HeartLab
Connectivity

SFTP Reports

Configure secure SFTP delivery for finalized HeartLab reports.

SFTP Reports

HeartLab supports secure delivery of finalized reports to third-party systems such as:

  • Patient Management Systems (PMS)
  • Electronic Medical Records (EMR)
  • Other downstream document workflows

This integration uses Secure File Transfer Protocol (SFTP) to automatically transfer finalized report PDFs from HeartLab to your receiving system.

Applies to

  • Users with Integrations: SFTP permissions (typically Administrators)
  • IT teams managing receiving SFTP infrastructure

Before You Begin

You will require an SFTP server that supports:

  • Secure File Transfer Protocol over SSH (SFTP)

Gather the following details from your SFTP administrator:

SettingDescription
Public IP address or DNS nameDestination server
Port numberUsually 22
UsernameSFTP username
Remote target prefixOptional destination folder/path
HeartLab onboarding staff can assist with SFTP integration setup if required.

Whitelist HeartLab Traffic

Depending on your HeartLab hosting region, allow inbound traffic from the following HeartLab IP addresses.

Asia Pacific (Australia & New Zealand)

  • 13.239.48.108
  • 13.55.172.127
  • 3.24.94.42

North America (United States)

  • 35.85.135.96
  • 52.41.164.211
  • 54.149.133.245
If your firewall restricts inbound traffic, ensure these IP addresses are whitelisted before testing the integration.

Configure the SFTP Integration

If you do not see these settings, your role may not include Integrations permissions. Contact your HeartLab administrator if required.
  1. In HeartLab, navigate to Settings > Integrations > SFTP
  2. Select Create SFTP Integration

  1. Enter the SFTP server details:
    • Hostname or IP address
    • Port number
    • Username
  2. Select the authentication method:
    • Password authentication, or
    • SSH key authentication
  3. If using SSH key authentication:
    • Generate the SSH private key in HeartLab
    • Add the corresponding public key to the receiving SFTP server's authorized keys configuration
    • Supported key formats include:
      • PEM
      • OpenSSH
The selected authentication method must match the configuration on your SFTP server.
  1. Ensure the integration is Enabled

Validate the Connection

  1. Select Test Integration
  2. Confirm the test file is successfully received on the SFTP server.
  3. Verify:
    • Filename formatting
    • Folder/path placement
    • Downstream workflow compatibility

Troubleshooting

Common causes of failed delivery include:

  • Firewall rules blocking HeartLab IPs
  • Incorrect hostname or port
  • Invalid SSH key format
  • Incorrect authentication credentials
  • Incorrect user permissions on the SFTP server
  • Incorrect remote target path

If the test delivery fails:

  • Confirm the SFTP server is externally reachable
  • Verify uploaded SSH keys are valid PEM or OpenSSH format
  • Confirm the destination directory exists
  • Review firewall and whitelist configuration
  • Verify the selected authentication method
  • Re-run the integration test
MFR
Manufacturer
HeartLab Limited 305 / 150 Karangahape Road Auckland 1010 New Zealand
UK REP
UK Responsible Person
Casus UKRP Ltd 107-111 Fleet Street London EC4A 2AB United Kingdom
AUS
Australian Sponsor
Emergo Australia Level 20 Tower II Darling Park 201 Sussex Street Sydney NSW 2000 Australia
MD Applies to HeartLab v7.2 and above Effective 0000-00-00 eIFU version 0.0.0 UDI-DI 09421907090023