OIDC Managed Groups Filtering
Learn how to use filters with OIDC managed groups.
Managing credentials and access through a variety of IDPs makes accessing applications and critical systems across different environments complex, requiring a lot of time and expertise to manage.
With Boundary users can authenticate with any trusted identity provider supporting OIDC in order to enable fine-grained role-based authorization. Boundary provides an easy-to-use, platform-agnostic way to access applications and systems across clouds, and on-premise datacenters through a single workflow.
Reduce risk of breach and simplify administration with Boundary’s identity-based secure remote access to ensure that users have access to critical infrastructure they need without exposing your network.