Credential Vault¶
The Credential Vault is CrossTerm's encrypted storage for passwords, SSH keys, API tokens, and other sensitive credentials. All data is encrypted with AES-256-GCM using a master password.
Setting Up the Vault¶
On first launch, you are prompted to create a master password:
- Choose a strong password (minimum 8 characters).
- Confirm the password.
- The vault is created and unlocked.
Important: There is no password recovery mechanism. If you forget your master password, vault contents cannot be recovered.
Unlocking the Vault¶
When you start CrossTerm, the vault is locked by default:
- Click the lock icon in the sidebar or status bar.
- Enter your master password.
- The vault unlocks, and credentials become available for connections.
Storing Credentials¶
Password Credentials¶
Store username/password pairs:
- Open the vault (sidebar → Vault icon).
- Click Add Credential.
- Select type Password.
- Enter a name, username, and password.
- Click Save.
SSH Keys¶
Store private keys for SSH authentication:
- Click Add Credential → SSH Key.
- Enter a descriptive name.
- Paste your private key content.
- Optionally add the passphrase.
- Click Save.
API Tokens¶
Store tokens for cloud services and APIs:
- Click Add Credential → API Token.
- Enter the provider name and token value.
- Optionally set an expiry date.
- Click Save.
Cloud Credentials¶
Store AWS, Azure, or GCP access keys:
- Click Add Credential → Cloud Credential.
- Select the cloud provider.
- Enter access key, secret key, and optional region.
- Click Save.
Using Credentials¶
When creating or editing a session:
- In the authentication section, click the key icon.
- A dropdown shows matching credentials from the vault.
- Select a credential to auto-fill the authentication fields.
Credentials are referenced by ID — if you update a credential, all sessions using it get the new values automatically.
Auto-Lock¶
For security, the vault automatically locks after a period of inactivity:
- Default: 15 minutes.
- Configurable: Settings → Security → Vault Auto-Lock.
- Manual lock: Click the lock icon or use Command Palette → Lock Vault.
- Setting auto-lock to 0 disables automatic locking.
Changing the Master Password¶
- Open Settings → Security.
- Click Change Master Password.
- Enter your current password.
- Enter and confirm your new password.
- All credentials are re-encrypted with the new key.
Clipboard Security¶
When copying passwords from the vault:
- Passwords are automatically cleared from the clipboard after a configurable time.
- Default: 30 seconds.
- Configurable: Settings → Security → Clipboard Auto-Clear.
- Setting to 0 disables auto-clear.
Security Details¶
- Encryption: AES-256-GCM with PBKDF2 key derivation.
- Key material: Held in memory with zeroize-on-drop protection.
- No plaintext storage: Credentials are never written to disk unencrypted.
- Audit logging: All vault access events are recorded in the audit log.
- Sensitive fields: Passwords and key material are excluded from serialization and export.