

The client validates the server proof and decrypts the API Key.The client gets a server proof, an encrypted API Key and a salt.The client sends its random data and client proof.
TERMIUS SECURITY PASSWORD

The following diagram illustrates the authentication process: ARGON2-based SRP (new)įor authenticating in the Termius cloud, the app communicates with the server in a way that prevents sending a password or password hash (as well as encryption passphrase and its hash) over the network using a modified SRP6a protocol. After successful authentication, the app uses the password/encryption passphrase for data encryption, as described later in this article. Termius offers two types of authentication: username/password and single sign-on (SSO). SSH keys, username, and password/encryption passphrase.

Termius encrypts SSH server and telnet configs, snippets, meta info like tags and labels, credentials for SSH and telnet authentication, i.e. The encryption schemas used to encrypt personal data and data shared with a team.
