boundary
Secure identity-based remote access to infrastructure.
TLDR
Authenticate to Boundary
SYNOPSIS
boundary command [options]
DESCRIPTION
boundary is the CLI for HashiCorp Boundary, a tool for secure remote access to infrastructure. It provides identity-based access to hosts and services without exposing networks or managing credentials directly.
The connect command establishes sessions to targets. Protocol-specific helpers (ssh, postgres, rdp, http, kube) automatically configure client tools with proper credentials. For SSH, it spawns an ssh process with injected credentials; for databases, it provides connection strings.
Authentication methods include password, OIDC, and LDAP. Credentials are stored in the system keyring or specified location. Use authenticate to log in and logout to clear credentials.
Boundary uses a hierarchical scope model with global, organization, and project scopes. Use -recursive to list resources across all accessible scopes.
Sessions maintain the connection state between client and target. Active sessions can be listed and canceled. Session recordings enable audit and compliance when configured.
PARAMETERS
-target-id id
Target ID to connect to.-target-name name
Target name (requires scope).-target-scope-id id
Scope containing target.-target-scope-name name
Scope name containing target.-listen-port port
Local port for proxy connection.-addr address
Boundary controller address.-token token
Authentication token.-token-name name
Token name for storage.-scope-id id
Scope ID for operations.-recursive
List resources recursively across scopes.-format format
Output format: table, json.-keyring-type type
Keyring type for credential storage.
COMMANDS
authenticate
Authenticate to a Boundary controller.connect [helper]
Establish connection to a target. Helpers: ssh, postgres, rdp, http, kube.targets list|read
List or inspect targets.sessions list|read|cancel
Manage active sessions.hosts list|read
View hosts in host catalogs.host-catalogs list|read
View host catalogs.scopes list|read
View organizational scopes.accounts list|read|create|update|delete
Manage accounts.auth-methods list|read
View authentication methods.roles list|read
View roles and permissions.groups list|read
View groups.users list|read
View users.logout
Clear stored credentials.version
Show version information.
CAVEATS
Requires access to a Boundary controller. Targets must be configured by administrators with proper permissions. Connect helpers require their respective client tools installed (ssh, psql, etc.). Some features require Boundary Enterprise or HCP Boundary.
HISTORY
Boundary was announced by HashiCorp in October 2020 as part of their security product line alongside Vault. It addresses modern identity-based access patterns, replacing traditional VPNs and bastion hosts. Version 0.1 was released in October 2020. The project reached 1.0 GA status in 2022. Boundary integrates with Vault for credential brokering and injection, providing just-in-time access to infrastructure.
