Boundary: A Practical Use Case including Desktop App

In 2020 Hashicorp has announced Boundary as a new product to their already amazing portfolio. Boundary allows us to manage the remote access to our infra using a granular policy-based access control. Despite being in its early ages, Boundary looks like a promising tool and with a lot of room for growth.

As a very novice tool, the practical documentation, including use cases, are still scarce and spread.

If you happen to get here, I’m assuming that you already know what Boundary is and what is for. In case you don’t, you can get to know Boundary by checking the Boundary Project site. In a nutshell, Boundary provides a programmatic and code-based approach for remote access management.

Source: Boundary Project

Fictional Scenario

  • Organization (MyCorp) with a single project (scope) called Core_Infra;
  • Accounts managed using Boundary built-in Password IdP, which is the only auth method currently supported, although there a more to come, as per roadmap;
  • Users mapped to IdP accounts (with the same for demonstration purposes). Worth mentioning that a single user can be mapped to one or more accounts. Also, the users are not required of being created in advance, but this is a more advanced discussion;
  • Users will be added to Groups based on OS (Windows and Linux), but choose the one that better suits your needs;
  • Roles with associated grants and making reference to Groups as Principals;
  • Hosts grouped in HostSets (Windows and Linux) inside a Host Catalog;
  • Targets based on the protocol (SSH and RDP) and linked to their respective HostSets;

Installation Steps:

Boundary setup will be made on top of Ubuntu 18.04, although it should work on any supported OS. Since Hashicorp has their our Apt repository, Boundary installation on Ubuntu can be performed using the script below:

$ scripts/

For Dev mode, Docker is also required. It can be installed on Ubuntu using the official steps (which includes removing previous versions):

$ scripts/

Alternatively, you can use Rancher Docker installation script, which works like a charm.

$ curl | sh

Starting Boundary

Since this is not a production environment, Boundary will be started in Dev Mode:

$ sudo boundary dev -api-listen-address= \
-cluster-listen-address= \
-proxy-listen-address= \
-worker-public-address=$(curl -s

==> Boundary server configuration:
Controller Public Cluster Addr:
Dev Database Container: vigorous_bhabha
Dev Database Url: postgres://postgres:password@localhost:49153/boundary?sslmode=disable
Generated Admin Login Name: admin
Generated Admin Password: password
Generated Auth Method Id: ampw_1234567890
Generated Host Catalog Id: hcst_1234567890
Generated Host Id: hst_1234567890
Generated Host Set Id: hsst_1234567890
Generated Org Scope Id: o_1234567890
Generated Project Scope Id: p_1234567890
Generated Target Id: ttcp_1234567890

Boundary Config using Terraform

Boundary Config using Terraform

The configuration can be automated using Terraform and the definition files for the presented scenario can be found on GitHub. Since Terraform out of the scope for this guide, I’m assuming that the reader has Terraform already installed and also some background in how to use it. The definitions were based on this tutorial published by Hashicorp. However, the Hashicorp definitions were not fully functional, so I decided to add some improvements to the code.

The definitions used in this guide are fully functional using any rolled user. After cloning the repo, make sure that you update the file with your endpoint settings. The default password for Boundary is password (in case you haven’t changed it).

provider "boundary" {
addr = "http://<BOUNDARY_ADDR>:9200"
auth_method_id = "ampw_1234567890"
password_auth_method_login_name = "admin"
password_auth_method_password = "<PASSWORD>"

Once the definitions are updated, Terraform needs to be inititated and applied:

$ terraform init
$ terraform plan
$ terraform apply

After the configuration is completed, you must be able to open the WebUI and see the new corp MyCorp. You must be able also of being authenticated using one of the created users using WebUI or CLI.


$ export BOUNDARY_ADDR=http://<BOUNDARY_ADDR>:9200

# Don't forget to replace the AMPW_ID
$ boundary authenticate password -auth-method-id=<AMPW_ID> -login-name=lilian -password=password -format=json | jq -r ".token"


$ boundary scopes list
Scope information:
ID: o_1234567890
Version: 1
Name: Generated org scope
Description: Provides an initial org scope in Boundary
Authorized Actions:


For a CLI walk-through, refer to a follow-up to this guide. SOON TO COME


Until a few weeks ago, the only option for connecting to remote targets using Boundary was through the CLI, since the vendor didn’t provide any Desktop UI. However, Hashicorp has just announced a Desktop app (Alpha), only for MacOS user for now. The .dmg file can be downloaded here.

After the App is installed, on the first opening the users will be requested to provide the endpoint — http://<BOUNDARY_ADDR>:9200. On the following page, they will be asked to provide their username and password. Don’t forget to switch to “MyCorp” organization at the top.

Once authenticated, the users will be presented to the available targets. For connecting to one of the targets, just click connect and take note of the port number informed and move to a terminal or open an RDP client app.

For SSH, open an SSH session pointing to localhost and using the session port previously noted and the SSH user. Bear in mind that the session will expire after the first use (no matter if the SSH session was open or not), but this can be adjusted on Boundary using session_connection_limit parameter.

$ ssh -p 53704 -l username

At this point, you have a functional Boundary setup, however, there are still some improvements to be made, especially on the roles, since they are pretty permissive yet. But this was the first step and I hope you can move forward from this point.

Hope you find this useful and I’m looking forward to your feedback.