Introduction
fileX is a centralized, secure file transfer service from FINRA, where customers (member firms and industry participants) can send or receive batch file(s) to FINRA Applications like CRD, ACATS etc.

fileX supports multiple access methods to send/receive files, and a customer may choose to use any of the supported access methods to transfer file(s). FINRA/s entitlement process controls the account provisioning and entitlements which control access to various application sub-spaces. Sub-spaces are the locations within each application in fileX where customers can upload or download files.
Getting Started
How to Access fileX
fileX supports four access methods:
![]() | SFTP: FINRA customers can upload or download files through Secure File Transfer Protocol (SFTP), a standard file transfer mechanism to securely transmit files between systems and machines. fileX supports the full security and authentication functionalities provided by SFTP. |
![]() | HTTPS: FINRA customers can upload or download files using REST APIs over HTTPS protocol. Customers can make standard REST API calls to the endpoint URL with valid credentials for authentication. REST API calls are encrypted through HTTPS. |
![]() | S3: FINRA customers can upload or download files natively through AWS S3 APIs. Customers who are already using Amazon AWS S3 can take advantage of this method to send/receive files directly to/from their S3 bucket. |
![]() | UI UPLOADS : FINRA customers can upload and download files, one at a time, through the FINRA Gateway Upload app. Customers can also use Upload app to manage their file history and view file feedback. |
Onboarding
Entitlement and Access Control
FINRA Entitlement Service controls access and privileges granted to customer accounts to access various services provided by FINRA. Customers have the option of creating multiple file transfer accounts with different access privileges. Types of user access includes, but is not limited to,
- read/download only
- submit only
- submit and download
This allows customers to support separation of duties within the firm across different departments. The Administrator (typically SAA) of the firm needs to contact FINRA Support or FINRA Entitlement Service to create file transfer accounts and request respective FINRA Application File Transfer entitlements. If you have any questions about the FINRA Entitlement program, please check https://www.finra.org/filing-reporting/entitlement .
fileX leverages FINRA provisioned entitlements to control access to specific upload/download directories or the respective HTTPS REST endpoints. Access to the upload and download capabilities will be controlled by specific FINRA entitlements.
On Behalf Of
Third parties can submit or download secure file transfers through fileX on behalf of (OBO) firms or organizations that have granted them permission. The OBO feature is currently only available through UI or SFTP transfer methods.
Pre-requisite
To submit or retrieve a file on behalf of another party, you must have a Prime account. See here for more information on how to create On Behalf Of (OBO) Relationship Requests.
fileX Basics
Authorization (API Basic)
The FINRA API Platform authentication and authorization scheme is based on OAuth 2.0., and there are two steps. The first call is made to FINRA Identity Platform (FIP) using credentials provided by FINRA Entitlement Service to get an OAUTH2 token. The second call is made to the fileX API endpoint with the "Authorization= Bearer" header and with the token generated in step 1.
To invoke FIP OAUTH2 API:
- Use any HTTP client, make a HTTPS POST call with FINRA Entitlement service provided credentials as Basic Auth header.
- Use the environment specific domain with the OAUTH URI: fip/rest/ews/oauth2/access_token 3. Use any standard library that supports OAUTH2 client credentials grant.
- The library should be configured with grant_type=client_credentials
Client id, Client secret will be the existing user account id and password provided by FINRA Entitlement services
FIP OAUTH2 API response will be in JSON format. Example of the response from https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token :
{
"access_token": "*AAJTSQACMDIABHR5cGUAA0pXVAACUzEAAjAx*eyJ0eXAiOiJKV1QiLCJjdHkiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.ZXlKMGVYQWlPaU pLVjFRaUxDSmxibU1pT2lKQk1USTRRMEpETFVoVE1qVTJJaXdpWVd4bklqb2laR2x5SW4wLi56RlNXS09XZklKX1FJT3htWEZtalpB LjF4LVVCMF9OdG85WmhkZlRvTW10dXNNZkxGMUN6MS0tVVVKYTYzYXBwdm8xWExVYzRLXy1raUVEOHFpRXpLZU14aUtLWDc1eTRwcVc4eVlDMs",
"scope": "any",
"token_type": "Bearer",
"expires_in":"43170"
}
Environment and Connectivity
FINRA recommends customers to first test their setup in lower environments before cutting it over to ‘Production’.
| PRODUCTION | CUSTOMER TEST | LOWER (QA) | |
|---|---|---|---|
| Environment description | Live/production environment | Production-like customer test environment | Non-Production environment for test purposes |
| Credentials | Production FINRA Enterprise Web Security (EWS) credentials | Production FINRA Enterprise Web Security (EWS) credentials | Contact the respective FINRA application to get credentials for this environment |
| Hostname /URL | filex.finra.org | filex.ct.finra.org | filex-int.qa.finra.org |
| Static IP Addresses for SFTP | 52.207.197.35 35.171.199.181 | 18.209.156.254 34.225.135.103 | 52.201.46.30 52.70.2.197 |
| Port for SFTP | 22 | 22 | 22 |
| Port for REST methods | 443 | 443 | 443 |
| FIP OAUTH2 URL | https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token | https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token | https://ews-qaint.fip.qa.finra.org/fip/rest/ews/oauth2/access_token |
TLS Certificates
FINRA Web applications/systems use TLS Certificates signed by following Certificate Authorities:
- Entrust CA
- DigiCert CA
- Amazon CA
Please ensure your applications/system trusts all the above listed Certificate Authorities when using fileX HTTPS REST APIs. FINRA APIs only support TLS version 1.2 encryption standards. See FAQs for supported ciphers.
Response Codes
The FIP API can return a range of standard HTTP response codes based on the request made to the service. Here is a list of common response codes:
| Response Code | Possible Reasons |
|---|---|
| 200 OK | Indicates a successful request |
| 400 Bad Request: error_message: “Invalid Credentials” | Either the username or password provided were incorrect or there is an issue with the user |
| 400 Bad Request: error_message: “Invalid credentials format” | The Basic Authorization header’s string is malformed |
| 400 Bad Request: error_message: “Grant type is required” | The “grant_type” parameter key was either malformed or not provided |
| 400 Bad Request: error_message: “Only client_credentials grant type is supported” | The value for the “grant_type” parameter was something other than “client_credentials” |
| 403 Forbidden | Indicates request to an invalid resource |
| 500 Internal Server Error | Indicates a possible problem with FIP |
fileX APIs return a range of standard HTTP response codes based on the request made to the service. Table below lists the response codes and possible reasons
| Response | Possible Reasons |
|---|---|
| 200 OK | Indicates a successful request |
| 400 Bad Request | Indicates the request was malformed |
| 401 Unauthorized | Indicates that either the account lacks sufficient entitlement to access requested resource or provided credentials are invalid |
| 403 Forbidden | Indicates request to an invalid resource |
| 404 Not Found | Indicates the file/directory is not found/available |
| 500 Internal Server Error | Indicates a possible problem with fileX service |
If you encounter issues or response code other than 200 (success), please check your request for errors/invalid content and retry. If you still encounter issues after fixing your request, please contact FINRA Support with the response code and the request details for further assistance
Request Headers
The following header parameters should be passed (as applicable) when making all the fileX REST API calls:
| Header | Required (Y/N) | Default | Example |
|---|---|---|---|
| Authorization | Y | N/A | Authorization: Bearer (OAUTH Token from FIP) |
| Accept | N | application/json | application/json, application/xml |
| Content-Type | N | application/json | application/json, application/xml |
Access Methods
SFTP Transfer Method
The following steps are required to use the fileX SFTP service
Open firewall to allow outbound traffic on port 22 to FINRA SFTP host IP addresses.
- Request FINRA to allow inbound traffic on port 22 for your outbound server’s internet routable IP address. Please call FINRA support at 800-321-6273 and provide the list of external IPs to be whitelisted to open the network/firewall from FINRA.
- Request FINRA Credentials (if not already available) with entitlements for specific FINRA application file transfer.
- Install and configure a SFTP client/library to connect and transfer files.
Ensure the following SFTP SSH configurations are set appropriately on your SFTP client
Supported Ciphers and Algorithms List
Supported Ciphers and Algorithms 1 Supported SSH Ciphers - aes128-ctr
- [email protected]
- aes192-ctr
- aes256-ctr
- [email protected]
2 Supported SSH Key Exchange Algorithms - mlkem768x25519-sha256
- mlkem768nistp256-sha256
- mlkem1024nistp384-sha384
- diffie-hellman-group14-sha256
- diffie-hellman-group16-sha512
- diffie-hellman-group18-sha512
- ecdh-sha2-nistp384
- ecdh-sha2-nistp521
- ecdh-sha2-nistp256
- diffie-hellman-group-exchange-sha256
- [email protected]
- curve25519-sha256
3 Supported SSH MAC Algorithms - Using On Behalf Of (OBO) for SFTP
- Open your SFTP client.
- Log in with your Prime account user name and password, or you can use your SSH key.
- Once you are connected to the host, you can see the profile org IDs that you are entitled to submit through OBO, and you can upload and download files with that profile org.
- Note: You can view an org ID to see the entitlement for the profile. For example, if an org ID shows 606 NMS, the profile is entitled for SEC Rule 606 NMS Reporting.
- Here is an example of submitting a file OBO using CURL commands:

AWS S3 DIRECT TRANSFER
The following steps are required to use the fileX S3 Direct service:
- Open firewall to allow outbound traffic on port 443 from your outbound server IP address to fileX HTTPS REST APIs and to FINRA Identity Platform (FIP) API endpoints.
- Request FINRA Credentials (if not already available) with entitlements for specific FINRA application file transfer.
- Open firewalls to allow traffic to/from AWS S3.
- For AWS S3 IP ranges refer to: https://docs.aws.amazon.com/general/latest/gr/aws-ipranges.html.
- Invoke FIP OAUTH API to obtain OAUTH token .
- Obtain S3 STS access token from the fileX REST API for AWS S3.
- Use the S3 STS access token to upload/download using AWS S3 APIs or AWS CLI or AWS SDK wrapper libraries.
Request Parameters
Parameters Required Accepted Values Case Sensitive Description ORG_ID Y Numerical values 0-9+ N/A Number representing the account’s orgId provided by FINRA (e.g. 0001 or 888888) APPLICATION Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application (e.g. focus, crd, appX) Response Attributes
Element/Attribute Key Description region AWS region where S3 bucket is located sessionName Unique identifier generated by fileX for the request to generate the token readPaths List of application spaces available to the users to download file(s) writePaths List of application spaces available to the users to upload file(s) accessKeyId 20 character alphanumeric string that identifies the temporary access token secretAccessKey 40 character alphanumeric string used to sign the request sessionToken Token that users must pass to the service API to use the access token. Token is valid for 1 hour only. Users will have to generate and use new tokens to upload/download additional file(s) to AWS S3 after the previous token is expired. expiration Time at which current access token expires
AWS S3 Sample Code
Complete the following steps to upload/download your file using AWS S3:
- Get OAUTH2 access_token from FIP OAUTH2 API (HTTP Method: POST) curl --location --request POST 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=c…' --header 'Authorization: Basic XXXXXXXXXXXXXXXXXXXXXXXXXXX'
- Invoke fileX API (HTTP Method: GET) curl -X GET https://filex.finra.org/S3TransferTokens/0001/app1 -H "Accept: application/json" -H "Authorization: Bearer
After getting the access token using fileX S3Token API, customers can use any of the AWS S3 APIs, AWS CLI or AWS SDK wrapper libraries to upload/download files.
GET Sample Request to fileX APIhttps://filex-int.qa.finra.org/S3TransferTokens/7777/app1
Sample Response from fileX API{ "region": "us-east-1", "sessionName": "filexuser7777@26592f93-f124-4d9a-a6ed-eefc3c9dba01", "readPaths": [ "1422-4800-0760-filex-qa-int/7777/app1/in_arcv/", "1422-4800-0760-filex-qa-int/7777/app1/out/" ], "writePaths": [ "1422-4800-0760-filex-qa-int/7777/app1/in/" ], "credentials": { "accessKeyId": "ASIAST4OK6N2C5M", "secretAccessKey": "UjJ968D0V4lzIN65FfnlKUqFdBig2va0Cr", "sessionToken": "FwoGZXIvYXdzENb//////////wEaDB2zD7M442u66VFVVSK0FbhMz2DWa0HHkLxEH+uKHQg22mTJzOxhCE8zEv3tUnF1wzGWL5I//zVch7abvQR6ivLw12bGTyckLADiMOEkLNDOBzAlaaSWTaGiS0A8k5RKsDelUsH4rtyducNcJRRGAzjnRII+HWOc1LyulULlAz2tO44YDKmOWOGjdnPr2xljOLTx PgwaVzNNM8NTcdCGNepWICl3r2A1UUESbzWrG6RCNyhU9vyxt4PJiRyRhHj6pQ4I++GVUvEhmyfiH4HbTo39x5uteFZw2Utn0jDp6TPHF8CvZmUf9a9Ygxo58axzJbDlBoFr0o2Y44TCHisYaewJfSptEdkPyQGIqFi1v1", "expiration": "2025-08-22T17:29:58.000-04:00" } }
Sample Python Code to call FIP and fileXimport base64, requests, sys, json username = '1234ftp12' password = '******' # Base64 encode username:password userpass = username + ":" + password authorization = base64.b64encode(userpass.encode()).decode() # Prepare headers for POST call to FIP OAUTH2 fipRequestHeaders = { 'Authorization': 'Basic ' + authorization, } # Make the request to FIP fipUrl = 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=client_credentials' fipResponse = requests.post(fipUrl, headers=fipRequestHeaders) fipResponseJson = json.loads(fipResponse.text) # Retrieve access token from FIP response access_token = fipResponseJson["access_token"] # Prepare headers for GET call to fileX API fileXRequestHeaders = { 'Authorization': 'Bearer ' + access_token, 'Accept': 'application/json', } fileXUrl = "https://filex.finra.org/files/0001/app1" # Make the request fileXResponse = requests.get(fileXUrl, headers=fileXRequestHeaders)
Sample AWS CLI Code to upload a file to an application sub-spaceexport AWS_ACCESS_KEY_ID=ASIA203QSOJNCHBALYNN export AWS_SECRET_ACCESS_KEY=phshuUXUANHMXx9awFsZx7YJSX1074t4d02nG2p export AWS_ACCESS_TOKEN=FOoGZXIvYXdcEGoaDMx5LP2o0aRUA5QzyiKoBE/BrAiV9FRPb/ilip/rXf8nRgMTODCoSeMa23481K5//gYcRCVOIcCzfjWgv+HFKIOBrerceso9ROIZBHVBIAj3WNNjyb OtaxSvUOQc5cTioWA.UiPOnhpgUy+fC1PnfgXAAbugyfaxulrolyWOL9TACfnURzsbHOUD8+HMZt5qGSsEppljrkb/9Gxad+NXFgQ568cheffk9yn25NcaER95R11Si60/dEIE2WZPAleh/ Xt12dpPeeskm/KEWwAq2bN3DwBOYeoG8IA6exlickneMu6L300cIPcWbxwcpZpTG5cOPPOI6/C6XvuFa918yelxMFBBNf7PoRa0x1KTeT/m/d.Sd/LWpa/31aTeCFPFoBPkeG/ gpJPLrvrwlKUFxQkVVCRfFwdTkezauvQFov4D9J0ZkMaHFsfinWMitxrrTZOUVtgzZd5BayxOLmyoK9g2gE2fOfg9Rr5Far5Ds3xynR3dl94nbiH5PjzonGllsaHe4Rm0cT+Ta8f07i0B/ T+nU5Kb8c4t7alyh2rXc+KXBBiRrtOOVCocYbcMZFUzBKMo02xNa5msimSM21CC/ e3jPF14erSeEsAyu+gXBX2NpoVekqQ0UaRalYvgGTLdR82WzfblxFfUMudoWIt7uatih8/fgepV6NsmAXHUVck+SnIrGAXLmHgW6CFZDS/R/ cLeyLXV54zkDqATLezheYIGhC2XsGzFYukAM3B039akr2UWWwSjjo/zjell== aws s3 cp test.txt s3://bucket-filex/001/app1/in/test.txt
FINRA Gateway Upload App Overview
Complete the following steps to upload your file via the Upload app in FINRA Gateway:
- Log in to FINRA Gateway: https://gateway.finra.org/. In case of using the On Behalf Of feature, login using your prime account.
- Continue to multi-factor authentication and complete the prompt in your MFA client. For example, Duo is an MFA client.
- Important: In case of using On Behalf Of feature, you will see your Prime account listed first, followed by profiles from organizations that have given you permission to submit files for them. Profile accounts always start with [obo+the Org ID]. Select the profile you want to submit on behalf of.
- Select Upload in the left menu bar or from the dashboard page

- Make your selections and Submit your file for upload. You must upload one file at a time, and file size cannot exceed 5120 MB.
- Select the Upload File History tab to view the files you have uploaded for the past thirty days. Select the File Feedback tab to download your file with FINRA’s feedback.

- To switch Profiles while using On Behalf Of (OBO) feature, go to your account and select Manage Log Ins.

- From the login screen, you can change accounts, complete MFA, and then you can upload files for another profile.

HTTPS REST API
The following steps are required to use the fileX HTTPS REST API service:
- Open firewall to allow outbound traffic on port 443 from your outbound server IP address to fileX HTTPS REST APIs and to FINRA Identity Platform (FIP) API endpoints
- Request FINRA Credentials (if not already available) with entitlements for specific FINRA application file transfer (see section 4)
- Open firewalls to allow traffic to/from AWS S3. Upload and Download services currently use native AWS S3 endpoints.
- For AWS S3 IP ranges refer to: https://docs.aws.amazon.com/general/latest/gr/aws-ipranges.html
- Invoke FIP OAUTH API to obtain OAUTH token
- Invoke/Call fileX HTTP REST APIs with FIP OAUTH token as detailed in section 5 below
HTTPS Endpoints
fileX provides the following HTTPs endpoints to users.
List Available Applications
Provides an ability to get all the applications or directories that the user has access to.
Request Parameter
Parameters Required Accepted Values Case Sensitive Description ORG_ID Y Numerical values 0-9+ N Number representing the account’s orgId provided by FINRA (e.g. 0001 or 888888) Response Parameter
Element/Attribute Key Description name Name of the present working space/directory type Type of this object
DIR = directorymetadata -> writable denotes if this is a writable space true/false children Child spaces/directories accessible Name, type, and metadata values are similar to self _links API links to self and children Sample Code for GET a list of available applications
Step 1: Get OAUTH2 access_token from FIP OAUTH2 API (HTTP Method: POST) curl --location --request POST 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=c…' --header 'Authorization: Basic XXXXXXXXXXXXXXXXXXXXXXXXXXX'
Step 2: Invoke fileX API (HTTP Method: GET) curl -X GET https://filex.finra.org/files/0001 -H "Accept: application/json" -H "Authorization: Bearer
GET Sample Request to fileX APIhttps://filex.finra.org/fileX/0001
GET Sample Response{ "name": "0001", "type": "DIR", "metadata": { "writable": false }, "children": [ { "name": "testDIR1", "type": "DIR", "metadata": { "writable": false } }, { "name": "testDIR2", "type": "DIR", "metadata": { "writable": false } } ], "_links": { "self": [ { "href": "https://filex.finra.org/files/0001" } ], "parent": [ { "href": "https://filex.finra.org/files" } ], "children": [ { "href": "https://filex.finra.org/files/0001/testDIR1" }, { "href": "https://filex.finra.org/files/0001/testDIR2" } ] } }
List Available Application Sub Spaces
Provides a list of sub-spaces within a given application or directory as well as links to the directory and spaces
Request Parameters
Parameters Required Accepted Values Case Sensitive Description ORG_ID Y Numerical values 0-9+ N Number representing the account’s orgId provided by FINRA (e.g. 0001 or 888888) APPLICATION Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application (e.g. focus, crd, appX) Response Parameters
Element/Attribute Key Description name Name of the present working space/directory type Type of this object
DIR = directorymetadata -> writable denotes if this is a writable space
true/falsechildren Child spaces/directories accessible
Name, type, and metadata values are similar to self_links API links to self and children Sample Code for GET a list of available application spaces
Step 1: Get OAUTH2 access_token from FIP OAUTH2 API (HTTP Method: POST) curl --location --request POST 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=c…' --header 'Authorization: Basic XXXXXXXXXXXXXXXXXXXXXXXXXXX'
Step 2: Invoke fileX API (HTTP Method: GET) curl -X GET https://filex.finra.org/files/0001 -H "Accept: application/json" -H "Authorization: Bearer
GET Sample Request to fileX APIhttps://filex.finra.org/fileX/0001/app1
GET Sample Response{ "name": "app1", "type": "DIR", "metadata": { "writable": false }, "children": [ { "name": "out", "type": "DIR", "metadata": { "writable": false } }, { "name": "in", "type": "DIR", "metadata": { "writable": true } }, { "name": "in_arcv", "type": "DIR", "metadata": { "writable": false } } ], "_links": { "self": [ { "href": "https://filex.finra.org/files/0001/app1" } ], "parent": [ { "href": "https://filex.finra.org/files/0001" } ], "children": [ { "href": "https://filex.finra.org/files/0001/app1/out" }, { "href": "https://filex.finra.org/files/0001/app1/in" }, { "href": "https://filex.finra.org/files/0001/app1/in_arcv" } ] } }
List Available Files in Application Sub Space
Provides an ability to get all the application sub-spaces that the user has access to.
Request Parameter
Parameters Required Accepted Values Case Sensitive Description ORG_ID N Numerical values 0-9+ N/A Number representing the account’s orgId provided by FINRA (e.g. 0001 or 888888) APPLICATION Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application SUB_SPACE Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application subspace Response Parameter
Element/Attribute Key Description name Name of the present working space/directory type Type of this object
DIR = directorymetadata -> writable denotes if this is a writable space true/false children -> name Name of the file children -> type Type of this object FILE = file children -> metadata -> writable denotes if this file can be modified true/false children -> metadata -> contentLength Size of the file in bytes children -> metadata -> lastModified Time file was last modified with UTC time zone _links API links to parent, self and children Sample Code for GET a list of available applications
Step 1: Get OAUTH2 access_token from FIP OAUTH2 API (HTTP Method: POST) curl --location --request POST 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=c…' --header 'Authorization: Basic XXXXXXXXXXXXXXXXXXXXXXXXXXX'
Step 2: Invoke fileX API (HTTP Method: GET) curl -X GET https://filex.finra.org/files/0001/app1/out -H "Accept: application/json" -H "Authorization: Bearer
GET Sample Request to fileX APIhttps://filex.finra.org/fileX/0001/app1/out
GET Sample Response{ "name": "out", "type": "DIR", "metadata": { "writable": false }, "children": [ { "name": "Testfile.txt", "type": "FILE", "metadata": { "writable": false, "contentLength": 130766, "lastModified": "2025-08-04T07:30:34.000-04:00" } }, { "name": "Testfile2.txt", "type": "FILE", "metadata": { "writable": false, "contentLength": 130766, "lastModified": "2025-08-05T07:29:18.000-04:00" } } ], "_links": { "self": [ { "href": "https://filex.finra.org/files/0001/app1/out" } ], "parent": [ { "href": "https://filex.finra.org/files/0001/app1" } ], "children": [ { "href": "https://filex.finra.org/files/0001/app1/out/Testfile.txt" }, { "href": "https://filex.finra.org/files/0001/app1/out/Testfile2.txt" } ] } }
Python Code Sample to get a list of filesimport base64, requests, sys, json username = '1234ftp12' password = '******' # Base64 encode username:password userpass = username + ":" + password authorization = base64.b64encode(userpass.encode()).decode() # Prepare headers for POST call to FIP OAUTH2 fipRequestHeaders = { 'Authorization': 'Basic ' + authorization, } # Make the request to FIP fipUrl = 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=client_credentials' fipResponse = requests.post(fipUrl, headers=fipRequestHeaders) fipResponseJson = json.loads(fipResponse.text) # Retrieve access token from FIP response access_token = fipResponseJson["access_token"] # Prepare headers for GET call to fileX API fileXRequestHeaders = { 'Authorization': 'Bearer ' + access_token, 'Accept': 'application/json', } fileXUrl = "https://filex.finra.org/files/0001/app1/out" # Make the request fileXResponse = requests.get(fileXUrl, headers=fileXRequestHeaders)
Download File from Application Sub Space
Provides an ability to download files from application sub-spaces that the user has access to.
Request Parameter
Parameters Required Accepted Values Case Sensitive Description ORG_ID N Numerical values 0-9+ N/A Number representing the account’s orgId provided by FINRA (e.g. 0001 or 888888) APPLICATION Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application SUB_SPACE Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application subspace FILE_NAME Y Alphanumeric [a-zA-Z09]!@,&-='. Y Name of the file Response Parameter
Element/Attribute Key Description url URL used to execute the file download via GET call expirationTime Time URL expires. Cannot initiate download after expiration time. Sample Code to download a file
Step 1: Get OAUTH2 access_token from FIP OAUTH2 API (HTTP Method: POST) curl --location --request POST 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=c…' --header 'Authorization: Basic XXXXXXXXXXXXXXXXXXXXXXXXXXX'
Step 2: Invoke fileX API (HTTP Method: GET) curl -X GET https://filex.finra.org/files/0001/app1/out/testfile.txt -H "Accept: application/json" -H "Authorization: Bearer
GET the pre-signed URL from the fileX APIhttps://filex.finra.org/fileX/0001/app1/out/testfile.txt
Sample Response for the pre-signed URL{ "url": "https://1422-4800-0760-filex-qa-int.s3.amazonaws.com/79/fileX/out/0AcREpi4FR-AtestVerboseRegexWithLette-1%2FX-Amz-Expires=60&X-Amz-SignedHeaders=host&X-Amz-Security-Token=FwoGZXIvYXdzEOX%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDA3fRJlRsgYWKxgu5yLUAT3YUGSbtHh1G93w0BDuYQvcImXpEP7gu51a6088df6764d73fc5cd9b", "expirationTime": "2025-08-23T07:53:34.620-04:00" }
Python code sample to get the pre-signed URL:import base64, requests, sys, json username = '1234ftp12' password = '******' # Base64 encode username:password userpass = username + ":" + password authorization = base64.b64encode(userpass.encode()).decode() # Prepare headers for POST call to FIP OAUTH2 fipRequestHeaders = { 'Authorization': 'Basic ' + authorization, } # Make the request to FIP fipUrl = 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=client_credentials' fipResponse = requests.post(fipUrl, headers=fipRequestHeaders) fipResponseJson = json.loads(fipResponse.text) # Retrieve access token from FIP response access_token = fipResponseJson["access_token"] # Prepare headers for GET call to fileX API fileXRequestHeaders = { 'Authorization': 'Bearer ' + access_token, 'Accept': 'application/json', } fileXUrl = "https://filex.finra.org/files/0001/app1/out/testfile.txt" # Make the request fileXResponse = requests.get(fileXUrl, headers=fileXRequestHeaders)
Upload File to Application Sub Space
This method allows users to upload file(s) to an application sub-space
Request Parameter
Parameters Required Accepted Values Case Sensitive Description ORG_ID N Numerical values 0-9+ N/A Number representing the account’s orgId provided by FINRA (e.g. 0001 or 888888) APPLICATION Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application SUB_SPACE Y Alphanumeric [a-zA-Z0-9] Y Name of the FINRA application subspace FILE_NAME Y Alphanumeric [a-zA-Z09]!@,&-='. Y Name of the file filex-
{attribute}
N Alphanumeric [a-zA-Z09]!@,&-='. N Optional metadata that can be attached with the file e.g. filex-InternalReference Response Parameter
Element/Attribute Key Description url URL used to execute the file download via GET call expirationTime Time URL expires. Cannot initiate download after expiration time. trackingId Unique Identifier to track the upload file request Sample Code for Upload file(s) to the application sub-space
Step 1: Get OAUTH2 access_token from FIP OAUTH2 API (HTTP Method: POST) curl --location --request POST 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=c…' --header 'Authorization: Basic XXXXXXXXXXXXXXXXXXXXXXXXXXX'
Step 2: Invoke fileX API (HTTP Method: PUT) curl -X PUT https://filex.finra.org/files/0001/app1/in/newfile.zip -H "Accept: application/json" -H "Authorization: Bearer
PUT Request for the pre-signed URL from the fileX APIhttps://filex.finra.org/fileX/0001/app1/in/newfile.zip
Sample Response for the pre-signed URL{ "url": "https://1422-4800-0760-filex-qa-int.s3.amazonaws.com/79/fZizZcf3%2BYYI%2FuZrapUY%2F5Z%24lqsfOn4%2Bbkj4buGKefeI5IZ0Ew78bh6i7I7gOD9FA7qM2j1ZB%2FSsIkfJnHjfGL1beC8x%2FM3Vu9XpiTOKpemHXdlK9kyep%2FrsPwmFKK6Wp8UGMi1L%2F4BkKr1jLBLX268iYeGXlO2IUgIARg05d9jmRJ9%2BLviuLtAROJfTESifFCw%3D&X-Amz-Signature=7e5b6c1b156c83ff22492855acc714bdd981b34b775dfe07e08ad846d61358b5", "expirationTime": "2025-08-23T10:08:42.244-04:00", "trackingId": "d3caf6d8-34a4-4b83-9b63-b20dc055286" }
Python code sample to get the pre-signed URL:import base64, requests, sys, json username = '1234ftp12' password = '******' # Base64 encode username:password userpass = username + ":" + password authorization = base64.b64encode(userpass.encode()).decode() # Prepare headers for POST call to FIP OAUTH2 fipRequestHeaders = { 'Authorization': 'Basic ' + authorization, } # Make the request to FIP fipUrl = 'https://ews.fip.finra.org/fip/rest/ews/oauth2/access_token?grant_type=client_credentials' fipResponse = requests.post(fipUrl, headers=fipRequestHeaders) fipResponseJson = json.loads(fipResponse.text) # Retrieve access token from FIP response access_token = fipResponseJson["access_token"] # Prepare headers for GET call to fileX API fileXRequestHeaders = { 'Authorization': 'Bearer ' + access_token, 'Accept': 'application/json', } fileXUrl = "https://filex.finra.org/files/0001/app1/out/newfile.zip" # Make the request fileXResponse = requests.get(fileXUrl, headers=fileXRequestHeaders)Step3, cURL to upload the file using pre-signed URL in Step 2 (HTTP Method: PUT): curl –X PUT –T ./newFile.zip
Supported Applications
This section lists the application sub-spaces and retention policies for the respective applications in fileX. This section will be updated as FINRA applications migrate to fileX service but if any application space you are trying to use is not listed below, please contact FINRA support to get details.
Key:
- Immediately Moved - these files are moved out of the indicated sub-space as soon as they are processed by the downstream applications. There should be no expectation that the files in these application sub-spaces will persist beyond the transfer itself.
- N days - Number of days for which files will remain in the indicated application sub-space. Files will be removed from the application sub-space after N days have passed.
| App Name | App Space Name | Supported Transfer Methods | File Retention Duration for file Download | |
|---|---|---|---|---|
| 1 | 606nms | in, out | SFTP + HTTPS + S3_DIRECT | 90 calendar days |
| 2 | acats | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 3 | adv | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 4 | aepstockrec | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 5 | annual_audit_filing | out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 6 | ats_exempt_trd | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 7 | bd_auditor_dsclr_feed | out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 8 | beacon | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 9 | blotters | data, legend, out | SFTP + HTTPS + S3_DIRECT | 15 calendar days |
| 10 | blshts | in, out | SFTP + HTTPS + S3_DIRECT | 1 calendar days |
| 11 | box | out | SFTP + HTTPS + S3_DIRECT | 90 calendar days |
| 12 | cboednc | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 13 | cccs | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 14 | ceplatfm | courseproviders_in, courseproviders_out, courseresults_in, courseresults_out, courses_in, courses_out, incidentreports_in | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 15 | cfportal | in | SFTP + HTTPS + S3_DIRECT | |
| 16 | cleanshares | in | SFTP + HTTPS + S3_DIRECT | |
| 17 | clm | out | SFTP + HTTPS + S3_DIRECT | |
| 18 | dtcc-fdr | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 19 | edgar_pds | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 20 | erd | mdsfund | SFTP + HTTPS + S3_DIRECT | |
| 21 | etf | in, in_pcf_main, in_pcf_supp | SFTP + HTTPS + S3_DIRECT | N/A |
| 22 | fdr | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 23 | firmcontact | out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 24 | focus | in, out | SFTP + HTTPS + S3_DIRECT | 120 calendar days |
| 25 | FormT | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 26 | fss | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 27 | iard | foia_download, foia_upload | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 28 | livevolusr | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 29 | mpp | in, in2 | SFTP + HTTPS + S3_DIRECT | N/A |
| 30 | msrb_avts | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 31 | nasdaq_vntv | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 32 | nav | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 33 | nq_clrg | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 34 | NVXPLYTC | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 35 | otc | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 36 | pfrd | file_in, file_out, out, section1To4_report_out, section5_event_report_out, section6_event_report_out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 37 | otc | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 38 | pfrd | covered_agency_in, covered_agency_out, enhanced_margin_in, enhanced_margin_out, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 39 | phlxdnc | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 40 | pmap | covered_agency_in, covered_agency_out, enhanced_margin_in, enhanced_margin_out, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 41 | r4530 | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 42 | rdms | incoming, xbrl | SFTP + HTTPS + S3_DIRECT | |
| 43 | regm | in, out | SFTP + HTTPS + S3_DIRECT | |
| 44 | rema | in | SFTP + HTTPS + S3_DIRECT | |
| 45 | rex | in, out | SFTP + HTTPS + S3_DIRECT | |
| 46 | rgstrn_submission | out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 47 | sbs | in | SFTP + HTTPS + S3_DIRECT | |
| 48 | shortinterest | out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 49 | shorts | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 50 | slate | feedback, filings | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 51 | ssmart | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 52 | stockrecord | in, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 53 | tdr | in_ice, in_ndq, out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 54 | teamconn | in | SFTP + HTTPS + S3_DIRECT | N/A |
| 55 | thresholdlist | out | SFTP + HTTPS + S3_DIRECT | 30 calendar days |
| 56 | tradejrnls | agency, agencyc, clearing_cds, clearing_orf, equity_adf, equity_orf, trace_ca, trace_cb, trace_cb_144a, trace_cb_144ac, trace_cbc, trace_eod_sp, trace_eod_spc, trace_eod_tsds, trace_eod_tsdsc, trace_sp, trace_sp_144a, trace_sp_144ac, trace_trsry, tsar, tsarc | SFTP + HTTPS | 30 calendar days |
| 57 | trpcy_srvc_erd | in_cds | SFTP + HTTPS + S3_DIRECT | N/A |
| 58 | workday | from_vms, from_workday, to_vms, to_workday | SFTP + HTTPS + S3_DIRECT | 14 calendar days |
| 59 | wssdmcredreg | ouy | SFTP + HTTPS + S3_DIRECT | 30 calendar days |



