Skip to main content

2FA With SSH/SFTP Keys

You can implement external 2FA for a SSH/SFTP Key by using key types of ecdsa-sk or ed25519-sk.

This implements 2FA at the SSH/SFTP Key itself, outside of Files.com control but supported by Files.com. Whenever these SSH/SFTP Keys are used by a client app, the user will be prompted for a second authentication by their 2FA device. For example, if you created your key using a YubiKey, or compatible FIDO/U2F token, then you will be prompted for your YubiKey, or compatible FIDO/U2F token, whenever you try to use the private key. Once authenticated, the SSH/SFTP Key will be allowed to connect to Files.com SFTP.

When using these key types of ecdsa-sk or ed25519-sk to implement 2FA for the SSH/SFTP Key, the 2FA configuration is outside of Files.com control and cannot be reflected in the User settings. A user with this type of SSH/SFTP Key will not show as "2FA Enabled" because it is the Key that has 2FA enabled for it.

2FA for SSH/SFTP Keys cannot be implemented with other key types. Only key types of ecdsa-sk or ed25519-sk can be used to implement 2FA for SSH/SFTP keys.

SSH/SFTP Keys cannot be used with user accounts that require any other form of 2FA. You must configure 2FA to be bypassed for SFTP connections which will allow SSH/SFTP Keys to be used.

Support for ecdsa-sk and ed25519-sk type keys is intended for human users and never for automated processes or scripts. These keys are designed for the 2nd factor of authentication to be provided interactively by a human user.

Ready to Transform Your File Infrastructure?

Join over 4,000 organizations that trust Files.com to manage their mission-critical file flows. Start your free trial today and see why we're the #1 rated file orchestration platform.

No credit card required • 7-day free trial • Setup in minutes