- Docs
Encryption
This section documents encryption features and configuration in Files.com. Use it to meet security requirements and verify protocol compatibility. Use it to troubleshoot TLS, SSH, and cipher negotiation issues.
Encryption In Transit
Files.com encrypts network traffic for supported protocols. The protocol determines the mechanism.
HTTPS and FTPS use TLS. SFTP uses SSH.
Protocol setup details live under Services.
Ciphers And Compatibility
Cipher support affects which clients can connect. It also affects security posture.
See Ciphers for supported cipher suites.
Some environments require legacy options. Use them only for compatibility.
TLS/SSL Certificates
TLS relies on certificates for authentication. Certificate choices affect client trust.
See TLS/SSL Certificates for certificate handling and configuration.
File-Level Encryption With GPG (PGP)
GPG provides encryption and decryption at the file level. It supports PGP compatibility.
Use it when you need encrypted files at rest. This is independent of transport security.
See GPG (PGP) for keys, encryption, and decryption.
Automatic Key Management
Some workflows require managed key rotation and handling. Files.com supports this for GPG.
See Automatic Key Management for the supported behavior.
Example Use Cases
These examples map common uses where encryption comes into play to the Files.com features in this section.
Connecting A Legacy SFTP Client
Some older SFTP clients only support legacy cipher suites. This can block connectivity.
Start with Ciphers. Then review Optional Support for Legacy Insecure Ciphers for SFTP.
Troubleshooting A TLS Handshake Or Trust Error
TLS failures often come from certificate trust, hostname mismatch, or outdated client TLS support.
Use TLS/SSL Certificates to validate certificate configuration and expected client behavior.
Using A Custom Domain With A Customer-Managed Certificate
Custom domains change what hostname clients connect to. That can change certificate trust requirements.
Start with TLS/SSL Certificates. Then review Custom Domain for domain configuration details.
Encrypting Files For An External Partner (PGP/GPG)
Use GPG when a partner requires PGP-compatible encrypted files at rest. This is separate from transport encryption.
Start with GPG (PGP). Then use GPG Encryption and GPG Key Manager.
Decrypting Inbound Files For Processing
Use GPG decryption when partners deliver encrypted payloads. This is common for batch data exchange.
See GPG Decryption for how Files.com performs decryption and what inputs it expects.
Validating Which Cipher A Client Actually Uses
Client configuration and negotiation can result in a different cipher than expected.
Use Determining Which Ciphers Are Being Used to confirm the negotiated cipher before changing settings.
Get The File Orchestration Platform Today
4,000+ organizations trust Files.com for mission-critical file operations. Start your free trial now and build your first flow in 60 seconds.
No credit card required • 7-day free trial • Setup in minutes