Glossary / O / Odette file transfer protocol version two (OFTP2)

Odette file transfer protocol version two (OFTP2)

Odette file transfer protocol version two (OFTP2) is a secure and efficient protocol used to exchange structured business data across global trading networks. Its predecessor, OFTP, was developed to support the needs of industries requiring reliable, automated file exchanges, particularly automotive manufacturers and their supply chain partners. OFTP2 is optimized for exchanging EDI files but also supports a wide range of data types and formats.

The protocol operates over TCP/IP networks and includes built-in features for file encryption, digital signing and compression. These security and efficiency measures allow for safe transmission of sensitive business documents, even over the public internet. OFTP2 can operate over multiple transport layers, including TCP, ISDN and X.25 and is designed to handle large file sizes through features like automatic retries and session resumption that do not require manual intervention.

Its compatibility with industry standards and support for push and pull transfers make it suitable for managed file transfer (MFT) environments. OFTP2 also supports message compression, session-level security and file integrity validation, which are key requirements in regulated and performance-sensitive workflows.

OFTP2 features

OFTP2 offers a number of key features to support secure transfers of larger file volumes. It is made for businesses that share data with trading partners, including:

  • Built-in support for restart and resume functions to maintain transfer integrity during interruptions
  • Digital signatures to verify sender authenticity and prevent tampering
  • File compression to reduce transmission time and bandwidth usage
  • Session-level authentication using X.509 certificates
  • Support for file encryption using strong cryptographic standards such as AES and 3DES

Why was OFTP2 developed?

OFTP2 was developed to address limitations in the preceding OFTP version around security and efficiency in order to better support high-volume, automated transfers while maintaining compliance with modern security expectations. These changes included: 

  • Enabling native secure file exchange over public networks (rather than relying on the underlying network’s security)
  • Providing authentication and data integrity checks 
  • Reducing transfer times and bandwidth consumption through compression
  • Standardizing communication between partners using a unified point-to-point protocol
  • Supporting large file transfers without manual intervention or splitting

How OFTP2 works

OFTP2 operates as a session-based protocol that establishes a direct connection between two endpoints to exchange files over TCP/IP networks. It supports both push and pull mechanisms and allows either trading partner to initiate transfers. Sessions are authenticated, and data is encrypted before transmission begins. OFTP2 supports both point-to-point and store-and-forward transfer modes, depending on your organization’s infrastructure requirements.

Here’s how OFTP2 manages file exchange:

  • A secure session is established using X.509 certificates for authentication
  • The initiating party requests to send or receive files based on session rules
  • Files are optionally compressed, digitally signed and encrypted
  • The transfer progress is tracked with built-in restart and resume support
  • Upon completion, the recipient verifies file integrity and sends a receipt

OFTP2’s design supports reliable, asynchronous communication that meets enterprise file transfer standards without requiring complex infrastructure.

OFTP2 transport methods

OFTP2 supports multiple transport methods to provide flexibility in how files are exchanged between trading partners. This versatility allows organizations to use OFTP2 across a variety of network environments without needing to redesign existing infrastructure.

Supported OFTP2 transport methods include:

  • Dedicated connections for high-throughput or restricted environments where consistent connectivity is required
  • ISDN for circuit-switched digital connections that are commonly used in legacy systems
  • TCP/IP for internet-based file transfers with encryption and certificate-based authentication
  • VPNs that provide added security over public internet connections
  • X.25 for packet-switched networks that are still used in some regulated environments

Organizations can use these OFTP2 transport options to operate in both modern and legacy ecosystems and support secure file exchange without imposing rigid network requirements.

OFTP2 FAQs

How does OFTP2 handle failed transfers?

OFTP2 provides restart and resume functions that can be specified in each session. When implemented, the protocol tracks how much data was received before a failure. When the link is restored, the transfer picks up at the last confirmed point.

This method increases reliability during large transfers and during exchange over slow or unstable networks because it prevents repeated data exchange. Both partners will generate and transmit receipts to verify delivery success or failure.

What is the difference between AS2 and OFTP2?

AS2 and OFTP2 are file transfer protocols used for electronic data interchange (EDI). They differ in how they are built and where they are used. AS2 uses HTTP or HTTPS to move data. It is common in retail and supply chain networks in North America. Each file travels as a separate message with its own structure, with connections operating in a push-only fashion.

OFTP2 runs as a session-based system. It allows files to move between both partners during a single connection. It uses TCP/IP but also works with ISDN and X.25. It is often used in Europe’s automotive sector. OFTP2 handles large data sets with features like resume, file compression and built-in encryption.

Does OFTP support encryption?

Yes, under OFTP2. The original 1986 OFTP does not have built-in cryptography and depends on the security of the underlying transport protocol or external VPNs. However, security features are improved with OFTP2, which mandates TLS for the session and lets partners use CMS to sign or encrypt each file.

OFTP2 negotiates ciphers at handshake, applies mutual certificate checks and supports SHA-256 digests and 2048-bit keys. An OFTP2 node can fall back to clear-text mode when a peer uses the previous OFTP version, but while this feature can keep legacy links alive while giving full encryption everywhere else, it is not ideal.

What protocols or ports does OFTP2 use?

OFTP2 runs over the TCP/IP protocol and typically uses port 661 for secure communication. It can also operate over VPNs, ISDN or X.25, depending on your organization’s network configuration and trading partner requirements. The protocol uses TLS encryption to protect sessions over TCP/IP.

OFTP2 handles both authentication and encryption through X.509 certificates. It supports strong algorithms such as AES and 3DES. These features are part of the session layer and do not rely on outside transport methods.

How does OFTP2 compare to SFTP?

OFTP2 and SFTP both support secure file transfers. They differ in how they handle connections and fit business requirements. SFTP uses SSH and supports encrypted transfers between systems. It usually needs user credentials and direct access to a receiving server. It’s widely implemented across industries for general-purpose file exchange. Due to its encryption levels, SFTP is often a slower transfer method for larger files.

OFTP2 is session-based and was designed for structured business communication between partners. It supports large-scale, automated transfers with built-in encryption, digital signatures and compression. Unlike SFTP, OFTP2 does not rely on a file system structure and is better suited for standardized, certificate-based trading partner exchanges.

Maintain momentum in your file transfer process

Get additional guidance on protocols, automation and partner data exchange.
Blog

Three steps to improve file transfer security by using proxies and gateways

Blog

Four benefits of using a reverse proxy server

Blog

Can your file transfer provider resolve a zero-day breach?

Blog

Understanding proxy servers

Start a 25-day free trial

Try Cerberus Enterprise Edition for free

  • 25-Day Free Trial
  • Installs in minutes
  • No credit card required