Boundary — Secure Remote Access by HashiCorp
An identity-based access management tool that replaces traditional VPNs with fine-grained, identity-aware connections to infrastructure resources without exposing networks.
What it is
Boundary is an identity-based access management tool by HashiCorp that replaces traditional VPNs. Instead of giving users broad network access, Boundary provides fine-grained, identity-aware connections to specific infrastructure resources. Users authenticate through identity providers (Okta, Azure AD, OIDC), and Boundary grants access only to the specific databases, servers, or services they are authorized to use.
This tool is for security teams, platform engineers, and DevOps engineers who need to provide secure remote access to infrastructure without the overhead and risk of VPN tunnels.
How it saves time or tokens
Boundary eliminates VPN configuration and management overhead. No more VPN profiles, split-tunneling rules, or broad network access that exposes more than necessary. Access is granted per resource and per identity. Session recording and audit logs provide compliance visibility without additional tooling.
How to use
- Deploy Boundary server (self-hosted or HCP Boundary).
- Configure identity providers and targets.
- Users authenticate and connect to authorized resources.
- Boundary proxies connections securely.
# Install Boundary CLI
brew install hashicorp/tap/boundary
# Authenticate
boundary authenticate oidc -auth-method-id amoidc_1234567890
# List available targets
boundary targets list -recursive
# Connect to a database target
boundary connect postgres -target-id ttcp_1234567890 \
-dbname mydb
# Connect to an SSH target
boundary connect ssh -target-id ttcp_0987654321
Example
Boundary Terraform configuration for a database target:
resource "boundary_target" "prod_db" {
name = "production-database"
description = "Production PostgreSQL"
type = "tcp"
scope_id = boundary_scope.project.id
default_port = 5432
host_source_ids = [
boundary_host_set_static.prod_db.id
]
injected_application_credential_source_ids = [
boundary_credential_library_vault.db_creds.id
]
}
Boundary injects credentials from Vault automatically. Users never see the database password.
Related on TokRepo
- Security tools — More access management and security tools
- DevOps tools — Infrastructure management tools
Common pitfalls
- Boundary has a learning curve compared to simple VPNs. The concepts of scopes, targets, host catalogs, and credential stores require upfront investment.
- Self-hosted deployment requires PostgreSQL and careful network architecture. HCP Boundary (HashiCorp Cloud) simplifies this.
- Credential brokering with Vault adds another system to manage. Ensure your Vault setup is stable before integrating.
- Not all applications support proxied connections cleanly. GUI tools that require direct database connections may need additional configuration.
- Session recording generates significant storage. Plan for log retention and cleanup.
- Review the official documentation before deploying to production to ensure compatibility with your specific environment and requirements.
- Start with default settings and customize incrementally. Changing too many configuration options at once makes debugging harder.
Frequently Asked Questions
VPNs grant network-level access. Once connected, a user can reach any resource on the network. Boundary grants resource-level access. A user authenticated through Boundary can only reach specific targets they are authorized for, nothing else.
Yes. Boundary integrates with HashiCorp Vault for credential brokering. Boundary can request temporary database credentials from Vault and inject them into user sessions, so users never see passwords.
Boundary supports OIDC providers including Okta, Azure AD, Auth0, and any standard OIDC-compliant provider. It also supports password-based authentication and LDAP.
The core of Boundary is open-source under the BSL license. HashiCorp also offers HCP Boundary, a managed cloud version with additional enterprise features.
Yes. Boundary provides detailed session logs showing who connected to which target, when, and for how long. Enterprise features add session recording for full audit trails.
Citations (3)
- Boundary GitHub— Boundary provides identity-based access management
- HashiCorp Boundary Docs— Boundary documentation and concepts
- NIST Zero Trust Architecture— Zero trust security architecture
Related on TokRepo
Discussion
Related Assets
Conda — Cross-Platform Package and Environment Manager
Install, update, and manage packages and isolated environments for Python, R, C/C++, and hundreds of other languages from a single tool.
Sphinx — Python Documentation Generator
Generate professional documentation from reStructuredText and Markdown with cross-references, API autodoc, and multiple output formats.
Neutralinojs — Lightweight Cross-Platform Desktop Apps
Build desktop applications with HTML, CSS, and JavaScript using a tiny native runtime instead of bundling Chromium.