Scroll to Top
  • Products & Solutions

    • Analytics & Big Data › 
      • Analytics & Big Data

        Analytics for business insights in a data driven world


      • Vertica Advanced Analytics Platform 

        The fastest, open, infrastructure-independent, advanced analytics SQL database

      • Cognitive Search & Knowledge Discovery › 
        • Cognitive Search & Knowledge Discovery

          Quickly attain key information with best-in-class cognitive search and discovery


        • IDOL 

          Securely access and analyze enterprise (and public) text, audio & video data

      • Security Analytics › 
        • Security Analytics

          Search and analysis to reduce the time to identify security threats


        • ArcSight Investigate 

          An intuitive hunt and investigation solution that decreases security incidents

        • ArcSight User Behavior Analytics (UBA) 

          Minimize the risk and impact of cyber attacks in real-time

      • IT Operations Analytics › 
        • IT Operations Analytics

          Leverage big data to optimize and make your IT processes more efficient


        • Operations Bridge Suite 

          Autonomous operations through a business lens

        • IT Service Management Automation Suite 

          Intelligent automation for service desk, configuration, and asset management

      • Big Data Platforms › 
        • Big Data Platforms

          Open, secure, high-performance platforms to build Big Data analytics stacks


        • ArcSight Data Platform (ADP) 

          A future-ready, open platform that transforms data chaos into security insight

        • Vertica 

          SQL analytics solution handling large amounts of data for big data analytics

        • Voltage SecureData for Hadoop 

          High-scale protection of sensitive data at rest, in motion, and in use across systems

    • Application Delivery Management › 
      • Application Delivery Management

        Accelerate delivery, and ensure quality and security at every stage of the app lifecycle


      • Project & Requirements Management › 
        • Project & Requirements Management

          Manage portfolio investments and requirements throughout the development process


        • Project & Portfolio Management (PPM) 

          Prioritize, deliver, and optimize portfolios that drive business success

        • Dimensions RM 

          Requirements management solution that provides end-to-end traceability of processes

      • Application Lifecycle Management › 
        • Application Lifecycle Management

          Develop quality software in less time with real-time collaboration, cross-tool and cross-project visibility, and enhanced reporting


        • ALM Octane 

          Comprehensive lifecycle management solution for high-quality application delivery

        • ALM Software 

          Unified platform for defining, managing, and automating activities and gaining insights

        • Quality Center 

          Integrated quality management to standardize testing and fix defects

        • Dimensions CM 

          Change and configuration management that streamlines development to release faster

        • Rhythm 

          Ensures Agile project success with effortless planning and tracking

        • DevOps Suite 

          Essential tools for Agile and DevOps teams to govern, test, and monitor applications

      • Functional Testing › 
        • Functional Testing

          Powerful test solutions for web, mobile, rich-client, and enterprise applications


        • Unified Functional Testing 

          Accelerate test automation and help developers and testers collaborate

        • StormRunner Functional 

          On-demand cross-platform functional testing coupled with in-depth analytics

        • LeanFT 

          Lightweight solution for continuous integration and testing

        • Mobile Center 

          Real device lab that helps build an app experience from real-world insights

        • Silk Test 

          Automated functional and regression testing for enterprise software applications

        • Silk WebDriver 

          Record, run, and export Selenium scripts for easy web and mobile testing

        • Service Virtualization 

          Create simulations and virtual services with pre-packaged wizards and protocols

        • DevOps Suite 

          Essential tools for Agile and DevOps teams to govern, test, and monitor applications

      • Performance Testing › 
        • Performance Testing

          Powerful, realistic load, stress, and performance testing at enterprise scale


        • LoadRunner 

          Generate real-life loads, and identify and diagnose problems to deploy with confidence

        • StormRunner Load 

          Plan, run, and scale performance tests in the cloud

        • Performance Center 

          Standardize processes, centralize resources, and build a Performance Center of Excellence

        • Silk Performer 

          Automated software load, stress, and performance testing in an open, sharable model

        • Service Virtualization 

          Create simulations and virtual services with pre-packaged wizards and protocols

        • DevOps Suite 

          Essential tools for Agile and DevOps teams to govern, test, and monitor applications

      • Application Security Testing › 
        • Application Security Testing

          Keep your applications secure with powerful security testing


        • Fortify Static Code Analyzer 

          Identifies security vulnerabilities in software throughout development

        • Fortify Webinspect 

          Provides comprehensive dynamic analysis of complex web applications and services

        • Fortify On Demand 

          Application Security as a managed service

        • Fortify Software Security Center 

          Gain valuable insight with a centralized management repository for scan results

      • Release Management › 
        • Release Management

          Automate deployment and orchestrate application releases to speed product delivery


        • Deployment Automation 

          Connect Dev and Ops by automating the deployment pipeline and reduce feedback time

        • Release Control 

          Centralized planning and control for the entire software release lifecycle

        • Hybrid Cloud Management 

          DevOps-driven, multi-cloud management, orchestration, and migration

      • Mainframe Development › 
        • Mainframe Development

          DevOps tools provide more efficiency and flexibility needed to meet business needs


        • ChangeMan ZMF 

          Builds packages of change artifacts to speed up mainframe application development

        • Enterprise Sync 

          Enable faster, efficient parallel development at scale

        • Enterprise Developer 

          A development environment that streamlines mainframe COBOL and PL/I activities

        • Enterprise Analyzer 

          Intelligence and analysis technology that provides insight into core processes

        • Verastream 

          Fuel mobile apps, cloud initiatives, process automation, and more

      • CORBA › 
        • CORBA

          Interoperability of systems across the enterprise


        • VisiBroker 

          Lets you retain your CORBA Investments with SOA Integration

        • Orbix 

          Enterprise CORBA technology for distribution at scale

        • Orbacus 

          A CORBA 2.6 compliant middleware supporting C++ and Java

        • OpenFusion 

          A comprehensive suite of CORBA products

    • Business Continuity › 
      • Business Continuity

        Always protected, always available–without the complexity and cost


      • Backup & Recovery › 
        • Backup & Recovery

          Predictive data protection across hybrid IT


        • Adaptive Backup and Recovery Suite 

          Predictive data protection solution across hybrid IT environments

        • Data Protector 

          Enterprise backup and disaster recovery software for files, applications, and VMs

        • Backup Navigator 

          Advanced analytics and reporting application for Data Protector environments

        • Connected MX 

          Cloud-based endpoint backup solution with file sync and share, and analytics

        • VM Explorer 

          VM backup and replication for VMware vSphere and Microsoft Hyper-V environments

        • Connected Backup 

          PC backup solution for data stored on end-user computers

      • High Availability & Disaster Recovery › 
        • High Availability & Disaster Recovery

          Keep your business running—no matter what


        • Cluster Services (OES) 

          Simplifies resource management on a Storage Area Network and increases availability

        • Business Continuity Clustering (OES) 

          Protects your key business systems against downtime and disaster

        • PlateSpin Forge 

          Provides cost-effective, all-in-one disaster recovery through a hardware appliance

        • PlateSpin Protect 

          Disaster Recovery that uses virtual infrastructure capacity to protect servers

        • GroupWise Disaster Recovery (Reload) 

          Backup and disaster recovery solution that ensures critical data is always available

    • COBOL › 
      • COBOL

        Start a new era of innovation. Innovate faster and with less risk


      • Development & Deployment › 
        • Development & Deployment

          Modernize COBOL and PL/I business applications using state-of-the-art tools


        • Visual COBOL › 
          • Visual COBOL

            Allow developers to modernize COBOL systems and to deploy COBOL to new platforms


          • Enterprise Developer 

            A development environment that streamlines mainframe COBOL and PL/I activities

        • Extend / AcuCOBOL-GT › 
          • Extend / AcuCOBOL-GT

            An Open Systems COBOL Compiler and Runtime System


          • AcuToWeb 

            Transforms your ACUCOBL-GT to deliver a powerful end user experience across devices

        • Net Express / Server Express 

          Development environments for COBOL that enable developers to produce enterprise apps

        • RM/COBOL 

          Provides a familiar environment to maintain and improve apps written in RM/COBOL

      • Application Analysis › 
        • Application Analysis

          Understand complex application portfolios with technical insight across applications


        • COBOL Analyzer 

          A code analysis and visualization tool that provides full oversight of code changes

        • Enterprise Analyzer › 
          • Enterprise Analyzer

            Intelligence and analysis technology that provides insight into core processes


          • Enterprise View 

            Capture, analyze, and measure the value, cost and risk of application portfolios

          • Business Rules Manager 

            Find hidden logic within portfolios and extend their value through re-use

      • Data Modernization › 
        • Data Modernization

          Data modernization tools that unlock business application value


        • Database Connectors 

          Store data within an RDBMS without changing application source code

        • Relativity 

          Make COBOL data contained within COBOL data files available to any reporting tool

        • Acu-XDBC 

          A data management system for Vision files

        • Acu-4GL 

          Transparent access from ACUCOBOL-GT to Relational Database Management Systems

    • Collaboration › 
      • Collaboration

        Build a productive, mobile workforce


      • Messaging & Team Collaboration › 
        • Messaging & Team Collaboration

          Helping teams work together via email, instant messaging, and secure file sharing


        • Enterprise Messaging 

          Email, IM, chat-based teamwork, anti-virus, anti-spam, disaster recovery, and more

        • GroupWise 

          Provides secure email, calendaring, and task management for today's mobile world

        • GroupWise Disaster Recovery 

          Backup and disaster recovery solution that ensures critical email is always available

        • Secure Messaging Gateway 

          Protect your network and messaging system from malware, viruses, and harmful content

        • Vibe 

          Provides secure team collaboration with document management and workflow features

        • Filr 

          Provides secure file access and sharing from any device

        • Open Workgroup Suite 

          Seven essential tools to build IT infrastructures, including secure file sharing

      • Mobility › 
        • Mobility

          True BYOD across your entire enterprise—from mobile to mainframe


        • Filr 

          Provides secure file access and sharing from any device

        • Micro Focus iPrint 

          Print across the enterprise and platforms from any device

        • ZENworks Mobile Workspace 

          Enables secure access to corporate data through users' mobile devices

        • Mobile Management 

          Secure and manage mobile devices your users want to work on–even personal devices

        • Access Manager 

          Provides single sign-on for enterprises and federation for cloud applications

        • Reflection Mobile 

          Run terminal emulation apps on your mobile device

        • Reflection ZFE 

          A zero-footprint terminal emulator that provides HTML5 access to applications

        • Advanced Authentication 

          Protect your sensitive information more securely with multi-factor authentication

      • File and Print Services › 
        • File and Print Services

          Delivering critical file, storage and print services to enterprises of all sizes


        • Open Enterprise Server 

          File, print, and storage services perfect for mixed IT environments

        • Filr 

          Provides secure file access and sharing from any device

        • Micro Focus iPrint 

          Print across the enterprise and platforms from any device

        • Open Workgroup Suite 

          Seven essential tools to build IT infrastructures, including secure file sharing

    • Information Management & Governance › 
      • Information Management & Governance

        Trusted, proven legal, compliance and privacy solutions


      • Information Archiving › 
        • Information Archiving

          Consolidate and govern information for legal, compliance, and mailbox management


        • Digital Safe 

          Cloud-based, scalable archiving for regulatory, legal, and investigative needs

        • Retain Unified Archiving 

          Archive all business communication for case assessment, search, and eDiscovery

      • Secure Content Management › 
        • Secure Content Management

          Securely meet regulatory, privacy, and jurisdictional retention requirements


        • Content Manager 

          Policy-based governance (ECM) software to meet regulatory and privacy requirements

        • ControlPoint 

          File analysis to discover, classify and automate policy on unstructured data

        • Structured Data Manager 

          Structured data archiving to retire outdated applications and reduce data footprint

      • eDiscovery › 
        • eDiscovery

          Identify, lock down, analyze, and prepare data for litigation and investigations


        • eDiscovery 

          Respond to litigation and investigations quickly, accurately, & cost-effectively

        • Legal Hold 

          Apply, enforce and manage information legal holds for litigation and investigations

      • File Analysis & Management › 
        • File Analysis & Management

          Automate data discovery, classification, and management of network file systems


        • ControlPoint 

          File analysis to discover, classify and automate policy on unstructured data

        • Micro Focus Storage Manager 

          Provides automated management of file storage for users and work groups

        • Micro Focus File Reporter 

          Discover what is being stored and who has access

        • File Management Suite 

          File Reporter and Storage Manager solution suite bundle

      • Search & Analytics › 
        • Search & Analytics

          Deliver information faster organization-wide with cognitive search and analytics


        • IDOL 

          Securely access and analyze enterprise (and public) text, audio & video data

    • IT Operations Management › 
      • IT Operations Management

        Accelerate your IT Operations to the speed of DevOps


      • ITOM Platform 

        Containerized microservices platform built into ITOM products

      • Operations Bridge 

        The first containerized, autonomous monitoring solution for hybrid IT

      • Service Management Automation 

        Engaging end-user experience and efficient service desk based on machine learning

      • Hybrid Cloud Management 

        DevOps driven, multi-cloud management, orchestration and migration

      • Network Operations Management 

        Automate and manage traditional, virtual, and software-defined networks

      • Data Center Automation 

        Automate provisioning, patching, and compliance across the data center

      • Data Protection 

        Predictive data protection across hybrid IT

    • Mainframe › 
      • Mainframe

        Modernize mainframe applications and data access using new tools and DevOps practices


      • Plan and Manage › 
        • Plan and Manage

          Plan, manage, optimize, and deliver Agile Enterprise portfolio with compliance


        • Atlas 

          A collaborative, flexible, Agile requirements and delivery platform

        • Dimensions RM 

          Requirements management solution providing end-to-end traceability of processes

        • Enterprise Analyzer › 
          • Enterprise Analyzer

            Intelligence and analysis technology that provides insight into core processes


          • Enterprise Viewer 

            Capture, analyze, and measure the value, cost and risk of application portfolios

          • Business Rules Manager 

            Find hidden logic within portfolios and extend their value through re-use

        • Rhythm 

          Ensures Agile project success with effortless Agile planning and tracking

      • Analyze › 
        • Analyze

          Comprehensive analysis solutions aimed at enterprise scale applications


        • Enterprise Analyzer 

          Intelligence and analysis technology that provides insight into core processes

        • Enterprise View 

          Capture, analyze, and measure the value, cost and risk of application portfolios

        • Business Rule Manager 

          Find hidden logic within portfolios and extend their value through re-use

      • Develop › 
        • Develop

          Maintain control and agility of complex software development projects


        • Enterprise Developer › 
          • Enterprise Developer

            A development environment that streamlines mainframe COBOL and PL/I activities


          • Enterprise Developer Connect 

            Use modern and productive tools to develop applications directly on the mainframe

          • Enterprise Developer for z 

            Easily maintain and modernize z Systems applications

        • Enterprise Sync 

          Enable faster, efficient parallel development at scale

        • ChangeMan ZMF › 
          • ChangeMan ZMF

            Builds packages of change artifacts to speed up mainframe application development


          • (ChangeMan ZMF) Client Pack 

            Provides multiple change management interfaces to maintain mainframe apps

        • Verastream 

          Fuel mobile apps, cloud initiatives, process automation, and more

        • StarTool FDM 

          Manage mainframe files for fast problem resolution

      • Test › 
        • Test

          Increase speed and quality with scale for continuous testing


        • Enterprise Test Server 

          Enable IT teams to easily test mainframe application changes on scalable hardware

        • Comparex 

          Mainframe comparison tool that supports data, text, and directory files

      • Release › 
        • Release

          Automate deployments and orchestrate the application release process to join teams


        • Deployment Automation 

          Connect Dev and Ops by automating the deployment pipeline and reduce feedback time

        • Release Control 

          Centralized planning and control for the entire software release lifecycle

      • Rehost › 
        • Rehost

          A proven, scalable deployment environment for rehosting IBM mainframe applications.


        • Enterprise Server 

          Execute IBM mainframe COBOL and PL/I workload on Windows, Linux and the Cloud

        • Enterprise Server for .NET 

          Modernize IBM mainframe workloads using Microsoft .NET and Azure

      • Monitor › 
        • Monitor

          Ensure superb application performance that meets user expectation


        • Solutions Business Manager 

          Orchestrates and integrates processes for faster software development and delivery

        • ChangeMan SSM 

          Detects changes, synchronizes multiple environments, and restores failed systems

      • Connect › 
        • Connect

          Enable modernized access and integration of mainframe application and data


        • Reflection 

          Desktop, mobile, and cloud terminal modernization of IBM, HP, and UNIX mainframe applications

        • InfoConnect 

          Desktop terminal access modernization of Unisys mainframe applications

        • Rumba 

          Desktop terminal access modernization of IBM, HP, UNIX mainframe applications

        • Verastream 

          Web services platform for IBM, HP, and UNIX application and data integration

        • Databridge 

          A Unisys MCP DMSII data synchronization tool for analytics and BI applications

      • Secure › 
        • Secure

          Enhance access management and security of mainframe applications and data


        • Host Access Management & Security Server 

          A platform for enhancing mainframe access control and application security management

        • SecureData for Mainframe 

          A solution that provides data-centric protection from end-to-end

    • Security › 
      • Security

        Security at the core to everything you do; Operations, Applications, Identity and Data


      • Security Operations › 
        • Security Operations

          Detect known and unknown threats through correlation, data ingestion and analytics


        • ArcSight Data Platform 

          A future-ready, open platform that transforms data chaos into security insight

        • ArcSight Enterprise Security Manager (ESM) 

          A comprehensive threat detection, analysis, and compliance management SIEM solution

        • ArcSight Investigate 

          An intuitive hunt and investigation solution that decreases security incidents

        • ArcSight User Behavior Analytics (UBA) 

          Detect unknown threats through real-time analytics

        • ArcSight Marketplace 

          Download and deploy pre-packaged content to dramatically save time and management

        • Sentinel 

          A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM

        • Security Intelligence & Operations Consulting 

          Consulting to help build and mature enterprise security operation capabilities

        • Secure Configuration Manager 

          Finds and repairs configuration errors that lead to security breaches or downtime

        • Change Guardian 

          Identifies and responds to unmanaged changes that could lead to security breaches

        • Security Solutions for IBM i 

          Provides easy compliance auditing and real-time protection for IBM iSeries systems

      • Data Security › 
        • Data Security

          Encryption, tokenization and key management for data de–identification and privacy


        • Voltage SecureData Enterprise 

          Format-preserving encryption, tokenization, data masking, and key management

        • Voltage SecureData for Payments 

          Omni-channel PCI compliance and data protection for end-to-end payments security

        • Voltage SecureMail 

          Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile

        • Voltage SecureMail Cloud 

          SaaS cloud email encryption to protect information on Office 365

        • Voltage SecureMail On-Premises 

          Email, file, and Office 365 protection for PII, PHI, and Intellectual Property

        • Atalla HSM 

          FIPS 140-2 Level 3 hardware cryptographic appliance to meet compliance standards

        • Enterprise Secure Key Manager 

          Automated encryption key lifecycle management appliance

        • Reflection for Secure IT 

          File transfer protection to control privileged users and stop persistent threats

      • Application Security › 
        • Application Security

          Secure development, security testing, and continuous monitoring and protection


        • Fortify Static Code Analyzer 

          Identifies security vulnerabilities in source code early in software development

        • Fortify WebInspect 

          Provides comprehensive dynamic analysis of complex web applications and services

        • Fortify Software Security Center 

          Gain valuable insight with a centralized management repository for scan results

        • Fortify on Demand 

          Manage your entire application security program from one interface

        • Application Defender 

          Gain visibility into application abuse while protecting software from exploits

      • Identity & Access Management › 
        • Identity & Access Management

          An integrated approach to Identity and Access Management


        • Identity Governance & Administration › 
          • Identity Governance & Administration

            A comprehensive identity management and governance solution that spans across the infrastructure


          • Identity Manager 

            Delivers an intelligent identity management framework to service your enterprise

          • Identity Governance 

            Provides automated user access review and recertification to remain compliant

        • Access Management › 
          • Access Management

            Consistently enforce access rights across your business environment


          • Access Manager 

            Provides single sign-on for enterprises and federation for cloud applications

          • Host Access Management & Security Server 

            Integrate the host with your modern security framework

          • Advanced Authentication 

            Move beyond username and passwords and securely protect data and applications

          • Self Service Password Reset 

            Enables users to reset their passwords without the help of IT

          • SecureLogin 

            Streamlines authentication for enterprise apps with a single login experience

        • Privilege Management › 
          • Privilege Management

            Manage and control privileged account activities for all credential-based systems


          • Privileged Account Manager 

            Enables IT administrators to work on systems without exposing credentials

          • Directory & Resource Administrator 

            Limits administrative privileges and restricts directory views to specific users

          • Group Policy Administrator 

            Edit, test, and review Microsoft Group Policy Objects changes before implementation

          • Exchange Administrator 

            Provides Exchange administration that restricts privileges to specific users

          • Change Guardian 

            Protect critical data, reduce risk and manage change with Change Guardian

        • Change & Configuration Management › 
          • Change & Configuration Management

            Deliver actionable and timely security intelligence


          • Change Guardian 

            Protect critical data, reduce risk and manage change with Change Guardian

          • Secure Configuration Manager 

            Finds and repairs configuration errors that lead to security breaches or downtime

          • Security Solutions for IBM i 

            Provides easy compliance auditing and real-time protection for IBM iSeries systems

      • Secure Messaging › 
        • Secure Messaging

          Antivirus, anti-spam, anti-malware, and network protection


        • Secure Messaging Gateway 

          Protect your network and messaging system from malware, viruses, and harmful content

        • Voltage SecureMail 

          Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile

      • Unified Endpoint Management › 
        • Unified Endpoint Management

          Securely automates IT management processes across the lifecycles of devices


        • ZENworks Endpoint Security Management 

          Delivers identity-based protection for devices and features total protection

        • ZENworks Full Disk Encryption 

          Proactive laptop and desktop data protection to automatically lock out threats

        • ZENworks Patch Management 

          Automates patch assessment and monitors patch compliance for security vulnerabilities

        • ZENworks Mobile Workspace 

          Enable users to securely access data while respecting privacy and device freedom

        • ZENworks Configuration Management 

          Provides automated endpoint management, software distribution, support, and more

        • ZENworks Desktop Containers 

          Package, test, and deploy containerized Windows apps quickly and easily

        • ZENworks Service Desk 

          Streamlines and automates the way you provide IT services to your business

        • ZENworks Asset Management 

          Provides reports that integrate licensing, installation, and usage data

        • ZENworks Suite 

          Seven integrated products to help track, manage, and protect endpoint devices


    • Industry Solutions › 
      • Industry Solutions

      • Micro Focus Government Solutions 
      • Airline 
      • Financial 
      • Health & Life Sciences 
      • Healthcare 
    • Products A-Z 
  • Support & Services

    • Support › 
      • Support

      • Support Resources › 
        • Support Resources

        • All Support Resources by Product 
        • Knowledge Base 
        • Documentation 
        • Community/Forums 
        • Downloads 
        • License Keys/Product Activation 
        • Articles/Tips/Blogs 
        • Marketplace (formerly Live Network) 
        • Contact Support 
      • Support Plans & Policies › 
        • Support Plans & Policies

        • Support Plan: Business Support 
        • Advanced Support: FlexCare Support 
        • Advanced Support: Premium Support 
        • Extended Support Plus 
        • Product Support Lifecycle (Obsolescence & Migrations) 
        • Customer Support Handbook 
    • Professional Services › 
      • Professional Services

      • Professional Services by Product 
      • Analytics & Big Data 
      • Cyber Security 
      • DevOps 
      • IT4IT Value Chain Consulting 
      • Application Delivery Management 
      • Mobile Application Lifecycle 
      • Hybrid Cloud Management and Brokerage 
      • Data Center Automation 
      • Operations Management 
      • Service Management 
      • Vertica 
      • Global Product Authentication 
      • Managed Services 
      • Model Offices 
    • Education & Training › 
      • Education & Training

      • Training by Product 
      • Adoption Readiness Tool (ART) 
      • On-demand Training 
      • Digital Learning 
      • Certification 
      • Partners/Instructors › 
        • Partners/Instructors

        • Corporate Training Partners 
        • Authorized Instructors 
      • Academic Training Programs › 
        • Academic Training Programs

        • Academic Training Partners 
        • COBOL Academic Program 
        • Software University 
      • Contact a Training Expert 
  • Partners

  • Events

  • About

  • Free Trials

 

Welcome to FTS File Transfer UI Help Page

FTP Service - Online Help

Table of Contents

  1. What is FTS?
  2. What is this Document and How is it Organized?
  3. What File Transfer Protocols Does FTS Support?
  4. How Do I Setup FireFox on HPUX to access FTS?
  5. How Do I Access the FTS File Transfer Browser-Based UI?
  6. Overview of the UI for a User with a Read-Write Account
  7. Overview of the UI for a User with a Read-Only Account
  8. Overview of the UI for a User with a Write-Only Account
  9. How Do I Use the Directory Browser?
  10. How Do I Upload Files via HTTPS?
  11. How Do I Rename a File?
  12. How Do I Create a New Directory?
  13. I have Write Access But No Directory Browser. How do I Delete Files or Directories?

What is FTS?

FTS stands for File Transfer Service. It is Opentext's standard file transfer service enabling large document exchange between customers Opentext personnel and their customers or partners. FTS provides the transport mechanism only and is not responsible for the files transferred nor the overall (total Internet) end-to-end solution. FTS may only be used for Opentext company business. FTS is not backed up and is not a repository. Most FTS drop boxes are subject to disk quota limits. Files should be removed after successful transfer. Use of FTS implies acceptance of the FTS Terms of Use and Service.

Back to Table of Contents


What is this Document and How is it Organized?

This document provides instruction on how to use the FTS File Transfer UI to access and manage the content of your FTS drop site via an HTTPS browser. The document is divided into sections covering primary features and functions of the FTS UI. Each section begins with a terse "expert" explanation which should suffice for users familiar with similar features found in other UIs. After the summary, more detail is provided, often accompanied by numbered diagrams for those who need additional help.

Back to Table of Contents


What File Transfer Protocols Does FTS Support?

FTS originally supported only the FTP protocol for file uploads and downloads as well as drop site management capabilities. Over time, FTS was expanded to support FTPS (uses same ports as plain FTP), SFTP (on port 2222 only) and HTTPS (on port 443). FTP is typically the fastest transfer protocol because it does not encrypt content before transport and decrypt before arrival. However, FTP is an insecure protocol. It is suitable for transferring very large, publicly viewable files or files that have been encrypted as a separate action before transfer to FTS. Files containing any kind of sensitive information must be transferred via one of the secure protocols (FTPS, SFTP or HTTPS). The interfaces provided by this webservice UI allow web-based HTTPS uploads and downloads and are intended primarily for smaller file transfers by customers or external partners whose firewalls prohibit FTP, FTPS or SFTP on port 2222. This UI also simplifies some file and directory management although many modern FTP-based UIs (e.g. FileZilla recommended for use with FTS) also provide excellent and intuitive file management capabilities.

Back to Table of Contents


How Do I Setup FireFox on HPUX to access FTS?

Visit the Opentext Software Depot home page.

  1. Select the Java link in the Product Category section.
  2. Select the Firefox/Thunderbird Web Browsers for HP-UX 11i - Downloads and Documentation link in the Product column.
  3. Select the Firefox version 3.5.09.00 (May 2010) link in the Downloads section.
  4. Click on the [Select] button.
  5. Login with your Opentext Passport sign-in, If you are a new user, register and login.
  6. Download and install Firefox.

Back to Table of Contents


How Do I Access the FTS File Transfer Service UI?

  1. Enter the HTTPS URL based on the DNS name where your drop box is hosted:
    • https://ftp-pro.houston.softwaregrp.com/mffts
    in your browser.
  2. If necessary, accept the Terms of Service.
  3. Login using the drop site account name and password provided by the Opentext employee who created the drop site.

More Information ...

IE, Chrome, Firefox and Opera browsers have been tested with FTS but most browsers should work. This URL can be saved in your browser favorites, if you so desire. The first time you access the FTS, you will be prompted to read and accept the FTS Terms of Service. To accept the Terms, click the Accept button at the bottom of the page. If you accept the Terms of Service, your browser will save a cookie to that effect. You should not be re-prompted when you access FTS again from the same computer and browser unless you delete this cookie.

Next you will see the login page as shown below. Login with the drop box account name and password provided you by the drop site owner, the Opentext employee who created and configured the drop site and provided you the login credentials. If you have problems accessing the drop box, contact the drop site owner. In the figure, we are accessing a drop box using an account "admin". To login, refer to Figure 1 for details :

Item icon1    Enter the account name, (e.g. "ttttest").
Item icon2    Enter the password, normally 8 characters long.
Item icon3    Click the Login button to complete the login process.

Figure 1. Login page of FTS.

Trouble Shooting Login ...

If unexpectedly redirected to the login page, you should be aware that FTS has a built-in session time out. After a period of inactivity, if you select a link or button in the UI, you may be redirected back to the login page. If that happens, simply login again, navigate back to the location where you were working and resume your use of the UI. Timeouts should not happen while an upload or download is in progress.

If you cannot login, first double check your login name and password. Both are case-sensitive. Passwords can contain symbols such as "=", "*", "_" and others as well as alpha-numeric characters. If the name and password matches the credentials provided by the Opentext drop box owner, try this URL in your browser: https://ftp.ext.hpe.com. If this web page cannot be reached, you may have a firewall issue or the drop box host server may be down (unlikely). Check with your local networking expert or ask a colleague to try accessing the website. If the problem persists, contact the Opentext employee drop box owner who sent you the credentials. He or she has access to the FTS internal UI and can verify that the drop box still exists, has not expired, the password is still active, and so forth. Your Opentext contact can also engage FTS support for further assistance.

Back to Table of Contents


Overview of the UI for a User with a Read-Write Account

Most accounts used to access FTS drop sites have full read and write capabilities. Users with read-write accounts have the following features available to them as shown in Figure 2:

Item icon1 A Directory Browser section for navigating the contents of the drop site. Users begin at the drop site's root ("/") or home directory (or folder). The key features of the directory browser are:
  • The path to the directory currently viewed is indicated by a bread-crumb style navigator labelled Current Location. Any parent level can be accessed simply by selecting its hyperlink name from the path, or, the leftmost "/" to return to the drop site's home directory.
  • Files can be downloaded by selecting the hyperlink file name.
  • Subdirectories are accessed by selecting a directory hyperlink.
  • The check boxes on the left serve double-duty for the Calculate MD5 For Selected Files and Delete Selected buttons. Checked directories are ignored if calculating MD5 digests. WARNING: Checked directories and their contents are deleted without confirmation if selecting the the Delete Selected button.
Item icon2 A File Functions section for "write" operations on files, including file upload as well as a function for renaming a file. The file uploader Browse button initiates a file explorer function for locating and selecting a file to upload. Click the Upload File button to initiate the file upload. Upon completion, the MD5 digest of the uploaded file is displayed in the browser and can be used to confirm that the file reached the FTS server intact and unaltered.
Item icon3 A Directory Functions section allowing a user to create a subdirectory in the directory defined by the Current Location.

Figure 2. Home page for a Read-Write account.

More Information ...

Detailed information on each section of the UI page summarized above can be found elsewhere in this document. Specifically:
  • For drop site navigation, downloading files, fetching MD5 digests or checksums, and deleting files or directories, see the detailed description of the Directory Browser
  • For instructions on uploading a file, see the File Uploader
  • To learn more about renaming a file, see Rename a File
  • For details on creating a directory, see Create a Directory

Back to Table of Contents


Overview of the UI for a User with a Read-Only Account

An FTS user with a read-only account has restricted access to the drop box. Specifically this type of account only allows navigation of the drop site and files to be downloaded from the FTS server to your local machine. The user interface for a read-only account by default consists only of the Directory Browser as shown in Figure 3. The read-only user can use the Directory Browser to:

Item icon1 Identify the path to the directory currently viewed via a bread-crumb style navigator labelled Current Location. Any parent level can be accessed simply by selecting its hyperlink name from the path, or, the leftmost "/" to return to the drop site's home directory.
Item icon2 Files can be downloaded by selecting the hyperlink file name.
Item icon3 Subdirectories are accessed by selecting a directory hyperlink.
Item icon4 The check boxes on the left can be selected to Calculate MD5 For Selected Files.

Figure 3. Home page for a Read-Only account.
Users with read-only accounts cannot upload files, delete files or directories, rename files or any other operations which may involve a modification to the drop site hierarchy or its contents.

More Information ...

Detailed information about using the Directory Browser for drop site navigation, downloading files, fetching MD5 digests or checksums, can be found in the Directory Browser section of this document.

Back to Table of Contents


Overview of the UI for a User with a Write-Only Account

FTS supports the concept of a write-only account for a few businesses only. Most write-only accounts are accessed programmatically, an automated process simply logs in, optionally may create a subdirectory, uploads a file and exits again. If a user were to log in with a write-only account, by default they would see the features shown in Figure 4.

Item icon1    A File Functions section which supports file upload and the ability to delete a file.
Item icon2    A Directory Functions section for changing to a specified directory (assuming that directory exists), creating a directory, and deleting an empty directory.

Figure 4. Home page for a Write-Only account.

More Information ...

Detailed information on each section of the UI page summarized above can be found elsewhere in this document. Specifically:
  • For instructions on uploading a file, see the File Uploader
  • To learn more about renaming a file, see Rename a File
  • For details on creating a directory, see Create a Directory
  • For details on deleting an empty directory, see Delete an Empty Directory

Back to Table of Contents


How Do I Use the Directory Browser?

Within the Directory Browser, you can use the following tools to navigate the drop site:

  1. To navigate down one level, select the name of a sub-directory from the file listing. A new file listing will be shown containing the contents of the selected sub-directory.
  2. To navigate up one level to a parent directory, select the "(up ...)" link, if one is shown. The file listing will be updated to contain the parent level's files and directories. You cannot navigate "up" out of your drop box root directory.
  3. To navigate to an arbitrary level above your current location, select the corresponding link from the Current Location bread-crumb style path.

To refresh the current file listing, select the right-most hyperlink in the Current Location path.

To download a file, navigate to the file's location in the drop box and select the file's hyperlink. A browser pop-up will prompt you whether you want to open the file or save it. Typically, you will want to save the downloaded file to a location on your local computer. The pop-up contains features which allow you to navigate to a location on your computer where you wish to save the file.

To calculate MD5 checksums check the Select boxes of the files for which FTS should calculate the checksums. Select the Calculate MD5 For Selected Files button. The MD5 sums for the selected files will appear in an area below the button. Selected directories are ignored.

To delete files or directories (and their contents), check the Select boxes for the items you want to delete and click on the Delete Selected button. WARNING: FTS currently initiates the delete action without requesting confirmation from the user. It is very easy to delete a large and complex hierarchy of files in this manner.

More Information ...

An FTS drop site (also called a drop box), can be likened to a secured directory or folder on a computer's file system. The directory can contain regular files that have been uploaded to the FTS FTP servers as well as other directories nested below it to an arbitrary depth. The FTS File Transfer Service Directory Browser allows users with the proper read-write or read-only credentials to navigate up and down the drop site hierarchy of folders, to view a file listing at your current location in the drop box hierarchy, and download the regular files from the drop box to a local computer. Furthermore, the Directory Browser provides facilities to easily collect MD5 digests (also called checksums) that help users determine whether the files in a drop box were uploaded successfully and completely. For users with read-write permissions, the directory browser also provides an intuitive facility for removing one or more files and/or sub-directories from a drop box. An example Directory Browser for a read-write user is shown in Figure 5. In the figure:
Item icon1 the current location is the root or home directory.
Item icon2 the file listing shows 2 files ("test.html", "velocity.log") as well as a sub-directory ("my_subdirectory") that can be found at the root level. Files are accompanied by their size in octets (bytes). Directories and files alike also show the date last modified. The file's modification date is generally the date the file was uploaded to FTS. A directory modification date is the date the directory was created or when the contents of that directory were last changed.

Figure 5. How to use Directory Browser.

Navigating the Drop Box Hierarchy

The Directory Browser provides several important navigation features:

First, near the top of the Directory Browser, you will see a bread-crumb style indicator of your current location or directory path within the drop box, aptly named Current Location. You can click on any link in this path to return to the corresponding directory in the drop box. The leftmost "/" indicates the root level (or home directory) for the drop site. By clicking on this "/", you can immediately return to the drop box home directory. Selecting any hyperlink in the Current Location path causes FTS to fetch the file listing for the selected directory and redisplay that listing. Also, the Current Location path is updated so that the right-most element in the path is always the directory whose contents are seen in the file listing.

Second, by default, all subdirectories in the file listing are represented as hyperlinks. By selecting the name of a directory, you "change directory" or change current location to that subdirectory. Changing the location appends the sub-directory's name to the the Current Location path. For example, suppose we began in the drop site's root directory as shown in Figure 5. If we select the hyperlink for the directory called "my_subdirectory", and then clicked down further into sub-directory "another subdir" below "my_subdirectory", we would see the Current Location path extended as shown in Figure 6 and the Directory Browser now displaying the file listing of "/my_subdirectory/another subdir", which currently contains only the sprrev.zip file.

Third, the Directory Browser presents you an "(up...)" hyperlink which allows you to navigate up one level to the parent directory of the current working directory or current context. If you select the "(up...)" link from the example in Figure 6, FTS would repaint the page with the Directory Browser showing a listing of the files and subdirectories in "/my_subdirectory", the Current Location would be adjusted similarly. You cannot navigate up out of your drop box root (or home) directory.


Figure 6. Navigating the Drop Box Hierarchy.

Refreshing A File Listing

If two or more people are concurrently modifying the contents of a drop box, it is possible for the file listing to go out of sync with the files actually on the FTS FTP servers. If that happens, you can refresh your current context by clicking on the right-most element in the Current Location path. In Figure 5 above, the right-most element is the "/" indicating the drop site's home directory. In Figure 6, the right-most element is the "my_subdirectory" link in the Current Location path. The right-most element always corresponds to the directory you are currently "in".

Downloading A Regular File

You download a regular file simply by selecting it's name. For example, to download the the test.html file shown in Figure 6 above, you would navigate the drop box to the directory which contains test.html (i.e. "/my_subdirectory"), and then simply select the test.html file name. FTS currently does not support downloading a directory of files. Instead, selecting a directory navigates the user into that directory. Upon selecting a file for download, the user sees a browser-generated pop-up window which provides you the option to open the file in the browser (some files should never be opened this way) or to save the file to your local disk. FTS recommends that you save the file rather than opening it.

Calculating File Checksums

An MD5 digest (also called "sum", "hash" or "checksum") is a compact digital fingerprint of a file generated using a hash algorithm against the content of a file. Because almost any change to a file causes its MD5 digest to change, this checksum is a standard mechanism for verifying the integrity of files. You can rule out file corruption during transfer by calculating the checksum and comparing it to the checksum calculated against the file on the source or download destination computer. FTS supports 3 different algorithms for calculating checksums: MD5, SHA1, and SHA256.

FTS facilitates the calculation of a checksum as shown in Figure 7 below:

Item icon1 Select the file (or files) for which you want digest(s).
Item icon2 Optionally, select one of the alternate checksum algorithms. By default, MD5 is selected.
Item icon2 Then click the Calculate Checksum button. If you accidentally include a directory among your selections, it will be ignored.

Figure 7. Calculating File Checksums.

Figure 8 shows the checksum results for a different example set.

Item icon1 Although all 3 items (including directory "my_subdirectory") in the directory listing were chosen, the checksums only for the files are shown in the results. When the MD5 sums have been calculated, they are displayed below the Calculate Checksum button.

Figure 8. Displaying the MD5 checksum result.

Deleting Files and/or Directories From the Directory Browser

File or directory deletion results in a change to a drop box contents. Consequently, by default, only users with read-write access privileges can delete a file or directory from the directory browser. Users with read-only accounts are not provided a Delete Selected button in the UI.

The Select checkboxes in the Directory Browser serve double-duty between identifying files for calculating MD5 sums or for file and directory deletion. To delete one or more files and/or directories, select the checkbox to the left of the items to be deleted and then click on the Delete Selected button.

WARNINGS: Please use the delete functionality with care.

  • FTS does not provide for or request a deletion confirmation.
  • Deleting a directory removes that directory and all of its contents.
  • If a deletion operation is aborted by exiting the UI, at least some files and directories will still be lost.
  • FTS does not back up, nor can it recover items that were deleted by accident. The only recovery option is for the files to be re-uploaded from another source.

File and directory deletion is supported in the Directory Browser only for users with read-write access to FTS.

Back to Table of Contents


How Do I Upload Files via HTTPS?

File uploads involve a "write" operation which modifies the drop box contents. Only users with read-write or write-only access can upload files.

To upload a file from your computer to FTS, you must complete the following steps:

  1. Scroll down the UI to the File Uploader. (For files more than 4 GB in size, use of Chrome, Firefox or Opera browser is recommended).
  2. Use the Browse button to locate the file to upload.
  3. Use the Upload File button to initiate the upload.
Only one file can be uploaded at a time.

More Information ...

FTS provides a basic HTTPS uploader which utilizes established and stable browser technology but the maximum file size may be limited to files 4 GBs or less in size depending on your choice of browser. To upload files, please refer to Figure 9:
Item icon1 Either type the full pathname to the file you wish to upload into the text-entry widget, or, use the Browse button to start the browser's file explorer utility. If using the Browse button, navigate to the directory where the file to be uploaded exists, select the file, and click the submit button (usually called "Open" or "Open File"). The file pathname will be loaded into the text box by the browser.
Item icon2 (Optionally) disable reporting the MD5 sum of the uploaded file. Typically you will want to see the MD5 sum to verify the integrity of the uploaded file.
Item icon3 Click the Upload File button to begin the upload.

Figure 9. Upload a File over HTTPS.

After the uploader completes, FTS may log you out if the browser has timed-out. Otherwise, FTS refreshes the Directory Browser to include the newly uploaded file. Also, the MD5 digest for the uploaded file is displayed under the upload prompts as shown in Figure 10.


Figure 10. Upload result, showing MD5 Digest.

What happened to the file upload applet? FTS used to provide an applet that could be used to upload files of almost any size. As a security precaution, most browsers no longer permit the execution of a plugin applet. The applet no longer works with any browser and has been removed. Most browsers, other than Internet Explorer, now support the upload of very large files with the built-in uploader.

Back to Table of Contents


How Do I Rename a File?

Renaming a file involves a "read" component to access the file being renamed and a "write" component to update the directory with the file's new name. Consequently, by default, renaming a file is a feature available only to users who can access an FTS drop site with a "read-write" account.

To rename a file, navigate to the directory containing the the file to rename and then:

Item icon1 Enter the name of the file to be renamed in the first text entry widget. You can cut and paste the file name from the file listing but be careful not to click on the file to be renamed or FTS will misinterpret your action as a file download request.
Item icon2 Enter the new name of the file in the text box following the "to:" prompt.
Item icon3 Click on the Rename File button to complete the renaming action.

Figure 11. How to Rename a File.

After the file is renamed, FTS will refresh the file listing in the Directory Browser so you can verify the file has been correctly renamed.

Trouble-Shooting "Rename a File" ...

To rename a file successfully, you must spell the file's name exactly as it appears in the drop box. The new file name cannot already exist as a directory or file name. Finally, the "rename a file" functionality does not permit you to move the file from one location or directory in the drop box to another location.

Back to Table of Contents


How Do I Create a New Directory?

Creating a directory is a write operation and available only to users who login with a read-write or write-only account.

To create a directory,

  1. Navigate to the location in your drop box where you want to create the new directory.
  2. The the name of the of the new directory in the text entry widget by the prompt labelled, "Create a directory named:".
  3. Click the Create Directory button to actually create the directory.

Most users with permission to create a directory can navigate to the proper location using the Directory Browser, selecting the parent directory from the Current Location path, or by traversing down the directory hierarchy by clicking on the necessary sub-directory links. Users with a default WO account do not have the Directory Browser facility and should use the "Change Working Directory to:" text widget instead to enter the absolute pathname (begins with "/" and uses "/" as pathname separators) to a known existing directory which will be the context (or parent) for the new directory to be created.

If the directory is created successfully and if you are logged in with a read-write account, FTS will refresh the file listing in the Directory Browser. If you are logged in with a write-only account, the directory is created silently.

If the directory already existed or cannot be created, an error message is displayed.

Back to Table of Contents


I have Write Access But No Directory Browser. How do I Delete Files or Directories?

Because users with write-only accounts cannot perform drop site read operations, they operate "blind" inside the drop box. They do not have or need a Directory Browser and so FTS provides an alternative solution for deleting files or directories.

The assumption made by FTS is that the owner of a write-only account knows the layout of the drop box by means other than by viewing the drop box. In reality, the few FTS drop boxes that have write-only accounts are configured such that the write-only users upload files only to the drop box home (or root) directory, or, perhaps create a subdirectory at the root level for their own use and into which they deposit their files. Most write-only users of FTS are programs, not interactive users.

File Deletion without a Directory Browser

To delete a file, the user must navigate to the drop box directory containing the file and then enter the name of the file to delete. Referring to Figure 12, this involves the following steps:
Item icon1 In the text entry box labeled "Change Working Directory To:", enter the path to the directory containing the file to be deleted. This can be either an absolute pathname from the drop box root (or home) directory (i.e. specify a pathname beginning with "/") or a simple sub-directory of the current location.
Item icon2 Click the Change to Directory button to change the current context. If the directory changed successfully, the operation will silently succeed. Otherwise (e.g. the directory does not exist), an error message will be displayed.
Item icon3 Type the name of the file to be deleted in the text box accompanying the "Delete a File named:" prompt.
Item icon4 Click the Delete File button to delete the file. Again, if the deletion succeeds, it does so silently. Otherwise, an error message is posted.

Figure 12. File Deletion without a Directory Browser.

Directory Deletion without a Directory Browser

To delete a directory, the user must navigate to the drop box parent directory containing the subdirectory to be deleted and then enter the name of the directory to delete. Note, FTS does not permit the deletion of the root "/" directory. Referring to Figure 13, this involves the following steps:
Item icon1 In the text entry box labeled "Change Working Directory To:", enter the path to the directory containing the file to be deleted. This can be either an absolute pathname from the drop box root (or home) directory (i.e. specify a pathname beginning with "/") or a simple sub-directory of the current location.
Item icon2 Click the Change to Directory button to change the current context. If the directory changed successfully, the operation will silently succeed. Otherwise (e.g. the directory does not exist), an error message will be displayed.
Item icon3 Type the name of the directory to be deleted in the text box accompanying the "Delete a Directory named:" prompt.
Item icon4 Click the Delete Directory button to delete the directory. Again, if the deletion succeeds, it does so silently. Otherwise, an error message is posted.

Figure 13. Directory Deletion without a Directory Browser.

Back to Table of Contents






We use cookies.

OpenText uses cookies to give you the best online experience. If you continue to use this site, you agree to the use of cookies. Please see our cookie policy for details.

Agree
 Contact Us
Feedback
Legal
Privacy Policy Terms of Use
Compliance
Accessibility Anti-Slavery Statement
Help
Support How To Buy
Company
Careers Investor Relations Corporate Blog
Community ›

Follow us on:

Subscribe to OpenText
Copyright © 2025 Open Text Corporation. All rights reserved.