Glossary / S / SSH file transfer

SSH file transfer

SSH file transfer is a secure way to move files using the secure shell (SSH) protocol. It is often used as the SFTP subsystem on TCP port 22. Commands and data travel in one encrypted channel. Authentication can use keys or passwords. The protocol includes integrity checks and confidentiality features. These qualities make it useful for handling regulated or sensitive data.

In file transfer protocol (FTP) servers and managed file transfer (MFT) systems, SSH file transfer can replace or extend FTP/S. It can move batch files with strong encryption and a larger command set. SFTP works through a single port. This reduces firewall complexity and helps with NAT traversal. It also hides payloads from packet inspection. Features include resume support, automatic renames and directory controls. These lower the risk of failed transfers and accidental access to restricted paths.

How to transfer files over SSH

SSH can move data using one of two built-in file transfer protocols:

Secure copy protocol (SCP)

SCP copies a file or folder from the source to the destination. This protocol is fast and straightforward but offers limited commands and does not have native resume, directory listing or permissions handling. Use it for small batches or one-off transfers where a failed push can be easily rerun.

Secure (or SSH) file transfer protocol (SFTP)

SFTP is a full-featured protocol that allows a variety of commands for file and directory manipulation, editing and transfer activities. It is an ideal tool for large jobs, automation and compliance reporting where audit logs and error recovery are important.

When considering the advantages of both methods, SCP is better for speed, whereas SFTP offers greater control.

Choosing the right SSH file transfer method

Selecting an SSH-based transfer tool starts with scope. Look at your organization’s file volume, retry tolerance, audit demands and how much control the remote side will require. A one-time push has different needs than a nightly batch tied to compliance reports or partner SLAs.

SCP: The choice for quick and simple transfers

SCP moves data in a straight copy operation. It excels when you just need to push or pull a few files and can rerun a job if it drops, such as a firmware update. SCP does not offer native directory listing, checkpoint or granular permission mapping, so orchestration logic must live outside the transfer.

SFTP: When you need advanced features

SFTP allows users to access and manipulate directories and files in a number of different ways, including editing, deleting and renaming. It provides built-in integrity checks, compression and can resume partial sends, which makes it a better choice for higher volume sends.

SSH file transfer security considerations

While SSH provides encryption to protect data in transit, access scope, encryption algorithm choices and audit depth must be configured to meet your organization’s policy, partner contracts and MFT workflow risk.

Use this checklist to harden SSH deployments:

  • Allow only current ciphers and MACs, such as AES‑GCM or ChaCha20‑Poly1305
  • Jail users to virtual roots so each partner sees only its drop zones
  • Log commands and transfers to a SIEM with retention aligned to compliance rules
  • Rotate host and user keys on a set schedule and revoke stale ones fast
  • Set idle timeouts, rate limits and disable password authentication for service accounts

Common use cases for SSH file transfers

SSH file transfers support operational workflows in MFT environments where data must move on a schedule, at high levels of encryption that meet partner or regulatory requirements. Typically, these use cases include system feeds, partner exchanges and internal automation such as:

  • EDI bridges that drop order files for suppliers and pick up acknowledgments on the same channel
  • Healthcare gateways that move PHI reports to payers or labs under HIPAA with restricted directories and key authentication
  • Manufacturing sites that stream sensor logs and CAD updates to central repositories for analysis and archiving
  • Nightly batch loads from finance apps to data warehouses or ERP hubs with retry hooks and job status logs
  • Service desks that collect customer dumps and post patched binaries back to restricted folders

SSH file transfer FAQs

Is SSH better than FTP?

For secure transfers, yes, SSH is better than FTP. SSH-based methods like SFTP encrypt credentials and data, offer integrity checks and typically use a single port, which simplifies firewall rules and automated jobs. Plain FTP sends commands and files in clear text, so anyone on the path can read or alter them unless you bolt on TLS (FTPS) and manage separate data ports.

FTP can still make sense for legacy systems, public downloads or closed networks where encryption is handled elsewhere. Cost of migration, partner support and protocol requirements may dictate staying with FTP or FTPS. The “better” choice comes down to security needs, compliance scope and how much control your organization’s workflow demands.

Are SSH and SFTP the same thing?

No, SSH and SFTP are not the same thing. SSH is the secure transport and remote command protocol; SFTP is the file transfer subsystem that typically runs inside an SSH session on port 22. SSH provides the channel, key exchange and authentication while SFTP defines how files are listed, moved and renamed over that channel.

You can run SSH without SFTP (for shells, tunneling or SCP), and you can expose SFTP without granting shell access. In MFT workflows, users commonly select SFTP for a secure transfer that supports a number of additional commands.

What is the SSH file transfer method?

The SSH file transfer method is moving files over an encrypted SSH session, most often through the SFTP subsystem or the SCP command on TCP port 22. SSH negotiates keys, ciphers and user authentication, then carries commands and payloads in one channel protected from sniffing and alteration.

In MFT workflows, SSH file transfer is used to send data such as scheduled batches, partner exchanges and automated jobs through an encrypted channel that can provide audit logs.

What is an SSH file?

There is no special SSH file format. The term usually means either any payload moved over an SSH-based protocol such as SFTP or SCP or one of the support files SSH uses to authenticate and verify peers. In MFT server workflows, people use the term “SSH file” to describe data pushed through an SSH session or the keys and configurations that govern that session.

Common SSH support files include private and public keys (id_rsa, id_ed25519, *.pub), authorized_keys, known_hosts and the user or server configuration file. These store credentials, host fingerprints and connection rules. Editing these files changes who can connect and what ciphers or paths are allowed.

Automate secure file transfers without opening more ports

Learn when to pick SFTP or SCP for batches, ad hoc transfers and audits.
Blog

SFTP server and SSH keys: Your complete guide

Blog

SCP vs. SFTP: Which is better?

Blog

How will SFTP evolve in the future?

Blog

SFTP vs. FTPS: Understand the eight differences and use cases

Start a 25-day free trial

Try Cerberus Enterprise Edition for free

  • 25-Day Free Trial
  • Installs in minutes
  • No credit card required