Oct 19-21 HashiConf Global is live. Join Now

Simple and secure remote access

Access any system from anywhere based on user identity.

Identity-based access for zero trust security

In the shift to the cloud, organizations need secure access to targets beyond their own perimeter.

Boundary provides a secure way to access hosts and critical systems without having to manage credentials or expose your network, and is entirely open source.

  • Authenticate & authorize

    Authenticate with any trusted identity provider you are already using and authorize access based on granular, logical roles and services.

    GitHub
    AWS
    Microsoft Azure
    Google Cloud Platform
    Okta
    Ping
    More integrations
  • Connect

    Manage dynamic infrastructure and integrate service registries so hosts and service catalogs are kept up-to-date.

    Consul
    AWS
    Microsoft Azure
    Terraform
    Google Cloud Platform
    Kubernetes
    More integrations
  • Access

    Reduce risk of leaking credentials with dynamic secrets and just-in-time credentials. Automate credential brokering to securely access services and hosts with HashiCorp Vault.

    Postgresql
    SSH
    Mongo DB
    AWS
    Unknown
    MySQL
    More integrations

Why Boundary

  • On-demand identity-based access to infrastructure

    On-demand identity-based access to infrastructure

    Securely connect trusted identities to logical services without having to create or store credentials or access.

  • Scale access management in dynamic environments

    Scale access management in dynamic environments

    Scale access management by defining access controls around logical services instead of IP-based access policies.

  • Streamline remote access with easy-to-use CLI, API or UI

    Streamline remote access with easy-to-use CLI, API or UI

    Make it easy to access all applications and systems through a single workflow that works with existing tooling.

How Boundary Works

HashiCorp Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities. Across clouds, local data centers, low-trust networks, Boundary provides an easier way to protect and safeguard access to application and critical systems by trusted identities without exposing the underlying network

  • Platform-agnostic proxy for dynamic targets
  • No SSH keys or VPN credentials to manage
  • Just-in-time credentials via HashiCorp Vault
How it works

Boundary Features

Identity-based access

Identity-based access

Enables privileged sessions for users and applications based on user identity and role.

Learn more
Session visibility and audit logs

Session visibility and audit logs

Visibility into session metrics, events, logs, and traces with the ability to export data to business intelligence and event monitoring tools.

Learn more
Seamless IDP integration

Seamless IDP integration

Integrate with IDP of choice, including Azure Active Directory, Okta, and many others that support Open ID Connect.

Learn more
Dynamic secrets management

Dynamic secrets management

Leverage Vault integration for the brokering of Vault secrets to Boundary clients via the command line and desktop clients for use in Boundary sessions.

Learn more
Dynamic service discovery

Dynamic service discovery

Automate service discovery and access configuration as workloads are deployed or changed. Coming soon.

Infrastructure as code

Infrastructure as code

Define policies and manage Boundary with an Infrastructure as Code approach. Terraform provider supports the full breadth of Boundary configurations.

Learn more

Ready to get started?