Security Architecture.

Plexichat is built for on-prem and private-cloud deployments where key custody, data retention, and network boundaries are controlled by your organization.

Key Management & Encryption

Key Custody by Design

Encryption at rest is rooted in your infrastructure. Use TPM 2.0 hardware when available, or configure PLEXICHAT_SYSTEM_KEY for containerized deployments that require software-backed keys.

Key Source TPM 2.0 or Environment
Key Storage system_keyring.json
Data Location Your Database & Storage
Identity Protection

Authentication & Sessions

Plexichat uses strong password hashing, multi-factor authentication, and tokenized sessions for secure access control.

Password Hashing Argon2id
MFA TOTP (2FA)
Session Model Token-Based
Network Defense & Traffic Policy

Rate Limits & Abuse Controls

Traffic protection is enforced per route, per user, and per IP with configurable burst windows.

Route Limits Configurable
Per-User Configurable
Per-IP Configurable

Media Proxy Validation

External URLs are validated through a media proxy to reduce SSRF risk from avatars, embeds, and remote assets.

Deployment Security Checklist

Operational Hardening

These controls map directly to the production deployment guide and keep key material safe.