Servers - MFT Server
In the main menu Server > Servers > MFT the MFT Server settings are managed.
The MFT Server provides built in support for hosting, inside VisualCron, for the following server types:
- SFTP
- FTP
The advantages of using VisualCron for this are:
- You are not dependent on any second installation of a third party server.
- VisualCron can react faster to any changes within the server through the MFT Trigger. The MFT Trigger can react on various events like file uploaded, download, folder created etc
- Through the Web Client, VisualCron users can manage the files (delete, upload, download)
Main > Servers > MFT Server

Allow MFT
Starts all predefined sub MFT servers (FTP, SFTP etc) at startup when this is checked.
Change server state
Turns on and of the selected MFT server.
MFT Servers list
This is the list of existing MFT servers (of any type).
Upon pressing the Add Servers icon, the Server settings dialog is opened.
Main > Servers > MFT Server > Servers > Server settings sub tab

Server name
The name of the MFT server.
Server type
Select MFT server type.
Permissions
The permissions grid controls who can access the specific MFT server. Click add to add new permission or double click/Edit to edit a permission.
Main > Servers > MFT Server > Servers > SFTP Endpoints sub tab

SFTP Endpoints list
An endpoint is a combination of IP and port the specific MFT server listens to. Click add to add a new MFT server.
SFTP Endpoint
Name
Optional name for the Endpoint for easier identification.
IP
The IP the Endpoint should listen too. 0.0.0.0 are all IPs on the network card.
Port
The port to use for the Endpoint. Default 22 for SFTP server.
Force compression
This property specifies whether the non-compressed transfer is supported by the server. When the property is set to true, CompressionAlgorithms[SSH_CA_NONE] is turned off and the server advertises only ZLIB compression (and not NONE).
Use UTF8
Text ...
Root folder
Base folder for the Endpoint files.
Default Credential
The Credential that should be used for accessing root folder (is needed on network drives).
Session timeout
Timeout for the session in milliseconds. If this property value is 0, the operation will expire after system-default timeout (which is 2 hrs 8 min for TCP stack).
Allow password authentication
If the user should be allowed to authenticate with his/her password.
Allow public-key authentication
If the user should be allowed to authenticate with his/her private key.
Allow keyboard-interactive authentication
If the user should be allowed to authenticate with keyboard-interactive authentication.
The user must authenticate using ANY of the above methods
Any of the allowed must be used for authentication.
The user must authenticate using ALL of the above methods
All allowed must be used for authentication.

Name
Optional name for the Endpoint for easier identification.
IP
The IP the Endpoint should listen too. 0.0.0.0 are all IPs on the network card.
Port
The port to use for the Endpoint. Default 21 for FTP server.
Root folder
Base folder for the Endpoint files.
Default Credential
The Credential that should be used for accessing root folder (is needed on network drives).
Passive mode IP
The IP used for passive mode.
Use UTF8
When checked UTF8 will be used for communication if available.
Session timeout
Timeout for the session in milliseconds. If this property value is 0, the operation will expire after system-default timeout (which is 2 hrs 8 min for TCP stack).
Outgoing speed limit
Speed in bytes per second for outgoing traffic. Default 0 is unlimited speed.
Incoming speed limit
Speed in bytes per second for incoming traffic. Default 0 is unlimited speed.
FTP Endpoint->Additional settings

X509 certificates
If you select TLS or SSL for security of the FTP endpoint you can optionally
Use passive mode
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20. In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.
Passive mode host
Enter IP or DNS name for resolving IP for passive mode or check Use default host for using the current IP of the server.
Use default host
Use the current IP of the server.
Use custom port range
Enter any port range for incoming Passive connections. If not checked - random ports will be used.
Main > Settings > MFT Server > Users sub tab

Users list
This is the list of MFT users. A MFT user can be linked to an existing VC user or be specific for MFT server only.
Upon pressing the Add Users icon, the User settings dialog is opened.
Main > Settings > MFT Server > Users > Main settings sub tab
Link to VC User
It is possible to link a VC user to a MFT user or use a specific user account just for MFT. When link is selected it will be using the username and password for the specific VC user.
Login
Unless linked to VC user you enter the username here.
Password
Unless linked to VC user you enter the password here.
Show password
Shows the entered password.
Name
Unless linked to VC user you enter the name here.
Unless linked to VC user you enter the email here.
Main > Settings > MFT Server > Users > Options sub tab

Base folder
Startup folder for the user.
Credentials
To control a remote computer you may need to use a Credential. The Credential must match the user name and password of the user that you want to login for. Select a Credential in the combo box or click the Settings icon to open Manage credentials in order to add or edit Credentials.
Outgoing speed limit
These are the maximum number of bytes per second for outgoing transfer. 0 is unlimited.
Incoming speed limit
These are the maximum number of bytes per second for incoming transfer. 0 is unlimited.
Private key
The private key used for the connection
Private key password
The private key password used for the connection.
Test key
Text ...
Main > Settings > MFT Server > Users > Permissions sub tab
Main > Servers > MFT Server > Servers > SFTP Endpoints > Advanced Settings > Main settings sub tab

The Advanced Settings dialog provides granular control over SFTP endpoint security and connection parameters. These settings allow administrators to configure authentication requirements, manage encryption options, and fine-tune connection behavior for compliance and security requirements.
Basic Connection Settings
Name
The endpoint identifier name. This is a required field used to distinguish this endpoint in the configuration interface.
IP/Hostname
The connection address for this SFTP endpoint. Use the host selector to specify the IP address or hostname where the endpoint will listen for connections. This is a required field.
Port
The port number for the SFTP endpoint. Default is 22 for SFTP servers. This is a required field that specifies which TCP port the endpoint will listen on for incoming connections.
Root Directory
The root folder path for SFTP operations. This is a required field that defines the base directory for file transfers on this endpoint. Use the folder browser button to select a directory on the server.
Session Timeout
Timeout value for SFTP sessions in milliseconds. Default value is 360000 milliseconds (6 minutes). If set to 0, the system-default timeout will be used (typically 2 hours 8 minutes for TCP stack).
Port Management
Port Status
Displays whether the configured port is currently in use by another process on the system. This indicator helps identify potential port conflicts before starting the endpoint.
Firewall Status
Displays whether Windows Firewall currently allows incoming connections on the configured port. This status indicator shows if the port is permitted through the firewall.
Open/Close Port
Button to toggle firewall access for the configured port. Click to allow or deny the port in Windows Firewall. The system will display success or error messages for firewall operations.
Security Certificate
Certificate
The SSL/TLS certificate required for SSH connection establishment and encryption. This is a required field. Select a certificate from those defined in Global Certificates. The certificate must have a private key available for session authentication.
Security Options
Force Compression
When enabled, the server requires all data transfers to use compression (ZLIB algorithm). The server will not advertise support for uncompressed transfer mode (NONE compression algorithm), forcing all connecting clients to compress data during transmission. This reduces bandwidth usage but increases CPU utilization on both server and clients.
Compatibility Note
Some older SFTP clients may not support mandatory compression. Test with your client software before enabling this setting in production environments.
Treat Rename as Move
When enabled, SFTP rename operations are treated as move operations. This affects file operation behavior for certain SFTP clients and may be required for compatibility with specific client implementations.
Authentication Methods
The SFTP server supports three authentication methods that can be enabled individually or in combination:
Require password authentication
When checked, clients can authenticate using password credentials. The server will validate the provided password against the user's configured password.
Require public key authentication
When checked, clients can authenticate using private/public key pairs. The server validates the client's public key against the user's configured public key or authorized keys.
Require keyboard-interactive authentication
When checked, clients can complete keyboard-interactive authentication challenges. This method supports complex authentication scenarios including one-time passwords, challenge-response systems, and multi-prompt authentication flows.
Authentication Requirements
Choose how the enabled authentication methods should be applied:
The user must authenticate using ANY of the above methods
The user needs to successfully complete at least one of the enabled authentication methods. This provides flexibility for clients supporting different authentication types. For example, if both password and public key are enabled, the client can choose to use either method.
The user must authenticate using ALL of the above methods
The user must successfully complete all enabled authentication methods in sequence. This creates a multi-factor authentication requirement, significantly enhancing security by requiring multiple proof factors.
Multi-Factor Authentication
For high-security environments, enable multiple authentication methods and select "ALL of the above methods" to create true multi-factor authentication. For example, requiring both password AND public key authentication creates two-factor authentication (2FA) where users must provide both something they know (password) and something they have (private key). Ensure your SFTP clients support multi-method authentication before enabling this mode.
Main > Servers > MFT Server > Servers > SFTP Endpoints > Advanced Settings > Encryption Algorithms sub tab

This tab allows selection of symmetric encryption algorithms (ciphers) used for securing data transmission during SFTP sessions. The server and client negotiate the encryption algorithm during the SSH connection handshake.
Auto-negotiate encryption algorithms
When enabled (default setting), the server automatically advertises available encryption algorithms to connecting clients. The client and server will negotiate and select a mutually supported cipher, typically choosing the strongest available option. This is the recommended setting for most deployments.
Manual Algorithm Selection
Disable auto-negotiation to manually select specific encryption algorithms from the available list. Manual selection allows administrators to:
- Enforce specific security policies or compliance requirements
- Restrict algorithms for regulatory compliance (e.g., FIPS 140-2)
- Limit available ciphers for compatibility with specific client software
- Control encryption strength based on organizational security policies
Main > Servers > MFT Server > Servers > SFTP Endpoints > Advanced Settings > Key Exchange Algorithms sub tab

This tab allows selection of key exchange algorithms used during SSH connection establishment. Key exchange algorithms are used to securely establish shared encryption keys between the server and client without transmitting the key material over the network.
Use Strict Key Exchange
Dropdown option to control strict key exchange validation during SSH connection handshake. Available options:
- Disabled - Strict key exchange validation is turned off
- Enabled, not enforced (default) - Strict validation is enabled but not required
- Enabled, reject affected algorithms - Strict validation is enabled and algorithms that don't support it are rejected
- Required - Strict key exchange is mandatory for all connections
Strict key exchange provides enhanced security against certain downgrade attacks but may affect compatibility with older SSH clients.
Auto-negotiate key exchange algorithms
When enabled (default setting), the server automatically advertises available key exchange algorithms to connecting clients. The client and server negotiate and select a mutually supported method during the connection handshake. This is the recommended setting for most deployments.
Manual Algorithm Selection
Disable auto-negotiation to manually select specific key exchange algorithms from the available list. Manual selection is used for specific security policies, compliance requirements, or compatibility with particular client implementations.
Main > Servers > MFT Server > Servers > SFTP Endpoints > Advanced Settings > MAC Algorithms sub tab

This tab allows selection of Message Authentication Code (MAC) algorithms used for ensuring data integrity and authenticity during SFTP sessions. MAC algorithms verify that transmitted data has not been tampered with or corrupted during transmission.
Auto-negotiate MAC algorithms
When enabled (default setting), the server automatically advertises available MAC algorithms to connecting clients. The client and server negotiate and select a mutually supported algorithm during the SSH connection handshake. This is the recommended setting for most deployments.
Manual Algorithm Selection
Disable auto-negotiation to manually select specific MAC algorithms from the available list. Manual selection allows administrators to enforce specific security policies, meet compliance requirements, or ensure compatibility with particular client implementations.
Main > Servers > MFT Server > Servers > SFTP Endpoints > Advanced Settings > Public Key Algorithms sub tab

This tab allows selection of public key algorithms used for server host key authentication and client public key authentication. These algorithms verify the identity of both the server and clients during SSH connections.
Auto-negotiate public key algorithms
When enabled (default setting), the server automatically advertises available public key algorithms to connecting clients. The client and server negotiate and select a mutually supported algorithm for both host key verification and client authentication. This is the recommended setting for most deployments.
Manual Algorithm Selection
Disable auto-negotiation to manually select specific public key algorithms from the available list. Manual selection is used when:
- Specific security policies require particular algorithm types
- Compliance requirements mandate certain key algorithms
- Compatibility with specific client software requires algorithm restrictions
- Key size requirements need to be enforced for organizational security policies
Key Size Requirements
When using RSA-based public key algorithms, ensure that both server host keys and client keys meet minimum key size requirements. Modern security standards typically require at least 2048-bit RSA keys. For high-security environments, 3072-bit or 4096-bit RSA keys may be preferred. Consult your organization's security policies for specific requirements.