Overview

Run Dev Mode

boundary dev -api-listen-address=0.0.0.0 -cluster-listen-address=0.0.0.0 -proxy-listen-address=0.0.0.0 -worker-public-address=192.168.1.80

Authenticating to Boundary

Using token none (make sure to unset the BOUNDARY_TOKEN env variable if set):

# boundary authenticate password -auth-method-id ampw_1234567890 -login-name admin -password "password" -token-name=none

Using BOUNDARY_TOKEN env variable:

export BOUNDARY_ADDR=http://192.168.1.80:9200
boundary authenticate password -auth-method-id=ampw_1234567890 -login-name=admin -password=password -token-name=none -format=json | jq -r ".token" > boundary_token.txt
export BOUNDARY_TOKEN=$(cat boundary_token.txt)

Connecting via SSH

This works well with WSL

boundary connect ssh -target-id ttcp_tP3Uoe7X2d -host-id hst_uFcRGR4FCF

wireshark filter: ip.addr == 192.168.1.80

Connecting via RDP

This works well with WSL, just make sure you increase the connection count to at least 2 for rdp to work.. Terraform already takes care of this.

boundary connect rdp -target-id ttcp_nqhPabGuma -host-id hst_WB9GVkJe8L

wireshark filter: ip.addr == 192.168.1.80

Presentation Flow

  1. Introduction
  2. Slides to Explain Boundary
  3. Getting Started and Installation
  4. Start Boundary in Dev Mode
  5. Run Terraform to Configure it
  6. Authenticate to Boundary
  7. SSH Connect to Linux Server
  8. Wireshark the SSH Connection
  9. RDP Connect to Windows Server
  10. Wireshark the RDP Connection
  11. Conclusion

References

Blog Announcement Armon's Whiteboard Terraform Boundary Provider Getting Started Learn Guide Production AWS Reference Architecture Production High Availability Architecture