Details in progress as of 11/8/24
Every night at 8pm we will generate 3 encrypted files that will be sent to T-Mobile. The T-Mobile Control M group will decrypt the files and post them for retrieval by the AIMS team. An hour later at 9pm they will post an encrypted confirmation file for us to receive.
Scripts are located on SEQ-UTIL in C:\Scripts\T-MobileAIMS and everything else is in C:\TMobile_AIMS\ with the executables in \Applications\
The scripts are set up as scheduled tasks and run as SVC_UTIL_SCRIPTS with the login details stored in LastPass
The first script
- Calls AIMS_Generator.exe which generates 3 csv files
- Uses GnuPG to encrypt the files using the T-Mobile public key CTM_TXFR_1_Pub.txt
- Uses WinSCP to connect to the SFTP server using our private key for authentication Sequoyah_Electric_SSH_Private.ppk
- Uploads the gpg files to the "Incoming" folder
- Moves the .csv files to the "Sent" folder
- Deletes "Sent" folder items older than 30 days
The second script
- Uses WinSCP to connect to SFTP using the same key
- Downloads all files from the "Outgoing" folder
- Uses GPG to decrypt the files using our private key (Sequoyah_Electric_0xBEC09E71_SECRET.asc)
- ?? We ingest the data
- Moves the received files to Received_Archive folder
- Deletes received files older than 30 days