In the last part of our Security with HashiCorp and Microsoft Azure series, we take a look at how to use Boundary to automatically discover target hosts and services to solve the issues of access to on-demand infrastructure. Join us as we discuss how this eliminates the need to manually configure targets for dynamic, cloud-based infrastructure.