NEWS YOU CAN USE FROM VANDYKE SOFTWARE
This month we focus on how to tailor file transfer for access for different groups in your organization. SecureFX® and VShell offer role-based control of file access and transfer privileges for multiple users and groups when providing secure file transfer to employees, business partners, and customers.
Maintenance releases are now available for SecureCRT® 4.0.4, CRT 4.0.4, SecureFX 2.1.3, and Entunnel 1.0.3.
1. Key Features - Take Control of File Transfer with VShell
File transfer solutions based on SecureFX and the VShell server provide administrators with the ability to control access privileges based on user accounts and group membership. Implementing role-based control of secure file transfers with Access Control Lists (ACLs) and multiple root folders is a powerful way to leverage existing Windows user and group access privileges.
The access control list support in the VShell Control Panel lets you grant access to your server on a user or group basis. For each user or group, you can allow or deny access to SFTP (Secure Shell File Transfer Protocol) as well as shell access and port forwarding.
Administrators typically need complete access. But Kathy, a software developer, only needs to get to source code and testing areas. Jim in accounting needs access to accounting files, and Steve focuses on marketing graphics.
Using ACLs, the SFTP subsystem can be enabled or disabled for any or all of these individuals. File transfer privileges might be allowed for all these employees except clerical staff. Kathy can be given SFTP, shell access, and port forwarding privileges, while Jim and Steve can be granted access only to SFTP. An SFTP root folder can be specified for SFTP connections. Users cannot access folders above the specified SFTP root.
VShell adds an additional level of control to SFTP by providing the ability to define multiple SFTP roots. This feature allows administrators to define different access points for each individual user or group in the ACL. The user is provided with a virtual directory that can include files and folders, even if they are located on different drives on the server.
Internally, development, accounting, and marketing can each be assigned different root access points. When a Jim, a member of the accounting department, connects to the server with SecureFX, only the folders to which he has access are displayed. To extend the network, customers, suppliers, and other business partners can also be given unique root access points and their own virtual directory.
File transfer with SecureFX and VShell gives you tools to implement better security and more precise control over users and resources. Administrators can give partners and employees secure access to only the resources they need, improving network security and protecting the confidentiality of data. With multiple SFTP roots, there is no need to physically change the location of files on the server or manage duplicate files in separate locations.
Read more about using SFTP and multiple SFTP root at:
Would you like to eliminate vulnerable passwords from automated file transfer sessions? You can do this by using public-key authentication with the SecureFX SFXCL command-line tool.
To find out how to use public-key authentication with SFXCL, go to:
Maintenance releases are now available for SecureCRT 4.0.4, CRT 4.0.4, SecureFX 2.1.3, and Entunnel 1.0.3.
You can download these releases at:
For quick access to previous official releases, go to:
VanDyke Software has posted an updated version of extended OpenSSH source code version 3.5p1 as a free download on our web site. These extensions support the Public Key Assistant feature in all secure VanDyke Software products, allowing end users to upload public keys to an OpenSSH server securely. If your organization uses OpenSSH servers, get the download today:
Here are direct links to download individual products:
Read a great book lately? Submit your recommendation to . If we publish your selection, we'll send you your choice of a VanDyke Software T-shirt or a free copy of SecureCRT.
This month's pick is "World Without Secrets," by Richard Hunter (John Wiley & Sons, 2002, ISBN 0471218162).
Was Scott McNealy, outspoken CEO of Sun Microsystems, right when he said the following? "You have zero privacy anyway. Get over it." Richard Hunter thinks so. In "World Without Secrets", the vice president of Security Research for GartnerG2 makes a solid argument that we are like frogs sitting in a pot of water that is being gradually heated to the boiling point. Our privacy is essentially going, going, gone and we just haven't gotten uncomfortable enough to realize we're being boiled alive. By the time we feel the heat, it's already too late.
Hunter points to the now familiar experience of connecting to Amazon.com's website and being presented with a set of recommendations, the status of our recent order, and our very own store. He relates the now famous incident of a car rental customer being "fined" by the rental company for speeding a fact they determined from data sent from the car's global positioning system. In chapters relating to streets, homes, cars, and software without secrets, the author develops a compelling argument that soon we will have no secrets left at all.
Hunter defines a "magic quadrant", a proprietary Gartner concept, to characterize all of us based on where we stand on the issue of personal privacy. The quadrants have two axes: the level of communal activism in the face of decreasing privacy and the degree to which value systems are shared between members of a group. The four quadrants are The Conscientious Objectors, The Engineered Society, The Lost & Lonely, and The Network Army. This last group, Hunter argues, has already manifested itself at protests of the 1999 World Trade Organization meeting in Seattle and the 2001 G8 meeting in Genoa, Italy.
Ultimately, "World Without Secrets" offers no suggestions for what to do in the face of diminishing privacy. Hunter is hardly an alarmist, offering both benign and frightening examples of how this ever-increasing level of personal information can be used or abused. For those who are already convinced that Scott McNealy is right, "World Without Secrets" is a validator. For those who have been wondering what all the fuss has been about privacy concerns over the past few years, the book is a real eye-opener.
"We're addicted to the convenience the uninterrupted flow
of commerce that goes with being instantly known everywhere. Every
addiction carries a price, including the addiction to frictionless lives."
VanDyke Company News is an opt-in mailing list. If you prefer not to receive e-mail like this from us, or need to change your e-mail address, go to:
with the following message in the body of your e-mail:
VanDyke Software, CRT, SecureCRT, SecureFX, Entunnel, AbsoluteFTP, and VShell are trademarks or registered trademarks of VanDyke Software, Inc. All other products and services mentioned are trademarks or registered trademarks of their respective companies.