A HashiCorp Boundary Provisioning Key is the gatekeeper token used to bootstrap secure authentication for controllers and workers. It is generated by the Boundary server and is valid only during initial registration. After use, the key expires and cannot be reused. This design prevents rogue components from silently joining your network.
When you install a new Boundary worker or controller, the provisioning key pairs with the cluster’s public key to establish trust. Without it, the process fails. You get deterministic configuration and a clear audit trail. In distributed deployments, this keeps your trust model intact even when provisioning at scale.
Generate a provisioning key with the boundary CLI or via API. Store it securely—environment variable, secure file, or a secrets manager. Do not commit it to code. The key’s short lifetime means you should plan provisioning windows carefully. If the key expires before registration, you must issue a new one. This adds friction for attackers but minimal delay for planned setups.