All posts

Secure File Transfers with Hashicorp Boundary and Rsync

Security rules are tight. Access is locked down. You still need to push files across servers without opening the gates too wide. Hashicorp Boundary with rsync makes that possible. Boundary controls who can connect, when, and how. Rsync moves the data fast, with integrity checks built in. Together, they create a secure file transfer workflow that doesn’t rely on persistent SSH keys or exposed network paths. Start by deploying Hashicorp Boundary as the access broker. Define worker hosts in the p

Free White Paper

Boundary (HashiCorp) + VNC Secure Access: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Security rules are tight. Access is locked down. You still need to push files across servers without opening the gates too wide. Hashicorp Boundary with rsync makes that possible.

Boundary controls who can connect, when, and how. Rsync moves the data fast, with integrity checks built in. Together, they create a secure file transfer workflow that doesn’t rely on persistent SSH keys or exposed network paths.

Start by deploying Hashicorp Boundary as the access broker. Define worker hosts in the private network. Map a target resource for the rsync endpoint. Give specific roles access to that target. No direct IP access, no permanent credentials.

Rsync runs locally, but the connection routes through Boundary. This can be done by configuring Boundary workers to support TCP forwarding for the rsync port. Use a Boundary session token to open the channel. Your rsync client then talks through that secure tunnel, transferring files only during approved sessions.

Continue reading? Get the full guide.

Boundary (HashiCorp) + VNC Secure Access: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

This method has clear advantages:

  • Centralized access control via Boundary.
  • No need to open firewall rules permanently.
  • rsync’s delta-transfer keeps bandwidth use low.
  • Session-based security reduces risk from credential leaks.

Logging in Boundary tracks who moved what, when, and from where. Rsync’s verbose mode adds detail for troubleshooting. Combining the two gives both visibility and control, without slowing down delivery.

The setup steps are:

  1. Install and configure Hashicorp Boundary with workers inside the protected network.
  2. Define a TCP target that points to your rsync service.
  3. Assign users, groups, and roles for specific access times.
  4. Use Boundary’s session commands to start a secure tunnel.
  5. Run rsync over that tunnel to move the necessary files.

With this approach, you can enforce tight access rules while keeping file transfers efficient. No more juggling temporary keys or exposing SSH to the open internet. Boundary brokers the connection. Rsync carries the payload.

See this live in minutes at hoop.dev and streamline secure file transfers in your own environment today.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts