LinuxCommandLibrary

boundary

Secure identity-based remote access to infrastructure.

TLDR

Authenticate to Boundary

$ boundary authenticate
copy
Connect to a target
$ boundary connect -target-id [ttcp_1234567890]
copy
Connect using SSH helper
$ boundary connect ssh -target-id [ttcp_1234567890]
copy
List available targets
$ boundary targets list -recursive
copy
List active sessions
$ boundary sessions list -recursive
copy
Read target details
$ boundary targets read -id [ttcp_1234567890]
copy
Cancel a session
$ boundary sessions cancel -id [s_1234567890]
copy
Start a local proxy
$ boundary connect -target-id [ttcp_1234567890] -listen-port [2222]
copy

SYNOPSIS

boundary command [options]

DESCRIPTION

boundary is the CLI for HashiCorp Boundary, a tool for secure remote access to infrastructure. It provides identity-based access to hosts and services without exposing networks or managing credentials directly.
The connect command establishes sessions to targets. Protocol-specific helpers (ssh, postgres, rdp, http, kube) automatically configure client tools with proper credentials. For SSH, it spawns an ssh process with injected credentials; for databases, it provides connection strings.
Authentication methods include password, OIDC, and LDAP. Credentials are stored in the system keyring or specified location. Use authenticate to log in and logout to clear credentials.
Boundary uses a hierarchical scope model with global, organization, and project scopes. Use -recursive to list resources across all accessible scopes.
Sessions maintain the connection state between client and target. Active sessions can be listed and canceled. Session recordings enable audit and compliance when configured.

PARAMETERS

-target-id id

Target ID to connect to.
-target-name name
Target name (requires scope).
-target-scope-id id
Scope containing target.
-target-scope-name name
Scope name containing target.
-listen-port port
Local port for proxy connection.
-addr address
Boundary controller address.
-token token
Authentication token.
-token-name name
Token name for storage.
-scope-id id
Scope ID for operations.
-recursive
List resources recursively across scopes.
-format format
Output format: table, json.
-keyring-type type
Keyring type for credential storage.

COMMANDS

authenticate

Authenticate to a Boundary controller.
connect [helper]
Establish connection to a target. Helpers: ssh, postgres, rdp, http, kube.
targets list|read
List or inspect targets.
sessions list|read|cancel
Manage active sessions.
hosts list|read
View hosts in host catalogs.
host-catalogs list|read
View host catalogs.
scopes list|read
View organizational scopes.
accounts list|read|create|update|delete
Manage accounts.
auth-methods list|read
View authentication methods.
roles list|read
View roles and permissions.
groups list|read
View groups.
users list|read
View users.
logout
Clear stored credentials.
version
Show version information.

CAVEATS

Requires access to a Boundary controller. Targets must be configured by administrators with proper permissions. Connect helpers require their respective client tools installed (ssh, psql, etc.). Some features require Boundary Enterprise or HCP Boundary.

HISTORY

Boundary was announced by HashiCorp in October 2020 as part of their security product line alongside Vault. It addresses modern identity-based access patterns, replacing traditional VPNs and bastion hosts. Version 0.1 was released in October 2020. The project reached 1.0 GA status in 2022. Boundary integrates with Vault for credential brokering and injection, providing just-in-time access to infrastructure.

SEE ALSO

vault(1), ssh(1), tsh(1), kubectl(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community