The connection died at midnight. Not because the network failed, but because the bastion host was gone. That’s how HashiCorp Boundary changes the rules.
Boundary removes the need for static credentials and manual SSH tunnels. You define roles, resources, and access policies. Authentication runs through OIDC, LDAP, or Vault. Authorization is enforced at the session layer. You get a short-lived session to a target system. Nothing to store. Nothing left behind.
Now bring SQL*Plus into the picture. Oracle DBAs and developers often connect through sqlplus user/password@host:port/service_name. In traditional setups, this means storing credentials or opening wide network access. By using HashiCorp Boundary with SQL*Plus, you avoid static secrets and risky firewall changes.
The flow is simple. Boundary connects you to an Oracle database target through its worker nodes. You log in to Boundary using your identity provider. Boundary brokers the connection, issuing an ephemeral TCP address and port bound to your session. You point SQL*Plus at that address. Once the session ends, the address is gone. No lingering open ports. No static passwords in scripts.