VaultOne: Best Practices for File Transfers

This article outlines the key steps and best practices to validate and configure file transfer permissions within the VaultOne platform, ensuring a secure and reliable process.

Validating Transfer Permissions

Before initiating any file transfer, it’s essential to verify that the platform is configured to allow this type of operation for the specific asset.

In this example, we'll use a server as the reference.

To validate transfer permission:

  1. Login to VaultOne.
  2. Go to Servers > Computers.
  3. Select the server you want to configure.
  4. Click Actions and then click Edit.
  5. In the General tab, check the following settings:
    • Disable file transfer
    • Disable clipboard

Note:

Both options must be unchecked to enable file transfers.

Validating File Size Limits

VaultOne allows file transfers through the connector with the following limits:

  • Default limit: up to 100 MB
  • Extended limit (upon request): up to 1 GB

Note:

If you need to transfer files larger than 100 MB, please contact the VaultOne support team to request an increase in the limit.

Reviewing User Permissions

VaultOne respects the native permission model of the target server. The platform does not perform privilege escalation, which means:

Important: Even if file transfers are enabled, the user must have the necessary write permissions on the destination server.

Tips for Checking Permissions in Linux:

  • Access the server via SSH using VaultOne or another client.
  • Run the following command to check permissions:

ls -l /path/to/destination

  • If necessary, adjust the permissions:

chmod 755 /destination-folder
chown user:group /destination-folder

  • Ensure the user has write access to the intended directory.

Final Recommendations

To ensure secure and efficient file transfers:

  • Always verify platform-level configurations for file transfer.
  • Respect the file size limitations or contact support for adjustments.
  • Confirm the user has correct permissions on the target machine.

By following these best practices, you help ensure seamless file transfers and minimize access issues.

Back to Top

List IconIn this Article

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case