Zero Trust Security with Boundary and Vault
The presentation opens with a comprehensive overview of how HashiCorp Boundary addresses traditional privileged access management challenges. Traditional PAM workflows require users to connect through VPN gateways or bastion hosts, creating broad network access that increases attack surface and relies on static, long-lived credentials. Boundary eliminates these pain points by implementing identity provider-based authentication, role-based access control tied to logical services rather than specific hosts, and integration with HashiCorp Vault for dynamic credential generation. This approach aligns with zero trust security principles by authenticating and authorizing every access attempt without bridging users onto private networks, while Vault's secret engines generate short-lived credentials for databases, LDAP systems, and SSH access.
Static Credential Store Capabilities and Use Cases
Boundary offers two types of credential stores: HashiCorp Vault integration for dynamic secrets and a native static credential store for organizations without existing secrets management solutions. The static store is positioned for specific scenarios including organizations seeking easy onboarding without operational overhead, use cases requiring long-lived credentials, or teams wanting a unified interface for both target access and credential management. Key capabilities include passwordless authentication through credential injection (an enterprise-only feature available in HCP Boundary and Boundary Enterprise), where workers establish sessions and authenticate on behalf of users without exposing credentials. The presentation demonstrates this with SSH targets using both username/password and username/key pair credentials stored in Boundary's static store.
Role-Based Credential Management Workflows
The session details a practical implementation pattern where Boundary functions as a static secrets vault with distinct personas and permissions. Password administrators can create, update, and delete credentials through the Boundary UI, while password users have view-only access through the Boundary Desktop application. The workflow leverages Terraform for infrastructure-as-code automation, provisioning users, managed groups, projects, credential stores, and role assignments across multiple teams. The demonstration shows separate CloudOps and SecOps projects with isolated credential stores and targets, enforcing clear separation of concerns. Administrators map credentials to targets through the UI, and users retrieve credentials by establishing sessions through the Desktop app, with access controlled entirely through role-based permissions defined at the project level.