HashiCorp Boundary Enterprise 0.16.2 - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Software Zone (https://softwarez.info/Forum-Software-Zone) +--- Forum: Windows Applications (https://softwarez.info/Forum-Windows-Applications) +--- Thread: HashiCorp Boundary Enterprise 0.16.2 (/Thread-HashiCorp-Boundary-Enterprise-0-16-2--451795) |
HashiCorp Boundary Enterprise 0.16.2 - BaDshaH - 06-23-2024 File size: 278.1 MB Simple and secure remote access. Access any system from anywhere based on user identity. Boundary provides access to applications and critical systems with fine-grained authorizations without managing credentials or exposing your network. Authenticate & authorize Authenticate with any trusted identity provider you are already using and authorize access based on granular, logical roles and services. Connect Manage dynamic infrastructure and integrate service registries so hosts and service catalogs are kept up-to-date. Access Reduce risk of leaking credentials with dynamic secrets and just-in-time credentials. Automate credential brokering to securely access services and hosts with HashiCorp Vault. Identity-based access Enables privileged sessions for users and applications based on user identity and role. Session recording and audit logs Visibility into session metrics, events, logs, and traces with the ability to export data to business intelligence and event monitoring tools. Seamless IDP integration Integrate with IDP of choice, including Azure Active Directory, Okta, and many others that support Open ID Connect. Dynamic secrets management Leverage Vault integration for the brokering of Vault secrets to Boundary clients via the command line and desktop clients for use in Boundary sessions. Service discovery Automate service discovery and access configuration as workloads are deployed or changed. Infrastructure as code with Terraform Define policies and manage Boundary with an Infrastructure as Code approach. Terraform provider supports the full breadth of Boundary configurations. Session Recording for SSH Comply with regulatory requirements by recording and playing back SSH sessions to deter, analyze, and remediate threat events. What's New official site does not provide any info about changes in this version. Homepage |