Quick start with a new identity-based access management tool.
What is Boundary and what security challenge it solves?
Visit the Boundary downloads page and download the appropriate installer or package for your platform.
After installing Boundary, the next step is to start a dev environment to test.
Explore the Boundary admin console to manage resources.
After starting Boundary in dev mode and logging in, you can connect to your first target.
Configure your Boundary environment using Terraform to codify the initial setup to make the process repeatable.
Resources and further tracks now that you're confident using Boundary.