Softwares HashiCorp Boundary Enterprise 0.15.4

HashiCorp Boundary Enterprise centralizes remote access management and ensures access to infrastructure resources located on any public or private cloud environment. Easily integrates with leading identity providers such as Okta, Ping, and Azure Active Directory, and supports multiple service registries to automatically discover and maintain an up-to-date repository of servers and target service. Features of HashiCorp Boundary Enterprise Authenticate with whatever trusted identity....

HashiCorp Boundary Enterprise centralizes remote access management and ensures access to infrastructure resources located on any public or private cloud environment. Easily integrates with leading identity providers such as Okta, Ping, and Azure Active Directory, and supports multiple service registries to automatically discover and maintain an up-to-date repository of servers and target service.

Features of HashiCorp Boundary Enterprise

  • Authenticate with whatever trusted identity provider you are using and grant access based on detailed, logical services and roles.
  • Dynamic infrastructure management and service registries integration so servers and service catalogs stay up to date.
  • Reduce the risk of credentials leaks with dynamic secrets and instant credentials. Automate certificate brokers for secure access to services and servers with HashiCorp Vault.
  • Enable privileged sessions for users and applications based on the user's identity and role.
  • Visibility into session, event, log, and trace metrics with the ability to export data to business intelligence and event monitoring tools.
  • Integrates with optional IDP, including Azure Active Directory, Okta, and more that support Open ID Connect.
  • Leverage Vault integration to broker Vault secrets for Boundary clients via command line and desktop clients for use in Boundary sessions.
  • Automatically discover services and access configurations when workloads are deployed or changed.
  • Defining policy and managing Boundaries with the Infrastructure as Code approach. The Terraform provider fully supports Boundary configurations.
  • Comply with regulatory requirements by recording and replaying SSH sessions to prevent, analyze, and remediate threat events.
Top Alternatives

You can also like