Boundary is designed to grant access to critical systems using the principle of least privilege, solving challenges organizations encounter when users need to securely access applications and machines. This documentation covers the main concepts of Boundary and its architecture.
Boundary Security Model
Understand Boundary's security norms. Learn how permissions, identity, and target security are handled within the Boundary product.
A quick reference to the filtering syntax used in Boundary.