Getting into HashiCorp Boundary - Identity & Access Management - Part 5
Overview
Join Cole Morrison and Rosemary Wang from HashiCorp's Community Team in this 59-minute tutorial as they learn Boundary the hard way by building it from scratch. This fifth installment of the series focuses on identity and access management within Boundary, demonstrating how to configure users and groups, attach policies to control target access, and implement authentication methods including OIDC. Follow along as they provide hands-on guidance for setting up proper access controls in HashiCorp Boundary, an essential component for privileged access management and security in AWS environments. The complete series and supporting materials are available through the GitHub repository, making it easy to implement these security practices in your own infrastructure.
Syllabus
Getting into HashiCorp Boundary, Part 5: Identity & access management
Taught by
HashiCorp