THE INFORMATION IN THIS ARTICLE APPLIES TO:
- EFT Server Enterprise version 126.96.36.199 and later
When HTTPS is enabled, EFT Server will automatically redirect HTTP traffic to HTTPS for logins, forced password changes, and lost username and password functionality. The redirect check box in the administration interface controls both the login page and the connection, but only when HTTPS is enabled. The purpose of the registry override described below is to control whether the login portion of the session is redirected to HTTPS when redirect is OFF in the administration interface. (The redirect check box is unavailable when HTTPS is disabled.)
The following registry value will disable the redirection.
32-bit: HKEY_LOCAL_MACHINE\Software\GlobalSCAPE Inc.\EFT Server 4.0 "DisableHTTPAccountSecurity"=dword:00000001
64-bit: HKEY_LOCAL_MACHINE\Software\WOW6432Node\GlobalSCAPE Inc.\EFT Server 4.0 "DisableHTTPAccountSecurity"=dword:00000001
Optionally provide private feedback to help us improve this article...
Thank you for your feedback!