Hashicorp Boundary

 

1. Overview

Access private resources user needs:

- vpn/ssh credentials

- ip/subnet

- DB credentials


Access private resources challenges

- offboarding / onboarding users

- key rotation 

- unstatic ip address

- expose credentials


Zero trust security model

Dynamic, ephemeral enviorments


single sing on with idp 

role base access control with policy 

logical service


Boundary features: 

- offboarding / onboarding users - it is enough to remove them from idp

- high level policies

- user do not get asses to private network

- credential do not have to be given to user. Gateway fatched them from vault if gateway can comunicate with vault, or vault is used. 


User -(connection)->  Worker -> target endpoint

Worker -> Controllers

User -()-> Controllers -> DB


Controls

Workers


CLI

UX

Desktop App 

Terraform Provider

Dynamic Host Set

    - AWs

    - Consul

    - k8s




2. 

Komentarze

Popularne posty z tego bloga

Kubernetes

Helm

Ansible Tower / AWX