Zero-Trust Architecture Without Open Ports, VPNs, or Reverse Tunnels
The awaBerry Protocol is built from the ground up with security as its foundation. By eliminating traditional attack vectors like open ports (22, 21) and complex VPN configurations, awaBerry provides certificate-based, end-to-end encrypted communication that ensures only legitimate device owners and authorized API projects can access your devices. Every connection is authenticated, authorized, and auditable.
Eliminates port 22 (SSH), port 21 (FTP), and all other inbound firewall ports. Your devices establish secure outbound connections only, drastically reducing your attack surface.
Every connection uses certificate-based HTTPS end-to-end encryption. Only legitimate device owners or authorized API project delegates can communicate with your devices.
The awaBerry Cloud API acts as a secure intermediary, validating every connection request before establishing WebSocket sessions between users and devices.
Through awaBerry Agentic, create projects with API keys that limit access to specific folders, commands, or user groups. Perfect for zero-trust automation and AI agents.
Every interaction requires a valid session token. Sessions are time-limited and tied to authenticated users, ensuring continuous verification throughout the connection lifecycle.
Every command, file transfer, and connection attempt is logged with full user identity tracking. Meet compliance requirements with comprehensive audit trails.
When you install awaBerry Client on your device, it registers with the awaBerry Cloud API using certificate-based authentication. The device receives a unique identifier and cryptographic credentials that prove its legitimacy.
Idle State Security: The awaBerry Client on your device enters an idle/waiting state where it cannot execute any CLI commands. It simply waits for authenticated connection requests from the awaBerry Cloud API. There is no local interface that could be exploited, no open ports listening for connections, and no way to interact with the device without going through the secure API.
🔒 Security Benefit: Your device is completely invisible to external networks. Port scanners find nothing. There are no services listening for inbound connections.
When you (the legitimate user) want to access your device, you authenticate with the awaBerry platform through:
After successful authentication, you initiate a connection request that includes:
🔒 Security Benefit: Every request is tied to a verified user identity. Anonymous or unauthenticated access is impossible.
The awaBerry Cloud API performs rigorous validation before forwarding the connection request to your device:
Only after all validations pass does the awaBerry Cloud API forward the connection request to your device.
🔒 Security Benefit: Multiple layers of authentication and authorization prevent unauthorized access even if one credential is compromised.
When your device receives a valid connection request from the awaBerry Cloud API, it:
This handshake ensures mutual authentication - both the user and the device verify each other's legitimacy through the trusted awaBerry Cloud API.
🔒 Security Benefit: Mutual authentication prevents man-in-the-middle attacks and ensures you're connecting to your actual device, not an imposter.
Once both the user and device have confirmed the connection through the awaBerry Cloud API, a secure session is established:
The awaBerry Cloud API acts as the trusted intermediary for session setup but does not have access to the actual command data - it's truly end-to-end encrypted between you and your device.
🔒 Security Benefit: Session tokens expire automatically, preventing replay attacks. The connection is encrypted end-to-end, ensuring privacy.
With the secure WebSocket session established, you can now interact with your device:
For API/Agentic Access: Instead of an interactive terminal, API requests execute specific commands or operations defined by your API project scope. Responses are returned as structured JSON data.
🔒 Security Benefit: All commands are logged with full audit trails. Session tokens can be revoked instantly if suspicious activity is detected.
For automation, AI agents, and team collaboration, awaBerry Agentic allows you to create projects with fine-grained access control:
/home/user/data)ls, cat, grep)Use Cases:
🔒 Security Benefit: Principle of least privilege enforced by default. Even if an API key is leaked, the damage is limited to its restricted scope.
When you're done accessing your device, the session is terminated securely:
Automatic Timeouts: Sessions automatically expire after a period of inactivity, ensuring that forgotten sessions don't remain open indefinitely.
🔒 Security Benefit: No lingering access. Once a session ends, it cannot be resumed or hijacked. A new authentication is required.
The default awaBerry installation provides a web-based terminal that works just like SSH, but without any of the complexity:
🔒 Security Benefit: All the convenience of SSH with zero-trust security and no exposed attack surface.
The awaBerry API integrates seamlessly with agentic frameworks through the Model Context Protocol (MCP):
Example Use Cases:
🔒 Security Benefit: AI agents and automation scripts get fine-grained permissions through API projects, ensuring they can only perform authorized actions.
| Security Principle | Traditional SSH/VPN | awaBerry Protocol |
|---|---|---|
| Open Ports Required | ❌ Yes (Port 22, VPN ports) | ✅ No open ports |
| Attack Surface | ❌ High (exposed services) | ✅ Minimal (outbound only) |
| Authentication Method | ⚠️ Static keys or passwords | ✅ Certificate-based + identity |
| Session Management | ⚠️ Long-lived connections | ✅ Time-limited tokens |
| End-to-End Encryption | ✅ Yes (SSH protocol) | ✅ Yes (HTTPS/TLS) |
| Fine-Grained Access Control | ❌ Limited (user/group only) | ✅ Per-directory, per-command |
| Audit Logging | ⚠️ Basic (if configured) | ✅ Comprehensive by default |
| VPN Required | ❌ Often yes | ✅ Never |
| Zero-Trust Architecture | ❌ Network-based trust | ✅ Identity-based trust |
| API for Automation | ⚠️ Low-level (SSH protocol) | ✅ High-level REST API |
See how the awaBerry Protocol protects your devices without compromising usability.