MFA and password hashing
TOTP with authenticator apps and recovery codes. Passwords stored with Argon2id; legacy accounts migrated on first login. Tenant-level MFA policy can be enforced for all users.
Lunixar is built so that access is verified, tenant isolation is total, and remote execution has explicit controls. MFA, Argon2id, content policy, trust tiers, and complete audit trail — with no exceptions in the critical layers.
Applies to backend, WebSocket, agent, and viewer. No exceptions to tenant isolation or RBAC.
Security layers
Identity, isolation, and execution control.
Every control on this list is code-verified. No roadmap items or promised features here.
TOTP with authenticator apps and recovery codes. Passwords stored with Argon2id; legacy accounts migrated on first login. Tenant-level MFA policy can be enforced for all users.
Redis-backed brute force protection, refresh token reuse detection, and MFA step-up on high-risk actions. CSRF double-submit, security headers, and active sessions visible and revocable.
Complete isolation across backend, WebSocket, agent, and viewer. RBAC on every endpoint — no cross-tenant access possible.
Tenants without verified trust cannot combine download and execution. Extended trust carries a 30-day TTL with a recorded reason. Network block rules also apply to registration, terminal, and scripts.
Obfuscated binaries with no .pdb files, auto-updates verified by SHA-256 and URL allowlist. Enroll tokens carry expiry and max-use limits.
Blocked executions land in script_logs with the exact reason. Trust-level changes carry timestamp, user, and reason.
The three security layers apply in order. Without verified identity there is no access; without permissioned access there is no operation; without verified trust there is no sensitive remote execution.
Login protected with Argon2id, Redis-backed brute force protection, and TOTP MFA configurable as mandatory per tenant. Sensitive actions require a recent MFA step-up even when the session is active.
RBAC verifies permissions at every layer. Tenant isolation prevents any cross-account access. Every request to the backend, WebSocket, and viewer passes tenant and role validation.
Content policy blocks download-and-execute combinations for unverified tenants. Blocked destination rules apply to terminal, scripts, schedules, and account registration. Everything blocked lands in the audit log.
Security layers apply across backend, WebSocket, agent, and viewer. Tenant isolation and RBAC have no operational exceptions.
Security controls are active from the start of the trial. No additional configuration required — tenant isolation, MFA, and remote execution policy apply from the moment the account is created.
Get started