How to Configure AS2


AS2 can be configured by a site administrator of your site.

AS2 requires that you and your trading partner agree on identifiers for your communication. These are sometimes referred to as "AS2 Identity", "AS2 name", "AS2 code", "AS2 station", or "AS2 To and AS2 From" identifiers.

You will need your own x509 Certificate and Key for decryption and digital signing. We can generate this for you or you can provide your own. You can use self-signed certificates. Your generated public Certificate and private Key should be in PEM or CRT format. These certificates will be used to decrypt data received from your trading partner and digitally sign data sent to your trading partner.

You will provide the public x509 Certificate to your trading partner.

You will need your trading partner’s public x509 Certificate for encryption. Contact your trading partner and ask them to provide you with the public AS2 certificate to be used for this connection with them. This certificate is used to encrypt data you send to your trading partner and validate the digital signature of data received from your trading partner.

You will need the AS2 URL of your trading partner, sometimes referred to as the "endpoint URL". Contact your trading partner and ask them to provide you with the AS2 URL to be used for this connection. This URL is used to connect to your trading partner’s AS2 system and deliver data.

Configuring Your AS2 Identity

You can create as many AS2 identities as your business requires. Most organizations have a single AS2 Identity but some require multiple identities in order to represent, and route data to, subsidiaries or business units.

Enter your desired AS2 Identity then paste your public certificate and private Key or generate the certificate and key in our web interface.

When providing your own, your public Certificate and private Key should be in PEM or CRT format.

Your public Certificate should begin with -----BEGIN CERTIFICATE----- and end with -----END CERTIFICATE-----.

Your private Key should begin with -----BEGIN PRIVATE KEY----- and end with -----END PRIVATE KEY----- or begin with -----BEGIN RSA PRIVATE KEY----- and end with -----END RSA PRIVATE KEY-----.

You can use fully valid and chained Certificates and Keys, or use self-signed Certificates and Keys.

Generating Your Encryption and Signing Certificates

We provide a built-in generator within the Add new AS2 identity function that can generate self-signed certificates and keys for you.

Fully valid and chained Certificates and Keys may be provided to you by your IT department or by your SSL Certificate provider. You, or your IT department, can also generate your own self-signed Certificates and Keys.

To generate self-signed Certificates and Keys yourself, use the openssl command:

openssl req -x509 -days 365 -newkey rsa:2048 -keyout key.pem -out certificate.pem -nodes

Bear in mind that this Certificate will be viewed and used by your trading partners to identify you and your business details so it should contain accurate information.

When prompted by openssl, enter the following information:

ITEMDESCRIPTION
Country NameEnter the 2 letter code for the country. For example, "US".
State or Province NameEnter the full name of the State or Province. For example, "California".
Locality NameEnter the full name of the city, town, village, or locality. For example, "San Francisco".
Organization NameEnter the full name of your business or company. For example, "Files.com".
Organizational Unit NameEnter the full name of your department, division, or team. For example, "Partner Relations".
Common NameEnter the fully qualified domain name (FQDN) of your AS2 URL, or the fully qualified domain name of your business, that this certificate represents. For example, "mysite.files.com" or "mydept.mycompany.com".
Email AddressEnter a valid email address for your trading partners to use to contact you in case of any problems or questions about this certificate.

Configuring Trading Partners

Enter the trading partner’s AS2 URL, as provided to you by your trading partner. The URL can include the Fully Qualified Domain Name (FQDN), or IP address, of the trading partner, the port number, if a non-standard port is being used, and subdirectory path.

Enter the trading partner’s AS2 Identity, as agreed upon between you and your trading partner.

Paste in the trading partner’s public encryption Certificate. The public Certificate should be in PEM or CRT format.

The public Certificate should begin with -----BEGIN CERTIFICATE----- and end with -----END CERTIFICATE-----.

You can use fully valid and chained public encryption Certificates, or use self-signed public encryption Certificates. Your trading partner should supply you with this certificate.

Select which of your AS2 Identities you wish to use with this trading partner.

Choose the Server certificate option that corresponds to the security level of the trading partner’s AS2 URL.

If your trading partner’s AS2 URL is protected by a valid and chained SSL Certificate then choose the "Require valid, chained, trusted, matching TLS/SSL certificate (Recommended)" option.

If your trading partner’s AS2 URL uses a self-signed, unchained, expired, or non-matching SSL Certificate then choose the "Allow self-signed, unchained, expired, or non-matching TLS/SSL certificate" option.

If your trading partner's AS2 URL uses Basic Authentication, requiring an AS2 username and password, then use the Enable Basic Authentication option. Provide the AS2 username and password to be used when sending messages to this trading partner.

Choose a MDN validation level for this trading partner. This option determines how much validation is performed on the returned MDN to consider the AS2 transmission as a success.

VALIDATION LEVELDESCRIPTION
NoneThe returned MDN will not be validated. This level can be used when a valid MDN is not required by your business process. This is the default when creating a new trading partner.
WeakThe returned MDN must contain a valid Message Integrity Check (MIC) and a valid Disposition. No MDN Signature required.
NormalThe returned MDN must contain a valid Message Integrity Check (MIC), Disposition, and Signature. Signatures from self-signed certificates, or from certificates that are not configured for SMIME Signing, are allowed.
StrictThe returned MDN must contain a valid Message Integrity Check (MIC), Disposition, and Signature. The Signature must come from a valid and fully chained certificate, and the certificate must be configured for SMIME Signing purposes.

Select your preference for the Dedicated IPs setting for this trading partner. The option for specifying the use of Dedicated IPs will only appear if your site is configured to allow that option. Dedicated IPs are only available when a Custom Domain has been configured. We recommend using Dedicated IPs when your trading partner's firewall only allows connections from specified IP addresses.

Additional Content in This Section:

Get Instant Access to Files.com

The button below will take you to our Free Trial signup page. Click on the white "Start My Free Trial" button, then fill out the short form on the next page. Your account will be activated instantly. You can dive in and start yourself or let us help. The choice is yours.

Start My Free Trial

©2024 Files.com. All right reserved

FILES.COM

  • Start My Free Trial
  • Pricing
  • Docs
  • API and SDKs
  • Contact

CONTACT & SUPPORT

support@files.com

(800) 286-8372

Monday–Friday

9am–8pm Eastern