Hashicorp Boundary
1. Overview
Access private resources user needs:
- vpn/ssh credentials
- ip/subnet
- DB credentials
Access private resources challenges
- offboarding / onboarding users
- key rotation
- unstatic ip address
- expose credentials
Zero trust security model
Dynamic, ephemeral enviorments
single sing on with idp
role base access control with policy
logical service
Boundary features:
- offboarding / onboarding users - it is enough to remove them from idp
- high level policies
- user do not get asses to private network
- credential do not have to be given to user. Gateway fatched them from vault if gateway can comunicate with vault, or vault is used.
User -(connection)-> Worker -> target endpoint
Worker -> Controllers
User -()-> Controllers -> DB
Controls
Workers
CLI
UX
Desktop App
Terraform Provider
Dynamic Host Set
- AWs
- Consul
- k8s
2.
Komentarze
Prześlij komentarz