Jump to content


- - - - -

HashiCorp Boundary Enterprise 0.15.2

HashiCorp Boundary Enterprise

  • Please log in to reply
No replies to this topic

#1 topwork

topwork

    Advanced Member

  • Members
  • PipPipPip
  • 48,747 posts

Posted 20 March 2024 - 01:58 PM

6f4f99feac90e20fe55fb27000933aa4.jpeg
Free Download HashiCorp Boundary Enterprise 0.15.2 | 251.2 Mb
Simple and secure remote access. Access any system from anywhere based on user identity. Boundary provides access to applications and critical systems with fine-grained authorizations without managing credentials or exposing your network.

Authenticate & authorize
Authenticate with any trusted identity provider you are already using and authorize access based on granular, logical roles and services.
Connect
Manage dynamic infrastructure and integrate service registries so hosts and service catalogs are kept up-to-date.
Access
Reduce risk of leaking credentials with dynamic secrets and just-in-time credentials. Automate credential brokering to securely access services and hosts with HashiCorp Vault.
Identity-based access
Enables privileged sessions for users and applications based on user identity and role.
Session recording and audit logs
Visibility into session metrics, events, logs, and traces with the ability to export data to business intelligence and event monitoring tools.
Seamless IDP integration
Integrate with IDP of choice, including Azure Active Directory, Okta, and many others that support Open ID Connect.
Dynamic secrets management
Leverage Vault integration for the brokering of Vault secrets to Boundary clients via the command line and desktop clients for use in Boundary sessions.
Service discovery
Automate service discovery and access configuration as workloads are deployed or changed.
Infrastructure as code with Terraform
Define policies and manage Boundary with an Infrastructure as Code approach. Terraform provider supports the full breadth of Boundary configurations.
Session Recording for SSH
Comply with regulatory requirements by recording and playing back SSH sessions to deter, analyze, and remediate threat events.
Home Page-

Please Login or Register to see this Hidden Content



Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

Please Login or Register to see this Hidden Content

Links are Interchangeable - No Password - Single Extraction






Also tagged with one or more of these keywords: HashiCorp, Boundary, Enterprise

1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users