
[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
Note
If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry will be ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0 byte objects as place holders for your directory. If using the CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/ . Make sure that the end of the key name ends in a / for it to be considered a folder.
Represents an object that contains entries and targets for HomeDirectoryMappings .
Represents an entry and a target for HomeDirectoryMappings .
Represents the map target that is used in a HomeDirectorymapEntry .
A scope-down policy for your user so you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName} , ${Transfer:HomeDirectory} , and ${Transfer:HomeBucket} .
Note
This only applies when domain of ServerId is S3. EFS does not use scope down policy.
For scope-down policies, AWS Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.
For an example of a scope-down policy, see Example scope-down policy .
For more information, see AssumeRole in the AWS Security Token Service API Reference .
Specifies the full POSIX identity, including user ID (Uid ), group ID (Gid ), and any secondary groups IDs (SecondaryGids ), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in Amazon EFS determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The POSIX user ID used for all EFS operations by this user.
The POSIX group ID used for all EFS operations by this user.
The secondary POSIX group IDs used for all EFS operations by this user.
[REQUIRED]
Specifies the IAM role that controls your users' access to your Amazon S3 bucket or EFS file system. The policies attached to this role will determine the level of access you want to provide your users when transferring files into and out of your Amazon S3 bucket or EFS file system. The IAM role should also contain a trust relationship that allows the server to access your resources when servicing your users' transfer requests.
[REQUIRED]
A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
Key-value pairs that can be used to group and search for users. Tags are metadata attached to users for any purpose.
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
The name assigned to the tag that you create.
Contains one or more values that you assigned to the key name you create.
[REQUIRED]
A unique string that identifies a user and is associated with a as specified by the ServerId . This user name must be a minimum of 3 and a maximum of 100 characters long. The following are valid characters: a-z, A-Z, 0-9, underscore '_', hyphen '-', period '.', and at sign '@'. The user name can't start with a hyphen, period, or at sign.
dict
Response Syntax
{
'ServerId': 'string',
'UserName': 'string'
}
Response Structure
(dict) --
ServerId (string) --
The ID of the server that the user is attached to.
UserName (string) --
A unique string that identifies a user account associated with a server.
Exceptions
Allows you to delete the access specified in the ServerID and ExternalID parameters.
See also: AWS API Documentation
Request Syntax
response = client.delete_access(
ServerId='string',
ExternalId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that has this user assigned.
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "*YourGroupName* *"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
None
Exceptions
Deletes the file transfer protocol-enabled server that you specify.
No response returns from this operation.
See also: AWS API Documentation
Request Syntax
response = client.delete_server(
ServerId='string'
)
[REQUIRED]
A unique system-assigned identifier for a server instance.
Exceptions
Deletes a user's Secure Shell (SSH) public key.
No response is returned from this operation.
See also: AWS API Documentation
Request Syntax
response = client.delete_ssh_public_key(
ServerId='string',
SshPublicKeyId='string',
UserName='string'
)
[REQUIRED]
A system-assigned unique identifier for a file transfer protocol-enabled server instance that has the user assigned to it.
[REQUIRED]
A unique identifier used to reference your user's specific SSH key.
[REQUIRED]
A unique string that identifies a user whose public key is being deleted.
None
Exceptions
Deletes the user belonging to a file transfer protocol-enabled server you specify.
No response returns from this operation.
Note
When you delete a user from a server, the user's information is lost.
See also: AWS API Documentation
Request Syntax
response = client.delete_user(
ServerId='string',
UserName='string'
)
[REQUIRED]
A system-assigned unique identifier for a server instance that has the user assigned to it.
[REQUIRED]
A unique string that identifies a user that is being deleted from a server.
None
Exceptions
Describes the access that is assigned to the specific file transfer protocol-enabled server, as identified by its ServerId property and its ExternalID .
The response from this call returns the properties of the access that is associated with the ServerId value that was specified.
See also: AWS API Documentation
Request Syntax
response = client.describe_access(
ServerId='string',
ExternalId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that has this access assigned.
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "*YourGroupName* *"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
dict
Response Syntax
{
'ServerId': 'string',
'Access': {
'HomeDirectory': 'string',
'HomeDirectoryMappings': [
{
'Entry': 'string',
'Target': 'string'
},
],
'HomeDirectoryType': 'PATH'|'LOGICAL',
'Policy': 'string',
'PosixProfile': {
'Uid': 123,
'Gid': 123,
'SecondaryGids': [
123,
]
},
'Role': 'string',
'ExternalId': 'string'
}
}
Response Structure
(dict) --
ServerId (string) --
A system-assigned unique identifier for a server that has this access assigned.
Access (dict) --
The external ID of the server that the access is attached to.
HomeDirectory (string) --
Specifies the landing directory (or folder), which is the location that files are written to or read from in an Amazon S3 bucket, for the described access.
HomeDirectoryMappings (list) --
Specifies the logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to the associated access and how you want to make them visible. You must specify the "Entry " and "Target " pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or EFS path. If you only specify a target, it will be displayed as is. You also must ensure that your AWS Identity and Access Management (IAM) role provides access to paths in Target .
In most cases, you can use this value instead of the scope-down policy to lock down the associated access to the designated home directory ("chroot "). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.
(dict) --
Represents an object that contains entries and targets for HomeDirectoryMappings .
Entry (string) --
Represents an entry and a target for HomeDirectoryMappings .
Target (string) --
Represents the map target that is used in a HomeDirectorymapEntry .
HomeDirectoryType (string) --
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH , the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it to LOGICAL , you must provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
Policy (string) --
A scope-down policy for your user so that you can use the same AWS Identity and Access Management (IAM) role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName} , ${Transfer:HomeDirectory} , and ${Transfer:HomeBucket} .
PosixProfile (dict) --
The full POSIX identity, including user ID (Uid ), group ID (Gid ), and any secondary groups IDs (SecondaryGids ), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
Uid (integer) --
The POSIX user ID used for all EFS operations by this user.
Gid (integer) --
The POSIX group ID used for all EFS operations by this user.
SecondaryGids (list) --
The secondary POSIX group IDs used for all EFS operations by this user.
Role (string) --
The IAM role that controls access to your Amazon S3 bucket from the specified associated access. The policies attached to this role will determine the level of access that you want to provide the associated access when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows a server to access your resources when servicing transfer requests for the associated access.
ExternalId (string) --
A unique identifier that might be required when you assume a role in another account. Think of the ExternalID as a group membership mechanism that uses a unique identifier (often a SID, but could be a group name or something else) as a basis. If the administrator of the account to which the role belongs provided you with an external ID, then provide that value in the ExternalId parameter. A cross-account role is usually set up to trust everyone in an account. Therefore, the administrator of the trusting account might send an external ID to the administrator of the trusted account. That way, only someone with the ID can assume the role, rather than everyone in the account.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
Exceptions
Describes the security policy that is attached to your file transfer protocol-enabled server. The response contains a description of the security policy's properties. For more information about security policies, see Working with security policies .
See also: AWS API Documentation
Request Syntax
response = client.describe_security_policy(
SecurityPolicyName='string'
)
[REQUIRED]
Specifies the name of the security policy that is attached to the server.
{
'SecurityPolicy': {
'Fips': True|False,
'SecurityPolicyName': 'string',
'SshCiphers': [
'string',
],
'SshKexs': [
'string',
],
'SshMacs': [
'string',
],
'TlsCiphers': [
'string',
]
}
}
Response Structure
An array containing the properties of the security policy.
Specifies whether this policy enables Federal Information Processing Standards (FIPS).
Specifies the name of the security policy that is attached to the server.
Specifies the enabled Secure Shell (SSH) cipher encryption algorithms in the security policy that is attached to the server.
Specifies the enabled SSH key exchange (KEX) encryption algorithms in the security policy that is attached to the server.
Specifies the enabled SSH message authentication code (MAC) encryption algorithms in the security policy that is attached to the server.
Specifies the enabled Transport Layer Security (TLS) cipher encryption algorithms in the security policy that is attached to the server.
Exceptions
Describes a file transfer protocol-enabled server that you specify by passing the ServerId parameter.
The response contains a description of a server's properties. When you set EndpointType to VPC, the response will contain the EndpointDetails .
See also: AWS API Documentation
Request Syntax
response = client.describe_server(
ServerId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server.
{
'Server': {
'Arn': 'string',
'Certificate': 'string',
'Domain': 'S3'|'EFS',
'EndpointDetails': {
'AddressAllocationIds': [
'string',
],
'SubnetIds': [
'string',
],
'VpcEndpointId': 'string',
'VpcId': 'string',
'SecurityGroupIds': [
'string',
]
},
'EndpointType': 'PUBLIC'|'VPC'|'VPC_ENDPOINT',
'HostKeyFingerprint': 'string',
'IdentityProviderDetails': {
'Url': 'string',
'InvocationRole': 'string',
'DirectoryId': 'string'
},
'IdentityProviderType': 'SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE',
'LoggingRole': 'string',
'Protocols': [
'SFTP'|'FTP'|'FTPS',
],
'SecurityPolicyName': 'string',
'ServerId': 'string',
'State': 'OFFLINE'|'ONLINE'|'STARTING'|'STOPPING'|'START_FAILED'|'STOP_FAILED',
'Tags': [
{
'Key': 'string',
'Value': 'string'
},
],
'UserCount': 123
}
}
Response Structure
An array containing the properties of a server with the ServerID you specified.
Specifies the unique Amazon Resource Name (ARN) of the server.
Specifies the ARN of the AWS Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS .
Specifies the domain of the storage system that is used for file transfers.
Specifies the virtual private cloud (VPC) endpoint settings that you configured for your server.
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
Note
This property can only be set when EndpointType is set to VPC and it is only valid in the UpdateServer API.
A list of subnet IDs that are required to host your server endpoint in your VPC.
Note
This property can only be set when EndpointType is set to VPC .
The ID of the VPC endpoint.
Note
This property can only be set when EndpointType is set to VPC_ENDPOINT .
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
The VPC ID of the VPC in which a server's endpoint will be hosted.
Note
This property can only be set when EndpointType is set to VPC .
A list of security groups IDs that are available to attach to your server's endpoint.
Note
This property can only be set when EndpointType is set to VPC .
You can edit the SecurityGroupIds property in the UpdateServer API only if you are changing the EndpointType from PUBLIC or VPC_ENDPOINT to VPC . To change security groups associated with your server's VPC endpoint after creation, use the Amazon EC2 ModifyVpcEndpoint API.
Defines the type of endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
Specifies the Base64-encoded SHA256 fingerprint of the server's host key. This value is equivalent to the output of the ssh-keygen -l -f my-new-server-key command.
Specifies information to call a customer-supplied authentication API. This field is not populated when the IdentityProviderType of a server is AWS_DIRECTORY_SERVICE or SERVICE_MANAGED .
Provides the location of the service endpoint used to authenticate users.
Provides the type of InvocationRole used to authenticate the user account.
The identifier of the AWS Directory Service directory that you want to stop sharing.
Specifies the mode of authentication method enabled for this service. A value of AWS_DIRECTORY_SERVICE means that you are providing access to Active Directory groups in AWS Managed Active Directory or Microsoft Active Directory in your on-premises environment or in AWS using AD Connectors. A value of SERVICE_MANAGED means that you are using this server to store and access user credentials within the service. A value of API_GATEWAY indicates that you have integrated an API Gateway endpoint that will be invoked for authenticating your user into the service.
Specifies the AWS Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging for Amazon S3 or Amazon EFS events. When set, user activity can be viewed in your CloudWatch logs.
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
Specifies the name of the security policy that is attached to the server.
Specifies the unique system-assigned identifier for a server that you instantiate.
Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.
The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.
Specifies the key-value pairs that you can use to search for and group servers that were assigned to the server that was described.
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
The name assigned to the tag that you create.
Contains one or more values that you assigned to the key name you create.
Specifies the number of users that are assigned to a server you specified with the ServerId .
Exceptions
Describes the user assigned to the specific file transfer protocol-enabled server, as identified by its ServerId property.
The response from this call returns the properties of the user associated with the ServerId value that was specified.
See also: AWS API Documentation
Request Syntax
response = client.describe_user(
ServerId='string',
UserName='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that has this user assigned.
[REQUIRED]
The name of the user assigned to one or more servers. User names are part of the sign-in credentials to use the AWS Transfer Family service and perform file transfer tasks.
dict
Response Syntax
{
'ServerId': 'string',
'User': {
'Arn': 'string',
'HomeDirectory': 'string',
'HomeDirectoryMappings': [
{
'Entry': 'string',
'Target': 'string'
},
],
'HomeDirectoryType': 'PATH'|'LOGICAL',
'Policy': 'string',
'PosixProfile': {
'Uid': 123,
'Gid': 123,
'SecondaryGids': [
123,
]
},
'Role': 'string',
'SshPublicKeys': [
{
'DateImported': datetime(2015, 1, 1),
'SshPublicKeyBody': 'string',
'SshPublicKeyId': 'string'
},
],
'Tags': [
{
'Key': 'string',
'Value': 'string'
},
],
'UserName': 'string'
}
}
Response Structure
(dict) --
ServerId (string) --
A system-assigned unique identifier for a server that has this user assigned.
User (dict) --
An array containing the properties of the user account for the ServerID value that you specified.
Arn (string) --
Specifies the unique Amazon Resource Name (ARN) for the user that was requested to be described.
HomeDirectory (string) --
Specifies the landing directory (or folder), which is the location that files are written to or read from in an Amazon S3 bucket, for the described user. An example is * your-Amazon-S3-bucket-name>/home/username * .
HomeDirectoryMappings (list) --
Specifies the logical directory mappings that specify what Amazon S3 or EFS paths and keys should be visible to your user and how you want to make them visible. You will need to specify the "Entry " and "Target " pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or EFS path. If you only specify a target, it will be displayed as is. You will need to also make sure that your AWS Identity and Access Management (IAM) role provides access to paths in Target .
In most cases, you can use this value instead of the scope-down policy to lock your user down to the designated home directory ("chroot "). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.
(dict) --
Represents an object that contains entries and targets for HomeDirectoryMappings .
Entry (string) --
Represents an entry and a target for HomeDirectoryMappings .
Target (string) --
Represents the map target that is used in a HomeDirectorymapEntry .
HomeDirectoryType (string) --
Specifies the type of landing directory (folder) you mapped for your users to see when they log into the file transfer protocol-enabled server. If you set it to PATH , the user will see the absolute Amazon S3 bucket or EFS paths as is in their file transfer protocol clients. If you set it LOGICAL , you will need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 or EFS paths visible to your users.
Policy (string) --
Specifies the name of the policy in use for the described user.
PosixProfile (dict) --
Specifies the full POSIX identity, including user ID (Uid ), group ID (Gid ), and any secondary groups IDs (SecondaryGids ), that controls your users' access to your Amazon Elastic File System (Amazon EFS) file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
Uid (integer) --
The POSIX user ID used for all EFS operations by this user.
Gid (integer) --
The POSIX group ID used for all EFS operations by this user.
SecondaryGids (list) --
The secondary POSIX group IDs used for all EFS operations by this user.
Role (string) --
The IAM role that controls your users' access to your Amazon S3 bucket. The policies attached to this role will determine the level of access you want to provide your users when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows a server to access your resources when servicing your users' transfer requests.
SshPublicKeys (list) --
Specifies the public key portion of the Secure Shell (SSH) keys stored for the described user.
(dict) --
Provides information about the public Secure Shell (SSH) key that is associated with a user account for the specific file transfer protocol-enabled server (as identified by ServerId ). The information returned includes the date the key was imported, the public key contents, and the public key ID. A user can store more than one SSH public key associated with their user name on a specific server.
DateImported (datetime) --
Specifies the date that the public key was added to the user account.
SshPublicKeyBody (string) --
Specifies the content of the SSH public key as specified by the PublicKeyId .
SshPublicKeyId (string) --
Specifies the SshPublicKeyId parameter contains the identifier of the public key.
Tags (list) --
Specifies the key-value pairs for the user requested. Tag can be used to search for and group users for a variety of purposes.
(dict) --
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
Key (string) --
The name assigned to the tag that you create.
Value (string) --
Contains one or more values that you assigned to the key name you create.
UserName (string) --
Specifies the name of the user that was requested to be described. User names are used for authentication purposes. This is the string that will be used by your user when they log in to your server.
Exceptions
Generate a presigned url given a client, its method, and arguments
The presigned url
Create a paginator for an operation.
Returns an object that can wait for some condition.
Adds a Secure Shell (SSH) public key to a user account identified by a UserName value assigned to the specific file transfer protocol-enabled server, identified by ServerId .
The response returns the UserName value, the ServerId value, and the name of the SshPublicKeyId .
See also: AWS API Documentation
Request Syntax
response = client.import_ssh_public_key(
ServerId='string',
SshPublicKeyBody='string',
UserName='string'
)
[REQUIRED]
A system-assigned unique identifier for a server.
[REQUIRED]
The public key portion of an SSH key pair.
[REQUIRED]
The name of the user account that is assigned to one or more servers.
dict
Response Syntax
{
'ServerId': 'string',
'SshPublicKeyId': 'string',
'UserName': 'string'
}
Response Structure
(dict) --
Identifies the user, the server they belong to, and the identifier of the SSH public key associated with that user. A user can have more than one key on each server that they are associated with.
ServerId (string) --
A system-assigned unique identifier for a server.
SshPublicKeyId (string) --
The name given to a public key by the system that was imported.
UserName (string) --
A user name assigned to the ServerID value that you specified.
Exceptions
Lists the details for all the accesses you have on your server.
See also: AWS API Documentation
Request Syntax
response = client.list_accesses(
MaxResults=123,
NextToken='string',
ServerId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that has users assigned to it.
dict
Response Syntax
{
'NextToken': 'string',
'ServerId': 'string',
'Accesses': [
{
'HomeDirectory': 'string',
'HomeDirectoryType': 'PATH'|'LOGICAL',
'Role': 'string',
'ExternalId': 'string'
},
]
}
Response Structure
(dict) --
NextToken (string) --
When you can get additional results from the ListAccesses call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional accesses.
ServerId (string) --
A system-assigned unique identifier for a server that has users assigned to it.
Accesses (list) --
Returns the accesses and their properties for the ServerId value that you specify.
(dict) --
Lists the properties for one or more specified associated accesses.
HomeDirectory (string) --
Specifies the landing directory (or folder), which is the location that files are written to or read from in an Amazon S3 bucket, for the described access.
HomeDirectoryType (string) --
The type of landing directory (folder) that you want your users' home directory to be when they log in to the server. If you set it to PATH , the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it to LOGICAL , you must provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
Role (string) --
The AWS Identity and Access Management (IAM) role that controls access to your Amazon S3 bucket from the specified associated access. The policies attached to this role will determine the level of access that you want to provide the associated access when transferring files into and out of your Amazon S3 bucket or buckets. The IAM role should also contain a trust relationship that allows a server to access your resources when servicing transfer requests for the associated access.
ExternalId (string) --
A unique identifier that might be required when you assume a role in another account. Think of the ExternalID as a group membership mechanism that uses a unique identifier (often a SID, but could be a group name or something else) as a basis. If the administrator of the account to which the role belongs provided you with an external ID, then provide that value in the ExternalId parameter. A cross-account role is usually set up to trust everyone in an account. Therefore, the administrator of the trusting account might send an external ID to the administrator of the trusted account. That way, only someone with the ID can assume the role, rather than everyone in the account.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
Exceptions
Lists the security policies that are attached to your file transfer protocol-enabled servers.
See also: AWS API Documentation
Request Syntax
response = client.list_security_policies(
MaxResults=123,
NextToken='string'
)
dict
Response Syntax
{
'NextToken': 'string',
'SecurityPolicyNames': [
'string',
]
}
Response Structure
(dict) --
NextToken (string) --
When you can get additional results from the ListSecurityPolicies operation, a NextToken parameter is returned in the output. In a following command, you can pass in the NextToken parameter to continue listing security policies.
SecurityPolicyNames (list) --
An array of security policies that were listed.
Exceptions
Lists the file transfer protocol-enabled servers that are associated with your AWS account.
See also: AWS API Documentation
Request Syntax
response = client.list_servers(
MaxResults=123,
NextToken='string'
)
dict
Response Syntax
{
'NextToken': 'string',
'Servers': [
{
'Arn': 'string',
'Domain': 'S3'|'EFS',
'IdentityProviderType': 'SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE',
'EndpointType': 'PUBLIC'|'VPC'|'VPC_ENDPOINT',
'LoggingRole': 'string',
'ServerId': 'string',
'State': 'OFFLINE'|'ONLINE'|'STARTING'|'STOPPING'|'START_FAILED'|'STOP_FAILED',
'UserCount': 123
},
]
}
Response Structure
(dict) --
NextToken (string) --
When you can get additional results from the ListServers operation, a NextToken parameter is returned in the output. In a following command, you can pass in the NextToken parameter to continue listing additional servers.
Servers (list) --
An array of servers that were listed.
(dict) --
Returns properties of a file transfer protocol-enabled server that was specified.
Arn (string) --
Specifies the unique Amazon Resource Name (ARN) for a server to be listed.
Domain (string) --
Specifies the domain of the storage system that is used for file transfers.
IdentityProviderType (string) --
Specifies the authentication method used to validate a user for a server that was specified. This can include Secure Shell (SSH), Active Directory groups, user name and password combinations, or your own custom authentication method.
EndpointType (string) --
Specifies the type of VPC endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
LoggingRole (string) --
Specifies the AWS Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging.
ServerId (string) --
Specifies the unique system assigned identifier for the servers that were listed.
State (string) --
Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.
The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.
UserCount (integer) --
Specifies the number of users that are assigned to a server you specified with the ServerId .
Exceptions
Lists all of the tags associated with the Amazon Resource Name (ARN) that you specify. The resource can be a user, server, or role.
See also: AWS API Documentation
Request Syntax
response = client.list_tags_for_resource(
Arn='string',
MaxResults=123,
NextToken='string'
)
[REQUIRED]
Requests the tags associated with a particular Amazon Resource Name (ARN). An ARN is an identifier for a specific AWS resource, such as a server, user, or role.
dict
Response Syntax
{
'Arn': 'string',
'NextToken': 'string',
'Tags': [
{
'Key': 'string',
'Value': 'string'
},
]
}
Response Structure
(dict) --
Arn (string) --
The ARN you specified to list the tags of.
NextToken (string) --
When you can get additional results from the ListTagsForResource call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional tags.
Tags (list) --
Key-value pairs that are assigned to a resource, usually for the purpose of grouping and searching for items. Tags are metadata that you define.
(dict) --
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
Key (string) --
The name assigned to the tag that you create.
Value (string) --
Contains one or more values that you assigned to the key name you create.
Exceptions
Lists the users for a file transfer protocol-enabled server that you specify by passing the ServerId parameter.
See also: AWS API Documentation
Request Syntax
response = client.list_users(
MaxResults=123,
NextToken='string',
ServerId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that has users assigned to it.
dict
Response Syntax
{
'NextToken': 'string',
'ServerId': 'string',
'Users': [
{
'Arn': 'string',
'HomeDirectory': 'string',
'HomeDirectoryType': 'PATH'|'LOGICAL',
'Role': 'string',
'SshPublicKeyCount': 123,
'UserName': 'string'
},
]
}
Response Structure
(dict) --
NextToken (string) --
When you can get additional results from the ListUsers call, a NextToken parameter is returned in the output. You can then pass in a subsequent command to the NextToken parameter to continue listing additional users.
ServerId (string) --
A system-assigned unique identifier for a server that the users are assigned to.
Users (list) --
Returns the user accounts and their properties for the ServerId value that you specify.
(dict) --
Returns properties of the user that you specify.
Arn (string) --
Provides the unique Amazon Resource Name (ARN) for the user that you want to learn about.
HomeDirectory (string) --
Specifies the location that files are written to or read from an Amazon S3 bucket for the user you specify by their ARN.
HomeDirectoryType (string) --
Specifies the type of landing directory (folder) you mapped for your users' home directory. If you set it to PATH , the user will see the absolute Amazon S3 bucket paths as is in their file transfer protocol clients. If you set it LOGICAL , you will need to provide mappings in the HomeDirectoryMappings for how you want to make Amazon S3 paths visible to your users.
Role (string) --
Specifies the role that is in use by this user. A role is an AWS Identity and Access Management (IAM) entity that, in this case, allows a file transfer protocol-enabled server to act on a user's behalf. It allows the server to inherit the trust relationship that enables that user to perform file operations to their Amazon S3 bucket.
Note
The IAM role that controls your users' access to your Amazon S3 bucket for servers with Domain=S3 , or your EFS file system for servers with Domain=EFS .
The policies attached to this role determine the level of access you want to provide your users when transferring files into and out of your S3 buckets or EFS file systems.
SshPublicKeyCount (integer) --
Specifies the number of SSH public keys stored for the user you specified.
UserName (string) --
Specifies the name of the user whose ARN was specified. User names are used for authentication purposes.
Exceptions
Changes the state of a file transfer protocol-enabled server from OFFLINE to ONLINE . It has no impact on a server that is already ONLINE . An ONLINE server can accept and process file transfer jobs.
The state of STARTING indicates that the server is in an intermediate state, either not fully able to respond, or not fully online. The values of START_FAILED can indicate an error condition.
No response is returned from this call.
See also: AWS API Documentation
Request Syntax
response = client.start_server(
ServerId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that you start.
Exceptions
Changes the state of a file transfer protocol-enabled server from ONLINE to OFFLINE . An OFFLINE server cannot accept and process file transfer jobs. Information tied to your server, such as server and user properties, are not affected by stopping your server.
Note
Stopping the server will not reduce or impact your file transfer protocol endpoint billing; you must delete the server to stop being billed.
The state of STOPPING indicates that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of STOP_FAILED can indicate an error condition.
No response is returned from this call.
See also: AWS API Documentation
Request Syntax
response = client.stop_server(
ServerId='string'
)
[REQUIRED]
A system-assigned unique identifier for a server that you stopped.
Exceptions
Attaches a key-value pair to a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities.
There is no response returned from this call.
See also: AWS API Documentation
Request Syntax
response = client.tag_resource(
Arn='string',
Tags=[
{
'Key': 'string',
'Value': 'string'
},
]
)
[REQUIRED]
An Amazon Resource Name (ARN) for a specific AWS resource, such as a server, user, or role.
[REQUIRED]
Key-value pairs assigned to ARNs that you can use to group and search for resources by type. You can attach this metadata to user accounts for any purpose.
Creates a key-value pair for a specific resource. Tags are metadata that you can use to search for and group a resource for various purposes. You can apply tags to servers, users, and roles. A tag key can take more than one value. For example, to group servers for accounting purposes, you might create a tag called Group and assign the values Research and Accounting to that group.
The name assigned to the tag that you create.
Contains one or more values that you assigned to the key name you create.
None
Exceptions
If the IdentityProviderType of a file transfer protocol-enabled server is AWS_DIRECTORY_SERVICE or API_Gateway , tests whether your identity provider is set up successfully. We highly recommend that you call this operation to test your authentication method as soon as you create your server. By doing so, you can troubleshoot issues with the identity provider integration to ensure that your users can successfully use the service.
See also: AWS API Documentation
Request Syntax
response = client.test_identity_provider(
ServerId='string',
ServerProtocol='SFTP'|'FTP'|'FTPS',
SourceIp='string',
UserName='string',
UserPassword='string'
)
[REQUIRED]
A system-assigned identifier for a specific server. That server's user authentication method is tested with a user name and password.
The type of file transfer protocol to be tested.
The available protocols are:
[REQUIRED]
The name of the user account to be tested.
dict
Response Syntax
{
'Response': 'string',
'StatusCode': 123,
'Message': 'string',
'Url': 'string'
}
Response Structure
(dict) --
Response (string) --
The response that is returned from your API Gateway.
StatusCode (integer) --
The HTTP status code that is the response from your API Gateway.
Message (string) --
A message that indicates whether the test was successful or not.
Url (string) --
The endpoint of the service used to authenticate a user.
Exceptions
Detaches a key-value pair from a resource, as identified by its Amazon Resource Name (ARN). Resources are users, servers, roles, and other entities.
No response is returned from this call.
See also: AWS API Documentation
Request Syntax
response = client.untag_resource(
Arn='string',
TagKeys=[
'string',
]
)
[REQUIRED]
The value of the resource that will have the tag removed. An Amazon Resource Name (ARN) is an identifier for a specific AWS resource, such as a server, user, or role.
[REQUIRED]
TagKeys are key-value pairs assigned to ARNs that can be used to group and search for resources by type. This metadata can be attached to resources for any purpose.
None
Exceptions
Allows you to update parameters for the access specified in the ServerID and ExternalID parameters.
See also: AWS API Documentation
Request Syntax
response = client.update_access(
HomeDirectory='string',
HomeDirectoryType='PATH'|'LOGICAL',
HomeDirectoryMappings=[
{
'Entry': 'string',
'Target': 'string'
},
],
Policy='string',
PosixProfile={
'Uid': 123,
'Gid': 123,
'SecondaryGids': [
123,
]
},
Role='string',
ServerId='string',
ExternalId='string'
)
The landing directory (folder) for a user when they log in to the server using the client.
A HomeDirectory example is /directory_name/home/mydirectory .
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You must specify the Entry and Target pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it will be displayed as is. You also must ensure that your AWS Identity and Access Management (IAM) role provides access to paths in Target . This value can only be set when HomeDirectoryType is set to LOGICAL .
The following is an Entry and Target pair example.
[ { "Entry": "your-personal-report.pdf", "Target": "/bucket3/customized-reports/${transfer:UserName}.pdf" } ]
In most cases, you can use this value instead of the scope-down policy to lock down your user to the designated home directory ("chroot "). To do this, you can set Entry to / and set Target to the HomeDirectory parameter value.
The following is an Entry and Target pair example for chroot .
[ { "Entry": "/", "Target": "/bucket_name/home/mydirectory" } ]
Note
If the target of a logical directory entry does not exist in Amazon S3 or Amazon EFS, the entry will be ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0-byte objects as place holders for your directory. If using the AWS CLI, use the s3api or efsapi call instead of s3 or efs so you can use the put-object operation. For example, you can use the following.
aws s3api put-object --bucket bucketname --key path/to/folder/
The end of the key name must end in a / for it to be considered a folder.
Required: No
Represents an object that contains entries and targets for HomeDirectoryMappings .
Represents an entry and a target for HomeDirectoryMappings .
Represents the map target that is used in a HomeDirectorymapEntry .
A scope-down policy for your user so that you can use the same IAM role across multiple users. This policy scopes down user access to portions of their Amazon S3 bucket. Variables that you can use inside this policy include ${Transfer:UserName} , ${Transfer:HomeDirectory} , and ${Transfer:HomeBucket} .
Note
This only applies when domain of ServerId is S3. Amazon EFS does not use scope down policy.
For scope-down policies, AWS Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.
For an example of a scope-down policy, see Example scope-down policy .
For more information, see AssumeRole in the AWS Security Token Service API Reference .
The full POSIX identity, including user ID (Uid ), group ID (Gid ), and any secondary groups IDs (SecondaryGids ), that controls your users' access to your Amazon EFS file systems. The POSIX permissions that are set on files and directories in your file system determine the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The POSIX user ID used for all EFS operations by this user.
The POSIX group ID used for all EFS operations by this user.
The secondary POSIX group IDs used for all EFS operations by this user.
[REQUIRED]
A system-assigned unique identifier for a server instance. This is the specific server that you added your user to.
[REQUIRED]
A unique identifier that is required to identify specific groups within your directory. The users of the group that you associate have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family. If you know the group name, you can view the SID values by running the following command using Windows PowerShell.
Get-ADGroup -Filter {samAccountName -like "*YourGroupName* *"} -Properties * | Select SamaccountName,ObjectSid
In that command, replace YourGroupName with the name of your Active Directory group.
The regex used to validate this parameter is a string of characters consisting of uppercase and lowercase alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
dict
Response Syntax
{
'ServerId': 'string',
'ExternalId': 'string'
}
Response Structure
(dict) --
ServerId (string) --
The ID of the server that the user is attached to.
ExternalId (string) --
The external ID of the group whose users have access to your Amazon S3 or Amazon EFS resources over the enabled protocols using AWS Transfer Family.
Exceptions
Updates the file transfer protocol-enabled server's properties after that server has been created.
The UpdateServer call returns the ServerId of the server you updated.
See also: AWS API Documentation
Request Syntax
response = client.update_server(
Certificate='string',
EndpointDetails={
'AddressAllocationIds': [
'string',
],
'SubnetIds': [
'string',
],
'VpcEndpointId': 'string',
'VpcId': 'string',
'SecurityGroupIds': [
'string',
]
},
EndpointType='PUBLIC'|'VPC'|'VPC_ENDPOINT',
HostKey='string',
IdentityProviderDetails={
'Url': 'string',
'InvocationRole': 'string',
'DirectoryId': 'string'
},
LoggingRole='string',
Protocols=[
'SFTP'|'FTP'|'FTPS',
],
SecurityPolicyName='string',
ServerId='string'
)
The Amazon Resource Name (ARN) of the AWS Certificate Manager (ACM) certificate. Required when Protocols is set to FTPS .
To request a new public certificate, see Request a public certificate in the AWS Certificate Manager User Guide .
To import an existing certificate into ACM, see Importing certificates into ACM in the AWS Certificate Manager User Guide .
To request a private certificate to use FTPS through private IP addresses, see Request a private certificate in the AWS Certificate Manager User Guide .
Certificates with the following cryptographic algorithms and key sizes are supported:
Note
The certificate must be a valid SSL/TLS X.509 version 3 certificate with FQDN or IP address specified and information about the issuer.
The virtual private cloud (VPC) endpoint settings that are configured for your server. With a VPC endpoint, you can restrict access to your server to resources only within your VPC. To control incoming internet traffic, you will need to associate one or more Elastic IP addresses with your server's endpoint.
A list of address allocation IDs that are required to attach an Elastic IP address to your server's endpoint.
Note
This property can only be set when EndpointType is set to VPC and it is only valid in the UpdateServer API.
A list of subnet IDs that are required to host your server endpoint in your VPC.
Note
This property can only be set when EndpointType is set to VPC .
The ID of the VPC endpoint.
Note
This property can only be set when EndpointType is set to VPC_ENDPOINT .
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
The VPC ID of the VPC in which a server's endpoint will be hosted.
Note
This property can only be set when EndpointType is set to VPC .
A list of security groups IDs that are available to attach to your server's endpoint.
Note
This property can only be set when EndpointType is set to VPC .
You can edit the SecurityGroupIds property in the UpdateServer API only if you are changing the EndpointType from PUBLIC or VPC_ENDPOINT to VPC . To change security groups associated with your server's VPC endpoint after creation, use the Amazon EC2 ModifyVpcEndpoint API.
The type of endpoint that you want your server to use. You can choose to make your server's endpoint publicly accessible (PUBLIC) or host it inside your VPC. With an endpoint that is hosted in a VPC, you can restrict access to your server and resources only within your VPC or choose to make it internet facing by attaching Elastic IP addresses directly to it.
Note
After March 31, 2021, you won't be able to create a server using EndpointType=VPC_ENDPOINT in your AWS account if your account hasn't already done so before March 31, 2021. If you have already created servers with EndpointType=VPC_ENDPOINT in your AWS account on or before March 31, 2021, you will not be affected. After this date, use EndpointType =``VPC`` .
For more information, see https://docs.aws.amazon.com/transfer/latest/userguide/create-server-in-vpc.html#deprecate-vpc-endpoint.
It is recommended that you use VPC as the EndpointType . With this endpoint type, you have the option to directly associate up to three Elastic IPv4 addresses (BYO IP included) with your server's endpoint and use VPC security groups to restrict traffic by the client's public IP address. This is not possible with EndpointType set to VPC_ENDPOINT .
The RSA private key as generated by ssh-keygen -N "" -m PEM -f my-new-server-key .
Warning
If you aren't planning to migrate existing users from an existing server to a new server, don't update the host key. Accidentally changing a server's host key can be disruptive.
For more information, see Change the host key for your SFTP-enabled server in the AWS Transfer Family User Guide .
An array containing all of the information required to call a customer's authentication API method.
Provides the location of the service endpoint used to authenticate users.
Provides the type of InvocationRole used to authenticate the user account.
The identifier of the AWS Directory Service directory that you want to stop sharing.
Specifies the file transfer protocol or protocols over which your file transfer protocol client can connect to your server's endpoint. The available protocols are:
Note
If you select FTPS , you must choose a certificate stored in AWS Certificate Manager (ACM) which will be used to identify your server when clients connect to it over FTPS.
If Protocol includes either FTP or FTPS , then the EndpointType must be VPC and the IdentityProviderType must be AWS_DIRECTORY_SERVICE or API_GATEWAY .
If Protocol includes FTP , then AddressAllocationIds cannot be associated.
If Protocol is set only to SFTP , the EndpointType can be set to PUBLIC and the IdentityProviderType can be set to SERVICE_MANAGED .
[REQUIRED]
A system-assigned unique identifier for a server instance that the user account is assigned to.
dict
Response Syntax
{
'ServerId': 'string'
}
Response Structure
(dict) --
ServerId (string) --
A system-assigned unique identifier for a server that the user account is assigned to.
Exceptions
Assigns new properties to a user. Parameters you pass modify any or all of the following: the home directory, role, and policy for the UserName and ServerId you specify.
The response returns the ServerId and the UserName for the updated user.
See also: AWS API Documentation
Request Syntax
response = client.update_user(
HomeDirectory='string',
HomeDirectoryType='PATH'|'LOGICAL',
HomeDirectoryMappings=[
{
'Entry': 'string',
'Target': 'string'
},
],
Policy='string',
PosixProfile={
'Uid': 123,
'Gid': 123,
'SecondaryGids': [
123,
]
},
Role='string',
ServerId='string',
UserName='string'
)
Specifies the landing directory (folder) for a user when they log in to the server using their file transfer protocol client.
An example is your-Amazon-S3-bucket-name>/home/username .
Logical directory mappings that specify what Amazon S3 or Amazon EFS paths and keys should be visible to your user and how you want to make them visible. You will need to specify the "Entry " and "Target " pair, where Entry shows how the path is made visible and Target is the actual Amazon S3 or Amazon EFS path. If you only specify a target, it will be displayed as is. You will need to also make sure that your IAM role provides access to paths in Target . The following is an example.
'[ "/bucket2/documentation", { "Entry": "your-personal-report.pdf", "Target": "/bucket3/customized-reports/${transfer:UserName}.pdf" } ]'
In most cases, you can use this value instead of the scope-down policy to lock down your user to the designated home directory ("chroot "). To do this, you can set Entry to '/' and set Target to the HomeDirectory parameter value.
Note
If the target of a logical directory entry does not exist in Amazon S3 or EFS, the entry will be ignored. As a workaround, you can use the Amazon S3 API or EFS API to create 0-byte objects as place holders for your directory. If using the AWS CLI, use the s3api or efsapi call instead of s3 efs so you can use the put-object operation. For example, you use the following: aws s3api put-object --bucket bucketname --key path/to/folder/ . Make sure that the end of the key name ends in a / for it to be considered a folder.
Represents an object that contains entries and targets for HomeDirectoryMappings .
Represents an entry and a target for HomeDirectoryMappings .
Represents the map target that is used in a HomeDirectorymapEntry .
Allows you to supply a scope-down policy for your user so you can use the same IAM role across multiple users. The policy scopes down user access to portions of your Amazon S3 bucket. Variables you can use inside this policy include ${Transfer:UserName} , ${Transfer:HomeDirectory} , and ${Transfer:HomeBucket} .
Note
For scope-down policies, AWS Transfer Family stores the policy as a JSON blob, instead of the Amazon Resource Name (ARN) of the policy. You save the policy as a JSON blob and pass it in the Policy argument.
For an example of a scope-down policy, see Creating a scope-down policy .
For more information, see AssumeRole in the AWS Security Token Service API Reference .
Specifies the full POSIX identity, including user ID (Uid ), group ID (Gid ), and any secondary groups IDs (SecondaryGids ), that controls your users' access to your Amazon Elastic File Systems (Amazon EFS). The POSIX permissions that are set on files and directories in your file system determines the level of access your users get when transferring files into and out of your Amazon EFS file systems.
The POSIX user ID used for all EFS operations by this user.
The POSIX group ID used for all EFS operations by this user.
The secondary POSIX group IDs used for all EFS operations by this user.
[REQUIRED]
A system-assigned unique identifier for a server instance that the user account is assigned to.
[REQUIRED]
A unique string that identifies a user and is associated with a server as specified by the ServerId . This user name must be a minimum of 3 and a maximum of 100 characters long. The following are valid characters: a-z, A-Z, 0-9, underscore '_', hyphen '-', period '.', and at sign '@'. The user name can't start with a hyphen, period, or at sign.
dict
Response Syntax
{
'ServerId': 'string',
'UserName': 'string'
}
Response Structure
(dict) --
UpdateUserResponse returns the user name and identifier for the request to update a user's properties.
ServerId (string) --
A system-assigned unique identifier for a server instance that the user account is assigned to.
UserName (string) --
The unique identifier for a user that is assigned to a server instance that was specified in the request.
Exceptions
The available paginators are:
paginator = client.get_paginator('list_servers')
Creates an iterator that will paginate through responses from Transfer.Client.list_servers().
See also: AWS API Documentation
Request Syntax
response_iterator = paginator.paginate(
PaginationConfig={
'MaxItems': 123,
'PageSize': 123,
'StartingToken': 'string'
}
)
A dictionary that provides parameters to control pagination.
The total number of items to return. If the total number of items available is more than the value specified in max-items then a NextToken will be provided in the output that you can use to resume pagination.
The size of each page.
A token to specify where to start paginating. This is the NextToken from a previous response.
{
'Servers': [
{
'Arn': 'string',
'Domain': 'S3'|'EFS',
'IdentityProviderType': 'SERVICE_MANAGED'|'API_GATEWAY'|'AWS_DIRECTORY_SERVICE',
'EndpointType': 'PUBLIC'|'VPC'|'VPC_ENDPOINT',
'LoggingRole': 'string',
'ServerId': 'string',
'State': 'OFFLINE'|'ONLINE'|'STARTING'|'STOPPING'|'START_FAILED'|'STOP_FAILED',
'UserCount': 123
},
]
}
Response Structure
An array of servers that were listed.
Returns properties of a file transfer protocol-enabled server that was specified.
Specifies the unique Amazon Resource Name (ARN) for a server to be listed.
Specifies the domain of the storage system that is used for file transfers.
Specifies the authentication method used to validate a user for a server that was specified. This can include Secure Shell (SSH), Active Directory groups, user name and password combinations, or your own custom authentication method.
Specifies the type of VPC endpoint that your server is connected to. If your server is connected to a VPC endpoint, your server isn't accessible over the public internet.
Specifies the AWS Identity and Access Management (IAM) role that allows a server to turn on Amazon CloudWatch logging.
Specifies the unique system assigned identifier for the servers that were listed.
Specifies the condition of a server for the server that was described. A value of ONLINE indicates that the server can accept jobs and transfer files. A State value of OFFLINE means that the server cannot perform file transfer operations.
The states of STARTING and STOPPING indicate that the server is in an intermediate state, either not fully able to respond, or not fully offline. The values of START_FAILED or STOP_FAILED can indicate an error condition.
Specifies the number of users that are assigned to a server you specified with the ServerId .