Zero Trust Security and Identity Management with Boundary
Suman Chakraborty�(He/Him)
VMware
$ whoami
Agenda
Traditional Workflow
Challenges with current model
Boundary to the rescue !!
Boundary offers a secure access
Inside Boundary
Scope Management in Boundary
Boundary access and session management
Initiating boundary session
Reading the target host information
Scenario 1: - Understanding boundary UI and walkthrough common setup
DEMO SCENARIOS
Scenario 2: - Walkthrough automation with Terraform and Boundary
Type | Name | Remarks |
Organization | hashitaks_corp | New Organization |
Users | Multiple ~ 4 | Jose, Joe, Bill, Jai |
Group | read-only | Group with 3 users |
Roles | multiple | Read-only & Admin |
Auth Method | Corp Password | New Auth Method password |
Project | core_infra | New project with hashitalks_corp |
Host Catalog | backend_servers | Host catalog with one host set |
Host Set | backend_servers_ssh | Host set with 2 hosts |
Targets | Multiple | ssh_server & backend_server |
How Boundary addresses existing problem!
Resources
Thank You !!!
https://www.linkedin.com/in/schakraborty007/
itsmesumanc