Secure network access with auto-generated, short-lived credentials

Simplify, secure, and streamline remote SSH access based on a user’s identity through your IDP. Remote user access is provided only to machines authorized by administrators rather than the entire network. Automated time-bound credentials on the remote users’ behalf provide a seamless and passwordless experience.
Secure remote access on any TCP connection, including access to Windows machines over Remote Desktop Protocol (RDP). This gives remote users just-in-time access with time-bound credentials that don’t need to be stored on their local machines. All sessions can be monitored, logged, and terminated by a central administrative team.
Keep remote user access consistent, secure, time-bound, and least-privileged. Use single sign-on to minimize risks associated with storing long-lived credentials across different databases, machines, and clouds. Plus, improve governance by monitoring and auditing all sessions.
Reduce the risk of a security breach by eliminating the use of locally stored Kubernetes tokens without expiration dates that can be exploited by unauthorized users. Boundary lets remote teams use time-bound credentials to securely and consistently access Kubernetes clusters across any public or private cloud environment.
Track user and application actions when accessing critical systems to gain valuable insights into user behavior. Record every session and playback detailing commands and actions executed by each user. Maintain an auditable record of all activities to increase security posture and enhance overall compliance.
Get up to speed
Start learning the basics and see what Boundary can make possible for your projects.
Tutorials
Further your Boundary knowledge and learn how to use Boundary to securely access critical systems with authorizations based on trusted identities.
- OIDC authenticationSet up OIDC with Auth0, Okta, or Azure Active Directory and manage from Boundary's dev mode.Learn more
- OIDC IdP groupsIntegrate with identity providers like Okta, cloud-hosted active directory services with an OIDC frontend, and cloud identity management systems such as AWS IAM.Learn more
- Enable session recording with S3-compatible storageEnable session recording with S3-compatible storageLearn more
- Broker static credentials to your first targetConfigure a static credential store with HCP Boundary and broker credentials for a TCP target.Learn more
Documentation
Understand the main concepts of Boundary, what problems it can solve, and how to get going quickly.
- Boundary domain modelUnderstand the Boundary domain model that allows administrators to organize IAM (Identity and Access Management) and target resources.Learn more
- Boundary configurationUse HashiCorp Configuration Language (HCL) to configure Boundary controllers and workers.Learn more