Skip to content

Connection Management

OxideTerm’s Saved Connections panel and Session Manager give you a complete workspace for organizing, securing, and reusing SSH connections — from single servers to complex multi-hop proxy chains.

Open the New Connection dialog from the sidebar (+ button) or Session Manager toolbar.

MethodDescription
PasswordPrompted securely on connect — never stored in config files
SSH KeyRSA, Ed25519, ECDSA — file path or OS keychain
SSH AgentDelegates to the running ssh-agent or macOS Keychain
CertificateSSH certificate with optional CA verification
Keyboard Interactive2FA / OTP / PAM challenges

OxideTerm auto-detects the ~/.ssh/ directory and imports keys without configuration.

  • Host / Port / Username — standard connection parameters
  • Color — per-connection accent color for visual identification in the sidebar
  • Group — organize into folders in the sidebar and Session Manager
  • Tags — freeform labels for filtering and searching
  • ProxyJump (Jump Host) — chain through one or more bastion hosts

OxideTerm resolves jump chains using a Dijkstra shortest-path algorithm across your saved connection tree. You can chain through unlimited intermediate hosts:

Local Machine ──► Bastion A ──► Bastion B ──► Target Server
  • Intermediate sessions are opened automatically
  • Each hop is tracked individually in the Connection Pool
  • If any intermediate hop drops, its children are marked link_down and cascade-reconnected

Organize connections into nested folder groups in the Session Manager:

  • Drag-and-drop connections between groups
  • Rename, create, or delete groups
  • Subgroups supported for deep hierarchies
  • Filter the connection table by selected group

OxideTerm reads your existing ~/.ssh/config file and imports defined Host blocks as OxideTerm connections — preserving ProxyJump, User, IdentityFile, Port, and other directives.

On first connection to a new host, OxideTerm uses Trust On First Use (TOFU):

  1. The host’s public key fingerprint is shown in a confirmation dialog
  2. On acceptance, the key is pinned to OxideTerm’s known hosts store
  3. On subsequent connects, the stored fingerprint is verified automatically
  4. Key-mismatch warnings are shown prominently — never silently ignored

Connection presets (including credentials) can be exported to a portable .oxide file for backup or transfer between machines.

PropertyValue
CipherChaCha20-Poly1305 AEAD
KDFArgon2id — 256 MB memory, 4 iterations, 1 thread
IntegritySHA-256 checksum embedded in file header
Pre-flightValidates memory availability before starting KDF
Key length256-bit derived key

The .oxide format uses a passphrase you provide — OxideTerm never stores the passphrase. Import the file on any OxideTerm installation with the correct passphrase.

The Active Sessions sidebar panel has two modes:

  • Tree View — hierarchical view showing jump host relationships, child nodes indented under parents
  • Focus View — flat list of only the currently active / connected sessions

Right-click any node for quick actions: Connect, Disconnect, New Terminal, Open SFTP, Open IDE Mode, Port Forwarding, Drill Down (navigate into the host), Save as Preset.

The Auto-Route feature automatically selects the optimal ProxyJump path to a target host by analyzing the current active session tree.