Category: firewall, Hashicorp

Explore how Boundary provides secure access to hosts and services based on user identity with new tutorials on HashiCorp Learn. Boundary provides an easy way to access all of your hosts and services through a single workflow based on trusted identity.

Since the 0.2.0 release several new tutorials have been published that offer workflows for new features, including: Once you've mastered the basics of running Boundary in Dev Mode, explore the Resource Management Workflows to understand more about how access to hosts is managed with role-based access controls (RBAC).

This example also makes use of the Boundary Terraform provider for users looking to automate the deployment and management of Boundary. To learn more about Boundary, please visit the project website at boundaryproject.io, github.com/hashicorp/boundary for the source code, and HashiCorp Learn to find our step-by-step tutorials to get started with Boundary.

Related Articles