Simple and secure remote access

Access any system from anywhere based on user identity.

Secure access to hosts and services

Traditional approaches like SSH bastion hosts or VPNs require distributing and managing credentials, configuring network controls like firewalls, and exposing the private network. Boundary provides a secure way to access hosts and critical systems without having to manage credentials or expose your network, and is entirely open source.

  • Authenticate

    Authenticate with any trusted identity provider you are already using. No need to distribute new credentials and manage them.

    GitHub
    AWS
    Microsoft Azure
    Google Cloud Platform
    Okta
    Ping
    More integrations

    Integrations coming soon

  • Authorize

    Authorize access based on logical roles and services, instead of physical IP addresses. Manage dynamic infrastructure and integrate service registries so hosts and service catalogs are kept up-to-date.

    Consul
    AWS
    Microsoft Azure
    Terraform
    Google Cloud Platform
    Kubernetes
    More integrations

    Integrations coming soon

  • Access

    Automate credential injection to securely access services and hosts with HashiCorp Vault. Reduce risk of leaking credentials with dynamic secrets and just-in-time credentials.


Have you tried Boundary?

Share your feedback for a chance to receive special swag.

Share your Boundary story

Boundary Features

Identity-based access

Identity-based access

Enables privileged sessions for users and applications based on user identity and role.

Session management

Session management

Ensures access control regardless of user or operators’ infrastructure.

Platform agnostic

Platform agnostic

One workflow for identity-based access across clouds, kubernetes clusters, and on-prem infrastructure.

Session visibility

Session visibility

Visibility into session metrics, events, logs, and traces with the ability to export data to business intelligence and event monitoring tools.

Infrastructure as code

Infrastructure as code

Define policies and manage Boundary with an Infrastructure as Code approach. Terraform provider supports the full breadth of Boundary configurations.

Manage dynamic environments

Manage dynamic environments

Secure access to dynamic systems and applications with automated controls.

Ready to get started?