Tether your HSTS node to Aspera on Cloud
Once you have completed the preceding configuration steps, you can add your IBM Aspera HSTS node to your Aspera on Cloud organization.
This is step 8 in tethering a node
Before you begin step 8, be sure you have completed the previous steps.

Prerequisites
To complete this procedure, you need the following information:
- Node URL.
- Node SSH fingerprint. Aspera recommends that you secure transfers with the SSH fingerprint from the transfer node (but it is not required). For information about retrieving the node fingerprint, see Securing Your SSH Server in the IBM Aspera High-Speed Transfer Server Admin Guide.
- To use an existing access key for the node (that you created on the transfer server), you need the access key ID and secret.
- To create a new access key in the process of adding the transfer server (node) to your
organization, you need the Node user name and password, and information about the storage you are
using.
For local storage, this is simply the path on the node. For cloud storage you need to know the details of that storage (for IBM Cloud, Amazon S3, Microsoft Azure Blob, or Microsoft Azure Files). For example, for Amazon S3, you need the storage class, IAM Assume role credentials, endpoint, bucket, and path.
Add the node
This is the procedure that actually tethers the node you've configured to your Aspera on Cloud organization.
- In the Admin application, go to Nodes > Create new.
- Enter the name that you want to use for this node.
- Enter the node's URL and asperanoded port.
For example:
https://www.example.com:443
.Note: Be sure to use the asperanoded port as configured for your tethered-node server. See Configure monitoring and metering for your tethered node. - Optionally, enter the node SSH fingerprint.
- To apply a configured network policy to this node, click the downward caret in the Network Policy field and select the intended policy; see Creating Network Policies.
- To apply a configured node configuration policy to this node, click the downward caret in the Configuration Policy field and select the intended policy; see Creating Node Configuration Policies.
- To apply a file deletion policy to help manage storage usage, click the field and select the intended policy; see "Configure file deletion policies" in Managing storage usage.
- Provide an access key/secret pair.
- If you have already created a key/secret pair for this node on your transfer server, click Use existing and enter the node access key and secret. Then click Save, and you are done with this procedure.
- Otherwise, click Create new access key and proceed with the following steps.
- Enter the Node user name.
- Enter the Node user password.
- Select the storage type, and configure storage details with data relevant to this storage
type.
- Local
Local Term Local Definition Path The absolute path on the storage. - Amazon S3
Amazon S3 Term Amazon S3 Definition Storage class Select a storage class. Select from: Standard, Standard Infrequent Access, Intelligent Tiering, Glacier Instant Retrieval, Glacier Flexible Retrieval, Glacier Deep Archive, One Zone Infrequent Access. For important details on AoC functionality in specific storage classes, see Attach an AWS S3 bucket.Server-side encryption Select to configure encryption on the server in AWS: None, AES-256, AWS KMS.KMS key ID ARN
or
KMS key alias ARN
If using AWS KMS server-side encryption: The AWS Key Management Service key ID, in the format arn:aws:kms:<region>:<account_number>:key/<encryption_key_id>.
KMS key ID example: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab".
or
The AWS Key Management Service key alias, in the format arn:aws:kms:<region>:<account_number>:alias/<encryption_key_alias>.
KMS key alias example: "arn:aws:kms:us-west-2:111122223333:alias/my_key_alias"
Note: Be sure to include the AWS bucket region in the ARN.IAM Role ARN The Amazon Resource Name (ARN) of the IAM role to assume. External ID The unique identifier used by third parties when assuming roles in their customers' accounts. The storage account holder sets this ID. To find it, go to the AWS management console, then click Roles > yourRole > Trust Relationship. Find your trust relationship in the list, and see the External ID listed in the 'Conditions' column for that relationship. If your trust relationship does not include an external ID, you can edit the trust relationship to add one as required. For more information on External ID, see "How to use an external ID when granting access to your AWS resources to a third party." Session name The role session name that uniquely identifies a session when the same role is assumed by different principals or for different reasons. Bucket The bucket name. Endpoint The URL that is the entry point to the storage for a web service. Example: s3.amazon.com. Path The relative path under the bucket. - IBM Cloud
IBM Cloud Term IBM Cloud Definition Access key ID The ID of the access key for the IBM Cloud. Secret access key The secret that matches the key. Bucket The bucket name. Endpoint The URL that is the entry point to the storage for a web service. Example: s3.us.cloud-object-storage.appdomain.cloud. Path The relative path under the bucket. - Microsoft Azure Blob
MS Azure Blob Term MS Azure Blob Definition API type Select as appropriate: (1) Block, or (2) Page. Storage credentials The access key for SAS URL for the storage. Storage account The storage account provides a unique namespace in Azure for your data. Every object that you store in Azure Storage has an address that includes your unique account name. The combination of the account name and the Azure Storage blob endpoint forms the base address for the objects in your storage account. Access key The key ID associated with the storage account. Container he name of the container that organizes a set of blobs. A container is similar to a directory in a file system. Path The relative path in the container. - Microsoft Azure Files
MS Azure Files Term MS Azure Files Definition API type Select as appropriate: (1) Block, or (2) Page. Storage account The storage account provides a unique namespace in Azure for your data. Every object that you store in Azure Storage has an address that includes your unique account name. The combination of the account name and the Azure Storage blob endpoint forms the base address for the objects in your storage account. Password The password to the storage account. Path The relative path on the storage.
- Local
- Click Save.
- Click Download Access Key Pair.
- Download or copy and save the Aspera on Cloud access key and secret according to local site
practice. These credentials allow you to access this node for content management and configuration
activities. If you download, Aspera generates a text file with the default name
KeySecret.txt
. Aspera recommends that you rename this file to make it easier to track and manage. You must download or copy these credentials to proceed.Important: Store the key and secret in a secure and accessible location according to local site security practices. Aspera on Cloud does not store the secret. Once you complete this step, you can no longer retrieve the secret. - Click OK.
- To protect content on this node with Aspera encryption at rest, do one of the following:
- To use Aspera's native key management capabilities, see Use Aspera-Managed Keys for Server-Side Encryption at Rest.
- To use your own key management service (KMS), see Bring your own key for server-side encryption at rest.
- Click Save.
Updating node status
Aspera on Cloud polls the transfer node for node settings every five minutes; configuration changes you make to the node (for example, changes to aspera.conf) are propagated to Aspera on Cloud at that polling interval. If necessary, you can initiate an immediate poll from Aspera on Cloud to the node so that node configuration changes are reflected immediately in Aspera on Cloud behaviors.
- Go to Nodes and storage > Nodes.
- Filter, search, or browse for the intended node in the node list.
- Double-click the node row and select Update Status, then click OK to confirm.
Next step in tethering a node
You've added your tethered node to your AoC organization. For step 9 in tethering the HSTS node to your AoC organization, go to Mark remote storage attached to your tethered node as mount points.