Skip to content

Credentials

Shield CLI uses strong encryption to protect all locally stored credentials.

Machine Fingerprint

Each machine generates a unique fingerprint used for:

  • Deriving encryption keys
  • Identifying the connector (format: shield_<12-char-fingerprint>)

The fingerprint is derived from machine hardware information using platform-specific methods, remaining consistent until the OS is reinstalled.

Encryption

ItemDetail
AlgorithmAES-256-GCM
KeySHA256(machine fingerprint)
PurposeEncrypt locally stored credentials and app configurations

Storage Location

PlatformPath
macOS / Linux~/.shield-cli/.credential
Windows%LOCALAPPDATA%\ShieldCLI\.credential

File permissions are set to 0600 — readable and writable only by the current user.

What's Stored

The local credential file contains (encrypted):

  • Connector name
  • Connector token
  • Assigned server port
  • Server address

These are automatically generated on first connection and reused for subsequent connections.

Password Security

  • Passwords are hidden during interactive input
  • All password content is masked in log output (shown as ***)
  • Passwords are not stored locally — used only during connection establishment

Clearing Credentials

To reset credentials (e.g., switching accounts):

bash
shield clean

This clears the cached credential file. New credentials will be generated on the next connection.

See Clear Cache.