Boundary (Hashicorp)

No Change
assess
First Added:July 23, 2023 Updated: May 18, 2026

HashiCorp Boundary is an identity-aware proxy for just-in-time access to hosts and services (SSH, RDP, databases, Kubernetes) without handing users long-lived credentials or flat network VPNs. We rate it assess: strong fit for ZTNA / Access on Demand patterns when you already run the HashiCorp stack; prove ops appetite before committing (controllers, workers, Vault integration, session recording).

Blurb

Boundary provides identity-based access to dynamic infrastructure with fine-grained authorizations and session visibility.

Summary

What it does: brokers connections after OIDC/SSO auth; issues short-lived credentials (often via Vault); logs sessions for audit. Replaces “SSH keys on a bastion” and broad Tailscale-style network access when you only need specific targets.

When to assess: multi-cloud or dynamic infra (Nomad, VMs, K8s) with compliance pressure for no standing privilege; teams standardizing on HashiCorp (Terraform, Vault) and wanting one access plane.

When to skip: simple static fleets with mature SSO + AoD elsewhere; orgs avoiding HashiCorp post-IBM acquisition complexity; need full L3 VPN (use Tailscale sparingly, not Boundary).

Editions: Community (self-managed), Enterprise, and HCP Boundary (managed). Match edition to audit requirements (session recording, multi-tenancy).

Details

TopicNotes
IdentityEntra, Okta, Ping, or any OIDC IdP, pairs with Auth0-class providers at the edge
SecretsDynamic credentials via Vault; plan Vault HA before Boundary production
ModelTargets, host catalogs, roles; map to RBAC and break-glass runbooks
TechniqueImplements Zero Trust Network Architecture principles in practice