Learn Secure Access Management with Boundary
Explore how Boundary provides secure access to hosts and services based on user identity with new tutorials on HashiCorp Learn.
One of HashiCorp's latest offerings is Boundary, an access management tool that provides secure management for dynamic infrastructure.
Boundary provides an easy way to access all of your hosts and services through a single workflow based on trusted identity. It lets you create granular, role-based access controls for any networked resource that can be used to extend or even replace a VPN or firewall.
Since the initial product announcement, several exciting new features have been released, including:
- Integration with Open-ID Connect (OIDC) providers like Auth0 and Okta, allowing you to use your favorite authentication methods natively.
- Worker filters that enable granular session routing to avoid latency and private access concerns in multi-cloud and datacenter environments.
- The Boundary Desktop app for macOS, enabling end-users to find, manage, and connect to targets through a UI-driven workflow.
» Get Started
If you haven't checked out Boundary yet, HashiCorp Learn is a great place to explore the project. The Getting Started collection will provide a jump-start for installing and running Boundary in a dev environment and getting a sense for how Boundary enables access based on user identity.
» Featured Tutorials
If you've been keeping up with the project, the new Featured Tutorials section showcases the latest and greatest Boundary has to offer. Since the 0.2.0 release several new tutorials have been published that offer workflows for new features, including:
- OIDC Authentication: Authenticate to Boundary with your external identity provider (IDP) of choice, including Azure Active Directory, Okta, and many others that support Open ID Connect.
- Target-Aware Workers: Specify filters against worker tags to control which workers are allowed to handle a given target’s session, effectively "tying" a worker to a given target.
- The Boundary Desktop App: Connect to remote targets and view active session details, all from a convenient macOS desktop application. Windows support will be added in a future update.
» Resource Management Tutorials
Once you've mastered the basics of running Boundary in Dev Mode, explore the Resource Management Workflows to understand more about how access to hosts is managed with role-based access controls (RBAC).
This workflow explains the basic workflows associated with managing users and groups, hosts, scopes, roles, and sessions are essential to understanding resource management operations.
» Advanced Learning
The Boundary reference architectures are provided for users looking for more advanced examples of deploying Boundary on popular platforms, including Kubernetes, Amazon Web Services (AWS), Microsoft Azure, Google Cloud, and Docker.
If you're familiar with the basics of managing Boundary resources, the reference architectures are a great place to explore deploying Boundary using common tools and workflows for non-dev environments. This example also makes use of the Boundary Terraform provider for users looking to automate the deployment and management of Boundary.
» Jump In
To learn more about Boundary, please visit the project website at boundaryproject.io, github.com/hashicorp/boundary for the source code, and HashiCorp Learn to find our step-by-step tutorials to get started with Boundary.
For even more news about our latest tutorials being added to HashiCorp Learn, follow @HashiCorp on Twitter.
Sign up for the latest HashiCorp news
More blog posts like this one
HashiCorp at AWS re:Invent: Your blueprint to cloud success
If you’re attending AWS re:Invent in Las Vegas, Dec. 2 - Dec. 6th, visit us for breakout sessions, expert talks, and product demos to learn how to take a unified approach to Infrastructure and Security Lifecycle Management.
Secure remote access to private HTTPS targets with HashiCorp Boundary
Learn how Boundary can act as a true VPN replacement by securing remote access to private HTTPS endpoints with transparent sessions.
Boundary 0.18 adds transparent sessions for streamlined connections
Boundary 0.18 adds transparent sessions: an improvement to the core Boundary workflow enabling authorized remote users to securely connect to infrastructure resources in one step.