JSCAPE
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Pricing
  • Company
    • Blog
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
  • Support
    • Help Desk
    • Documentation
    • Customer Downloads
Get a demo

Using AES-256 to encrypt files you upload to your s3 trading partner

Words by

John Carl Villanueva

Files you upload to an Amazon S3 trading partner through JSCAPE MFT Server are normally stored in plaintext. If you want to encrypt those files to minimize the risk of a data breach, one way to do that is by using AES-256 Amazon S3 server-side encryption. We’ll show you how to use this particular service…

Published in:

Blog

/

Business Process Automation, JSCAPE MFT, Managed File Transfer, Secure File Transfer, Tutorials

Files you upload to an Amazon S3 trading partner through JSCAPE MFT Server are normally stored in plaintext. If you want to encrypt those files to minimize the risk of a data breach, one way to do that is by using AES-256 Amazon S3 server-side encryption. We’ll show you how to use this particular service in this post; and if you want to request a free trial, click here.

Watch the video

Would you prefer to watch a video version of this tutorial instead? You can play the video below. Otherwise, just skip it if you wish to continue reading.

[On AWS S3

To use Amazon S3 AES-256 enryption, the first thing you need to do is navigate to the S3 service.

s3 aes 256 - s3 service

Go to the bucket that you want to secure with AES 256 encryption.

s3 aes 256 - s3 bucket

In my case, I have a folder named ‘folder1’ inside my Amazon S3 bucket. Let’s take note of that, as that’s where I’m going upload files from my JSCAPE MFT Server instance.

s3 aes 256 - s3 bucket folder

Once you’re inside your S3 bucket, navigate to the Properties tab and go to the Default encryption section. Most likely, it will be marked as Disabled. Meaning, no encryption is currently used. Click that Disabled label to edit the default encryption setting.

s3 aes 256 - s3 bucket default encryption

Next, select AES-256 as your default encryption and then click Save.

s3 aes 256 - s3 bucket default encryption select

That Disabled label you saw earlier should now be replaced with AES-256. That means, any file you upload to this S3 bucket moving forward will already be encrypted with Amazon S3 AES-256 encryption.

s3 aes 256 - s3 bucket default encryption new

[On JSCAPE MFT Server]

Now that we have AES-256 enabled on our S3 bucket, let’s now head over to our JSCAPE MFT Server instance to configure it so it can start using S3 server-side encryption when it uploads files to that S3 bucket.

Go to the domain where you have your S3 trading partner object…

s3 aes 256 - mft server domain

… and edit that S3 trading partner.

s3 aes 256 - edit trading partner

Scroll down to the Authentication section and then click the Use encryption checkbox.

Select the AES-256 option and then click the OK button.

s3 aes 256 - trading partner parameters

With that, this S3 trading partner should now be ready to use S3 AES-256 encryption. 

 

s3 aes 256 - trading partner saved

That’s all there is to it.

Before we end, let me just show you what happens when you upload a file to your AES-256-protected Amazon S3 bucket from JSCAPE MFT Server.

What I have here is a trigger that uploads a file to my Amazon S3 bucket.

s3 aes 256 - trading partner file upload trigger

So, as you can see, the Partner setting is set to tp-s3, which is the name of my Amazon S3 trading partner object. In addition, the file this trigger is configured to upload is named file01.txt, and it’s going to be uploaded to the folder named ‘folder1’ under the S3 bucket named ‘jscapejohn’.

s3 aes 256 - trading partner file upload trigger parameters-1

So, if I run this trigger…

s3 aes 256 - trading partner file upload run trigger

… and check inside the S3 bucket folder named folder1 through the AWS Management Console, I should see the newly uploaded file named file01.txt. If I click on that file and check its properties, I see that it has indeed been encrypted with AES-256 encryption.

s3 aes 256 - uploaded file encrypted in aes 256

That’s it. Now you know how to use AWS S3 AES-256 to encrypt files uploaded to your S3 trading partner using JSCAPE MFT Server.

Get started

Want to try this out? Request the free trial of JSCAPE MFT Server now.

Related content

Using AWS KMS To Encrypt Files You Upload To Your S3 Trading Partner

What is AES Encryption & How Does it Work?

How To Copy Data From Azure To AWS S3 | JSCAPE

How to Download Newly Added Files from an AWS S3 Folder

How To Schedule Automated File Uploads From Your Server To Box Cloud Storage

How To Use Amazon S3 As The File Storage System of Your MFT Server

Easy To Deploy, Easy To Administer, Easy To Manage

Ready to see how JSCAPE makes managed file transfer so much simpler? Schedule your demo now.

Request a demo

Popular Articles

View more by

JSCAPE
  •  
    1–2 minutes
    23/09/2025

    JSCAPE by Redwood, version 2025.3: New UI continues to make a splash

    Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive. 

    Read article

  •  
    1–2 minutes
    19/08/2025

    Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline

    The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of international tariffs throughout 2025, have…

    Read article

  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    23/07/2025

    Avoid downtime and threat actors: Getting the best of both worlds in MFT

    For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT software vulnerabilities to prevent breaches…

    Read article

Related Content

Read more about

JSCAPE MFT
  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    03/07/2025

    Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times

    Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are compelling enterprise organizations to reevaluate…

    Read article

  •  
    1–2 minutes
    31/03/2025

    SFTP vs. FTPS: Which file transfer software is best for business use?

    What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage…

    Read article

  •  
    1–2 minutes
    25/03/2025

    EDI integration with trading partners: 6 best practices

    Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI).…

    Read article

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Cookie Settings