Skip to main content

Secure network access with auto-generated, short-lived credentials

boundary glow
Secure access for users and applications based on user identity and role

Simplify, secure, and streamline remote SSH access based on a user’s identity through your IDP. Remote user access is provided only to machines authorized by administrators rather than the entire network. Automated time-bound credentials on the remote users’ behalf provide a seamless and passwordless experience.

Streamline just-in-time access to privileged sessions for users and applications

Secure remote access on any TCP connection, including access to Windows machines over Remote Desktop Protocol (RDP). This gives remote users just-in-time access with time-bound credentials that don’t need to be stored on their local machines. All sessions can be monitored, logged, and terminated by a central administrative team.

Audit access and simplify management by defining controls around logical services

Keep remote user access consistent, secure, time-bound, and least-privileged. Use single sign-on to minimize risks associated with storing long-lived credentials across different databases, machines, and clouds. Plus, improve governance by monitoring and auditing all sessions.

Gate network access to Kubernetes API and workloads

Reduce the risk of a security breach by eliminating the use of locally stored Kubernetes tokens without expiration dates that can be exploited by unauthorized users. Boundary lets remote teams use time-bound credentials to securely and consistently access Kubernetes clusters across any public or private cloud environment.

Improve security posture, facilitate analysis of user activity, and help enhance compliance.

Track user and application actions when accessing critical systems to gain valuable insights into user behavior. Record every session and playback detailing commands and actions executed by each user. Maintain an auditable record of all activities to increase security posture and enhance overall compliance.

Get up to speed

Start learning the basics and see what Boundary can make possible for your projects.

Tutorials

Further your Boundary knowledge and learn how to use Boundary to securely access critical systems with authorizations based on trusted identities.

  • OIDC authentication
    Set up OIDC with Auth0, Okta, or Azure Active Directory and manage from Boundary's dev mode.
  • OIDC IdP groups
    Integrate with identity providers like Okta, cloud-hosted active directory services with an OIDC frontend, and cloud identity management systems such as AWS IAM.
  • Enable session recording with S3-compatible storage
    Enable session recording with S3-compatible storage
  • Broker static credentials to your first target
    Configure a static credential store with HCP Boundary and broker credentials for a TCP target.

Documentation

Understand the main concepts of Boundary, what problems it can solve, and how to get going quickly.

  • Deploy HCP Boundary
    How to deploy HCP Boundary services and login for the first time.
  • Connect to a target
    Connecting to a target securely through Boundary.
  • Boundary domain model
    Understand the Boundary domain model that allows administrators to organize IAM (Identity and Access Management) and target resources.
  • Boundary configuration
    Use HashiCorp Configuration Language (HCL) to configure Boundary controllers and workers.

Get started with Boundary

Boundary uses identity to secure remote access to hosts and services across any environment. Get started for free and pay only for what you use.