Cookie の設定を選択する

当社は、当社のサイトおよびサービスを提供するために必要な必須 Cookie および類似のツールを使用しています。当社は、パフォーマンス Cookie を使用して匿名の統計情報を収集することで、お客様が当社のサイトをどのように利用しているかを把握し、改善に役立てています。必須 Cookie は無効化できませんが、[カスタマイズ] または [拒否] をクリックしてパフォーマンス Cookie を拒否することはできます。

お客様が同意した場合、AWS および承認された第三者は、Cookie を使用して便利なサイト機能を提供したり、お客様の選択を記憶したり、関連する広告を含む関連コンテンツを表示したりします。すべての必須ではない Cookie を受け入れるか拒否するには、[受け入れる] または [拒否] をクリックしてください。より詳細な選択を行うには、[カスタマイズ] をクリックしてください。

Use AMS SSP to provision AWS Transfer Family in your AMS account

フォーカスモード
Use AMS SSP to provision AWS Transfer Family in your AMS account - AMS Advanced User Guide
このページはお客様の言語に翻訳されていません。 翻訳のリクエスト

Use AMS Self-Service Provisioning (SSP) mode to access AWS Transfer Family (Transfer Family) capabilities directly in your AMS managed account. AWS Transfer Family is a fully managed AWS service that enables you to transfer files over Secure File Transfer Protocol (SFTP), into and out of Amazon Simple Storage Service (Amazon S3) storage. SFTP is also known as Secure Shell (SSH) File Transfer Protocol. SFTP is used in data exchange workflows across different industries such as financial services, healthcare, advertising, and retail, among others.

With AWS SFTP, you get access to an SFTP server in AWS without the need to run any server infrastructure. You can use this service to migrate your SFTP-based workflows to AWS while maintaining your end users' clients and configurations as is. You first associate your hostname with the SFTP server endpoint, then add your users and provision them with the right level of access. After you do, your users' transfer requests are serviced directly out of your AWS SFTP server endpoint. To learn more, see AWS Transfer for SFTP, also Create an SFTP-enabled server.

AWS Transfer for SFTP in AWS Managed Services FAQs

Common questions and answers:

Q: How do I request access to AWS Transfer for SFTP in my AMS account?

Request access to AWS Transfer for SFTP by submitting an RFC with the Management | AWS service | Self-provisioned service | Add change type (ct-1w8z66n899dct). Through this RFC the following IAM roles, and a policy, are provisioned in your account:

  • customer_transfer_author_role. This role is designed for you to manage the SFTP service through the console.

  • customer_transfer_sftp_server_logging_role. This role is designed to be attached on the SFTP Server. It allows the SFTP server to pull logs into CloudWatch.

  • customer_transfer_sftp_user_role. This role is designed to be attached on the SFTP users. It allows the SFTP Users to interact with the S3 bucket.

  • policy customer_transfer_scope_down_policy. This policy is a scope-down policy that can be applied to the SFTP User to limit their access on the S3 bucket to their home folders.

  • customer_transfer_sftp_efs_user_role. This role is designed to be attached on the SFTP users. It allows the SFTP Users to interact with the EFS file system.

After it's provisioned in your account, you must onboard the roles in your federation solution.

Q: What are the restrictions to using AWS Transfer for SFTP in my AMS account?

AWS Transfer for SFTP configuration is limited to resources without "AMS-" or "MC-" prefixes to prevent any modifications to AMS infrastructure.

Q: What are the prerequisites or dependencies to using AWS Transfer for SFTP in my AMS account?

このページの内容

プライバシーサイト規約Cookie の設定
© 2025, Amazon Web Services, Inc. or its affiliates.All rights reserved.